Space Travel News  
CYBER WARS
Operating in the shadows: US Cyber Command
By Paul HANDLEY
Washington (AFP) May 25, 2021

If the Pentagon's Cyber Command launches an online attack and nobody knows about it, does it deter anyone?

Many Americans are asking what the country's army of cyber warriors are doing after repeated attacks on US computer systems by Chinese, Russian and other hackers.

The answer may have been in the 780th Military Intelligence Brigade's subtle retweet on May 14 of a security firm's scoop that ransomware extortionist Darkside had been digitally shut down.

No one knows who took control of Darkside's servers, a week after the shady Russia-based hackers forced the closure of a major US oil pipeline, causing gasoline shortages across the Eastern US.

But suspicions are that the 10-year-old CyberCom may have stepped in, to punish Darkside and to signal the small army of ransomware providers operating out of Eastern Europe that they too are vulnerable.

Even as it remains quiet, CyberCom's role is hotly debated: is it to undertake strategic attacks during war, or to constantly joust online with adversaries' military and intelligence hackers, or to go after non-military hackers like Darkside, normally the purview of law enforcement?

- Malware strike on Iran -

The first sign that the US Defense Department was playing offense in the online world was in 2010 when it became known that a destructive, US and Israel-created computer worm Stuxnet had infected and damaged Iran's nuclear enrichment facilities.

Cyberwarfare then was seen as a way of attacking or deterring enemies by wrecking their infrastructure with devastating malware strikes.

Since then, however, the US government and private business have been hit time and time again, by Chinese stealing government databases and corporate secrets, Russia hacking US elections, North Koreans stealing bitcoins, and ransomware operators extorting hundreds of millions of dollars from companies, hospitals, and local authorities.

But without any news about their exploits, it didn't seem like the Pentagon was either punishing or deterring attackers.

They are, General Paul Nakasone, CyberCom commander, told a recent Congressional hearing.

"When we see elements that are that are operating out of US, we try to impose the largest cost possible," he said.

"Imposing costs" meant exposing the hackers, or counterattacking, he said.

But he refused to give any examples of their work.

- 'Persistent engagement' -

Jon Lindsay, a University of Toronto assistant professor who researches online military conflict, said the cyberwar strategy had shifted since Stuxnet.

At that time, "cyber was looked at as a digital weapon of mass destruction," something that could punish, or threaten to punish adversaries to deter their attacks.

"It was a very high level, presidentially controlled, covert action," to be used strategically and sparingly, Lindsay said.

Since then, it has become something else: an ongoing low-level fight that doesn't require top-level approval, called "persistent engagement," that does not focus on deterrence.

"It's very, very difficult, if not impossible, to deter adversarial activities in cyberspace. So what CyberCom needs to be able to do is be constantly engaged, constantly operating forward in the adversaries' networks," said Lindsay.

- Intelligence contest -

That makes CyberCom more like ongoing intelligence operations, collecting information, blocking adversaries, and slightly escalating when the other side is seen to have gone too far.

Revealing what the Pentagon does could have deterrence value, according to Elizabeth Bodine-Baron, a senior information scientist at RAND Corp.

Some people, she said, believe that "if we never give concrete examples of, we went in, we did that, then no one's ever going to believe us."

But there is also a challenge of definitively attributing the source of an attack, especially when a state actor is suspected of being behind it.

But, she added, if there is certainty about an attacker's identity, going public with attribution "could potentially reveal something about our own capabilities."

In addition, boasting about CyberCom's exploits risks escalation -- forcing adversaries to retaliate to satisfy their own public.

"So I think you see people kind of erring on the side of caution," not announcing what they do, said Bodine-Baron.

Lindsay said the US and its main adversaries now treat cyber conflict as a way of avoiding escalation.

"There's something about cyber that makes people unwilling to escalate," he told AFP.

"What we're looking at is not military warfare, it's an intelligence contest."

"Intelligence contests go on in peacetime. They shape the possibilities for war, but they try to make war less likely," he said.

"Actually, there is there is no good example of cyber escalating something to a kinetic conflict," he said.

pmh/jh

LINDSAY CORP


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


CYBER WARS
Australian academic to face spying trial in China
Sydney (AFP) May 22, 2021
Chinese-born Australian academic and author Yang Jun will go on trial in China on espionage charges next week, after spending more than two years in detention, Canberra's foreign minister has confirmed. Yang is one of two high-profile Australians detained in China on spying allegations amid escalating tensions between Canberra and Beijing. The trial for Yang, who also goes by his pen name Yang Hengjun, will begin on Thursday, Australia's Foreign Minister Marise Payne said in a statement late Fri ... read more

Comment using your Disqus, Facebook, Google or Twitter login.



Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
CYBER WARS
Plans underway for Ingenuity's 6th flight

Perseverance, Hope and a fire god: a history of Mars rovers

Seeing NASA's Ingenuity Mars Helicopter Fly in 3D

Perseverance's Robotic Arm Starts Conducting Science

CYBER WARS
European Space Agency plans network of moon satellites

NASA eyes moon's dark side for astronomy, new telescopes

Getting ready to rocket

VIPER Hits the SLOPEs

CYBER WARS
Juice arrives at ESA's technical heart

New Horizons reaches a rare space milestone

New research reveals secret to Jupiter's curious aurora activity

NASA's Europa Clipper builds hardware, moves toward assembly

CYBER WARS
Origins of life researchers develop a new ecological biosignature

Shrinking planets could explain mystery of universe's missing worlds

Alien radioactive element prompts creation rethink

Coldplay beam new song into space in chat with French astronaut

CYBER WARS
Missile detection satellite launches from Florida

Proposed base for Elon Musk's SpaceX project threatens lands and livelihoods in Biak, Papua

Bitcoin tumble slows with help from Elon Musk

NASA joins two major Artemis II Core Stage Structures

CYBER WARS
Space station core module in orbit to prep for next stage of construction

China's core space station module Tianhe completes in-orbit tests

Tianzhou 2, carrier rocket transported to launchpad for liftoff

'Nihao Mars': China's Zhurong rover touches down on Red Planet

CYBER WARS
NASA's OSIRIS-REx Spacecraft Heads for Earth with Asteroid Sample

US space probe Osiris-Rex heads home with asteroid dust

Lessons learnt from simulated strike

New View of Asteroid Ryugu's Surface









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.