Cyber Warfare: The New Threat by Air Marshal AKTiwary in IDR 14/12/2012 
The cyber warriors will identify own 
networks weakness which will be followed up by regular patch up of 
vulnerabilities. In addition their actual target could include blowing up 
electric generators / motors; use of high power microwave to upset fly by 
control of combat aircraft and more.
Some contemporary 
thinkers have equated Cyber-Warfare as another new form of warfare which is on 
par with Land, Naval and Air Warfare. This is partly reflected in USA creating a 
new Cyber Command headed by a General, who is also the boss of Central Security 
Services and Director of National Security Agency. In the 2010 strategic review 
of security and defense in UK, while many major defense programmes have been cut 
and overall defense budget is reduced by eight percent, Cyber War has been 
allotted £ 650 m for the period 2010-14. A significant increase 
indeed!
Cyber War has become a major subset of warfare now, because the 
militaries and their equipments rely on many systems, each of which has 
computers, often many computers in each system.
While Cyber War 
seems a very familiar term to everyone, it will be useful to revisit its 
characteristics which make it so important and so different from other forms of 
warfare. It is distinctly different from the traditional warfare wherein armies, 
navies and air forces are massed against each other to fight one 
another.
Cyber War can be 
fought by anyone; even an individual using his hacking skills against huge 
corporations, nations or even different civilizations. One single person’s 
malicious software can wreck havoc on computer networks and programmes spread 
across nations and continents. The modem world’s industry, economy, institutions 
and even other facets of life is supported by computers and associated software. 
So all these facets of life can be disrupted for prolonged period by cyber 
attacks. The individual could be -acting alone; he could be part of a group 
pursuing its inimical agenda or could be state supported, working to further the 
plans of the state. The defender cannot distinguish between them or pinpoint the 
full identity of the attacker or the actual source of attack. So while the cyber 
enemy may be guessed, definite, pinpointing is nearly 
impossible.
Amongst various 
types of warfare, cyber war is the cheapest option. At its simplest, all it 
requires is one individual, on one computer to originate cyber attacks. There is 
no need for regular massive cyber armies equipped with all the paraphernalia of 
a conventional war; being trained, sustained and replenished regularly. Unlike 
in conventional war, where the attacker generally suffers heavy casualties, in 
Cyber War there is no casualty to the attacker. In this war, it is not the 
physical might of a soldier, the quality and quantity of equipment, the 
integration and orchestration of systems, or the strategic genius of a General 
which is tested. It is only the computer genius and skills – and these too come 
as easily to gifted teens as to the experts after years of serious study and 
perseverance. Therefore, each and everyone cannot be a cyber warrior. 
Conscription cannot create a Cyber Army — it is by recruiting suitable people 
with aptitude for such work. In cyber force, there is not much place for officer 
– soldier hierarchy. Rather it is a team of the like-minded.
The malware can be inbuilt in to the computer system at 
manufacturing stage itself. It can be pre-designed in micro chips for various 
items like sensors, routers, switches etc. It can be injected later on into 
system as a sleeper cell.
When one’s computer 
system does not work, it is not easy to distinguish whether the failure is a 
genuine malfunction or a result of malicious attack. More often than not one 
tends to believe that his computer system itself is malfunctioning. So it is 
difficult to determine if one is under cyber attack. The nature of attacks are 
such, for example hidden Trojans activated on command or at pre-determined time, 
that one does not know when the actual attack was launched.
The origins of 
attack also remain uncertain. The attacking nation or non-state actor can route 
his attack via a computers located in a third country or even through benign 
computers based in the country being attacked. These could be the personal 
computers of citizens of the country under attack. Such an approach poses major 
dilemma for defender and for the right to computer privacy in democratic 
societies.
The malware can be 
inbuilt in to the computer system at manufacturing stage itself. It can be 
pre-designed in micro chips for various items like sensors, routers, switches 
etc. It can be injected later on into system as a sleeper cell. Its algorithm 
can be programmed in variety of ways to defeat most defenses.
The defender in 
cyber world has to cope with many problems. The existing defenses are against 
only known viruses/worms. Defense networks, therefore, require constant 
upgradation. Even secure nets can be injected with virus even though attacker is 
not physically connected into the net. But then excessive security on the net 
decrease the system speed.
Detailed information 
on cyber war in various countries is difficult to find. However, certain amount 
of information is available about development of cyber war organisation in USA 
in the open literature. Hence it is proposed to study the evolution of cyber war 
organisation in USA.
USA
In earnest 
Electronic Warfare (EW) started during World War II. It matured as the radars 
and radar guided SAMs and anti-ac artillery evolved through the Vietnam war; the 
wars in the Middle East etc, Till recently EW meant brute jamming of signals or 
breaking the electronic lock on an aircraft by moving the lock away spatially. 
In the Op Desert Storm of Gulf War 91, false target information was injected 
into Iraqi Integrated Air Defence System, thereby misleading its computers. This 
can be considered the start of Cyber War in military domain. The Cyber War in 
the civil domain by way of unethical hacking into banking networks started 
little earlier.
IW operations were undertaken during Bosnia Operation in 1995 and 
against Serbia in 1999. The comprehensive operations included EW against Radars 
and SAMs, cyber attacks against IADS, operations against Television, Radio as 
well as cyber attacks against computer based systems like power generation, Oil 
refining systems…
So now there are 
three terms : EW, Cyber War and Information War often loosely used to convey the 
same thing. Electronic War is said to take place when electrons in a system are 
disturbed. Cyber space is also the space where electrons flow conveying 
information. But cyber space is normally referred to space in which computer 
electrons move around – either within the computer itself or between many 
computers connected in a network. The network itself could be a cable or fiber 
optic network or a wireless net in which electronic signals move between a 
transmitter and a receiver — the most apt example being a satellite and its 
terminals. Thus, in the militaries too, initially terms like EW, IW and Cyber 
War were used loosely and interchangeably.
Cyber War has become 
a major subset of warfare now, because the militaries and their equipments rely 
on many systems, each of which has computers, often many computers in each 
system. At the same time all facets of civil life, industry, banking and 
financial service power generation etc have also been based on extensive 
computer networks and infinite number of software lines. In such a huge complex 
of electrons, EW as practiced till 1980s, forms a small subset. Altering cyber 
electrons means altering information-hence the term IW. However, in current US 
terminologies IW means irregular warfare. Cyber War includes the earlier EW and 
IW.
Evolution of Cyber War
USAF set up IW 
squadrons in 1980s. All banking institutions and major industries especially the 
Aero Space industries also started building in cyber security in their networks. 
The financial institutions were at the forefront of cyber attacks, wherein 
hackers tried to steal/siphon money. This threat to banks and the security 
precautions could not be made public in order to retain the investor 
confidence.
As a result of 
success of IW in the Gulf War 91, USAF decided on IW across full spectrum of 
command and control. So the 688th Information Operations Wing was set up. The 
Wing has technical skill sets of AF Electronic Warfare centre; AF Cryptographic 
support center’s Securities directorate and Intelligence capabilities from 
former AF Intelligence Command. As on 2010, it has a staff of 1000 which 
includes military and civil.
…cyber space has data, 
networks and electronic devices. Good cyber defense implies protecting all three 
components and not merely data.
In 1993 USAF 
established an IW Cell at Kelly Air Force Base, Texas. By mid 90s, the IW 
flight, consisting 25 personnel, would work alongside Combined Air Operation 
Centre (CAOC) whenever operations were going on. IW operations were undertaken 
during Bosnia Operation in 1995 and against Serbia in 1999. The comprehensive 
operations included EW against Radars and SAMs, cyber attacks against IADS, 
operations against Television, Radio as well as cyber attacks against computer 
based systems like power generation, Oil refining systems etc.
In the past, the US 
caused a massive explosion in a new trans-Siberian oil pipeline running 
from the Urengoi gas fields in Siberia across Kazakhstan, Russia and Eastern 
Europe. It did it by causing its pumping station to over rev by computer malware 
in cooperation with some outraged Canadians who had supplied the software 
for the pumps.1 USN established its cyber cell in 1999 and mandated the unit to 
become like the ‘Top Gun’ amongst fliers.
In Dec 1998 DoD/USAF 
established Joint Task Force on Computer Network Defense ITF – CND. It was 
headed by a Maj Gen and was to work with the Army, Navy and the Marine Corps. 
This was an immediate result of a massive malware attack on US -military nets. 
It took the US 14 months to clean up this virus from its systems. It also 
revealed the enormity of possible damage to improperly secure 
networks.
Cyber War exercises 
named “Eligible Receiver” and “Solar Sunrise” were conducted in which Federal 
Agencies/Services, Israeli analysts and Californian teens attacked Defense 
networks. Weaknesses and vulnerabilities were identified and preventive steps 
initiated. In Sep 2001 Pentagon created Joint Task Force-Computer Network 
Operations- JTF-CNO. The replacing of CND by Computer Network Operations (CNO) 
implied the need to attack in order to defend proactively.
In 2008 DoD defined 
cyber space as, “a global domain within the information environment consisting 
of interdependent network of information technology infrastructures, including 
the Internet, telecommunication network, computer system and embedded processor 
and controllers.” It illustrated that cyber space has data, networks and 
electronic devices. Good cyber defense implies protecting all three components 
and not merely data. Earlier, it was believed that encrypting data was enough 
for cyber security.
Cyber Defense now 
meant following:
Cyber security is akin to Air Superiority. One has to fight to 
attain it and thereafter sustain it with constant effort. Also cyber security 
relates to place and time. Unlike air war in which offense is the best defense, 
in cyber war defense becomes primary…
- Secure and exclusive networks in which individuals cannot plug in Pen Drives, CDs and external devices.
- Defense in depth by firewalls. So that when under a cyber attack the system degrades gradually rather than suffer catastrophic collapse. And after attack is over, the system recovers.
- The system should be Self Diagnosing and to have built in healing capability.
- Data bases must employ stealth methodologies where for example, modulating chip technology enables them to hide, morph and masquerade as effectively as any attacking agent.2
Cyber security is 
akin to Air Superiority. One has to fight to attain it and thereafter sustain it 
with constant effort. Also cyber security relates to place and time. Unlike air 
war in which offense is the best defense, in cyber war defense becomes primary 
because of nature of attacker. There are no hostile cyber bases which preemptive 
bombing can destroy.
In 2001 USAF placed 
Cyber Wing under Space Command. By May 2002 it had a manning of 340 personnel. 
Later Cyber Command was made a sub unit of US Strategic command. It achieved 
full operational capability on 31 Oct 2010. The Cyber Command is headed by a 
General who also is the Director National Security Agency (NSA) and Chief of 
Central Security services. This arrangement in one stroke has made cyber 
structure more horizontal and integrated. Cyber command looks after all military 
networks numbering 15000 in all the Services. It has replaced the earlier Joint 
Task Force – Computer Network Operating and the Joint Functional Component 
Command for Network Warfare JFCC-NW. It has under it the Cyber Commands of US 
Army, Navy, Marine Corps and Air Force. It is responsible for both defense and 
offense in Cyber War. In addition it provides technical and electronic warfare 
support to Department of Homeland Security (DHS). If and when asked by DHS it 
will provide additional assistance. DHS looks after civil and private 
networks.
…as the cyber process and attacks kept increasing, especially post 
9/11 and after the incident of US spy plane P3C Orions collision with a Chinese 
interceptor in which the Chinese pilot died, USA selected a new strategy for 
cyber security.
NSA looks after all 
the government networks apart from the ones in military domain. US CYBERCOM has 
been tasked to develop:
- Methods to assess operational impact of intrusions.
- Identify proper response.
- Coordinate action with appropriate organizations.
- Prepare Response Plans.
- Execute plans through Service components.
US CYBERCOM will 
also issue Operational Alert conditions depending upon detected threats. The 
conditions are normal, A,B,C & D. Over and above these arrangements the 
Cyber organizations seek support and rely on private security specialists 
companies to deal with cyber threat.
The earlier concept 
of cyber security was purely defensive. However, as the cyber process and 
attacks kept increasing, especially post 9/11 and after the incident of US spy 
plane P3C Orion’s collision with a Chinese interceptor in which the Chinese 
pilot died, USA selected a new strategy for cyber security. Now it was felt that 
purely defensive strategy was reactive and insufficient to ward off cyber 
threat. For proper cyber security there is a need to actively patrol the cyber 
network for detecting potential trouble. So the new strategy of cyber attack 
comprises following:
- Denial of Service
- To patrol the Internet to pinpoint attackers.
- To create Logic bombs, worms, Trojans & Malware for use as and when needed.
The diagram 
illustrates the working of a computer network attack (CNA).3
Rivet Joint is an 
specialist transport aircraft (KC-135) which is used for CNA. It is in contact 
with ag
Agencies like NSA, JTF – CNA, and IW – EW centers via satellite links to 
receive and send back latest information for CNA planning. It injects cyber 
weapons as appropriate into hostile IADS network, Scud type missiles command and 
control centre and the communication networks. Another special aircraft called 
Compass Call (C-130 modified) monitors the effectiveness of communication 
network attacks.
In USA 24th AF looks 
after cyber operations, manned by 14000 airmen. The 24th AF has three major 
wings and an operations centre under it. These are:
- 67th Network Warfare Wing: It looks after information operations. Its 8000 strong manpower is located at some 100 locations worldwide. There are 35 squadrons and these deal in operations of Television, Radio, Telephone exchange and networks including mobile phones and networks.
- 688th Information Operation Wing: Deals in cyber space R&D and manned by 1000 staff which is a mix of military and civil.
- 689th Combat Communication Wing: Its mission is to train, deploy and deliver expeditionary and specialized communication; air traffic and landing systems for relief and combat operations.
 In 2010 
USAF undertook some important steps with regard to cyber branch. It established 
a new cadre for Cyber War with 1000 cyber warriors. These personnel were 
selected after a strict screening process which also judged their aptitude for 
cyber work. Their performance in online games was also a major criteria. This 
cadre is to be expanded to 6000. The cadre will comprise military, government 
employees, contractors and willing patriotic youths. Specialist cyber strike 
units will be created from these personnel. The training will include 
undergraduate cyber training, initial qualification training. The standards, 
evaluation and examinations will follow similar pattern as for flying training. 
The cyber warriors will get incentive pay similar to flying pay. Their main 
communication devices will be Droids and I Phones connected on secure and 
non-secure networks.
In 2010 
USAF undertook some important steps with regard to cyber branch. It established 
a new cadre for Cyber War with 1000 cyber warriors. These personnel were 
selected after a strict screening process which also judged their aptitude for 
cyber work. Their performance in online games was also a major criteria. This 
cadre is to be expanded to 6000. The cadre will comprise military, government 
employees, contractors and willing patriotic youths. Specialist cyber strike 
units will be created from these personnel. The training will include 
undergraduate cyber training, initial qualification training. The standards, 
evaluation and examinations will follow similar pattern as for flying training. 
The cyber warriors will get incentive pay similar to flying pay. Their main 
communication devices will be Droids and I Phones connected on secure and 
non-secure networks.
The cyber warriors 
will identify own networks weakness which will be followed up by regular patch 
up of vulnerabilities. In addition their actual target could include blowing up 
electric generators / motors; use of high power microwave to upset fly by 
control of combat aircraft and more.4
The NSA and JFCC – 
NW have worked together since 2005. The NSA has 700 personnel with Ph D. This 
vast experience is shared by the other cyber warriors who have benefited 
immensely. The CYBERCOM has partnership with 100 universities to train students 
on net security. Many of these students, thereafter, join NSA or civil cyber 
agencies. Now using the computer net attack, US forces can penetrate hostile 
computers systems and either mine it for data or damage it with crippling 
algorithms or even spoof it with false information. Some of the CNA tricks 
include ringing hostile phones every 30 seconds; send a fabricated Fax directly 
to the enemy operator to do things that would lead to trouble; sending 
accusatory e-mails etc. The idea is to make the enemy distrust own communication 
system or to shut down all communications.5
The Israelis 
established in Umbrella C4I in Mar 2003. By 2007 all intelligence networks were 
connected, sharing all sensor information. The network includes fixed sites as 
well as mobile sites. During 2009 Gaza conflict Israeli Air Force down loaded 
sensor imagery on U-tube; its tweets warned of rocket attacks and it used 
‘help-us-win.com’ blog to mobilize public support.6
Placed below are the 
recommendations with respect to Cyber War by a USAF study in 2008. The study was 
undertaken to suggest needed reorganization within the USAF for 2018-2023 time 
frame. Cyber War is a new domain for all the countries. It appears that USA and 
China have a lead in Cyber War domain over India of about ten years. The 
emphasis placed by them on cyber war is instructive for us to take 
note.7
Cyberspace : Boundless Opportunity and Significant Vulnerabilities
- USAF must not focus solely on protecting its databases, but rather it must also protect its networks and the functioning of electronic devices to enable cyberspace control.
- USAF must be prepared to conduct warfare in cyberspace to secure the domain at the time and place of its choosing.
- Call for an interagency commission to resolve the issues of jurisdictional authority and, if needed, author legislation for title 10 revision.
- While offense offers a distinct advantage for airpower, deterrence and defense must become co-equal propositions in cyberspace.
- Reclaim the internet, moving to a closed network, one that does not allow interaction with its civilian counterpart in any capacity or other open systems across the DOD.
- View cyberspace holistically, developing organizations and tactics to defend regardless of location, while retaining freedom of action for our forces.
- Develop system resiliency, with a layered defense in depth, that reacts to threats and sets in motion procedures for post – attack recovery.
- Develop and field self-diagnosing and self-healing systems with adequate redundant capacity for survivability.
- Develop systems to support real – time Cyberspace Situational Awareness (CSA)
- Develop a new corps of professionals capable of waging cyber warfare.
- Develop a structured professional development curriculum with a UCT school that provides the needed military education required for newly minted second lieutenants.
- Create a National Cyberspace Studies Institute (NCSI) that provides an increased understanding of cyber operations appropriate for success at the advanced ranks.
- Ensure adequate pay, attendance at the right schools – PME and weapons school – and promotion.
- Find a home/advocate for future cyber – warriors, one equal to that of air/space.
- Identify Guard and Reserve billets for cyber – professionals who are separate from active duty.
- Develop a construct to incorporate Guard and Reserve into the “fight”, either through stand – alone units or as a part of active duty units.
- Develop a Cyberspace Red Team to probe DOD networks and provide input for offensive, defensive, and counter offensive strategy.
- Develop an industry council where senior military and industry representatives convene to establish requirements and propose technological solutions.
- Partner with the private sector – universities and commercial industry to properly leverage American expertise.

 
No comments:
Post a Comment