Professional Documents
Culture Documents
James Adams
[98]
Virtual Defense
capacities—namely, "asymmetrical warfare," which the Pentagon
characterizes as "countering an adversary's strengths by focusing on
its weaknesses."
Furthermore, the U.S. military is radically changing. The "revolution
in military affairs" seeks to apply new technology, particularly digital
information technology, to operational and strategic concepts. With
plans ranging from computer-based weapons research programs to
software that encrypts classified military data, from computer-guided
"smart" bombs to a space-based missile defense, Americas military forces
are coming to depend more and more on computers and information
networks. These two factors—the dominance of U.S. conventional
forces and the military's already extensive and growing use of infor-
mation technology—make cyber-attack an increasingly attractive
and effective weapon to use against the United States.
But U.S. defense plans and policymakers' concept of national
security have not caught up to the new threats of computer warfare.
Indeed, recent warnings indicate that the United States remains
highly vulnerable. To address this challenge, Washington urgently
needs to modernize its thinking and transcend its strategies of
deterrence and national security, which remain fixed in the Cold
War, pre-Internet world.
MOONLIGHT MAYHEM
IN MARCH 1998, the Department of Defense detected the most
persistent and serious computer attack against the United States to
date. In a still ongoing operation that American investigators
have code-named Moonlight Maze, a group of hackers has used
sophisticated tools to break into hundreds of computer networks at
NASA, the Pentagon, and other government agencies, as well as private
universities and research laboratories. These cyber-intruders have
stolen thousands of files containing technical research, contracts,
encryption techniques, and unclassified but essential data relating to
the Pentagon's war-planning systems.
Since Moonlight Maze was first discovered, the U.S. intelligence
community has been engaged in the largest cyber-intelligence inves-
tigation ever. But more than three years of work have produced
The authors believe that China wHl never be able to match American
technological superiority. Moreover, having watched Moscow spend
itself into oblivion trying to win the Cold War arms race, Beijing will
seek to avoid the same mistake. Instead, the authors write, a digital
attack will give China a significant asymmetric advantage and even
bring about the defeat of the United States. China has therefore been
making large investments in new technology for the PLA and has
established a special information-warfare group to coordinate national
offense and defense. China-watchers in the Pentagon refer to these
efforts as the creation of "the Great Firewall of China."
Part of the reason for such aggressive action is that China suspects
that it is already under cyber-attack from the United States. Every
piece of computer hardware or software imported from the United
States or its allies is subject to detailed inspection when it arrives at
the border. China's own technicians then take control of the goods
and either resist or closely monitor Western experts' efforts to install
the equipment themselves.
NATIONAL INSECURITY
ALTHOUGH MOSCOW'S idea of an international treaty to limit infor-
mation warfare may seem far-fetched, the concept of an effective
deterrence regime for cyberspace is gaining currency in Washington.
As the information revolution gathers pace, so do the frequency and
sophistication of the attacks on U.S. computer and communications
networks. And these attacks have made glaringly clear two danger-
ous changes in U.S. military and national security structures.
First, during the Cold War, Washington controlled the pace of U.S.
technology development by directly funding approximately 70 percent
of technology research. Today, that figure is less than 5 percent. Tech-
nological innovation is now driven by private interests that refuse to
depend on Washington's archaic acquisition systems. Instead, technol-
ogy entrepreneurs strive incessantly to increase the speed of change.
That shift from public to private funding has been matched by
the development of a new weapons platform known as the personal
computer. The ammunition for this weapon—the hacking tools—
come free on the Web and are constantly being updated. One needs
only access to a computer, Internet capabilities, and a little bit of technical
savvy to become an information warrior. And unlike twentieth-
century weapons innovations that took an average of 15 years to enter
military service, today's newest versions of computers and software
are available everywhere and accessible to everyone at the same time.
Second, the front line in this new war has changed. In the last
century, the crucial battlefront was generally seen as the place where
GETTING TOUGH
AFTER WORLD WAR II, the detonation of two nuclear bombs over
Japan frightened the world enough to provoke a ferment of activity
inside the world's governments and the academic community—
leading in time to the development of a nuclear deterrent strategy. The
world knew that a nuclear attack against the United States or one of its
allies, or against the Soviet Union or a Soviet ally, would provoke
instant nuclear retaliation. Defense planners later applied this strategy
of deterrence through the threat of mutually assured destruction to
chemical and biological weapons as well. During the Gulf War, for
example, Saddam Hussein recognized that if he used chemical or bio-
logical weapons, he could expect a devastating, if unspecified, response.
But with no U.S. strategy for deterrence in the virtual world and
no clear thinking about a legal regime for retaliation against cyber-
attack, potential hackers can battle the United States with impunity.
Consider what happened in May 2000, when a hacker in the Philippines
launched the "Love Letter" vims around the world. In the United
States, the Veterans Health Administration received 7 million "I
Love You" messages, 1,000 files were damaged at NASA, and recovery