American cyber warriors are preparing for "defense"

12
The US Army intends to create additional cyber divisions, said the head of the US Cybernet Command, Edward Cardon. The Pentagon will work on this task in the next three years. According to Cardon, the American army does not need such cyber subunits on a permanent basis. Obviously, the “fighters” of the computer front were needed by the USA to counter the “Russian threat”.

American cyber warriors are preparing for "defense"


Cardon's statement in the Russian segment of the Internet appeared on the English-language website of the agency "Sputnik".

Let's take a look at it.

According to the head of the US Cyber ​​Command Command Edward Cardon, in the next few years, the US Army intends to recruit additional officers who will not become part of the existing army units.

Currently, according to a military official, the army is looking for ways and means of mobilizing people for cyber command. The question of their future subordination is also being studied.

“They hardly need for a whole year. Usually they are needed for about ten days, ”Cardon shared some details.

Mr. Cardon is seriously examining the question of whether the United States should not use the Estonian model of "cyber militia". According to this scheme, hundreds of citizens undergo appropriate training and can be called to serve as a voluntary “cyber force”.

Cardon promises that “within the next three years” there will be “a lot of work” in this direction.

This “work,” we add, did not originate from scratch.

In April, the Pentagon's 2015 announced a new cyberwarfare strategy. It was presented to the public by Secretary of Defense Ashton Carter himself. This newspaper told "New York Times".

As journalist David Sanger noted with irony in his article, the Pentagon’s move was designed to “scare potential cyber-enemies”.

The strategy spells out “circumstances” in which “cyber-weapon” can be used against the “aggressor”. The document cited a list of the states that are the “greatest threat” to the United States: Russia, China, Iran, North Korea.

US Secretary of Defense Ashton Carter voiced the basics of the document publicly at a speech at Stanford University. The journalist points out that only from January to April, 2015, did the White House administration four times announce new cyber strategies.

Ironically, the correspondent notes that the Obama administration formulates the circumstances in which the United States will inflict cyber attacks, but at the same time, the strategists for some reason "forgot to write about the main role played by the United States in the large-scale cyber-security program of Iran."

Another interesting point. In his speech at Stanford, Carter reported (for the first time) that a few months ago, the Pentagon was attacked by cyber attackers. Allegedly network hacked "Russian hackers." True, a team of American cyber fighters quickly "shed" them out of the network.

About 2% cyber attacks on US systems may require a nationwide response. They will be coordinated by the Pentagon under the auspices of Cyber ​​Command.

With regard to preventive cyber attacks, then decisions about them, obviously, will be taken by the “President or the Minister of Defense”. This is stated in the strategy itself, indicating that the US Army to protect the interests of the homeland may need to conduct cyber operations in order to disrupt the enemy’s networks or its infrastructure related to the military sphere. The publication indicates that the US army can conduct cyber operations to end the ongoing conflict on the terms of Washington or disrupt the operation of the enemy’s military systems and thereby prevent the use of force that threatens the interests of the United States. The correspondent suggested that such a text contains loopholes that allow the Pentagon to conduct preventive cyber attacks.

Americans solve quite a trivial task, said "Free Press" Corresponding Member of RARAN, Doctor of Military Sciences Konstantin Sivkov.

“This is the transfer of the experience of organizing hostilities to the cyber sphere,” the expert noted. - You can draw an analogy with the creation of operational commands. That is, a tactical group is created for solving a specific task. In contrast to the traditional armed confrontation, a wider range of tasks is being solved within the framework of the “cyber war”. ”

According to Sivkov, due to the many-sidedness of cyber war, similar approaches to it practically do not exist. Therefore, it is impossible to keep the units on a permanent basis to perform specific operations. “It is much easier to form a“ shock group ”for a specific goal, the expert believes. - For example, to influence the psychological state of the whole division before the offensive. Solved this problem, and the division of "information killers" disbanded. " And only then “they start destabilizing the sociopolitical situation in a particular region of a particular country”.

Military expert Vladimir Shcherbakov believes that “cybergroups” can play the role of hackers for the Pentagon.

“Suppose,” he said, “SP”, “if you disable the national payment system, organize a panic on the stock exchange or in the banking system, it will not seem like a little. Only stealing money from bank accounts will not be private individuals, but mercenaries acting on the order of the US military or their top political leadership. ”

Analysts believe that as military equipment becomes more complex, conventional wars will give way to wars based on other principles. “We know,” he noted, “that the armies of many countries actively use shock Drones, the human factor in the management of which is minimized. If your radio-electronic components become more complex, their software, more and more equipment is used in automatic mode, respectively, the possibilities of remote destruction of these systems with the help of, relatively speaking, “cyber weapons” increase. It is clear that it will not work to influence the ax in this way.

Most recently, in January 2016, we add to this, the main person from the NSA boasted about cyber-sums of the USA. As we can see, not only the Pentagon plows the fertile "niva" of cyberwar.

January 21 The Wall Street Journal There was an article telling about a certain cyberweapon (cyberweapons).

The director of the National Security Agency, Admiral Mike Rogers, boasted that the United States had been developing cyber weapons for five years. In the coming months, a new gizmo will be demonstrated.

The submission indicates that strategic officials still argue when “offensive actions” should be conducted against individual groups or states with the help of the latest developments.

Rogers further stated the “tipping point” and the impending widespread use of cyberweapons.

* * *


Both the strategy born by American politicians and the military in 2015, and the “newest developments” from Mr. Rogers, which have been spent for five years, speak of the serious US intention not only to “defend” their network systems from the invasion of China, Russia and beyond list, but also to lead “offensive action”.

Despite the discussions that the NSA director recently said, it is obvious that the Americans will not stop at “defense”. As a matter of fact, the Pentagon, as well as the NSA, have always been institutions designed to attack. The NSA's global cyber espionage, exposed by Comrade Snowden and other public informants, and the endless wars the Pentagon has waged all over the planet, serve as a good argument for this assumption.

Observed and commented on Oleg Chuvakin
- especially for topwar.ru
12 comments
Information
Dear reader, to leave comments on the publication, you must sign in.
  1. +3
    3 February 2016 06: 11
    The best defense is to unplug the cord.
  2. +2
    3 February 2016 06: 18
    “They hardly need for a whole year. Usually they are needed for about ten days, ”Cardon shared some details.
    Greed is usually fraer and ruins ... laughing
  3. 0
    3 February 2016 06: 19
    So, computer drang nah osten in 10 days? Oh, they do not underestimate the Russians. In sroy, everyone will stand up and drive them to the capital (server) of the aggressor, regardless of working hours and the cost of traffic. I have already cleaned my old service "I went to ..."
  4. +3
    3 February 2016 06: 31
    And here is the result of testing our cybernetic weapons on new physical principles
  5. +1
    3 February 2016 06: 40
    The Yankees are not yet familiar with real Russian hackers ... wassat
  6. +2
    3 February 2016 08: 06
    The Moscow Region seems to have been working for a long time on a network structure that is different in terms of working from a classic IP, and as such the network of the Russian Ministry of Defense does not exist, there are guaranteed secure communication channels ....
    1. +2
      3 February 2016 09: 39
      Even when I served in the HF, communication with the GIC was through separate dial-up channels, like modem communications. For each session - a separate connection.
  7. +3
    3 February 2016 10: 48
    I never thought the Americans were stupid. They really feel their benefit and danger with the "spinal cord" at the subconscious level. Remember how many accusations, right up to the arrest, were made about our hackers from St. Petersburg, Novosibirsk, Moscow ... And how many programmers were lured to their place ... Here you can write whole novels. After all, it is really possible to stop the activities of entire regions with cyber attacks. As an example, in the 2000s, the work of power plants in one of the states of America was interrupted after a hacker attack. the Americans then blamed everything on the Russians. But for almost 3 days the enterprises and residents were without electricity. Earlier, the American military satellite left orbit without any reason and fell, it seems, off the coast of Australia. According to the conclusions of the commission, the computer was disrupted by external interference. The blame was also blamed on the Russians, but they could not prove it. But this means that, if desired, all others can be banged in this way. It is for such cases that this unit is created. Indeed, in the presence of highly qualified specialists, such a unit is not needed for a long time. Another question is whether we have protection from this? I knew people who started dealing with this problem back in the 90s. And according to their stories, they began to work out even then. I hope that in the intervening time we have acquired reliable protection against cyber attacks of any level.
  8. 0
    3 February 2016 11: 04
    I wonder what is the real state of affairs on such a front? What can the staff members, and what can we? It’s a pity that if we find out the truth, it’s not very soon.
    1. 0
      3 February 2016 18: 44
      Read below :)
  9. +2
    3 February 2016 14: 32
    American cyber fighters are preparing for a "defense" ...
    And ours are ready)))
  10. 0
    3 February 2016 18: 42
    I can reassure them that they do not have specialists who are capable of not only attacking, but at least somehow resisting our guys.
  11. 0
    4 February 2016 10: 39
    Given the humanitarian orientation of someone’s education (in a classy America book this is highlighted by a teacher from the USA), it’s somehow not very trusting in the effectiveness of these measures.