27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Cyberwarfare and Anonymity<br />

Christopher Perr<br />

Auburn University, USA<br />

cwp0002@auburn.edu<br />

Abstract: Public policy and strategy do not keep up to date with technology. There is generally a lag time<br />

between the release and application of a technology till a shortcoming is observed. Once a shortcoming is<br />

revealed it is a race to address that potential weakness with improved policy, updated strategy, a technological<br />

initiative to combat the shortcoming, or a necessary combination of all methods. The invent of computer reliant<br />

and networked systems has created a modern arms race which has seen more innovation and more need for<br />

updated policy and strategy than any other period in history, yet the United States continues to fall behind in this<br />

arms race. When security cannot be verified, but only risk mitigated, it is time to think deterrence. Unfortunately,<br />

deterrence falls apart when you cannot identify the perpetrator behind attacks. This paper will look at the role that<br />

information has played in previous conflicts, as well as the modern strategy towards protecting the United States<br />

in cyberspace, and will draw a singular conclusion as to the best course of action towards improving our security.<br />

Through a mix of policy, strategy, and technology the anonymity which attackers use as a shield needs to be<br />

eliminated in order to allow room for a strong policy of deterrence with a verifiable response. In establishing the<br />

means to identify our attackers and provide serious recourse cybersecurity can be greatly improved for the<br />

United States.<br />

Keywords: information warfare, security, policy, strategy, history, information security<br />

1. The motivation<br />

“We’re already at war in cyberspace; have been for many years.”<br />

Gen Ronald E. Keys, Commander, Air Combat Command<br />

On 6 September 2007 Fulghum reported that Israeli aircraft flew into Syria from Turkey and destroyed<br />

a construction site (2007). The site was thought to have contained equipment for the refinement of<br />

weapons grade nuclear material provided by North Korea.<br />

The interesting part of this story for the purposes of this paper is that Syria, a country with an<br />

advanced anti-air defense system purchased from Russia, did not even see the 10 F-15Is appear on<br />

their radar. These are not stealthy aircraft, and with weapons hanging off the wings, should have been<br />

easily spotted on radar. Further, troops were massing at Israel’s borders signaling a possible attack.<br />

Syria was expecting something. So what happened?<br />

The thought is that the Israeli’s were able to somehow disable the radar sites and to provide a window<br />

where the jets could get in, bomb the target, and leave without threat. Was it a trap door in the radar<br />

software? Did the Israeli’s use a special UAV to signal blank radar screen to the radar sites? They<br />

haven’t said yet, and the only clear part is that Israel ‘owned’ those sites for a single night and proved<br />

the strength of cyber warfare.<br />

Unfortunately, if the U.S. were in this tale we would be more like Syria than Israel.<br />

2. Open source<br />

Due to publication constraints, and the desire to stay at the unclassified level, this paper will deal only<br />

with open resources.<br />

3. The (not so) recent history of information operations<br />

“It is pointless to deal with enemy military forces if they can be bypassed by strategy or<br />

technology.”<br />

Col John A. Warden III, USAF, Retired<br />

Net-centric warfare has become a much bandied about buzzword in the modern military vernacular. A<br />

simple definition of net-centric warfare from the Office of Force Transformation (2005) is:<br />

“the translation of an information advantage, enabled in part by information technology,<br />

into a competitive war fighting advantage through the use of well-informed geographically<br />

dispersed forces.<br />

207

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!