Worried About the New Cyber Command?

Air Force Aims for ‘Full Control’ of ‘Any and All’ Computers

By Noah Shachtman Email Author | May 13, 2008

The Air Force wants a suite of hacker tools, to give it "access" to — and "full control" of — any kind of computer there is. And once the info warriors are in, the Air Force wants them to keep tabs on their "adversaries’ information infrastructure completely undetected."


The government is growing increasingly interested in waging war online. The Air Force recently put together a "Cyberspace Command," with a charter to rule networks the way its fighter jets rule the skies. The Department of Homeland Security, Darpa, and other agencies are teaming up for a five-year, $30 billion "national cybersecurity initiative." That includes an electronic test range, where federally-funded hackers can test out the latest electronic attacks. "You used to need an army to wage a war," a recent Air Force commercial notes. "Now, all you need is an Internet connection."


On Monday, the Air Force Research Laboratory introduced a two-year, $11 million effort to put together hardware and software tools for "Dominant Cyber Offensive Engagement." "Of interest are any and all techniques to enable user and/or root level access," a request for proposals notes, "to both fixed (PC) or mobile computing platforms… any and all operating systems, patch levels, applications and hardware." This isn’t just some computer science study, mind you; "research efforts under this program are expected to result in complete functional capabilities."

Unlike an Air Force colonel’s proposal, to knock down enemy websites with military botnets, the Research Lab is encouraging a sneaky, "low and slow" approach. The preferred attack consists of lying quiet, and then "stealthily exfiltrat[ing] information" from adversaries’ networks.

But, in the end, the Air Force wants to see all kinds of "techniques and technologies" to "Deceive, Deny, Disrupt, Degrade, [or] Destroy"
hostile systems. And "in addition to these main concepts," the Research Lab would like to see studies into "Proactive Botnet Defense Technology Development," the

"reinvent[ion of] the network protocol stack" and new antennas, based on carbon nanotubes.

raditionally, the military has been extremely reluctant to talk much about offensive operations online. Instead, the focus has normally been on protecting against electronic attacks. But in the last year or so, the tone has changed — and become more bellicose. “Cyber, as a warfighting domain . . . like air, favors the offense,”
said Lani Kass, a special assistant to the Air Force Chief of Staff who previously headed up the service’s Cyberspace Task Force. "If you’re defending in cyber, you’re already too late."

"We want to go in and knock them out in the first round," added Lt. Gen. Robert Elder, commander of the 8th Air Force, which focuses on network issues.


"An adversary needs to know that the U.S.
possesses powerful hard and soft-kill (cyberwarfare) means for att...
and command and support systems at all levels," a recent Defense Department report notes. "Every potential adversary, from nation states to rogue individuals…
should be compelled to consider… an attack on U.S. systems resulting in highly undesireable consequences to their own security."

Views: 67

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

Comment by Marklar on July 9, 2009 at 6:32am
""reinvent[ion of] the network protocol stack" and new antennas, based on carbon nanotubes."

From the little I know the carbon nano-tube antenna should be at least several years off at least but it don't bode well. I have some faith that hackers will outwit them as always and give us the technology to defeat most everything they come up with aside from basically shutting down the internet completely. Can't really tell for sure what will happen in the future though or I'd win a few superball lottos and bug off to a private island with no natural resources worth killing me over.

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega posted blog posts
4 hours ago
cheeki kea favorited tjdavis's blog post GenAI fueling employee impersonation with biometric spoofs and counterfeit ID fraud
14 hours ago
Doc Vega's blog post was featured

Blue Eyed and Blonde

I fell in love with her the very first timeShe was never subtle and hardly sublimeEven her mother…See More
yesterday
cheeki kea commented on cheeki kea's video
Sunday
cheeki kea posted a video

FULL Body Language Analysis of Trump and Zelenskyy's MELTDOWN

Download my FREE 100+ Body Language and Persuasion tips, here:https://knesix.com/tipsChapters:0:00 Intro1:40 Critical context of the ceasefire agreement6:04 ...
Sunday
tjdavis posted videos
Saturday
tjdavis posted a blog post
Saturday
rlionhearted_3 posted photos
Saturday
Doc Vega posted a blog post

The Illusion of a Fair Big Government

 What is government and what is it supposed to be? Government is a political institution that…See More
Friday
Doc Vega posted a blog post

Who is Really Behind the UAP Threat?

According to Steven Greer under the aegis of his “Disclosure Project” the first anti-gravity…See More
Feb 26
tjdavis's 4 blog posts were featured
Feb 26
Doc Vega's 5 blog posts were featured
Feb 26
Less Prone favorited tjdavis's video
Feb 26
Burbia commented on tjdavis's video
Feb 26
tjdavis favorited Doc Vega's blog post Social Engineering Nightmare
Feb 25
tjdavis posted videos
Feb 25
cheeki kea commented on cheeki kea's photo
Thumbnail

oh deary me

"Looks like the tables are turning and a change of sides might come into play. New memes out and…"
Feb 25
cheeki kea posted a photo
Feb 25
Doc Vega posted a blog post

Social Engineering Nightmare

 My brain is moving kind of slowAfter my 15th MRNA injection don’t you know?Can’t really say if…See More
Feb 24
tjdavis posted videos
Feb 23

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted