Digital Conflict

By Kevin Coleman

Blog archive

Congress asks about cyber black ops

It should be no surprise to anyone that the U.S. military has offensive cyber capabilities, and on occasion may have used them in clandestine operations known as black-ops. Security experts believe China, Russia and the United States are in a dead heat when it comes to cyber capabilities.

As a regulator requirement, our military provides a classified quarterly report on clandestine activities as part of congressional oversight. After reviewing that report in mid-January, Congress quickly pointed out the absence of cyber operations in the document provided. This became very public as the Senate Armed Services Committee questioned Mike Vickers, the nominee for director of National Intelligence. Vickers replied and quickly pointed out that cyber/high-tech operations are not specifically listed in the law requiring the reporting of clandestine operations.

Were members of the Senate Armed Services Committee just asking general questions or were they looking for something specific? Could the vague inquiry have been related to claims that the U.S. military/intelligence community was involved in the sophisticated Stuxnet cyber attack on Iran’s nuclear enrichment program? That is a real possibility since Iran announced its intention to pursue legal actions through the International Courts against Israel and possibly others (United States and United Kingdom) for the murders of its scientists including the chief Stuxnet investigator.

The pace with which the cyber domain is changing is far greater than what we are accustomed to dealing with. Perhaps an honest oversight took place, or has the pace with which cyber warfare has progressed outpaced the policies and laws, such as the ones requiring proper reporting of clandestine operations to Congress. If it was directed at the Stuxnet incident, those are the topics best addressed behind closed doors in a classified setting and the questioning was way out of line for this setting.

Posted by Kevin Coleman on Jan 20, 2011 at 12:12 PM


Featured

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

  • Comment
    Pilot Class. The author and Barbie Flowers are first row third and second from right, respectively.

    How VA is disrupting tech delivery

    A former Digital Service specialist at the Department of Veterans Affairs explains efforts to transition government from a legacy "project" approach to a more user-centered "product" method.

  • Cloud
    cloud migration

    DHS cloud push comes with complications

    A pressing data center closure schedule and an ensuing scramble to move applications means that some Homeland Security components might need more than one hop to get to the cloud.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.