We are constantly made to believe that the world
around us is a safe place to live in. Internet is now at the helm of this
technology driven modern world where supremacy is the solo aim of every
superpower that exists on the world map. Cold Wars have a strong hand in the
history of global superpower rivalries. With time, the way of fighting Cold
Wars kept changing. From plotting secret spies in rival's internal forces to
secretly stealing their rival's confidential information, Cyber Cold Wars involved
everything. In today's world, Cyber Cold War has found a new weapon, the
digital world. Yes, major security companies would straight away deny the
claims of an ongoing Cyber Cold War but the truth clearly denies all their
claims. The entire world is staring at the ugliest aspect of digitalisation.
After reviewing NATO assessments of Russian hacking
operations and speaking to dozens of computer security professionals around the
world, CNNMoney had enough audacity to declare that the cold war has moved
online. However, many vendors still manage to woo a majority of people into
believing that their product is good enough to keep them safe from all the
aspects of a Cyber Cold War. They generate millions of revenue by taking
advantage of people who are hardly aware of even the basic terminologies associated
with understanding the current Cyber Cold War.
To understand whether or not we are in a state of
Cyber Cold War, we first need to understand the basics associated with it. Once
we get well acquainted with the basics, we can easily understand of what effect
it will have on us and what measures can take to minimise those effects. Here
are a few of the top basic terms one needs to understand to get a clear answer
on the current state of Cyber Cold War.
Information Operation
In simple words, Information Operation or IO is
defined as a set of well defined actions taken to hack into or affect someone's
adversary information or entire information system while hiding one's own
information. As per the definition in Joint Publication 3-13, IO is described as
the "Integrated employment of the core capabilities of Electronic Warfare
(EW), Computer Network Operations (CNO), Psychological Operations (PSYOP),
Military Deception (MIDEC), and Operations Security (OPSEC), in concert with
specified supporting and related capabilities, to influence, disrupt, corrupt
or usurp adversarial human and automated decision making while protecting our
own." This implies that the Information Operations have five key aspects,
Electronic Warfare (EW), Computer Network Operations (CNO), Military Deception
(MIDEC), Psychological Operations (PSYOP), and Operation Security (OPSEC). An
understanding of these five aspects is good enough to understand the entire
concept of Information Operations (IO). Here is a little briefer about what each
one of them means and how they are actually executed.
1. Electronic Warfare
Electronic Warfare can be any action that involves
the usage of electromagnetic spectrum or directed energy to control the
spectrum, attack an enemy, or impede enemy attacks via the spectrum. The main
intent of Electronic Warfare is gain control of the Electromagnetic Spectrum
before the enemy does and thereby deny the enemy from taking any sort of
advantage from it. The targets for EW can include anything from communication, radar,
to any other services and can be executed via air, sea, land, or space. EW has
three further subdivision; Electronic Attack (EA), Electronic Protection (EP)
or Defence, and Electronic Warfare Support (ES). The use EM has gradually
become universal in military operations, which has prompted EW to become a part
of every aspect of the IO. As of now, an Electronic Warfare Coordination Cell
has been established to ensure no country takes any advantage. A Joint
Restricted Frequency List (JRFL) is also enlisted to specify protected,
guarded, and taboo frequencies that should not normally be disrupted without
prior coordination and planning. Equipment methods and tactics of EW are the
EC-130E Airborne Battlefield Command and Control Center (ABCCC), The EC-130E
Commando Solo, The EC-130J Commando Solo, and The EC-130Q Hercules TACAMO
("Take Charge and Move Out").
2. Computer Network Operations
Another one of the IO Core Capabilities, the CNO
involves the detection of computer system vulnerabilities and thereby attacking
those vulnerabilities of the opponents and defending those of their own through
various developed computer technologies. With a rise in the usage of computer
technology in most of the military forces across the globe, the significance of
Computer Network Operations in IO has increased significantly. That rise also
makes space for new vulnerabilities to develop in the computer systems which
prompts the forces to identify and attack the computer systems of opponents and
while defending their own systems. This also includes three subdivisions; 1.
Computer Network Attack (CNA), 2. Computer Network Defence (CND), and 3.
Computer Network Exploitation. Identifying the vulnerabilities and weaknesses
of rival's computer systems and attacking the same to hijack their confidential
information and computer system comes under the Computer Network Attack (CNA).
The Computer Network Defence (CND) includes the process of identifying the
weaknesses of one's own computer systems and implying measures to ensure that
those weaknesses do not allow the enemy forces to breach into their systems.
Using computer networks to gather data from the target or adversary automated
computer system or network by enabling operations and intelligence collection
capabilities is included in the Computer Network Exploitation (CNE) section.
Stuxnet and Suter are two of the most popular equipment methods of the Computer
Network Operations (CNO).
3. Psychological Operations
PSYOP is one of the longest aspects of the IO and
plays a key role in achievement of the IO objectives in favour of the Joint
Force Command (JFC). PSYOP can be conducted at the tactical level which can
have large scale strategic effects. Thus, the usage PSYOP involves a lengthy
approval process that considers the time taken to design, develop, and execute
every stage of the PSYOPs. Timely execution of each step is a compulsion and
thus planning out the entire execution strategy is a basic essential of PSYOPs.
PSYOPs execution may also get revised if their are any minor/major error that
are needed to be rectified before moving forward. Hence, the JFC needs to start
developing the PSYOP well before time to make sure it gets completed on time.
The effectiveness of PSYOP depends on the knowledge of the personnel about the
language and culture of the TA. With the rise in usage of Internet, the PSYOP
methodology has shifted from the conventional printed copies to facsimile
messaging, text messaging and other emerging media. Most often, PSYOP is
planned to influence the emotions of a selected population by conveying
selected information and indicators to them. Its target can vary from a foreign
individual to a foreign government. PSYOP is more like phishing on an extra
large scale. Special Operation Media Systems - B (SOMS-B) is one example of
proper PSYOP execution.
4. Military Deception
As the name suggests, Military Deception involves
actions that are aimed to deceive the foreign adversary information system
operators to make them perform actions that can help them accomplish their
respective mission. MILDEC and OPSEC go hand in hand. While MILDEC provides
false information to make the adversary system operator perform false analysis,
OPSEC ensures that the real information doesn't reaches the adversary system
operator. This is one aspect of IO that involves high usage of intelligence and
proper planning and execution. The MILDEC planners must ensure that they
firstly do not fall in someone else's trap while laying out their own plan.
Secondly, they should solidly compete for getting the resources required for
deception as well as for the real operation. Thus, it becomes necessary for the
planners to develop the deception plan simultaneously with the real operation.
It is more efficient and effective to come up with a false purpose for the real
activity than actually creating an entirely fake activity. If the activity
remains real, the adversary operators will be less susceptible about it. MILDEC
planners are bound to understand how the adversary commander and supporting
staff think and plan and execute their plan. For instance, MILDEC planners can
come up with a message that can fuel a rivalry between two key decision makers
in the adversary staff. This will prompt the adversary board to plan a course
of action and adopt a position that is more favourable for their opponents.
5. Operation Security (OPSEC)
OPSEC plays a key role in IO by denying the
adversary system of the real information required to correctly assess
friendly capabilities and intentions. It, along with MILDEC, ensures that the
adversary is misled to make decisions that are more favourable for the OPSEC
planners. Apart from that, OPSEC also ensures that friendly capabilities are
not compromised while exploiting the new opportunities and vulnerabilities such
as the EW and CNO. For OPSEC to be effective, it is necessary for other types
of security to compliment it. These include IA Programs, Computer Network Defence
(CND), Physical Security, and Personnel Programmes that screen personnel and
limit authorised access. What usually happens is information gets leaked,
stolen, or hacked by the opponents which they can manipulate without the
knowledge of adversary making the adversary believe the manipulated information
to be the tea one. Military personnel may post photos on social media platforms
or on their blogs which can allow the enemy's planners to identify the location
of the personnel thereby determining the movement of the entire troop.
Geo-tagging is the biggest threat that can lead to such a breach in the OPSEC.
Cyber Crime is on the rise and the Cyber Cold War
is an evidence of its rise on a much more effective global scale. Information
that we may not consider important is important to intelligence personnel from
other countries. It is highly necessary to keep secure from all the cyber
security threats to ensure we remain unaffected by the effects of a Cyber Cold
War. For that to happen, the first thing that is supposed to be done is
spreading cyber crime awareness amongst the masses. The above explanation is
good enough to understand how and why the cyber cold war can involve us and how
we can keep ourselves protected from it.
About Indian Cyber Army
Indian Cyber Army aims at making the Cyber world a better place, if not entirely safe,
for everyone who uses it for the good. ICA's team of proficient ethical hackers
and cyber crime experts keeps conducting seminars and workshops to spread cyber
crime awareness amongst students, individuals, businesses, organizations, and
other institutes. A dedicated panel of experts are available 24x7 for helping
out people falling victim to any cyber crime through their
cyber crime helpline number. In case you come up with any query or need any
more information regarding the effects of a cyber cold war or any other cyber
information, do reach out to us through the cyber crime helpline number displayed at the bottom of every page on ICA's official website.