Strategic Considerations in Cyber Warfare - PowerPoint PPT Presentation

1 / 18
About This Presentation
Title:

Strategic Considerations in Cyber Warfare

Description:

Egyptian infantry easily destroyed Israeli tanks at the beginning of the 1973 War. ... This enabled a massive aerial bombardment that destroyed Hamburg. ... – PowerPoint PPT presentation

Number of Views:879
Avg rating:3.0/5.0
Slides: 19
Provided by: mattsti
Category:

less

Transcript and Presenter's Notes

Title: Strategic Considerations in Cyber Warfare


1
Strategic Considerations in Cyber Warfare
OASIS PI Meeting, Santa Fe, NM July 25, 2001
  • Matt Stillerman, PhD
  • Odyssey Research Associates
  • 33 Thornwood Drive, Suite 500
  • Ithaca, NY 14850
  • matt_at_oracorp.com

2
Overview
  • Project title Novel Applications of Military
    Science to Intrusion Tolerant Systems
  • Mining military theory for ideas about cyber
    warfare.
  • Universal theory of strategy (as expounded by
    Edward Luttwak)
  • Implications for cyber warfare
  • Summary

3
Example Choice of Route
War Zone
Ithaca
mountain road
City B
highway
City A
4
Invasion of Lebanon, 1982
  • Israel always maneuvered in non-obvious ways, was
    known to do this.
  • Syria expected Israel to advance via a
    round-about route, was initially able to block
    them, effectively.
  • Israel countered by advancing straight into the
    Vale of Lebanon, without opposition.

5
Paradoxical Logic
  • Counter-intuitive values (or effectiveness) in
    warfare
  • Convergence of opposites, eventual reversal of
    values over time.

6
Paradoxical Logic
  • Key difference between warfare and other human
    activities.
  • Universal All wars, all theaters, all levels of
    war.
  • Caused by the ability and inclination of
    adversaries to anticipate actions and react to
    them.

7
Surprise
  • Surprise failure to anticipate

8
Strategy
  • Strategy Art of command in situations governed
    by paradoxical logic.
  • Anticipate the paradox.
  • Engineer surprise.
  • Change behavior
  • Deception

9
Let Many Flowers Bloom
  • Surprise attackers with novel counter-measures.
  • Avoid standardization of defenses.
  • Develop diverse overlapping defense techniques.
  • Less effective techniques have greater longevity.
  • Diversity of strategic choice.
  • Continuous stream of new techniques as old ones
    become stale.

10
Promote Obscurity
  • Security by obscurity now a valid principle.
  • Obscurity can be relatively inexpensive.
  • Yet, while it persists, it can be just as
    effective as real security measures.
  • Measures designed to promote system-wide
    integration of security features may degrade
    obscurity.

11
Empower Strategists
  • Source of surprise is human perception and
    ingenuity.
  • Clausewitz calls this genius.
  • Cyber Warriors must have
  • Training
  • Technical choices
  • Authority
  • Automated cyber defenses amplify warriors, dont
    replace them.

12
Guided Missiles vs. Tanks
  • Egyptian infantry easily destroyed Israeli tanks
    at the beginning of the 1973 War.
  • Suggests that tanks are obsolete. (wrong!)
  • Similar comments were made about bazookas
  • By the end of that war, a change in tactics
    largely restored tank effectiveness.

13
Electronic Warfare in WWII
  • In the ebb and flow of reciprocal development,
    the same device could be highly effective,
    totally useless, and positively dangerous within
    a matter of months -- Luttwak
  • Example rearward-looking radars on British
    bombers.

14
Battle of Berlin
  • Technical advances enabled Allied aircraft to
    blind German radar defenses.
  • This enabled a massive aerial bombardment that
    destroyed Hamburg.
  • Similar attack against Berlin attempted.
  • Germans responded, using searchlights to find the
    streams of bombers, ground commentary, and
    non-radar equipped fighters.

15
Pearls
  • Action and effective reaction may occur at
    different levels in the conflict.
  • Information technologists should try to
    anticipate tactical, operational, and strategic
    responses.
  • Pure cyber war will be fought on all levels.
  • Cycle of action/reaction may occur very swiftly
    in a hot war.
  • Explicitly manage the life-cycle of cyber
    defenses.

16
Life-cycle of Cyber Defenses
  • Detect culminating point and act.
  • Have new choices on tap.
  • Avoid complacency about solved problems.
  • Prepare to innovate furiously and to deploy the
    results swiftly.
  • Active infosec research community
  • Native IT manufacturing capability

17
Levels of Cyber Warfare
  • Technical e.g. firewall.
  • Tactical e.g. How the firewall is deployed,
    configured.
  • Operational Which information is created, how
    it is used in the theater. Concerned with
    meaning, quality, and assurance.
  • Strategic Role of meaning and quality in
    achieving war aims.

18
Reference
  • Edward N. Luttwak. Strategy The Logic of War
    and Peace. Belknap Press, Harvard University,
    1987.
Write a Comment
User Comments (0)
About PowerShow.com