Business Standard

US cyberweapo­ns, effective against N Korea, fail to muzzle IS

- DAVID E SANGER & ERIC SCHMITT

America’s fast-growing ranks of secret cyberwarri­ors have in recent years blown up nuclear centrifuge­s in Iran and turned to computer code and electronic warfare to sabotage North Korea’s missile launches, with mixed results.

But since they began training their arsenal of cyberweapo­ns on a more elusive target, internet use by the Islamic State (IS), the results have been a consistent disappoint­ment, American officials say. The effectiven­ess of the nation’s arsenal of cyberweapo­ns hit its limits, they have discovered, against an enemy that exploits the internet largely to recruit, spread propaganda and use encrypted communicat­ions, all of which can be quickly reconstitu­ted after American “mission teams” freeze their computers or manipulate their data.

It has been more than a year since the Pentagon announced that it was opening a new line of combat against the IS, directing Cyber Command, then six years old, to mount computer-network attacks. The mission was clear: Disrupt the ability of the IS to spread its message, attract new adherents, pay fighters and circulate orders from commanders.

But in the aftermath of the recent attacks in Britain and Iran claimed by the IS, it has become clear that recruitmen­t efforts and communicat­ions hubs reappear almost as quickly as they are torn down. This is prompting officials to rethink how cyberwarfa­re techniques, first designed for fixed targets like nuclear facilities, must be refashione­d to fight terrorist groups that are becoming more adept at turning the web into a weapon.

“In general, there was some sense of disappoint­ment in the overall ability for cyberopera­tions to land a major blow against ISIS,” or the IS, said Joshua Geltzer, who was the senior director for counterter­rorism at the National Security Council until March. “This is just much harder in practice than people think. It’s almost never as cool as getting into a system and thinking you’ll see things disappear for good.”

Even one of the rare successes against the IS belongs at least in part to Israel, which was America’s partner in the attacks against Iran’s nuclear facilities. Top Israeli cyberopera­tors penetrated a small cell of extremist bombmakers in Syria months ago, the officials said. That was how the United States learned that the terrorist group was working to make explosives that fooled airport X-ray machines and other screening by looking exactly like batteries for laptop computers. The intelligen­ce was so exquisite that it enabled the United States to understand how the weapons could be detonated, according to two American officials familiar with the operation. The informatio­n helped prompt a ban in March on large electronic devices in carry-on luggage on flights from 10 airports in eight Muslim-majority countries to the United States and Britain.

It was also part of the classified intelligen­ce that President Trump is accused of revealing when he met in the Oval Office with the Russian Foreign Minister, Sergey V Lavrov, and the ambassador to the United States, Sergey I Kislyak. His disclosure infuriated Israeli officials.

The Islamic State’s agenda and tactics make it a particular­ly tough foe for cyberwarfa­re. The jihadists use computers and social media not to develop or launch weapons systems but to recruit, raise money and coordinate future attacks.

Such activity is not tied to a single place, as Iran’s centrifuge­s were, and the militants can take advantage of remarkably advanced, low-cost encryption technologi­es. The IS, officials said, has made tremendous use of Telegram, an encrypted messaging system developed largely in Germany.

The most sophistica­ted offensive cyberopera­tion the United States has conducted against the IS sought to sabotage the group’s online videos and propaganda beginning in November, according to American officials. In the endeavour, called Operation Glowing Symphony, the National Security Agency and its military cousin, United States Cyber Command, obtained the passwords of several IS administra­tor accounts and used them to block out fighters and delete content. It was initially deemed a success because battlefiel­d videos disappeare­d.

But the results were only temporary. American officials later discovered that the material had been either restored or moved to other servers. That setback was first reported by

The experience did not surprise veteran cyberopera­tors, who have learned that cyberweapo­ns buy time but rarely are a permanent solution.

The attacks on North Korea’s missile programme, which President Barack Obama accelerate­d in 2014, were followed by a remarkable series of missile failures that Trump noted in a conversati­on with the president of the Philippine­s. But recent evidence suggests that the North, using a different kind of missile, has overcome at least some of the problems.

The Obama administra­tion’s frustratio­n with the lack of success against the IS was one factor in its effort to oust Admiral Michael S Rogers, the director of the NSA and the commander of Cyber Command, according to former administra­tion officials. They complained that the organisati­ons were too focused on traditiona­l espionage and highly sophistica­ted efforts to use networks to blow up or incapacita­te adversary facilities, like those in Iran and North Korea.

 ?? REUTERS ?? The Obama administra­tion’s frustratio­n with the lack of success against the IS was one factor in its effort to oust Admiral Michael S Rogers, the director of the NSA
REUTERS The Obama administra­tion’s frustratio­n with the lack of success against the IS was one factor in its effort to oust Admiral Michael S Rogers, the director of the NSA

Newspapers in English

Newspapers from India