[ISN] US Air Force unveils cyberwar swords & shields
InfoSec News
isn at c4i.org
Tue Jul 6 05:33:00 EDT 2004
http://www.theinquirer.net/?article=17008
By Doug Mohney
05 July 2004
OVER THE PAST month, U.S. Air Force briefers have been unveiling
capabilities and strategies to wargeek pubs like Jane's and Aviation
Week for "Information Operations", a term that encompasses computer
network attack and defense together with more "traditional" electronic
warfare activities and psychological warfare (psyops).
IO is a relatively new invention recently applied to Iraq last year
during the effort to oust Saddam Hussein. One success touted by a
senior AF general was a combination of psyops leaflets dropped by
airplanes together with e-mail pumped into the Iraqi military's
computer network to dissuade Iraqi troops from fighting.
IO operations was likely one of the main reasons Tom Clancy fans
didn't see the use of the much-anticipated EMP bomb, a weapon designed
to generate to disrupt (scramble) or destroy (fry) electronics with a
burst of microwaves. Future IO missions are expected to e integrated
to the existing range of "kinetic solutions" (i.e. dropping a 2,000 lb
bomb) in a seamless set of solutions.
Another capability the AF would like to de-classify is the ability to
turn anti-aircraft missiles stupid, making them miss aircraft without
bombs. "I look forward to the day when we can convince a
surface-to-air missile that it is a Maytag in a rinse cycle," said
General Hal Hornburg in an interview with Aviation Week. The
capability is available in the computer network attack toolbox to
penetrate and manipulate another military's communications network.
Declassifying the capability would make it quicker to implement into
future operations.
Classified exercises have demonstrated the Air Force's ability to
enter into an enemy's air defense computer network, see and monitor
what the enemy radars could detect in real time, and the ability to
take over the network as a systems administrator and start
manipulating radars. Currently, this capability has been demonstrated
on the EC-130 Compass Call aircraft, a slow 4 engine cargo plane
loaded with electronic gear, but the Air Force has jawed up the
ability of this mission to be taken up by the much more sexy and
expensive F/A-22 fighter aircraft.
Air Force computer network defence also falls under the IO mission.
During Iraqi operations, Air Force defenders took such steps as
blocking out chunks of Internet addresses known to be used by overseas
hackers for attacks. Commanders are concerned hackers will pass
through a U.S. Internet Service Provider to launch attacks, using the
ISP as a legal shield. Under American law, the military is precluded
from operating against U.S. civilian interests, so civilian law
enforcement must be called in to investigate and take action. Needless
to say, this takes time and bureaucracy. In the future, the Air Force
would like to see the creation of a hot-pursuit capability that would
allow them to go after attackers regardless of where they are coming
from.
More information about the ISN
mailing list