backtop


Print 6 comment(s) - last by The Raven.. on Jun 3 at 11:20 AM


New rules could help dictate when the U.S. Defense Department can attack other nations online.  (Source: Progressive Fix)

The CIA wants to forbid the military from executing cyberattacks without its permission. It argues online attacks are "covert" operations.  (Source: Saul Loeb/AFP/Getty)
Under new rules agents can regularly hack into foreign networks, but not sabotage them outside of war

The Pentagon made headlines earlier this week when it was revealed to be preparing to publish a draft of rules of cyber-engagement, which ruled that cyber-sabotage could be an act of war.  Drawing on the concept of "equivalence", the draft proposes that the U.S. only respond to web attacks with physical force if there's loss of life from the attack.

I. New Rules to Govern U.S. Cyberwarfare

New details have emerged in The Washington Post about a corresponding classified document, which lists a set of cyber-tools/weapons at the disposal at the 
U.S. Department of Defense (DoD) and national intelligence agencies.  The document refers to "weapons" like computer worms or viruses as "fires".

The list fills a critical gap as it establish a broad and uniform set of rules of what the U.S. government views as acceptable uses of cyber force.  That might help prevent incidents like the Stuxnet sabotage of Iran's nuclear power plant, which the U.S. was reportedly implicated in.

Describes a military official, "[W]hether it’s a tank, an M-16 or a computer virus, it’s going to follow the same rules so that we can understand how to employ it, when you can use it, when you can’t, what you can and can’t use."

II. Offense v. Defense

Under the new rules, the deployment of a worm like Stuxnet for the purposes of sabotage would be strictly forbidden.  The rules allow military and intelligence officials to penetrate foreign networks to study their capabilities, identify critical infrastructure like power plants, and plant "beacons"/back-doors that allow for quick future attacks by viruses or other means, if needed.

That strategy is consistent with what is believed to be employed by the government of China who is accused of hacking U.S. power grid operatorsdefense contractorsbusinesses, and DoD servers for the purpose of information gathering.

The strategy focuses largely on cyber-defense -- something the U.S. is currently very poor at.  An official commented, "[T]he United States is actively developing and implementing [capabilities] to deter or deny a potential adversary the ability to use its computer systems."

Formally the proposal requires all offensive cyber-weapons like Stuxnet to be pre-approved.  However, during times of war/open hostility, the President can pre-approve cyber-attacks to allow commanders to make timely responses.

By contrast, when not at war or is operating outside of a war zone, any use of offensive cyber-force is referred to as "direct action" and requires explicit and specific presidential authorization.  If such an action was ever taken it would be required to responded proportional to the threat, not inflict undue collateral damage, and avoid civilian casualties.

III. The "Inspire" Case Study

The proposal does fail to address one key debate that's waging between the U.S. military and the nation's intelligence agencies.  The military says that it should be able to treat cyberattacks on terrorist websites as clandestine operations and command attacks against them.

The U.S. Central Intelligence Agency and other intelligence agencies argue that such operations are covert operations, and must be authorized by the intelligence community.  They argue that such operations can disrupt valuable sources of intelligence and endanger U.S. operatives.

Both sides have powerful supporters.  House Armed Services Committee Vice Chairman Rep. Mac Thornberry (R-Texas) has added language to the House-approved 2012 defense authorization bill which would allow the military "to carry out a clandestine operation in cyberspace" under certain stipulations.  The bill calls such operations "traditional military" actions.  

Rep Thornberry states, "I have had colonels come back to me [from Iraq and Afghanistan] and talk about how they thought they could do a better job of protecting their troops if they could deal with a particular Web site. Yet because it was cyber, it was all new unexplored territory that got into lots of lawyers from lots of agencies being involved." 

The Obama administration has announced unspecified "concerns" with the measure, though.

The battle has already played out once.  In a high profile incident in 2010 the U.S. military proposed a takedown or defacement of a new English language radical Islamic jihadist publication named Inspire, which was published by an al-Qaida affiliate.  The head of the newly formed U.S. Cyber Command, Gen. Keith Alexander said taking down the magazine, which featured specials like how to “Make a Bomb in the Kitchen of Your Mom", would help safeguard U.S. troops overseas. But he face firm opposition from the CIA who protested any action against the magazine.

In the end the CIA won -- the Obama administration ordered the attack plans scrapped.  

In the end British cyber-warriors stepped in, making up for the Americans' inaction.  They defaced the posted version of the magazine so pages 4 through 67 -- which included the bomb tutorial -- were blurred and unintelligible.  It took a couple weeks for the publisher to repair the damage and repost a new version; by that time many would-be jihadists reportedly had grown bored and moved on.



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

It's about time
By schrodog on 6/2/2011 4:44:55 PM , Rating: 2
Though we are late to do so, I'm glad the United States is taking steps to treat cyberspace as a valid warfront. As technology becomes more and more integrated into armed conflict, it becomes increasingly important that we treat cyberspace as an asset that can help or hurt the enemy.




RE: It's about time
By Omega215D on 6/3/2011 9:06:25 AM , Rating: 2
So when does Sam Fisher and Third Echelon come into play in any of this? =P


"Folks that want porn can buy an Android phone." -- Steve Jobs














botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki