U.S. military laces up its cyber boxing gloves
For this week’s Seven Questions, “Waiting for a Cyber Pearl Harbor,” FP asked Richard A. Clarke, former U.S. counterterrorism chief and former special advisor to the president on cybersecurity, about what offensive capabilities the new U.S. Air Force Cyber Command (AFCYBER) should have. He succinctly replied: “Highly classified ones.” Though Clarke isn’t interested in mentioning ...
For this week's Seven Questions, "Waiting for a Cyber Pearl Harbor," FP asked Richard A. Clarke, former U.S. counterterrorism chief and former special advisor to the president on cybersecurity, about what offensive capabilities the new U.S. Air Force Cyber Command (AFCYBER) should have. He succinctly replied: "Highly classified ones."
Though Clarke isn't interested in mentioning specifics, someone else is. Lt. Gen. Robert J. Elder of the U.S. 8th Air Force, under which AFCYBER will be housed once it's officially launched this fall, has revealed how the United States plans to "hit back" in cyberspace.
In an interview with ZDNet.co.uk, he said offensive capabilities that AFCYBER is working on include denial of service, confidential data loss, data manipulation, and system integrity loss. These "cyberpunches" will be paired with kinetic (physical) attacks. Elder said:
For this week’s Seven Questions, “Waiting for a Cyber Pearl Harbor,” FP asked Richard A. Clarke, former U.S. counterterrorism chief and former special advisor to the president on cybersecurity, about what offensive capabilities the new U.S. Air Force Cyber Command (AFCYBER) should have. He succinctly replied: “Highly classified ones.”
Though Clarke isn’t interested in mentioning specifics, someone else is. Lt. Gen. Robert J. Elder of the U.S. 8th Air Force, under which AFCYBER will be housed once it’s officially launched this fall, has revealed how the United States plans to “hit back” in cyberspace.
In an interview with ZDNet.co.uk, he said offensive capabilities that AFCYBER is working on include denial of service, confidential data loss, data manipulation, and system integrity loss. These “cyberpunches” will be paired with kinetic (physical) attacks. Elder said:
Offensive cyberattacks in network warfare make kinetic attacks more effective, [for example] if we take out an adversary’s integrated defence systems or weapons systems. This is exploiting cyber to achieve our objectives.
Now that the U.S. military has put on its cyber boxing gloves, it looks like it’ll be no holds barred in the online world.
More from Foreign Policy


Lessons for the Next War
Twelve experts weigh in on how to prevent, deter, and—if necessary—fight the next conflict.


It’s High Time to Prepare for Russia’s Collapse
Not planning for the possibility of disintegration betrays a dangerous lack of imagination.


Turkey Is Sending Cold War-Era Cluster Bombs to Ukraine
The artillery-fired cluster munitions could be lethal to Russian troops—and Ukrainian civilians.


Congrats, You’re a Member of Congress. Now Listen Up.
Some brief foreign-policy advice for the newest members of the U.S. legislature.