U.S. Cyberattacks Target ISIS in a New Line of Combat
By DAVID E. SANGER
LONDON — The United States has opened a new line of combat against the Islamic State, directing the military’s six-year-old Cyber Command for the first time to mount computer-network attacks that are now being used alongside more traditional weapons.
The effort reflects President Obama’s desire to bring many of the secret American cyberweapons that have been aimed elsewhere, notably at Iran, into the fight against the Islamic State — which has proved effective in using modern communications and encryption to recruit and carry out operations.
The National Security Agency, which specializes in electronic surveillance, has for years listened intensely to the militants of the Islamic State, and those reports are often part of the president’s daily intelligence briefing. But the N.S.A.’s military counterpart, Cyber Command, was focused largely on Russia, China, Iran and North Korea — where cyberattacks on the United States most frequently originate — and had run virtually no operations against what has become the most dangerous terrorist organization in the world.
A review of what should be done to confront the Islamic State is on Mr. Obama’s agenda on Monday, when he is scheduled to attend a conference in Hanover, Germany, with the leaders of Britain, France, Italy and Germany. Of these efforts, the cybercampaign is the newest. It is also the one discussed in least detail by officials of many countries, and its successes or failures are the most difficult to assess from the outside.
The goal of the new campaign is to disrupt the ability of the Islamic State to spread its message, attract new adherents, circulate orders from commanders and carry out day-to-day functions, like paying its fighters. A benefit of the administration’s exceedingly rare public discussion of the campaign, officials said, is to rattle the Islamic State’s commanders, who have begun to realize that sophisticated hacking efforts are manipulating their data. Potential recruits may also be deterred if they come to worry about the security of their communications with the militant group.
Defense Secretary Ashton B. Carter is among those who have publicly discussed the new mission, but only in broad terms, and this month the deputy secretary of defense, Robert O. Work, was more colorful in describing the effort.
“We are dropping cyberbombs,” Mr. Work said. “We have never done that before.”
The campaign has been conducted by a small number of “national mission teams,” newly created cyberunits loosely modeled on Special Operations forces.
While officials declined to discuss the details of their operations, interviews with more than a half-dozen senior and midlevel officials indicate that the effort has begun with a series of “implants” in the militants’ networks to learn the online habits of commanders. Now, the plan is to imitate them or to alter their messages, with the aim of redirecting militants to areas more vulnerable to attack by American drones or local ground forces.
In other cases, officials said, the United States may complement operations to bomb warehouses full of cash by using cyberattacks to interrupt electronic transfers and misdirect payments.
The fact that the administration is beginning to talk of its use of the new weapons is a dramatic change. As recently as four years ago, it would not publicly admit to developing offensive cyberweapons or confirm its role in any attacks on computer networks.
That is partly because cyberattacks inside another nation raise major questions over invasion of sovereignty. But in the case of the Islamic State, officials say a decision was made that a bit of boasting might degrade the enemy’s trust in its communications, jumbling and even deterring some actions.
“Our cyberoperations are disrupting their command-and-control and communications,” Mr. Obama said this month, emerging from a meeting at the C.I.A. headquarters in Langley, Va., on countering the Islamic State.
Gen. Joseph F. Dunford Jr., the chairman of the Joint Chiefs of Staff, offered broad outlines of the new campaign against the Islamic State, which is also known as ISIS or ISIL, during a news conference in February.
“We’re trying to both physically and virtually isolate ISIL, limit their ability to conduct command and control, limit their ability to communicate with each other, limit their ability to conduct operations locally and tactically,” he said.
“But I’ll be one of the first ones arguing that that’s about all we should talk about,” General Dunford said. “We want them to be surprised when we conduct cyberoperations. And, frankly, they’re going to experience some friction that’s associated with us and some friction that’s just associated with the normal course of events in dealing in the information age.”
In an interview this month in Colorado Springs, where she talked to Air Force Academy cadets, Mr. Obama’s national security adviser, Susan E. Rice, said that the fight against the Islamic State had to be thought of as a multifront war — and that computers were just another weapon in the arsenal.
“It should not be taken out of proportion — it is not the only tool,” she said when asked about Mr. Work’s “cyberbombs” comment. In fact, some of Mr. Work’s colleagues acknowledged that they had winced when he used the term, because government lawyers have gone to extraordinary lengths to narrowly limit cyberattacks to highly precise operations with as little collateral damage as possible.
But Ms. Rice said the Islamic State had “uniquely utilized cyberspace” to recruit, to communicate over encrypted apps and to coordinate its operations from Syria to Europe.
Ms. Rice would not comment on reports from officials in the Pentagon that Mr. Obama had asked — quite pointedly — in the fall why the arsenal of cyberweapons that had been developed at a cost of hundreds of millions, if not billions, of dollars was not being used in the fight against the terrorist group.
Several officials said that Mr. Carter had complained that Cyber Command was too focused on traditional adversaries, and that he had set deadlines for a new array of operational cyberplans aimed at the Islamic State. Those were ultimately delivered by Adm. Michael S. Rogers, the commander of Cyber Command and the director of the National Security Agency.
But inside Fort Meade in Maryland, home to the N.S.A. and Cyber Command, initial demands from the White House generated some resistance, according to officials involved in the debate.
The N.S.A. has spent years penetrating foreign networks — the Chinese military, Russian submarine communications, Internet traffic and other targets — placing thousands of implants in those networks to allow it to listen in.
But those implants can be used to manipulate data or to shut down a network. That frequently leads to a battle between the N.S.A. civilians — who know that to make use of an implant is to blow its cover — and the military operators who want to strike back. N.S.A. officials complained that once the implants were used to attack, the Islamic State militants would stop the use of a communications channel and perhaps start one that was harder to find, penetrate or de-encrypt.
“It’s a delicate balance,” Ms. Rice said. “We still have to keep our eye on the Russia-China state-sponsored activity, but this was a new mission, one where we have to balance the collection equities against the disruption equities.”
In Britain, the Government Communications Headquarters, the country’s equivalent to the N.S.A., has been going through a similar debate. It is a familiar one for the British: According to an oft-repeated legend from World War II, Winston Churchill decided to let the Nazis bomb Coventry, at a cost of hundreds of lives, rather than reveal that Britain had used its Enigma machine to crack German codes. (There is a historical dispute about whether Churchill knew the city was to be targeted.)
Lisa O. Monaco, a deputy national security adviser and Mr. Obama’s top adviser for counterterrorism, has led efforts examining how to disrupt the use of social media for recruiting. She has met technology executives in Silicon Valley; Austin, Tex.; Boston; and Washington to come up with a more integrated plan for both taking down social media posts and encouraging the development of a counternarrative.
One effort has included amplifying the testimony of Islamic State recruits who have escaped and now describe the group’s brutality and question its adherence to the true tenets of Islam. Facebook, YouTube and Twitter are also growing more efficient at finding and removing Islamic State posts — which they can take down without court orders because the posts are a violation of the companies’ terms of service, executives say.
But Ms. Monaco suggested that the effort was just beginning. “We are not going to kill our way out of this conflict,” she said. “And we are not going to delete our way out of it, either.”
首度網攻IS! 美正在丟網路炸彈
自二○一四年六月以來,以美國為首的聯軍對敘利亞與伊拉克境內的激進組織「伊斯蘭國」(IS)展開了一連串軍事行動,而為了加大打擊力量,美國已決定利用網路攻擊來對付IS。
紐約時報報導,美國首度指示其成立六年的網路作戰司令部,對IS發動網路攻擊。
專精於電子監控的美國國家安全局,多年來一直在嚴密監聽IS分子,但網路作戰司令部主要聚焦於經常對美國進行網路攻擊的國家,如俄羅斯、中國大陸、伊朗以及北韓,對IS這個全球最危險恐怖組織幾乎未做出任何行動。
對抗IS是歐巴馬廿五日在漢諾威首腦峰會上,與英法義德四國領袖共同討論的議題。在眾多作為中,網路攻擊是最新的行動。
網路攻擊是許多國家官員很少詳細討論的議題,其成敗也最難從外部進行評估。
美國網攻IS,目標是破壞該組織散播訊息、吸引新成員、發布命令等行動,並癱瘓其發放薪水等日常運作能力。
美國官員指出,政府罕見公開討論這項行動,用意之一是讓IS指揮官緊張。若他們開始擔心自身與組織間的通訊安全,他們招兵買馬的行動也可被阻止。
官員們還說,除了用炸彈空襲IS金庫外,美國也可利用網路攻擊干擾IS的轉帳與誤導付款。
美國國防部長卡特曾公開討論這項新任務,但只有大略說明,而副部長沃克本月則生動地描述這項行動。
沃克說:「我們正在丟網路炸彈。我們以前從未這樣做過。」
原文參照:
http://www.nytimes.com/2016/04/25/us/politics/us-directs-cyberweapons-at-isis-for-first-time.html
紐約時報中文版翻譯:
http://cn.nytimes.com/usa/20160425/c25isiscyber/zh-hant/
2016-04-26.聯合報.A13.國際.編譯陳韋廷