Loud Cyber Weapons-A Coda

Herb Lin
Tuesday, September 6, 2016, 12:19 PM

In a previous post, I commented on the apparent desire of U.S. Cyber Command to develop "loud" cyber weapons, that is, weapons whose use could be easily attributable. But further conversation with various people suggest one additional wrinkle important enough to warrant a separate posting here (rather than just updating the original article).

Published by The Lawfare Institute
in Cooperation With
Brookings

In a previous post, I commented on the apparent desire of U.S. Cyber Command to develop "loud" cyber weapons, that is, weapons whose use could be easily attributable. But further conversation with various people suggest one additional wrinkle important enough to warrant a separate posting here (rather than just updating the original article).

Give Lawfare
a birthday gift!

Specifically, it seems important to distinguish between self-attributing cyber weapons and cyber weapons used in self-attributable cyber attack. The former can be used—and attributed—without further action on the part of the United States. Indeed, a self-attributing weapon in the kinetic world—one with the Stars and Stripes painted on it—can be recognized as a US missile or airplane by anyone who happens to see it. In other words, attribution in this case (better known as "taking credit for the attack") is passive on the part of the United States.

But most cyberattacks deliberately launched by Nation A against Nation B could only be attributed to A if A calls B and provides details that only the attacker could have known. In this instance, the technical requirement for cyber weapons used in such attacks would be easier to meet—the weapons only have to be discoverable given sufficient information provided by A to B over the telephone. This is what I described above as a self-attributable attack.

Since Cyber Command clearly knows these points better than I do, the interesting question is this: What are the strategic circumstances in which self-attributing cyber weapons are potentially useful?

Send me your thoughts!


Dr. Herb Lin is senior research scholar for cyber policy and security at the Center for International Security and Cooperation and Hank J. Holland Fellow in Cyber Policy and Security at the Hoover Institution, both at Stanford University. His research interests relate broadly to policy-related dimensions of cybersecurity and cyberspace, and he is particularly interested in and knowledgeable about the use of offensive operations in cyberspace, especially as instruments of national policy. In addition to his positions at Stanford University, he is Chief Scientist, Emeritus for the Computer Science and Telecommunications Board, National Research Council (NRC) of the National Academies, where he served from 1990 through 2014 as study director of major projects on public policy and information technology, and Adjunct Senior Research Scholar and Senior Fellow in Cybersecurity (not in residence) at the Saltzman Institute for War and Peace Studies in the School for International and Public Affairs at Columbia University. Prior to his NRC service, he was a professional staff member and staff scientist for the House Armed Services Committee (1986-1990), where his portfolio included defense policy and arms control issues. He received his doctorate in physics from MIT.

Subscribe to Lawfare