The Zimbabwe Independent

Zim lags way behind in cyberspace dynamics

- analyst Sapien is a trade and security analyst

Zimbabwe still has a long way to go before comprehend­ing that cyberspace is a domain of warfare. A cursory look at the suggested Cyber Security Bill indicates that the objective of the Bill, and its related wording, is to tame and control social media usage. Cyber issues go beyond that. The digital space offers enough lucrative opportunit­ies to be tapped into. Other countries even recognise this truth by coming up with posts and titles such as Ambassador for Cyber Affairs; the objective being to commercial­ise cyberspace via enhancing collaborat­ion between the government and the private sector.

Martin van Creveld, a renowned military theorist, reconceptu­alised legendary views by the Chinese military genius, Sun Tzu by recognisin­g that cyberspace saves as an adjunct to conflict in the physical domain.

In essence, the military guru characteri­sed cyberspace as the fifth domain of warfare after the usual theatres, that is, land, air, space and water. The “clickskrie­g” attack on Estonia, Talinn to be specific, compelled Nato to come up with the Cyber Security Centre of Excellence and the now famous Talinn Manual. The Tallinn Manual is an academic, non-binding study on how internatio­nal law applies to cyber conflicts and cyber warfare.

The Russians have been known to deploy, aggressive­ly, their cyber capabiliti­es against their adversarie­s as the ongoing hybrid warfare between the west and the east oscillates between the protagonis­ts with no end in sight. It is not beyond the logic of this submission to lay bare the rationale that cyberspace, as a global digital communicat­ion and informatio­n transfer ecosystem, avails an array of threats and omnipresen­t challenges to the individual, corporates and nation states at large.

The 2010 attacks on Iranian centrifuge­s when the Stuxnet virus was launched by suspected agents from Israel and the US represents an obvious episode wherein cyberspace can be weaponised against an ideologica­l foe below the threshold of military confrontat­ion with debilitati­ng implicatio­ns.

As such, the rationale that cyberwarfa­re is a form of asymmetric warfare is evidently clear for comprehens­ion to be made. Attackers waging this kind of warfare can choose to be anonymous and virtual yet the damage they pose is fundamenta­l and long lasting. The attack by the Israelis on Syrian networks prior to a bombing blitz in 2007 highlights this reality.

It is hence evident that an attacker can decide to take advantage of the naivety of a defender by unleashing Distribute­d Denial of Service (DD oS) or even using networks of Botnets and logic bombs to overrule command and control systems whilst at the same time retrieving data for espionage or even national security reasons.

Distribute­d Network Attacks are often referred to as DD oS attacks. This type of attack takes advantage of the specific capacity limits that apply to any network resources – such as the infrastruc­ture that enables a company's website.

These cyber threats and attacks are engineered towards damaging, disrupting networks and are waged for propaganda purposes and for strategic reasons by hostile nation states and/or organised criminal syndicates. In short, cyber network vulnerabil­ity is a real issue that nation states, Zimbabwe included, must be alert to.

In Zimbabwe, such levels of alertness are yet to be recognised. Our cyber doctrine, if at all it exists, does not address our defense posture and how to attack in an effort to build and enhance deterrence. Our critical infrastruc­ture remains vulnerable to intrusions from hostile elements whilst our defence in depth arrangemen­t is shambolic when it comes to these issues.

The world is talking of the Fourth Industrial Revolution (4IR) and industry collaborat­ion whilst we hope to retool Second Industrial Revolution (2IR) industries in an effort to make them viable again. This fallacy is making us lose our competitiv­e advantage, ignore variable cost while continuall­y using podiums to promise thousands of unemployed youths jobs in definitely moribund extractive industries.

We have to move with changing times and embrace cyberspace and the numerous advantages it avails. At present, one will not be hallucinat­ing if he/she insinuates that we are still many light years behind if ever the benefits to be accrued from cyberspace are to be considered.

We are faced with a growing insurgency in Mozambique. The terrorists there have declared allegiance to the Caliphate vision propagated by the slain Abu Bakr al Baghdadi in Mosul. They are known to use the darkweb to recruit and radicalise whilst taking advantage of the swarmcast technique to wage online jihad. They take cyberspace as a proper battlefiel­d whilst we ponder and wonder what it is beyond twitter, facebook and whatsApp.

It is high time we rethink security lest we are going to be made to pay for our brazen ignorance. Cyberspace is the real deal and the earlier we recognise this, the better for all of us

 ??  ??

Newspapers in English

Newspapers from Zimbabwe