There is a certain amount of misunderstanding about the Internet and the global communications grid. On the one hand we have a mythos that has risen stating that the Internet was created to allow communication in the advent of nuclear war. That would be true if it also wasn’t true that electro magnetic pulses from nuclear weapons would play havoc with the entire worlds information grid never mind the localized effects. The Internet and the global information grid is a very sensitive system where logically it is robust, but physically it is very weak. When considering the efforts of cyber warfare it is good to remember that at the lowest level the global information grid at the physical level is very weak.
Cyber space logical networks are those networks that exist in configuration and through how the systems are hooked to together above the physical level. Two Internet protocol addresses can be sequential but on different continents. The Internet protocol address is kind of like your home address. In the case of the Internet though it doesn’t matter what street you are on, but more like what the use of the house is. You know this and can check this phenomenon out when you use your cell phone. When you call your friend on his cell phone it doesn’t matter where he is physically the phone still rings. Whether he is standing next to you or half way around the planet.
Cyber space physical networks are all of the bundled wires and the equipment that carry the logical traffic. There is most definitely a hierarchy. This physical structure has been proven to be very weak as ship anchors have drug and destroyed undersea telecommunication cables. Sun spots can play havoc on wireless signals and even secure radio systems for the military. Satellite communications has been subject to damage from space debris. The attack on 9/11 in New York and the destruction of the Verizon telephone exchange at the Twin towers shows a weakness to physical attack or damage. The military has often attacked and destroyed the command and control functionality of networks by physically destroying telecommunications.
Cyber space social networks are the bonds between people as enhanced or created through the introduction of technology. In the 1970s people would get on the phone and dial into party lines where they could chat. This functionality has been transferred in part over to social media and realized as cyber space social networks. Now web forums, blogging, micro-blogging services, and chat rooms function right along all of the other elements of Internet use. Since command and control is still primarily a human endeavor the methods of how people communicate is very important to understanding of risks. As such it is important to know that social networks are even more fragile than physical networks since they are based on the cognitive capability of users and subject to the emotional whims of human beings.
Kinetics are fists, bullets, bombs, artillery or about anything that can create damage. We can attack each of the different layers we’ve talked about with a kinetic attack and be very successful. Whether we use fists to hurt the individual using the network or we bomb a telephone switch as was done in Iraq. The result is a kinetic attack against the global information grid. A distributed denial of service attack requires extensive coordination and usually significant technical capability. What often happens when talking about cyber warfare is this kinetic attack is put in the back seat and the logical layers are all that is considered. Doing a DDOS might slow a company down for a day, but putting a backhoe through their fiber connections is enough to stop business for weeks (in some cases). Because, the equipment is usually built using just in time inventory controls, often there is no repairs possible until the equipment is built as an example, if a data center catches on fire. To make matters worse there is a history of legacy equipment that the functions and capabilities may support tools or applications that should the equipment be damaged would require extensive solutions to be created. If legacy equipment is damaged it is a classic case of, “You can’t get there from here”.
Cyber space is a technology terrain that includes how that technology reacts and is acted upon in the real world. As we’ve discussed the actions of the world humans live in on the cyber realm there are also ways that the cyber realm can act upon us. Simply to explain it is possible for the cyber world to reach out and create destruction. Consider the case of the errant manufacturing robot. A simple device with programming the robot creates and modifies objects in the real world. The programming and cybernetic processes can run without human intervention. Should safety protocols be changed by accident or providence death could result. The cyber world is realized in the real world.
Weaponization of cyber space is much more than simply creating software tools that exploit segments or features of cyber space. With the advent of military drone aircraft that have semi-autonomous capability and are controlled by software these weapons systems should be regarded as cyber weapons with kinetic capability. Arguments against this will abound and there is political hay to be made at the expense of military drones. They are called unmanned aerial vehicles because they are controlled through command and control systems based in cyber space. Even military drawings depicting the global information grid will often show a predator drone and the global information grid is a component of cyber space. All of the same issues with our robot example exist with military drones. The risk is a matter of scope not existence.
To be cyber warfare it is necessary that all the elements of war exist. Regardless of definitions used to depict war a kinetic capability is required. Cyber space and cyber warfare has the ability to reach out and kill or maim within the model of conflict. Likewise the real world can have drastic and substantive impacts on the cyber realm. There is symmetry to be found between these two positions found on other terrains of conflict.
3 comments for “How to wage cyber warfare: The relationship between cyber and kinetics, Part 7”