Page 5 - Desert Lightning News Tucson 7-31-15
P. 5

Desert Lightning News                                 July 31, 2015                                        5

                                                      www.aerotechnews.com/davis-monthanafb

                                                      Facebook.com/DesertLightningNews

The new fight: Writing cyber into the science of war

   Every year, the Aspen Security Forum brings together the top minds in defense, intelligence and homeland security. This year, more than ever, the conversa-
tion is turning to cybersecurity – protecting computer networks and everything attached to them. Cyber is constantly changing the way conflicts and combat
unfold. Here, former U.S. Navy Rear Adm. William Leigher offers insights on adapting the principles of kinetic warfare to handle the ever-evolving cyber
threat: The future of cyber warfare starts at basic training.

   One of the most remarkable things about boot       your adversaries are to attack.  Deterrence has      the next major act of war will happen online –
camp is that a kid can go in not knowing what an      worked brilliantly throughout history, but when      a “cyber Pearl Harbor.” The problem with the
M16 looks like, and come out able to assemble         it comes to cybersecurity, the strategy falls        comparison is that the attack on Pearl Harbor
one while taking enemy fire. Cyber warfare de-         apart.                                               became obvious as soon as the ambush start-
mands the same type of weapon – powerful, por-                                                             ed. Skilled cyber attacks are far more insidious.
table and effective even in the hands of novices.         Think about deterrence tactics – an army pa-
                                                      rading its tanks down the street.  Now imagine          They unfold slowly and strategically. Just
   Our experts call it the “easy button,” and they    if showing off those tanks gave away every pos-       like military operations, they begin with intel-
caution that the enemy already has it. Hackers        sible means of defeating them. That’s what we’re     ligence – information-gathering. Dossiers. Re-
no longer need to know lines upon lines of com-       dealing with in cyber warfare. Showing adver-        connaissance. Then comes the analysis – pick-
puter commands; today they simply launch a            saries what you have allows them to render it        ing the information apart, creating aim-points
program and tap or click their way to calamity.       useless.                                             and deciding how, when and where to attack.
Our service men and women deserve cyber ca-                                                                But unlike traditional military attacks, the in-
pabilities with the same ease of use – powerful          Unlike other acts of war, cyber attacks don’t     telligence breaches and battle damage from
software running on a cleanly designed interface      necessarily happen in close combat – they take       cyber strikes isn’t always immediately obvious
that will allow even the greenest soldiers, sailors,  place from afar. The perpetrators aren’t flying       – in fact, it can take months or even years to
Marines and airmen to venture out into the field       their national flag – they often operate in isola-    detect.
and knock out power to an enemy base or jam a         tion and secrecy. You can deter a hostile nation-
computer network to thwart an incoming attack.        state’s military by having them outnumbered             For years, cybersecurity experts have warned
                                                      and outgunned, but keeping a shadowy cyber           that high-stakes hacks were inevitable – a mat-
   DETERRENCE LOOKS DIFFERENT                         force at bay is far more complicated.                ter of when, not if. It’s time to take the thinking
   Deterrence is a classic military tactic: The
more visible power you have, the less likely             ATTACKS AREN’T OBVIOUS                                                                See SECURITY, Page 10
                                                         There’s a lot of talk in cyber circles about how
   1   2   3   4   5   6   7   8   9   10