![]() | This article has multiple issues. Please help improve it or discuss these issues on the talk page . (Learn how and when to remove these messages)
|
Cyberwarfare is the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes. As a major developed economy, the United States is highly dependent on the Internet and therefore greatly exposed to cyber attacks. At the same time, the United States has substantial capabilities in both defense and offensive power projection thanks to comparatively advanced technology and a large military budget. Cyberwarfare presents a growing threat to physical systems and infrastructures that are linked to the internet. Malicious hacking from domestic or foreign enemies remains a constant threat to the United States. In response to these growing threats, the United States has developed significant cyber capabilities.
The United States Department of Defense recognizes the use of computers and the Internet to conduct warfare in cyberspace as a threat to national security, but also as a platform for attack. [1] [2]
The United States Cyber Command centralizes command of cyberspace operations, organizes existing cyber resources and synchronizes defense of U.S. military networks. It is an armed forces Unified Combatant Command. A 2021 report by the International Institute for Strategic Studies placed the United States as the world's foremost cyber superpower, taking into account its cyber offense, defense, and intelligence capabilities. [3]
Part of a series on |
War (outline) |
---|
![]() |
Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. [4] Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic warfare.
There is significant debate among experts regarding the definition of cyberwarfare, and even if such a thing exists. [5] One view is that the term is a misnomer since no cyber attacks to date could be described as a war. [6] An alternative view is that it is a suitable label for cyber attacks which cause physical damage to people and objects in the real world. [7]
Many countries, including the United States, United Kingdom, Russia, China, Israel, Iran, and North Korea, [8] [9] [10] [11] have active cyber capabilities for offensive and defensive operations. As states explore the use of cyber operations and combine capabilities, the likelihood of physical confrontation and violence playing out as a result of, or part of, a cyber operation is increased. However, meeting the scale and protracted nature of war is unlikely, thus ambiguity remains. [12]
The first instance of kinetic military action used in response to a cyber-attack resulting in the loss of human life was observed on 5 May 2019, when the Israel Defense Forces targeted and destroyed a building associated with an ongoing cyber-attack. [13] [14]In September 2023, Department of Defense (DoD) published its latest Cyber Strategy, building upon the previous DoD Strategy for Operating in Cyberspace published in April 2015 and July 2011. [15] The DoD Cyber strategy focuses on building capabilities to protect, secure, and defend its own DoD networks, systems and information; defend the nation against cyber attacks; and support contingency plans. This includes being prepared to operate and continue to carry out missions in environments impacted by cyber attacks.
The DoD outlines three cyber missions:
In addition, the Cyber Strategy emphasizes the need to build bridges to the private sector, so that the best talent and technology the United States has to offer is at disposal to the DoD. [16]
1. Build and maintain ready forces and capabilities to conduct cyberspace operations;
2. Defend the DoD information network, secure DoD data, and mitigate risks to DoD missions;
3. Be prepared to defend the U.S. homeland and U.S. vital interests from disruptive or destructive cyber attacks of significant consequence;
4. Build and maintain viable cyber options and plan to use those options to control conflict escalation and to shape the conflict environment at all stages;
5. Build and maintain robust international alliances and partnerships to deter shared threats and increase international security and stability.
The five pillars is the base of the Department of Defense's strategy for cyber warfare. The first pillar is to recognize that the new domain for warfare is cyberspace and that it is similar to the other elements in the battlespace. The key objectives of this pillar are to build up technical capabilities and accelerate research and development to provide the United States with a technological advantage. The second pillar is proactive defenses as opposed to passive defense. Two examples of passive defense are computer hygiene and firewalls. The balance of the attacks requires active defense using sensors to provide a rapid response to detect and stop a cyber attack on a computer network. This would provide military tactics to backtrace, hunt down and attack an enemy intruder. The third pillar is critical infrastructure protection (CIP) to ensure the protection of critical infrastructure by developing warning systems to anticipate threats. The fourth pillar is the use of collective defense which would provide the ability of early detection, and incorporate it into the cyber warfare defense structure. The goal of this pillar is to explore all options in the face of a conflict, and to minimize loss of life and destruction of property. The fifth pillar is building and maintaining international alliances and partnerships to deter shared threats, and to remain adaptive and flexible to build new alliances as required. This is focused on "priority regions, to include the Middle East, Asia-Pacific, and Europe". [16]
Shortly after his election in 2016, U.S. President Donald Trump pledged to deliver an extensive plan to improve U.S. cybersecurity within 90 days of his inauguration. [17] Three weeks after the designated 90-day mark, he signed an executive order that claimed to strengthen government networks. [18] [19] By the new executive order, federal-agency leaders are to be held responsible for breaches on their networks and federal agencies are to follow the National Institute of Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity in consolidating risk management practices. In addition, the federal departments were to examine cyber defense abilities of agencies within 90 days, focusing on "risk mitigation and acceptance choices" and evaluating needs for funding and sharing technology across departments. Experts in cybersecurity later claimed that the order was "not likely" to have a major impact. [20]
In September 2018, President Trump signed the National Cyber Strategy- "the first fully articulated cyber strategy for the United States since 2003." [21] John Bolton, the National Security Advisor, claimed in September 2018 that the Trump administration's new "National Cyber Strategy" has replaced restrictions on the use of offensive cyber operations with a legal regime that enables the Defense Department and other relevant agencies to operate with a greater authority to penetrate foreign networks to deter hacks on U.S. systems. Describing the new strategy as an endeavor to "create powerful deterrence structures that persuade the adversary not to strike in the first place," Bolton added that decision-making for launching attacks will be moved down the chain of command from requiring the president's approval. [22]
The Defense Department, in its strategy document released in September 2018, further announced that it would "defend forward" U.S. networks by disrupting "malicious cyber activity at its source" and endeavor to "ensure there are consequences for irresponsible cyber behavior" by "preserving peace through strength." [23]
The National Cyber Strategy has also garnered criticisms that evaluating acts of cyberwarfare against the United States still remains ambiguous, as the current U.S. law does not specifically define what constitutes an illegal cyber act that transcends a justifiable computer activity. The legal status of most information security research in the United States is governed by 1986 Computer Fraud and Abuse Act, which was derided to be "poorly drafted and arbitrarily enforced" by enabling prosecution of useful information security research methods such as Nmap or Shodan. As even the needed services fall into prohibition, top-level information security experts find it challenging to improve the infrastructure of cyberdefense. [24]
In 2011, The White House published an "International Strategy for Cyberspace" that reserved the right to use military force in response to a cyberattack: [25] [26]
When warranted, the United States will respond to hostile acts in cyberspace as we would to any other threat to our country. We reserve the right to use all necessary means – diplomatic, informational, military, and economic – as appropriate and consistent with applicable international law, in order to defend our Nation, our allies, our partners, and our interests. In so doing, we will exhaust all options before military force whenever we can; will carefully weigh the costs and risks of action against the costs of inaction; and will act in a way that reflects our values and strengthens our legitimacy, seeking broad international support whenever possible.
In 2013, the Defense Science Board, an independent advisory committee to the U.S. Secretary of Defense, went further, stating that "The cyber threat is serious, with potential consequences similar in some ways to the nuclear threat of the Cold War," [27] and recommending, in response to the "most extreme case" (described as a "catastrophic full spectrum cyber attack"), that "Nuclear weapons would remain the ultimate response and anchor the deterrence ladder." [28]
In June 2010, Iran was the victim of a cyber attack when its nuclear facility in Natanz was infiltrated by the cyber-worm 'Stuxnet', said to be the most advanced piece of malware ever discovered and significantly increased the profile of cyberwarfare. [29] [30] It destroyed perhaps over 1,000 nuclear centrifuges and, according to a Business Insider article, "[set] Tehran's atomic program back by at least two years." [31]
Despite a lack of official confirmation, Gary Samore, White House Coordinator for Arms Control and Weapons of Mass Destruction, made a public statement, in which he said, "we're glad they [the Iranians] are having trouble with their centrifuge machine and that we—the US and its allies—are doing everything we can to make sure that we complicate matters for them", offering "winking acknowledgement" of US involvement in Stuxnet. [32]
In June 2013, Edward Snowden, a former National Security Agency (NSA) contractor, said the United States government had hacked into Chinese mobile phone companies to collect text messages, had spied on Tsinghua University and had its spy agencies watch China and Hong Kong for years. [33] In March 2014, the New York Times (NYT) disclosed classified documents which were provided by Edward Snowden that showed the NSA had infiltrated the servers in Huawei's headquarters. The NYT said that although an initial goal of the agency was to find links between the company and China's military, subsequent ones went further and included exploiting Huawei’s technology such that its equipment could be used by the agency to conduct surveillance and, if ordered by the president, offensive cyberoperations against its users. [34]
In 2020, a Chinese cybersecurity firm publicly attributed a cyber espionage campaign to a US government agency. [35] : 219–220
In March, April, and June 2022, China's National Computer Virus Emergency Response Center (CVERC) posted technical analysis which attributed cyber attacks into Chinese networks to US government agencies. [35] : 221 Cybersecurity analysts interviewed by Wired said the details relied on information which had been publicly available for years and that its disclosure was useful for the country's propaganda campaigns. [36]
In September 2022, CVERC accused the NSA of carrying out a series of cyberattacks against Northwestern Polytechnical University as part of tens of thousands of “malicious network attacks” that it said the agency conducted against Chinese targets. [37] [38] The United States has said the university has conducted extensive military research and its department of Commerce has put the university on its entity list. [38]
In April 2025, CVERC said the information systems for the 2025 Asian Winter Games which it hosted were subjected to more than two hundred thousand foreign cyberattacks and accused the United States of being behind most of the attacks. [39] CVERC said that the attacks did not cause significant damage, and condemned cyberattacks targeting major international events. [40] The allegation were made in the midst of a trade war between the US and China and after the US accused Beijing of carrying out a cyberespionage campaign that targeted US-based critics of Beijing. [41]
In June 2019, Russia said that its electrical grid could be under cyber-attack by the United States. [42] The New York Times reported that American hackers from the United States Cyber Command planted malware potentially capable of disrupting the Russian electrical grid. [43]
The Pentagon has had an information sharing arrangement, the Defense Industrial Base Cybersecurity and Information Assurance (DIBCIA) program, in place with some private defense contractors since 2007 [51] to which access was widened in 2012. [52] A number of other information sharing initiatives such as the Cyber Intelligence Sharing and Protection Act (CISPA) and Cybersecurity Information Sharing Act (CISA) have been proposed, but failed for various reasons including fears that they could be used to spy on the general public.
The United States Cyber Command (USCYBERCOM) is a United States Armed Forces Unified Combatant Command. USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: defend Department of Defense information networks and; prepare to conduct "full spectrum military cyberspace operations" to ensure US/Allied freedom of action in cyberspace and deny the same to adversaries. [53]
The Army Cyber Command (ARCYBER) is an Army component command for the U.S. Cyber Command. [54] ARCYBER has the following components:
New cyber authorities have been granted under National Security Presidential Memorandum (NSPM) 13; [58] persistent cyber engagements at Cyber command are the new norm for cyber operations. [59]
United States Marine Corps Forces Cyberspace Command is a functional formation of the United States Marine Corps to protect infrastructure from cyberwarfare. [60]
The Sixteenth Air Force (16 AF) is the United States Air Force component of United States Cyber Command (USCYBERCOM). [61] It has the following components:
The F-15 and C-130 systems are being hardened from cyber attack as of 2019. [62]
The Navy Cyber Forces (CYBERFOR) is the type of some commanders for the U.S. Navy's global cyber workforce. The headquarters is located at Joint Expeditionary Base Little Creek-Fort Story. CYBERFOR provides forces and equipment in cryptology/signals intelligence, cyber, electronic warfare, information operations, intelligence, networks, and space. In September 2013, the United States Naval Academy will offer undergraduate students the opportunity, to major in Cyber Operations for the United States. [63]
Fleet Cyber Command is an operating force of the United States Navy responsible for the Navy's cyber warfare programs. [64] Tenth Fleet is a force provider for Fleet Cyber Command. [65] The fleet components are: