• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Malicious AI-generated npm package hits Solana users

 | 

Meta Offers $1M bounty at Pwn2Own Ireland 2025 for WhatsApp exploits

 | 

ToolShell under siege: Check Point analyzes Chinese APT Storm-2603

 | 

CISA released Thorium platform to support malware and forensic analysis

 | 

Russia-linked APT Secret Blizzard targets foreign embassies in Moscow with ApolloShadow malware

 | 

Dahua Camera flaws allow remote hacking. Update firmware now

 | 

Researchers released a decryptor for the FunkSec ransomware

 | 

Apple fixed a zero-day exploited in attacks against Google Chrome users

 | 

PyPI maintainers alert users to email verification phishing attack

 | 

FBI seizes 20 BTC from Chaos Ransomware affiliate targeting Texas firms

 | 

Critical SAP flaw exploited to launch Auto-Color Malware attack on U.S. company

 | 

Orange reports major cyberattack, warns of service disruptions

 | 

Hackers leak images and comments from women dating safety app Tea

 | 

Pro-Ukraine hacktivists claim cyberattack on Russian Airline Aeroflot that caused the cancellation of +100 flights

 | 

Seychelles Commercial Bank Reported Cybersecurity Incident

 | 

Microsoft uncovers macOS flaw allowing bypass TCC protections and exposing sensitive data

 | 

U.S. CISA adds Cisco ISE and PaperCut NG/MF flaws to its Known Exploited Vulnerabilities catalog

 | 

Critical WordPress Post SMTP plugin flaw exposes 200K+ sites to full takeover

 | 

Scattered Spider targets VMware ESXi in using social engineering

 | 

China-linked group Fire Ant exploits VMware and F5 flaws since early 2025

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Cyber warfare
  • Security
  • U.S. admit cyber attacks.Who will decide in future conflict,humans or machines?

U.S. admit cyber attacks.Who will decide in future conflict,humans or machines?

Pierluigi Paganini August 28, 2012

The U.S. are one of the most advanced country under cyber warfare perspective, we have read a lot on its capabilities and its offensive power, to remark some sample we can remind the plan-X project and the development of the cyber weapon Stuxnet. We all imagine that the U.S. are still really active in the cyber space, working on cyber espionage front and also conducting powerful offensives. We know that the country, as many others is facing with a global economic crisis that has impacted also on military sector, the budgets have been sensibly reduced but the high alert level on possibility of a cyber attack make fundamental investments in cyber warfare.

News of these days is that the U.S. military has been launching cyber attacks against its opponents in Afghanistan according the declaration of the senior officer Marine Lt. Gen. Richard P. Mills. The official has explained during a conference in Baltimore that the U.S. consider highly strategic oversight of the cyber space, giving great importance to the study and implementation of new cyber weapons, that is the new way to fight and it fundamental to be prepared to a cyber warfare scenario. Mills declare:

“I can tell you that as a commander in Afghanistan in the year 2010, I was able to use my cyber operations against my adversary with great impact,”

“I was able to get inside his nets, infect his command-and-control, and in fact defend myself against his almost constant incursions to get inside my wire, to affect my operations.”

The statements are exhaustive, the US  forces are carrying out cyber attacks on their opponents in Afghanistan, the cyber weapons are critical elements of U.S. cyber arsenal.

It’s the first time that a high official admits these type of offensive operations in Afghanistan despite it is imaginable the involvement of cyber units.

The Pentagon spokesman Lt. Col. Damien Pickart refused to give more information on on Mills’s statements for reasons of security.

“we do not provide specific information regarding our intentions, plans, capabilities or operations.”

The response is lecit and acceptable, but then why the officer made these revelations publicly?

Many experts are convinced that the U.S. are opening up about the fact that its military operations are active also in cyberspace and have the same efficiency of conventional attacks, the main advantage is that these kind of attacks are really difficult to anticipate and could be conducted silently for years.

Differently of a conventional attack a cyber attacks has no boudaries, it could be moved in the cyber space to offend any kind of targets and the statements confirm that this what ordinary happen.

The cyber expert Herbert Lin declared :

“The U.S. military is starting to talk more and more in terms of what it’s doing and how it’s doing it,”

“A couple of years ago it was hard to get them to acknowledge that they were doing offense at all — even as a matter of policy, let alone in specific theaters or specific operations.”

The reply of Pentagon is that US cyber operations were properly authorized and that they took place within the bounds of international law and the “confines of existing policy.”

We must consider that today there is an ongoing debate on the usage of cyber weapons and the recourse to cyber attacks as military option, let’s consider also that international regulation are still inadequate in the matter, that’s why the cyber operations  represents the optimum choice.

Today there isn’t a legal and official definition for cyber weapon under the law perspective and every government is hardly working to develop its own arsenal eluding any kind of penalties conducing cyber operations.

U.S. have demonstrated to have a sophisticated program to increase cyber capabilities and to design and spread cyber weapons, let’s consider also that the recent months have been characterized by the discoveries of several agents more or less aggressive such as Stuxnet and Flame utilized to cyber attacks or cyber espionage, anyway for a military operation.

Mills’s words are just the last act of an openness on U.S. cyber operations, military action that have been started long ago, there are evidences of the famous project “Olympic Games” started under Bush’s Government and continued under Obama administration. The Pentagon is sustaining project of development of new cyber technology to employ during the cyber attacks, the funding experiment called “Plan X,” demonstrates it.

“The objective of the Plan X program is to create revolutionary technologies for understanding, planning, and managing cyber warfare in real-time, large-scale, and dynamic network environments,”

The hard work is assigned to its agency Defense Advanced Research Projects Agency  (DARPA) that have to design new tools for launching attacks against enemies in the cyberspace, these tool include malware and other instruments for cyber espionage.

Officially the DARPA mission is to develop technology to support the infrastructure for offensive strategies, one of the main targets is to design tool to analyze data flow in every network to provide essential information to military strategists.

Another ambitious project is the development of an architecture to monitors damage in “dynamic, contested, and hostile network environments” that is equipped with adaptive capacities to mitigate the incoming attacks, these type of systems represents the future, the essential components to deploy in cyber space in case of a conflict.

I desire to conclude with a thought … every government is working to develop new tool for defensive and offensive purposes, many of these agents are able to work without human control …

Are we confident that these tools are able to make their job safely? What would happen if we lost control of these systems? Could “the machine” that must defend ourselves become our main enemy?

Pierluigi Paganini


facebook linkedin twitter

Cyber attacks cyber espionage cyber warfare cyber weapons DARPA malware Plan X stuxnet U.S.

you might also like

Pierluigi Paganini August 01, 2025
Meta Offers $1M bounty at Pwn2Own Ireland 2025 for WhatsApp exploits
Read more
Pierluigi Paganini August 01, 2025
ToolShell under siege: Check Point analyzes Chinese APT Storm-2603
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Malicious AI-generated npm package hits Solana users

    Malware / August 01, 2025

    Meta Offers $1M bounty at Pwn2Own Ireland 2025 for WhatsApp exploits

    Hacking / August 01, 2025

    ToolShell under siege: Check Point analyzes Chinese APT Storm-2603

    APT / August 01, 2025

    CISA released Thorium platform to support malware and forensic analysis

    Cyber Crime / August 01, 2025

    Russia-linked APT Secret Blizzard targets foreign embassies in Moscow with ApolloShadow malware

    APT / July 31, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT