Prepare for CyberWar

Today’s are Small Compared to What’s Coming

Fabius Maximus (June 09 2015)

Summary: Here’s a brief look at the state of cyber-conflicts. The first ones have run their course; from them we can guess at the outlines of the larger ones to come. As with nukes and drones, America has laid a path for others to follow. We’ve been bold and innovative, but lawless. We might regret this when others imitate us.

Cyberspace: A global dynamic environment created by interlocking networks linking people and computers for communication, control, and trade. Like other human domains, it consists of multiple levels – from purely conceptual (for example, laws, designs) down to the hardware and people that are its material substrate. The term coined by William Gibson in his 1982 story “Burning Chrome” {1}.

Contents

1. Battlefields of the future
2. The first cyber conflict
3. Playing defence
4. Are we beleaguered in cyberspace?
5. For more Information

1. Battlefields of the Future

We have entered a transitional period in the art of war much like that between World War One and World War Two, when a new form of war (the third generation) slowly emerged, but military institutions kept their eyes turned to the past. Many armies were slow to develop innovative tactics for their new internal combustion driven engines. Their cavalry units were symbols of this retrovision. Navies lavished their greatest attention on battleships, not the submarines, escorts, and carrier-borne aircraft that would dominate World War Two (for example, aircraft were the “eyes of the fleet”, not its teeth). Communications technology rapidly improved, but the senior officers paid relatively little attention to cryptography and signals intelligence.

Today war-as-usual continues in the emerging nations, but in the developed world it has moved into new realms – with the cutting edge in cyberspace. It’s the age of fourth generation war, waged among state and non-state actors in shifting coalitions, taking many forms …

* Hacking: probes and parries by people exploring the nature and uses of cyberspace, rapidly expanding in scale, sophistication, and consequences.

* Raids: the Sony hack {2} and Stuxnet {3}.

* Conflicts for control: Pirate Bay and the Silk Road.

2. The First Cyber Conflict

“Crossing the Rubicon” – aka uncorking the genie – is a core behaviour of our military, and so America has taken the lead in both building and using cyber-tech, as we did with nukes and drones. The best way to learn about new tools is use them against weak opponents, as the NAZIs did by helping the Fascists in the Spanish Civil War {4}. So the US staged the first “electronic Pearl Harbour” by unleashing Stuxnet on Iran’s nuclear installations. It’s behaviour that in an earlier time we called that of “a day which will live in infamy”, as we neither gave a declaration of war nor obtained a ruling on Iran’s guilt by the UN.

We are like Germany and Japan in the interwar years, as America’s military appears to seek dominance in cyberspace as great as (or more so) than we have in the air and the blue water seas {5}. Combining America’s powerful technology industry with the almost unimaginable stream of defence spending – who can say what might be accomplished? So far we’ve been the attacker in cyberspace, and have enjoyed the experience.

We blaze a path without restraint or forethought about rules. Others will follow, doing things we’ve made respectable. That boldness almost destroyed the world in the nuclear arms race. We have yet to see the consequences with cyber-weapons (and drone assassins). But it seems likely scale of these conflicts will grow. Following our lead, they’ll grow without restraint.

3. Playing Defence

Although the military sets American’s pulses racing, as with the destruction of al Qaeda, it’s the law enforcement and intelligence agencies that often get the job done. When defending in cyberspace the US has followed a traditional path, relying on internationally coordinated law enforcement mechanisms to destroy the Pirate Bay website {6} (free distribution of entertainment products, whether copyrighted or illegal) and the Silk Road {7} (an online network for trading goods and services, legal and illegal). This provides decisive rebuttals to those who believed that the e-world offers escape from government power.

An organization can take its operations into cyberspace, but its weak links remain its Earth-bound hardware and people, as seen in the operations against the Silk Road {8, 9, 10, 11}.

4. Are We Beleaguered in Cyberspace?

As it did so successfully during the Cold War’s bomber gap {12} and missile gap {13}, US Department of Defence trumpets America’s inferior and vulnerable position in this new form of war – hence the need to give it even more funds. Now as then these stories are ludicrously implausible (we’re outmatched by North Korea and Iran?), but Americans respond as reliably as Pavlov’s dogs {14, 15}.

While Cyber Command leaders’ speak about the importance of defence as in {16} and the vulnerability of our systems (accurately), their actions on the world stage suggest that much of their effort goes to attacking. That’s natural for the military, but suggests an absence of civilian leadership. Such neglect of their responsibility during the early years of the Cold War allowed the arms race to run wild, with brinksmanship several times bringing the world close to Armageddon. Let’s learn from that experience – not repeat it.

5. For More Information

Some good books about these cutting edge phenomena …

http://www.amazon.com/gp/product/0316037729/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=0316037729&linkCode=as2&tag=thefabimaxiwe-20&linkId=MWJCIYQDGXMWWJZH

http://www.amazon.com/gp/product/B00B9ZCGHA/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B00B9ZCGHA&linkCode=as2&tag=thefabimaxiwe-20&linkId=GYU47G4X45GASBUT

http://www.amazon.com/gp/product/1402295618/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=1402295618&linkCode=as2&tag=thefabimaxiwe-20&linkId=PMXXTEFC2AU6IVJX

http://www.amazon.com/gp/product/077043617X/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=077043617X&linkCode=as2&tag=thefabimaxiwe-20&linkId=MO5TVHCALIYPVEZ2

http://fabiusmaximus.com/2015/02/11/stuxnet-ameria-israel-cyberwar-kim-zetter-countdown-to-zero-78587/

See all posts about cyberconflict and cybercrime {17}, and especially these …

http://fabiusmaximus.com/2015/03/20/identifying-nations-guilty-cyberespionage-81166/

http://fabiusmaximus.com/2015/04/01/cybercrime-bigger-than-drugs-81851/

http://fabiusmaximus.com/2015/05/09/bitcoin-deep-web-new-conficts-84109/

Links:

{1} http://flawedart.net/courses/articles/Gibson_Burning_Chrome.pdf

{2} http://fabiusmaximus.com/2014/12/18/debunking-sony-hack-north-korea-cybeterrorism-cyberwar-74784/

{3} http://en.wikipedia.org/wiki/Stuxnet

{4} http://en.wikipedia.org/wiki/Condor_Legion

{5} http://en.wikipedia.org/wiki/Maritime_geography#Blue_water

{6} http://en.wikipedia.org/wiki/The_Pirate_Bay

{7} http://en.wikipedia.org/wiki/Silk_Road_%28marketplace%29

{8} http://www.wired.com/2013/11/silk-road/

{9} http://www.nytimes.com/2015/05/30/nyregion/ross-ulbricht-creator-of-silk-road-website-is-sentenced-to-life-in-prison.html

{10} http://www.dailydot.com/crime/silk-road-murder-charges-ross-ulbricht/

{11} http://truthvoice.com/2015/05/the-silkroad-murder-for-hire-plot-was-set-up-by-dea-agent/

{12} http://en.wikipedia.org/wiki/Bomber_gap

{13} http://en.wikipedia.org/wiki/Missile_gap

{14} http://www.washingtonpost.com/blogs/the-switch/wp/2014/01/15/cyber-commands-exploding-budget-in-1-chart/

{15} http://www.defenseone.com/management/2015/03/militarys-cybersecurity-budget-4-charts/107679/

{16} http://www.defenseinnovationmarketplace.mil/resources/Cyber_Command_Alexander_02-27-14.pdf

{17} http://fabiusmaximus.com/defence-appartatus/cyberwar/

http://fabiusmaximus.com/2015/06/09/breaking-a-path-to-cybercrime-cyberwar-85607/

Advertisements
Posted in Uncategorized

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: