Defense

Carter: U.S. disrupting Islamic State computer networks

Secretary of Defense Ashton Carter.

Defense Secretary Ash Carter said the hacking activity against the Islamic State group "is an important use of our Cyber Command and the reason Cyber Command was established in the first place."

U.S. Cyber Command is conducting a full-scale and unprecedented digital assault on the Islamic State group, Defense Secretary Ash Carter and his top general said Feb. 29.

The goal of the hacking campaign, which has intensified in recent weeks, is to cause the militants to "lose confidence in their networks, to overload their networks so that they can't function, and do all of these things that will interrupt their ability to command and control forces," particularly in Syria, Carter told reporters at the Pentagon.

Carter and Gen. Joseph Dunford, chairman of the Joint Chiefs of Staff, were circumspect in detailing the cyberattacks against Islamic State yet waded further into specificity than they have previously.

Dunford said hacking operations have already begun in Mosul, the group's center of power in Iraq. Carter has said previously that Cyber Command would be targeting communication networks in Raqqa, the terrorist group's de facto capital in Syria.

The United States does not want Islamic State operatives to know the origin of digital disruptions they might now be experiencing, Dunford said. Once deployed, such exploits lose their effectiveness because an adversary can patch the vulnerability.

"This is something that's new in this war, not something you would have seen back in the Gulf War," Carter said. "But it's an important new capability, and it is an important use of our Cyber Command and the reason Cyber Command was established in the first place."

It is well-documented that a key to the surge of U.S. troops in Iraq in 2007 was an accompanying surge in cyber weapons that the National Security Agency unleashed. But that operation predated the birth of Cyber Command, which has gained in technical prowess by being co-located with NSA at Fort Meade.

Adm. Michael Rogers, head of both organizations, said recently that the five-year-old Cyber Command is at a tipping point in maturing its offensive and defensive cyber capabilities. For Carter, the time is thus ripe to use the command's burgeoning cyber muscle, and last month he ordered the command to step up the hacking campaign against Islamic State.

The U.S. cyber campaign so far has included hitting the group's social media accounts and could extend to efforts to disrupt its online financial transactions, according to an Associated Press report.

Cyber Command was "devised, specifically, to make the United States proficient and powerful in this tool of war," Carter said, adding that other combatant commands could leverage the tools Cyber Command is honing against Islamic State.

The hacking could prompt Islamic State operatives to switch to older communications technologies that could leave them more vulnerable to targeting, he added.

About the Author

Sean Lyngaas is an FCW staff writer covering defense, cybersecurity and intelligence issues. Prior to joining FCW, he was a reporter and editor at Smart Grid Today, where he covered everything from cyber vulnerabilities in the U.S. electric grid to the national energy policies of Britain and Mexico. His reporting on a range of global issues has appeared in publications such as The Atlantic, The Economist, The Washington Diplomat and The Washington Post.

Lyngaas is an active member of the National Press Club, where he served as chairman of the Young Members Committee. He earned his M.A. in international affairs from The Fletcher School of Law and Diplomacy at Tufts University, and his B.A. in public policy from Duke University.

Click here for previous articles by Lyngaas, or connect with him on Twitter: @snlyngaas.


Featured

  • Telecommunications
    Stock photo ID: 658810513 By asharkyu

    GSA extends EIS deadline to 2023

    Agencies are getting up to three more years on existing telecom contracts before having to shift to the $50 billion Enterprise Infrastructure Solutions vehicle.

  • Workforce
    Shutterstock image ID: 569172169 By Zenzen

    OMB looks to retrain feds to fill cyber needs

    The federal government is taking steps to fill high-demand, skills-gap positions in tech by retraining employees already working within agencies without a cyber or IT background.

  • Acquisition
    GSA Headquarters (Photo by Rena Schild/Shutterstock)

    GSA to consolidate multiple award schedules

    The General Services Administration plans to consolidate dozens of its buying schedules across product areas including IT and services to reduce duplication.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.