How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010
Transcript of How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010
![Page 1: How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010](https://reader033.fdocuments.in/reader033/viewer/2022042813/543cd8deafaf9fc2618b48a4/html5/thumbnails/1.jpg)
Copyright © 2010 Scott Borg/US Cyber Consequences Unit All rights reserved
![Page 2: How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010](https://reader033.fdocuments.in/reader033/viewer/2022042813/543cd8deafaf9fc2618b48a4/html5/thumbnails/2.jpg)
Copyright © 2010 Scott Borg/US Cyber Consequences Unit. All rights reserved. 2
![Page 3: How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010](https://reader033.fdocuments.in/reader033/viewer/2022042813/543cd8deafaf9fc2618b48a4/html5/thumbnails/3.jpg)
Copyright © 2010 Scott Borg/US Cyber Consequences Unit. All rights reserved. 3
Why would a nation state bother with cyber attacks?
![Page 4: How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010](https://reader033.fdocuments.in/reader033/viewer/2022042813/543cd8deafaf9fc2618b48a4/html5/thumbnails/4.jpg)
Copyright © 2010 Scott Borg/US Cyber Consequences Unit. All rights reserved. 4
![Page 5: How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010](https://reader033.fdocuments.in/reader033/viewer/2022042813/543cd8deafaf9fc2618b48a4/html5/thumbnails/5.jpg)
Copyright © 2010 Scott Borg/US Cyber Consequences Unit. All rights reserved. 5
![Page 6: How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010](https://reader033.fdocuments.in/reader033/viewer/2022042813/543cd8deafaf9fc2618b48a4/html5/thumbnails/6.jpg)
Copyright © 2010 Scott Borg/US Cyber Consequences Unit. All rights reserved. 6
SOME NOTABLE CYBER CONFLICTS - I
![Page 7: How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010](https://reader033.fdocuments.in/reader033/viewer/2022042813/543cd8deafaf9fc2618b48a4/html5/thumbnails/7.jpg)
Copyright © 2010 Scott Borg/US Cyber Consequences Unit. All rights reserved. 7
SOME NOTEABLE CYBER CONFLICTS - II
![Page 8: How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010](https://reader033.fdocuments.in/reader033/viewer/2022042813/543cd8deafaf9fc2618b48a4/html5/thumbnails/8.jpg)
Copyright © 2010 Scott Borg/US Cyber Consequences Unit. All rights reserved. 8
• Cyber attacks now a standard accompaniment of nearly all serious conflicts
• Government wishes carried out without need for any overt government actions
• Cooperation from organized crime
• Social networking as an organizational tool
• Highly controlled societies like Russia and China have an advantage
• Complementing military actions in specific ways
• Potential for doing physical damage to critical infrastructure industries
• Individual companies and organizations threatened
• Economic motives
![Page 9: How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010](https://reader033.fdocuments.in/reader033/viewer/2022042813/543cd8deafaf9fc2618b48a4/html5/thumbnails/9.jpg)
Copyright © 2010 Scott Borg/US Cyber Consequences Unit. All rights reserved. 9
![Page 10: How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010](https://reader033.fdocuments.in/reader033/viewer/2022042813/543cd8deafaf9fc2618b48a4/html5/thumbnails/10.jpg)
Copyright © 2010 Scott Borg/US Cyber Consequences Unit. All rights reserved. 10
![Page 11: How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010](https://reader033.fdocuments.in/reader033/viewer/2022042813/543cd8deafaf9fc2618b48a4/html5/thumbnails/11.jpg)
Copyright © 2010 Scott Borg/US Cyber Consequences Unit. All rights reserved. 11
![Page 12: How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010](https://reader033.fdocuments.in/reader033/viewer/2022042813/543cd8deafaf9fc2618b48a4/html5/thumbnails/12.jpg)
Copyright © 2010 Scott Borg/US Cyber Consequences Unit. All rights reserved. 12
![Page 13: How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010](https://reader033.fdocuments.in/reader033/viewer/2022042813/543cd8deafaf9fc2618b48a4/html5/thumbnails/13.jpg)
Copyright © 2010 Scott Borg/US Cyber Consequences Unit. All rights reserved. 13
When should the commander of a physical attack consider adding cyber attacks?
![Page 14: How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010](https://reader033.fdocuments.in/reader033/viewer/2022042813/543cd8deafaf9fc2618b48a4/html5/thumbnails/14.jpg)
Copyright © 2010 Scott Borg/US Cyber Consequences Unit. All rights reserved. 14
![Page 15: How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010](https://reader033.fdocuments.in/reader033/viewer/2022042813/543cd8deafaf9fc2618b48a4/html5/thumbnails/15.jpg)
Copyright © 2010 Scott Borg/US Cyber Consequences Unit. All rights reserved. 15
![Page 16: How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010](https://reader033.fdocuments.in/reader033/viewer/2022042813/543cd8deafaf9fc2618b48a4/html5/thumbnails/16.jpg)
Copyright © 2010 Scott Borg/US Cyber Consequences Unit. All rights reserved. 16
How much damage could cyber attacks do alone?
![Page 17: How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010](https://reader033.fdocuments.in/reader033/viewer/2022042813/543cd8deafaf9fc2618b48a4/html5/thumbnails/17.jpg)
Copyright © 2010 Scott Borg/US Cyber Consequences Unit. All rights reserved. 17
Special Features of Cyber Attacks on Critical Infrastructure Industries
• Generally prepared long in advance by inserting malware into the target systems
• Deployed with multiple types of cyber attacks on each target
• The triggering signal or mechanism is usually the trickiest component
• Subject to spoofing of damages
![Page 18: How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010](https://reader033.fdocuments.in/reader033/viewer/2022042813/543cd8deafaf9fc2618b48a4/html5/thumbnails/18.jpg)
Copyright © 2010 Scott Borg/US Cyber Consequences Unit. All rights reserved. 18
Why can’t we employ deterrence?
![Page 19: How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010](https://reader033.fdocuments.in/reader033/viewer/2022042813/543cd8deafaf9fc2618b48a4/html5/thumbnails/19.jpg)
Copyright © 2010 Scott Borg/US Cyber Consequences Unit. All rights reserved. 19
![Page 20: How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010](https://reader033.fdocuments.in/reader033/viewer/2022042813/543cd8deafaf9fc2618b48a4/html5/thumbnails/20.jpg)
Copyright © 2010 Scott Borg/US Cyber Consequences Unit. All rights reserved. 20
Where does this leave our overall defense strategy?
![Page 21: How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010](https://reader033.fdocuments.in/reader033/viewer/2022042813/543cd8deafaf9fc2618b48a4/html5/thumbnails/21.jpg)
Copyright © 2010 Scott Borg/US Cyber Consequences Unit. All rights reserved. 21
CYBER-DEFENSE REVOLUTION IN MILITARY AFFAIRS (Borg Synthesis) - 1
Industrial Defense Era
Cyber-Defense Era
Central Principles
Nation states as adversaries
Networked groups as adversaries
Concentrated forces Diffuse forces
Fire power advantage Information advantage
Aspiring to intimidating force
Aspiring to ubiquitous force
Different Adversaries, Different Goals
![Page 22: How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010](https://reader033.fdocuments.in/reader033/viewer/2022042813/543cd8deafaf9fc2618b48a4/html5/thumbnails/22.jpg)
Copyright © 2010 Scott Borg/US Cyber Consequences Unit. All rights reserved. 22
CYBER-DEFENSE REVOLUTION IN MILITARY AFFAIRS - 2
Industrial Defense Era
Cyber-Defense Era
Strategy Defending perimeters of geographical areas from attacks originating outside
Defending internal networks and operations from attacks appearing inside
Military and military-industrial targets
Critical infrastructure targets
Success measured by destruction of equipment and infliction of casualties
Success measured by the protection or destruction of value
Battlefield theory as central
Economic theory as central
Deterrence-based policies
Resilience-based policies
No More Incomings, No More Invading Forces
![Page 23: How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010](https://reader033.fdocuments.in/reader033/viewer/2022042813/543cd8deafaf9fc2618b48a4/html5/thumbnails/23.jpg)
Copyright © 2010 Scott Borg/US Cyber Consequences Unit. All rights reserved. 23
CYBER-DEFENSE REVOLUTION IN MILITARY AFFAIRS - 3
Industrial Defense Era Cyber-Defense Era
Tactics Engagements between groups of men and weapons
Engagements between integrated systems with extensive automated programs
Information systems as support
Information systems as weapons
Speed and range in executing attack operations as crucial
Speed and coverage in identifying the nature and location of the adversary’s operations as crucial
Area and facility targeting System and process targeting
Destruction of targets Hijacking or corruption of targets
Assured results Probabilistic results
Cyber-Attacks Are Not Primarily a “Force Multiplier”
![Page 24: How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010](https://reader033.fdocuments.in/reader033/viewer/2022042813/543cd8deafaf9fc2618b48a4/html5/thumbnails/24.jpg)
Copyright © 2010 Scott Borg/US Cyber Consequences Unit. All rights reserved. 24
CYBER-DEFENSE REVOLUTION IN MILITARY AFFAIRS - 4
Industrial Defense Era Cyber-Defense Era
Decision Processes
Centralized decision-making Flexibly distributed decision-making
Emphasis on large group discipline
Emphasis on small group initiative
Clarity about identity of adversary
Uncertainty about identity of adversary
Problems with deducing patterns from insufficient information
Problems with recognizing patterns amid excess information
Network Centric Warfare Was on the Right Track, But Didn’t go Far Enough
![Page 25: How Cyber Attacks Will Be Used in International Conflicts Scott Borg 2010](https://reader033.fdocuments.in/reader033/viewer/2022042813/543cd8deafaf9fc2618b48a4/html5/thumbnails/25.jpg)
Copyright © 2010 Scott Borg/US Cyber Consequences Unit. All rights reserved. 25