- House and Senate negotiators reach two-year budget deal
- Congress seeks ban on in-flight calls
- Michelle Malkin’s Twitchy site sold to owners of Townhall, HotAir: report
- GM’s Barra to be first woman to run top American carmaker
- China: Poisonous smog is a military asset, if you think about it
- Texas woman admits to sending ricin to Obama
- Ron Paul on son Rand: ‘I think he probably will’ run for president
- Cold War heats up again in the Arctic: Russian airfield reactivated after 20 years
- 6-year-old boy suspended for sexual harassment over kiss
- Voters deciding Mass. congressional contest
Inside the Ring: NSA on cyberwar
But for the super-secret National Security Agency, cyberwarfare is nothing new.
The electronic spying and code-breaking agency provided a rare public look at its views on cyberwarfare by releasing this month redacted copies of its internal newsletter, which show that NSA has been engaged in cyberwarfare for more than a decade.
A 1997 article published in the once-classified newsletter Cryptolog was written by legendary NSA official Bill Black. He stated that the agency received the mission for Computer Network Attack (CNA) — offensive cyberwarfare — on March 3, 1997, from then-Defense Secretary William S. Cohen.
“This delegation of authority has added a new, third dimension to NSA’s ‘one mission’ future,” Mr. Black, at the time a special assistant to the NSA director for information operations, stated in the spring 1997 issue. “That is, in the networked world of Cyberspace, CNA technology is the natural companion of NSA’s exploit and protect functions.”
Other sections of the newsletter were heavily redacted and labeled “Top Secret Umbra,” the code word used to protect electronic intelligence.
Under a section headlined “The Future of Warfare is Warfare in Cyberspace,” Mr. Black, who rose to NSA deputy director before retiring, said information warfare provides “digital coercion” as a military and political option for leaders.
“The primary target of this option is the information infrastructure of an adversary,” he said. “Such information infrastructures are expected to be primarily computer controlled, operated by the commercial-civilian sector (unprotected), and the primary infrastructure upon which military forces almost totally depend.”
Future warfare will involve attacking computer-controlled infrastructure with the aim of degrading, disrupting or destroying networks and rendering computers “intelligence ‘targets’ of the highest priority,” he said.
“There are specific types of weapons associated with Information Warfare,” Mr. Black wrote. “These include viruses, worms, logic bombs, trojan horses, spoofing, masquerading, and ‘back’ or ‘trap’ doors. They are referred to as ‘tools’ or ‘techniques’ even though they may be pieces of software. They are publicly available, very powerful, and, if effectively executed, extremely destructive to any society’s information infrastructure.”
As a result, information warriors will need to be expert in understanding the virtual world and have extensive knowledge of non-military targets. Military cyberwarriors will be the “tooth,” and civilians will be the “tail” in what the military calls the tooth-to-tail — frontline and support — relationship in warfare.
Mr. Black stated that the new information age that has emerged since the end of the Cold War is engulfing every aspect of society, including electronic spying. It has produced the need to consolidate what he termed “cyberology” along with cryptology.
“Cyberology’s central activities, i.e., ‘exploitation,’ ‘protection,’ and ‘attack,’ will be worked together, thus benefiting all of them,” he stated.
Just as many viewed industrialists and capitalists during the industrial age as the problem, “in today’s age, the public has centered in on government as ‘the problem,’” he wrote.
“Specifically, the focus is on the potential abuse of the government’s applications of this new information technology that will result in an invasion of personal privacy,” he said. “For us, this is difficult to understand. We are ‘the government,’ and we have no interest in invading the personal privacy of U.S. citizens.”
© Copyright 2013 The Washington Times, LLC. Click here for reprint permission.
About the Author
Bill Gertz is a national security columnist for The Washington Times and senior editor at The Washington Free Beacon (www.freebeacon.com). He has been with The Times since 1985.
He is the author of six books, four of them national best-sellers. His latest book, “The Failure Factory,” on government bureaucracy and national security, was published in September 2008.
- Inside the Ring: China targeting U.S. spy flights amid escalating tensions
- Inside the Ring: Tensions high during Joe Biden's Beijing visit
- Inside the Ring: U.S. funds China's nuclear security
- Inside the Ring: Danger of China conflict grows
- Inside the Ring: North Korean missiles deemed a serious threat to U.S.
By Donald Lambro
Growth spikes are little more than trend-free anomalies
- Harry Reid's visa pressure cooker
- Obama takes 'selfie' at Mandela's funeral service
- Chinese man fed up with his girlfriend's shopping jumps to his death
- American bourbon now better than Scottish whiskey: U.K.-born expert
- Somber duty: U.S. presidents in hot demand at Mandela's memorial
- FITTON: A closer look at the Benghazi lie
- Obama shakes hands with Cuba's Raul Castro at Nelson Mandela's funeral
- 6-year-old boy suspended for sexual harassment over kiss
- CARSON: Why did the founders give us the Second Amendment?
- Israeli P.M. Benjamin Netanyahu backs out of Nelson Mandela funeral
Independent voices from the The Washington Times Communities
The “Silver Tsunami” created by aging Baby Boomers is hitting America. Let’s explore how we adjust to it, enjoy it and defy negative expectations about age.
Find the latest news and happening that effect those in the Washington D.C., Northern Virginia and Maryland Metro region.
Global economy, the civilizing power of markets and public morals.
News and opinion from a Millennial Urbanite with Southern sensibilities,
White House pets gone wild!
Let it snow