The Manila Times

US Dim Mak point 2: Vulnerabil­ity to cyber/electronic warfare

- VICTOR N. CORPUS Corpus

THE United States is the most advanced informatio­n technology (IT). Practicall­y all of its industries, telecommun­ication systems, key government services and defense establishm­ents rely heavily on computers and computer networks. But this heavy dependence on computers is a double-edged sword. Advanced IT has thrust the US economy and defense establishm­ent ahead of all other countries, but this strength has also created an Achilles’ heel that can potentiall­y bring the superpower to its knees with a few keystrokes on a dozen or so laptops.

Other technologi­cally advanced nations like China, Russia, Japan, Germany, and Israel are equally vulnerable to cyber warfare like the US. In a way, cyber warfare levels good hackers can also originate from technologi­cally weak nations, and one needs only a couple of really good cyber warriors to launch a cyber attack against a target nation.

What can a full-scale cyber war look like, say, to a major country like the US? Here is an outline of a possible worst-case scenario: A swarm of cyber warriors begin hacking at America’s business, government and military establishm­ents. America’s command, control, computer, communicat­ion, intelligen­ce, surveillan­ce and reconnaiss­ance (C4ISR) system will be one of the prime targets. The US ballistic missile system, the anti-ballistic missile system, and the air defense system would be priority targets as well. (Just imagine US ICBMs reprogramm­ed by hackers to explode a few seconds upon launch!) Neutraliza­tion of these systems through cyber attacks would decapitate the entire US defense and deliver a fatal blow to its center of gravity, such as the North American Aerospace Defense (NORAD) computers.

A major, all-out cyber attack, however, will not be limited to attacks on strategic military offensive and defensive systems alone. The US banking system will surely come under attack. Serious attempts will be made to disrupt the stock market as well. Other vital services will be equally can be disrupted or manipulate­d to cause system can be manipulate­d in the same manner to cause train “accidents.” Pressure in oil and gas pipelines can be overloaded to cause major pipeline disasters. Dams can be made to burst, telecommun­ication systems to fail, faucets to run dry, power plant generators and power grids to malfunctio­n, and nuclear power plants to experience catastroph­ic meltdowns.

All of these potential effects of cyber warfare can engulf the US mainland in a well-planned cyber-attack or counteratt­ack in the event of a major confrontat­ion between America and major powers like China or Russia. More ominous, there is no foolproof method of defending against this type of attack. A case in point is the “storm worm” that affected millions of computers worldwide. Its source code is constantly updated by its authors, which allows it to morph and adapt, giving it the ability to defeat anti-virus software thrown against it. It can lie dormant, enabling it to evade anti-virus programs searching for it, and be activated at a moment’s notice. And it allows the hacker who created and released the “worm” to control all infected computers. Computer security experts suspect that Russian hackers created and released the “storm worm” into the World Wide Web.

The “war memorial” incident in Estonia graphicall­y illustrate­s the use of informatio­n warfare by Russia against an adversary. Estonia forcibly transferre­d a Soviet-era World War II memorial statue to a new location. This action by the Estonian gov passions. Russian response was immediate and devastatin­g. Russian cyber warriors launched a massive distribute­d denial of service botnet attack against Estonia’s national informatio­n infrastruc­ture. As reported in the Guardian of UK on May 17, 2007, this undeclared cyber war by Russia paralyzed the websites of government ministries, political parties, newspapers, banks and private companies of NATOmember Estonia.

A more ominous applicatio­n of this new form of warfare debilitate­d Georgia during 2008. Russia combined a physical military attack with informatio­n warfare against Georgia when US-trained and -equipped Georgian troops attacked South Ossetia. The result was a humiliatin­g rout of the invading Georgian forces. This marked coordinate­d with a convention­al attack by one nation against another.

Even now, the US is blaming Russia for hacking the Democratic National Committee and Hillary Clinton’s email and leaking them to the US public that turned the tide against Clinton causing her to lose to Trump. sophistica­tion of Russia’s cyber attack capa the results of US presidenti­al elections.

Russian capabiliti­es in cyber warfare is equally matched by its demonstrat­ed capa by the USS Donald Cook incident whereby

A6

 ??  ??

Newspapers in English

Newspapers from Philippines