Fierce cyber war predicted
Strides in technology magnify info war potential
Monday, March 3, 2003 Posted: 10:49 AM EST (1549 GMT)
http://www.cnn.com/2003/TECH/ptech/03/03/sprj.irq.info.war.ap/index.html NEW YORK (AP) -- Imagine Iraqi commanders getting misleading text messages on their cell phones. They appear to contain orders from Saddam Hussein but are actually sent by the U.S. military in disguise, directing Iraqi troops to a trap. Or how about a radar that confuses the Iraqi air defense system by showing U.S. bombers in the wrong locations, or heading in the wrong direction? Although information operations has been a tool of warfare for centuries, the Internet and other technologies are boosting capabilities -- and the stakes. Already, the Pentagon has sent unsolicited e-mails to Iraqi generals, encouraging them to defect.
"Warfare is less and less about pushing men and machines around the battlefield and more and more about pushing electrons and photons," said Loren Thompson, a defense analyst with the Lexington Institute in Arlington, Virginia. The Pentagon has been mostly mum about what it can do and plans. Military analysts wouldn't reveal specifics, fearful the Iraqis could develop countermeasures. "One thing I can tell you for sure:
People who really know about these programs can't tell you about these programs," said Bruce Berkowitz, a senior analyst with Rand. But Berkowitz did spell out the goals: Shape perceptions and get ahead of the enemy's decision-making intelligence through spying, jamming and deception.
Chris Prosise, a Foundstone Inc. security researcher formerly with the Air Force's Information Warfare Center, said the U.S. military has the same tools available to computer hackers. A virus, for instance, can create "backdoor" openings for later break-ins.
Information operations could also involve steering Iraqis to less-secure communications channels for easier spying, such as by destroying the infrastructure required for encryption. That can be done with bombs, computer attacks or, perhaps,
electromagnetic-pulse weapons, which disable electronics with massive bursts of electricity. <snip>
President Bush already has signed a secret order to develop guidelines on launching cyberattacks. Once bombs start dropping,
Bamford said, the military and intelligence communities will likely get all the authority they want. "They'll use this whole thing as a big training ground," Bamford said. "They'll experiment with everything they've been thinking about for a long time."