Ask the Air Force Cyber Command General About War in Cyberspace 315
We ran an article about the new Air Force Cyber Command and its recruiting efforts on February 13, 2008. Now Major General William Lord, who is in charge of this effort, has agreed to answer Slashdot users' questions. If you're thinking about joining up -- or just curious -- this is a golden opportunity to learn how our military is changing its command structure and recruiting efforts to deal with "cyberspace as a warfighting domain." Usual Slashdot interview rules apply.
Skynet? (Score:2, Funny)
Re: (Score:2, Insightful)
My question is... how many military professionals are actually doing any of this work? From what I've heard, all they do is babysit computer screens and private contractors making 4x their pay. If that's the case, sign me up! (as a contractor.)
Already in, how can I help? (Score:4, Interesting)
Re:Already in, how can I help? (Score:5, Funny)
Re: (Score:2)
Re: (Score:2)
It's a very cool position, but I don't what sort of particulars I should mention on here. Lots of contingency operations for organizations who deal with information warfare (network defense, etc).
I can put you in touch with people, if you'd like.
Re: (Score:2, Troll)
In other news, I'm so glad to see that, finally, our international crises are going to be able to be settled by a game of Unreal Tournament.
Remote work? (Score:2, Interesting)
As A Military Commander... (Score:3, Insightful)
Re:As A Military Commander... (Score:4, Insightful)
You probably got moddded down because your choice of language suggests a certain naivete.
The internet is nothing until someone uses it. Just like a roadside bomb, a watering can, a butterknife. Since it's pointless to talk about it unless you talk about how it's used, then what you're really talking about are the people that use it, and how they use it. To say that it's inherently non-violent is to say that the people who use it are. Which is demonstrably false. And before someone mentions the non-violence of ones and zeros, please remember that much of warfare (including heading it off before someone tries to start one) is communications, awareness, readiness, and the health of your government, industry and other large systems... all of which now depend on the network. War is about controlling, or denying other people the use of the things that allow them to have power or influence over others - and a mammoth, globe-spanning communications system is now forever going to be a central venue for things very much related to violence. It already is.
Re: (Score:3, Interesting)
War on blogs? (Score:4, Interesting)
Re: (Score:2)
Granted, the old article may have been about the Army, but that wasn't the part I was referring
Unplugging (Score:4, Interesting)
Already done (Score:4, Informative)
The answer is the same for anything else that is connected to the internet: that the benefits -- real or perceived -- of being connected to the internet on the unclassified side, with proper security controls, etc., outweighs the risks.
Re:Already done (Score:5, Informative)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2, Interesting)
How do we prevent "mission creep" (Score:5, Insightful)
What are the limits on this jurisdiction? Who enforces these limits, and how is the public informed of that status? How are efforts to extend being safeguarded from creating mission creep that threatens all civil discourse in the United States and abroad form targeting, suppression, propaganda and extra-legal surbeillance?
Cyberwarfare Doctrine (Score:4, Interesting)
National Labs? (Score:3, Interesting)
I thought those were the popular destinations for educated people who want to serve their country, they're already technically oriented, and they already have a lot of really smart people, so it would have seemed to me a good fit. When I'm looking at my employment possibilities, I need a way to differentiate you.
Re: (Score:2, Informative)
Attacks on the US and its Allies by China (Score:5, Interesting)
Difference In Culture (Score:5, Interesting)
How do you propose to reconcile those conflicts and establish your organization with any semblance of 'geek cred' to get the real talent you sound interested in attracting? What sorts of 'carrots' will you wave to attract people?
Re: (Score:2)
Re: (Score:2)
I think this comes from the fact that us geeks aren't very social BY NATURE, we sit about all day (no matter the cleanliness of the individual) and work on little boxes than no one really quite understand
Re: (Score:2)
I'll also say that being "smarter, as a whole, than the average person, which doesn't help our communication skills" is complete crap. Acting like you're smarter than everyone else is a problem for communication, but if you are, in fact, smarter than the average person you should be smart enough to compensa
Major-General Stanley (Score:2)
Re:Major-General Stanley (Score:5, Funny)
I am the very model of a modern cyber-General,
I've information on viruses, digital, and veneral,
I know the pings of the LAN, and I know the games historical
From Marathon to Pikachu, in order categorical;
I'm very well acquainted, too, with matters quite impractical,
I endlessly retell old jokes, both the tired and scatological,
About conspiracy theories I'm teeming with a lot o' news
My many fanciful facts pin it squarely on the Jews.
Though I've never touched a woman i've watched a lot of porn;
Gigabytes and gigabytes, a greater expert was surely never born:
I've information on viruses, digital, and veneral,
I am the very model of a modern cyber-General.
Re: (Score:2)
Re: (Score:2)
Though all my better programs that self-reference recursively
Have only been obtained through expert spying, done subversively,
But still, for input vegetable, animal and mineral,
I've built a better model than the one at Data General. [traditionalmusic.co.uk]
Re: (Score:2)
+3 Funny and Creative
-1 Screwed up the Rhythm
Re: (Score:2)
relaxing rules (Score:5, Interesting)
Re: (Score:2)
Re: (Score:2, Insightful)
And if the GP wasn't, then I am- First my ground assumptions:
This is an entirely different battlefield with entirely different physical constraints and requirements.
The particular KSAs involved tend to be found in persons that had some degree of social isolation.
Hard-core 'cyber' geeks tend towards fat, scrawny, gay, lesbian, blind in one eye, flat fo
Older recruits? (Score:5, Interesting)
In a traditional branch of the army/navy/airforce that is probably as it should be.
But in this area people have to be trained for years, still not know as much as the older hands in the private industry, and before they really know enough their enlistment would be over. Also, it would be unacceptable for an older IT person to join but take a pay cut to a Private's level or perhaps even a Lieutenant's -- so I imagine this branch would have to be somewhat different.
Is the military going to do to reach out toward the older folks who have extensive experience and knowledge outside the military?
A question about requirements (Score:5, Interesting)
Re: (Score:2)
Re: (Score:2)
Attacks by possible state-sponsored elements - think Chinese or Iranians (if they could ever get their heads out their rear); or organized non-state groups such as al-Qaeda - are military problems (you coul
Which acts of war should be illegal in cyberspace? (Score:5, Interesting)
In conventional warfare, certain actions such as hiding among civilian populations are forbidden. These actions are considered war crimes because of the collateral damage they are likely to cause. What actions in cyberspace do you think should be outlawed? How about intentionally bringing down hospital IT systems, or destroying undersea cables without regard to the effects on civilian populations?
Re:Which acts of war should be illegal in cyberspa (Score:2)
What actions in cyberspace do you think should be outlawed? How about intentionally bringing down hospital IT systems, or destroying undersea cables without regard to the effects on civilian populations?
How is destroying an undersea cable any different from destroying power plants, water treatement centers, bridges, airports and other pieces of infrastructure... all of which are sound military tactics? Heck, taking out communications is more important that any of the other things I've listed.
The entire point of doing these things is to create an effect on the civilian population.
Civil chaos is a good way to draw resources away from the enemy's military effort.
Long story short: Minimize civilian casualties
Re: (Score:2)
Is there any part of civilian infrastructure that is not target-able by current moral standards of warfare? Before you answer that, your statement:
Minimize civilian casualties, but try to make them as miserable as possible
is pretty controversial. What do you mean miserable? Is a hospital being deprived access to the systems that facilitate saving peoples lives (directly or otherwise) being made "miserable"? Or is it a crime? And why is it allowe
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
USAF Mining Data Useage Patterns to Find Thoughtcr (Score:3, Insightful)
Physical Fitness (Score:5, Interesting)
- Space Rogue
Re: (Score:2)
Re: (Score:2)
Re:Physical Fitness (Score:4, Informative)
For soldiers 22-26 it's 40 push ups (in 2 minutes), 50 sit ups (in 2 minutes) and 16:36 time for the 2 mile run. Those values only get easier for older soldiers. If you think "most slashdotters" wouldn't make it in the door, I think you're sadly mistaken. Those are particularly easy values for anyone remotely fit to attain, and not particularly difficult for many people who aren't that fit. Obviously there is a contingent of folks who are sadly out of shape, for whatever reason, that it would be difficult for but it's far from "most" even in the slashdot community, I'd guess.
Re: (Score:3, Insightful)
You have fitness issues that need correcting. Period.
When the USA finally gets "IT"... (Score:2, Interesting)
Basic Training (Score:2)
Preferred Skillset? (Score:2, Interesting)
Are you prepared for this? (Score:5, Interesting)
If so, can you tell me why you chose ASP to run your website? Won't you have enough trouble recruiting as is without alienating some open-source loving folks right off the bat?
So far everything I've seen about this organization is riddled with basic mistakes. I wish you the best of luck but I'm just not convinced you have any idea what you're getting yourself into with this initiative.
What tech do you have that came from the stargate? (Score:2)
Name Change (Score:4, Informative)
Perhaps the reason you are having difficulty in attracting top talent is partly due to the name of your unit. Cyber Command? Sorry, but that just sounds soooo 1980's. How about Electronic Defense Command or something, anything without the word 'cyber' in it. Seriously, have there been any thoughts about a name change?
- Space Rogue
Re: (Score:3, Funny)
This from a guy named "Space Rogue."
(j/k)Re: (Score:2, Funny)
Re: (Score:2)
There, fixed that for you.
Re: (Score:2)
It is good war is so terrible... (Score:5, Insightful)
The direct damage from such warfare would be primarily economic or data security related (rather than a cost in human lives) how do you feel we can prevent it from becoming a monthly, yearly, or daily occurance?
Criminal vs Warlike Actions (Score:5, Interesting)
General Lord,
Does the AFCC have a mandate to pursue criminals that use information infrastructure to commit crimes, or is your group intended to defend against warlike attacks only?
If the latter is true, how would you distinguish between criminal activity and warlike activity in cyberspace?
Will the USAF Cyber Command be full of TPS reports (Score:4, Interesting)
Will you be forced on to the standard USAF window base image with limited admin accounts like how the navy and marine systems that are a Big mess are setup?
Will you use mac and linux like how the army does?
Legal Hacking... (Score:5, Funny)
Due to the nature of hacking and what many people do to acquire such skills, they may not want to 'join up' and all that.
But if you post a list of IP's that are okay to bring down, and networks you want information stolen from, with the understanding that the US will not condemn any attacks, and I'm sure more than enough people would do it for free.
Is there anything like this already in place? Cause I got nothing better to do this weekend. Or most any weekend.
Re: (Score:2)
Re: (Score:2)
I'm a software privateer!
I really hope this gets asked (Score:3, Interesting)
I think Internet Privateers, a sibling-comment suggests, would be perfectly legitimate - and as effective, if not more effective, than an organized USAF "cyber attack" on, e.g, the PRC. I don't doubt the need for a "cyber command" to protect American information infrastr
Great stories (Score:2)
Will you be forced on to the standard USAF window (Score:2)
Will you use Mac and Linux like how the army does?
Could a Cyber Attack Trigger a Real War? (Score:5, Interesting)
General Lord,
I'm curious to know if you have have any criteria that would enable you do decide when a cyber attack is an act of war. Would it be possible for some kind of action inside a network to lead to a shooting war without some kind of overt physical threat occurring first?
CyberCommand Location (Score:5, Interesting)
Can you explain some about the situation developing between Barksdale AFB and Offutt AFB as they try to fight over the eventual final location for CyberCommand? My thoughts are that finding and recruiting talent, and laying the foundation for such a large wired infrastructure in the Omaha, Nebraska area may be easier to accomplish than in and around Shreveport, LA. What types of things is the DoD looking for when they choose the final location for this new Command?
Re: (Score:2)
Actually, Barksdale has a nearby resource - it's called Louisiana Tech University, one of the good cheap engineering schools in the USA.
International Development and AFCC's Tool Set (Score:5, Interesting)
General Lord,
Some of the "hacker" types that I understand the AFCC is looking for probably will prefer to work with Linux and Linux applications.
Due to the international nature of software like Linux that has been developed through the "free" paradigm, would this be allowed? These tools will have been produced by nationals from many different countries, perhaps even those that the United States could find itself fighting a cyber war against.
Re: (Score:2)
Non-issue; Linux and OSS is well used within the DoD, even if not acknowledged at the highest levels. The issue always comes up, and then is shot down. They're even using commercial software from Germany (X-Ways) and many other foreign nations.
I have no doubt this is true. What I'm interested in is hearing a General and a CO's perspective.
I have some experience with the International Traffic in Arms Regulations (ITAR) rules, since I'm Canadian and sometimes work for US companies that have dual-use technology. Certain people, depending on their background, are prohibited from working for certain US companies in certain roles.
The fact that FOSS often involves community support could theoretically mean someone in Iran or China could be asked t
SCADA Warfare (Score:2, Interesting)
Will there be a doctrine for cyber attacks
The very model of a modern major general... (Score:2)
Accept, Retain, Solicit good people? (Score:5, Interesting)
Some of the most talented people in computer security tend to have the sort of records that prevent them from getting clearance. Maybe nothing heavily criminal, but enough of a colored background that traditional security clearance mechanisms would throw them out of the room before they get started. Often the same types of minds that are really good at computer security are also the rebel types, who'll have some history. Will you work to get these people in, or are we looking at a bunch of off-the-shelf programmers/admins who've taken a few simple courses in computer security?
Also, how do you plan to attract/retain them? Again, rebel types are some of the best hackers, and they're not likely to go in without incentives. Not due to any lack of patriotism per se, but an unexplored understanding of it. More importantly, they're likely to be anti-establishment types who aren't comfortable in the strict traditional chain of command. Finally, usually the outside industry pays quite well for the good ones. Are you prepared to financially compete for the best?
Finally, will there be any connections back to the research/academic community? You may find academics more happy to help than usual, as cyber warfare can often be nonviolent. Also, will the existing (and immense) capability within the NSA be properly leveraged?
I'm glad to see our DoD taking our nation's networked security seriously. Right now it's just a bad, bad joke.
Best of Luck!
-Lally Singh
cyber warfare can often be nonviolent (Score:2)
I think you meant non-destructive. See the casualties will all be virtual and tallied up by computers on both sides. The people who were "killed" in each attack, even if from a third neutral party starship, will be expected to report to the disintegration chambers at their designated time.
This is absolutely necessary to ensure our respective infrastructures remain intact. It is better that our wars are fought in cyberspace. Wouldn't you rather the front lines be Se
My question is: (Score:3, Insightful)
Whata moniker... (Score:2, Offtopic)
Why was the Air Force tasked with this? (Score:5, Interesting)
Random Questions (Score:2)
2. Would the Cyber Command overlook the policy on those with ADD who take a medication (Ritalin, etc) for this condition?
3. Can I get caffeine-laced MRE's?
4. What are Rules Of Engagement in Cyberwarfare?
5. What will Cyber Command's relationship be with regards to Homeland Security's Cyber Sercurity divison? What steps will you take to ensure sharing of information while not stomping on each other's toes?
Cyber Commander (Score:2)
How are you doing... (Score:2)
Are there any plans to put backdoors in domestic encryption software?
Why are you lying?
eh hemmm (Score:2)
See, this is the issue with
Wired ran an article, and
What if this alternative existed for Mitnick? (Score:4, Interesting)
One of the storied stereotypes of the hacker domain is that of the nabbed "black hat" being impressed Into a "white hat" role. (Think Leonardo DiCaprio's role in "Catch Me If You Can".) However, the US armed forces no longer offer service as an alternative to prison (last I checked anyway), even though it offers a hacker in such a position the best deal he or she may ever get.
Would you seriously consider trying to exploit the talents of convicted hackers if you thought those talents could be a viable asset?
Question about Existing Contractors (Score:5, Interesting)
Cyberwarfare and the Law (Score:2, Interesting)
How does it affect people outside the US? (Score:2, Interesting)
Like everything else this has both good and bad effects for me. I don't think our establishments here have a very good idea of what freedom of speech means and they could easily do some wrong here. On the other hand it opens up business opportunit
Lord Major General Lord (Score:2)
flexibility (Score:4, Insightful)
I served proudly as an active duty member of the United States Air Force for 4 years and then in the Reserves for another 4 years. Although the Air Force is generally regarded as the most "modern" of the U.S. military branches, I still found that the overall structure was too rigid to take me where I wanted to go, so I followed my inner geek and moved fully into the civilian sector.
You said, 'We have to change the way we think about warriors of the future.' At first, I guessed that you would hire these individuals into government contractor positions, but the Wired article implies otherwise. Many of the brightest security experts, by nature, are highly independent and have a noted distaste for many of the standards that being in the Air Force require, such as basic training, dress and appearance, and physical fitness. How far will the Cyber Command bend the traditional standards in order to persuade the best and brightest in the security field to sign up into a military career?
Supermilworms (Score:3, Interesting)
Superworms [wormblog.com] such as Storm [wired.com] represent perhaps the greatest threat to the internet becasue their stealthy natures allows the organization of millions of computers into a covert zombie botnet before their true exploit is finally launched. Will Cyber Command launch offensive operations to hunt down and destroy superworms already imbedded in cyberspace civilian computers, or create supermilworms (new word for CC use if you wish, with zero Google hits) that covertly draft millions of civilian cyberspace computers as secret War Reserve resources available for future callup and deployment in a future cyberspace battle?
National Guard Role? (Score:3, Interesting)
In major campaigns, the National Guard (and Air National Guard) play a significant role and are often the front line service. How do you see the individual state Guard units participating? In addition, what Civilian roles will be both a part of the Guard and contracted to the Guard?
Re: (Score:3, Interesting)
Re: (Score:2)