This article is from the source 'guardian' and was first published or seen on . It last changed over 40 days ago and won't be checked again for changes.
You can find the current article at its original source at http://www.guardian.co.uk/technology/2012/jul/10/us-master-hackers-al-qaida
The article has changed 4 times. There is an RSS feed of changes available.
Version 1 | Version 2 |
---|---|
US urged to recruit master hackers to wage cyber war on America's foes | US urged to recruit master hackers to wage cyber war on America's foes |
(4 months later) | |
Instead of prosecuting elite computer hackers, the US government should recruit them to launch cyber-attacks against Islamist terrorists and other foes, according to a leading military thinker and government adviser. | Instead of prosecuting elite computer hackers, the US government should recruit them to launch cyber-attacks against Islamist terrorists and other foes, according to a leading military thinker and government adviser. |
The brilliance of hacking experts could be put to use on behalf of the US in the same way as German rocket scientists were enlisted after the second world war, said John Arquilla, a professor of defence analysis at the US Naval Postgraduate School in Monterey, California, in an interview with the Guardian. | The brilliance of hacking experts could be put to use on behalf of the US in the same way as German rocket scientists were enlisted after the second world war, said John Arquilla, a professor of defence analysis at the US Naval Postgraduate School in Monterey, California, in an interview with the Guardian. |
He said that the US had fallen behind in the cyber race and needed to set up a "new Bletchley Park" of computer whizzes and codecrackers to detect, track and disrupt enemy networks. "If this was being done, the war on terror would be over," he said. Arquilla, who invented the term cyberwarfare two decades ago, said a few master hackers had already been recruited but more were needed. | He said that the US had fallen behind in the cyber race and needed to set up a "new Bletchley Park" of computer whizzes and codecrackers to detect, track and disrupt enemy networks. "If this was being done, the war on terror would be over," he said. Arquilla, who invented the term cyberwarfare two decades ago, said a few master hackers had already been recruited but more were needed. |
"Let's just say that in some places you find guys with body piercings and non-regulation haircuts. But most of these sorts of guys can't be vetted in the traditional way. We need a new institutional culture that allows us to reach out to them." | "Let's just say that in some places you find guys with body piercings and non-regulation haircuts. But most of these sorts of guys can't be vetted in the traditional way. We need a new institutional culture that allows us to reach out to them." |
Many dabbled in illegal or questionable acts but the US, he noted, had turned Wernher von Braun, Hitler's top scientist, into an American hero after putting him to work on US rockets and space programmes. | Many dabbled in illegal or questionable acts but the US, he noted, had turned Wernher von Braun, Hitler's top scientist, into an American hero after putting him to work on US rockets and space programmes. |
Arquilla lambasted lengthy jail terms for hacking, saying it "poisoned" relations between both sides. "It's very, very troubling." He disagreed with the attempt to extradite Gary McKinnon, a British system administrator who has been accused by one US prosecutor of the "biggest military hack of all time" using the code name Solo. | Arquilla lambasted lengthy jail terms for hacking, saying it "poisoned" relations between both sides. "It's very, very troubling." He disagreed with the attempt to extradite Gary McKinnon, a British system administrator who has been accused by one US prosecutor of the "biggest military hack of all time" using the code name Solo. |
"I think it's ridiculous. They're trying to use deterrences that won't work." | "I think it's ridiculous. They're trying to use deterrences that won't work." |
Arquilla, who advised General Norman Schwarzkopf during the first gulf war and secretary of defence Donald Rumsfeld during the second, estimated there were around 100 master hackers in the world, with many, if not most, in Asia and Russia. | Arquilla, who advised General Norman Schwarzkopf during the first gulf war and secretary of defence Donald Rumsfeld during the second, estimated there were around 100 master hackers in the world, with many, if not most, in Asia and Russia. |
He had established contact with several in the US – "they are like shy woodland animals" – and even brought one to meet the CEO of a major company to alert him to his information system's vulnerabilities. The executive, scornful at first, was stunned when the hacker broke into the system with a handheld device in just a few minutes. "All hell broke loose," said Arquilla, who declined to identify the company. | He had established contact with several in the US – "they are like shy woodland animals" – and even brought one to meet the CEO of a major company to alert him to his information system's vulnerabilities. The executive, scornful at first, was stunned when the hacker broke into the system with a handheld device in just a few minutes. "All hell broke loose," said Arquilla, who declined to identify the company. |
The Pentagon and other security agencies must exploit that sort of ability, he said. "This is huge human capital. They are the rangers of the cyber sphere. Most of them are drawn to it for its beauty and complexity." Few had overt political agendas, but they could be turned into patriots. "Most of the hackers I have known would love to destroy al-Qaida." | The Pentagon and other security agencies must exploit that sort of ability, he said. "This is huge human capital. They are the rangers of the cyber sphere. Most of them are drawn to it for its beauty and complexity." Few had overt political agendas, but they could be turned into patriots. "Most of the hackers I have known would love to destroy al-Qaida." |
Arquilla has long clashed with sceptics who downplay cyber warfare as unproven hype. He said felt vindicated last year when the Pentagon unveiled a new strategy for protecting military computer networks from hackers and designated cyberspace an "operational domain". | Arquilla has long clashed with sceptics who downplay cyber warfare as unproven hype. He said felt vindicated last year when the Pentagon unveiled a new strategy for protecting military computer networks from hackers and designated cyberspace an "operational domain". |
The professor was part of a five-member team which advised the Obama administration last year. "Old Higgs had to wait 50 years," he said, referring to the physicist Peter Higgs, whose proposed Higgs boson particle was recently all but confirmed. "I had to wait only 20 years." Last November he published an article titled From Blitzkrieg to Bitskrieg: the military encounter with computers. | The professor was part of a five-member team which advised the Obama administration last year. "Old Higgs had to wait 50 years," he said, referring to the physicist Peter Higgs, whose proposed Higgs boson particle was recently all but confirmed. "I had to wait only 20 years." Last November he published an article titled From Blitzkrieg to Bitskrieg: the military encounter with computers. |
The Naval Postgraduate School has close links with the special forces and gives masters and PhD courses to officers from across the services. Arquilla, a contributor to Foreign Policy, is a former director of the Pentagon's Information Operations Center for Excellence. He was also a consultant on the 1995 cyber thriller The Net, starring Sandra Bullock. | The Naval Postgraduate School has close links with the special forces and gives masters and PhD courses to officers from across the services. Arquilla, a contributor to Foreign Policy, is a former director of the Pentagon's Information Operations Center for Excellence. He was also a consultant on the 1995 cyber thriller The Net, starring Sandra Bullock. |
The veteran analyst said al-Qaida's loose, decentralised organisational structure had flummoxed the US a decade ago, and that under strategist Abu Musab al-Suri it would become even flatter and looser, impeding traditional counter-terror efforts. The movement, however, was vulnerable. "This global network simply can't thrive without the world wide web and internet. It can't operate without it, or if it does, at a greatly reduced level." | The veteran analyst said al-Qaida's loose, decentralised organisational structure had flummoxed the US a decade ago, and that under strategist Abu Musab al-Suri it would become even flatter and looser, impeding traditional counter-terror efforts. The movement, however, was vulnerable. "This global network simply can't thrive without the world wide web and internet. It can't operate without it, or if it does, at a greatly reduced level." |
Master hackers, he said, could sabotage their communications. "We must create a new Bletchley Park. Detect, track, disrupt, that's the key. Back-hack so they don't know how we're doing it. And even if we can't do certain things, make them think we can." | Master hackers, he said, could sabotage their communications. "We must create a new Bletchley Park. Detect, track, disrupt, that's the key. Back-hack so they don't know how we're doing it. And even if we can't do certain things, make them think we can." |
Arquilla scorned the state department's admission in May that it had hacked Yemeni tribal websites to change messages about killing Americans as a feeble shadow of what could be done. "If we take the war to them we can win the network war." The Stuxnet worm which attacked Iran's nuclear programme showed the true potential of what he termed "cybotage". | Arquilla scorned the state department's admission in May that it had hacked Yemeni tribal websites to change messages about killing Americans as a feeble shadow of what could be done. "If we take the war to them we can win the network war." The Stuxnet worm which attacked Iran's nuclear programme showed the true potential of what he termed "cybotage". |
The professor stressed that cyber operations, like air campaigns, could not win wars on their own. Unlike some thinkers he did not fear a major "cyber-Pearl Harbor" attack on the US, saying that the risk was instead small, multiple attacks costing hundreds of billions of dollars. | The professor stressed that cyber operations, like air campaigns, could not win wars on their own. Unlike some thinkers he did not fear a major "cyber-Pearl Harbor" attack on the US, saying that the risk was instead small, multiple attacks costing hundreds of billions of dollars. |
Hacking, he said, was most effective when incorporated into wider military strategy. The Russians, he said, pioneered this during the August 2008 conflict with Georgia when cyber-attacks sliced through US-designed technology "like a knife through butter", disrupting Georgian forces and paving Russia's quick victory. | Hacking, he said, was most effective when incorporated into wider military strategy. The Russians, he said, pioneered this during the August 2008 conflict with Georgia when cyber-attacks sliced through US-designed technology "like a knife through butter", disrupting Georgian forces and paving Russia's quick victory. |
Moscow denied mounting cyber operations, and their provenance was never discovered. But Arquilla said "Russian-aligned interests" successfully attacked Estonia's networks during a diplomatic row in 2007. "It's all veiled, but the real leaders in the field are the Russians." China and North Korea were also highly sophisticated. "They understand the strategic uses." | Moscow denied mounting cyber operations, and their provenance was never discovered. But Arquilla said "Russian-aligned interests" successfully attacked Estonia's networks during a diplomatic row in 2007. "It's all veiled, but the real leaders in the field are the Russians." China and North Korea were also highly sophisticated. "They understand the strategic uses." |
Arquilla compared computer firewalls to the Maginot line – France's failed defence against Germany – and urged US state agencies and companies to use strong encryption and cloud computing to keep data on the move. "The level of insecurity is huge. The average individual is a zombie in some hacker's botnet within half an hour of going online." | Arquilla compared computer firewalls to the Maginot line – France's failed defence against Germany – and urged US state agencies and companies to use strong encryption and cloud computing to keep data on the move. "The level of insecurity is huge. The average individual is a zombie in some hacker's botnet within half an hour of going online." |
He accused the Pentagon and its political masters of wasting billions on pointless aircraft carriers, tanks and planes at the expense of nimbler, leaner strategy. "Militaries often take time to adapt. Think world war one and generals using Waterloo tactics." | He accused the Pentagon and its political masters of wasting billions on pointless aircraft carriers, tanks and planes at the expense of nimbler, leaner strategy. "Militaries often take time to adapt. Think world war one and generals using Waterloo tactics." |
Comments | |
103 comments, displaying first | |
10 July 2012 3:17PM | |
Very Interesting piece. | |
Just show you have pathetic the state department is in going after these guys rather than Defense bringing these guys in to protect vital systems. If not the private sector will scoop them up to potect there websites | |
Link to this comment: | |
10 July 2012 3:18PM | |
What hacker would like to work for a government wiping out women and children with drones? | |
Link to this comment: | |
10 July 2012 3:27PM | |
I would think the intelligence services in most of the western world have been using Hackers for decades now. It would have been very silly not to. I don't think it would have stopped Islamist terrorists though, there's ways around everything and there have been plenty of accounts of them using paper and other low-tech methods. Good article though. | |
Link to this comment: | |
10 July 2012 3:29PM | |
What hacker would like to work for a government wiping out women and children with drones? | |
The big cheese from 'anonymous' that was caught recently, apparently. | |
Link to this comment: | |
10 July 2012 3:37PM | |
Catch me if you can... | |
Link to this comment: | |
10 July 2012 3:38PM | |
What hacker would like to work for a government wiping out women and children with drones? | |
It may be slightly more acceptable to a hacker if it might mitigate them out of a 10 or more year stretch? I agree with your point, but I think fairly heavy duress could be made on a few of them | |
Link to this comment: | |
10 July 2012 3:46PM | |
what a ridiculous statement - as if hackers have any sense of morality | |
Link to this comment: | |
10 July 2012 3:53PM | |
I think you only need to be familiar with PS3 or Xbox controller to be qualified to fire drones at innocent people around the world. Wouldn't be surprised if they see 'Kill Streak' on their monitors or get to access extra perks such as 'No Guilt'. | |
Link to this comment: | |
10 July 2012 3:54PM | |
Yes, prosecuting hackers instead of recruiting them is a waste of resources, and makes the authorities look stupid, because their security was faulty. | |
Link to this comment: | |
10 July 2012 3:58PM | |
The kind whose sister was "wiped out" by a couple of Boeing 767s. | |
See? I can appeal to emotion too. | |
Link to this comment: | |
10 July 2012 4:03PM | |
I think these sorts of stuff should be taught in Universities, the only way to protect a country is to educate its individual citizens about new technology. | |
Internet programming isn't as simple as some people thing, I don't have much knowledge of them but trying to hack into a website is difficult I would imagine. | |
Link to this comment: | |
10 July 2012 4:06PM | |
IT will be the new arms war . . .the ability to destory a nations network . . we've known this for a few years now so would be surpriced if the US are only now recruiting hackers | |
Link to this comment: | |
10 July 2012 4:06PM | |
"...the same way as German rocket scientists were enlisted after the second world war..." | |
As is that is something to emulate, or be proud of? | |
Link to this comment: | |
10 July 2012 4:08PM | |
Of course, I meant to type: As IF that is something to emulate, or be proud of? | |
Link to this comment: | |
10 July 2012 4:08PM | |
But don't do it by extraditing ours! | |
http://www.guardian.co.uk/uk/2009/jul/31/computer-hacker-extradition-decision-due?INTCMP=SRCH | |
Link to this comment: | |
10 July 2012 4:14PM | |
"what a ridiculous statement - as if hackers have any sense of morality"] | |
Thats exactly why they hack systems like the US military! ;) | |
Link to this comment: | |
10 July 2012 4:32PM | |
Given how much chaos can be inflicted on the infrastructure of a country by storms (I million US people without power in heatwave) or IT cock-ups (NatWest/RBS) you'd think someone in government security circles would have the imagination to understand what could happen if this country was seriously cyber-attacked. | |
But no - we prefer to persecute our hackers rather then learning from them. or some of them at least. Hack the voicemail of politicians & get invited to Christmas lunch with the PM. Hack a government website & get extradited to America. | |
Link to this comment: | |
10 July 2012 4:33PM | |
The trouble with enlisting the aid of those with the know-how is that the best of them are nearly impossible to find and do have political beliefs, mostly because of what they've surrepticiously learned, and they don't work well with most others. Through my own small skills I was able to hunt down a few of them, many years ago, in the hope of gaining their help to uncover a world-wide conspiracy I'd stumbled on by a group of ******** industry corporations, the results and replies ranged from mute to rapid-fire proxy-guarded attacks that only let up when I surrendered my bonafides (and computer). Letting some of these people near a security-hub could be a fatal error and I'd be surprised if the best of them would allow themselves to be bought out. | |
Link to this comment: | |
10 July 2012 4:44PM | |
The U.S. just keeps dodging international law and keeps proving they have lost any moral authority to accuse other countries of human rights abuses and terrorism. | |
This entire terrorism menace just mirrors the U.S.'s international behaviour and the cheapest and most effective way to stop it, would be to close down is all of the U.S.'s 700 or so foreign military bases. This would free up hundreds of billions of dollars per year to solve the economic crisis and achieve the languishing Millenium Development Goals. The U.S. could turn from a rogue state into a champion of democracy again and most motives of terrorism against the U.S. would simply evaporate. | |
Unfortunately that's not in the interest of the 1% who 'earn' billions with the arms' industry, by perpetuating wars and terrorism. So, unless we bring down this fake democratic theatre, nothing will change. | |
Link to this comment: | |
10 July 2012 4:45PM | |
another angle is hire them, and when they show up for work, introduce them to bubba. | |
Link to this comment: | |
10 July 2012 4:49PM | |
The kind of hacker who may understand that by engaging in efficient cyber warfare they would be able to reduce or possibly eliminate the need for drone strikes wiping out women and children. | |
If you can change the system then surely that's better than just bucking against it, isn't it? | |
Link to this comment: | |
10 July 2012 4:55PM | |
Ha,ha Bubba is that the 'anonymous' hacker leader who works for FBI/CIA. Couldn't remember his name. There is no way this hasn't been going on for ages, there's always reports of China using the same strategy so I find it incredulous that the west haven't been doing the same for years. | |
Link to this comment: | |
10 July 2012 4:57PM | |
if they are saying this in public then they have already done this. | |
The Russians, he said, pioneered this during the August 2008 conflict with Georgia when cyber-attacks sliced through US-designed technology "like a knife through butter", disrupting Georgian forces and paving Russia's quick victory. | |
the americans did not respond 4 years ago? | |
Link to this comment: | |
10 July 2012 4:59PM | |
no you didn't | |
Link to this comment: | |
10 July 2012 5:00PM | |
dont want to... | |
Link to this comment: | |
10 July 2012 5:13PM | |
You'll probably find that most hackers are fairly moral for a given value of moral | |
cf. Lulzsec when they went on their spree | |
Dear NHS, we have access to this list of your passwords, we're not going to release them because we like you (sic) | |
Link to this comment: | |
10 July 2012 5:15PM | |
There is... Certificate In Ethical Hacking anyone... | |
Link to this comment: | |
10 July 2012 5:19PM | |
Where and when does the US government stop looking for enemies? | |
Link to this comment: | |
10 July 2012 5:25PM | |
I am not sure I can do that.... | |
Link to this comment: | |
10 July 2012 5:26PM | |
as has been pointed out the enemy is profligate terrorising using the military as the states tool, .. so now they want rendition for those whose abilities are geared towards nobler aspirations than garnering filthy lucre from illegal wars for personal enrichment at the expense of global peace ? these sociopaths must be as stupid as they are pernicious. | |
Link to this comment: | |
10 July 2012 5:35PM | |
Well, come on generals, let's move fast; Your big chance has come at last. Now you can go out and get those reds 'Cause the only good commie is the one that's dead And you know that peace can only be won When we've blown 'em all to kingdom come. | |
-Country Joe MacDonald | |
Link to this comment: | |
10 July 2012 5:37PM | |
I've never understood why the US hot-shots haven't seen the value in 'turning' computer hackers. | |
It's rather like running a business: if you've got any sense at all you will immensely value those criticisms from customers about poor service, since it affords you the opportunity to put right things you may well have not known about. If a back-bedroom Peckham hacker can break into 'sophisticated' Pentagon program, are they kidding themselves that Moscow, Beijing or Seoul can't do the same? | |
If anything, they should encourage hackers by saying " beat this, and we'll give you a $1million if you show us how you did it". Peanuts, even in the short term. | |
Link to this comment: | |
10 July 2012 5:51PM | |
Of course the US already operates in this way. Stuxnet, for example, is mentioned in the main article & we know there have been further more sophisticated cyber attacks on Iran. | |
What does appear odd is the suggestion that use is made of hackers who have been caught. Surely that is an indication of lack of skill. | |
Link to this comment: | |
10 July 2012 6:09PM | |
That seems common sense, something that clearly isn't common any longer. | |
Link to this comment: | |
10 July 2012 6:17PM | |
This would never have been needed if the Pentagon hadn't let Division run off with Birkhoff. | |
Link to this comment: | |
10 July 2012 6:22PM | |
This comment was removed by a moderator because it didn't abide by our community standards. Replies may also be deleted. For more detail see our FAQs. | |
10 July 2012 6:32PM | |
of course they have, some people think that because it's not in the news that it's not happening. | |
bubba is the generic name given to a large, homicidal cell mate who will make them his play thing. | |
Link to this comment: | |
10 July 2012 7:28PM | |
If they didn't do this already I would be rather surprised. | |
Link to this comment: | |
10 July 2012 7:29PM | |
The brilliance of hacking experts could be put to use on behalf of the US in the same way as German rocket scientists were enlisted after the second world war, | |
"enlisted" during and probably prior to by the big corporate named players (IBM, Ford, JP Morgan) that keep recurring now and throughout modern history. Afterall, murdering millions is `nothing personal - just good business'. | |
BTW "terrorist" is not a muslim with a pair of box cutters, but rather a well known euphemism for anyone who publically criticizes government. As Bubba said, and I paraphrase - `you are either with us - or against us'. | |
Link to this comment: | |
10 July 2012 7:48PM | |
I think we all know that 'recruited' means forced to work for them, under threat of prosecution by militarized court with secret evidence or rendition to be tortured. This isn't common sense, it's fascism. | |
Link to this comment: | |
10 July 2012 7:57PM | |
Oh right that bubba, sorry crossed wires. Sabu was his name, just googled it, part of Lulzsec?? I'd rather share a cell with sabu than bubba, truth be told. | |
Link to this comment: | |
10 July 2012 8:14PM | |
No, it's Sabu. He's talking about setting a trap to entice the hackers in, then locking them up (with a big, sweaty, homosexual cellmate.) | |
Link to this comment: | |
10 July 2012 8:42PM | |
well if some purports to advise and say something like "Militaries often take time to adapt. Think world war one and generals using Waterloo tactics."" hes an ass of the highest order probably out for some pork from a compliant senator | |
Ww2 US generals cocking up their tank tactics and leaving tankers to die in shermans nicknamed "tomy cookers" instead of fast tracking the Pershing and not taking the firefly when offered by us is a better example. | |
Link to this comment: | |
10 July 2012 8:42PM | |
One needs to get a grip on reality. Many scientists left government service when the Department of Defense became the "Department of Offense" in the 80's. Now that truth will out and expose the 1% buying elections to service their interests instead of We the People (nation), what makes anyone think that anyone with a conscience would come to the aid of the "oppressor"? You really think you can buy Anonymous? "If you cannot buy them then oppress them"? "The tighter you squeeze, the more will slip through you fingers." | |
Link to this comment: | |
10 July 2012 8:43PM | |
Phagocytosis opportunity or entrapment - track record doesn't seem very appealing does it? | |
Link to this comment: | |
10 July 2012 8:48PM | |
RAND Corporation can't cut it anymore? | |
Link to this comment: | |
10 July 2012 8:51PM | |
I suppose things may may have moved on a little from when the CIA used to literally hang up open-day recruitment banners at Ivy League Universites. Still the US has used entrapment as a means of enforcement and modus operandi for so long, would a real recruitment drive for these hackers be believed.. suspect they are beyond turn up and get a free ipad.. and besides they are probably on no fly lists anyway.. free cruise to the US if you sign-up it is then! | |
Link to this comment: | |
10 July 2012 8:55PM | |
Poachers make great game-keepers. | |
Link to this comment: | |
10 July 2012 8:57PM | |
um isnt it the USA & Israel waging war on sovereign nations that should be stopped? | |
FTA "Confirmed: US and Israel created Stuxnet, lost control of it" | |
link: > http://arstechnica.com/tech-policy/2012/06/confirmed-us-israel-created-stuxnet-lost-control-of-it/ | |
Link to this comment: | |
10 July 2012 8:58PM | |
um isnt it the USA & Israel waging war on sovereign nations that should be stopped? WHO ARE THE WAR CRIMINALS & TERRORISTS? | |
"Cyber-wars: The U.S. and Israel 'worked together to develop destructive Flame virus to slow Iran's nuclear program', claims Washington Post" | |
http://www.dailymail.co.uk/sciencetech/article-2161997/Flame-virus-The-U-S-Israel-worked-develop-destructive-virus-slow-Irans-nuclear-program-claims-Washington-Post.html | |
Link to this comment: | |
Comments on this page are now closed. | |
Turn autoplay off | |
Turn autoplay on | |
Please activate cookies in order to turn autoplay off | |
Edition: UK | |
About us | |
Today's paper | |
Subscribe | |
Top defence expert says the US should avoid 'ridiculous' prosecutions and use hackers' skills to detect and track enemies | |
Instead of prosecuting elite computer hackers, the US government should recruit them to launch cyber-attacks against Islamist terrorists and other foes, according to a leading military thinker and government adviser. | |
The brilliance of hacking experts could be put to use on behalf of the US in the same way as German rocket scientists were enlisted after the second world war, said John Arquilla, a professor of defence analysis at the US Naval Postgraduate School in Monterey, California, in an interview with the Guardian. | |
He said that the US had fallen behind in the cyber race and needed to set up a "new Bletchley Park" of computer whizzes and codecrackers to detect, track and disrupt enemy networks. "If this was being done, the war on terror would be over," he said. Arquilla, who invented the term cyberwarfare two decades ago, said a few master hackers had already been recruited but more were needed. | |
"Let's just say that in some places you find guys with body piercings and non-regulation haircuts. But most of these sorts of guys can't be vetted in the traditional way. We need a new institutional culture that allows us to reach out to them." | |
Many dabbled in illegal or questionable acts but the US, he noted, had turned Wernher von Braun, Hitler's top scientist, into an American hero after putting him to work on US rockets and space programmes. | |
Arquilla lambasted lengthy jail terms for hacking, saying it "poisoned" relations between both sides. "It's very, very troubling." He disagreed with the attempt to extradite Gary McKinnon, a British system administrator who has been accused by one US prosecutor of the "biggest military hack of all time" using the code name Solo. | |
"I think it's ridiculous. They're trying to use deterrences that won't work." | |
Arquilla, who advised General Norman Schwarzkopf during the first gulf war and secretary of defence Donald Rumsfeld during the second, estimated there were around 100 master hackers in the world, with many, if not most, in Asia and Russia. | |
He had established contact with several in the US – "they are like shy woodland animals" – and even brought one to meet the CEO of a major company to alert him to his information system's vulnerabilities. The executive, scornful at first, was stunned when the hacker broke into the system with a handheld device in just a few minutes. "All hell broke loose," said Arquilla, who declined to identify the company. | |
The Pentagon and other security agencies must exploit that sort of ability, he said. "This is huge human capital. They are the rangers of the cyber sphere. Most of them are drawn to it for its beauty and complexity." Few had overt political agendas, but they could be turned into patriots. "Most of the hackers I have known would love to destroy al-Qaida." | |
Arquilla has long clashed with sceptics who downplay cyber warfare as unproven hype. He said felt vindicated last year when the Pentagon unveiled a new strategy for protecting military computer networks from hackers and designated cyberspace an "operational domain". | |
The professor was part of a five-member team which advised the Obama administration last year. "Old Higgs had to wait 50 years," he said, referring to the physicist Peter Higgs, whose proposed Higgs boson particle was recently all but confirmed. "I had to wait only 20 years." Last November he published an article titled From Blitzkrieg to Bitskrieg: the military encounter with computers. | |
The Naval Postgraduate School has close links with the special forces and gives masters and PhD courses to officers from across the services. Arquilla, a contributor to Foreign Policy, is a former director of the Pentagon's Information Operations Center for Excellence. He was also a consultant on the 1995 cyber thriller The Net, starring Sandra Bullock. | |
The veteran analyst said al-Qaida's loose, decentralised organisational structure had flummoxed the US a decade ago, and that under strategist Abu Musab al-Suri it would become even flatter and looser, impeding traditional counter-terror efforts. The movement, however, was vulnerable. "This global network simply can't thrive without the world wide web and internet. It can't operate without it, or if it does, at a greatly reduced level." | |
Master hackers, he said, could sabotage their communications. "We must create a new Bletchley Park. Detect, track, disrupt, that's the key. Back-hack so they don't know how we're doing it. And even if we can't do certain things, make them think we can." | |
Arquilla scorned the state department's admission in May that it had hacked Yemeni tribal websites to change messages about killing Americans as a feeble shadow of what could be done. "If we take the war to them we can win the network war." The Stuxnet worm which attacked Iran's nuclear programme showed the true potential of what he termed "cybotage". | |
The professor stressed that cyber operations, like air campaigns, could not win wars on their own. Unlike some thinkers he did not fear a major "cyber-Pearl Harbor" attack on the US, saying that the risk was instead small, multiple attacks costing hundreds of billions of dollars. | |
Hacking, he said, was most effective when incorporated into wider military strategy. The Russians, he said, pioneered this during the August 2008 conflict with Georgia when cyber-attacks sliced through US-designed technology "like a knife through butter", disrupting Georgian forces and paving Russia's quick victory. | |
Moscow denied mounting cyber operations, and their provenance was never discovered. But Arquilla said "Russian-aligned interests" successfully attacked Estonia's networks during a diplomatic row in 2007. "It's all veiled, but the real leaders in the field are the Russians." China and North Korea were also highly sophisticated. "They understand the strategic uses." | |
Arquilla compared computer firewalls to the Maginot line – France's failed defence against Germany – and urged US state agencies and companies to use strong encryption and cloud computing to keep data on the move. "The level of insecurity is huge. The average individual is a zombie in some hacker's botnet within half an hour of going online." | |
He accused the Pentagon and its political masters of wasting billions on pointless aircraft carriers, tanks and planes at the expense of nimbler, leaner strategy. "Militaries often take time to adapt. Think world war one and generals using Waterloo tactics." |