{"id":7936,"date":"2021-06-11T09:33:22","date_gmt":"2021-06-11T12:33:22","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=7936"},"modified":"2021-06-11T09:33:22","modified_gmt":"2021-06-11T12:33:22","slug":"las-operaciones-de-ciberguerra-en-conflictos-militares-del-futuro","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=7936","title":{"rendered":"Las operaciones de ciberguerra en conflictos militares del futuro"},"content":{"rendered":"<p>Los escenarios de conflicto del siglo XXI incluir\u00e1n operaciones de Ciberguerra en las cuales, las plataformas de armas y de apoyo ser\u00e1n atacadas. Los sistemas militares son vulnerables y se necesita tener en cuenta que, las nuevas armas y equipos que se incorporen, incluyan las contramedidas para responder adecuadamente a los ciberataques del enemigo, que ser\u00e1n la norma en el campo de batalla. Las armas no funcionar\u00e1n adecuadamente, los drones ser\u00e1n neutralizados en el aire, los abastecimientos no llegar\u00e1n en tiempo, etc.<\/p>\n<hr \/>\n<div class=\"core-block\">\n<p>\u201cIf you think any of these systems are going to work as expected in wartime, you\u2019re fooling yourself.\u201d<\/p>\n<\/div>\n<div class=\"core-block\">\n<p>That was Bruce\u2019s response at a conference hosted by U.S. Transportation Command in 2017, after learning that their computerized logistical systems were mostly unclassified and on the internet. That may be necessary to keep in touch with civilian companies like FedEx in peacetime or when fighting terrorists or insurgents. But in a new era facing off with China or Russia, it is dangerously complacent.<\/p>\n<\/div>\n<div class=\"core-block\">\n<p>Any 21st century war will include cyber operations. Weapons and support systems will be successfully attacked. <a href=\"https:\/\/www.wired.com\/2015\/07\/hackers-can-disable-sniper-rifleor-change-target\/\">Rifles<\/a> and <a href=\"https:\/\/money.cnn.com\/2017\/07\/27\/technology\/hack-smart-gun\/index.html\">pistols<\/a> won\u2019t work properly. Drones will be <a href=\"https:\/\/www.businessinsider.com\/department-13-mesmer-drones-2017-1\">hijacked<\/a> <a href=\"https:\/\/www.bellingcat.com\/news\/2019\/10\/01\/has-iran-been-hacking-u-s-drones\/\" target=\"_blank\" rel=\"noopener\">midair<\/a>. Boats <a href=\"https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/\">won\u2019t sail<\/a>, or will be <a href=\"https:\/\/www.newscientist.com\/article\/2143499-ships-fooled-in-gps-spoofing-attack-suggest-russian-cyberweapon\/\">misdirected<\/a>. Hospitals <a href=\"https:\/\/www.ft.com\/content\/acf4ac78-c738-48c6-8de1-077697e062d6\">won\u2019t function<\/a>. Equipment and supplies will <a href=\"https:\/\/www.overdriveonline.com\/electronic-logging-devices\/article\/14893028\/hacking-trucks-cybersecurity-and-the-eld-mandate\">arrive late<\/a> or not at all.<\/p>\n<\/div>\n<div class=\"core-block\">\n<p>Our military systems are <a href=\"https:\/\/www.wired.com\/story\/dire-possibility-cyberattacks-weapons-systems\/\">vulnerable<\/a>. We need to face that reality by halting the purchase of insecure weapons and support systems and by incorporating the realities of offensive cyberattacks into our military planning.<\/p>\n<\/div>\n<div class=\"core-block\">\n<p>Over the past decade, militaries have established <a href=\"https:\/\/www.cybercom.mil\/\">cyber commands<\/a> and <a href=\"https:\/\/www.washingtonpost.com\/opinions\/2021\/03\/16\/next-world-war-wont-be-anything-like-last-heres-how-us-must-prepare\/\">developed<\/a> <a href=\"https:\/\/www.government.nl\/binaries\/government\/documents\/parliamentary-documents\/2019\/09\/26\/letter-to-the-parliament-on-the-international-legal-order-in-cyberspace\/International+Law+in+the+Cyberdomain+-+Netherlands.pdf\">cyberwar<\/a> <a href=\"https:\/\/blog.lukaszolejnik.com\/french-application-of-international-rules-to-cyberwarfare\/\">doctrine<\/a>. However, much of the current discussion is about offense. Increasing our offensive capabilities without being able to secure them is like having all the best guns in the world, and then storing them in an unlocked, unguarded armory. They just won\u2019t be stolen; they\u2019ll be subverted.<\/p>\n<\/div>\n<div class=\"core-block\">\n<p>During that same period, we\u2019ve seen <a href=\"https:\/\/www.nytimes.com\/2021\/01\/02\/us\/politics\/russian-hacking-government.html\">increasingly<\/a> <a href=\"https:\/\/www.technologyreview.com\/2021\/03\/10\/1020596\/how-chinas-attack-on-microsoft-escalated-into-a-reckless-hacking-spree\/\">brazen<\/a> <a href=\"https:\/\/www.theguardian.com\/world\/2021\/apr\/11\/israel-appears-confirm-cyberattack-iran-nuclear-facility\">cyberattacks<\/a> by <a href=\"https:\/\/www.cfr.org\/blog\/global-consequences-escalating-us-russia-cyber-conflict\">everyone<\/a> from <a href=\"https:\/\/www.cbsnews.com\/news\/colonial-pipeline-ransomware-attack-darkside-criminal-gang\/\">criminals<\/a> to <a href=\"https:\/\/www.newyorker.com\/magazine\/2021\/04\/26\/the-incredible-rise-of-north-koreas-hacking-army\">governments<\/a>. Everything is now a computer, and those computers <a href=\"https:\/\/nymag.com\/intelligencer\/2017\/01\/the-internet-of-things-dangerous-future-bruce-schneier.html\" target=\"_blank\" rel=\"noopener\">are vulnerable<\/a>. Cars, medical devices, power plants, and fuel pipelines have all been targets. Military computers, whether they\u2019re embedded inside weapons systems or on desktops managing the logistics of those weapons systems, are similarly vulnerable. We could see effects as stodgy as making a tank impossible to start up, or sophisticated as retargeting a missile midair.<\/p>\n<\/div>\n<div class=\"core-block\">\n<p>Military software is unlikely to be any more secure than commercial software. Although sensitive military systems rely on domestically manufactured chips as part of the <a href=\"https:\/\/www.dmea.osd.mil\/TrustedIC.aspx\">Trusted Foundry<\/a> program, many military systems contain the same foreign chips and code that commercial systems do: just like everyone around the world uses the same mobile phones, networking equipment, and computer operating systems. For example, there has been <a href=\"https:\/\/www.nytimes.com\/2020\/02\/06\/us\/politics\/barr-5g.html\">serious concern<\/a> over Chinese-made 5G networking equipment that might be used by China to install \u201cback doors\u201d that would allow the equipment to be controlled. This is just one of many risks to our normal civilian computer <a href=\"https:\/\/www.atlanticcouncil.org\/in-depth-research-reports\/report\/broken-trust-lessons-from-sunburst\/\" target=\"_blank\" rel=\"noopener\">supply chains<\/a>. And since military software is vulnerable to the same cyberattacks as commercial software, military supply chains have many of the same risks.<\/p>\n<\/div>\n<div class=\"core-block\">\n<p>This is not speculative. A <a href=\"https:\/\/www.gao.gov\/assets\/gao-19-128.pdf\" target=\"_blank\" rel=\"noopener\">2018 GAO report<\/a> expressed concern regarding the lack of secure and patchable U.S. weapons systems. The report observed that \u201cin operational testing, the [Department of Defense] routinely found mission-critical cyber vulnerabilities in systems that were under development, yet program officials GAO met with believed their systems were secure and discounted some test results as unrealistic.\u201d It\u2019s a similar attitude to corporate executives who believe that they can\u2019t be hacked\u2014and equally naive.<\/p>\n<\/div>\n<div class=\"core-block\">\n<p>An <a href=\"https:\/\/www.gao.gov\/assets\/gao-21-179.pdf\" target=\"_blank\" rel=\"noopener\">updated GAO report<\/a> from earlier this year found some improvements, but the basic problem remained: \u201cDOD is still learning how to contract for cybersecurity in weapon systems, and selected programs we reviewed have struggled to incorporate systems\u2019 cybersecurity requirements into contracts.\u201d While DOD now appears aware of the issue of lack of cybersecurity requirements, they\u2019re still not sure yet how to fix it, and in three of the five cases GAO reviewed, DOD simply chose to not include the requirements at all.<\/p>\n<\/div>\n<div class=\"core-block\">\n<p>Militaries around the world are now exploiting these vulnerabilities in weapons systems to carry out operations. When Israel in 2007 bombed a Syrian nuclear reactor, the raid was preceded by what is believed to have been <a href=\"https:\/\/csis-website-prod.s3.amazonaws.com\/s3fs-public\/legacy_files\/files\/publication\/101001_ieee_insert.pdf\" target=\"_blank\" rel=\"noopener\">a cyber attack<\/a> on Syrian air defenses that resulted in radar screens showing no threat as bombers zoomed overhead. In 2018, a 29-country NATO exercise, <a href=\"https:\/\/www.nato.int\/cps\/en\/natohq\/157833.htm\" target=\"_blank\" rel=\"noopener\">Trident Juncture<\/a>, that included cyberweapons was <a href=\"https:\/\/www.cnn.com\/2018\/11\/14\/politics\/russia-nato-jamming\/index.html\" target=\"_blank\" rel=\"noopener\">disrupted<\/a> by Russian GPS jamming. NATO does try to test cyberweapons outside such exercises, but has limited scope in doing so. In May, Jens Stoltenberg, the NATO secretary-general, <a href=\"https:\/\/www.thetimes.co.uk\/article\/enemy-hackers-target-nato-with-constant-cyberattacks-dj263x2lh\" target=\"_blank\" rel=\"noopener\">said<\/a> that \u201cNATO computer systems are facing almost daily cyberattacks.\u201d<\/p>\n<\/div>\n<div class=\"core-block\">\n<p>The war of the future will not only be about explosions, but will also be about disabling the systems that make armies run. It\u2019s not (solely) that bases will get blown up; it\u2019s that some bases will lose power, data, and communications. It\u2019s not that self-driving trucks will suddenly go mad and begin rolling over friendly soldiers; it\u2019s that they\u2019ll casually roll off roads or into water where they sit, rusting, and in need of repair. It\u2019s not that targeting systems on guns will be retargeted to 1600 Pennsylvania Avenue; it\u2019s that many of them could simply turn off and not turn back on again.<\/p>\n<\/div>\n<div class=\"core-block\">\n<p>So, how do we prepare for this next war? First, militaries need to introduce a little anarchy into their planning. Let\u2019s have wargames where essential systems malfunction or are subverted\u2014not all of the time, but randomly. To help combat siloed military thinking, include some civilians as well. Allow their ideas into the room when predicting potential enemy action. And militaries need to have well-developed backup plans, for when systems are subverted. In Joe Haldeman\u2019s 1975 science-fiction novel <em>The Forever War,<\/em> he postulated a \u201cstasis field\u201d that forced his space marines to rely on nothing more than Roman military technologies, <a href=\"https:\/\/www.google.com\/books\/edition\/Military_institutions_of_Vegetius_in_fiv\/sQlXAAAAcAAJ?hl=en&amp;gbpv=1&amp;dq=inauthor:%22Flavius+VEGETIUS+RENATUS%22&amp;printsec=frontcover\" target=\"_blank\" rel=\"noopener\">like javelins<\/a>. We should be thinking in the same direction.<\/p>\n<\/div>\n<div class=\"core-block\">\n<p>NATO isn\u2019t yet <a href=\"https:\/\/foreignpolicy.com\/2020\/12\/22\/nato-we-want-to-go-to-war-with-you\/\" target=\"_blank\" rel=\"noopener\">allowing<\/a> civilians not employed by NATO or associated military contractors access to their training cyber ranges where vulnerabilities could be discovered and remediated before battlefield deployment. Last year, one of us (Tarah) was listening to a NATO briefing after the end of the <a href=\"https:\/\/shape.nato.int\/news-releases\/exercise-cyber-coalition-2020\" target=\"_blank\" rel=\"noopener\">2020 Cyber Coalition<\/a> exercises, and asked how she and other information security researchers could volunteer to test cyber ranges used to train its cyber incident response force. She was told that including civilians would be a \u201cwelcome thought experiment in the tabletop exercises,\u201d but including them in reality wasn\u2019t considered. There is a rich opportunity for improvement here, providing transparency into where improvements could be made.<\/p>\n<\/div>\n<div class=\"core-block\">\n<p>Second, it\u2019s time to take cybersecurity seriously in military procurement, from weapons systems to logistics and communications contracts. In the three year span from the original 2018 GAO report to this year\u2019s report, cybersecurity audit compliance went from 0% to 40% (those 2 of 5 programs mentioned earlier). We need to get much better. DOD <a href=\"https:\/\/www.csoonline.com\/article\/3535797\/the-cybersecurity-maturity-model-certification-explained-what-defense-contractors-need-to-know.html\" target=\"_blank\" rel=\"noopener\">requires<\/a> that its contractors and suppliers follow the <a href=\"https:\/\/www.acq.osd.mil\/cmmc\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Maturity Model Certification<\/a> process; it should abide by the same standards. Making those standards both more rigorous and mandatory would be an obvious second step.<\/p>\n<\/div>\n<div class=\"core-block\">\n<p>Gone are the days when we can pretend that our technologies will work in the face of a military cyberattack. Securing our systems will make everything we buy more expensive\u2014maybe a lot more expensive. But the alternative is no longer viable.<\/p>\n<\/div>\n<div class=\"core-block\">\n<p>The future of war is cyberwar. If your weapons and systems aren\u2019t secure, don\u2019t even bother bringing them onto the battlefield.<\/p>\n<\/div>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/www.brookings.edu\/techstream\/hacked-drones-and-busted-logistics-are-the-cyber-future-of-warfare\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.brookings.edu<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Los escenarios de conflicto del siglo XXI incluir\u00e1n operaciones de Ciberguerra en las cuales, las plataformas de armas y de apoyo ser\u00e1n atacadas. Los sistemas&hellip; <\/p>\n","protected":false},"author":1,"featured_media":7937,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/7936"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7936"}],"version-history":[{"count":2,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/7936\/revisions"}],"predecessor-version":[{"id":7939,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/7936\/revisions\/7939"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/7937"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7936"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7936"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7936"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}