Solar Energy News  
CYBER WARS
Operating in the shadows: US Cyber Command
By Paul HANDLEY
Washington (AFP) May 25, 2021

If the Pentagon's Cyber Command launches an online attack and nobody knows about it, does it deter anyone?

Many Americans are asking what the country's army of cyber warriors are doing after repeated attacks on US computer systems by Chinese, Russian and other hackers.

The answer may have been in the 780th Military Intelligence Brigade's subtle retweet on May 14 of a security firm's scoop that ransomware extortionist Darkside had been digitally shut down.

No one knows who took control of Darkside's servers, a week after the shady Russia-based hackers forced the closure of a major US oil pipeline, causing gasoline shortages across the Eastern US.

But suspicions are that the 10-year-old CyberCom may have stepped in, to punish Darkside and to signal the small army of ransomware providers operating out of Eastern Europe that they too are vulnerable.

Even as it remains quiet, CyberCom's role is hotly debated: is it to undertake strategic attacks during war, or to constantly joust online with adversaries' military and intelligence hackers, or to go after non-military hackers like Darkside, normally the purview of law enforcement?

- Malware strike on Iran -

The first sign that the US Defense Department was playing offense in the online world was in 2010 when it became known that a destructive, US and Israel-created computer worm Stuxnet had infected and damaged Iran's nuclear enrichment facilities.

Cyberwarfare then was seen as a way of attacking or deterring enemies by wrecking their infrastructure with devastating malware strikes.

Since then, however, the US government and private business have been hit time and time again, by Chinese stealing government databases and corporate secrets, Russia hacking US elections, North Koreans stealing bitcoins, and ransomware operators extorting hundreds of millions of dollars from companies, hospitals, and local authorities.

But without any news about their exploits, it didn't seem like the Pentagon was either punishing or deterring attackers.

They are, General Paul Nakasone, CyberCom commander, told a recent Congressional hearing.

"When we see elements that are that are operating out of US, we try to impose the largest cost possible," he said.

"Imposing costs" meant exposing the hackers, or counterattacking, he said.

But he refused to give any examples of their work.

- 'Persistent engagement' -

Jon Lindsay, a University of Toronto assistant professor who researches online military conflict, said the cyberwar strategy had shifted since Stuxnet.

At that time, "cyber was looked at as a digital weapon of mass destruction," something that could punish, or threaten to punish adversaries to deter their attacks.

"It was a very high level, presidentially controlled, covert action," to be used strategically and sparingly, Lindsay said.

Since then, it has become something else: an ongoing low-level fight that doesn't require top-level approval, called "persistent engagement," that does not focus on deterrence.

"It's very, very difficult, if not impossible, to deter adversarial activities in cyberspace. So what CyberCom needs to be able to do is be constantly engaged, constantly operating forward in the adversaries' networks," said Lindsay.

- Intelligence contest -

That makes CyberCom more like ongoing intelligence operations, collecting information, blocking adversaries, and slightly escalating when the other side is seen to have gone too far.

Revealing what the Pentagon does could have deterrence value, according to Elizabeth Bodine-Baron, a senior information scientist at RAND Corp.

Some people, she said, believe that "if we never give concrete examples of, we went in, we did that, then no one's ever going to believe us."

But there is also a challenge of definitively attributing the source of an attack, especially when a state actor is suspected of being behind it.

But, she added, if there is certainty about an attacker's identity, going public with attribution "could potentially reveal something about our own capabilities."

In addition, boasting about CyberCom's exploits risks escalation -- forcing adversaries to retaliate to satisfy their own public.

"So I think you see people kind of erring on the side of caution," not announcing what they do, said Bodine-Baron.

Lindsay said the US and its main adversaries now treat cyber conflict as a way of avoiding escalation.

"There's something about cyber that makes people unwilling to escalate," he told AFP.

"What we're looking at is not military warfare, it's an intelligence contest."

"Intelligence contests go on in peacetime. They shape the possibilities for war, but they try to make war less likely," he said.

"Actually, there is there is no good example of cyber escalating something to a kinetic conflict," he said.

pmh/jh

LINDSAY CORP


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


CYBER WARS
Australian academic to face spying trial in China
Sydney (AFP) May 22, 2021
Chinese-born Australian academic and author Yang Jun will go on trial in China on espionage charges next week, after spending more than two years in detention, Canberra's foreign minister has confirmed. Yang is one of two high-profile Australians detained in China on spying allegations amid escalating tensions between Canberra and Beijing. The trial for Yang, who also goes by his pen name Yang Hengjun, will begin on Thursday, Australia's Foreign Minister Marise Payne said in a statement late Fri ... read more

Comment using your Disqus, Facebook, Google or Twitter login.



Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
Fashion's green future of seaweed coats and mushroom shoes

New technology turns plastic trash into jet fuel

Can lab-grown algae help tackle hunger?

US waives clean fuel rules to alleviate shortage after pipeline shutdown

CYBER WARS
Enabling human control of autonomous partners

Helping robots collaborate to get the job done

Artificial intelligence can boost power, efficiency of even the best microscopes

Robotic solution for disinfecting food production plants wins agribusiness prize

CYBER WARS
US approves its biggest offshore wind farm yet

Vertical turbines could be the future for wind farms

Researchers working to further develop monopile production for offshore wind farms

Blowing in the wind: Fishermen threaten South Korea carbon plans

CYBER WARS
Longtime car fan Biden lives his electric dreams

Ford unveils its first all-electric pickup truck

Ford to unveil all-electric F-150 pickup

New US electric car chargers are a green leap of faith

CYBER WARS
Highview Power Developing 2 GWh of Liquid Air Long Duration Energy Storage Projects in Spain

Fuel cells reduce ship emissions

BASF in battery parts production deal with China's Shanshan

Renewable energy sources: On the way towards large-scale thermal storage systems

CYBER WARS
Putin, Xi hail ties at launch of work on nuclear plants in China

Framatome to complete upgrades at Krsko Nuclear Power Plant in Slovenia

France's Areva to pay 600 mn euros more for Finnish reactor

Seeking enhanced materials for nuclear reactors

CYBER WARS
Rusal splits high carbon assets ahead of EU carbon tax

Iran rolling blackouts blamed on heat, drought, crypto-mining

New 'optical rectennas' harvest energy from heat with record efficiency

EU's green push targets shipping emissions

CYBER WARS
Ethiopia's Abiy kicks off massive tree-planting drive

Brazil environment minister probed for timber trafficking

Brazil deforestation 94% illegal: report

Prince Charles launches tree-planting drive for Queen's jubilee









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.