One expert suggests the move is designed to deter nations from launching cyberattacks. Another: To drum up funding support from Congress An Air Force general this week stoked speculation about the military’s cyberwar preparedness when he revealed it had reclassified six cyber tools as weapons.Reclassifying the tools — which weren’t explained in any detail — will enable their programs to more effectively compete for scarce funds in the Defense Department’s budget, reasoned Lt. Gen. John Hyten, vice commander of the Air Force Space Command.The move would help “normalize” military cyber operations, said Hyten at a cyber conference held in conjunction with the National Space Symposium in Colorado Springs, Reuters reported. It will also help cyber capabilities “get more attention and the recognition [they deserve],” he added.The stance is a significant departure from the military’s attitude toward cyber warfare as recently as two years ago. “It was hard to find information in the public domain because much of the information about cyber weapons was classified,” said David Bodenheimer, who heads the homeland security practice at the law firm of Crowell & Moring in Washington, D.C. He said the military’s recent attitude readjustment about cyber tools has a couple of purposes. One is to deter nations from launching cyber attacks — clandestine or otherwise — on the United States. “When the military discusses the cyber weapons in its arsenal, it may discourage some countries from launching destructive cyber attacks on the U.S.,” Bodenheimer explained.“The general wisdom is that the U.S. is way ahead of the rest of the world on offensive cyber weapons, so in a cyber war we would be able to do great to other countries,” he said. “On the other hand, our cyber defenses are considered to be way behind other nations.” Another purpose for the attitude change could be to drum up funding support from Congress. “These weapons show that we’re making progress and advances in this area,” Bodenheimer observed, although weapons discussed in public are probably not on the top shelf of the Pentagon’s cyber arsenal.“We can be sure we’re seeing only the tip of the ice berg,” he said. “The best and most advanced cyber weapons are almost certainly highly classified.”By opening up the discussion of cyber warfare, the military is attempting to make cyber part of normal military operations, observed James Barnett, a former Navy Rear Admiral and head of the cybersecurity practice at the Venable law firm in Washington, D.C.“They’re trying to show that this is a military domain, and we’re very good at it,” he said told CSO. “You don’t want to have your enemies under or over estimate what your capabilities are.”“We were never very secret about what our nuclear weapons capabilities were,” Barnett added. “It makes sense to have people know your capabilities and what’s out there.”[Also see: U.S. rattles preemptive cyberattack saber | Preemptive cyberattack disclosure a warning to China | Chinese Army link to hack no reason for cyberwar] It also makes sense to publicize a cause when you want to bump up funding for it. Hyten told attendees of the Colorado forum that the Air Force wants to add 1,200 more people to its current cyber workforce, now at about 6,000.“As with anything else with the military, you’ve got to scream and fight for the resources you need to invest in these things,” said Richard Stiennon, chief research analyst with IT-Harvest.The military may also be preparing budget watchdogs for a need to modify contract procedures so the right private sector talent can be acquired to work on its cyber projects. “If you read between the lines, you can see they want to spend money with IT security vendors, and they’ve got to be able to grease the skids to do that,” Stiennon said.Most vendors on the cutting edge of cyber capabilities are small and don’t have relationships with the federal government, he explained. For those firms, it isn’t worth their time jumping through hoops for a government contract. “Complying with government certification programs can cost more than the revenues of most of these startup companies,” Stiennon said. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe