NSA Chief: Rules of War Apply to Cyberwar, Too

In the tightly controlled discussion about cyberweapons, this counts as a step toward transparency.

NSA director Michael Rogers participates in a question-and-answer session during the Intelligence and National Security Alliance's Leadership Dinner on August 13, 2014 in Alexandria, Virginia.
National Journal
Patrick Tucker, Defense One
Add to Briefcase
Patrick Tucker, Defense One
April 21, 2015, 12:59 p.m.

The Pentagon keeps its rapidly expanding cyberarsenal almost entirely secret, which helps keep U.S. capabilities potent but also hinders the public’s ability to meaningfully discuss their use and costs. The development of new worms or viruses doesn’t show up in the president’s annual budget request in the same way as does money for jets and tanks—and cyberweapons don’t grace the cover of magazines.

Is there a way to discuss publicly what the future of cyberoperations will look like? Defense One recently put the question to Adm. Michael Rogers, commander of U.S. Cyber Command and director of the National Security Agency, at the Navy League’s Sea Air Space conference outside of Washington, D.C.

Rogers indicated, unsurprisingly, that full transparency will remain impossible. But he also opened up, ever so slightly, in promising that Cyber Command would follow international norms in determining how the United States uses what are sometimes called offensive cybercapabilities. “Remember, anything we do in the cyber arena “¦ must follow the law of conflict. Our response must be proportional, must be in line with the broader set of norms that we’ve created over time. I don’t expect cyber to be any different,” he said.

(RELATED: Key Republican Is Not on Board With NSA Reform)

Rogers framed the development of cyberweapons as simply the next evolutionary step in warfare, replete with all the ethical concerns that accompanied other milestones in weapons development. “I’m sure there were huge reactions to the development of mass firepower in the 1800s as a new kind of war-fighting implement. Cyber represents change, a different technical application to attempt to achieve some of the exact same effects, just do it in a different way. Like those other effects, I think, over time, we’ll have a broad discussion in terms of our sense of awareness, both in terms of capabilities as well as limitations,” he said.

The cyberchief downplayed the difference between offensive cybercapabilities and more familiar types of weapons. “We tend not to get into the specifics of some kinetic systems. I don’t think in that regard that cyber is any different,” he said. (Kinetic weapons cause real physical damage; think bombs and other munitions.)

Rogers’s willingness to speak about the subject at all marks another small step forward in transparency about cyberoperations, according to Shane Harris, author of @War: The Rise of the Military-Internet Complex. “In just the past few years, U.S. officials have been talking much more openly both about the use of cyberweapons and what they think the restraints on them should be. Rogers is doing exactly that here,” Harris told Defense One. “There was a time not so long ago when you wouldn’t hear a senior U.S. even acknowledge that we engage in offensive cyberoperations.”

(RELATED: Congress to Introduce Last-Ditch Bill to Reform NSA Spying)

In June 2011, the Pentagon acknowledged the existence of a list of secret weapons and offensive capabilities but didn’t detail what the items were. Probably the most famous cyberweapon of all time, the Stuxnet worm that crippled Iranian nuclear enrichment at the Natanz facility in 2010, remains officially unattributed despite wide suspicion that it was built and deployed by the United States, Israel, or both.

The Real World of Virtual Weapons

Meanwhile, the development of such weapons continues apace, as does their deployment beyond Cyber Command’s office buildings in Virginia. Future battles—at sea, on land, and in the air—will have a cyber component handled not just by specialists far from the action but by soldiers at the front, according to operational military leaders who spoke beside Rogers at Sea-Air-Space.

“The risk and the resiliency associated with cyber is owned by the commander,” said Marine Corps Brig. Gen. Daniel J. O’Donohue. “We have disassociated that, frankly, by using specialized communities taking risks, acquisition managers taking risk, staffs taking risk on behalf of the commander.”

O’Donohue cautions that the United States does not necessarily hold an insurmountable advantage in cyber as a dimension of ground combat.

“How do you put cyber into a campaign? When you look at your enemy through your IPB [intelligence preparation for the battlefield], your terrain also includes the cyberterrain. “¦ But there’s no way you can stand up a network when the enemy is practicing 24/7 every day against you,” he said. “How to do you manage your command and control when you are penetrated, while your degraded war-fighting systems are all dependent on the network, and continue to have the resiliency to continue operations at the same time?”

One part of the solution is getting ground commanders much more involved in the creation of cyberwarfare capabilities, he said: “If the operational commander doesn’t own this, we’re going to get what the CIO delivers.”

(RELATED: How the 2016 Republicans Will Debate NSA Reform)

Some weapons that have cyber effects are more obvious than others. Among the more brash (and easy to point to) is the AN/ALQ-231 Intrepid Tiger II electronic-warfare pod that can disrupt enemy networks and equipment. Others are more subtle. In his book, Harris discusses how elite NSA hackers with a unit called Tailored Access Operations worked with soldiers on the front lines in places like Iraq to find and manipulate enemy fighters by hacking devices and perpetrating phishing schemes, essentially a feat of online impersonation.

“The U.S. hackers sent fake text messages to insurgent fighters and roadside bombers. The messages would tell the recipient, in effect, ‘Meet at this street corner to plan the next attack,’ or ‘Go to this point on a road and plant your device.’ When the fighter got there, he’d be greeted by U.S. troops, or perhaps the business end of a Hellfire missile fired from a drone aircraft thousands of feet above,” Harris writes.

In the not-too-distant future, troops may carry situational-awareness gear that makes the cyberworld relevant to the real battlespace in the same way night-vision goggles reveal what the enemy looks like in the dark. The Defense Advanced Projects Research Agency, or DARPA, recently outlined its new Plan X program: a “foundational cyberwarfare program to develop platforms for the Department of Defense to plan for, conduct, and assess cyberwarfare in a manner similar to kinetic warfare.”

At the New America Foundation’s Future of War summit in Washington, D.C., in February, DARPA Director Arati Prabhakar discussed how the program seeks to give soldiers a way to visualize what’s happening in the local cyber environment: “Maybe they’ll walk through an urban environment. “¦ They’ll know a Wifi node has been implicated in a prior act of violence against U.S. troops.”

But giving troops smartphone apps that tell them about networks and routers on the streets of Mosul is different from developing and deploying cyberweapons that turn off the lights.

Cyberweapons can scale and can replicate automatically. One string of code can potentially dismantle a wide number of enemy systems or aspects of civilian infrastructure. They deploy with the push of a button. But depending on configuration and use, an operator enjoys the luxury of turning the weapon on or off, the basis of what’s sometimes called ransomware, where an attacker locks down a system and then releases it upon receiving payment. The same tactic on the battlefield could be a way to force an opponent to submit or surrender without a shot being fired and without any equipment being lost on either side. “This versatility offers at least one set of capabilities that can operate in the transition space between diplomacy and military action, as well as more squarely in the military domain,” Maren Leed wrote in a 2013 paper for the Center for Strategic and International Studies on future cyberoffensive operations.

Rogers’s assurance that the United States will follow the laws of conflict in how it deploys cyberweapons is significant. But since such weapons can be constructed in secret and, often, offer victims no way to determine attribution, the world will have to take that assurance at face value—or not.

What We're Following See More »
SAYS HIS DEATH STEMMED FROM A FISTFIGHT
Saudis Admit Khashoggi Killed in Embassy
1 days ago
THE LATEST

"Saudi Arabia said Saturday that Jamal Khashoggi, the dissident Saudi journalist who disappeared more than two weeks ago, had died after an argument and fistfight with unidentified men inside the Saudi Consulate in Istanbul. Eighteen men have been arrested and are being investigated in the case, Saudi state-run media reported without identifying any of them. State media also reported that Maj. Gen. Ahmed al-Assiri, the deputy director of Saudi intelligence, and other high-ranking intelligence officials had been dismissed."

Source:
ROGER STONE IN THE CROSSHAIRS?
Mueller Looking into Ties Between WikiLeaks, Conservative Groups
1 days ago
THE LATEST

"Special counsel Robert Mueller’s investigation is scrutinizing how a collection of activists and pundits intersected with WikiLeaks, the website that U.S. officials say was the primary conduit for publishing materials stolen by Russia, according to people familiar with the matter. Mr. Mueller’s team has recently questioned witnesses about the activities of longtime Trump confidante Roger Stone, including his contacts with WikiLeaks, and has obtained telephone records, according to the people familiar with the matter."

Source:
PROBING COLLUSION AND OBSTRUCTION
Mueller To Release Key Findings After Midterms
1 days ago
THE LATEST

"Special Counsel Robert Mueller is expected to issue findings on core aspects of his Russia probe soon after the November midterm elections ... Specifically, Mueller is close to rendering judgment on two of the most explosive aspects of his inquiry: whether there were clear incidents of collusion between Russia and Donald Trump’s 2016 campaign, and whether the president took any actions that constitute obstruction of justice." Mueller has faced pressure to wrap up the investigation from Deputy Attorney General Rod Rosenstein, said an official, who would receive the results of the investigation and have "some discretion in deciding what is relayed to Congress and what is publicly released," if he remains at his post.

Source:
PASSED ON SO-CALLED "SAR" REPORTS
FinCen Official Charged with Leaking Info on Manafort, Gates
1 days ago
THE DETAILS
"A senior official working for the Treasury Department's Financial Crimes Enforcement Network (FinCEN) has been charged with leaking confidential financial reports on former Trump campaign advisers Paul Manafort, Richard Gates and others to a media outlet. Prosecutors say that Natalie Mayflower Sours Edwards, a senior adviser to FinCEN, photographed what are called suspicious activity reports, or SARs, and other sensitive government files and sent them to an unnamed reporter, in violation of U.S. law."
Source:
FIRST CHARGE FOR MIDTERMS
DOJ Charges Russian For Meddling In 2018 Midterms
1 days ago
THE LATEST

"The Justice Department on Friday charged a Russian woman for her alleged role in a conspiracy to interfere with the 2018 U.S. election, marking the first criminal case prosecutors have brought against a foreign national for interfering in the upcoming midterms. Elena Khusyaynova, 44, was charged with conspiracy to defraud the United States. Prosecutors said she managed the finances of 'Project Lakhta,' a foreign influence operation they said was designed 'to sow discord in the U.S. political system' by pushing arguments and misinformation online about a host of divisive political issues, including immigration, the Confederate flag, gun control and the National Football League national-anthem protests."

Source:
×
×

Welcome to National Journal!

You are currently accessing National Journal from IP access. Please login to access this feature. If you have any questions, please contact your Dedicated Advisor.

Login