• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechChanging Face of Security

The U.S. Is Lifting the Veil of Secrecy on its Cyber Tactics

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
June 9, 2016, 1:50 PM ET
The 24th Air Force held a Ribbon-cutting ceremony followed by an Open House, April 30, marking the official opening of new facilities for Air Force cyber warriors, located on Port San Antonio. Maj. Gen. Suzanne Vautrinot, 24th Air Force commander, presided over the event, welcoming visitors to tour the facility. Approximately 500 guests, ranging from civic leaders to members' families, toured the high-tech facility, normally off-limits to both the public and most base personnel. Eighteen spokespersons located throughout the facility informed visitors about the many facets of the Air Force cyber mission.
The 24th Air Force held a Ribbon-cutting ceremony followed by an Open House, April 30, marking the official opening of new facilities for Air Force cyber warriors, located on Port San Antonio. Maj. Gen. Suzanne Vautrinot, 24th Air Force commander, presided over the event, welcoming visitors to tour the facility. Approximately 500 guests, ranging from civic leaders to members' families, toured the high-tech facility, normally off-limits to both the public and most base personnel. Eighteen spokespersons located throughout the facility informed visitors about the many facets of the Air Force cyber mission.U.S. Air Force photo by William Belcher

Picture this: A supporter of the Islamic State gets a chat message. It’s from a top commander, and it instructs the man and his fervent cohort to meet outside the city of Tel Osqof, 20 miles north of Mosul, at 7 a.m.  “May God be with you, my brothers,” the leader signs off.

But when the recipient gets to the rendezvous, he’s greeted by an ambush. Air strikes. Gunfire. Chaos. Collapse.

Here’s what happened: That message from a trusted conspirator? It turns out an adversary fabricated it. Foreign agents hacked the commander’s accounts, hijacked his persona, and mimicked his mannerisms to sell a rebel battalion on a phony order. When the supporter showed up at the meeting spot, military forces were already there.

This imagined scenario gives you a sense of the kind of digital deception the U.S. may be using to take down terrorist groups like ISIS (also known as ISIL). But until this spring it was hard to confirm that those tactics existed at all.

Earlier this year, Secretary of Defense Ashton Carter released the first details about the nation’s offensive cyber­war efforts. He revealed that the armed forces’ cyber branch had been tasked with “what’s really its first wartime assignment,” against ISIL. No official in his position had spoken so openly about the subject. And while there are still only vague details about what those operations might look like, experts have suggested that the trick described above, a kind of terrorist catfishing project, is one among many increasingly common cyber tactics the U.S. government is using to target ISIL agents.

So common, in fact, that Fred Kaplan, author of Dark Territory: The Secret History of Cyber War, estimates that such baiting and other NSA-assisted surveillance methods helped claim 4,000 insurgent lives during the Iraq War in 2007 alone. And the effects reach beyond combat zones. Network sabotage isn’t “just an act of reducing numbers on the battlefield,” Kaplan says, “but about messing with them psychologically.”

Specifics are sparse and closely guarded. “As a matter of policy and to preserve operational security, we do not detail our tactics, techniques, and procedures,” says Lt. Col. Valerie Henderson, a Defense Department spokesperson.

Some say that this historical secrecy has led to a lack of understanding, with political implications. “One of the reasons our policy ideas are so immature is because we keep so much of this secret from so many people,” Michael Hayden, former head of the NSA and CIA, tells Fortune. “Private industry doesn’t talk about it for liability reasons, and government won’t talk about it for security reasons.”

But that’s starting to change—partly because of political pressure to thwart terrorism and partly because of the nature of the ­enemy, an almost universally reviled terrorist group. Some officials are more open than others: “Right now it sucks to be ISIL,” Deputy Secretary of Defense Robert Work put it provocatively earlier this year. “We’re dropping cyber bombs. We have never done that before.”

These new admissions are a milestone, although evidence of cyber tactics has been around for a while (including a hacking campaign allegedly orchestrated by the U.S. and Israel to knock out Iran’s nuclear program). “The announcement that we were conducting a cyber offensive on ISIS is a really big deal,” says Peter Singer, a senior fellow at New America, a D.C. think tank. “It’s a key moment in what I describe as the normalization of cyber warfare.”

Indeed, today the U.S. Cyber Command, a six-year-old military branch with plans to expand its headcount to 6,000 this year, is beginning to show its might. Similarly, the Pentagon would no doubt like something to show for its $6.7 billion 2017 line-item request for cyber “capabilities”—including contracts that could end up with the likes of Lockheed Martin (LMT), Raytheon (RTN), Harris Corp. (HRS), and Northrop Grumman (NOC), in addition to other, smaller players in an emerging computer combat industry.

However, despite all the digital-assault advances, no one (to our knowledge) has been killed solely by a cyber operation, Singer says.

War craft is still dominated by bombs and bullets, and urban populations have been spared from total power-grid failure (with the exception of an attack on a utility in Ukraine that may signal what’s to come). It’s behind the scenes that the hacker’s toolbox—network implants, data dragnets, intercepted communications, disrupted cell towers, compromised microwave relays, subverted ­satellites—increasingly provides the props that articulate the newest theater of war. The infrastructure of the Internet is combat-ready.

Welcome to the World War Web.

A version of this article appears in the June 15, 2016 issue of Fortune with the headline “The Computer Wars Have Already Begun.”

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
Fortune Secondary Logo
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

A veiled Iranian woman holds her cellphone displaying a portrait of Iran's Supreme Leader, Ayatollah Ali Khamenei,
CybersecuritySecurity
Cyber retaliation from Iran is a problem for U.S. companies — ‘It’s in the hands of a 19-year-old hacker in a Telegram room,’ ex-NSA operative says
By Amanda GerutMarch 1, 2026
1 hour ago
Two girls look at a white laptop placed on a desk.
AIEducation
American schools weren’t broken until Silicon Valley used a lie to convince them they were—now reading and math scores are plummeting
By Sasha RogelbergMarch 1, 2026
3 hours ago
Big TechSocial Media
YouTube’s cofounder and former tech boss doesn’t want his kids to watch short videos, warning short-form content ‘equates to shorter attention spans’
By Marco Quiroz-GutierrezMarch 1, 2026
7 hours ago
Slack cofounder Stewart Butterfield
SuccessProductivity
Slack cofounder says workers and CEOs can get stuck doing ‘fake’ work like pre-meetings and slide shows
By Emma BurleighMarch 1, 2026
7 hours ago
heitmann
CommentaryEntrepreneurship
Here’s how to build something that lasts, from the founder of a $300 million bootstrapped company that’s been growing for 28 years straight
By Tim HeitmannMarch 1, 2026
13 hours ago
U.S. President Donald Trump delivers the State of the Union address during a joint session of Congress in the House Chamber at the Capitol on February 24, 2026 in Washington, D.C.
EnergyData centers
Your utility bills keep going up. Here’s everyone you can blame—AI data centers included
By Jordan BlumMarch 1, 2026
15 hours ago

Most Popular

placeholder alt text
Economy
Your grandparents are the reason the U.S. isn't in a recession right now. That won't last forever
By Eleanor PringleMarch 1, 2026
13 hours ago
placeholder alt text
AI
The week the AI scare turned real and America realized maybe it isn't ready for what's coming
By Nick LichtenbergFebruary 28, 2026
2 days ago
placeholder alt text
Success
Japanese companies are paying older workers to sit by a window and do nothing—while Western CEOs demand super-AI productivity just to keep your job
By Orianna Rosa RoyleFebruary 27, 2026
2 days ago
placeholder alt text
Success
Walmart exec says U.S. workforces needs to take inspiration from China where ‘5 year-olds are learning DeepSeek’
By Preston ForeFebruary 27, 2026
3 days ago
placeholder alt text
Middle East
Iran is now on 'death ground' amid existential threat from U.S. attacks and could 'go big' in retaliation, former NATO commander warns
By Jason MaFebruary 28, 2026
1 day ago
placeholder alt text
Personal Finance
Trump's universal 401(k) architect on why lower-income people distrust retirement accounts: 'they want to know what the catch is'
By Jacqueline MunisFebruary 28, 2026
2 days ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.