AOH :: ISNQ4938.HTM

How to Wage Cyber War




How to Wage Cyber War
How to Wage Cyber War



http://blog.wired.com/defense/2007/12/how-to-wage-cyb.html 

By Noah Shachtman 
Wired.com
December 12, 2007

Pentagon types are spending God-knows-how-much to wage battle online.  
Brave New War [1] author John Robb [2] offers 'em some tips on how to 
put their dough to the best use [3] .

Over the few years, the Defense Department has morphed the nuclear 
weaponeers of U.S. Strategic Command [4] into network warriors, and 
turned the 8th Air Force into a new "Cyberspace Command."  Not to 
mention plowing countless billions into the National Security Agency [5] 
and all kinds of digital combat cadres [6], scattered throughout the 
armed services.  And from the interviews I've done, at least, the roles 
and expectations for each of these agencies is, um, evolving, at best.

Robb's advice, to his former Air Force colleagues now putting Cyberspace 
Command together:
    
* Real-world experience and rapid (open source) innovation. Most, if not 
  all, of this experience and innovation in cyberwarfare is gained 
  through criminal activity. Innovation is a product of rapid cycles of 
  competition with software vendors and computer security companies.
    
* Massive self-replication. Think in term of small teams (the smarter, 
  the better) designing software that seizes control of tens of millions 
  of computer systems through various forms of infection.
    
* Deniability. Nearly all of the successful operations conducted in 
  offensive cyberwarfare will require deniability. Post-attack forensics 
  must not point back to a government since these wars/battles will be 
  fought in peacetime.

"Given these requirements, Robb believes, "this new Command will likely 
fail (and badly)."  It'll create public relations disasters -- and 
retreat into a largely defensive crouch.  And once it does, it'll be 
outmaneuvered by countries willing to get in bed with online mafias.  
We'll see.

[1] http://www.amazon.com/exec/obidos/ASIN/0471780790/c4iorg 
[2] http://globalguerrillas.typepad.com/ 
[3] http://globalguerrillas.typepad.com/globalguerrillas/2007/12/the-us-and-cybe.html 
[4] http://www.defenselink.mil/news/newsarticle.aspx?id=47605 
[5] http://blog.wired.com/defense/2007/09/nsa-targets-hac.html 
[6] http://blog.wired.com/defense/2007/10/also-nsa-target.html 


__________________________________________________________________      
Visit InfoSec News
http://www.infosecnews.org/ 

Site design & layout copyright © 1986-2014 CodeGods