Information Technology Reference
In-Depth Information
and not only that, demonstrates that developing countries usually very quickly accustom
to brand names and we do not see any reason why this tendency should vanish from the
face of the earth in the near future.
The next unexpected, all in all, sub-section of the second period is connected with
new investigations of the next generation of cyberwar-oriented technologies, which can
be launched by any States on the base of off-the-shelf cyberwar-oriented technologies
and systems as we already emphasized above. These new technologies and systems in
any case will be the object of activities from the side of the secret services. And as the
guru Sun Tzu 7 has previously notified us - this is forever. That is why a next sub-section
arises, completing the second period by the second point of inflection which gives a
signal to States that it is time to substitute the current cyberwar policy naturally, after an
intensive study of results and perspectives of new R&D.
Indeed, as we have emphasized previously, if cyberwar systems already exist, then,
sooner or later, they will be represented in the market, and we are eyewitnesses to some
signs of the beginning of this period. For examples, there are projects by DARPA such as
PAL (enduring personalized cognitive assistant) or LifeLog, as well as the 'top-secret'
networks such as NIPRNET, SIPRNET and JWICS. All these systems are very
expensive; therefore the costs of these projects in the absence of real wars have to be
justified.
But, by and large, other results will be suggested in the cyberwar market such as
military-oriented networks with a dynamic topology (MIPMANET) or ad hoc
networks 22 . For example, in contrast to the IP-networks with infrastructure, such as
Internet, in the ad hoc networks or networks like MIPMANET, mobile nodes are
connected dynamically and play the role of routers. The military networks will
necessarily use the concept of networks without infrastructure and are using them now,
because when the existing communication infrastructure is under deliberate cyberattack,
the networks without fixed infrastructure are the only way out. Obviously, all these new
kinds of networks will be considered as cybertargets too and will be used as a subject of
the control superiority threat, sometime in the future.
That is why we want to emphasize that cyberwars will, most likely, be deployed as
business cyberwars, and, in this way, the retirees of military forces or the secret services
will play a very important role in business companies in the future.
Special information operations may include computer network attack. JP 3-13 2
When you hold a hammer, all around becomes like a nail. Proverb
6. IO UNDER CONSTRUCTION
The core of cyberwar is a system of information operations. Let us analyze ways of
enlargement of the IO set and their influence on the substance of cyberwar. The 'Joint
Vision 2020' interprets IO as actions that are 'taken in a noncombat or ambiguous
situation to protect one's own information and information systems as well as those taken
to influence target information and information systems'. However our objective of
representing instrumental correcting of cyberwar requires further clarification of the IO.
It is well known that 90 percent of cyberattacks use known security flaws for which a
solution is available, but people do not fix these flaws as knowledge of them and how to
fix them is not widely shared; tools to measure whether they have been fixed have not
been widely available. No doubt this statement has no relevance to specialists in the
Search WWH ::




Custom Search