US Must Project Cyber Warfare Capabilities to Deter Attacks

The United States must demonstrate its cyber warfare capabilities to help deter sophisticated attacks from Russia and other adversaries while building strategies on a battlefield still misunderstood by commanders and senior officials, a panel of defense experts told lawmakers recently.

"Cyber operations are a legitimate means of projecting national power, especially when proportionately supplemented by kinetic force, and we should advertise them accordingly," retired US Navy Admiral James Stavridis, the former leader of European Command, told the Senate Armed Services Committee in prepared remarks.

Russia, North Korea, China and other nations launch sophisticated attacks against the United States, including attempts to destroy infrastructure and undermine credibility of elections in America and France, Stavridis said. And the United States is often sheepish to strike back in shows of force, he added.

"Unwillingness to operate offensively in cyber-space is driven less by a fear of retaliation and more by a fear of compromising our intelligence community's sensitive tradecraft," he said.

Retired Air Force General Michael Hayden, former director of the CIA, said there is still a lack of consensus in the United States and the international community about what kinds of attacks warrant a response, and outdated thinking still suggests cyber assaults require an in-kind digital response, when other measures, such as conventional military strikes or sanctions, might be more appropriate. "One way to recognise practice is to practice," Hayden said.

In response to Russian election interference for example, the United States could have disrupted bank accounts linked to Russian oligarchs and revealed the extent of President Vladimir Putin's finances and property, Stavridis said.
Recent protests have rocked Russia following allegations of embezzlement by Prime Minister Dmitry Medvedev, and overt jabs over the wealth of Russian leaders would undermine the government there, he said.

Crippling intelligence-gathering networks would also restrict Putin's ability to surveil his own people, Hayden said, at a crucial time when he seeks to squash dissent.

James Clapper, former director of national intelligence, stressed throughout the hearing about shortfalls within the government to anticipate the response of adversaries once cyber operations are launched. "We can't count on equal or symmetrical retaliation," he said.

Senator John McCain, the committee's chairman, opened his remarks for the hearing with a quip signaling his frustration with a lack of vision and cohesion in cyber operations in the military and intelligence communities.
"The committee meets today to receive testimony on cyber policy, strategy and organisation, of which there is very little," McCain said.

His remarks are an echo of a hearing held in early May, when McCain said: "Our nation remains woefully unprepared to address these threats."

The panel offered various reasons why the United States appears unprepared to strike and vulnerable to attack in the cyber domain, chief among them is a lack of coherent guidance and command that is spread throughout the military branches and intelligence agencies, which results in redundancies and overlap.

Clapper and other officials have urged the separation of the National Security Agency and Cyber Command, the so-called "dual hat" organization led by Navy Adm. Michael Rogers, that has become too big for one commander, Clapper said.
Those organisations have different missions, Cyber Command focuses on offensive and defensive strikes while NSA's main efforts are in spying and intelligence-gathering, Stavridis said. Elevating the cyber mission to full combatant command would crystalise doctrine and send a message to adversaries on the seriousness of the United States to execute missions, he said.

The experts and members of the committee voiced the need for President Donald Trump to provide guidance in cyber operations after he missed a self-imposed deadline to deliver a strategy within 90 days of his inauguration. Shortly after the hearing concluded, Trump signed an executive order "aimed at strengthening the federal government's cyber security and protecting the nation's critical infrastructure from cyber-attacks," Reuters reported.
McCain reiterated concerns recently voiced by service chiefs that a disparate focus and investment in cyber warriors in the military leaves talent untapped and later poached by the private sector. "I don't see a clear career path for cyber warriors," he said.

Stavridis said none of the 126 airmen who recently completed their first tour with the Pentagon's cyber mission force were retained for a second tour. The Defense Department launched the initiative last year to consolidate forces in order to defend its networks, support commanders and protect US infrastructure. It staffs 5,000 troops across 133 teams as of October, according to a Pentagon news release. All 126 of those airmen were reassigned to Air Force missions "with no cyber nexus whatsoever," Stavridis said in written testimony.

Recent attacks have converged across the public and private sectors, targeting US power companies and corporations such as Sony, for instance, which became a victim of North Korean hacking.

The blurring of lines could lead to a Coast Guard-like cyber operations entity in the future, Clapper and the other experts suggested, which would blend military and law enforcement capabilities with an arm that occasionally responds to attacks affecting private citizens and businesses.
"We're kind of on the beach at Kitty Hawk," Stavridis said. "We have some work ahead."

Military.com

You Might Also Read:

Intelligence In The Age of Cyber Warfare:

Germany May Go Offensive After Russian Cyber Attacks:

National Security Chief Talks About The UK’s Cyber Dangers:

The Limits Of Cyber Warfare:


 

« Attitudes To Facebook Are Changing
A Major Development in Deep-Learning »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resilient Information Systems Security (RISS)

Resilient Information Systems Security (RISS)

RISS is a research group is in the Department of Computing at Imperial College London.

Engineering Ingegneria Informatica

Engineering Ingegneria Informatica

Ingegneria Informatica is a leading Italian provider of Information Technology consulting, services and solutions including cyber security.

Exostar

Exostar

Exostar is the cloud platform of choice for secure enterprise and supply chain collaboration solutions and identity and access management expertise.

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

Block Armour

Block Armour

Block Armour is a Mumbai and Singapore based venture focused on harnessing emerging technologies to counter growing Cybersecurity challenges in bold new ways.

Puleng Technologies

Puleng Technologies

Puleng provides customers with a client-centric strategy to manage and secure the two most valuable assets an organisation has - its Data and Users.

CRI4DATA

CRI4DATA

CRI4DATA's mission is to help organizations build their resilience to cyber risk.

iProov

iProov

iProov delivers authentication and verification simply and securely, based on a genuine one-time biometric.

Hexaware Technologies

Hexaware Technologies

Hexaware is an automation-led next-generation service provider delivering excellence in IT, BPO and Consulting services.

Clear Thinking Solutions

Clear Thinking Solutions

Clear Thinking is an IT Solutions company specialising in secure & compliant technical services.

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

CSRI solves the cyber security threats of tomorrow, today. We work with industry and government leaders on innovative research that has real-world impact.

Difenda

Difenda

Difenda Shield is a fully integrated and modular cybersecurity suite that gives your organization the agility it needs to implement a world-class cybersecurity system.

Tenet3

Tenet3

Tenet3's vision is to make optimal cyber strategy development tractable, data driven, with concrete success metrics. The result is cost effective cyber resilience for our customers.

Atlas Cloud

Atlas Cloud

Atlas Cloud is a UK-wide provider of managed services based in Newcastle. Our ‘research-led’ approach to IT services helps leaders make better decisions about IT for their businesses.

Frontier Technology Inc. (FTI)

Frontier Technology Inc. (FTI)

Frontier Technology Inc provides the technology and deep data expertise to drive the best defense and intelligence solutions.

Techtron Business IT Services

Techtron Business IT Services

TECHTRON has been providing business IT services since 2004. Our focus is on SMBs and we are good at it. Our customers trust us, they love our high levels of service, and they love what we stand for.