Offensive Cyber Tools to Get Legal Review, Air Force Says

August 10th, 2011 by Steven Aftergood

https://www.fas.org/blog/secrecy/2011/08/af_cyber.html

Even the most highly classified offensive cyberwar capabilities that are 
acquired by the Air Force for use against enemy computer systems will be 
subject to “a thorough and accurate legal review,” the U.S. Air Force said in a 
new policy directive (pdf).

The directive assigns the Judge Advocate General to “ensure all cyber 
capabilities being developed, bought, built, modified or otherwise acquired by 
the Air Force that are not within a Special Access Program are reviewed for 
legality under LOAC [Law of Armed Conflict], domestic law and international law 
prior to their acquisition for use in a conflict or other military operation.”

In the case of cyber weapons developed in tightly secured Special Access 
Programs, the review is to be performed by the Air Force General Counsel, the 
directive said.  See “Legal Reviews of Weapons and Cyber Capabilities,” Air 
Force Instruction 51-402, 27 July 2011.

The Air Force directive is somewhat more candid than most other official 
publications on the subject of offensive cyber warfare.

Thus, “for the purposes of this Instruction, an Air Force cyber capability 
requiring a legal review prior to employment is any device or software payload 
intended to disrupt, deny, degrade, negate, impair or destroy adversarial 
computer systems, data, activities or capabilities.”

On the other hand, cyber capabilities requiring legal review “do not include a 
device or software that is solely intended to provide access to an adversarial 
computer system for data exploitation,” the directive said.

One challenge facing such legal reviews is that law and policy in the 
relatively new field of cyberwar are not fully articulated.  Another challenge 
is that where applicable law and policy do exist, they may be inconsistent with 
the use of offensive cyber tools.

In response to a question (pdf) on cyberwarfare from the Senate Armed Services 
Committee at his confirmation hearing last year, Lt. Gen. Keith Alexander of 
U.S. Cyber Command said: “President Obama’s cybersecurity sixty-day study 
highlighted the mismatch between our technical capabilities to conduct 
operations and the governing laws and policies, and our civilian leadership is 
working hard to resolve the mismatch.” (page 9)

But he added: “Given current operations, there are sufficient law, policy, and 
authorities to govern DOD cyberspace operations. If confirmed, I will operate 
within applicable laws, policies, and authorities. I will also identify any 
gaps in doctrine, policy and law that may prevent national objectives from 
being fully realized or executed to the Commander, U.S. Strategic Command and 
the Secretary of Defense.”

Asked whether DoD possesses “significant capabilities to conduct military 
operations in cyberspace,” Gen. Alexander would only provide an answer on a 
classified basis.

The Pentagon does not often acknowledge the existence of offensive cyber 
capabilities.  The “Department of Defense Strategy for Operating in Cyberspace” 
(pdf) that was released in unclassified form last month does not address 
offensive cyber warfare at all.
_______________________________________________
Infowarrior mailing list
[email protected]
https://attrition.org/mailman/listinfo/infowarrior

Reply via email to