[Infowarrior] - Cyberwarfare Wish List

Richard Forno rforno at infowarrior.org
Tue Jun 3 00:15:54 UTC 2008


Cyberwarfare Wish List
U.S. Air Force Calls for Help in Beefing Up Specific Capabilities
By william matthews
Published: 26 May 2008
Print  Print  |  Print  Email

http://www.defensenews.com/story.php?i=3553238

Know how to hack a computer system and quietly steal information? Can  
you also deceive, deny, disrupt, degrade or destroy the system? Then  
the U.S. Air Force wants to hear from you.

In mid-May, the Air Force published a request for "white papers" that  
will show the service how it can achieve "Dominant Cyber Offensive  
Engagement."

It's the latest step the Air Force is taking to build up its  
cyberwarfare capabilities - offensive as well as defensive. Last fall,  
the service began assembling its own Cyber Command.

The Air Force Research Laboratory plans to spend $3 million this year  
and another $8 million next year in developing new cyberwarfare  
techniques.

The lab is calling for papers that will help it develop a variety of  
cyberwarfare skills, including:

■ Gaining access to remotely located open or closed computer systems.

■ Taking "full control of a network for the purposes of information  
gathering and effects-based operations."

■ Techniques that enable user and root-level access to fixed and  
mobile computers.

■ Methods for gaining access "to any and all operating systems, patch  
levels, applications and hardware of interest."

■ Maintaining an active presence within the adversaries' information  
infrastructure "completely undetected."

■ The capability to "stealthily exfiltrate information" from remote  
computer systems.

■ And if stealth fails, the ability to "deceive, deny, disrupt,  
degrade, destroy (D5)" a targeted computer system.

On the defensive side, the Air Force wants to develop "Proactive  
Botnet Defense Technology."

That appears to be technology that would protect U.S. computer systems  
against the type of directed denial-of-service attacks that crippled  
Estonia's cyber infrastructure in April 2007.

In that instance, Estonia blamed Russia for the attack, but Russian  
government officials denied any involvement.

The Air Force Research Lab also wants to explore whether different  
computer architectures and new protocols can improve security.

Air Force Laboratory officials did not respond to repeated requests  
for details about their new cyberwarfare effort.

Growing Concern

But the push to increase cyberwarfare proficiency comes amid growing  
concern for U.S. cyber vulnerability.

In 2005, the Air Force added "and cyberspace" to its vow to fly and  
fight in air and space. And last fall, the service began assembling a  
Cyber Command that will be responsible for "cyberspace operations."

"In the last decade, people have realized that cyberwarfare is a  
critical domain of national security," said William Martel, a Tufts  
University professor and former chairman of space technology and  
policy studies at the Naval War College.

"The significance of cyber can't be overstated. It may be as  
strategically significant as nuclear weapons and ballistic missiles  
over time," Martel said.

"Cyber technology, cyber security and cyberwarfare opens up an  
entirely new arena of warfare in which state and non-state actors are  
on a level playing field," he said.

It costs little to launch a cyberattack. Terrorists, organized  
criminals and Third World countries can easily afford it.

Cybersecurity experts say attacks could seriously affect daily life in  
the United States by disrupting utilities such as electricity and  
water, halting air traffic, interrupting commerce, even interfering  
with emergency response capabilities.

"The possibilities are limitless here," Martel said. "Over time,  
cyberwarfare might make traditional warfare look a little passé."

Recent cyber events have put the United States on the defensive,  
Martel said. The Chinese military is believed to be responsible for  
recent cyber break-ins to U.S. Department of Defense computer and  
communications systems.

Al-Qaida has become uncomfortably adept at using the Internet to  
spread propaganda, recruit followers and train terrorists, he said.  
Can cyberwarfare be far behind?

Much of what the Air Force Research Lab says it wants to do looks  
"very doable," said Richard Forno, a cyber security expert who counts  
the U.S. military and major corporations among his clients.

But while developing new cyber capabilities, the Air Force also ought  
to consider new organizational approaches, he said. "I don't believe  
big bureaucratic organizations with tons of contract vehicles" is the  
best way to approach the problem. Relying on a cadre of carefully  
monitored hackers might be more effective, he said.

Concern about cyberwarfare is spreading well beyond the United States.

On May 14, two days after the Air Force Lab called for ideas, NATO  
began setting up a cyber defense training center in Tallinn, Estonia.

The Cooperative Cyber Defence Center of Excellence is scheduled to  
open in 2009 and will be operated by computer specialists from  
Germany, Italy, Spain, Latvia, Lithuania, Slovakia and Estonia.

In its cyber push, the Air Force Lab is moving quickly. The first  
batch of white papers is due June 5 for projects to be funded in 2008  
and March 1, 2009, for projects to be funded next year.

The papers are to be three to 10 pages long and submitted by e-mail,  
CD or on paper. If on paper, three copies are required.

Work contracts are expected to be worth $200,000 to $1.5 million  
apiece and last for two years.



More information about the Infowarrior mailing list