Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Waging cyber war : technical challenges and operational constraints
Oakley J., Apress, New York, NY, 2019. 212 pp. Type: Book (978-1-484249-49-9)
Date Reviewed: May 15 2020

The general population as well as industry and government are largely aware of the cyber threat risks to personal computers (PCs), smartphones, intelligent devices, servers, and networks. Attacks and hackers have hit all of these, exploiting many different weaknesses, including those in the very architecture of the Internet. It is also widely thought that some information technology (IT) tools and procedures offer enough of a defense, only to be proven wrong in reality, demonstrating some level of passivity.

At the same time, few still realize that an attack is often the better preemptive defense, and that such attacks against perpetrators are constrained by a battery of legal, technical, operational, and governance/doctrine rules. Therefore, as Oakley highlights in the first sentence, “there is an awful lot of hype and confusion surrounding the concept of cyber warfare.” The book’s overall goal is to offer some clarity on challenges and operational constraints. It also stresses that if war in the cyber domain is taking (or must take) place, all stakeholders must understand the difficulties and challenges related to such combat.

After an introductory chapter 1, on warfare principles, criteria for a just war, international agreements (or lack thereof), and expectations of protection, the book’s subsequent chapters address, one by one, the main script elements of a possible action. Chapter 2, “Legal Authority,” covers only legal frameworks within US defense and intelligence (Titles 10, 50, and 18 of the US Code) and identifies relevant agencies and a few examples; however, it does not address the prevailing jurisprudence applicable to the private or industrial sphere.

Chapter 3 proposes a refined definition of a cyber warfare action and describes components of cyber exploitation, for example, vulnerability analysis (with a virtual code vulnerability example), intelligence gathering, as well as attack effect analysis. Unfortunately, this chapter does not refer to chapter 5 for complementary techniques. Still, with a military action mindset, chapter 4 surveys cyberattack approaches in general terms: targeting and exploiting a host (at Title 50, then 10, levels), degradation, denial, disrupt, destruct, and manipulate. It also discusses the enemy’s perception levels at each stage.

As discussed in chapter 3, “intelligence gathering does not always rely upon cyber exploitation as an enabler,” but instead uses the established portfolio of intelligence collection approaches. This rather superficial summary ignores other major techniques, such as those related to network traffic analysis and the surveillance of a perpetrator’s internal networks and assets. Chapter 6 pursues an action script with the normal step of attribution, that is, to designate a perpetrator based on combined indicators including (or not) active responses and attributes. It also discusses the embarrassment when attribution is uncertain, or detection uncovers negligence inside one’ own organization.

Targeting, when possible, is the subject of chapter 7 and is aligned with conventional warfare concepts, including rules of engagement. Cyber warfare here is only one of several types of forces, and the chapter does not compare its efficiency with other forces. Chapter 8 is slightly more specific wit regards to access operations, that is, procedures enabling technical measures against the perpetrator’s infrastructure and managing the risks involved. The discussion stays at quite a general level.

As defined in chapter 6, “self-attribution happens when any portion of the attribution process yields an indication of perpetrated cyber activity” or where the attack’s origin has been compromised; this is the subject of operating path choices in chapter 9. As third-party Internet infrastructure resources are often traversed or used due to prevailing network routing strategy, the book uses the term “association” to cover this facet. Chapter 10 discusses incidental ways, obfuscation, distraction, and latent cyber weapons.

Finally, chapter 11 brings up the critical and necessary self-review of resource resilience when conducting cyber warfare, at the tool, infrastructure, and personnel levels. Chapter 12 discusses control and resource ownership. The most interesting chapters (13 and 14) list challenges related to human misconceptions along the chain of command, open cyber warfare, and biological warfare.

The volume provides a good index and a detailed table of contents, but there are neither references nor a bibliography. Oakley, an experienced military cyber warfare operative, provides beginner and intermediate readers with a nontechnical overview, bringing present-day pragmatics to light but only in a government/military context; many conferences have already brought awareness to stakeholders. If it were to be read by industry executives, they would miss all the frameworks and toolsets specific to their sectors, where understanding is weak and belief in vendors too high.

For both audiences, there remains the unaddressed but key top-level decision of how to trade off the principle of a cyberattack against assets at risk and explicit/implicit costs, for which insurance and cost-benefit principles apply. On the technical front, there are many more techniques than those reviewed here, for example, honey pots. A short introduction to Internet architecture and Internet protocol (IP) packets would also benefit readers. The book is recommended for any beginner who wants to get a feel for the complexity of cyber warfare as well as identify what is specific to her/his case.

More reviews about this item: Amazon

Reviewer:  Prof. L.-F. Pau, CBS Review #: CR146970 (2011-0263)
Bookmark and Share
  Reviewer Selected
 
 
Military (J.1 ... )
 
 
Governmental Issues (K.5.2 )
 
 
General (J.0 )
 
Would you recommend this review?
yes
no
Other reviews under "Military": Date
The special problems of military systems
Kershaw J. Microprocessors & Microsystems 17(1): 25-30, 1993. Type: Article
May 1 1994
Strategic appraisal
Khalilzad Z., White J., RAND, Santa Monica, CA, 1999. Type: Book (9780833026637)
Aug 1 1999
Making intelligence smarter
Zorpette G. IEEE Spectrum 39(1): 38-43, 2002. Type: Article
Jan 23 2003
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy