Darpa Looks to Make Cyberwar Routine With Secret ĎPlan Xí
By Noah Shachtman | Wired.com
The Pentagonís top research arm is unveiling a new, classified cyberwarfare project. But itís not about building the next Stuxnet, Darpa swears. Instead, the just-introduced ďPlan XĒ is designed to make online strikes a more routine part of U.S. military operations. That will make the son of Stuxnet easier to pull off ó to, as Darpa puts it, ďdominate the cyber battlespace.Ē
Darpa spent years backing research that could shore up the nationís cyberdefenses. ďPlan XĒ is part of a growing and fairly recent push into offensive online operations by the Pentagon agency largely responsible for the internetís creation. In recent months, everyone from the director of Darpa on down has pushed the need to improve ó and normalize ó Americaís ability to unleash cyberattacks against its foes.
That means building tools to help warplanners assemble and launch online strikes in a hurry. It means, under Plan X, figuring out ways to assess the damage caused by a new piece of friendly military malware before itís unleashed. And it means putting together a sort of digital battlefield map that allows the generals to watch the fighting unfold, as former Darpa acting director Ken Gabriel told the Washington Post: ďa rapid, high-order look of what the Internet looks like ó of what the cyberspace looks like at any one point in time.Ē
Itís not quite the same as building the weapons themselves, as Darpa notes in its introduction to the five-year, $100 million effort, issued on Monday: ďThe Plan X program is explicitly not funding research and development efforts in vulnerability analysis or cyberweapon generation.Ē (Emphasis in the original.)
But it is certainly a complementary campaign. A classified kick-off meeting for interested researchers in scheduled for Sept. 20.
The American defense and intelligence establishment has been reluctant at times to authorize network attacks, for fear that their effects could spread far beyond the target computers. On the eve of the Iraq invasion of 2003, for instance, the Bush administration made plans for a massive online strike on Baghdadís financial system before discarding the idea out of collateral damage concerns.
Itís not the only factor holding back such operations. U.S. military chiefs like National Security Agency director Gen. Keith Alexander have publicly expressed concern that America may not be able to properly respond to a national-level attack unless theyíre given pre-defined battle plans and ďstanding rules of engagementĒ that would allow them to launch a counterstrike ďat net speed.Ē Waiting more than a few moments might hurt the American ability to respond at all, these officers say.
ďPlan XĒ aims to solve both problems simultaneously, by automatically constructing mission plans that are as easy to execute as ďthe auto-pilot function in modern aircraft,Ē but contain ďformal methods to provably quantify the potential battle damage from each synthesized mission plan.Ē
Then, once the plan is launched, Darpa would like to have machines running on operating systems that can withstand the rigors of a full-blown online conflict: ďhardened Ďbattle unitsí that can perform cyberwarfare functions such as battle damage monitoring, communication relay, weapon deployment, and adaptive defense.Ē
The ability to operate in dangerous areas, pull potential missions off-the-shelf, and assess the impact of attacks ó these are all commonplace for air, sea, and land forces today. The goal of Plan X is to give network-warfare troops the same tools. ďTo get it to the point where itís a part of routine military operations,Ē explains Jim Lewis, a long-time analyst of online operations at the Center for Strategic and International Studies.
Of course, many critics of U.S. policy believe the deployment of cyberweapons is already too routine. Americaís online espionage campaign against Iran has been deeply controversial, both at home and abroad. The Russian government and its allies believe that cyberweapons ought to be banned by international treaty. Here in the U.S., thereís a fear that, by unleashing Stuxnet and other military-grade malware, the Obama administration legitimized such attacks as a tool of statecraft ó and invited other nations to strike our fragile infrastructure.
Read the full article at: wired.com
Massive Cyberattack: Act 1 Of Israeli Strike On Iran?
Flame, Stuxnet Super Cyber Weapons Linked: Researchers
Expert Issues a Cyberwar Warning
Legal action must be taken against US over cyber attacks: Analyst
Iranian nuclear facilities are hit by AC/DC virus
Israel Hints at Role in New ĎSuper Virusí Spreading Across Mideast
Latest News from our Front Page
Professor: Reason Itself Is A White Male Construct
A philosophy and religion professor at Syracuse University gave an interview to The New York Times Thursday in which he critiqued the notion of pure reason as simply being a “white male Euro-Christian construction.”
Prof. John Caputo was being interviewed by fellow philosophy professor George Yancy for the 13th installment of an interview series Yancy conducts with philosophers regarding racial topics.
Given its emphasis on first principles ...
The Broken Window Fallacy
Youtube description: This short video explains one of the most persistent economic fallacies of our day.
Jenji Kohan and the Jewish Hyper-Sexualization of Western Culture
As detailed in The Culture of Critique, Freud and his followers regarded anti-Semitism was a universal pathology which had its roots in sexual repression. The theoretical basis for this can be found in Freud’s Three Essays on the Theory of Sexuality where he linked aggression to the frustration of human drives — especially the sex drive. Kevin MacDonald notes that: ...
Confederate History - Dispelling the Myths
History books, the media, the school systems, etc abound in falsehoods and inaccuracies of Confederate and Southern history. This fact sheet will help to clarify and dispell some of these rampant inaccuracies.
MYTH - The War of 1861 - 1865 was fought over slavery.
FACT - Terribly untrue. The North fought the war over money. Plain ...
Gays Rights May Open Door for Pedophile Rights
Democrats have attempted to normalize pedophilia as a sexual orientation.
A recent Supreme Court ruling on same-sex marriage may soon allow pedophiles to argue they are suffering discrimination.
‚ÄúUsing the same tactics used by ‚Äėgay‚Äô rights activists, pedophiles have begun to seek similar status arguing their desire for children is a sexual orientation no different than heterosexual or homosexuals,‚ÄĚ writes Jack Minor ...
|More News » |