May 20, 2009

Cyber Warfare: The Gray Zone Narrows

The gray zone separating “cyber attacks” by hackers on computer and communications networks from war waged with bayonet, bomb or missile attacks is narrowing, and narrowing dramatically.

Last week, the head of U.S. Strategic Command (STRATCOM), U.S. Air Force Gen. Kevin Chilton, noted that American leaders cannot rule out using “real world” military force (e.g., air strikes and ground attacks) against an enemy who attacks and disrupts critical cyber networks.

On May 8, The Stars and Stripes quoted Chilton as saying, “I don’t think you take anything off the table when you provide options” to senior civilian leaders following an attack on the United States – including cyber attacks on America.

Chilton is addressing, quite publicly and emphatically, an increasingly difficult security threat. Cyberspace is, to paraphrase a recent statement by another senior U.S. military officer, “a contested environment.” “Contested environment” is Pentagonese for “there’s a fight going on there, and we’re in it.”

A column I wrote in January 2008 sketches the thorny issue: “Attack a nation’s highways and railroads, and you’ve attacked transportation infrastructure. You’ve also committed an obvious, recognized act of war. An electronic attack doesn’t leave craters or bleeding human casualties – at least, not in the same overt sense of an assault with artillery and bombs. However, the economic costs can be much larger than a classic barrage or bombing campaign.”

Historians can make the argument that “hacking” as warfare isn’t new. When World War I erupted, British sailors “hacked” German undersea cables in order to intercept or cut German international cable communications traffic. This gave the British an intelligence edge and the ability to deny Germany a communications asset. Likewise, eavesdropping on military radio communications and jamming radio was standard operating procedure in World War II.

In the digital age, more than military and diplomatic communications are at risk. Today, nations depend on networked computers for civilian as well as military communications, for personal and governmental economic transactions, for information storage and retrieval, and command and control of transportation and energy infrastructure. This exponentially increased reliance means that in the 21st century a nation’s “cyber” infrastructure is a very attractive target. Intelligence agencies know this. So do banks, brokerage houses, freight shippers and power companies.

Electric utilities are concerned about “hacker attacks” on their computer systems. Computers guide America’s electrical grids – they monitor and control circuits.

Inducing an electrical blackout on a national scale is an offensive “three-fer”: 1) an attack on key infrastructure; 2) an economic assault (damaging commerce); and 3) a psychological attack seeding hysteria and perhaps producing political panic.

Other scenarios worry defense planners. Commercial air service can be hampered or halted by attacking air traffic control system computers. Trucking can be crippled by attacking the computers controlling fuel supplies (refineries, pipelines, storage sites and distribution systems).

Space satellites and their computer-controlled ground stations offer another target. An attacker who interferes with ground-to-satellite communications could conceivably disrupt Global Positioning System (GPS) navigation, deny satellite weather data, “blind” spy satellites, and cut some phone and television networks.

Uncertainty of the “origin of the attack” makes cyber attacks attractive. In cyberspace, the difference between a criminal act and an act of war is often a matter of interpretation as well as degree.

But U.S. defense officials are becoming increasingly vocal about “probes” and “intrusions” traceable to nation-states. Last month, The Wall Street Journal quoted a “senior intelligence official” as saying: “The Chinese have attempted to map our infrastructure, such as the electrical grid. So have the Russians.” The article noted that cyber “intruders” had not (as yet) attempted to damage the grid but “could try during a crisis or war.”

Cyberspace is complex. While specific computers and control systems are vulnerable to attack, several cyber warriors make the case that knocking out the entire Internet and simultaneously disrupting “hardened” U.S. military communications is a difficult if not impossible task. “Anti-intrusion” and “anti-virus” defenses for computers are also improving.

Chilton’s statement, however, serves as diplomatic notice that “classical deterrence” – assured counter-attack with the full range of U.S. military and police power – is now an element of American “cyber defense.”

COPYRIGHT 2009 CREATORS SYNDICATE INC.

Who We Are

The Patriot Post is a highly acclaimed weekday digest of news analysis, policy and opinion written from the heartland — as opposed to the MSM’s ubiquitous Beltway echo chambers — for grassroots leaders nationwide. More

What We Offer

On the Web

We provide solid conservative perspective on the most important issues, including analysis, opinion columns, headline summaries, memes, cartoons and much more.

Via Email

Choose our full-length Digest or our quick-reading Snapshot for a summary of important news. We also offer Cartoons & Memes on Monday and Alexander’s column on Wednesday.

Our Mission

The Patriot Post is steadfast in our mission to extend the endowment of Liberty to the next generation by advocating for individual rights and responsibilities, supporting the restoration of constitutional limits on government and the judiciary, and promoting free enterprise, national defense and traditional American values. We are a rock-solid conservative touchstone for the expanding ranks of grassroots Americans Patriots from all walks of life. Our mission and operation budgets are not financed by any political or special interest groups, and to protect our editorial integrity, we accept no advertising. We are sustained solely by you. Please support The Patriot Fund today!


The Patriot Post and Patriot Foundation Trust, in keeping with our Military Mission of Service to our uniformed service members and veterans, are proud to support and promote the National Medal of Honor Heritage Center, the Congressional Medal of Honor Society, both the Honoring the Sacrifice and Warrior Freedom Service Dogs aiding wounded veterans, the National Veterans Entrepreneurship Program, the Folds of Honor outreach, and Officer Christian Fellowship, the Air University Foundation, and Naval War College Foundation, and the Naval Aviation Museum Foundation. "Greater love has no one than this, to lay down one's life for his friends." (John 15:13)

★ PUBLIUS ★

“Our cause is noble; it is the cause of mankind!” —George Washington

Please join us in prayer for our nation — that righteous leaders would rise and prevail and we would be united as Americans. Pray also for the protection of our Military Patriots, Veterans, First Responders, and their families. Please lift up your Patriot team and our mission to support and defend our Republic's Founding Principle of Liberty, that the fires of freedom would be ignited in the hearts and minds of our countrymen.

The Patriot Post is protected speech, as enumerated in the First Amendment and enforced by the Second Amendment of the Constitution of the United States of America, in accordance with the endowed and unalienable Rights of All Mankind.

Copyright © 2024 The Patriot Post. All Rights Reserved.

The Patriot Post does not support Internet Explorer. We recommend installing the latest version of Microsoft Edge, Mozilla Firefox, or Google Chrome.