[Infowarrior] - U.S. Weighs Risks of Civilian Harm in Cyberwarfare

Richard Forno rforno at infowarrior.org
Sat Aug 1 23:49:34 UTC 2009


August 2, 2009
Cyberwar
U.S. Weighs Risks of Civilian Harm in Cyberwarfare
By JOHN MARKOFF and THOM SHANKER

http://www.nytimes.com/2009/08/02/us/politics/02cyber.html?_r=2&partner=rss&emc=rss&pagewanted=print
It would have been the most far-reaching case of computer sabotage in  
history. In 2003, the Pentagon and American intelligence agencies made  
plans for a cyberattack to freeze billions of dollars in the bank  
accounts of Saddam Hussein and cripple his government’s financial  
system before the United States invaded Iraq. He would have no money  
for war supplies. No money to pay troops.

“We knew we could pull it off — we had the tools,” said one senior  
official who worked at the Pentagon when the highly classified plan  
was developed.

But the attack never got the green light. Bush administration  
officials worried that the effects would not be limited to Iraq but  
would instead create worldwide financial havoc, spreading across the  
Middle East to Europe and perhaps to the United States.

Fears of such collateral damage are at the heart of the debate as the  
Obama administration and its Pentagon leadership struggle to develop  
rules and tactics for carrying out attacks in cyberspace.

While the Bush administration seriously studied computer-network  
attacks, the Obama administration is the first to elevate  
cybersecurity — both defending American computer networks and  
attacking those of adversaries — to the level of a White House  
director, whose appointment is expected in coming weeks.

But senior White House officials remain so concerned about the risks  
of unintended harm to civilians and damage to civilian infrastructure  
in an attack on computer networks that they decline any official  
comment on the topic. And senior Defense Department officials and  
military officers directly involved in planning for the Pentagon’s new  
“cybercommand” acknowledge that the risk of collateral damage is one  
of their chief concerns.

“We are deeply concerned about the second- and third-order effects of  
certain types of computer network operations, as well as about laws of  
war that require attacks be proportional to the threat,” said one  
senior officer.

This officer, who like others spoke on the condition of anonymity  
because of the classified nature of the work, also acknowledged that  
these concerns had restrained the military from carrying out a number  
of proposed missions. “In some ways, we are self-deterred today  
because we really haven’t answered that yet in the world of cyber,”  
the officer said.

In interviews over recent weeks, a number of current and retired White  
House officials, Pentagon civilians and military officers disclosed  
details of classified missions — some only considered and some put  
into action — that illustrate why this issue is so difficult.

Although the digital attack on Iraq’s financial system was not carried  
out, the American military and its partners in the intelligence  
agencies did receive approval to cripple Iraq’s military and  
government communications systems in the early hours of the war in  
2003. And that attack did produce collateral damage.

Besides blowing up cellphone towers and communications grids, the  
offensive included electronic jamming and digital attacks against  
Iraq’s telephone networks. American officials also contacted  
international communications companies that provided satellite phone  
and cellphone coverage to Iraq to alert them to possible jamming and  
to ask their assistance in turning off certain channels.

Officials now acknowledge that the communications offensive  
temporarily disrupted telephone service in countries around Iraq that  
shared its cellphone and satellite telephone systems. That limited  
damage was deemed acceptable by the Bush administration.

Another such event took place in the late 1990s, according to a former  
military researcher. The American military attacked a Serbian  
telecommunications network and accidentally affected the Intelsat  
satellite communications system, whose service was hampered for  
several days.

These missions, which remain highly classified, are being scrutinized  
today as the Obama administration and the Pentagon move into new  
arenas of cyberoperations. Few details have been reported previously;  
mention of the proposal for a digital offensive against Iraq’s  
financial and banking systems appeared with little notice on  
Newsmax.com, a news Web site, in 2003.

The government concerns evoke those at the dawn of the nuclear era,  
when questions of military effectiveness, legality and morality were  
raised about radiation spreading to civilians far beyond any zone of  
combat.

“If you don’t know the consequences of a counterstrike against  
innocent third parties, it makes it very difficult to authorize one,”  
said James Lewis, a cyberwarfare specialist at the Center for  
Strategic and International Studies in Washington.

But some military strategists argue that these uncertainties have led  
to excess caution on the part of Pentagon planners.

“Policy makers are tremendously sensitive to collateral damage by  
virtual weapons, but not nearly sensitive enough to damage by kinetic”  
— conventional — “weapons,” said John Arquilla, an expert in military  
strategy at the Naval Postgraduate School in Monterey, Calif. “The  
cyberwarriors are held back by extremely restrictive rules of  
engagement.”

Despite analogies that have been drawn between biological weapons and  
cyberweapons, Mr. Arquilla argues that “cyberweapons are disruptive  
and not destructive.”

That view is challenged by some legal and technical experts.

“It’s virtually certain that there will be unintended consequences,”  
said Herbert Lin, a senior scientist at the National Research Council  
and author of a recent report on offensive cyberwarfare. “If you don’t  
know what a computer you attack is doing, you could do something bad.”

Mark Seiden, a Silicon Valley computer security specialist who was a  
co-author of the National Research Council report, said, “The chances  
are very high that you will inevitably hit civilian targets — the  
worst-case scenario is taking out a hospital which is sharing a  
network with some other agency.”

And while such attacks are unlikely to leave smoking craters,  
electronic attacks on communications networks and data centers could  
have broader, life-threatening consequences where power grids and  
critical infrastructure like water treatment plants are increasingly  
controlled by computer networks.

Over the centuries, rules governing combat have been drawn together in  
customary practice as well as official legal documents, like the  
Geneva Conventions and the United Nations Charter. These laws govern  
when it is legitimate to go to war, and set rules for how any conflict  
may be waged.

Two traditional military limits now are being applied to cyberwar:  
proportionality, which is a rule that, in layman’s terms, argues that  
if you slap me, I cannot blow up your house; and collateral damage,  
which requires militaries to limit civilian deaths and injuries.

“Cyberwar is problematic from the point of view of the laws of war,”  
said Jack L. Goldsmith, a professor at Harvard Law School. “The U.N.  
Charter basically says that a nation cannot use force against the  
territorial integrity or political independence of any other nation.  
But what kinds of cyberattacks count as force is a hard question,  
because force is not clearly defined.”


More information about the Infowarrior mailing list