Many of the weapons used by the military and police are
growing long in the tooth. The M16
assault rifle has been around, in various incarnations for almost fifty
years. The first Abrams tank entered service
in 1980. The F-16 Fighting Falcon first
flew in 1974. The design of the Glock
pistols carried by many American police dates from 1982. They haven’t been replaced for a couple of
reasons. One, they work, and continue to
work well decades after introduction.
Two, the pervasive nature of information collection, analysis, management
and distribution systems has magnified their effects to levels not dreamed of
by their designers. This article offers
an introduction to post-industrial weapons systems, their effects and their
vulnerabilities.
Often, it appears that the media and entertainment industries
have gotten stuck in 1984 when it comes to weapons. These industries focus, almost exclusively,
on systems that achieve “target effect,” through “kinetic delivery
mechanisms.” (That’s weapon-geek speak
for anything that launches some object that strikes something else…slingshot,
bow, pistol, rifle, cannon, rocket…you get the idea.) The “why” is reasonably obvious: These types of weapons are sexy; they make
for eye catching images on the evening news and fascinating accoutrements for
heroines, heroes and villains. The
emerging reality is less photogenic, but no less fascinating: War winning and bad guy defeating
technologies don’t go bang and they don’t make things blow up in a spectacular
fireball. Instead, they silently
retrieve, transfer, collate and analyze information and present decision makers
with actionable knowledge. These systems
have become ubiquitous and indispensable.
As a result, their assured operation and protection has become
critically important.
Millimeter Wave Hotspot Payload Being Loaded into UAV |
It’s not just the military that is investing in information
and intelligence sharing technology. The
US Department of Homeland Security boasts a Directorate of Science and
Technology with a 2012 budget of almost $1.2 billion, much of which is
dedicated to the development of data analysis and sharing technology.
To put that in perspective, the entire annual defense budget
for the United Kingdom is approximately $55 billion. (I’ll
end the paragraph here to give the magnitude of the numbers a chance to sink
in.)
The OODA Loop |
Let’s give a real world example. Oscar the Burglar breaks into a building with
a centrally monitored alarm.
In a 1985 scenario, the alarm sends an indication to the
monitoring center and the monitoring center employee places a phone call to the
building’s security manager’s home. The
security manager isn’t awake, so the monitoring center calls local law
enforcement. The local law enforcement
dispatcher sends out a bulletin to all cars, and multiple cars respond, drawing
coverage away from other areas of the city.
In the time that it’s taken this sequence of events to occur, Oscar has
made off with the family jewels and is long gone. In command and control jargon, law
enforcement was “not able to get inside Oscar’s OODA loop.” Obviously, there isn’t any fault with respect
to the officers in the patrol cars; they simply didn’t get the information they
needed in time.
Now let’s shift to 2012.
The alarm sends an indication to the monitoring center. However, instead of notifying anyone, the
automated system immediately gauges the nature of the intrusion, determines
that there is only one intruder and the intruder’s exact location within the
building. It then contacts the local law
enforcement system with information including the nature of the event and the location. The local law enforcement system immediately
identifies all patrol cars within a given distance of the building, excludes
any that are responding to higher priority calls and sends an alert indicating
the nature of the event and routing information to the nearest free patrol car and
the patrol supervisor. This sequence of
events has taken place in under ten seconds.
Oscar has barely had time to start bagging the jewels before the police
arrive and he’s arrested.
Note that the police officers themselves aren’t necessarily
any better at their basic job skills than their 1985 counterparts. What made the difference was their dominance
of the information space. Poor Oscar
never had a chance.
In many ways the policemen in the example are analogous to
today’s kinetic energy weapons. The
guided bombs and missiles aren’t necessarily more accurate or lethal than their
counterparts of a decade ago. The huge
leap forward has been in the speed at which soldiers and commanders are aware
of where and when to employ the weapons.
Knowing that the enemy is massing to attack an outpost an hour after the
attack starts isn’t particularly useful to a commander who wants to use
artillery, GPS guided bombs or, for that matter, an motorized infantry
battalion to spoil the attack. Knowing
that the enemy is beginning to marshal his forces almost as soon as the
activity is reported by a sensor, a scout or a spy allows the commander to pick
the time, place and weapon type best suited to counter the threat almost at his
leisure.
Blue Force Tracker - Modern Commander's Eyes |
- According to the commander of US Cyber Command (CYBERCOM), American defense systems are probed by hostile forces seeking to penetrate the networks six million times a day. That’s 250,000 times an hour, 4,167 times a minute, 70 times a second. That means in the time it’s taken you to read this paragraph, hostile hackers have made more than a thousand attempts to take down vital American military capabilities.
- In August 2008, Russian and Georgian forces clashed over disputed territories in South Ossetia. As the military drama was unfolding, a multi-faceted cyber attack began against the Georgian infrastructure and key government web sites. Attack types included website defacement, web based psychological operations, a fierce propaganda campaign and a distributed denial of service attack (DDoS).
At one point, multiple Georgian government websites were down or inaccessible for hours, and in the most strategic move to date in cyber warfare, the Georgian Government relocated President Mikhail Saakashvili’s web site to a web site hosting service in Atlanta, Georgia in the United States. The Georgians were simply not prepared for the use of computer weapons against their communications infrastructure.
Most telling about the nature of the cyber attacks against Georgia was their source. The attacks were carried out by groups sympathetic to, undoubtedly funded by, but also completely deniable by the Russian government. Think of them as an ultra-nationalist version of Anonymous, written in Cyrillic characters. As a result, even if the hackers were discovered or traced, there was very little that could be done to stop them.
Hacked Georgian Government Website
So what does this
mean for your novel or screenplay? I’m
glad you asked. (Ok. I’m glad *I* asked…)
- Your heroes, heroines and villains can get much more bang for the buck (pun intended) behind a keyboard than behind a gun.
- The ability to collate information and recognize linkages between data is as important as the ability to collect the data. Your detectives are no longer just finding the clues, they’re putting them together into a three dimensional model of reality.
- Nothing and nobody is safe – on either side. Target knows what you want before you do, the men in black know where you’ll be before you get there, and the Mountain Dew swigging, Twinkie scarfing hackers can take down the network faster than either.
- Cyberwarfare is increasingly becoming the province of well, but loosely, organized groups that are not beholden to, but may act in concert with governments. This means they are nearly impossible to identify and harder to eradicate.
No comments:
Post a Comment