rediff.com
News APP

NewsApp (Free)

Read news as it happens
Download NewsApp

Available on  gplay

Rediff.com  » Business » With troops and techies, US prepares for cyber warfare
This article was first published 11 years ago

With troops and techies, US prepares for cyber warfare

Last updated on: June 8, 2013 08:27 IST

Image: A magnifying glass is held in front of a computer screen in this picture illustration taken in Berlin, Germany.
Photographs: Pawel Kopczynski/Reuters Warren Strobel and Deborah Charles in Washington, DC

On the site of a former military golf course where President Dwight Eisenhower once played, the future of US warfare is rising in the shape of the new $358 million headquarters for the military's Cyber Command.

The command, based at Fort Meade, Maryland, about 25 miles (40.23 kilometres) north of Washington, is rushing to add between 3,000 and 4,000 new cyber warriors under its wing by late 2015, more than quadrupling its size.

Most of Cyber Command's new troops will focus on defence, detecting and stopping computer penetrations of military and other critical networks by America's adversaries like China, Iran or North Korea.

...

With troops and techies, US prepares for cyber warfare

Image: National Security Agency headquarters building in Fort Meade, Maryland.
Photographs: NSA/Handout/Reuters

But there is an increasing focus on offense as military commanders beef up plans to execute cyber strikes or switch to attack mode if the nation comes under electronic assault.

"We're going to train them to the highest standard we can," Army General Keith Alexander, head of Cyber Command, told the Reuters Cybersecurity Summit last month. "And not just on defence, but on both sides. You've got to have that."

Officials and experts have warned for years that US computer networks are falling prey to espionage, intellectual property theft and disruption from nations such as China and Russia, as well as hackers and criminal groups.

...

With troops and techies, US prepares for cyber warfare

Image: Aerial view of the United States military headquarters, the Pentagon, in Arlington, Virginia.
Photographs: Jason Reed/Reuters

President Barack Obama will bring up allegations of Chinese hacking when he meets President Xi Jinping at a summit in California - charges that Beijing has denied.

The Pentagon has accused China of using cyber espionage to modernise its military and a recent report said Chinese hackers had gained access to the designs of more than two dozen major US weapons systems in recent years.

Earlier this year, US computer security company Mandiant said a secretive Chinese military unit was probably behind a series of hacking attacks that had stolen data from 100 US companies.

...

With troops and techies, US prepares for cyber warfare

Image: Analysts work in a watch and warning centre of a cyber security defence lab at the Idaho National Laboratory in Idaho Falls, United States.
Photographs: Jim Urquhart/Reuters

There is a growing fear that cyber threats will escalate from mainly espionage and disruptive activities to far more catastrophic attacks that destroy or severely degrade military systems, power grids, financial networks and air travel.

Now, the United States is redoubling its preparations to strike back if attacked, and is making cyber warfare an integral part of future military campaigns.

Experts and former officials say the United States is among the best - if not the best - in the world at penetrating adversaries' computer networks and, if necessary, inserting viruses or other digital weapons.

...

With troops and techies, US prepares for cyber warfare

Image: An analyst looks at code in the malware lab at the Idaho National Laboratory in Idaho Falls, United States.
Photographs: Jim Urquhart/Reuters

Washington might say it will only strike back if attacked, but other countries disagree, pointing to the "Stuxnet" virus. Developed jointly by the US government and Israel, current and former US officials told Reuters last year, Stuxnet was highly sophisticated and damaged nuclear enrichment centrifuges at Iran's Natanz facility.

US government officials frequently discuss America's cyber vulnerabilities in public. By contrast, details about US offensive cyberwarfare capabilities and operations are almost all classified.

...

With troops and techies, US prepares for cyber warfare

Image: A monitor displays an attacking team's progress during a drill at a Department of Homeland Security cyber security defence lab at the Idaho National Laboratory in Idaho Falls, United States.
Photographs: Jim Urquhart/Reuters

Possible US offensive cyber attacks could range from invading other nations' command and control networks to disrupting military communications or air defenses - or even putting up decoy radar screens on an enemy's computers to prevent US aircraft from being detected in its airspace.

The shift toward a greater reliance on offense is an important one for a nation which has mostly been cautious about wading into the uncertain arena of cyberwar - in part because gaps in US cybersecurity make it vulnerable to retaliation.

But former Homeland Security Secretary Michael Chertoff said the United States must be ready and should articulate - soon - what level of cyber aggression would be seen as an act of war, bringing a US response.

...

With troops and techies, US prepares for cyber warfare

Image: John Bumgarner, a cyber warfare expert who is chief technology officer of the US Cyber Consequences Unit, a non-profit group that studies the impact of cyber threats, holds a notebook computer while posing for a portrait in Charlotte, North Carolina.
Photographs: John Adkisson/Reuters

"One of the things the military learned, going back to 9/11, is whether you have a doctrine or not, if something really bad happens you're going to be ordered to do something," he told the Reuters summit.

"So you better have the capability and the plan to execute."

Reuters has learned that new Pentagon rules of engagement, detailing what actions military commanders can take to defend against cyber attacks, have been finalised after a year of "hard core" debate.

The classified rules await Defense Secretary Chuck Hagel's signature, a senior defence official said. The official would not give details of the rules but said, "they will cover who has the authority to do specific actions if the nation is attacked".

...

With troops and techies, US prepares for cyber warfare

Image: Josh Mayeux, network defender, works at the Air Force Space Command Network Operations and Security Center at Peterson Air Force Base in Colorado Springs, Colorado, United States.
Photographs: Rick Wilking/Reuters

At Cyber Command, military officers in crisp uniforms mix with technical experts in T-shirts as the armed forces takes up the challenge of how to fend off cyber penetrations from individuals or rival countries.

Even as overall US defence spending gets chopped in President Barack Obama's proposed 2014 budget, cyber spending would grow by $800 million, to $4.7 billion while overall Pentagon spending is cut by $3.9 billion.

Until its new headquarters is ready, Cyber Command shares a home with the US National Security Agency, which for 60 years has used technological wizardry to crack foreign codes and eavesdrop on adversaries while blocking others from doing the same to the United States. Alexander heads both agencies.

...

With troops and techies, US prepares for cyber warfare

Image: US Department of Homeland Security analysts work at the National Cybersecurity & Communications Integration Center located just outside Washington in Arlington, Virginia.
Photographs: Hyungwon Kang/Reuters

"The greatest concentration of cyber power in this planet is at the intersection of the Baltimore-Washington Parkway and Maryland Route 32," said retired General Michael Hayden, a former CIA and NSA director, referring to NSA's Fort Meade location.

But NSA's role in helping protect civilian, government and private networks has been controversial - and is likely to come under greater scrutiny with this week's revelation that it has been collecting telephone records of millions of Verizon Communications customers under a secret court order.

A January report by the Pentagon's Defense Science Board gave a general picture of how the United States might exploit and then attack an adversary's computer systems. In some cases, US intelligence might already have gained access for spying, the report said.

...

With troops and techies, US prepares for cyber warfare

Image: TSgt James Ortiz, shift lead, boundary protection looks over a rack in the server room at the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado.
Photographs: Rick Wilking/Reuters

From there, Cyber Command "may desire to develop an order of battle plan against that target" and would require deeper access, "down to the terminal or device level in order to support attack plans", it said.

Because gaining access to an enemy's computers for sustained periods without detection is not easy, "offensive cyber will always be a fragile capability", it said.

In cyberspace, reconnaissance of foreign networks is "almost always harder than the attack" itself because the challenging part is finding a way into a network and staying undetected, said Hayden, now with the Chertoff Group consulting firm.

...

With troops and techies, US prepares for cyber warfare

Image: Eugene Kaspersky, Chairman and CEO of Kaspersky Labs, speaks at a Tel Aviv University cyber security conference. Kaspersky, whose lab discovered the Flame virus that has attacked computers in Iran and elsewhere in the Middle East, says only a global effort could stop a new era of 'cyber terrorism'.
Photographs: Baz Ratner/Reuters

Cyber Command's new Joint Operations Center, due to be complete in 2018, will pull disparate units together and house 650 personnel, officials said. Air Force, Army, Navy and Marine Corps components will be nearby and, a former US intelligence official said, the complex will have power and cooling to handle its massive computing needs.

Those who have worked at Cyber Command say the atmosphere is a mixture of intensity and geek-style creativity. Military precision is present, but it is not unusual to see young civilian computer whiz kids with purple hair, a tie-dyed shirt and blue jeans.

...

With troops and techies, US prepares for cyber warfare

Image: Competitors participate in the National Security Agency cyber competition at the US Naval Academy in Annapolis, Maryland.
Photographs: US Navy Academy/Handout/Reuters

"It's made to be a fun environment for them. These are people who are invested and want to serve their nation. But there is some military rigor and structure around all that - like a wrapper," said Doug Steelman, who was director of Network Defense at Cyber Command until 2011 and is now Chief Information Security Officer at Dell SecureWorks.

Cyber Command's growth and expanding mission come with serious challenges and questions. For example, how to prevent US military action in cyberspace from also damaging civilian facilities in the target country, such as a hospital that shares an electric grid or computer network with a military base?

...

With troops and techies, US prepares for cyber warfare

Image: US Marine Sergeant Michael Kidd works on a computer at ECPI University in Virginia Beach, Virginia.
Photographs: Samantha Sais/Reuters

And some doubt that the military can train many cyber warriors quickly enough. Alexander has identified that as his biggest challenge.

The former intelligence official said Cyber Command's new teams won't be fully ready until at least 2016 due to military bureaucracy and because it takes time to pull together people with the special skills needed.

"To be a good cyber warrior, you have to be thinking, 'How is the attacker discovering what I'm doing? How are they working around it?' Cyber security really is a cat and mouse game," said Raphael Mudge, a private cybersecurity expert and Air Force reservist.

...

With troops and techies, US prepares for cyber warfare

Image: A sign lists prohibited items on a door leading to a watch and warning centre of a cyber security defence lab at the Idaho National Laboratory in Idaho Falls.
Photographs: Jim Urquhart/Reuters

"That kind of thinking can't be taught. It has to be nurtured. There are too few who can do that." Would-be cyber warriors go through extensive training, which can take years.

A recruit with proven aptitude will be sent to courses such as the Navy-led Joint Cyber Analysis Course in Pensacola, Florida, a six-month intensive training programme.

The top 10 per cent of JCAC's students will be selected for advanced cyber operations training, said Greg Dixon, a vice-president at private KEYW Corp, which conducts intensive training classes.

The company can train a JCAC graduate to become an analyst in five weeks, but it takes 20 weeks to become a cyber operator. Dixon would not divulge what an operator would be capable of doing after graduation, but said it would be "a lot".

...

With troops and techies, US prepares for cyber warfare

Image: US Department of Homeland Security employees work on the Industrial Control Systems Cyber Emergency Response Team operational watch floor where they monitor, track and investigate cyber incidents at the Idaho National Laboratory in Idaho Falls, Idaho.
Photographs: Chris Morgan/Idaho National Laboratory/Reuters

"They're going to pick the cream of the crop for the 'full spectrum cyber missions'," the former US intelligence official said, using a euphemism for cyber offense.

Before a future cyber warrior can begin advanced training, he or she has to pass through the arduous security clearance process, which can take six to nine months for personnel who are not already cleared.

Troops earmarked for cyber warfare have found themselves washing floors, mowing lawns and painting at military installations as they bide time waiting for a clearance.

There is the concern about retaliation for a US cyber attack. Some analysts say Iran increased its cyber capabilities after being infected with Stuxnet, which was revealed in 2010.

...

Tags: US , Iran

With troops and techies, US prepares for cyber warfare

Image: A work station is pictured at the US Department of Homeland Security's National Cybersecurity & Communications Integration Center located just outside Washington, DC, in Arlington, Virginia.
Photographs: Hyungwon Kang/Reuters

"The old saying, he who lives in a glass house should be careful of throwing stones... but if the stone that you threw at someone, when you live in a glass house, is a stone that in some way they could pick back up and throw back at you, that's an even dumber idea," the defence official said.

"We definitely think about that as one aspect of considering action."

Tags: US
Source: REUTERS
© Copyright 2024 Reuters Limited. All rights reserved. Republication or redistribution of Reuters content, including by framing or similar means, is expressly prohibited without the prior written consent of Reuters. Reuters shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.