recommended reading

Pentagon exempts cyber weapons from collateral damage directive


The Defense Department does not require developers of computer systems that launch cyber operations to implement the same safeguards required of traditional arms makers to prevent collateral damage.

A Pentagon mandate that autonomous weapons be built and tested so humans won’t lose control over them doesn’t apply to cyber weapons, documents state. The exemption gives military programmers more flexibility to introduce automation into command-and-control infrastructure for cyber operations, allowing military officials to launch computer campaigns more swiftly.

A directive, released Nov. 21, mandated that automated and semi-autonomous weaponry -- such as guided munitions that independently select targets -- must have human machine interfaces and “be designed to allow commanders and operators to exercise appropriate levels of human judgment over the use of force.” The mandate called for “rigorous hardware and software verification and validation” to ensure that engagements could be terminated if not completed in a designated time frame. The goal is to minimize “unintended engagements,” the document states.

The Pentagon is permitting less human control over systems that deploy malware, exploits and mitigation tools, highlighting Defense’s focus on agile responses to computer threats. The document, signed by Deputy Secretary of Defense Ashton Carter, explicitly states that the directive “does not apply to autonomous or semi-autonomous cyberspace systems for cyberspace operations.”

Defense has been pushing to integrate more autonomous capabilities into offensive computer systems, to meet the need to address threats in real time and make up for a lack of specialists that can carry out the exercises manually. This introduces a new threat that mistakes could go unchecked if computer glitches occur.

A central tenet of Plan X -- a Defense funding initiative to build command-and-control architecture that could manage and launch offensive tools -- involves identifying areas for automation and machine assistance in cyber operations. A newly released solicitation document asks respondents to address how a system can be built to allow planners to “mark instructions and actions that could be autonomously executed without operator monitoring” and seeks ideas on how “mission program logic is able to operate autonomously if communications are lost or degraded.”

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.