10 janvier 2020 | International, C4ISR, Sécurité

How tensions with Iran could test a new cyber strategy

Mark Pomerleau

In 2018, the Department of Defense began following a new philosophy for cyber operations to better protect U.S. networks and infrastructure.

Known as “defend forward,” the approach allows U.S. cyber forces to be active in foreign network outside the United States to either act against adversaries or warn allies of impending cyber activity that they've observed on foreign networks.

After the U.S. military killed an Iranian general in a Jan. 2 drone strike and after national security experts said they expect Iran might take some retaliatory action through cyber operations, the specter of increased cyber attacks against U.S. networks puts Cyber Command and its new approach front and center.

“This Iran situation today is a big test of the ‘defend forward' approach of this administration,” James Miller, senior fellow at Johns Hopkins Applied Physics Laboratory and former undersecretary of defense for policy, said at a Jan. 7 event hosted by the Council on Foreign Relations. “Will [Cyber Command] take preventative action? Will they do it in a way that our allies and partners support and that can be explained to the public?”

While Iran fired several missiles Jan. 7 at a base in Iraq where U.S. troops lived as an initial response to the drone strike, many national security experts expect Iran could continue cyber actions as further retaliation for the strike. Iran could also ratchet up its cyber operations in the United States following the collapse of portions of the 2015 nuclear deal between the United States, Iran and five other nations to curb Iran's nuclear weapons capability in return for sanctions relief.

Over the past 12 months, the White House and Congress streamlined many of the authorities used to conduct cyber operations to help cyber forces to get ahead of threats in networks around the world. One such provision in last year's annual defense policy bill provides the Pentagon with the authority to act in foreign networks if Iran, among other named nations, is conducting active, systematic and ongoing campaigns of attacks against the U.S. government or people.

Cyber Command declined to comment on what, if anything, they were doing differently since the drone strike.

Some experts, however, have expressed caution when assessing how well this defend forward approach has worked thus far given it is still relatively new.

“The jury is very much still out here,” Ben Buchanan, assistant professor and senor faculty fellow at Georgetown University, said at the same event. “We don't have a lot of data, there's been a lot of hand-wringing ... about these authorities and about how Cyber Command may or may not be using them. I just don't think we've seen enough to judge whether or not ... [it is] meaningfully changing adversary behavior.”

Others have also expressed reservations about how effective Iran can even be in cyberspace toward U.S. networks.

“Iran is a capable cyber actor, Iran is a wiling cyber actor. That means Iran will conduct cyberattacks,” said Jacquelyn Schneider, Hoover fellow at the Hoover Institution at Stanford University. “It's not like they have this capability and they've been deterred in the past and maybe now they're going to turn it on. I think they've been trying this entire time.”

Complicating matters further could be other actors trying to take advantage of U.S.-Iran imbroglio for their own interests.

Priscilla Moriuchi, senior principal researcher and head of nation-state research at threat intelligence firm Recorded Future, said over the past several months, there have been reports of Russian state-affiliated actors hijacking Iranian cyber infrastructure to conduct operations masquerading as Iranians.

“That creates its own uncertainty,” she said at the same event. “Another level of potential what we call inadvertent escalation if a country perceives that they are attacked by Iran but in reality, it” wasn't.

https://www.fifthdomain.com/dod/2020/01/09/how-tensions-with-iran-could-test-a-new-cyber-strategy/

Sur le même sujet

  • Can the Army protect essential but ‘unloved’ programs in future budgets?

    17 mai 2021 | International, Terrestre

    Can the Army protect essential but ‘unloved’ programs in future budgets?

    Future budgets are poised to shrink and weapons and equipment still critical to the U.S. Army, but not in the top priority list, are sitting ducks.

  • SASC chairman: We must build the national security innovation base our defense strategy requires

    3 décembre 2019 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

    SASC chairman: We must build the national security innovation base our defense strategy requires

    By: Sen. Jim Inhofe Since World War II, the American people have believed our military has had the best of everything, but the technological superiority that kept us 20 years ahead of our competitors has rapidly diminished. In some cases, we're already behind. By 2030, unless we pursue “urgent change at significant scale,” as former Defense Secretary Gen. James Mattis put it, it's likely the U.S. will face an enemy with superior weapons, superior equipment and superior capabilities. Nowhere is this better illustrated than in our strategic competition with China. China used to just steal our technology. Now, through heavy investment, they are improving it. The result? China is outpacing the U.S. in key areas like hypersonic weapons, artificial intelligence and biotechnologies — not to mention conventional capabilities. China isn't the only one. Technological development is accelerating across the globe, expanding to more actors and changing the very nature of war. We can't afford to let our advantage erode further. It is up to the Department of Defense and Congress to make sure that the defense-industrial base becomes, as the National Defense Strategy demands, an “unmatched 21st century National Security Innovation Base.” If we want to “sustain security and solvency,” we need to consider wholesale change to industry culture and its interface with the Department of Defense, shed outdated management processes, and reimagine a resilient supply chain that mitigates 21st century risks. This begins with software, which is foundational to military capability. The DoD and its traditional hardware-dominant industry partners have been behind on software in almost every way — talent, tools, development and delivery processes. Software innovation has failed in countless DoD programs, including the Ford-class carrier, the F-35′s Autonomic Logistics Information System and the GPS next-generation operational control system. Instead of taking the Pentagon for granted as an endless source of cash flow, partners must refocus their attention on delivering secure capability that actually works. Next, the Department of Defense needs to continue to expand capacity — prioritizing speed of delivery and adapting its systems to maximize value and output. For too long we have been slow to expand our stockpiles of fifth-generation weapons required to fight peer adversaries. The second production line for JASSM-ER cruise missiles is a good start toward building the capacity needed to retain advantages that will make any enemy think twice before attacking. We must do the same for other fifth-generation weapons, including air-to-air missiles. Shipbuilding, including aircraft carriers, surface ships, submarines and our logistics fleet, is another area where our capacity is severely limited. The Chinese People's Liberation Army Navy, which recently surpassed ours in size, is on track to reach 400 ships in 2025 and is nearly self-sufficient for all components. Size of the fleet isn't a sole consideration. We've focused on ensuring the capability of our fleet remains unmatched and bolstering suppliers of critical components, but we must also improve the construction performance of lead ships in new classes to maintain and build upon our capability advantage. The last thing we want is a fair fight. Innovation is best done at the subsystem level through a rigorous engineering-based process centered on building knowledge through full-scale prototypes, which can then inform ship design. We are eager to work with the Navy to identify and fund more of these prototypes, which will serve as the building blocks of the future fleet. We also must accelerate innovation. Recent defense authorization legislation encourages the DoD to streamline acquisition, take a business-minded approach to contracting, and tap into nontraditional suppliers and public-private partnerships. This must continue. Dilapidated testing infrastructure is holding us back from catching up to our enemies. Just look at hypersonic weapons: Beijing is parading around dozens of its newest weapons, and we have yet to build one. The DoD has looked to Silicon Valley, but we are competing with Chinese influence there as well, and the Pentagon has often proven an impossible customer due to its antiquated bureaucracy. Any technological improvements will be meaningless if vulnerable to being infiltrated or stolen. Recent legislation continues support for the DoD as it assesses and mitigates risks to its supply chains posed by adversaries. Both the government and contractors need to cooperate on and use modern verification tools to identify trusted suppliers and manufacturers, as well as fix vulnerabilities. To make these tools useful, the DoD must first establish a working digital model of its suppliers. Lastly, while we must continue to invest in the domestic, organic industrial base, it's important to remember that we can't take on China and Russia alone — which is why the National Defense Strategy emphasizes our network of allies and partners. We must remove unnecessary barriers to industrial cooperation that degrade our collective competitive edge. We do not have to make a false choice between investing domestically and in our allies — we can do both. Under our National Technology and Industrial Base partnership with Canada, Australia and the United Kingdom, we can develop a more diverse, resilient industrial base, secure our supply chains, and become a “five eyes for defense procurement.” It's in our best interest to ensure our allies can leverage our technological advantages and we can leverage theirs. Without a strong national security innovation base, the Pentagon cannot implement the National Defense Strategy. Congress' job is to put the appropriate, tailored policy in place and provide sufficient, predictable resources to help the industrial base meet these challenges. Together, we can harness the power of American innovation to ensure that we are able to win the wars of the future. Sen. Jim Inhofe, R-Okla., is the chairman of the Senate Armed Services Committee. https://www.defensenews.com/outlook/2019/12/02/sasc-chairman-we-must-build-the-national-security-innovation-base-our-defense-strategy-requires/

  • Australia and Japan deepen defence ties - APDR

    15 août 2023 | International, Sécurité

    Australia and Japan deepen defence ties - APDR

    Australia and Japan are strengthening our defence ties with the Japan-Australia Reciprocal Access Agreement (RAA) coming into effect.

Toutes les nouvelles