[Infowarrior] - U.S. Plans Attack and Defense in Cyberspace Warfare

Richard Forno rforno at infowarrior.org
Tue Apr 28 10:44:14 UTC 2009


April 28, 2009
U.S. Plans Attack and Defense in Cyberspace Warfare
By DAVID E. SANGER, JOHN MARKOFF and THOM SHANKER


http://www.nytimes.com/2009/04/28/us/28cyber.html?_r=1&hp=&pagewanted=print

This article was reported by David E. Sanger, John Markoff and Thom  
Shanker and written by Mr. Sanger.

When American forces in Iraq wanted to lure members of Al Qaeda into a  
trap, they hacked into one of the group’s computers and altered  
information that drove them into American gun sights.

When President George W. Bush ordered new ways to slow Iran’s progress  
toward a nuclear bomb last year, he approved a plan for an  
experimental covert program — its results still unclear — to bore into  
their computers and undermine the project.

And the Pentagon has commissioned military contractors to develop a  
highly classified replica of the Internet of the future. The goal is  
to simulate what it would take for adversaries to shut down the  
country’s power stations, telecommunications and aviation systems, or  
freeze the financial markets — in an effort to build better defenses  
against such attacks, as well as a new generation of online weapons.

Just as the invention of the atomic bomb changed warfare and  
deterrence 64 years ago, a new international race has begun to develop  
cyberweapons and systems to protect against them.

Thousands of daily attacks on federal and private computer systems in  
the United States — many from China and Russia, some malicious and  
some testing chinks in the patchwork of American firewalls — have  
prompted the Obama administration to review American strategy.

President Obama is expected to propose a far larger defensive effort  
in coming days, including an expansion of the $17 billion, five-year  
program that Congress approved last year, the appointment of a White  
House official to coordinate the effort, and an end to a running  
bureaucratic battle over who is responsible for defending against  
cyberattacks.

But Mr. Obama is expected to say little or nothing about the nation’s  
offensive capabilities, on which the military and the nation’s  
intelligence agencies have been spending billions. In interviews over  
the past several months, a range of military and intelligence  
officials, as well as outside experts, have described a huge increase  
in the sophistication of American cyberwarfare capabilities.

Because so many aspects of the American effort to develop cyberweapons  
and define their proper use remain classified, many of those officials  
declined to speak on the record. The White House declined several  
requests for interviews or to say whether Mr. Obama as a matter of  
policy supports or opposes the use of American cyberweapons.

The most exotic innovations under consideration would enable a  
Pentagon programmer to surreptitiously enter a computer server in  
Russia or China, for example, and destroy a “botnet” — a potentially  
destructive program that commandeers infected machines into a vast  
network that can be clandestinely controlled — before it could be  
unleashed in the United States.

Or American intelligence agencies could activate malicious code that  
is secretly embedded on computer chips when they are manufactured,  
enabling the United States to take command of an enemy’s computers by  
remote control over the Internet. That, of course, is exactly the kind  
of attack officials fear could be launched on American targets, often  
through Chinese-made chips or computer servers.

So far, however, there are no broad authorizations for American forces  
to engage in cyberwar. The invasion of the Qaeda computer in Iraq  
several years ago and the covert activity in Iran were each  
individually authorized by Mr. Bush. When he issued a set of  
classified presidential orders in January 2008 to organize and improve  
America’s online defenses, the administration could not agree on how  
to write the authorization.

A principal architect of that order said the issue had been passed on  
to the next president, in part because of the complexities of cyberwar  
operations that, by necessity, would most likely be conducted on both  
domestic and foreign Internet sites. After the controversy surrounding  
domestic spying, Mr. Bush’s aides concluded, the Bush White House did  
not have the credibility or the political capital to deal with the  
subject.

Electronic Vulnerabilities

Cyberwar would not be as lethal as atomic war, of course, nor as  
visibly dramatic. But when Mike McConnell, the former director of  
national intelligence, briefed Mr. Bush on the threat in May 2007, he  
argued that if a single large American bank were successfully attacked  
“it would have an order-of-magnitude greater impact on the global  
economy” than the Sept. 11, 2001, attacks. Mr. McConnell, who left  
office three months ago, warned last year that “the ability to  
threaten the U.S. money supply is the equivalent of today’s nuclear  
weapon.”

The scenarios developed last year for the incoming president by Mr.  
McConnell and his coordinator for cybersecurity, Melissa Hathaway,  
went further. They described vulnerabilities including an attack on  
Wall Street and one intended to bring down the nation’s electric power  
grid. Most were extrapolations of attacks already tried.

Today, Ms. Hathaway is the primary author of White House cyberstrategy  
and has been traveling the country talking in vague terms about  
recent, increasingly bold attacks on the computer networks that keep  
the country running. Government officials will not discuss the details  
of a recent attack on the air transportation network, other than to  
say the attack never directly affected air traffic control systems.

Still, the specter of an attack that could blind air traffic  
controllers and, perhaps, the military’s aerospace defense networks  
haunts military and intelligence officials. (The saving grace of the  
air traffic control system, officials say, is that it is so old that  
it is not directly connected to the Internet.)

Studies, with code names like Dark Angel, have focused on whether  
cellphone towers, emergency-service communications and hospital  
systems could be brought down, to sow chaos.

But the theoretical has, at times, become real.

“We have seen Chinese network operations inside certain of our  
electricity grids,” said Joel F. Brenner, who oversees  
counterintelligence operations for Dennis Blair, Mr. McConnell’s  
successor as national intelligence director, speaking at the  
University of Texas at Austin this month. “Do I worry about those  
grids, and about air traffic control systems, water supply systems,  
and so on? You bet I do.”

But the broader question — one the administration so far declines to  
discuss — is whether the best defense against cyberattack is the  
development of a robust capability to wage cyberwar.

As Mr. Obama’s team quickly discovered, the Pentagon and the  
intelligence agencies both concluded in Mr. Bush’s last years in  
office that it would not be enough to simply build higher firewalls  
and better virus detectors or to restrict access to the federal  
government’s own computers.

“The fortress model simply will not work for cyber,” said one senior  
military officer who has been deeply engaged in the debate for several  
years. “Someone will always get in.”

That thinking has led to a debate over whether lessons learned in the  
nuclear age — from the days of “mutually assured destruction” — apply  
to cyberwar.

But in cyberwar, it is hard to know where to strike back, or even who  
the attacker might be. Others have argued for borrowing a page from  
Mr. Bush’s pre-emption doctrine by going into foreign computers to  
destroy malicious software before it is unleashed into the world’s  
digital bloodstream. But that could amount to an act of war, and many  
argue it is a losing game, because the United States is more dependent  
on a constantly running Internet system than many of its potential  
adversaries, and therefore could suffer more damage in a counterattack.

In a report scheduled to be released Wednesday, the National Research  
Council will argue that although an offensive cybercapability is an  
important asset for the United States, the nation is lacking a clear  
strategy, and secrecy surrounding preparations has hindered national  
debate, according to several people familiar with the report.

The advent of Internet attacks — especially those suspected of being  
directed by nations, not hackers — has given rise to a new term inside  
the Pentagon and the National Security Agency: “hybrid warfare.”

It describes a conflict in which attacks through the Internet can be  
launched as a warning shot — or to pave the way for a traditional  
attack.

Early hints of this new kind of warfare emerged in the confrontation  
between Russia and Estonia in April 2007. Clandestine groups — it was  
never determined if they had links to the Russian government —  
commandeered computers around the globe and directed a fire hose of  
data at Estonia’s banking system and its government Web sites.

The computer screens of Estonians trying to do business with the  
government online were frozen, if they got anything at all. It was  
annoying, but by the standards of cyberwar, it was child’s play.

In August 2008, when Russia invaded Georgia, the cyberattacks grew  
more widespread. Georgians were denied online access to news, cash and  
air tickets. The Georgian government had to move its Internet activity  
to servers in Ukraine when its own servers locked up, but the attacks  
did no permanent damage.

Every few months, it seems, some agency, research group or military  
contractor runs a war game to assess the United States’ vulnerability.  
Senior intelligence officials were shocked to discover how easy it was  
to permanently disable a large power generator. That prompted further  
studies to determine if attackers could take down a series of  
generators, bringing whole parts of the country to a halt.

Another war game that the Department of Homeland Security sponsored in  
March 2008, called Cyber Storm II, envisioned a far larger,  
coordinated attack against the United States, Britain, Canada,  
Australia and New Zealand. It studied a disruption of chemical plants,  
rail lines, oil and gas pipelines and private computer networks. That  
study and others like it concluded that when attacks go global, the  
potential economic repercussions increase exponentially.

To prove the point, Mr. McConnell, then the director of national  
intelligence, spent much of last summer urging senior government  
officials to examine the Treasury Department’s scramble to contain the  
effects of the collapse of Bear Stearns. Markets froze, he said,  
because “what backs up that money is confidence — an accounting system  
that is reconcilable.” He began studies of what would happen if the  
system that clears market trades froze.

“We were halfway through the study,” one senior intelligence official  
said last month, “and the markets froze of their own accord. And we  
looked at each other and said, ‘Our market collapse has just given  
every cyberwarrior out there a playbook.’ ”

Just before Mr. Obama was elected, the Center for Strategic and  
International Studies, a policy research group in Washington, warned  
in a report that “America’s failure to protect cyberspace is one of  
the most urgent national security problems facing the new  
administration.”

What alarmed the panel was not the capabilities of individual hackers  
but of nations — China and Russia among them — that experts believe  
are putting huge resources into the development of cyberweapons. A  
research company called Team Cymru recently examined “scans” that came  
across the Internet seeking ways to get inside industrial control  
systems, and discovered more than 90 percent of them came from  
computers in China.

Scanning alone does no damage, but it could be the prelude to an  
attack that scrambles databases or seeks to control computers. But  
Team Cymru ran into a brick wall as soon as it tried to trace who,  
exactly, was probing these industrial systems. It could not determine  
whether military organizations, intelligence agencies, terrorist  
groups, criminals or inventive teenagers were behind the efforts.

The good news, some government officials argue, is that the Chinese  
are deterred from doing real damage: Because they hold more than a  
trillion dollars in United States government debt, they have little  
interest in freezing up a system they depend on for their own  
investments.

Then again, some of the scans seemed to originate from 14 other  
countries, including Taiwan, Russia and, of course, the United States.

Bikini Atoll for an Online Age

Because “cyberwar” contains the word “war,” the Pentagon has argued  
that it should be the locus of American defensive and offensive  
strategy — and it is creating the kind of infrastructure that was  
built around nuclear weapons in the 1940s and ’50s.

Defense Secretary Robert M. Gates is considering proposals to create a  
Cyber Command — initially as a new headquarters within the Strategic  
Command, which controls the American nuclear arsenal and assets in  
space. Right now, the responsibility for computer network security is  
part of Strategic Command, and military officials there estimate that  
over the past six months, the government has spent $100 million  
responding to probes and attacks on military systems. Air Force  
officials confirm that a large network of computers at Maxwell Air  
Force Base in Alabama was temporarily taken off-line within the past  
eight months when it was put at risk of widespread infection from  
computer viruses.

But Mr. Gates has concluded that the military’s cyberwarfare effort  
requires a sharper focus — and thus a specific command. It would build  
the defenses for military computers and communications systems and —  
the part the Pentagon is reluctant to discuss — develop and deploy  
cyberweapons.

In fact, that effort is already under way — it is part of what the  
National Cyber Range is all about. The range is a replica of the  
Internet of the future, and it is being built to be attacked.  
Competing teams of contractors — including BAE Systems, the Applied  
Physics Laboratory at Johns Hopkins University and Sparta Inc. — are  
vying to build the Pentagon a system it can use to simulate attacks.  
The National Security Agency already has a smaller version of a  
similar system, in Millersville, Md.

In short, the Cyber Range is to the digital age what the Bikini Atoll  
— the islands the Army vaporized in the 1950s to measure the power of  
the hydrogen bomb — was to the nuclear age. But once the tests at  
Bikini Atoll demonstrated to the world the awesome destructive power  
of the bomb, it became evident to the United States and the Soviet  
Union — and other nuclear powers — that the risks of a nuclear  
exchange were simply too high. In the case of cyberattacks, where the  
results can vary from the annoying to the devastating, there are no  
such rules.

The Deterrence Conundrum

During the cold war, if a strategic missile had been fired at the  
United States, screens deep in a mountain in Colorado would have  
lighted up and American commanders would have some time to decide  
whether to launch a counterattack. Today, when Pentagon computers are  
subjected to a barrage, the origin is often a mystery. Absent  
certainty about the source, it is almost impossible to mount a  
counterattack.

In the rare case where the preparations for an attack are detected in  
a foreign computer system, there is continuing debate about whether to  
embrace the concept of pre-emption, with all of its Bush-era  
connotations. The questions range from whether an online attack should  
be mounted on that system to, in an extreme case, blowing those  
computers up.

Some officials argue that if the United States engaged in such pre- 
emption — and demonstrated that it was watching the development of  
hostile cyberweapons — it could begin to deter some attacks. Others  
believe it will only justify pre-emptive attacks on the United States.  
“Russia and China have lots of nationalistic hackers,” one senior  
military officer said. “They seem very, very willing to take action on  
their own.”

Senior Pentagon and military officials also express deep concern that  
the laws and understanding of armed conflict have not kept current  
with the challenges of offensive cyberwarfare.

Over the decades, a number of limits on action have been accepted — if  
not always practiced. One is the prohibition against assassinating  
government leaders. Another is avoiding attacks aimed at civilians.  
Yet in the cyberworld, where the most vulnerable targets are civilian,  
there are no such rules or understandings. If a military base is  
attacked, would it be a proportional, legitimate response to bring  
down the attacker’s power grid if that would also shut down its  
hospital systems, its air traffic control system or its banking system?

“We don’t have that for cyber yet,” one senior Defense Department  
official said, “and that’s a little bit dangerous.” 


More information about the Infowarrior mailing list