• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechChanging Face of Security

The U.S. Is Lifting the Veil of Secrecy on its Cyber Tactics

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
June 9, 2016, 1:50 PM ET
The 24th Air Force held a Ribbon-cutting ceremony followed by an Open House, April 30, marking the official opening of new facilities for Air Force cyber warriors, located on Port San Antonio. Maj. Gen. Suzanne Vautrinot, 24th Air Force commander, presided over the event, welcoming visitors to tour the facility. Approximately 500 guests, ranging from civic leaders to members' families, toured the high-tech facility, normally off-limits to both the public and most base personnel. Eighteen spokespersons located throughout the facility informed visitors about the many facets of the Air Force cyber mission.
The 24th Air Force held a Ribbon-cutting ceremony followed by an Open House, April 30, marking the official opening of new facilities for Air Force cyber warriors, located on Port San Antonio. Maj. Gen. Suzanne Vautrinot, 24th Air Force commander, presided over the event, welcoming visitors to tour the facility. Approximately 500 guests, ranging from civic leaders to members' families, toured the high-tech facility, normally off-limits to both the public and most base personnel. Eighteen spokespersons located throughout the facility informed visitors about the many facets of the Air Force cyber mission.U.S. Air Force photo by William Belcher

Picture this: A supporter of the Islamic State gets a chat message. It’s from a top commander, and it instructs the man and his fervent cohort to meet outside the city of Tel Osqof, 20 miles north of Mosul, at 7 a.m.  “May God be with you, my brothers,” the leader signs off.

But when the recipient gets to the rendezvous, he’s greeted by an ambush. Air strikes. Gunfire. Chaos. Collapse.

Here’s what happened: That message from a trusted conspirator? It turns out an adversary fabricated it. Foreign agents hacked the commander’s accounts, hijacked his persona, and mimicked his mannerisms to sell a rebel battalion on a phony order. When the supporter showed up at the meeting spot, military forces were already there.

This imagined scenario gives you a sense of the kind of digital deception the U.S. may be using to take down terrorist groups like ISIS (also known as ISIL). But until this spring it was hard to confirm that those tactics existed at all.

Earlier this year, Secretary of Defense Ashton Carter released the first details about the nation’s offensive cyber­war efforts. He revealed that the armed forces’ cyber branch had been tasked with “what’s really its first wartime assignment,” against ISIL. No official in his position had spoken so openly about the subject. And while there are still only vague details about what those operations might look like, experts have suggested that the trick described above, a kind of terrorist catfishing project, is one among many increasingly common cyber tactics the U.S. government is using to target ISIL agents.

So common, in fact, that Fred Kaplan, author of Dark Territory: The Secret History of Cyber War, estimates that such baiting and other NSA-assisted surveillance methods helped claim 4,000 insurgent lives during the Iraq War in 2007 alone. And the effects reach beyond combat zones. Network sabotage isn’t “just an act of reducing numbers on the battlefield,” Kaplan says, “but about messing with them psychologically.”

Specifics are sparse and closely guarded. “As a matter of policy and to preserve operational security, we do not detail our tactics, techniques, and procedures,” says Lt. Col. Valerie Henderson, a Defense Department spokesperson.

Some say that this historical secrecy has led to a lack of understanding, with political implications. “One of the reasons our policy ideas are so immature is because we keep so much of this secret from so many people,” Michael Hayden, former head of the NSA and CIA, tells Fortune. “Private industry doesn’t talk about it for liability reasons, and government won’t talk about it for security reasons.”

But that’s starting to change—partly because of political pressure to thwart terrorism and partly because of the nature of the ­enemy, an almost universally reviled terrorist group. Some officials are more open than others: “Right now it sucks to be ISIL,” Deputy Secretary of Defense Robert Work put it provocatively earlier this year. “We’re dropping cyber bombs. We have never done that before.”

These new admissions are a milestone, although evidence of cyber tactics has been around for a while (including a hacking campaign allegedly orchestrated by the U.S. and Israel to knock out Iran’s nuclear program). “The announcement that we were conducting a cyber offensive on ISIS is a really big deal,” says Peter Singer, a senior fellow at New America, a D.C. think tank. “It’s a key moment in what I describe as the normalization of cyber warfare.”

Indeed, today the U.S. Cyber Command, a six-year-old military branch with plans to expand its headcount to 6,000 this year, is beginning to show its might. Similarly, the Pentagon would no doubt like something to show for its $6.7 billion 2017 line-item request for cyber “capabilities”—including contracts that could end up with the likes of Lockheed Martin (LMT), Raytheon (RTN), Harris Corp. (HRS), and Northrop Grumman (NOC), in addition to other, smaller players in an emerging computer combat industry.

However, despite all the digital-assault advances, no one (to our knowledge) has been killed solely by a cyber operation, Singer says.

War craft is still dominated by bombs and bullets, and urban populations have been spared from total power-grid failure (with the exception of an attack on a utility in Ukraine that may signal what’s to come). It’s behind the scenes that the hacker’s toolbox—network implants, data dragnets, intercepted communications, disrupted cell towers, compromised microwave relays, subverted ­satellites—increasingly provides the props that articulate the newest theater of war. The infrastructure of the Internet is combat-ready.

Welcome to the World War Web.

A version of this article appears in the June 15, 2016 issue of Fortune with the headline “The Computer Wars Have Already Begun.”

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Fortune Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Most Popular

placeholder alt text
Success
In 2026, many employers are ditching merit-based pay bumps in favor of ‘peanut butter raises’
By Emma BurleighFebruary 2, 2026
2 days ago
placeholder alt text
Cybersecurity
Top AI leaders are begging people not to use Moltbook, a social media platform for AI agents: It’s a ‘disaster waiting to happen’
By Eva RoytburgFebruary 2, 2026
2 days ago
placeholder alt text
Investing
Tech stocks go into free fall as it dawns on traders that AI has the ability to cut revenues across the board
By Jim EdwardsFebruary 4, 2026
12 hours ago
placeholder alt text
Economy
Trump may have shot himself in the foot at the Fed, as Powell could stay on while Miran resigns from White House post
By Eleanor PringleFebruary 4, 2026
7 hours ago
placeholder alt text
Politics
Meet the Palm Beach billionaire who paid $2 million for a private White House visit with Trump
By Tristan BoveFebruary 3, 2026
1 day ago
placeholder alt text
North America
Gates Foundation doubles down on foreign aid as U.S. government largely withdraws
By Thalia Beaty and The Associated PressFebruary 3, 2026
1 day ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.


Latest in Tech

electricity
EnvironmentElectricity
Over a million people are losing power during a freezing snowstorm while data centers nearby guzzle electricity
By Nikki Luke, Conor Harrison and The ConversationFebruary 4, 2026
2 hours ago
Phone displaying quantum computing company IonQ's logo.
Big Techquantum computing
Short-seller claims IonQ, the biggest quantum computing company on the stock market, failed to disclose holes in its revenue
By Jeremy Kahn and Jim EdwardsFebruary 4, 2026
2 hours ago
altman
Startups & VentureMarkets
Scott Galloway predicts OpenAI could pull its IPO amid AI ‘vibe shift’ as investors ‘gag’ on Trump proximity, questionable revenue
By Nick LichtenbergFebruary 4, 2026
2 hours ago
AILayoffs
Pinterest cracks down on dissent, fires engineers for an internal layoff tool as AI shake-ups keep employees on edge and in line
By Marco Quiroz-GutierrezFebruary 4, 2026
2 hours ago
McNuggets
Travel & LeisureMcDonald's
McDonald’s wants you to eat caviar McNuggets this Valentine’s Day
By Dee-Ann Durbin and The Associated PressFebruary 4, 2026
2 hours ago
AIData centers
Meta’s Hyperion AI data center will sprawl to four times the size of Manhattan’s Central Park
By Sharon GoldmanFebruary 4, 2026
3 hours ago