Cyberwarfare in the United States

Cyberwarfare in the United States

Cyberwarfare in the United States is the United States Cyber Commands military strategy of proactive cyber defence and the use of cyberwarfare as a platform for attack.[1] The United States Department of Defense sees the use of computers and the Internet to conduct warfare in cyberspace as a threat to national security.[2] The Joint Forces Command issued a statement: "Cyberspace technology is emerging as an "instrument of power" in societies, and is becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. With low barriers to entry, coupled with the anonymous nature of activities in cyberspace, the list of potential adversaries is broad. Furthermore, the globe-spanning range of cyberspace and its disregard for national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies."[3]


The Five Pillars

The five pillars is the framework for the United States military strategy for cyberwarfare.[4] The first pillar is to recognize that the new domain for warfare is cyberspace similar to the other elements in the battlespace. The second pillar is proactive defenses as opposed to passive defense. Two examples of passive defense are computer hygiene and firewalls, which detect approximately 70 to 80 percent of cyber attacks. The balance of the attacks require active defense using sensors to provide a rapid response to detect and stop a cyber attack on a computer network. This would provide military tactics to hunt down and attack an enemy intruder. The third pillar is critical infrastructure protection (CIP) to ensure the protection of critical infrastructure. The fourth pillar is the use of collective defense, which would provide the ability of early detection and to incorporate them into the cyberwarfare defence structure. The fifth pillar is maintain and enhance the advantage of technological change. This would include improved computer literacy and increasing artificial intelligence capabilities.

Cyberattack an act of war

The new United States military strategy, makes explicit that a cyberattack is casus belli for a traditional act of war.[5] This is controversial; Howard Schmidt, the cybersecurity leader of the US, said in March 2010 that "there is no cyberwar... I think that is a terrible metaphor and I think that is a terrible concept. There are no winners in that environment."[6]

United States Cyber Command components

United States Cyber Command

The United States Cyber Command (USCYBERCOM) is a United States armed forces sub-unified command subordinate to United States Strategic Command. USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries."[7]

Army Cyber Command

The Army Cyber Command (ARCYBER) is an Army component command for the U.S. Cyber Command.[8] ARCYBER has the following components:

Marine Corps Forces Cyberspace Command

United States Marine Corps Forces Cyberspace Command is a functional formation of the United States Marine Corps to protect infrastructure from cyberwarfare.[12]

Navy Cyber Forces

The Navy Cyber Forces (CYBERFOR) is the type commander for the U.S. Navy's global cyber workforce. The headquarters is located at Joint Expeditionary Base Little Creek-Fort Story. CYBERFOR provides forces and equipment in cryptology/signals intelligence, cyber, electronic warfare, information operations, intelligence, networks, and space.

Twenty-Fourth Air Force

The Twenty-Fourth Air Force (24 AF) is a Numbered Air Force (NAF) with the United States Air Force (USAF). The USAF is consolidating its cyberspace combat forces into 24 AF.[13] The Twenty-Fourth Air Force, will be the Air Force component of United States Cyber Command (USCYBER). The 24AF has the following components:

United States Tenth Fleet

The United States Tenth Fleet is a functional formation of the United States Navy. It was first created as an anti submarine warfare coordinating organization during the Battle of the Atlantic in the Second World War. It has been reactivated as Fleet Cyber Command. The tenth fleet components are:

Cyberwarfare activities in the U.S.

Cyberwar defense team
  • In 2011 as part of The Anonymous attack on HBGary Federal information about private companies such as Endgame systems who design offensive software for the Department of Defense were revealed. It was shown that Endgame systems job applicants had previously "managed team of 15 persons, responsible for coordinating offensive computer network operations for the United States Department of Defense and other federal agencies."[14]
  • In August 2010, the U.S. for the first time is publicly warning about the Chinese military's use of civilian computer experts in clandestine cyber attacks aimed at American companies and government agencies. The Pentagon also pointed to an alleged China-based computer spying network dubbed GhostNet that was revealed in a research report last year.[15] The Pentagon stated:
"The People's Liberation Army is using "information warfare units" to develop viruses to attack enemy computer systems and networks, and those units include civilian computer professionals. Commander Bob Mehal, will monitor the PLA's buildup of its cyberwarfare capabilities and will continue to develop capabilities to counter any potential threat."[16]
  • On June 19, 2010, United States Senator Joe Lieberman (I-CT) introduced a bill called "Protecting Cyberspace as a National Asset Act of 2010",[17] which he co-wrote with Senator Susan Collins (R-ME) and Senator Thomas Carper (D-DE). If signed into law, this controversial bill, which the American media dubbed the "Kill switch bill", would grant the President emergency powers over parts of the Internet. However, all three co-authors of the bill issued a statement that instead, the bill "[narrowed] existing broad Presidential authority to take over telecommunications networks".[18]
With very little investment, and cloaked in a veil of anonymity, our adversaries will inevitably attempt to harm our national interests. Cyberspace will become a main front in both irregular and traditional conflicts. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. Through cyberspace, enemies will target industry, academia, government, as well as the military in the air, land, maritime, and space domains. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Indeed, adversaries have already taken advantage of computer networks and the power of information technology not only to plan and execute savage acts of terrorism, but also to influence directly the perceptions and will of the U.S. Government and the American population.
  • In December 2009 through January 2010, a cyber attack, dubbed Operation Aurora, was launched from China against Google and over 20 other companies.[19] Google said the attacks originated from China and that it would "review the feasibility" of its business operations in China following the incident. According to Google, at least 20 other companies in various sectors had been targeted by the attacks. McAfee spokespersons claim that "this is the highest profile attack of its kind that we have seen in recent memory."[20]
  • On April 7, 2009, The Pentagon announced they spent more than $100 million in the last six months responding to and repairing damage from cyber attacks and other computer network problems.[21]
  • On April 1, 2009, U.S. lawmakers pushed for the appointment of a White House cyber security "czar" to dramatically escalate U.S. defenses against cyber attacks, crafting proposals that would empower the government to set and enforce security standards for private industry for the first time.[22]
  • In 2008, a hacking incident occurred on a U.S. Military facility in the Middle East. United States Deputy Secretary of Defense William J. Lynn III had the Pentagon release a document, which reflected a "malicious code" on a USB flash drive spread undetected on both classified and unclassified Pentagon systems, establishing a digital beachhead, from which data could be transferred to servers under foreign control. "It was a network administrator's worst fear: a rogue program operating silently, poised to deliver operational plans into the hands of an unknown adversary. This ... was the most significant breach of U.S. military computers ever and it served as an important wake-up call", Lynn wrote in an article for Foreign Affairs.[24]
  • In 2007, the United States government suffered an "an espionage Pearl Harbor" in which an unknown foreign power...broke into all of the high tech agencies, all of the military agencies, and downloaded terabytes of information.[25]
  • Titan Rain was the U.S. government's designation given to a series of coordinated attacks on American computer systems since 2003. The attacks were labeled as Chinese in origin, although their precise nature (i.e., state-sponsored espionage, corporate espionage, or random hacker attacks) and their real identities (i.e., masked by proxy, zombie computer, spyware/virus infected) remain unknown.
  • Systems in the US military and private research institutions were penetrated from March 1998 for almost two years in an incident called Moonlight Maze. The United States Department of Defense traced the trail back to a mainframe computer in the former Soviet Union but the sponsor of the attacks is unknown and Russia denies any involvement.
  • In 1998, in order for US and NATO to bomb Serbian targets successfully in Kosovo, the USA needed to hack into the Serbian air defense system and trick the Serbian Air Traffic Controllers.[26] The US accomplished its goal so well that there was concern about continuing or escalating the attacks because the US didn't want to hack into any further Serbian targets because of fear of damaging civilian targets.[citation needed]
  • In 1991, it was reported by the US Air Force that a computer virus named AF/91 was created and was installed on a printer chip and made its way to Iraq via Amman, Jordan.[27] Its job was to make the Iraqi anti-aircraft guns malfunction; however, according to the story, the central command center was bombed and the virus was destroyed.[28] The virus, however, was found to be a fake.[29]
  • In 1982, a computer control system stolen from a Canadian company by Soviet spies caused a Soviet gas pipeline to explode. The code for the control system had been modified by the CIA to include a logic bomb which changed the pump speeds to cause the explosion.[30]

Cyberwarfare limitation treaty

American General Keith B. Alexander endorsed talks with Russia over a proposal to limit military attacks in cyberspace, representing a significant shift in U.S. policy.[31]

See also


  1. ^ American Forces Press Service: Lynn Explains U.S. Cybersecurity Strategy
  2. ^ DOD - Cyberspace
  3. ^ a b "The Joint Operating Environment", Report released, Feb. 18, 2010, pp. 34-36
  4. ^ Red Orbit: Official: NATO Should Build A 'Cyber Shield'
  5. ^ New York Times: Pentagon to Consider Cyberattacks Acts of War
  6. ^ "White House Cyber Czar: ‘There Is No Cyberwar’" Wired magazine, March 4, 2010
  7. ^ U.S. Department of Defense, Cyber Command Fact Sheet, May 21, 2010
  8. ^ US Department of Defense (May 24, 2010). "DoD Release No. 420-10 Establishment of Army Forces Cyber Command". Retrieved May 24, 2010. 
  9. ^ 20091203 IO Newsletter v10 no 03
  10. ^ Patrick Jackson (2010-03-15). "Meet USCybercom: Why the US is fielding a cyber army". BBC News. Retrieved 2010-07-10. 
  11. ^ "News Release: Army Forces Cyber Command Headquarters Standup Plan Announced". Retrieved 2010-07-10. 
  12. ^ "Fort Mead News: USMC Cyber Command". 2010-01-28. Retrieved 2010-07-10. 
  13. ^ Frequently Asked Questions
  14. ^ Haroon Meer (March 11, 2011). "Lessons from Anonymous on cyberwar". Al Jazeera English. 
  15. ^ ANNUAL REPORT TO CONGRESS Military and Security Developments Involving the People’s Republic of China 2010
  16. ^ AP: Pentagon takes aim at China cyber threat
  17. ^ pdf
  18. ^ Senators Say Cybersecurity Bill Has No 'Kill Switch',, June 24, 2010. Retrieved on June 25, 2010.
  19. ^ "A new approach to China". Google Inc.. 2010-01-12. Retrieved 17 January 2010. 
  20. ^ "Google Attack Is Tip Of Iceberg", McAfee Security Insights, Jan. 13, 2010
  21. ^ CBS News: Pentagon Bill To Fix Cyber Attacks: $100M
  22. ^ Senate Legislation Would Federalize Cybersecurity
  23. ^ CBS News: White House Eyes Cyber Security Plan
  24. ^ The Washington Post: Pentagon computers attacked with flash drive
  25. ^ "Cyber War: Sabotaging the System". CBS News. November 6, 2009. 
  26. ^ Hancock, Bill. "Security Views." Computers & Security 18 (1999): 553-64. ScienceDirect. Web. 11 October 2009. <>.
  27. ^ Smith, George. "Iraqi Cyberwar: an Ageless Joke." SecurityFocus. 10 Mar. 2003. Web. 11 Oct. 2009. <>.
  28. ^ <>.
  29. ^ <>.
  30. ^ "Cyberwar: War in the fifth domain". The Economist. 1 July 2010. Retrieved 4 July 2010. 
  31. ^ WSJ: U.S. Backs Talks on Cyber Warfare

Wikimedia Foundation. 2010.

Look at other dictionaries:

  • Chinese intelligence operations in the United States — The People s Republic of China (PRC) has and is currently using a widespread effort to acquire U.S. military technology and classified information. To fulfill its long term military development goals, the PRC uses a variety of methods to obtain U …   Wikipedia

  • Contents of the United States diplomatic cables leak (People's Republic of China) — Content from the United States diplomatic cables leak has depicted People s Republic of China and related subjects extensively. The leak, which began on 28 November 2010, occurred when the website of WikiLeaks an international new media non… …   Wikipedia

  • United States Cyber Command — U.S. Cyber Command emblem Active 2009–current Country …   Wikipedia

  • Cyberwarfare in the People's Republic of China — The nature of Cyberwarfare in the People s Republic of China is difficult to assess. Government officials in India and the United States have traced various attacks on corporate and infrastructure computer systems in their countries to computers… …   Wikipedia

  • Cyberwarfare — Cyberwar redirects here. For the video game, see Cyberwar (video game). For the 2004 movie, see Cyber Wars (film). For the 1999 MMOG, see Cyber Wars. Computer security Secure operating systems Security architecture Security by design …   Wikipedia

  • Cyberwarfare in Russia — includes allegations of denial of service attacks, hacker attacks, dissemination of disinformation over the internet, participation of state sponsored teams in political blogs, internet surveillance using SORM technology, and persecution of cyber …   Wikipedia

  • Cyberattacks during the 2008 South Ossetia war — The website of the Parliament of Georgia ( had its content replaced with a montage of photos depicting Mikheil Saakashvili and Adolf Hitler. The Russian language caption reads, He too will come to an end as well. [1] During the …   Wikipedia

  • Internet censorship in the People's Republic of China — Part of a series on Censorship By media …   Wikipedia

  • Stuxnet — is a computer worm discovered in June 2010. It targets Siemens industrial software and equipment running Microsoft Windows.[1] While it is not the first time that hackers have targeted industrial systems,[2] it is the first discovered malware… …   Wikipedia

  • Duqu — Symantec Diagram on Duqu Duqu is a computer worm discovered on 1 September 2011, thought to be related to the Stuxnet worm. The Laboratory of Cryptography and System Security (CrySyS)[1] of the Budapest University of Technology and Economics in… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”