Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: PhilDragoo
Yes, IW (Information Warfare) is very important now.
Offensive and defensive measures require much effort and not the least of which is to update telecommunications laws and to determine, policy wise, if a hack attack is an act of war or a crime, and we need to figure out quickly if the hacker is a Chinese intelligence agency or some 15-yr old kid in an apartment in Moscow.

Quickly:
We have tremendous IW capabilities, we just need the laws to achieve a better understanding of IW and to develop IW doctrine, enhance our military application efforts, and to support civilian initiatives in cyber-defense development.
We can do this by collating information to enhance doctrine development and to exploit military applications.
We can also do this by welcoming civilians by recognizing their contributions to the world of IW.
(Civilians will be a part of cyber-war, bet on it. It may be your ATM machine was jammed up, or your on-line banking squished, but it will happen.)
Therefore, we need to examine IW doctrine initiatives and hardware software development efforts, both military and civilian. Towards that end, we must keep in mind that “We Must Ask Where We Are and Whither We are Tending” (Abraham Lincoln).
So, determining where we are and where we want to go regarding IW is important. Indeed, IW has transformed US national security requirements - we must be able to respond to a full spectrum of crises (lo-to-hi)
Consider: War is normally on sea, land or air. Now, however, “Information” can be (and is) a medium of war.
We have to understand what we are talking about, so here are a few terms.
Information Warfare: Any action that attacks/defends information flow.
Offensive IW: Physical bombing to planting a virus on Internet.
Defensive IW: Physical defenses to anti-virus programs.
As to the threat, consider right now there are, at least, 17-19 Million people w/skills for a cyber attack, and the DoD was “cyber-attacked” about 250,000 times in 1998. (Air Force Mag, Jan 98, War in Cyber-Space).
Who does the attacks?
Local: Recreational hackers, vandals, independent thieves.
Shared: Institutional hackers, organized crime, industrial espionage.
National: Full-Up IW and attacks by foreign governments or terrorists.
And our cyber structure is a “center of gravity” for any attack against the US. This is in line with Liddell Hart’s “Indirect Approach;” i.e., modern/thinking entities avoid attacking directly and focus on less traditional, very critical nodes (CoG’s). This means a cyber-attack is an indirect attack as it goes after our will and ability, not capability to repond. Therefore, the next conflict of any nature is likely to involve “cyber-war.”
And we need to be prepared, as reported in the Air Force magazine earlier cited, a presidential commission found 70% of US economy and infrastructures (banking, water, electrical power, general public services, etc. are vulnerable to cyber-attack. Heck, even the London Times (Friday, 17 April 1998) report William Daley, US Commerce Secretary, as saying “(the) use of the Internet is doubling every 100 Days . . . and computers, consumer electronics, software, telecommunications, satellites and the Internet [are] driving the US economy.” ANd this makes our "information" very valuable and require protection.
Because of this wide-spectrum vulnerability, we need to welcome industry to this issue and work the problem together. You see, when it comes to rapid information-based technology development, commercial industry leads---they are more agile, configured for near instant response to exploit emerging technologies for commercial gain. As John Correll, the editor of Air Force Magazine said, ““For most of their Information Technology needs, the Armed Forces must look to the commercial world.” Indeed, even our US Air Force published this in their Air Force 2020 document, wherein they said, “Development responsibilities for critical technologies and capabilities will move from government toward Industry.”

That’s about all on that subject, for now.

Rest assured that a lot of effort is being put into this subject--behind the scenes, and what I just posted is completely unclassified and open sourced. No secrets compromised.

311 posted on 07/28/2002 5:38:36 PM PDT by Gunrunner2
[ Post Reply | Private Reply | To 309 | View Replies ]


To: Gunrunner2
If you count every time you are port-scanned, you are cyber-attacked several times per day. That 250,000 times number is brown and smelly, as its provenance would suggest.

Mounting a serious 'sploit against a network that is even moderately well-protected with a firewall and a sysop that knows how to spot unusual stuff in the logs is not for amateurs. High quality attacks (i.e. more than a ping-flood) are very rare.

313 posted on 07/28/2002 6:47:03 PM PDT by eno_
[ Post Reply | Private Reply | To 311 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson