10 janvier 2020 | International, C4ISR, Sécurité

How tensions with Iran could test a new cyber strategy

Mark Pomerleau

In 2018, the Department of Defense began following a new philosophy for cyber operations to better protect U.S. networks and infrastructure.

Known as “defend forward,” the approach allows U.S. cyber forces to be active in foreign network outside the United States to either act against adversaries or warn allies of impending cyber activity that they've observed on foreign networks.

After the U.S. military killed an Iranian general in a Jan. 2 drone strike and after national security experts said they expect Iran might take some retaliatory action through cyber operations, the specter of increased cyber attacks against U.S. networks puts Cyber Command and its new approach front and center.

“This Iran situation today is a big test of the ‘defend forward' approach of this administration,” James Miller, senior fellow at Johns Hopkins Applied Physics Laboratory and former undersecretary of defense for policy, said at a Jan. 7 event hosted by the Council on Foreign Relations. “Will [Cyber Command] take preventative action? Will they do it in a way that our allies and partners support and that can be explained to the public?”

While Iran fired several missiles Jan. 7 at a base in Iraq where U.S. troops lived as an initial response to the drone strike, many national security experts expect Iran could continue cyber actions as further retaliation for the strike. Iran could also ratchet up its cyber operations in the United States following the collapse of portions of the 2015 nuclear deal between the United States, Iran and five other nations to curb Iran's nuclear weapons capability in return for sanctions relief.

Over the past 12 months, the White House and Congress streamlined many of the authorities used to conduct cyber operations to help cyber forces to get ahead of threats in networks around the world. One such provision in last year's annual defense policy bill provides the Pentagon with the authority to act in foreign networks if Iran, among other named nations, is conducting active, systematic and ongoing campaigns of attacks against the U.S. government or people.

Cyber Command declined to comment on what, if anything, they were doing differently since the drone strike.

Some experts, however, have expressed caution when assessing how well this defend forward approach has worked thus far given it is still relatively new.

“The jury is very much still out here,” Ben Buchanan, assistant professor and senor faculty fellow at Georgetown University, said at the same event. “We don't have a lot of data, there's been a lot of hand-wringing ... about these authorities and about how Cyber Command may or may not be using them. I just don't think we've seen enough to judge whether or not ... [it is] meaningfully changing adversary behavior.”

Others have also expressed reservations about how effective Iran can even be in cyberspace toward U.S. networks.

“Iran is a capable cyber actor, Iran is a wiling cyber actor. That means Iran will conduct cyberattacks,” said Jacquelyn Schneider, Hoover fellow at the Hoover Institution at Stanford University. “It's not like they have this capability and they've been deterred in the past and maybe now they're going to turn it on. I think they've been trying this entire time.”

Complicating matters further could be other actors trying to take advantage of U.S.-Iran imbroglio for their own interests.

Priscilla Moriuchi, senior principal researcher and head of nation-state research at threat intelligence firm Recorded Future, said over the past several months, there have been reports of Russian state-affiliated actors hijacking Iranian cyber infrastructure to conduct operations masquerading as Iranians.

“That creates its own uncertainty,” she said at the same event. “Another level of potential what we call inadvertent escalation if a country perceives that they are attacked by Iran but in reality, it” wasn't.

https://www.fifthdomain.com/dod/2020/01/09/how-tensions-with-iran-could-test-a-new-cyber-strategy/

Sur le même sujet

  • Get a behind the scenes look at how the F-35 is built

    7 novembre 2018 | International, Aérospatial

    Get a behind the scenes look at how the F-35 is built

    https://www.defensenews.com/newsletters/tv-next-episode/2018/11/05/get-a-behind-the-scenes-look-at-how-the-f-35-is-built

  • Airbus to make Eurofighter fit for electronic combat

    30 novembre 2023 | International, Aérospatial

    Airbus to make Eurofighter fit for electronic combat

    The Eurofighter EK is to be NATO-certified by 2030 and will then replace the Tornado in the SEAD (Suppression of Enemy Air Defence) role.

  • Naval Engineers Must 'Lean In' to Advance Technological Agility

    21 juin 2019 | International, Naval

    Naval Engineers Must 'Lean In' to Advance Technological Agility

    BY C. TODD LOPEZ Rebuilding "strategic momentum" and growing advantages in the maritime domain are challenges Chief of Naval Operations Adm. John M. Richardson addressed in "A Design for Maintaining Maritime Superiority, Version 2.0," which updated a 2016 document. At an annual meeting of the American Society of Naval Engineers today in Washington, Richardson said meeting those challenges is a "human problem" that must be met, in part by naval engineers. His plan for how the Navy will maintain maritime superiority relies in part on three aspects of agility. "With the joint force, we will restore agility — conceptual, geographic, and technological — to impose cost[s] on our adversaries across the competition-conflict spectrum," the report reads. For engineers, Richardson focused on their contribution to technological agility. "The technological landscape is changing so fast across all of technology," Richardson said. "It's really fueled by this information revolution that we are in the middle of right now. And so as we think about the Navy as a learning engine in and of itself, restoring these technical agilities is really important. We do need to move at pace." For comparison, the admiral referred back to Dec. 8, 1941 — a day after the bombing at Pearl Harbor. It was then, Richardson said, that the Navy began a quick transition from battleship-based tactics to aircraft carriers and aerial battles. He said the switch in strategy wasn't a surprise for the Navy, because it had been researching and engineering for that possibility for years. "We had been 20 years into naval aviation," he said. "This was not just something that we did as a pickup team on Dec. 8. We had been putting investments in with folks like [Joseph] Reeves and [William] Moffett and all those pioneers of naval aviation. We had evidence. A lot of experimentation, a lot of engineering that had gone into that." Now, Richardson said, the Navy must again have that kind of experimentation, engineering and prototyping to ready it for the next conflict — and it must get on that mission quickly to stay ahead of adversaries. "We do not want to be the second navy on the water with these decisive technologies: the directed energy, unmanned, machine learning, artificial intelligence, etc., you name it," he said. "That's the great challenge now: to get out, start prototyping, get at this pace, plus evidence ... to yield a relevant Navy that is ready to defend America from attack and protect our interests around the world." The admiral said that a knee-jerk reaction might be to cite Defense Department acquisition regulations, like DOD 5000, for inhibiting the type of rapid development, engineering and research he thinks will be needed to maintain maritime dominance. But he said that's not entirely correct. "I think a new set of rules would help," he said. "But this is, I think, a human problem at the end of the day. If we are all biased for action, if we all lean into this, we will get it done. There is nothing that will prohibit us or inhibit us from getting that done if we are all leaning in." https://www.defense.gov/explore/story/Article/1882567/naval-engineers-must-lean-in-to-advance-technological-agility/

Toutes les nouvelles