This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

US air force deems some cyber tools to be 'weapons'

Share this article:

Six cyber tools have been designated as weapons by the US air force.

According to Reuters, Lieutenant General John Hyten, vice commander of Air Force Space Command, said the new designations would help ‘normalise' military cyber operations as the US military works to keep up with rapidly changing threats.

Hyten said that with this designation, this could help programs compete for a share of the defence budget and give cyber more attention. Speaking at the National Space Symposium in Colorado Springs, Hyten said the recent decision by Air Force Chief of Staff General Mark Welsh to designate certain cyber tools as weapons would help ensure funding. "It's very, very hard to compete for resources. You have to be able to make that case," he said.

While Hyten said that the US air force is also working to better integrate cyber capabilities with other weapons, he gave no details on the new cyber weapons, but did say that the Pentagon has become more open over the past year about its work to develop offensive cyber capabilities in the face of escalating cyber attacks.

Jarno Limnéll, doctor in military science and director of cyber security at Stonesoft, said: “Increased funding and the normalisation of cyber tools as a form of weaponry, coupled with leaks that President Obama now has the authority to initiate a preventive cyber strike in the face of a looming attack on the US, shows it is difficult to imagine future wars without cyber activities.

“The development of advanced forms of computer network attacks, such as Stuxnet, require investments of both time and capital. The classification of cyber capabilities as weapons shows it is clear the world has entered a new arms race era. This will become increasingly active as governments launch attacks, create malware, write Trojans and infect computers to achieve their political objectives.

“Cyber capabilities are a fifth dimension of warfare – in addition to land, sea, air and space – and while it's unlikely future battles will be completely online, it is difficult to imagine future wars or conflicts without cyber activities.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud

Exclusive video webcast & Q&A sponsored by Vormetric

As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.

View the webcast here to find out more

More in News

Password recovery made too easy

Password recovery made too easy

A senior malware analyst has slammed the availability of a `password recovery' utility from Freehostia, noting that the software actually uses network admin utilities to take credentials from the users' ...

Belgacom says alleged GCHQ APT attack cost firm £12 million

Belgacom says alleged GCHQ APT attack cost firm ...

One year on from a nation-state APT which 124 systems at telecom operator Belgacom and the firm has detailed the cost and manpower involved in the clean-up operation.

CryptoWall compromises 40,000 UK citizens

CryptoWall compromises 40,000 UK citizens

Research just published claims to show that ransomware - in the shape of CryptoWall - is still generating healthy volumes of income for the cyber-criminals behind the code.