Information Technology Reference
In-Depth Information
5. CYBERWAR UNDER CONSTRUCTION
The characteristic feature of researches connected with cyberwar phenomena consists
in transformation of cyberwar R&D results into State regulatory documents.
Where we can obtain examples? There is no necessity to prove that the US has a
leading position in R&D of cyberwar and therefore our attempt at finding regulatory
documents in open US sources is justified.
Secretary Rumsfeld in his speech at the National Defense University on January 31,
2002 proclaimed that the US will seek ' to protect information networks from attack' and
'to use information technology to link up different kinds of US forces so that they can in
fact fight jointly'. As a result the 'Joint Task Force-Computer Network Operations'
(JTF-CNO) was established with the mission: 'Subject to the authority and direction of
the commander, US Strategic Command, JTF-CNO will, in conjunction with the unified
commands, services and DOD agencies, coordinate and direct the defense of DOD
computer systems and networks; coordinate and, when directed, conduct computer
network attack in support of combatant commanders' and national objectives.'
We can obtain information from the Summary (ibid) that: 'Computer Network
Operations are comprised of two specific yet complementary mission areas: Computer
Network Defense (CND) and Computer Network Attack (CNA). The CND mission is to
defend DOD computer networks and systems from any unauthorized event whether it be
a probe, scan, virus incident, or intrusion. The CNA mission is to coordinate, support and
conduct, at the direction of the President, computer network attack operations in support
of regional and national objectives.' 17
Major General James D. Bryan in his statement has described in more detail the
activity plan of the JTF-CNO and, in particular, has informed, that 'The JTF-CNO...
provide the first line of defense against cyberattack. This permits the JTF-CNO
commander to leverage assets, contain threats, and take effective and rapid
countermeasures to any cyberattack. The objective is to standardize reporting as well as
response activities on industry and Government best practices. This standardization will
improve the quality, consistency, and effectiveness of DOD computer network attack
responses.' 18 The quite justified reticence does not allow us to understand how the JTF-
CNO will carry out these DOD computer network attack responses, but allows us to relay
the following statement from Richard Clark: 'we have capabilities, we have
organizations; we do not yet have an elaborated strategy, doctrine, procedures' .
Besides, we can obtain some useful information by comparing the texts of the Draft of
the 'National Strategy to Secure Cyberspace 2002' and the 'National Strategy to Secure
Cyberspace 2003'. Our investigations of distinctions in texts and ways of use of the terms
in the Draft and in the next document can help us to understand the ontogenesis of the
conception of cyberwar. For example, the term cyberwar is used in the Draft only on
page 13 as a synonym of cyberattack:
x “The law enforcement and national security community should develop a system
to detect a national cyberattack (cyberwar) and a plan for immediate response.
As part of this process, the appropriate entities should establish requirements and
options” (page 13).
However, the term cyberwar is no longer used in the 'National Strategy to Secure
Cyberspace 2003', but is now a cyberattack. All further logic inferences were carried out
on the basis of this term only, including the defining of the 'Strategic Objectives':
x Prevent cyberattacks against America's critical infrastructures
Search WWH ::




Custom Search