6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Christopher Perr<br />
Historical examples of this can be pointed to before the term ‘IT’ was even coined, one such being<br />
General William T. Sherman’s use of the telegraph to effectively shorten the kill chain of his day.<br />
The kill chain is how forces find, fix, track, target, engage, and assess an enemy force today. It is a<br />
loop where the exit is the destruction of your target. In Sherman’s time the kill chain was shortened by<br />
drastically cutting the amount of time it took to communicate with his geographically separated forces.<br />
None of these terms were used in Sherman’s time, but the concept is not new.<br />
According to Arquilla (2007), Sherman is also useful for another example. His dependence on the<br />
telegraph and the lack of security was highlighted when the Confederate forces started to attack the<br />
lines that carried the vital communications. This caused troops to be pulled from the battlefield for<br />
protection, and while it may have been too late in the war to make a difference, caused a dilution of<br />
the Union’s forces. The telegraph showed how the kill chain can be thought of not in distances but in<br />
time to decision making, and was also shown to be a possible center of gravity to which doctrine must<br />
be modified to defend.<br />
History is rife with examples of how technology has affected the way we think about and execute<br />
conflict. The telegraph is historically the single largest increase in communication bandwidth. As its<br />
was recognized as a powerful tool for command and control, dependence on the telegraph as the only<br />
manner for controlling troops was recognized as a possible center of gravity and weakness to be<br />
exploited<br />
4. The (more) recent history of information operations the environment of<br />
information operations<br />
“An information war is inexpensive, as the enemy country can receive a paralyzing blow<br />
through the Internet, and the party on the receiving end will not be able to tell whether it<br />
is a child’s prank or an attack from its enemy.”<br />
Wei Jincheng, excerpted from the Military Forum column, Liberation Army Daily, 25 June<br />
1996<br />
The First Gulf War is widely viewed as a major success according to Campen (1992). The<br />
preparations involved repetitive rehearsals, planning, critique, and then more rehearsal. The rest of<br />
the world watched as, what was at the time, the fourth largest force in the world got rolled over in a<br />
matter of days. That was 1991, and even though the communication network was almost thrown<br />
together the tactics and techniques used proved to be game changing.<br />
Baucon (2010) notes that by 1995 forces around the globe had taken such a notice to the<br />
revolutionary way that U.S. forces had used modified blitzkrieg maneuvers combined with supreme<br />
command and control enabled by a technical advantage that those forces had changed their strategy<br />
and force composition. It was clear that smart weapons and use of information warfare had made a<br />
profound effect<br />
Fast forward a bit, and a lot has happened since the Gulf War. In 2007 a conflict arose in Estonia with<br />
Russia over the existence and placement of the Bronze Soldier of Tallinn. This spawned what the<br />
Russian government called a ‘online response by patriotic individual citizens’. Estonia, a ‘highly<br />
connected web friendly’ country, was now the victim of various bot-net and denial of service attacks<br />
which brought the internet in that country to a halt. Waterman (2007) wrote that the attack was<br />
characterized by Professor James Hendler, a former chief scientist at DARPA, as<br />
“...more like a cyber riot than a military attack”<br />
Speculation seems to imply that the Russian government sought out the help of organized crime and<br />
individual hackers to carry out the attacks. The effect was the same as a conventional siege, and the<br />
attacks were reported as a ‘crime’ by the Russians. The Estonian government requested aid in<br />
investigation as outlined in Mutual Legal Assistance Treaty. Russia declined their requests (Leyden,<br />
2008)<br />
Other cases to look at are the cyber attacks perpetrated by North Korea on the United States and<br />
South Korea in July of 2009. On the 4th of July North Korea attacked a large number of government<br />
websites with bot-net and DDoS attacks seeking suspected political bargaining power. The attacks<br />
were felt mildly here in the U.S. due to filtering addresses and distribution of website sources, but the<br />
208