6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Cyberwarfare and Anonymity<br />
Christopher Perr<br />
Auburn University, USA<br />
cwp0002@auburn.edu<br />
Abstract: Public policy and strategy do not keep up to date with technology. There is generally a lag time<br />
between the release and application of a technology till a shortcoming is observed. Once a shortcoming is<br />
revealed it is a race to address that potential weakness with improved policy, updated strategy, a technological<br />
initiative to combat the shortcoming, or a necessary combination of all methods. The invent of computer reliant<br />
and networked systems has created a modern arms race which has seen more innovation and more need for<br />
updated policy and strategy than any other period in history, yet the United States continues to fall behind in this<br />
arms race. When security cannot be verified, but only risk mitigated, it is time to think deterrence. Unfortunately,<br />
deterrence falls apart when you cannot identify the perpetrator behind attacks. This paper will look at the role that<br />
information has played in previous conflicts, as well as the modern strategy towards protecting the United States<br />
in cyberspace, and will draw a singular conclusion as to the best course of action towards improving our security.<br />
Through a mix of policy, strategy, and technology the anonymity which attackers use as a shield needs to be<br />
eliminated in order to allow room for a strong policy of deterrence with a verifiable response. In establishing the<br />
means to identify our attackers and provide serious recourse cybersecurity can be greatly improved for the<br />
United States.<br />
Keywords: information warfare, security, policy, strategy, history, information security<br />
1. The motivation<br />
“We’re already at war in cyberspace; have been for many years.”<br />
Gen Ronald E. Keys, Commander, Air Combat Command<br />
On 6 September 2007 Fulghum reported that Israeli aircraft flew into Syria from Turkey and destroyed<br />
a construction site (2007). The site was thought to have contained equipment for the refinement of<br />
weapons grade nuclear material provided by North Korea.<br />
The interesting part of this story for the purposes of this paper is that Syria, a country with an<br />
advanced anti-air defense system purchased from Russia, did not even see the 10 F-15Is appear on<br />
their radar. These are not stealthy aircraft, and with weapons hanging off the wings, should have been<br />
easily spotted on radar. Further, troops were massing at Israel’s borders signaling a possible attack.<br />
Syria was expecting something. So what happened?<br />
The thought is that the Israeli’s were able to somehow disable the radar sites and to provide a window<br />
where the jets could get in, bomb the target, and leave without threat. Was it a trap door in the radar<br />
software? Did the Israeli’s use a special UAV to signal blank radar screen to the radar sites? They<br />
haven’t said yet, and the only clear part is that Israel ‘owned’ those sites for a single night and proved<br />
the strength of cyber warfare.<br />
Unfortunately, if the U.S. were in this tale we would be more like Syria than Israel.<br />
2. Open source<br />
Due to publication constraints, and the desire to stay at the unclassified level, this paper will deal only<br />
with open resources.<br />
3. The (not so) recent history of information operations<br />
“It is pointless to deal with enemy military forces if they can be bypassed by strategy or<br />
technology.”<br />
Col John A. Warden III, USAF, Retired<br />
Net-centric warfare has become a much bandied about buzzword in the modern military vernacular. A<br />
simple definition of net-centric warfare from the Office of Force Transformation (2005) is:<br />
“the translation of an information advantage, enabled in part by information technology,<br />
into a competitive war fighting advantage through the use of well-informed geographically<br />
dispersed forces.<br />
207