[Infowarrior] - AF Wants 'Freedom to Attack' Online
Richard Forno
rforno at infowarrior.org
Sat Oct 25 02:32:29 UTC 2008
Air Force Wants 'Freedom to Attack' Online
By Noah Shachtman EmailOctober 24, 2008 | 12:43:00 PMCategories: Info
War
http://blog.wired.com/defense/2008/10/in-new-doctrine.html
Gone are the days when the Air Force pledged to "dominate" cyberspace.
Now, the flyboys just want "freedom of action" online. Oh, and the
ability to deceive foes, and cyberstrike enemies at will.
That's according to a draft document, "Cyberspace Operations -- Air
Force Doctrine Document 2-11," obtained by Inside Defense. “Freedom of
action... can be seen as freedom from attack and freedom to attack,”
the paper states. But, it adds, “The size and complexity of the domain
and the extensive collection of networks... can make freedom of action
difficult and perhaps elusive.”
For years, the Air Force has been trying to ramp up its network war
plans. But the service has had trouble deciding exactly what it wants
those cyber battle plans to be. In 2005, the Air Force changed its
mission statement to read, "As Airmen, it is our calling to dominate
Air, Space, and Cyberspace." Then the service announced a far-reaching
effort to set up a "Cyber Command," responsible for that dominance.
But by August of this year, that project was put on hold, after it
became painfully obvious that no one was really sure what the new
command would really do (or even how to define the term "cyber.") Now,
those network warriors will fall under the purview of Air Force Space
Command.
According to Inside Defense , the Air Force's new, 70-page document
uses an awfully broad definition of what could be considered cyber,
"touching on everything from bombs against enemy network nodes to
radar-jamming aircraft, computer firewalls and fake e–mails to
terrorist operatives." Even "rapid software development" and
"psychological operations" are counted as components of information
warfare.
Such operations could include “spoofing” enemy command and
control systems to “deceive the adversary about friendly intentions.”
Airmen also could jam crucial enemy equipment under the guise of
seemingly unrelated, natural events. “Using our knowledge of space and
terrestrial weather, we can mask our spoofing with ostensible natural
conditions such as lightning strikes,” the document reads...
If airmen know the terrorist receives instructions through the
Internet, they could “destroy, disrupt and/or exploit” the Internet
link. If the terrorist’s e-mail address is known, officials could
“send him an e-mail message to influence his behavior.” Finally, if
airmen know the format in which the instructions are presented, they
could “send him false taskings that look authentic,” the document reads.
Sounds like a plan.
More information about the Infowarrior
mailing list