Categories: Cyber warfareSecurity

U.S. admit cyber attacks.Who will decide in future conflict,humans or machines?

The U.S. are one of the most advanced country under cyber warfare perspective, we have read a lot on its capabilities and its offensive power, to remark some sample we can remind the plan-X project and the development of the cyber weapon Stuxnet. We all imagine that the U.S. are still really active in the cyber space, working on cyber espionage front and also conducting powerful offensives. We know that the country, as many others is facing with a global economic crisis that has impacted also on military sector, the budgets have been sensibly reduced but the high alert level on possibility of a cyber attack make fundamental investments in cyber warfare.

News of these days is that the U.S. military has been launching cyber attacks against its opponents in Afghanistan according the declaration of the senior officer Marine Lt. Gen. Richard P. Mills. The official has explained during a conference in Baltimore that the U.S. consider highly strategic oversight of the cyber space, giving great importance to the study and implementation of new cyber weapons, that is the new way to fight and it fundamental to be prepared to a cyber warfare scenario. Mills declare:

“I can tell you that as a commander in Afghanistan in the year 2010, I was able to use my cyber operations against my adversary with great impact,”

“I was able to get inside his nets, infect his command-and-control, and in fact defend myself against his almost constant incursions to get inside my wire, to affect my operations.”

The statements are exhaustive, the US  forces are carrying out cyber attacks on their opponents in Afghanistan, the cyber weapons are critical elements of U.S. cyber arsenal.

It’s the first time that a high official admits these type of offensive operations in Afghanistan despite it is imaginable the involvement of cyber units.

The Pentagon spokesman Lt. Col. Damien Pickart refused to give more information on on Mills’s statements for reasons of security.

“we do not provide specific information regarding our intentions, plans, capabilities or operations.”

The response is lecit and acceptable, but then why the officer made these revelations publicly?

Many experts are convinced that the U.S. are opening up about the fact that its military operations are active also in cyberspace and have the same efficiency of conventional attacks, the main advantage is that these kind of attacks are really difficult to anticipate and could be conducted silently for years.

Differently of a conventional attack a cyber attacks has no boudaries, it could be moved in the cyber space to offend any kind of targets and the statements confirm that this what ordinary happen.

The cyber expert Herbert Lin declared :

“The U.S. military is starting to talk more and more in terms of what it’s doing and how it’s doing it,”

“A couple of years ago it was hard to get them to acknowledge that they were doing offense at all — even as a matter of policy, let alone in specific theaters or specific operations.”

The reply of Pentagon is that US cyber operations were properly authorized and that they took place within the bounds of international law and the “confines of existing policy.”

We must consider that today there is an ongoing debate on the usage of cyber weapons and the recourse to cyber attacks as military option, let’s consider also that international regulation are still inadequate in the matter, that’s why the cyber operations  represents the optimum choice.

Today there isn’t a legal and official definition for cyber weapon under the law perspective and every government is hardly working to develop its own arsenal eluding any kind of penalties conducing cyber operations.

U.S. have demonstrated to have a sophisticated program to increase cyber capabilities and to design and spread cyber weapons, let’s consider also that the recent months have been characterized by the discoveries of several agents more or less aggressive such as Stuxnet and Flame utilized to cyber attacks or cyber espionage, anyway for a military operation.

Mills’s words are just the last act of an openness on U.S. cyber operations, military action that have been started long ago, there are evidences of the famous project “Olympic Games” started under Bush’s Government and continued under Obama administration. The Pentagon is sustaining project of development of new cyber technology to employ during the cyber attacks, the funding experiment called “Plan X,” demonstrates it.

“The objective of the Plan X program is to create revolutionary technologies for understanding, planning, and managing cyber warfare in real-time, large-scale, and dynamic network environments,”

The hard work is assigned to its agency Defense Advanced Research Projects Agency  (DARPA) that have to design new tools for launching attacks against enemies in the cyberspace, these tool include malware and other instruments for cyber espionage.

Officially the DARPA mission is to develop technology to support the infrastructure for offensive strategies, one of the main targets is to design tool to analyze data flow in every network to provide essential information to military strategists.

Another ambitious project is the development of an architecture to monitors damage in “dynamic, contested, and hostile network environments” that is equipped with adaptive capacities to mitigate the incoming attacks, these type of systems represents the future, the essential components to deploy in cyber space in case of a conflict.

I desire to conclude with a thought … every government is working to develop new tool for defensive and offensive purposes, many of these agents are able to work without human control …

Are we confident that these tools are able to make their job safely? What would happen if we lost control of these systems? Could “the machine” that must defend ourselves become our main enemy?

Pierluigi Paganini

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

ConnectWise suffered a cyberattack carried out by a sophisticated nation state actor<gwmw style="display:none;"></gwmw><gwmw style="display:none;"></gwmw>

ConnectWise detected suspicious activity linked to a nation-state actor, impacting a small number of its…

2 hours ago

Victoria’s Secret ‘s website offline following a cyberattack

Victoria’s Secret took its website offline after a cyberattack, with experts warning of rising threats…

20 hours ago

China-linked APT41 used Google Calendar as C2 to control its TOUGHPROGRESS malware

Google says China-linked group APT41 controlled malware via Google Calendar to target governments through a…

23 hours ago

New AyySSHush botnet compromised over 9,000 ASUS routers, adding a persistent SSH backdoor.

GreyNoise researchers warn of a new AyySSHush botnet compromised over 9,000 ASUS routers, adding a…

1 day ago

Czech Republic accuses China’s APT31 of a cyberattack on its Foreign Ministry

The Czech government condemned China after linking cyber espionage group APT31 to a cyberattack on…

2 days ago

New PumaBot targets Linux IoT surveillance devices

PumaBot targets Linux IoT devices, using SSH brute-force attacks to steal credentials, spread malware, and…

2 days ago