Cyberwarfare In The United States
   HOME

TheInfoList



OR:

Cyberwarfare Cyberwarfare is the use of cyberattack, cyber attacks against an enemy State (polity), state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, ...
is the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes. As a major developed economy, the
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
is highly dependent on the
Internet The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
and therefore greatly exposed to cyber attacks. At the same time, the United States has substantial capabilities in both defense and offensive power projection thanks to comparatively advanced technology and a large military budget.
Cyberwarfare Cyberwarfare is the use of cyberattack, cyber attacks against an enemy State (polity), state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, ...
presents a growing threat to physical systems and infrastructures that are linked to the internet. Malicious hacking from domestic or foreign enemies remains a constant threat to the United States. In response to these growing threats, the United States has developed significant cyber capabilities. The
United States Department of Defense The United States Department of Defense (DoD, USDOD, or DOD) is an United States federal executive departments, executive department of the federal government of the United States, U.S. federal government charged with coordinating and superv ...
recognizes the use of computers and the Internet to conduct warfare in
cyberspace Cyberspace is an interconnected digital environment. It is a type of virtual world popularized with the rise of the Internet. The term entered popular culture from science fiction and the arts but is now used by technology strategists, security ...
as a threat to
national security National security, or national defence (national defense in American English), is the security and Defence (military), defence of a sovereign state, including its Citizenship, citizens, economy, and institutions, which is regarded as a duty of ...
, but also as a platform for attack. The
United States Cyber Command United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integra ...
centralizes command of
cyberspace Cyberspace is an interconnected digital environment. It is a type of virtual world popularized with the rise of the Internet. The term entered popular culture from science fiction and the arts but is now used by technology strategists, security ...
operations, organizes existing cyber resources and synchronizes defense of U.S. military networks. It is an
armed forces A military, also known collectively as armed forces, is a heavily armed, highly organized force primarily intended for warfare. Militaries are typically authorized and maintained by a sovereign state, with their members identifiable by a ...
Unified Combatant Command. A 2021 report by the
International Institute for Strategic Studies The International Institute for Strategic Studies (IISS) is an international research institute or think tank focusing on defence and security issues. Since 1997, its headquarters have been at Arundel House in London. It has offices on four co ...
placed the United States as the world's foremost cyber
superpower Superpower describes a sovereign state or supranational union that holds a dominant position characterized by the ability to Sphere of influence, exert influence and Power projection, project power on a global scale. This is done through the comb ...
, taking into account its cyber offense, defense, and intelligence capabilities.


Background


The Department of Defense Cyber Strategy

In September 2023, Department of Defense (DoD) published its latest Cyber Strategy, building upon the previous DoD Strategy for Operating in Cyberspace published in April 2015 and July 2011. The DoD Cyber strategy focuses on building capabilities to protect, secure, and defend its own DoD networks, systems and information; defend the nation against cyber attacks; and support contingency plans. This includes being prepared to operate and continue to carry out missions in environments impacted by cyber attacks. The DoD outlines three cyber missions: # Defend DoD networks, systems, and information. # Defend the United States and its interests against cyber attacks of significant consequence. # Provide integrated cyber capabilities to support military operations and contingency plans. In addition, the Cyber Strategy emphasizes the need to build bridges to the private sector, so that the best talent and technology the United States has to offer is at disposal to the DoD.


The Five Pillars

The five pillars is the base of the Department of Defense's strategy for cyber warfare. The first pillar is to recognize that the new domain for warfare is
cyberspace Cyberspace is an interconnected digital environment. It is a type of virtual world popularized with the rise of the Internet. The term entered popular culture from science fiction and the arts but is now used by technology strategists, security ...
and that it is similar to the other elements in the
battlespace Battlespace or battle-space is a term used to signify a military strategy which integrates multiple armed forces for the military theater (warfare), theatre of operations, including aerial warfare, air, information warfare, information, ground w ...
. The key objectives of this pillar are to build up technical capabilities and accelerate research and development to provide the United States with a technological advantage. The second pillar is proactive defenses as opposed to passive defense. Two examples of passive defense are computer hygiene and firewalls. The balance of the attacks requires active defense using sensors to provide a rapid response to detect and stop a cyber attack on a
computer network A computer network is a collection of communicating computers and other devices, such as printers and smart phones. In order to communicate, the computers and devices must be connected by wired media like copper cables, optical fibers, or b ...
. This would provide military tactics to backtrace, hunt down and attack an enemy intruder. The third pillar is critical infrastructure protection (CIP) to ensure the protection of critical infrastructure by developing warning systems to anticipate threats. The fourth pillar is the use of
collective defense Collective security is treaty, arrangement between states in which the institution accepts that an attack on one state is the concern of all and merits a collective response to threats by all. Collective security was a key principle underpinning ...
which would provide the ability of early detection, and incorporate it into the cyber warfare defense structure. The goal of this pillar is to explore all options in the face of a conflict, and to minimize loss of life and destruction of property. The fifth pillar is building and maintaining international alliances and partnerships to deter shared threats, and to remain adaptive and flexible to build new alliances as required. This is focused on "priority regions, to include the Middle East, Asia-Pacific, and Europe".


Trump Administration's National Cyber Strategy

Shortly after his election, U.S. President Donald Trump pledged to deliver an extensive plan to improve U.S. cybersecurity within 90 days of his inauguration. Three weeks after the designated 90-day mark, he signed an executive order that claimed to strengthen government networks. By the new executive order, federal-agency leaders are to be held responsible for breaches on their networks and federal agencies are to follow the National Institute of Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity in consolidating risk management practices. In addition, the federal departments were to examine cyber defense abilities of agencies within 90 days, focusing on "risk mitigation and acceptance choices" and evaluating needs for funding and sharing technology across departments. Experts in cybersecurity later claimed that the order was "not likely" to have a major impact. In September, President Trump signed the National Cyber Strategy- "the first fully articulated cyber strategy for the United States since 2003." John Bolton, the National Security Advisor, claimed in September 2018 that the Trump administration's new "National Cyber Strategy" has replaced restrictions on the use of offensive cyber operations with a legal regime that enables the Defense Department and other relevant agencies to operate with a greater authority to penetrate foreign networks to deter hacks on U.S. systems. Describing the new strategy as an endeavor to "create powerful deterrence structures that persuade the adversary not to strike in the first place," Bolton added that decision-making for launching attacks will be moved down the chain of command from requiring the president's approval. The Defense Department, in its strategy document released in September 2018, further announced that it would "defend forward" U.S. networks by disrupting "malicious cyber activity at its source" and endeavor to "ensure there are consequences for irresponsible cyber behavior" by "preserving peace through strength." The National Cyber Strategy has also garnered criticisms that evaluating acts of cyberwarfare against the United States still remains ambiguous, as the current U.S. law does not specifically define what constitutes an illegal cyber act that transcends a justifiable computer activity. The legal status of most
information security Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
research in the United States is governed by 1986 Computer Fraud and Abuse Act, which was derided to be "poorly drafted and arbitrarily enforced" by enabling prosecution of useful information security research methods such as Nmap or Shodan. As even the needed services fall into prohibition, top-level information security experts find it challenging to improve the infrastructure of cyberdefense.


Cyberattack as an act of war

In 2011,
The White House The White House is the official residence and workplace of the president of the United States. Located at 1600 Pennsylvania Avenue NW in Washington, D.C., it has served as the residence of every U.S. president since John Adams in 1800 whe ...
published an "International Strategy for Cyberspace" that reserved the right to use military force in response to a
cyberattack A cyberattack (or cyber attack) occurs when there is an unauthorized action against computer infrastructure that compromises the confidentiality, integrity, or availability of its content. The rising dependence on increasingly complex and inte ...
: In 2013, the Defense Science Board, an independent advisory committee to the U.S. Secretary of Defense, went further, stating that "The cyber threat is serious, with potential consequences similar in some ways to the nuclear threat of the
Cold War The Cold War was a period of global Geopolitics, geopolitical rivalry between the United States (US) and the Soviet Union (USSR) and their respective allies, the capitalist Western Bloc and communist Eastern Bloc, which lasted from 1947 unt ...
," and recommending, in response to the "most extreme case" (described as a "catastrophic full spectrum cyber attack"), that "Nuclear weapons would remain the ultimate response and anchor the deterrence ladder."


Attacks on other nations


Iran

In June 2010, Iran was the victim of a cyber attack when its nuclear facility in Natanz was infiltrated by the cyber-worm 'Stuxnet', said to be the most advanced piece of malware ever discovered and significantly increased the profile of cyberwarfare. It destroyed perhaps over 1,000 nuclear centrifuges and, according to a Business Insider article, " etTehran's atomic program back by at least two years." Despite a lack of official confirmation, Gary Samore, White House Coordinator for Arms Control and Weapons of Mass Destruction, made a public statement, in which he said, "we're glad they he Iraniansare having trouble with their centrifuge machine and that we—the US and its allies—are doing everything we can to make sure that we complicate matters for them", offering "winking acknowledgement" of US involvement in Stuxnet.


China

In June 2013,
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is a former National Security Agency (NSA) intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs. Born in 1983 in Elizabeth ...
, a former
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
(NSA) contractor, said the United States government had hacked into Chinese mobile phone companies to collect text messages, had spied on
Tsinghua University Tsinghua University (THU) is a public university in Haidian, Beijing, China. It is affiliated with and funded by the Ministry of Education of China. The university is part of Project 211, Project 985, and the Double First-Class Constructio ...
and had its spy agencies watch China and Hong Kong for years. In March 2014, the New York Times (NYT) disclosed classified documents which were provided by
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is a former National Security Agency (NSA) intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs. Born in 1983 in Elizabeth ...
that showed the NSA had infiltrated the servers in Huawei's headquarters. The NYT said that although an initial goal of the agency was to find links between the company and China's military, subsequent ones went further and included exploiting Huawei’s technology such that its equipment could be used by the agency to conduct surveillance and, if ordered by the president, offensive cyberoperations against its users. In 2020, a Chinese cybersecurity firm publicly attributed a cyber espionage campaign to a US government agency. In March, April, and June 2022, China's National Computer Virus Emergency Response Center (CVERC) posted technical analysis which attributed cyber attacks into Chinese networks to US government agencies. Cybersecurity analysts interviewed by Wired said the details relied on information which had been publicly available for years and that its disclosure was useful for the country's propaganda campaigns. In September 2022, CVERC accused the NSA of carrying out a series of cyberattacks against Northwestern Polytechnical University as part of tens of thousands of “malicious network attacks” that it said the agency conducted against Chinese targets. The United States has said the university has conducted extensive military research and its department of Commerce has put the university on its entity list. In April 2025, CVERC said the information systems for the 2025 Asian Winter Games which it hosted were subjected to more than two hundred thousand foreign cyberattacks and accused the United States of being behind most of the attacks. CVERC said that the attacks did not cause significant damage, and condemned cyberattacks targeting major international events. The allegation were made in the midst of a trade war between the US and China and after the US accused Beijing of carrying out a cyberespionage campaign that targeted US-based critics of Beijing.


Russia

In June 2019,
Russia Russia, or the Russian Federation, is a country spanning Eastern Europe and North Asia. It is the list of countries and dependencies by area, largest country in the world, and extends across Time in Russia, eleven time zones, sharing Borders ...
said that its
electrical grid An electrical grid (or electricity network) is an interconnected network for electricity delivery from producers to consumers. Electrical grids consist of power stations, electrical substations to step voltage up or down, electric power tran ...
could be under cyber-attack by the United States. The ''New York Times'' reported that American hackers from the
United States Cyber Command United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integra ...
planted malware potentially capable of disrupting the Russian electrical grid.


Others

* According to Thomas C. Reed's account in his 2004 autobiographical book At the Abyss: An Insider's History of the Cold War, in 1982, a computer control system stolen from a Canadian company by Soviet spies caused a Soviet gas pipeline to explode. He alleged that code for the control system had been modified by the CIA to include a logic bomb which changed the pump speeds to cause the explosion, but this is disputed. * A 1 April 1991 article in
InfoWorld ''InfoWorld'' (''IW'') is an American information technology media business. Founded in 1978, it began as a monthly magazine. In 2007, it transitioned to a Web-only publication. Its parent company is International Data Group, and its sister pu ...
Magazine ''"Meta-Virus Set to Unleash Plague on Windows 3.0 Users"'' by John Gantz was purported to be an extremely early example of
cyber warfare Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic ...
between 2 countries. In fact the " AF/91 virus" was an April Fools Joke that was misunderstood and widely re-reported as fact by credulous media.


Cyber threat information sharing

The Pentagon has had an information sharing arrangement, the Defense Industrial Base Cybersecurity and Information Assurance (DIBCIA) program, in place with some private defense contractors since 2007 to which access was widened in 2012. A number of other information sharing initiatives such as the
Cyber Intelligence Sharing and Protection Act The Cyber Intelligence Sharing and Protection Act (CISPA (112th Congress), (113th Congress), (114th Congress)) was a proposed law in the United States which would allow for the sharing of Internet traffic information between the U.S. gove ...
(CISPA) and Cybersecurity Information Sharing Act (CISA) have been proposed, but failed for various reasons including fears that they could be used to spy on the general public.


United States Cyber Command

The
United States Cyber Command United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integra ...
(USCYBERCOM) is a
United States Armed Forces The United States Armed Forces are the Military, military forces of the United States. U.S. United States Code, federal law names six armed forces: the United States Army, Army, United States Marine Corps, Marine Corps, United States Navy, Na ...
Unified Combatant Command. USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: defend Department of Defense information networks and; prepare to conduct "full spectrum military cyberspace operations" to ensure US/Allied freedom of action in cyberspace and deny the same to adversaries.


Army

The Army Cyber Command (ARCYBER) is an Army component command for the U.S. Cyber Command. ARCYBER has the following components: * Army Network Enterprise Technology Command / 9th Army Signal Command * Portions of 1st Information Operations Command (Land) * United States Army Intelligence and Security Command will be under the operational control of ARCYBER for cyber-related actions. New cyber authorities have been granted under National Security Presidential Memorandum (NSPM) 13;Sydney J. Freedberg Jr. (17 September 2018) Trump Eases Cyber Ops, But Safeguards Remain: Joint Staff
/ref> persistent cyber engagements at Cyber command are the new norm for cyber operations.Mark Pomerleau (8 May 2019) New authorities mean lots of new missions at Cyber Command
/ref>


Marine Corps

United States Marine Corps Forces Cyberspace Command is a functional formation of the
United States Marine Corps The United States Marine Corps (USMC), also referred to as the United States Marines or simply the Marines, is the maritime land force service branch of the United States Department of Defense. It is responsible for conducting expeditionar ...
to protect infrastructure from
cyberwarfare Cyberwarfare is the use of cyberattack, cyber attacks against an enemy State (polity), state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, ...
.


Air Force

The Sixteenth Air Force (16 AF) is the
United States Air Force The United States Air Force (USAF) is the Air force, air service branch of the United States Department of Defense. It is one of the six United States Armed Forces and one of the eight uniformed services of the United States. Tracing its ori ...
component of
United States Cyber Command United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integra ...
(USCYBERCOM). It has the following components: * 67th Cyberspace Wing * 688th Cyberspace Wing *
689th Combat Communications Wing The 689th Combat Communications Wing was a wing (air force unit), wing of the United States Air Force stationed at Robins Air Force Base, Georgia. The wing was activated on 9October 2009 as a subordinate unit of Twenty-Fourth Air Force. On 5Jun ...
The F-15 and C-130 systems are being hardened from cyber attack as of 2019.


Navy

The Navy Cyber Forces (CYBERFOR) is the type of some commanders for the U.S. Navy's global cyber workforce. The headquarters is located at Joint Expeditionary Base Little Creek-Fort Story. CYBERFOR provides forces and equipment in cryptology/signals intelligence, cyber, electronic warfare, information operations, intelligence, networks, and space. In September 2013, the
United States Naval Academy The United States Naval Academy (USNA, Navy, or Annapolis) is a United States Service academies, federal service academy in Annapolis, Maryland. It was established on 10 October 1845 during the tenure of George Bancroft as United States Secre ...
will offer undergraduate students the opportunity, to major in Cyber Operations for the United States. Fleet Cyber Command is an operating force of the
United States Navy The United States Navy (USN) is the naval warfare, maritime military branch, service branch of the United States Department of Defense. It is the world's most powerful navy with the largest Displacement (ship), displacement, at 4.5 millio ...
responsible for the Navy's cyber warfare programs. Tenth Fleet is a force provider for Fleet Cyber Command. The fleet components are: *
Naval Network Warfare Command The Naval Network Warfare Command (NAVNETWARCOM) is the United States Navy's information operations, intelligence, networks, and space unit. Naval Network Warfare Command's mission is to execute, under Commander United States Tenth Fleet, TENT ...
* Navy Cyber Defense Operations Command * Naval Information Operation Commands * Combined Task Forces


Timeline

*Systems in the US military and private research institutions were penetrated from March 1998 for almost two years in an incident called Moonlight Maze. The
United States Department of Defense The United States Department of Defense (DoD, USDOD, or DOD) is an United States federal executive departments, executive department of the federal government of the United States, U.S. federal government charged with coordinating and superv ...
traced the trail back to a mainframe computer in the former Soviet Union but the sponsor of the attacks is unknown and Russia denies any involvement. * Titan Rain was the U.S. government's designation given to a series of coordinated attacks on American computer systems since 2003. The attacks were labeled as Chinese in origin, although their precise nature (i.e., state-sponsored espionage,
corporate espionage Industrial espionage, also known as economic espionage, corporate spying, or corporate espionage, is a form of espionage conducted for commercial purposes instead of purely national security. While political espionage is conducted or orchestrat ...
, or random
hacker A hacker is a person skilled in information technology who achieves goals and solves problems by non-standard means. The term has become associated in popular culture with a security hackersomeone with knowledge of bug (computing), bugs or exp ...
attacks) and their real identities (i.e., masked by proxy, zombie computer, spyware/virus infected) remain unknown. *In 2007, the United States government suffered "an espionage
Pearl Harbor Pearl Harbor is an American lagoon harbor on the island of Oahu, Hawaii, west of Honolulu. It was often visited by the naval fleet of the United States, before it was acquired from the Hawaiian Kingdom by the U.S. with the signing of the Reci ...
" in which an unknown foreign power ... broke into all of the high tech agencies, all of the military agencies, and downloaded terabytes of information. *In 2008, a hacking incident occurred on a U.S. Military facility in the Middle East. United States Deputy Secretary of Defense William J. Lynn III had the
Pentagon In geometry, a pentagon () is any five-sided polygon or 5-gon. The sum of the internal angles in a simple polygon, simple pentagon is 540°. A pentagon may be simple or list of self-intersecting polygons, self-intersecting. A self-intersecting ...
release a document, which reflected a "malicious code" on a
USB flash drive A flash drive (also thumb drive, memory stick, and pen drive/pendrive) is a data storage device that includes flash memory with an integrated USB interface. A typical USB drive is removable, rewritable, and smaller than an optical disc, and u ...
spread undetected on both classified and unclassified Pentagon systems, establishing a digital beachhead, from which data could be transferred to servers under foreign control. "It was a network administrator's worst fear: a rogue program operating silently, poised to deliver operational plans into the hands of an unknown adversary. This ... was the most significant breach of U.S. military computers ever and it served as an important wake-up call", Lynn wrote in an article for
Foreign Affairs ''Foreign Affairs'' is an American magazine of international relations and foreign policy of the United States, U.S. foreign policy published by the Council on Foreign Relations, a nonprofit organization, nonprofit, nonpartisan, membership or ...
. *Operation Buckshot Yankee, conducted by the United States in response to the 2008 breach which was allegedly conducted by Russia. This operation lasted three years, starting in October 2008 when the breach was first detected. The operation included attempts to recognize and mitigate the malicious code (Agent.btz), which had spread to military computers around the world. The team conducting the operation requested permission to use more offensive means of combating the code, but it was denied by senior officials. Operation Buckshot Yankee was a catalyst for the formation of
Cyber Command United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integrat ...
. *On 9 February 2009, the
White House The White House is the official residence and workplace of the president of the United States. Located at 1600 Pennsylvania Avenue Northwest (Washington, D.C.), NW in Washington, D.C., it has served as the residence of every U.S. president ...
announced that it will conduct a review of the nation's cyber security to ensure that the
Federal government of the United States The Federal Government of the United States of America (U.S. federal government or U.S. government) is the Federation#Federal governments, national government of the United States. The U.S. federal government is composed of three distinct ...
cyber security initiatives are appropriately integrated, resourced and coordinated with the
United States Congress The United States Congress is the legislature, legislative branch of the federal government of the United States. It is a Bicameralism, bicameral legislature, including a Lower house, lower body, the United States House of Representatives, ...
and the private sector. *On 1 April 2009, U.S. lawmakers pushed for the appointment of a White House cyber security "czar" to dramatically escalate U.S. defenses against cyber attacks, crafting proposals that would empower the government to set and enforce security standards for private industry for the first time. *On 7 April 2009,
The Pentagon The Pentagon is the headquarters building of the United States Department of Defense, in Arlington County, Virginia, across the Potomac River from Washington, D.C. The building was constructed on an accelerated schedule during World War II. As ...
announced they spent more than $100 million in the last six months responding to and repairing damage from cyber attacks and other computer network problems. *From December 2009 to January 2010, a cyber attack, dubbed Operation Aurora, was launched from China against
Google Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
and over 20 other companies. Google said the attacks originated from China and that it would "review the feasibility" of its business operations in China following the incident. According to Google, at least 20 other companies in various sectors had been targeted by the attacks.
McAfee McAfee Corp. ( ), formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American proprietary software company focused on online ...
spokespersons claimed that "this is the highest profile attack of its kind that we have seen in recent memory.""Google Attack Is Tip Of Iceberg"
McAfee Security Insights, 13 January 2010
*In February 2010, the United States Joint Forces Command released a study which included a summary of the threats posed by the internet: "The open and free flow of information favored by the West will allow adversaries an unprecedented ability to gather intelligence.""The Joint Operating Environment"
Report released, 18 Feb 2010, pp. 34–36
*On 19 June 2010, United States Senator
Joe Lieberman Joseph Isadore Lieberman (; February 24, 1942 – March 27, 2024) was an American politician and lawyer who served as a United States senator from Connecticut from 1989 to 2013. Originally a member of the Democratic Party (United States), Dem ...
(I-CT) introduced a bill called "Protecting Cyberspace as a National Asset Act of 2010", which he co-wrote with Senator
Susan Collins Susan Margaret Collins (born December 7, 1952) is an American politician serving as the senior United States senator from Maine. A member of the Republican Party, she has held her seat since 1997 and is Maine's longest-serving member of ...
(R-ME) and Senator Thomas Carper (D-DE). If signed into law, this controversial bill, which the American media dubbed the "'' Kill switch bill''", would grant the President emergency powers over parts of the Internet. However, all three co-authors of the bill issued a statement that instead, the bill " arrowedexisting broad Presidential authority to take over telecommunications networks".Senators Say Cybersecurity Bill Has No 'Kill Switch'
informationweek.com, 24 June 2010. Retrieved on 25 June 2010.
*In August 2010, the U.S. for the first time publicly warned about the Chinese military's use of civilian computer experts in clandestine cyber attacks aimed at American companies and government agencies.
The Pentagon The Pentagon is the headquarters building of the United States Department of Defense, in Arlington County, Virginia, across the Potomac River from Washington, D.C. The building was constructed on an accelerated schedule during World War II. As ...
also pointed to an alleged China-based computer spying network dubbed GhostNet that was revealed in a research report last year. The Pentagon stated that the
People's Liberation Army The People's Liberation Army (PLA) is the military of the Chinese Communist Party (CCP) and the People's Republic of China (PRC). It consists of four Military branch, services—People's Liberation Army Ground Force, Ground Force, People's ...
was using "information warfare units" to develop
viruses A virus is a submicroscopic infectious agent that replicates only inside the living cells of an organism. Viruses infect all life forms, from animals and plants to microorganisms, including bacteria and archaea. Viruses are found in almo ...
to attack enemy computer systems and networks, and those units include civilian computer professionals. Commander Bob Mehal would monitor the PLA's buildup of its cyberwarfare capabilities and "will continue to develop capabilities to counter any potential threat." * In 2010, American General Keith B. Alexander endorsed talks with Russia over a proposal to limit military attacks in cyberspace, representing a significant shift in U.S. policy. * In 2011 as part of The Anonymous attack on HBGary Federal information about private companies such as Endgame systems who design offensive software for the Department of Defense were revealed. It was shown that Endgame systems job applicants had previously "managed team of 15 persons, responsible for coordinating offensive computer network operations for the United States Department of Defense and other federal agencies." * In October 2012, the
Pentagon In geometry, a pentagon () is any five-sided polygon or 5-gon. The sum of the internal angles in a simple polygon, simple pentagon is 540°. A pentagon may be simple or list of self-intersecting polygons, self-intersecting. A self-intersecting ...
was to host contractors who "want to propose revolutionary technologies for understanding, planning and managing cyberwarfare. It is part of an ambitious program that the Defense Advanced Research Projects Agency, or
DARPA The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Adva ...
, calls Plan X, and the public description talks about 'understanding the cyber battlespace', quantifying 'battle damage' and working in DARPA's 'cyberwar laboratory.'" * Starting in September 2012, denial of service attacks, were carried out against the
New York Stock Exchange The New York Stock Exchange (NYSE, nicknamed "The Big Board") is an American stock exchange in the Financial District, Manhattan, Financial District of Lower Manhattan in New York City. It is the List of stock exchanges, largest stock excha ...
and a number of banks including J.P. Morgan Chase. Credit for these attacks was claimed by a
hacktivist Hacktivism (or hactivism; a portmanteau of '' hack'' and ''activism''), is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. A form of Internet activism with roo ...
group called the Qassam Cyber Fighters who have labeled the attacks Operation Ababil. The attacks had been executed in several phases and were restarted in March 2013. * In 2013, the first Tallinn Manual on the International Law Applicable to Cyber Warfare was published. This publication was the result of an independent study to examine and review laws governing cyber warfare sponsored by the NATO Cooperative Cyber Defence Centre of Excellence in 2009. * In February 2013, the White House Presidential Executive Order (E.o.) 13636 "Improving Critical Infrastructure Cybersecurity" was published. This executive order highlighted the policies needed to improve and coordinate cybersecurity, identification of critical infrastructure, reduction of cyber risk, information sharing with the private sector, and ensure civil and privacy liberties protections are incorporated. * In January 2014, the White House Presidential Policy Directive 28 (PPD-28) on "Signals Intelligence Activities" was published. This presidential policy directive highlighted the principles, limitations of use, process of collection, safeguarding of personal information, and transparency related to the collection and review of cyber intelligence signal activities. * In August 2014, "gigabytes" of sensitive data were reported stolen from
JPMorgan Chase JPMorgan Chase & Co. (stylized as JPMorganChase) is an American multinational financial services, finance corporation headquartered in New York City and incorporated in Delaware. It is List of largest banks in the United States, the largest ba ...
(see
2014 JPMorgan Chase data breach The 2014 JPMorgan Chase data breach was a cyberattack against American bank JPMorgan Chase that is believed to have compromised data associated with over 83 million accounts—76 million households (approximately two out of three households in th ...
), and the company's internal investigation was reported to have found that the data was sent to a "major Russian city." The FBI was said to be investigating whether the breach was in retaliation for sanctions the United States had imposed on Russia in relation to the 2014 Russian military intervention in Ukraine. * On 29 May 2014, iSIGHT Partners, a global provider of cyber threat intelligence, uncovered a "long-term" and "unprecedented" cyber espionage that was "the most elaborate cyber espionage campaign using social engineering that has been uncovered to date from any nation". Labelled " Operation Newscaster", it targeted senior U.S. military and diplomatic personnel, congresspeople, journalists, lobbyists, think tankers and defense contractors, including a four-star admiral. * In December 2014, Cylance Inc. published an investigation on so-called " Operation Cleaver" which targeted over 50 world's unnamed leading enterprises, including in United States.
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
tacitly acknowledged the operation and "warned businesses to stay vigilant and to report any suspicious activity spotted on the companies' computer systems". * In December 2014, in response to a hack on the US based company
Sony is a Japanese multinational conglomerate (company), conglomerate headquartered at Sony City in Minato, Tokyo, Japan. The Sony Group encompasses various businesses, including Sony Corporation (electronics), Sony Semiconductor Solutions (i ...
(see Sony Pictures hack) believed to be perpetrated by
North Korea North Korea, officially the Democratic People's Republic of Korea (DPRK), is a country in East Asia. It constitutes the northern half of the Korea, Korean Peninsula and borders China and Russia to the north at the Yalu River, Yalu (Amnok) an ...
, the US government created new economic sanctions on North Korea and listed the country as a state sponsor of terrorism. After the hack, there was an internet blackout over most of North Korea allegedly caused by the US, but there was no definitive evidence to support that claim. * In January 2015, terrorist group ISIS hacked
United States Central Command The United States Central Command (USCENTCOM or CENTCOM) is one of the eleven unified combatant commands of the United States Department of Defense, U.S. Department of Defense. It was established in 1983, taking over the previous responsibilit ...
and took over their Twitter and YouTube accounts. They distributed sensitive information obtained during the attack on various social media platforms. * In April 2015, The Department of Defense Cyber Strategy was updated and published. Original DoD Strategy for Operating in Cyberspace was published in July 2011. * In 2015 the
United States Office of Personnel Management The United States Office of Personnel Management (OPM) is an independent agency of the United States government that manages the United States federal civil service. The agency provides federal human resources policy, oversight, and support, an ...
(OPM) was victim to what has been described by federal officials as among the largest breaches of government data in the history of the United States, in which an estimated 21.5 million records were stolen. Information targeted in the breach included
personally identifiable information Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely used in the United States, but the phrase it abbreviates has fou ...
such as
Social Security number In the United States, a Social Security number (SSN) is a nine-digit number issued to United States nationality law, U.S. citizens, Permanent residence (United States), permanent residents, and temporary (working) residents under section 205(c)(2 ...
s, as well as names, dates and places of birth, and addresses, and likely involved theft of detailed background security-clearance-related background information. * In June 2015, the US Department of Defense (DoD) included a chapter dedicated to cyber warfare in the DoD Law of War Manual. See Cyber Warfare section on p. 994. * In 2016
Cyber Command United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integrat ...
mounted computer-network attacks on
ISIS Isis was a major goddess in ancient Egyptian religion whose worship spread throughout the Greco-Roman world. Isis was first mentioned in the Old Kingdom () as one of the main characters of the Osiris myth, in which she resurrects her sla ...
under Operation Glowing Symphony with the intent to disrupt internal communication, manipulate data, and undermine confidence in the group's security. A particular emphasis was placed on locking key figures out of their accounts, deleting files of propaganda, and making it all look like general IT trouble instead of an intentional attack. This operation prompted an internal debate in the American government about whether or not to alert their allies that they would be attacking servers located within other countries. *In March 2018, the
Office of Foreign Assets Control The Office of Foreign Assets Control (OFAC) is a financial intelligence and enforcement agency of the United States Department of the Treasury, United States Treasury Department. It administers and enforces economic and trade economic sanctions, ...
sanctioned two Russian intelligence agencies, the Federal Security Service (FSB) and the
Main Intelligence Directorate (GRU) Main Intelligence Directorate ( rus, Главное разведывательное управление, Glavnoye razvedyvatel'noye upravleniye, ˈglavnəjə rɐzˈvʲɛdɨvətʲɪlʲnəjə ʊprɐˈvlʲenʲɪjə), abbreviated GRU ( rus, ГР ...
for committing "destructive cyber-attacks." The attacks include the NotPetya attack, an assault that was allegedly conducted by the Russian military in February according to statements of the White House and British government, and which the United States Treasury described as "the most destructive and costly cyber-attack in history." *In March 2018, the United States Justice Department charged nine Iranians with stealing scientific secrets on behalf of Iran's Revolutionary Guard Corps. The defendants "stole more than 31 terabytes of academic data and intellectual property from universities, and email accounts of employees at private sector companies, government agencies, and non-governmental organizations." *In September 2018, the
United States Justice Department The United States Department of Justice (DOJ), also known as the Justice Department, is a federal executive department of the U.S. government that oversees the domestic enforcement of federal laws and the administration of justice. It is equi ...
published a criminal complaint against Park Jin Hyok, a professional hacker alleged to be working for North Korea's military intelligence bureau, for his commitment of three cyber-attacks: attack against Sony Pictures in 2014, the theft of $81m from the central bank of
Bangladesh Bangladesh, officially the People's Republic of Bangladesh, is a country in South Asia. It is the List of countries and dependencies by population, eighth-most populous country in the world and among the List of countries and dependencies by ...
in 2016, and WannaCry 2.0 ransomware attack against hundreds of thousands of computers. *September 2018, The White House has "authorized offensive cyber operations" against foreign threats as a result of loosened restrictions on the use of digital weapons in line with the president's directive; the National Security Presidential Memorandum 13 (NSPM 13). This allows the military to carry out such attacks with a shortened approval process. *In October 2018, the
United States Cyber Command United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integra ...
launched the still-classified Operation Synthetic Theology. A team of experts were deployed to Macedonia,
Ukraine Ukraine is a country in Eastern Europe. It is the List of European countries by area, second-largest country in Europe after Russia, which Russia–Ukraine border, borders it to the east and northeast. Ukraine also borders Belarus to the nor ...
, and
Montenegro , image_flag = Flag of Montenegro.svg , image_coat = Coat of arms of Montenegro.svg , coa_size = 80 , national_motto = , national_anthem = () , image_map = Europe-Mont ...
to identify Russian agents interfering in the election. The team was also gathering intelligence on Russia's cyber capabilities and attacking the
Internet Research Agency The Internet Research Agency (IRA; ; 2013-2023), also known as ''Glavset'' (, ), and known in Russian Internet slang as the Trolls from Olgino () or Kremlinbots (), was a Russian company which was engaged in online propaganda and influence ...
, a "Kremin-backed troll farm in St. Petersburg". *Beginning at least by March 2019, persistent cyber operations were applied by the United States against Russia's power grid, seemingly per National Security Presidential Memorandum 13 (September 2018). *June 2019, White House National Security Adviser John Bolton announced that U.S. offensive cyber operations would be expanded to include "economic cyber intrusions". These comments appear to reference China's alleged theft of information and data from U.S. corporations. *In June 2019, President Trump ordered a cyber attack against
Iran Iran, officially the Islamic Republic of Iran (IRI) and also known as Persia, is a country in West Asia. It borders Iraq to the west, Turkey, Azerbaijan, and Armenia to the northwest, the Caspian Sea to the north, Turkmenistan to the nort ...
ian weapons systems in retaliation to the shooting down of a US drone being in the Strait of Hormuz and two mine attacks on oil tankers. The attacks disabled Iranian computer systems controlling its rocket and missile launchers. Iran's
Islamic Revolutionary Guard Corps The Islamic Revolutionary Guard Corps (IRGC), also known as the Iranian Revolutionary Guards, is a multi-service primary branch of the Islamic Republic of Iran Armed Forces, Iranian Armed Forces. It was officially established by Ruhollah Khom ...
(IRGC) was specifically targeted.


See also

*
Air Force Cyber Command (Provisional) Air Force Cyber Command (Provisional) (AFCYBER (P)) was a proposed United States Air Force Major Command that existed only in provisional status. On 6 October 2008, the Air Force announced that the command would not be brought into permanent acti ...
* Computer insecurity * Cyber spying * Cyberstrategy 3.0 * Cyber terrorism * Cyberwarfare and China * Cyberwarfare and Iran * Cyberwarfare by Russia * Defense Information Systems Network *
Denial-of-service attack In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host co ...
* Electronic warfare *
Espionage Espionage, spying, or intelligence gathering, as a subfield of the intelligence field, is the act of obtaining secret or confidential information ( intelligence). A person who commits espionage on a mission-specific contract is called an ...
*
Hacker (computer security) A security hacker or security researcher is someone who explores methods for breaching or bypassing defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, pro ...
*
iWar iWar is the term used by NATO to describe a form of Internet-based warfare. iWar comparisons iWar is distinct in that information warfare pertains to issues of intelligence, whereas cyber-warfare and cyber-terrorism pertain to issues oextelligen ...
*
Information warfare Information warfare (IW) is the battlespace use and management of information and communication technology (ICT) in pursuit of a competitive advantage over an opponent. It is different from ''cyberwarfare'' that attacks computers, software, and ...
*
List of cyber attack threat trends A cyberattack (or cyber attack) occurs when there is an unauthorized action against computer infrastructure that compromises the confidentiality, integrity, or availability of its content. The rising dependence on increasingly complex and inte ...
* Penetration testing *
Proactive Cyber Defence Proactive cyber defense means acting in anticipation to oppose an attack through cyber and cognitive domains. Proactive cyber defense can be understood as options between offensive and defensive measures. It includes interdicting, disrupting or d ...
*
Signals intelligence Signals intelligence (SIGINT) is the act and field of intelligence-gathering by interception of ''signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly u ...
* Chinese Intelligence Operations in the United States * Chinese Information Operations and Warfare * Military-digital complex * Economic and Industrial Espionage * U.S. Cyber Command ** Army Cyber Command ** Fleet Cyber Command ** Air Forces Cyber Command ** Marine Corps Forces Cyberspace Command


References


Further reading

* * Smeets, Max (4 July 2022). " A US history of not conducting cyber attacks". ''Bulletin of the Atomic Scientists''. 78 (4): 208–213.
''Obama Order Sped Up Wave of Cyberattacks Against Iran''
wit

1 June 2012 {{DEFAULTSORT:Cyberwarfare In The United States Electronic warfare Hacking (computer security) Military technology Internet in the United States