Jump to content
The Education Forum

USAF Cyber War Command

Recommended Posts


12/8/2005 - WASHINGTON (AFPN) -- The realities of the world have changed dramatically since the creation of the Air Force in 1947 and continue to change almost daily.

With these changes in mind, Air Force leaders released a new mission statement Dec. 7 that defines the current and future direction of the Air Force.

"Today, our world is fast paced, constantly shifting and filled with a wide range of challenges," Secretary of the Air Force Michael W. Wynne and Air Force Chief of Staff Gen. T. Michael Moseley wrote in a joint Letter to Airmen. "Our mission is our guiding compass, and now more than ever we need it to be clear and precise."

The mission statement defines the "where and whaAt" the Air Force accomplishes on a daily basis:

The mission of the United States Air Force is to deliver sovereign options for the defense of the United States of America and its global interests -- to fly and fight in Air, Space, and Cyberspace.

The statement includes two new concepts, "sovereign options" and “cyberspace,” which the secretary and chief defined.

They said having sovereign options is the essence of being a superpower.

"Our task is to provide the president, the combatant commanders, and our nation with an array of options ... options that are not limited by the tyranny of distance, the urgency of time, or the strength of our enemy’s defenses," they said. "With one hand the Air Force can deliver humanitarian assistance to the farthest reaches of the globe, while with the other hand we can destroy a target anywhere in the world."

The term cyberspace includes network security, data transmission and the sharing of information.

"We have quite a few of our Airmen dedicated to cyberspace ... from security awareness, making sure the networks can't be penetrated, as well as figuring out countermeasures," Secretary Wynne said. "The Air Force is a natural leader in the cyber world and we thought it would be best to recognize that talent."

Adversaries of the United States will use any method or venue necessary to contest America, and it is an Airman's calling to dominate air, space and cyberspace, the leaders said.

"If we can decisively and consistently control these commons, then we will deter countless conflicts," they said. "If our enemies underestimate our resolve, then we will fly, fight, and destroy them."

Using past air power pioneers as examples of understanding the mission, they said, " The Air Force’s mission statement has evolved over time, but

by Staff Sgt. C. Todd Lopez

Air Force Print News

11/3/2006 - WASHINGTON (AFPN) -- During a media conference here Nov. 2, Secretary of the Air Force Michael W. Wynne said the 8th Air Force would become the new Air Force Cyberspace Command.

"I am announcing the steps the Air Force is taking towards establishing an Air Force Cyberspace Command," the secretary said. "The new Cyberspace Command is designated as the 8th Air Force... under the leadership of (Lt. Gen. Robert J. "Bob" Elder Jr.) He will develop the force by reaching across all Air Force commands to draw appropriate leaders and appropriate personnel."

Secretary Wynne said the 67th Network Warfare Wing, now under 8th Air Force, and other elements already within the 8th, would provide "the center of mass" for the nascent Cyberspace Command.

The secretary also said Air Combat Command, Air Force Space Command and Air Force Materiel Command are working to develop the new Cyberspace Command, while Air Force personnel specialists are working to develop educational plans and career paths for those Airmen that will work within the new command.

"The aim is to develop a major command that stands alongside Air Force Space Command and Air Combat Command as the provider of forces that the President, combatant commanders and the American people can rely on for preserving the freedom of access and commerce, in air, space and now cyberspace," Secretary Wynne said.

Air Force leaders will begin detailed planning for the new Cyberspace Command Nov. 16 at the Cyber Summit. During the summit, Air Force leaders will chart a way ahead for the Air Force's role in cyberspace, also called the cyber domain.


Entitled "Information Warfare For Dummies," the 13-page booklet summarizes the Buck-Rogers battle plans for seizing the electronic high ground in confrontations between the United States and various types of adversaries. The manual, prepared by a Pentagon contractor and obtained by The Consortium, explains the first objective for lap-topped GIs fighting a future Information War (or IW): "Destroy (or weaken) the bad guy's system and protect your own."

According to government sources, however, the primer omits any direct reference to classified IW operations that have been undertaken already by the Central Intelligence Agency. The sources say the CIA has used IW tactics in covert actions targeting "enemy" electronic messages -- especially financial bank transfers.

In this modern form of "dirty trick," the CIA claims some success in disrupting Latin American cocaine cartels by penetrating the drug lords' bank records and remotely deleting money from the accounts. These operations have sown confusion inside cartel businesses, the sources said. In one case, a payoff to a corrupt politician was erased, provoking the cartel's suspicion that a bookkeeper had stolen the money. The innocent bookkeeper then was executed, a U.S. intelligence source said.

The primer does not mention these classified operations, but does acknowledge U.S. capabilities in these areas. "Assault technologies for the Information Warrior can be divided into 'hard kill,' involving physical destruction, and 'soft kill,' where the goal is electronic or psychological disruption," the primer states. "Their commonalty lies in their emphatic focus on information -- destroying it, corrupting it, and denying it."

Viruses & Worms

The primer notes that traditional IW will target an enemy's battlefield command-and-control to "decapitate" the fighters from their senior officers, thereby "causing panic and paralysis." But the primer adds that "network penetrations" -or hacking, much like the CIA is reported to have conducted against drug cartels -- "represents a new and very high-tech form of warfighting."

Military officials shy away from any public admission of these unorthodox practices, the manual says. "Due to the moral, ethical and legal questions raised by hacking, the military likes to keep a low profile on this issue," the booklet explains. "Specific DOD references to viral insertions are scarce" in public literature.

Still, the primer gives some details about the disruptive strategies. "Network penetrations" include "insertion of malicious code (viruses, worms, etc.), theft of information, manipulation of information, denial of service," the primer says.

While controversial inside the Pentagon, these tactics have advantages over other military operations, especially in their secrecy. "The intrusions can be carried out remotely, transcending the boundaries of time and space," the manual states. "They also offer the prospect of 'plausible deniability' or repudiation."

Indeed, so far, the U.S. military and intelligence services have found it easy to cover their tracks. "Due to the difficulty of tracing a network penetration to its source, it's difficult for the adversary to prove that you are the one responsible for corrupting their system," the primer says. "In fact, viral infections can be so subtle and insidious that the adversary may not even know that their systems have been attacked."

Written in a puckishly irreverent style, the manual describes these IW tactics as "fairly ground-breaking stuff for our nation's mud-sloggers. ...Theft and the intentional manipulation of data are the product of devilish minds. ...Pretty shady, those Army folks."

Frying Enemy Electrons

The primer outlines other disruptive IW techniques, such as detonation of electromagnetic pulse (EMP) bombs. "The high-energy pulse emitted by an EMP bomb can temporarily or permanently disable all electronics systems, including computers, for a radius of several kilometers," the manual explains.

"Put simply, EMP weaponry fries electronic circuitry. EMP weapons can be launched by airborne platforms, or detonated inside information centers (banks, corporate headquarters, telephone exchanges, military command posts). The explosion needed to trigger the electromagnetic pulse apparently is minor compared to a conventional blast, theoretically resulting in fewer human casualties."

The manual stresses, too, IW's potential for high-quality "psyops and deception" to confuse and demoralize a targeted population. "Future applications of psyops may include realistic computer simulations and 'morphed' imagery broadcasts of bogus news events," the booklet says. In other words, the Information Warriors could put U.S. enemies into compromising videos much as Hollywood inserted Forrest Gump into old newsreels.

Deception always has been part of warfare. But the booklet argues that "it is the sheer qualitative differences offered by today's information technologies that makes IW potentially revolutionary." Some military specialists even call the new IW capabilities worthy of the term "a Military-Technological Revolution," a phrase reserved for dramatic warfare advances such as the discovery of gun powder or the development of strategic bombing.

Tofflers for Defense

"The impact of the new information technologies on warfare was first recognized during Desert Storm" when U.S. forces thoroughly disrupted Iraqi command and control, the manual says. But the future might be even more Orwellian.

"Futurists Alvin and Heidi Toffler (of Future Shock and Friend-of-Newt fame) ...seem to suggest that to take full advantage of the new information technologies, the military will have to overhaul its current force structure, making information, rather than firepower, the central organizing principle," the manual states.

The Pentagon also is taking lessons from actual events on the Internet. "A denial of service (DOS) attack, also called network flooding, aims to saturate a network with unwanted traffic," the manual says. "A civilian-based DOS attack took place on the Internet in December 1995. Angered by French nuclear testing, a group of Italian protesters led the charge against the French government World Wide Web servers.

"On-line participants from across the globe were directed to swamp the servers with unwanted message traffic, choking them and forcing them to shut down. The attacks apparently lasted an hour or so, and the effects were relatively minor. But the DOS concept was there, and the precedent was set."

The manual sees the French protest as a warning. "The U.S. military is highly vulnerable to DOS attacks as it depends heavily on the civil infrastructure for its financial, personnel and logistical transactions," the booklet says. "Some pundits predict that a large-scale attack on our nation's informational infrastructure may plunge us into an economic depression like that of the 1930's."

But the Info-Warriors already have constructed some defenses against both mischievous hackers and hostile states. "We build countermeasures to stop crackers, whether they be twinkie-eaters or actual enemies," declared Capt. Kevin Zieses.

The manual suggests another danger: that American IW attacks, especially viral infections and psyops, could backfire and harm U.S. interests. An additional concern is IW's effectiveness against primitive adversaries who don't depend on sophisticated command and control. Then, there's the question of deterrence. "Are Information Warriors with their laptops and modems 'scary' enough?" the manual asks.

The manual raises the question, too, of the kind of IW fighters needed. "The recruitment pool may ... have to include hacker-types and 'nerds,'" the booklet suggests. "This raises the $64 question: will the hackers 'go bad,' and given the fighter-jock mentality of the U.S. military, will the 'nerd track' be a career killer?"

Despite some resistance from Pentagon traditionalists, the U.S. military is advancing smartly along this IW front. Already, five IW centers and offices are operating: at Kelly Air Force Base in San Antonio, Texas; at Shaw Air Force Base in South Carolina; at Fort Meade, Md.; at Norfolk, Va.; and at Fort Belvoir, Va.

Link to comment
Share on other sites

Please sign in to comment

You will be able to leave a comment after signing in

Sign In Now
  • Create New...