LONDON — The United States has opened a new line of combat against the Islamic State, directing the military’s six-year-old Cyber Command for the first time to mount computer-network attacks that are now being used alongside more traditional weapons.
The effort reflects President Obama’s desire to bring many of the secret American cyberweapons that had been aimed elsewhere, notably at Iran, into the fight against the Islamic State — which has proved effective in using modern communications and encryption to recruit and carry out operations.
The National Security Agency, which specializes in electronic surveillance, has for years listened intensely to the militants of the Islamic State, and those reports are often part of the president’s daily intelligence briefing. But the N.S.A.’s military counterpart, Cyber Command, was focused largely on Russia, China, Iran and North Korea — where cyberattacks on the United States most frequently originate — and had run virtually no operations against what has become the most dangerous terrorist organization in the world.
A review of what should be done to confront the Islamic State is on Mr. Obama’s agenda on Monday, when he is scheduled to attend a conference in Hanover, Germany, with the leaders of Britain, France, Italy and Germany. Of these efforts, the cybercampaign is the newest. It is also the one discussed in least detail by officials of many countries, and its successes or failures are the most difficult to assess from the outside.
The goal of the new campaign is to disrupt the ability of the Islamic State to spread its message, attract new adherents, circulate orders from commanders and carry out day-to-day functions, like paying its fighters. A benefit of the administration’s exceedingly rare public discussion of the campaign, officials said, is to rattle the Islamic State’s commanders, who have begun to realize that sophisticated hacking efforts are manipulating their data. Potential recruits might also be deterred if they come to worry about the security of their communications with the militant group.
Secretary of Defense Ashton B. Carter is among those who have publicly discussed the new mission, but only in broad terms, and this month the deputy secretary of defense, Robert O. Work, was more colorful in describing the effort.
“We are dropping cyberbombs,” Mr. Work said. “We have never done that before.”
The campaign has been conducted by a small number of “national mission teams,” newly created cyberunits loosely modeled on Special Operations forces.
While officials declined to discuss the details of their operations, interviews with more than a half-dozen senior and midlevel officials indicate that the effort has begun with a series of “implants” in the militants’ networks to learn the online habits of commanders. Now, the plan is to imitate them or to alter their messages, with the aim of redirecting militants to areas more vulnerable to attack by American drones or local ground forces.
In other cases, officials said, the United States may complement operations to bomb warehouses full of cash by using cyberattacks to interrupt electronic transfers and misdirect payments.
The fact that the administration is beginning to talk of its use of the new weapons is a dramatic change. As recently as four years ago, it would not publicly admit to developing offensive cyberweapons or confirm its role in any attacks on computer networks.
That is partly because cyberattacks inside another nation raise major questions over invasion of sovereignty. But in the case of the Islamic State, officials say a decision was made that a bit of boasting might degrade the enemy’s trust in its communications, jumbling and even deterring some actions.
“Our cyberoperations are disrupting their command-and-control and communications,” Mr. Obama said this month, emerging from a meeting at the C.I.A. headquarters in Langley, Va., on countering the Islamic State.
Gen. Joseph F. Dunford Jr., the chairman of the Joint Chiefs of Staff, offered broad outlines of the new campaign against the Islamic State, which is also known as ISIS or ISIL, during a news conference in February.
“We’re trying to both physically and virtually isolate ISIL, limit their ability to conduct command and control, limit their ability to communicate with each other, limit their ability to conduct operations locally and tactically,” he said.
“But I’ll be one of the first ones arguing that that’s about all we should talk about,” General Dunford said. “We want them to be surprised when we conduct cyberoperations. And, frankly, they’re going to experience some friction that’s associated with us and some friction that’s just associated with the normal course of events in dealing in the information age.”
In an interview this month in Colorado Springs, where she talked to Air Force Academy cadets, Mr. Obama’s national security adviser, Susan E. Rice, said that the fight against the Islamic State had to be thought of as a multifront war — and that computers were just another weapon in the arsenal.
“It should not be taken out of proportion — it is not the only tool,” she said when asked about Mr. Work’s “cyberbombs” comment. In fact, some of Mr. Work’s colleagues acknowledged that they had winced when he used the term, because government lawyers have gone to extraordinary lengths to narrowly limit cyberattacks to highly precise operations with as little collateral damage as possible.
But Ms. Rice said the Islamic State had “uniquely utilized cyberspace” to recruit, to communicate over encrypted apps and to coordinate its operations from Syria to Europe.
Ms. Rice would not comment on reports from officials in the Pentagon that Mr. Obama had asked — quite pointedly — in the fall why the arsenal of cyberweapons that had been developed at a cost of hundreds of millions, if not billions, of dollars was not being utilized in the fight against the terrorist group.
Several officials said that Mr. Carter had complained that Cyber Command was too focused on traditional adversaries, and that he had set deadlines for a new array of operational cyberplans aimed at the Islamic State. Those were ultimately delivered by Adm. Michael S. Rogers, the commander of Cyber Command and the director of the National Security Agency.
But inside Fort Meade in Maryland, home to the N.S.A. and Cyber Command, initial demands from the White House generated some resistance, according to officials involved in the debate.
The N.S.A. has spent years penetrating foreign networks — the Chinese military, Russian submarine communications, Internet traffic and other targets — placing thousands of “implants” in those networks to allow it to listen in.
But those implants can be used to manipulate data or to shut a network down. That frequently leads to a battle between the N.S.A. civilians — who know that to make use of an implant is to blow its cover — and the military operators who want to strike back. N.S.A. officials complained that once the implants were used to attack, the Islamic State militants would stop the use of a communications channel and perhaps start one that was harder to find, penetrate or de-encrypt.
“It’s a delicate balance,” Ms. Rice said. “We still have to keep our eye on the Russia-China state-sponsored activity, but this was a new mission, one where we have to balance the collection equities against the disruption equities.”
In Britain, the Government Communications Headquarters, the country’s equivalent to the N.S.A., has been going through a similar debate. It is a familiar one for the British: According to an oft-repeated legend from World War II, Winston Churchill decided to let the Nazis bomb Coventry, at a cost of hundreds of lives, rather than reveal that Britain had used its Enigma machine to crack German codes. (There is a historical dispute about whether Churchill knew the city was to be targeted.)
Lisa O. Monaco, a deputy national security adviser and Mr. Obama’s top adviser for counterterrorism, has led efforts examining how to disrupt the use of social media for recruiting. She has met technology executives in Silicon Valley; Austin, Tex.; Boston; and Washington to come up with a more integrated plan for both taking down social media posts and encouraging the development of a counternarrative.
One effort has included amplifying the testimony of Islamic State recruits who have escaped and now describe the group’s brutality and question its adherence to the true tenets of Islam. Facebook, YouTube and Twitter are also growing more efficient at finding and removing Islamic State posts — which they can take down without court orders because the posts are a violation of the companies’ terms of service, executives say.
But Ms. Monaco suggested that the effort was just beginning. “We are not going to kill our way out of this conflict,” she said. “And we are not going to delete our way out of it, either"
Loading...
About Me
Blog Archive
-
▼
2016
(151)
-
▼
May
(151)
- Tokyo Thrift: Infobar is the most beautiful series...
- The Indistinguishable X-Men: the narrowing range o...
- Facebook and Microsoft team up to lay a massive in...
- Mars is emerging from an ice age that ended about ...
- Google’s Project Ara is about more than just modul...
- Who comes up with a $700 Wi-Fi-connected juicer?
- The foggy numbers of Obama’s wars and non-wars
- Brady’s deadline to appeal suspension is about to ...
- UK's National Obesity Forum slams 'disastrous' low...
- Contactless payments tripled in popularity in the ...
- Why a glowing button might be more important than ...
- Civil War's Arrested Development Easter egg shows ...
- AudioQuest's NightHawk headphones sound as beautif...
- Will virtual reality kill the YouTube comment?
- Google built a tiny radar system into a smartwatch...
- How Frank Underwood helped Monument Valley find a ...
- Apple just revealed the future of its retail stores
- The Sex Factor is a porn reality show straight out...
- The TSA will ruin your summer vacation and no one ...
- Why Google's Allo messaging app is a big step back...
- Robin Wright used Claire Underwood's popularity to...
- Google Home: a speaker to finally take on the Amaz...
- Daydream will be the reason you'll want a 4K phone
- A first look at Android Wear 2.0
- How many Apple engineers does it take to fix iTunes?
- Google I/O 2016: Android N, Chrome OS, virtual rea...
- You can now put a sunroof in your private jet
- Microsoft is selling its feature phone business to...
- Vatican Cardinal to Americans: ‘In Your Nation, Go...
- After bombings in Baghdad kill 77, Sadr's forces d...
- Justice Department Opens Investigation Into Russia...
- Millions more Americans to be eligible for overtim...
- Clinton, Sanders in tight Ky. race; Sanders, Trump...
- Iran cracks down on female models posing without h...
- Hiker found dead in New Mexico, end of monthslong...
- Obama says Transgender bathroom rule a matter of d...
- Google's latest app, Spaces, aims to simplify grou...
- On Coloring Book, Chance the Rapper wades joyfully...
- Confessions of a Red Guard, 50 years after China's...
- Trump: London mayor made 'very rude statements' ab...
- Guess what? Your password can be hacked in millise...
- Democrats: Benghazi chairman ignores statement by ...
- Faraday Future says its electric car could be more...
- Samsung Notebook 9 review: redefining the thin-and...
- Grace and Frankie is the secret weapon in Netflix'...
- Google plans to start blocking Flash in Chrome thi...
- A long talk with Facebook about its role in journa...
- Facebook CEO wants to meet with conservatives amid...
- Trump and GOP leaders bury hatchet on bizarre day
- Apple invests in Chinese Uber rival Didi Chuxing
- Letter from Africa: Kenyans beg for mercy
- Cupertino's mayor says Apple is 'not willing to pa...
- A look inside the Department of Homeland Security'...
- 'We need fundamental changes': US doctors call for...
- North Korea puts on once-in-a-generation political...
- Sandy Hook victims’ families get access to gun man...
- Canadian wildfire edges south, leaves thousands st...
- US names prominent Panama family big money launderers
- Town increases security with escaped inmate on the...
- North Korea congress starts; foreign media kept ou...
- Top reason Americans will vote for Trump: "To stop...
- How virtual reality can change the way we see gend...
- Lawsuit challenging Facebook’s facial recognition ...
- Israel discovers cross-border tunnel from Gaza
- See the Religious Text the U.S. Government Printed...
- George Bell: The battle for a bishop's reputation
- A robot surgeon has passed a major milestone — sew...
- Company behind Kickstarter's thinnest ever watch d...
- This Is Fine creator explains the timelessness of ...
- A BITTER PILL
- Uncharted 4 is one big action movie cliche — and i...
- MacBook 2016 review: all of the possibilities, all...
- The Giant Al Qaeda Defeat That No One’s Talking Ab...
- Islam Under Fire in Europe’s Two Biggest Nations
- The spark of life: Science and the Bible meet again
- Pope condemns pedophilia as details of girl's deat...
- With five-year delay, CIA 'live-tweets' bin Laden ...
- Aretha Franklin Covers “Purple Rain” At White Hous...
- First US-to-Cuba cruise ship in decades sets sail
- Why So Many Chinese Students Come to the U.S.
- Would Trump be least ‘presidential’ president ever?
- Elephants perform for final time at Ringling Bros.
- How lives of Osama Bin Laden's neighbours changed ...
- Australia will use the herpes virus to eradicate i...
- Stanford team made a humanoid robot that can stand...
- Anything is a bath bomb if you throw it in a bath
- Apple's great taste doesn't extend to grammar
- Volvo autonomous car engineer calls Tesla’s Autopi...
- If Tribeca 2016 had a theme, it might be 'adulting...
- SpaceX plans to send a spacecraft to Mars as early...
- Doctors: Give E-Cigarettes To Smokers
- An Alabama city now says people who violate its ba...
- Third Of Brits Think Sexting Is Not Cheating
- PM Joins Former Union Boss In 'Brexit' Warning
- Identity 2016: 'Global citizenship' rising, poll s...
- Syria conflict: UN envoy calls on US and Russia to...
- Afghan heroin addicts seek recovery in a former NA...
- Donald Trump's foreign policy: 'America first'
- PRINCE " NO WILL TO MAKE A WILL Finances in Chaos"
- Larry Page's dream of building a 'Google Island' c...
-
▼
May
(151)
Powered by Blogger.
Post a Comment