February 23, 2025

3 thoughts on “Hanging the head of advanced persistent threat on a pike

  1. Basically nothing and no one is safe?

    It’s interesting that a person pretty much on their own could do the sort of things that Stuxnet did. Which really makes me ask, why groups like Lulzsec have not hit assets like telecomm grids? Surely that would give them the sort of jollies they are seeking.

    For the group I am reading up for (NSDMG.org) we are looking at how cyber warfare fits in to our war game simulations. I insist that it will be part of all major future wars, but I do not have much to back that up since we are not really sure what a nation state can really do. Since it’s possible for an individual to do something like Stuxnet, I have to imagine that large well funded groups within a government (like the Blue Army, CIA or Army/Air Force) already have loads of digital weapons in their arsenal just waiting to be unleashed on enemy targets.

    I think part of the issue is also that so far most of what we have seen is Cyber Crime, and we have only heard some reports on Cyber espionage, so it doesn’t look like cyber style attacks have teeth. We have some DDOS attacks on government websites in Georgia, this hurt their communication, but only web based communications. We have stuxnet, but that was fairly covert and did prove to slow but not disable nuclear production. Do you have any examples that have more teeth than the two of those? Lulzsec attacks on Australia, Spain, the FBI and the CIA were all nuisances but as to real damage being done, I don’t know that there were any. Do you see organizations like this actually doing real damage?

  2. Things like Stuxnet require a significant understanding of systems engineering. To do the kind of reverse engineering necessary to knock, for example, a major utility off line, might take a significant development period.

    As to why we haven’t seen something like that we actually have. Do understand that the motivations to announce you’ve been attacked are negatively incentivized. The fact you’ve been attacked you might not acknowledge.

    For sure read Richard Clarkes book and in the first chapter he talks about Syrian RADAR being taken down. There is also the supply chain hack supposedly perpetrated by the United States in 1982 that took out a major gas pipeline. There are actually MANY incidents that are fairly significant but you kind of have to know where to look.

    Without writing another blog post (and repeating several others) to understand cyber warfare you have to think beyond the equipment and software and think about conflict space. Open up the idea that conflict is more than swapping ammunition and that there is much more to conflict beyond attrition.

    If you consider that and start applying principles of cyber warfare within a specific framework a lot of opportunities start to become obvious. Realize that all conflict is hybrid and cyber elements can be force multipliers. There is an entire set of principles just now beginning to be expanded upon.

Comments are closed.