PDA

View Full Version : A new way to start a conventional war.



Swoop
2nd June 2011, 15:09
It appears that computer attacks are being classified as hostile and as such could warrant a response in the form of a conventional war.

With the assault on the Lockheed/Martin system recently, this appears as a very plain warning to the main players in the cyberwar arena.



WSJ's Siobhan Gorman has the exclusive story of the Pentagon classifying cyber attacks by foreign nations as acts of war. (http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html)

WASHINGTON—The Pentagon has concluded that computer sabotage coming from another country can constitute an act of war, a finding that for the first time opens the door for the U.S. to respond using traditional military force.

The Pentagon's first formal cyber strategy, unclassified portions of which are expected to become public next month, represents an early attempt to grapple with a changing world in which a hacker could pose as significant a threat to U.S. nuclear reactors, subways or pipelines as a hostile country's military.

In part, the Pentagon intends its plan as a warning to potential adversaries of the consequences of attacking the U.S. in this way. "If you shut down our power grid, maybe we will put a missile down one of your smokestacks," said a military official.

Recent attacks on the Pentagon's own systems—as well as the sabotaging of Iran's nuclear program via the Stuxnet computer worm—have given new urgency to U.S. efforts to develop a more formalized approach to cyber attacks. A key moment occurred in 2008, when at least one U.S. military computer system was penetrated. This weekend Lockheed Martin, a major military contractor, acknowledged that it had been the victim of an infiltration, while playing down its impact.

The report will also spark a debate over a range of sensitive issues the Pentagon left unaddressed, including whether the U.S. can ever be certain about an attack's origin, and how to define when computer sabotage is serious enough to constitute an act of war. These questions have already been a topic of dispute within the military.

One idea gaining momentum at the Pentagon is the notion of "equivalence." If a cyber attack produces the death, damage, destruction or high-level disruption that a traditional military attack would cause, then it would be a candidate for a "use of force" consideration, which could merit retaliation.

The Pentagon's document runs about 30 pages in its classified version and 12 pages in the unclassified one. It concludes that the Laws of Armed Conflict—derived from various treaties and customs that, over the years, have come to guide the conduct of war and proportionality of response—apply in cyberspace as in traditional warfare, according to three defense officials who have read the document. The document goes on to describe the Defense Department's dependence on information technology and why it must forge partnerships with other nations and private industry to protect infrastructure.

The strategy will also state the importance of synchronizing U.S. cyber-war doctrine with that of its allies, and will set out principles for new security policies. The North Atlantic Treaty Organization took an initial step last year when it decided that, in the event of a cyber attack on an ally, it would convene a group to "consult together" on the attacks, but they wouldn't be required to help each other respond. The group hasn't yet met to confer on a cyber incident.

Pentagon officials believe the most-sophisticated computer attacks require the resources of a government. For instance, the weapons used in a major technological assault, such as taking down a power grid, would likely have been developed with state support, Pentagon officials say.

The move to formalize the Pentagon's thinking was borne of the military's realization the U.S. has been slow to build up defenses against these kinds of attacks, even as civilian and military infrastructure has grown more dependent on the Internet. The military established a new command last year, headed by the director of the National Security Agency, to consolidate military network security and attack efforts.

The Pentagon itself was rattled by the 2008 attack, a breach significant enough that the Chairman of the Joint Chiefs briefed then-President George W. Bush. At the time, Pentagon officials said they believed the attack originated in Russia, although didn't say whether they believed the attacks were connected to the government. Russia has denied involvement.

The Rules of Armed Conflict that guide traditional wars are derived from a series of international treaties, such as the Geneva Conventions, as well as practices that the U.S. and other nations consider customary international law. But cyber warfare isn't covered by existing treaties. So military officials say they want to seek a consensus among allies about how to proceed.

"Act of war" is a political phrase, not a legal term, said Charles Dunlap, a retired Air Force Major General and professor at Duke University law school. Gen. Dunlap argues cyber attacks that have a violent effect are the legal equivalent of armed attacks, or what the military calls a "use of force."

"A cyber attack is governed by basically the same rules as any other kind of attack if the effects of it are essentially the same," Gen. Dunlap said Monday. The U.S. would need to show that the cyber weapon used had an effect that was the equivalent of a conventional attack.

James Lewis, a computer-security specialist at the Center for Strategic and International Studies who has advised the Obama administration, said Pentagon officials are currently figuring out what kind of cyber attack would constitute a use of force. Many military planners believe the trigger for retaliation should be the amount of damage—actual or attempted—caused by the attack.

For instance, if computer sabotage shut down as much commerce as would a naval blockade, it could be considered an act of war that justifies retaliation, Mr. Lewis said. Gauges would include "death, damage, destruction or a high level of disruption" he said.

Culpability, military planners argue in internal Pentagon debates, depends on the degree to which the attack, or the weapons themselves, can be linked to a foreign government. That's a tricky prospect at the best of times.

The brief 2008 war between Russia and Georgia included a cyber attack that disrupted the websites of Georgian government agencies and financial institutions. The damage wasn't permanent but did disrupt communication early in the war.

A subsequent NATO study said it was too hard to apply the laws of armed conflict to that cyber attack because both the perpetrator and impact were unclear. At the time, Georgia blamed its neighbor, Russia, which denied any involvement.

Much also remains unknown about one of the best-known cyber weapons, the Stuxnet computer virus that sabotaged some of Iran's nuclear centrifuges. While some experts suspect it was an Israeli attack, because of coding characteristics, possibly with American assistance, that hasn't been proven. Iran was the location of only 60% of the infections, according to a study by the computer security firm Symantec. Other locations included Indonesia, India, Pakistan and the U.S.

Officials from Israel and the U.S. have declined to comment on the allegations.

Defense officials refuse to discuss potential cyber adversaries, although military and intelligence officials say they have identified previous attacks originating in Russia and China. A 2009 government-sponsored report from the U.S.-China Economic and Security Review Commission said that China's People's Liberation Army has its own computer warriors, the equivalent of the American National Security Agency.

That's why military planners believe the best way to deter major attacks is to hold countries that build cyber weapons responsible for their use. A parallel, outside experts say, is the George W. Bush administration's policy of holding foreign governments accountable for harboring terrorist organizations, a policy that led to the U.S. military campaign to oust the Taliban from power in Afghanistan.

White trash
2nd June 2011, 15:20
Dangerous ground right there. If some smart arse Chinese kid is sitting at home trying to hack US military computers ofr a laugh, does that warrant a military response against China?

Scuba_Steve
2nd June 2011, 15:27
Dangerous ground right there. If some smart arse Chinese kid is sitting at home trying to hack US military computers ofr a laugh, does that warrant a military response against China?

only if China has resources the US wants :shutup:

Latte
2nd June 2011, 15:42
This sounds like it would make a good movie plot... oh wait.


Typical US government, writing rules for everyone else to follow whenever they can't win.

Grasshopperus
2nd June 2011, 16:42
Next thing you know it's part of some new ANZUS treaty and our government 'has-to' filter/scan/inspect/block all internet activity, oh wait they already do.

Swoop
2nd June 2011, 17:23
Dangerous ground right there. If some smart arse Chinese kid is sitting at home trying to hack US military computers ofr a laugh, does that warrant a military response against China?
It's not the kids they are concerned with, more the fully trained experts employed by the <STRIKE>governments</STRIKE> rulers of china and north korea...

Hans
2nd June 2011, 17:24
This sounds like it would make a good movie plot... oh wait.


Typical US government, writing rules for everyone else to follow whenever they can't win.

You have read the quoted article? If yes, then wtf are you on about?

nadroj
2nd June 2011, 17:29
Dangerous ground right there. If some smart arse Chinese kid is sitting at home trying to hack US military computers ofr a laugh, does that warrant a military response against China?

He may get a "cruise" knocking at his door....

scissorhands
2nd June 2011, 17:30
So if I put up a picture like this

http://t3.gstatic.com/images?q=tbn:ANd9GcR5Gn5e-TJFUV4t6xBKY6NGkeliut-d4KbIGpcQrcTHM7rC-wAO&t=1

and we get nuked, is it my fault? Or the chimp?

Latte
2nd June 2011, 17:55
You have read the quoted article? If yes, then wtf are you on about?

I'd only read the OP, which turns out is the same as the quoted article, so yes I have. Reading it, it sounds like after they US has had "Cyber Crime" committed against it, they will choose to respond with physical war if it fits criteria they choose.

This quote here "For instance, if computer sabotage shut down as much commerce as would a naval blockade, it could be considered an act of war that justifies retaliation" - to me this reads that if someone was to say, take out visa for a few days (ala Anonymous/Wikileaks) the US will respond with an act of war.

So that's what I'm on about... ok?

avgas
2nd June 2011, 18:17
nah we all know they won't attack you if you have nothing to steal.
they are like most thugs.

pete376403
2nd June 2011, 21:44
Ironic that the (probably) most succesful example of a cyber attack was Stuxnet, in all probablility developed by Israel and it's main ally, the US.

jaffaonajappa
2nd June 2011, 21:56
Ironic that the (probably) most succesful example of a cyber attack was Stuxnet, in all probablility developed by Israel and it's main ally, the US.

^ concur.

------

Errr.
Conventional war? LOL!
Allowing US to access some Emergency powers to deal with cyber attack, more likely.

Seems like some John-Key-Type-Beauracracy at work in the ole USA. Have it.

avgas
2nd June 2011, 22:19
Ironic that the (probably) most succesful example of a cyber attack was Stuxnet, in all probablility developed by Israel and it's main ally, the US.
Actually you might be surprised how vulnerable most industrial setup are.
They didn't need a virus - I have killed a telemetry network with far more simple techniques (like ping!).

Its all old school stuff - because industrial stuff is about 20 years+ behind IT.

Siemens got pretty fucked with it though.

Best cyber attack actually came out of good ol NZ. We have quite the bot architects in NZ. Stux wasn't really an attack as it was just to fuck with people. e.g. conveyors and cranes didn't go spastic as most were interlocked to hell.

Fuck I hate my job.......thanks for reminding me I am still in my office. :facepalm:
Fucking control systems........

mashman
5th June 2011, 16:51
Retribution? (http://news.yahoo.com/s/ap/20110604/ap_on_re_as/as_pakistan)... stupid people!

James Deuce
5th June 2011, 17:04
only if China has resources the US wants :shutup:

They do. All the money the US used to have.

Swoop
10th June 2011, 09:44
9 June, 2011: The U.S. government is trying to develop a way to respond to a serious Cyber War attack, one in which the attacker does not reveal who they are. A document has been prepared that lists what kind of attack would qualify as an "act of war", and thus deserving of a violent response. That shouldn't be too hard, especially if substantial physical damage was done by the attack. This was the case in Iran last year, after the Stuxnet worm got finished with their uranium enrichment centrifuges. Similar damage could be done with electrical power systems, water and sanitation utilities and some kinds of industrial facilities (steel making, chemical, refineries, and so on.)

The big problem is not proving some malignant software was inserted in a facility and did damage. The big problem is proving who did it. While you can trace an attack, you can also, as the attacker, leave a false trail to another location (in another country). What the Americans are apparently trying to do is establish criteria for "network forensics" (investigating an attack and tracing where who came from where for what purpose) that will be widely accepted. At present, there are no such generally accepted criteria for proving who carried out a Cyber War attack.

The United States is apparently seeking to establish a method of identifying those who make these attacks and obtain international recognition of that guilt, so that America can then deliver some kind of retribution. This may involve nuclear weapons, but that would be a last resort. There are many other punishments that can be used, from diplomatic, economic, and up through non-nuclear military actions. Meanwhile, the United States is hustling, at least as far as press releases go, to improve American defences against Cyber War class attacks.
But there is growing resistance to calls for more government regulations and mandates meant to protect America from this Internet based aggression. Civilian organizations fear that the government intervention will hurt network security. Worse, it's difficult to get a rational discussion going on the subject, not with all the fear mongering by the mass media and government officials, plus defence contractors looking for more money.

For example, FBI (which is responsible for detecting and investigating Internet based crime) has been issuing increasingly scary warning that America is becoming ever more vulnerable to "cybergeddon" (a massive attack via the Internet that would cripple the economy, government and military.) The FBI admits that it has a hard time getting more money for their Internet security efforts. And a major reason is that the threat is largely invisible. A picture of a nuclear bomb going off, or of enemy tanks and warships ready to attack makes a much more effective impression on the politicians who dole out the money.

The FBI also wants to get the Department of Defence Internet defence operations more involved in national level defence against network based attacks. But the four services have a hard time agreeing to coordinate their efforts to defend military use of the Internet when under massive hacker attack. Thus the FBI plea for help sort of falls on distracted ears. But a growing number of politicians, and headline hungry journalists, are seeking to change that. The problem is, no one is exactly sure of how to do that.
While the politicians are eager to "do something," there is little consensus on exactly what the something should be, and to what degree the government should be involved. For example, Internet technology changes far more quickly than new laws can be passed to adapt and keep up. Companies fear that government interference will drive their operating costs up, while providing little, or no, protection from Cyber War attacks.

A big problem is that there hasn't been a proper, all-out Cyber War yet. There have been lots of skirmishes, but nothing approaching what an all out battle, via the Internet, would be. What would the first Cyber War be like? Let's be blunt, no one really knows. But based on the cyber weapons that are known to exist, and the ones that are theoretically possible, one can come up with a rough idea.

First, there are three kinds of Cyber War possible. Right now, we have limited stealth operations (LSO), as Chinese, Russian, and others, use Cyber War techniques to support espionage efforts. China is the biggest practitioner, or at least they have been caught most often. But getting caught carrying out Cyber War operations does not mean you have any human prisoners, just a pile of computer forensics. The Chinese simply deny everything and carry on.

Next comes Cyber War only (CWO). This is open use of a full range of Cyber War weapons. No one has admitted doing this yet, and it's potentially less dangerous than firing missiles and unleashing tank divisions. It is believed that Russia indulged in this in 2007, when Estonia infuriated the Russians by moving a World War II statue memorializing the Soviet "liberation" of Estonia (which didn't want to be liberated by the Soviet Union.) Russia denied responsibility for the massive Cyber War assaults on Estonia, which nearly shut down the nation's Internet infrastructure. Estonia accused Russia of being responsible, and tried to invoke the NATO mutual-defence pact. NATO Cyber War experts went to Estonia, and shortly thereafter the attacks stopped. Apparently Russia got the message that this sort of thing could escalate into something more conventional, and deadly. This sort of thing is being cited by the United States as a reason for coming up with "this is war" criteria.

Then we have Cyber War in support of a conventional war. Technically, we have had this sort of thing for decades. It has been called "electronic warfare" and has been around since World War II. But the development of the Internet into a major part of the planet's commercial infrastructure, takes "electronic warfare" to a whole other level. Cyber War goes after strategic targets, not just the electronic weapons and communications of the combat forces.

A successful Cyber War depends on two things; means and vulnerability. The "means" are the people, tools and cyber weapons available to the attacker. The vulnerability is the extent to which the enemy economy and military use the Internet and networks in general. We don't know who has what Cyber War capabilities exactly, although China and the U.S. have openly organized Cyber War units, and both nations have lots of skilled Internet experts.

Vulnerability is another matter. The United States is the most exposed to Cyber War attack because, as a nation, we use the Internet more than any other country. That's the bad news. The good news is that if an attacker ever tried to launch a Cyber War by assaulting the U.S., it could backfire. This risk has to be kept in mind when considering what a Cyber War might do. Recall military history. The Pearl Harbour attack in 1941 actually backfired on the Japanese, by enraging Americans and unleashing a bloodthirsty response that left Japan in ruins. The lesson of the original Pearl Harbour is, if you're going to hit someone this way, better make it count. If your opponent is bigger than you, and gets back up, you could be in some serious trouble.

The big problem with Cyber War is that there has not been a lot of experience with it. Without that, no one is really sure what will happen when someone attempts to use it at maximum strength. But unlike nuclear weapons, there is far less inhibition about going all-out with Cyber War weapons. That is the biggest danger. Cyber War is a weapon of growing might, and little restraint by those who wield it. Things are going to get a lot worse.

sinfull
10th June 2011, 10:11
, is it my fault? Or the chimp?

Which one ?

scissorhands
10th June 2011, 10:17
Its difficult to grasp that some nerdy aspie 16 year old kid on acid from Coromandel or wherever may be an ultimate attack agent.

Toaster
10th June 2011, 10:25
Nerd hackers at it again.... death to America!!!!!!!
240457

Gremlin
11th June 2011, 01:51
If some smart arse Chinese kid is sitting at home trying to hack US military computers ofr a laugh, does that warrant a military response against China?
If the security of the targetted network is decent enough then it's not quite as easy for one person to individually "hack" a military system... That is why they employ bots. It is however, highly unusual for a large group to act with cohesion, hence the suspicion there is government involvement.

James Deuce
11th June 2011, 07:11
I would argue that all attempts at hacking commercial and military sites emanating from China are Government sponsored at the very least.

Gremlin
11th June 2011, 16:15
I would argue that all attempts at hacking commercial and military sites emanating from China are Government sponsored at the very least.
It's widely believed that is the case... proving it is a whole 'nuther ball game...

Swoop
11th June 2011, 19:43
It is however, highly unusual for a large group to act with cohesion, hence the suspicion there is government involvement.
No suspicion required.
You have kept up with Mirim* (http://www.infowar-monitor.net/2011/05/n-koreas-highly-trained-hacker-brigades-rival-cia/) "university"?






*(or whatever they are calling themselves now)