• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Patch immediately: CVE-2025-25257 PoC enables remote code execution on Fortinet FortiWeb

 | 

Wing FTP Server flaw actively exploited shortly after technical details were made public

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 53

 | 

Security Affairs newsletter Round 532 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

McDonald’s job app exposes data of 64 Million applicants

 | 

Athlete or Hacker? Russian basketball player accused in U.S. ransomware case

 | 

U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog

 | 

UK NCA arrested four people over M&S, Co-op cyberattacks

 | 

PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

 | 

Qantas data breach impacted 5.7 million individuals

 | 

DoNot APT is expanding scope targeting European foreign ministries

 | 

Nippon Steel Solutions suffered a data breach following a zero-day attack

 | 

Iranian group Pay2Key.I2P ramps Up ransomware attacks against Israel and US with incentives for affiliates

 | 

Hackers weaponize Shellter red teaming tool to spread infostealers

 | 

Microsoft Patch Tuesday security updates for July 2025 fixed a zero-day

 | 

Italian police arrested a Chinese national suspected of cyberespionage on a U.S. warrant

 | 

U.S. CISA adds MRLG, PHPMailer, Rails Ruby on Rails, and Synacor Zimbra Collaboration Suite flaws to its Known Exploited Vulnerabilities catalog

 | 

IT Worker arrested for selling access in $100M PIX cyber heist

 | 

New Batavia spyware targets Russian industrial enterprises

 | 

Taiwan flags security risks in popular Chinese apps after official probe

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Cyber warfare
  • Security
  • U.S. admit cyber attacks.Who will decide in future conflict,humans or machines?

U.S. admit cyber attacks.Who will decide in future conflict,humans or machines?

Pierluigi Paganini August 28, 2012

The U.S. are one of the most advanced country under cyber warfare perspective, we have read a lot on its capabilities and its offensive power, to remark some sample we can remind the plan-X project and the development of the cyber weapon Stuxnet. We all imagine that the U.S. are still really active in the cyber space, working on cyber espionage front and also conducting powerful offensives. We know that the country, as many others is facing with a global economic crisis that has impacted also on military sector, the budgets have been sensibly reduced but the high alert level on possibility of a cyber attack make fundamental investments in cyber warfare.

News of these days is that the U.S. military has been launching cyber attacks against its opponents in Afghanistan according the declaration of the senior officer Marine Lt. Gen. Richard P. Mills. The official has explained during a conference in Baltimore that the U.S. consider highly strategic oversight of the cyber space, giving great importance to the study and implementation of new cyber weapons, that is the new way to fight and it fundamental to be prepared to a cyber warfare scenario. Mills declare:

“I can tell you that as a commander in Afghanistan in the year 2010, I was able to use my cyber operations against my adversary with great impact,”

“I was able to get inside his nets, infect his command-and-control, and in fact defend myself against his almost constant incursions to get inside my wire, to affect my operations.”

The statements are exhaustive, the US  forces are carrying out cyber attacks on their opponents in Afghanistan, the cyber weapons are critical elements of U.S. cyber arsenal.

It’s the first time that a high official admits these type of offensive operations in Afghanistan despite it is imaginable the involvement of cyber units.

The Pentagon spokesman Lt. Col. Damien Pickart refused to give more information on on Mills’s statements for reasons of security.

“we do not provide specific information regarding our intentions, plans, capabilities or operations.”

The response is lecit and acceptable, but then why the officer made these revelations publicly?

Many experts are convinced that the U.S. are opening up about the fact that its military operations are active also in cyberspace and have the same efficiency of conventional attacks, the main advantage is that these kind of attacks are really difficult to anticipate and could be conducted silently for years.

Differently of a conventional attack a cyber attacks has no boudaries, it could be moved in the cyber space to offend any kind of targets and the statements confirm that this what ordinary happen.

The cyber expert Herbert Lin declared :

“The U.S. military is starting to talk more and more in terms of what it’s doing and how it’s doing it,”

“A couple of years ago it was hard to get them to acknowledge that they were doing offense at all — even as a matter of policy, let alone in specific theaters or specific operations.”

The reply of Pentagon is that US cyber operations were properly authorized and that they took place within the bounds of international law and the “confines of existing policy.”

We must consider that today there is an ongoing debate on the usage of cyber weapons and the recourse to cyber attacks as military option, let’s consider also that international regulation are still inadequate in the matter, that’s why the cyber operations  represents the optimum choice.

Today there isn’t a legal and official definition for cyber weapon under the law perspective and every government is hardly working to develop its own arsenal eluding any kind of penalties conducing cyber operations.

U.S. have demonstrated to have a sophisticated program to increase cyber capabilities and to design and spread cyber weapons, let’s consider also that the recent months have been characterized by the discoveries of several agents more or less aggressive such as Stuxnet and Flame utilized to cyber attacks or cyber espionage, anyway for a military operation.

Mills’s words are just the last act of an openness on U.S. cyber operations, military action that have been started long ago, there are evidences of the famous project “Olympic Games” started under Bush’s Government and continued under Obama administration. The Pentagon is sustaining project of development of new cyber technology to employ during the cyber attacks, the funding experiment called “Plan X,” demonstrates it.

“The objective of the Plan X program is to create revolutionary technologies for understanding, planning, and managing cyber warfare in real-time, large-scale, and dynamic network environments,”

The hard work is assigned to its agency Defense Advanced Research Projects Agency  (DARPA) that have to design new tools for launching attacks against enemies in the cyberspace, these tool include malware and other instruments for cyber espionage.

Officially the DARPA mission is to develop technology to support the infrastructure for offensive strategies, one of the main targets is to design tool to analyze data flow in every network to provide essential information to military strategists.

Another ambitious project is the development of an architecture to monitors damage in “dynamic, contested, and hostile network environments” that is equipped with adaptive capacities to mitigate the incoming attacks, these type of systems represents the future, the essential components to deploy in cyber space in case of a conflict.

I desire to conclude with a thought … every government is working to develop new tool for defensive and offensive purposes, many of these agents are able to work without human control …

Are we confident that these tools are able to make their job safely? What would happen if we lost control of these systems? Could “the machine” that must defend ourselves become our main enemy?

Pierluigi Paganini


facebook linkedin twitter

Cyber attacks cyber espionage cyber warfare cyber weapons DARPA malware Plan X stuxnet U.S.

you might also like

Pierluigi Paganini July 13, 2025
Patch immediately: CVE-2025-25257 PoC enables remote code execution on Fortinet FortiWeb
Read more
Pierluigi Paganini July 13, 2025
Wing FTP Server flaw actively exploited shortly after technical details were made public
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Patch immediately: CVE-2025-25257 PoC enables remote code execution on Fortinet FortiWeb

    Security / July 13, 2025

    Wing FTP Server flaw actively exploited shortly after technical details were made public

    Hacking / July 13, 2025

    SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 53

    Breaking News / July 13, 2025

    Security Affairs newsletter Round 532 by Pierluigi Paganini – INTERNATIONAL EDITION

    Breaking News / July 13, 2025

    McDonald’s job app exposes data of 64 Million applicants

    Hacking / July 12, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT