{"id":9878,"date":"2022-05-05T08:24:12","date_gmt":"2022-05-05T11:24:12","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=9878"},"modified":"2022-05-05T08:24:12","modified_gmt":"2022-05-05T11:24:12","slug":"los-ciberataques-no-ganan-guerras","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=9878","title":{"rendered":"Los ciberataques &#8220;no ganan guerras&#8221;"},"content":{"rendered":"<p>A medida que la guerra de Rusia contra Ucrania entra en una nueva fase, los pa\u00edses occidentales est\u00e1n en alerta m\u00e1xima por los posibles ciberataques por parte de Rusia . Sin embargo, aunque Mosc\u00fa es capaz de desencadenar una perturbaci\u00f3n y un da\u00f1o considerables a trav\u00e9s de la ciberesfera contra Ucrania y sus adversarios occidentales, no hay evidencia que sugiera que las capacidades cibern\u00e9ticas actuales, como las que posee cualquier estado, puedan ganar guerras. Rusia ha desarrollado sus capacidades cibern\u00e9ticas durante d\u00e9cadas, empleando gran cantidad de matem\u00e1ticos y f\u00edsicos de alta calidad. Solo se necesitan de 20 a 30 ciberatacantes de alto nivel para desarrollar capacidades de ciberataque persistentes y avanzadas. Rusia tiene una tradici\u00f3n de hacer esto bien, adem\u00e1s de sobresalir en los campos relacionados de inteligencia de se\u00f1ales, encriptaci\u00f3n e inteligencia electr\u00f3nica.<\/p>\n<hr \/>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">As\u00a0<a href=\"https:\/\/www.militarytimes.com\/flashpoints\/ukraine\/\" target=\"_blank\" rel=\"noopener\">Russia\u2019s war on Ukraine<\/a>\u00a0enters a new phase, Western countries are on heightened alert for\u00a0<a href=\"https:\/\/www.c4isrnet.com\/cyber\/2022\/03\/30\/russian-efforts-in-ukraine-have-not-yet-spilled-over-into-cyberattacks-on-us-says-lawmaker\/\" target=\"_blank\" rel=\"noopener\">Russian state-sponsored hacking attacks<\/a>. Yet, while Moscow is capable of unleashing considerable disruption and damage through the cybersphere against Ukraine and its Western adversaries, there is no evidence to suggest that current cyber capabilities, as possessed by any state, can win wars.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">Russia has developed its cyber capabilities over decades, using its large concentration of high-quality mathematicians and physicists. It only takes 20 to 30 top-level cyberattackers to build up advanced, persistent cyberattack capabilities. Russia has a tradition of doing this well \u2014 as well as it excels in the related fields of signals intelligence, encryption, and electronic intelligence.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">The Russian private cyber sector is also well known around the world. The cyber capabilities of the Russian military feature one of the most advanced technological arrays of its kind. The Ukrainians are also good at cyberwarfare, due to their access to high-quality, advanced personnel, who have been \u201cleased\u201d by companies all over the world in recent years.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">And yet, despite the above, the war in Ukraine has made clear a simple fact: Cyberwarfare won\u2019t decide the conflict.\u00a0<a href=\"https:\/\/www.cfr.org\/blog\/tracking-cyber-operations-and-actors-russia-ukraine-war\" target=\"_blank\" rel=\"noopener\">Russia\u2019s less-than-sweeping achievements<\/a>\u00a0on this front may have helped encourage it to rely increasingly on devastating conventional firepower.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">It is important to address what cyber domain activities can do during a war. During Russia\u2019s 2008 war with Georgia, the Russians\u00a0<a href=\"https:\/\/www.nytimes.com\/2008\/08\/13\/technology\/13cyber.html\" target=\"_blank\" rel=\"noopener\">disrupted their adversary\u2019s ability to function<\/a>\u00a0by attacking communications systems. These systems can be blocked, but when an attacker does this, they are also blocking their own intelligence units\u2019 ability to eavesdrop on the enemy, which can no longer communicate.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">This represents a fixed dilemma when it comes to cyberattacks on communications systems. It is usually resolved by finding a balance \u2014 through the right \u201cdosage\u201d between cyberattacks and eavesdropping \u2014 to avoid harming the interests of those initiating the attack.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">Other targets for cyberwarfare during conflicts are a state\u2019s critical infrastructure, such as electricity networks and other sensitive core systems. Harming these targets disrupts the enemy\u2019s ability to function and supply itself.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">Transport forms another attractive target in the cyber domain. The\u00a0<a href=\"https:\/\/www.militarytimes.com\/flashpoints\/ukraine\/2022\/02\/27\/russian-military-convoy-traveling-toward-kyiv-satellite-images-show\/\" target=\"_blank\" rel=\"noopener\">long Russian military convoys<\/a>\u00a0traveling great distances in Ukraine could form a cyber target, particularly when it comes to vehicles built in the past 20 years, which have many computers onboard. Modern vehicles come with 30 to 40 computers onboard, making them highly vulnerable to cyber disruption, which in turn can significantly damage an adversary.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">During wartime, states are more likely to activate state-level attacks, which require deeper technological, analytical and research capabilities than those possessed by ordinary groups of hackers. And yet the conflict in Europe demonstrates that the ability of militaries to conduct ground maneuvers remains the most influential factor in deciding the outcome of wars. Cyberattacks can disrupt and harm, but alone, they cannot win, much like an air force cannot win a war by itself, although it can play a significant role. Ultimately, even in 2022, boots on the ground are what decides armed conflicts.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">There is a substantial difference between pulling a trigger and pushing \u201cEnter.\u201d Without the trigger, concepts of battlefield victory remain disconnected from reality. The Ukraine war has taught us that wars for territory are not a thing of the past.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">One of the key lessons from the Russian invasion of Ukraine for other militaries is to not abandon land-maneuvering capabilities in favor of investing too much in technology. Both abilities are needed, but not at the expense of one or the other.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">The fact of the matter is that until today, we have not seen dramatic, historic, game-changing use of cyberwarfare. No cyberattacks have sparked comparisons with the 1917 deployment of tanks by the British Army at the\u00a0<a href=\"https:\/\/www.history.com\/this-day-in-history\/tanks-introduced-into-warfare-at-the-somme\" target=\"_blank\" rel=\"noopener\">Battle of the Somme in World War I<\/a>, or the appearance of fighter jets in 20th century combat decades later.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">Rather, the cybersphere has become an additional domain together with another new domain: space. These have joined the three traditional domains of land, air and sea. Each domain requires intelligent use of tool kits, and a suitable command structure, to prove effective.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">Just as there are no easy wars, there is no easy cyberattack solution that shuts down an enemy overnight.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">When it comes to the West, heightened alert and readiness are certainly necessary at this time. Russian cyberattacks can target banks, hospitals and other key civilian infrastructures. But simple, basic preventative actions can solve some 70% of these problems. Basic steps, like changing passwords and software, can create real hurdles for attackers. This is particularly true if a large number of defenders change their passwords and software at the same time.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">Another key lesson rapidly emerging from the war in Europe is the centrality of the\u00a0<a href=\"https:\/\/www.c4isrnet.com\/information-warfare\/\" target=\"_blank\" rel=\"noopener\">cognitive struggle<\/a>\u00a0\u2014 or as it is more commonly known, psychological warfare. Such campaigns have very significant value in war and are easier than ever to conduct today in the\u00a0<a href=\"https:\/\/www.c4isrnet.com\/information-warfare\/2022\/01\/28\/us-tries-to-name-and-shame-russian-disinformation-on-ukraine\/\" target=\"_blank\" rel=\"noopener\">digital age<\/a>\u00a0of social media networks.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">As a result, many units from Russia and Ukraine are engaged in this struggle. It is a parallel effort to the cyber campaigns currently raging. Its significance on the battlefield, on the motivation of soldiers and the understanding of each side of the general picture should not be underestimated.<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/www.c4isrnet.com\/opinion\/commentary\/2022\/04\/13\/cyberattacks-dont-win-wars\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.c4isrnet.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A medida que la guerra de Rusia contra Ucrania entra en una nueva fase, los pa\u00edses occidentales est\u00e1n en alerta m\u00e1xima por los posibles ciberataques&hellip; <\/p>\n","protected":false},"author":1,"featured_media":9879,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/9878"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9878"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/9878\/revisions"}],"predecessor-version":[{"id":9880,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/9878\/revisions\/9880"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/9879"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9878"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9878"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}