PDA

View Full Version : Command readies assault on terror Web sites



thedrifter
03-28-07, 07:11 AM
Command readies assault on terror Web sites

By Jim Michaels - USA Today
Posted : Wednesday Mar 28, 2007 6:34:42 EDT

The U.S. military has been quietly developing capabilities to attack enemy computer networks, including hacking into terrorist Web sites, military officials and experts say.

The move comes as al-Qaida and other groups fighting in Iraq and elsewhere have expanded their activities on the Internet and increased the sophistication and volume of their videos and messages. Much of the material is designed to raise money and recruit fighters for Iraq.

“You should not let them operate uncontested” on the Internet and elsewhere in cyberspace, said Marine Brig. Gen. John Davis, who heads a military command located at the National Security Agency. The command was established to develop capabilities to attack computer networks.

Davis and other officials declined to say whether the military has attacked computer networks, which would require presidential authorization. The techniques are highly classified.

Pentagon contract documents show the military asks companies to develop a “full spectrum ... of computer network attack techniques.” Run by the Air Force Research Laboratory, this program aims to spend $40 million over four years, documents show.

The growth in offensive capabilities signals a shift in military thinking from just monitoring terrorist Web sites for intelligence to attacking them.

“The offensive is increasingly on leaders’ minds,” said John Arquilla, a professor at the Naval Postgraduate School who also works for the Defense Department on cyber-war issues.

Some officials say cyber-attacks would lose critical intelligence.

“You always have the built-in tension between the operator who wants to destroy the target and the intelligence officer who wants to use the target to gain more information,” said Lani Kass, director of the Air Force’s cyberspace task force.

“Our opponents do a heck of a lot more than just watch us in cyberspace,” Davis said. “They are acting in cyberspace. We have the responsibility, and we need to develop options so that we can ... not just operate, but dominate cyberspace.”

Cyber-attacks can take different forms, including eliminating terrorist Web sites and creating doubts among insurgents about their networks’ security, said Arquilla, who favors an offensive approach he calls a “virtual scorched earth policy.”

Terrorist groups in Iraq videotape nearly all of their attacks on U.S. forces to help magnify their impact.

“Everything they do in Iraq and Afghanistan is geared toward propaganda,” said Rep. Jim Saxton, R-N.J., a member of the House Armed Services Committee.

The videos and messages are “getting more and more professional,” said Andretta Summerville of iDefense, a private contractor that monitors terrorist activity on the Internet.

Some sites and Internet forums find recruits and push “them toward a pipeline that ends in suicide attacks,” said Lt. Col. Matthew McLaughlin, a spokesman for Central Command, which runs the wars in Iraq and Afghanistan.

“The propaganda is very effective. It reaches an impressionable audience,” McLaughlin said.

Attacking Web sites may have limited value, said Ben Venzke of IntelCenter, a contractor that monitors terrorist Web sites and Internet forums.

“The problem is the nature of the Internet itself,” he said. “It can always come back up in 10 seconds.”

Ellie