FAS

Offensive Cyber Tools to Get Legal Review, Air Force Says

08.10.11 | 2 min read | Text by Steven Aftergood

Even the most highly classified offensive cyberwar capabilities that are acquired by the Air Force for use against enemy computer systems will be subject to “a thorough and accurate legal review,” the U.S. Air Force said in a new policy directive (pdf).

The directive assigns the Judge Advocate General to “ensure all cyber capabilities being developed, bought, built, modified or otherwise acquired by the Air Force that are not within a Special Access Program are reviewed for legality under LOAC [Law of Armed Conflict], domestic law and international law prior to their acquisition for use in a conflict or other military operation.”

In the case of cyber weapons developed in tightly secured Special Access Programs, the review is to be performed by the Air Force General Counsel, the directive said.  See “Legal Reviews of Weapons and Cyber Capabilities,” Air Force Instruction 51-402, 27 July 2011.

The Air Force directive is somewhat more candid than most other official publications on the subject of offensive cyber warfare.

Thus, “for the purposes of this Instruction, an Air Force cyber capability requiring a legal review prior to employment is any device or software payload intended to disrupt, deny, degrade, negate, impair or destroy adversarial computer systems, data, activities or capabilities.”

On the other hand, cyber capabilities requiring legal review “do not include a device or software that is solely intended to provide access to an adversarial computer system for data exploitation,” the directive said.

One challenge facing such legal reviews is that law and policy in the relatively new field of cyberwar are not fully articulated.  Another challenge is that where applicable law and policy do exist, they may be inconsistent with the use of offensive cyber tools.

In response to a question (pdf) on cyberwarfare from the Senate Armed Services Committee at his confirmation hearing last year, Lt. Gen. Keith Alexander of U.S. Cyber Command said: “President Obama’s cybersecurity sixty-day study highlighted the mismatch between our technical capabilities to conduct operations and the governing laws and policies, and our civilian leadership is working hard to resolve the mismatch.” (page 9)

But he added: “Given current operations, there are sufficient law, policy, and authorities to govern DOD cyberspace operations. If confirmed, I will operate within applicable laws, policies, and authorities. I will also identify any gaps in doctrine, policy and law that may prevent national objectives from being fully realized or executed to the Commander, U.S. Strategic Command and the Secretary of Defense.”

Asked whether DoD possesses “significant capabilities to conduct military operations in cyberspace,” Gen. Alexander would only provide an answer on a classified basis.

The Pentagon does not often acknowledge the existence of offensive cyber capabilities.  The “Department of Defense Strategy for Operating in Cyberspace” (pdf) that was released in unclassified form last month does not address offensive cyber warfare at all.

publications
See all publications
Government Capacity
day one project
Policy Memo
Reforming the Federal Advisory Committee Landscape for Improved Evidence-based Decision Making and Increasing Public Trust

Protecting the health and safety of the American public and ensuring that the public has the opportunity to participate in the federal decision-making process is crucial. As currently organized, FACs are not equipped to provide the best evidence-based advice.

02.18.25 | 11 min read
read more
Emerging Technology
day one project
Policy Memo
A Federal Center of Excellence to Expand State and Local Government Capacity for AI Procurement and Use

As new waves of AI technologies continue to enter the public sector, touching a breadth of services critical to the welfare of the American people, this center of excellence will help maintain high standards for responsible public sector AI for decades to come.

02.14.25 | 9 min read
read more
Clean Energy
Press release
Position on the Reintroduction of the Critical Materials Future Act and the Unearth Innovation Act

The Federation of American Scientists supports the Critical Materials Future Act and the Unearth Innovation Act.

02.14.25 | 2 min read
read more
Emerging Technology
day one project
Policy Memo
Strengthening Information Integrity with Provenance for AI-Generated Text Using ‘Fuzzy Provenance’ Solutions

By creating a reliable, user-friendly framework for surfacing provenance, NIST would empower readers to better discern the trustworthiness of the text they encounter, thereby helping to counteract the risks posed by deceptive AI-generated content.

02.13.25 | 7 min read
read more