Cyber Warfare - Preventing Past Mistakes In Future Efforts by U.S. Army Capt. Jerome M. Althoff
July 18, 2018
The terms Cyber Security, Cyber Space, and Cyber Domain are
prevalent in all major news outlets and within the conference rooms
of the Army. We hear about the establishment of Cyber Command,
recently publicized attacks and breaches, and a need to “combat” or
“operationalize” the digital domain. But what is Cyber in general?
How can we visualize and implement realistic effects upon it? How do
we understand it without a degree in computer science or a zeal for
illicit technological pursuits? I will attempt to use three examples
relating historical events to potential future cyber threats in
order to express the vulnerabilities inherent in our use of
technology. My hope is that we learn from the mistakes of the past
in order to prevent similar mistakes in the future.
DATA FLOW
Find, fix, finish. This was one of the primary lessons I learned
while at the Infantry Officer Basic Course. If you look back far
enough, these three words summarize the basics of most combat
situations. One significant tool used to finish is the flanking
maneuver. Before the flank revolutionized warfare, two forces of
equal weight meeting in close combat would trade blows and
projectiles face-to-face until one side was exhausted. The
innovation of the flank, as used by the Boetotian army in the battle
of Leuctra in 371 BC, caught the Spartan army completely off guard
by changing the alignment of the Boetotian force’s phalanx and
hitting the Spartans from the side. The Spartan domination of Greece
was shattered; their king and over half of their elite troops were
killed by the successful deployment of the new tactic. While this
historical battle shifted the balance of power within the Greek
world, the modern-day flank will take on a significantly altered
look.

A U.S. Army sergeant communicates
with his platoon as they move tactically through an urban
environment in Italy during January 10, 2018. The Water
Purification Platoon from the Brigade Support Battalion,
173rd Airborne Brigade is conducting a reconnaissance to
secure a source of water for the Sky Soldiers. (U.S. Army
photo by Lt. Col. John Hall)
|
In a technology-augmented modern military formation, a similar
flank can be achieved via directed targeting of our force data flow.
American ground forces create their depth through a rifleman with a
radio, connecting the relatively small, tactically-engaged force to
a deep formation of long range artillery, exotic munitions, drones,
and planes. Every radio call-for-fire, sensor, full motion video, or
individual’s key strokes has to arrive at the point of need before
it can be helpful. Typically, this information travels significant
distances regardless of the medium: radios, satellites, fiber optic
cable, or other, less common methods. If an adversary focused on the
flow of the data and targeted it as an attempt to change the depth
of our flanks, we would be caught as off guard as the Spartans were
2,391 years ago. To provide a more concrete example of the risk in
“flow of data,” let’s look at how vulnerable the Military Grid
Reference System (MGRS) is to attack. MGRS is used to relay pinpoint
locations for ground forces around the world. Each vehicle, bomb,
and Soldier knows where they are and where adjacent formations are
by sharing their MGRS. If the flow of data was manipulated to alter
transmitted MGRS, say by rearranging all the numbers or inserting
completely different numbers, our artillery and aircraft would be
negated, relief forces misdirected, and flanks unknowingly exposed.
SECURE COMMUNICATIONS
In August 1914, in what we would know today as Poland, the 2nd
Russian Imperial and the 8th German Imperial armies met near
Tannenberg, East Prussia. While the German army was outnumbered and
outgunned, it had several key advantages in transportation,
leadership, and technology. However, one technology that both
nations shared was the radio. This technology had been around for
less than twenty years, which meant the combatants of the first
World War were going to be testing the technology in large scale
combat together. While both countries fielded this new radio set,
one did it better. The Russian radio operators could transmit their
messages over great distances, but they did not understand how to
use their equipment securely. This oversight led to those messages
being broadcast in the clear, with the only security being the
Russian language and military acronyms. This protection proved to be
insufficient when the messages were received and deciphered by
elements of the 8th German Army. The almost complete destruction of
2nd Army, followed by another loss suffered by the 1st Army, set the
tone for the rest of the war when Imperial Russian forces met
Imperial German forces on the front. Securely messaging from one end
user to another is paramount to military operations that now span
whole theaters or the globe.
Secure communication, called
cryptography, is something we all tend to take for granted. Most
assume that the use of asymmetric Public Key Infrastructure (PKI) in
association with our Common Access Cards (CAC) and Virtual Private
Networks (VPN), or other symmetric keys, ensure end-to-end
encryption and guarantee secure means of communicating. And yes, if
properly configured and implemented, these technologies can lead to
secure means of sending data across the ether; however, the users,
the administrators, and random chance challenge these security
measures every day. The assumption of secure communications is also
challenged daily by threats using more direct brute force methods to
break into the secure channel. Finally, the security of the end
device is just as important. All the technology used to establish
secure links can be mitigated if the laptop, phone, or radio being
used on either side of the communication has been compromised and a
side channel has been established to rebroadcast the message to
others.
Another relevant public example was heat mapping from
Strava , which gained notoriety recently when researchers discovered
the outlines of multiple US military installations around the world
had been shared publicly. Every Strava user who made their daily run
around the perimeter of the installation unwittingly contributed to
precisely and publicly sharing the location, size, and shape of the
installation on which they were confined. The heat mapping service
had been available for years and it was articulated in the End User
License Agreement and privacy settings of the company: the portion
every user quickly clicks past in order to access the app.
CLOUD SOLUTIONS
On 18 October, 1941, the Nazi ambassador to the Empire of Japan,
Eugen Ott, was alerted that his close confidant, Richard Sorge, had
been arrested for espionage. Sorge, a German newspaperman, was a
frequent visitor to the Nazi embassy and helped draft the
ambassador’s reports to Berlin. The embassy assumed the trusted
newsman had been swept up in a wave of anti-German sentiment then
prevalent in Japan. Much to the ambassador’s mortification, it was
eventually proved that Sorge was one of the most prolific spies that
the Soviet Union had ever fielded, and it was he who had likely
saved the Soviets by confirming there was no attack pending from the
Empire of Japan. This freed the forces in the Far East to pivot to
the German threat. Spies have existed as long as people have kept
secrets, so what makes Sorge an excellent example? He serves as an
example of the threat of cloud collaboration services.
Digital clouds have become an ever-prevalent fixture in modern
society. Their flexibility and ease of access make them fantastic
solutions for a mobile-active user base that utilizes multiple
end-user devices in various locations and allows those uses to share
effortlessly. Ultimately cloud solutions are an elegant way to sell
a scenario where users save their data on to someone else’s
machines; this machine exists without the user having an idea of its
physical location, how it is secured, or who has access to the data.
Many cloud service providers struggle with securing the data-at-rest
and all of them are subject to data-in-transit dangers. In effect,
the embassy should be viewed as the physical machine that exists
somewhere in the center of the cloud. This machine is diligently
storing data, just like the desks and offices of the German embassy,
and ultimately, it can provide a clearing house for agents to peruse
at their leisure. All Sorge had to do was gain access to the
embassy, and all the information and thoughts of the Third Reich
became available to the Soviet Union. Like the German embassy’s
secure rooms being open to Sorge, and the ambassador’s reports being
drafted in part by Sorge, cloud computing can be easy leveraged
against the warfighter with few or no obvious indicators.
CONCLUSION
What stands at the heart of Cyber Warfare? The ability to damage
either the warfighter directly or the continuously-growing,
electronically-enabled links that allow the warfighter to function.
It takes only a small leap of abstraction to recognize the truth and
the danger posed in that statement. Every day there are new apps,
new wearable devices, and new uses for data that increase
convenience, effectiveness, and lethality, but with each advance
comes new risks. These advances require a binding of individuals and
systems closer together to realize these increases in efficiency,
but the more the network spreads and the more sensors and actuators
are networked together, the smaller the world becomes.
Hackers are derisively viewed as living in their parents’ basements.
But with one connection to the network of networks, they are in our
pockets, tanks, and squad radios. They are altering the data flow to
dump every munition request from theater into the recycle bin. They
are taking over your phone(s) and smart watches in order to see the
screen the same way you do, eliminating the effects of VPN or to
simply using the built-in microphones and cameras to literally use
you as their accomplice. They are reading and aggregating the
knowledge scattered across clouds used without extensive technical
reviews by our forces. In short, one individual’s compromised device
or incorrectly-saved document can flank our entire force or
broadcast our commands in the clear. This is the heart of Cyber
Warfare and something I hope is more relatable for everyone in
uniform.
TAKEAWAY
Cyber is not a strategic fight, cyber is not someone else’s job,
cyber is not stuck at the national level or with some ‘brain’ in a
closet. Cyber warfare spans any piece of technology that can listen,
see, remember, or connect. Some basic actions to combat this elusive
and pervasive threat at the company level and below are provided
here:
Mobile Devices ...
This includes cell phones, smart watches, some fitness devices, and
numerous other small devices that are significantly helpful in
civilian life. Here’s the reality: if it can hear you, see you, or
connect to something else that can, it is a potential enemy
collection device. To mitigate this pervasive threat, actively
enforce strict bans on these devices in secure areas or around any
operations plans. And no, keeping your phone on airplane mode won’t
cut it – they need to be kept out of the secure area entirely. This
action drastically reduces the risk poised by the devices we all
like to use in our civilian lives. And it works even if your device
has been compromised; there is nothing for an enemy to collect if
you don’t provide the opportunity.
Digital Footprint ...
Uncomfortable as it may seem, Facebook, Strava, Google, etc. all
track you. They build a profile of your physical movement (through
GPS device, geo-tagged photos, and by localizing the IP addressed
used by your device) when you use their services. They can also
track what webpages you look at and what you search for. In short,
your devices and internet behavior are always capable of being
observed. Actively encourage people to understand this truth so they
can be mindful of what operation actions they give away for free. If
an old adage was ‘Loose Lips Sink Ships’ the modern equivalent is
‘Wireless devices call in fire’. If you are a Google user (browser,
mail, drive, maps, etc.) Google will attempt to build a profile
around you, one you can review in your profile . Take a look at what
you’ve been sharing with Google, and try to view it from an outside
perspective ... what could a complete stranger decipher about your
life just based on your search history? If it makes you
uncomfortable, consider using services which make your privacy a
priority, such as search provider DuckDuckGo or the TOR browser.
Education ... For the most
part no one of our devices or profiles will call in the fire.
However, without understanding that all of our devices are easily
collected against in order to build a composite picture, individuals
are tempted to think that their digital misstep won’t cause
disaster. While AFN ads come across as cliché, they are correct in
that the strength of our digital security is diminished by any
single weak point. Every member needs to be made aware of the risks
that they cause for everyone. Every member must learn that their
devices can cause actual mission failure for their own unit or
adjacent elements. Finally, technical solutions shouldn’t be the
only answer in a platoon or company kitbag ... paper maps, magnetic
compasses, pen and ink, and pre-shared brevity codes ... are tried
and true techniques that can mitigate the risks posed by susceptible
digital maps and cryptography.
|
|