Advertisement
YOU ARE HERE: LAT HomeCollectionsWar

Hacking could become weapon in U.S. arsenal

September 08, 2008|Julian E. Barnes | Times Staff Writer

WASHINGTON — Igniting a provocative new debate, senior military officials are pushing the Pentagon to go on the offensive in cyberspace by developing the ability to attack other nations' computer systems, rather than concentrating on defending America's electronic security.

Under the most sweeping proposals, military experts would acquire the know-how to commandeer the unmanned aerial drones of adversaries, disable enemy warplanes in mid-flight and cut off electricity at precise moments to strategic locations, such as military installations, while sparing humanitarian facilities, such as hospitals.

An expansion of offensive capabilities in cyberspace would represent an important change for the military. For years, U.S. officials have been reluctant to militarize what is widely seen as a medium for commerce and communication -- much like space.

But a new National Military Strategy for Cyberspace Operations, declassified earlier this year, fueled the Pentagon debate and gave the military a green light to push for expanded capabilities.

The monthslong debate took on added urgency after the electronic attacks that coincided with the Russian military's early August push into Georgia and reflects a newfound uncertainty over the state of global cyber-warfare capabilities.

Military officials have not concluded whether the electronic network attacks in Georgia were coordinated by Moscow or were the work of freelance hackers or paramilitary groups. Still, the use of cyberspace by Russia and other countries is drawing intense scrutiny by the Pentagon.

"As we go forward in time, cyber is going to be a very important part of our war-fighting tactics, techniques and procedures," said Michael W. Wynne, a former Air Force secretary.

Under Wynne, the Air Force established a provisional Cyber Command in 2007 and made operating in the cyber domain part of its mission statement, on par with air operations. Wynne clashed with superiors over the Air Force approach to cyberspace and other issues and was fired in June after breakdowns in U.S. nuclear weapons security procedures. New Air Force leaders now are reassessing plans for a permanent Cyber Command, which under Wynne's leadership would have included some offensive capabilities.

Most other U.S. efforts focus on defending military and government networks and mining international systems for intelligence. Both the Army and Navy have long-standing operations but primarily focus on intelligence gathering. The Army, in particular, has used a variety of electronic networks to gather intelligence on insurgents in Iraq and Afghanistan.

The most advanced expertise on operating in cyberspace is held by the National Security Agency, the Defense Department intelligence arm that monitors foreign phone calls, e-mails and other communication. A senior defense official said the NSA "is where the mother lode of expertise is. Those are the folks that have been looking at the capability for the longest period of time."

Overseeing all of these various military efforts in cyberspace is the Defense Department's Strategic Command, which is primarily responsible for the nation's nuclear arsenal.

Several senior Pentagon officials would discuss the Defense Department's cyberspace work only if their names were withheld because of sensitive intelligence issues. But officials involved in the cyberspace debate are sparring over not only what to do but who within the military should do it.

Because of the difficulty of training cyber-warriors and the need to closely monitor their work long term, many top Pentagon officials believe that the most advanced cyber-experts should remain at the NSA.

A senior Pentagon official said that "exploiting" computer networks to gather intelligence is currently the most important use of cyber-power. "Clearly, the exploitation activities have been preeminent," the official said.

But citing Russia's use of cyberspace, some current and former officials believe that the U.S. military services, if allowed, could move beyond intelligence gathering and develop a broad array of offensive capabilities that would fit well with conventional combat.

"Let's not mistake intelligence collection with military operations," said Lani Kass, a senior Air Force official and former director of the service's Cyberspace Task Force. "The mission of the NSA is to collect signals intelligence, and it is very good at it. But the NSA is not a war-fighting organization."

If the military is allowed to develop more advanced cyber-warfare methods, the United States would be able to routinely launch an airstrike at a target and simultaneously use an electronic attack to disable defenses or spread disinformation, said Wynne, the former Air Force secretary.

"It isn't just about protecting your networks," Wynne said. "It is about having a soldier with an invasive tool he can fire at an antenna, and put some information into it, and from there do some damage."

Advertisement
Los Angeles Times Articles
|
|
|