This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

US air force deems some cyber tools to be 'weapons'

Share this article:

Six cyber tools have been designated as weapons by the US air force.

According to Reuters, Lieutenant General John Hyten, vice commander of Air Force Space Command, said the new designations would help ‘normalise' military cyber operations as the US military works to keep up with rapidly changing threats.

Hyten said that with this designation, this could help programs compete for a share of the defence budget and give cyber more attention. Speaking at the National Space Symposium in Colorado Springs, Hyten said the recent decision by Air Force Chief of Staff General Mark Welsh to designate certain cyber tools as weapons would help ensure funding. "It's very, very hard to compete for resources. You have to be able to make that case," he said.

While Hyten said that the US air force is also working to better integrate cyber capabilities with other weapons, he gave no details on the new cyber weapons, but did say that the Pentagon has become more open over the past year about its work to develop offensive cyber capabilities in the face of escalating cyber attacks.

Jarno Limnéll, doctor in military science and director of cyber security at Stonesoft, said: “Increased funding and the normalisation of cyber tools as a form of weaponry, coupled with leaks that President Obama now has the authority to initiate a preventive cyber strike in the face of a looming attack on the US, shows it is difficult to imagine future wars without cyber activities.

“The development of advanced forms of computer network attacks, such as Stuxnet, require investments of both time and capital. The classification of cyber capabilities as weapons shows it is clear the world has entered a new arms race era. This will become increasingly active as governments launch attacks, create malware, write Trojans and infect computers to achieve their political objectives.

“Cyber capabilities are a fifth dimension of warfare – in addition to land, sea, air and space – and while it's unlikely future battles will be completely online, it is difficult to imagine future wars or conflicts without cyber activities.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud

Exclusive video webcast & Q&A sponsored by Vormetric

As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.

View the webcast here to find out more

More in News

WorldPay hacker sentenced to 11 years for role in £6 million scheme

WorldPay hacker sentenced to 11 years for role ...

An Estonian man, who helped hack payment processor RBS WorldPay in 2008, has now been sentenced to 11 years in prison for his involvement in the £5.9 (US$ 9.4 million) ...

'Sophisticated' Chinese hackers launched attacks against 43,000 computer systems

'Sophisticated' Chinese hackers launched attacks against 43,000 computer ...

A new report reveals that a Chinese cyber-espionage group is closely affiliated with government and carried out attacks against the likes of Fortune 500 companies and government agencies.

Hackers smuggle out stolen data disguised as videos

Hackers smuggle out stolen data disguised as videos

Around a dozen organisations, including at least one financial sector company, have been hit by a new form of hacking where attackers hide stolen corporate data inside video files that ...