SlideShare a Scribd company logo
Cyber Space: The New-Age Battlefield:
By: AdamKinder
Stuxnet was first identified in June 2010 when it was discovered
spreading beyond its intended target (an uranium enrichment facility in Natanz,
Iran). Symantec noted in August of 2010 that 60% of the infected computers
worldwide were in Iran. Kaspersky Lab concluded that the sophisticated attack
could only have been conducted “with nation-state support”. Over what has been
identified by security professionals as a 5 year spread Stuxnet was able to
damage an estimated total of 2000 programmable logic controllers in Iran’s
Natanz plant causing not only physical damage to Iran’s vital infrastructure but
also causing severe delays in their nuclear research programs.
Targeted attacks like this are more and more common. In some cases, these
targeted attacks are more prevalent and cause more damage than attacks by air,
land, or sea. Yet the cyber-space domain is not considered a battlefield by the
vast majority of states. It is because of attacks like Stuxnet and the potential for
further escalation of these attacks in cyber-space that all states should declare
cyber-space the newest battlefield domain. The urgency of this situation is at a
critical stage. Technology is ever changing and quickly evolving. If we wait any
longer to make this declaration and start creating and enforcing laws governing
the cyber-space domain, we will be forced to wait exponentially longer for those
laws to catch up with the current technological landscape.
In order to define what a domain is, the features of a domain, and the
historical trends for recognizing a new domain I would direct your attention
to "The Information Sphere Domain Increasing Understanding and
Cooperation" by Dr. Patrick D. Allen and Dennis P. Gilbert Jr.
To sum it up for the sake of making my point to those readers who didn’t feel
like clicking the link. The key features an environment needs in order to define
it as a new domain are as follows:
1. Unique capabilities are required to operate in that domain.
2. A domain is not fully encompassed by any other single domain.
3. A shared presence of friendly and opposing capabilities is possible.
4. Control can be exerted.
5. Provides opportunities for synergy.
6. Provides asymmetric opportunities.
Using this as a template and applying it to the cyber space is very simple:
1. Unique capabilities are required to operate in that domain: Cyber-space capabilities are
required to operate in the cyber-space realm. Cyber-space requires unique equipment and
personnel skills to function effectively, accomplish missions, and dominate any enemy
presence. These skills are unique from any of the other domains (air, sea, space, land); in
that, it takes a specialized set of skills in order to conduct operations in this domain. Hackers
require a completely separate skill set from that of pilots, sailors, soldiers or astronauts. As
computer systems and cyber-space evolves the skills of individuals working to both protect
and operate in this domain evolves with it.
2. A domain is not fully encompassed by any other single domain: Cyber-space is not fully
encompassed by any combination of land, sea, air, or space domains. Cyber-space has
capabilities and functions that are meaningful only in its environment.
3. A shared presence of friendly and opposing capabilities is possible: Nearly every
device in the world shares the internet currently. Where devices are not connected to the
internet; they are either connected to a wide area network or other devices attach to them
directly. Due to this shared presence across the domain, there is a constant struggle for
dominance and control in this domain.
4. Control can be exerted: Control in terms of cyber-space can be exerted in many different
ways. Attackers can deny services to states, regions, etc. In addition, attacks can force one
state’s system to come under control of another state unbeknownst to the state being
attacked. Stuxnet was a perfect example of how Iran’s systems could be taken over by an
attacker unbeknownst to the state, and the devastating effect that could have.
5. Provides opportunities for synergy: Cyber-space is already being used in conjunction with
every other domain and vice versa. Gathering information from enemy systems can give
valuable Intel related to wartime operations, and likewise taking out key cyber-space targets
can disrupt the flow of cyber-space intelligence to an enemy state.
6. Provide asymmetric opportunities: Cyber-space capabilities can easily provide an
asymmetric threat against enemy capabilities in other domains. Again, I bring up Stuxnet;
while the attack was made within the cyber-space domain, it did physical damage to their
nuclear programs. Attacks like this can be developed to effect targeting systems, navigation
systems, and space programs just as they were used against Iran’s nuclear program.
When looking at this information it is very easy to see how easy it would
be to define cyber-space as a domain, as well as the newest battlefield. Some
people would argue that defining cyber-space, as a domain will lead to more
attacks and thus have a negative effect to cyber-space as it stands. To that, I say:
While true, there will most likely be an increase to cyber-attacks across the
board and those cyber-attacks will have more collateral damage than what we
are experiencing. We would see that increase regardless of whether or not cyber-
space has been identified as a domain or not. By identifying and defining cyber-
space as a domain where in it is possible to conduct war, we are taking the step
to acknowledge the possibility of and prepare for cyber-warfare. As targeted
attacks have already started, it is time that we declare cyber-space as the new-
age battlefield and start defining the legalities surrounding cyber-warfare before
we become the victims of it.

More Related Content

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 

Cyber Space The New Age Battlefield

  • 1. Cyber Space: The New-Age Battlefield: By: AdamKinder Stuxnet was first identified in June 2010 when it was discovered spreading beyond its intended target (an uranium enrichment facility in Natanz, Iran). Symantec noted in August of 2010 that 60% of the infected computers worldwide were in Iran. Kaspersky Lab concluded that the sophisticated attack could only have been conducted “with nation-state support”. Over what has been identified by security professionals as a 5 year spread Stuxnet was able to damage an estimated total of 2000 programmable logic controllers in Iran’s Natanz plant causing not only physical damage to Iran’s vital infrastructure but also causing severe delays in their nuclear research programs. Targeted attacks like this are more and more common. In some cases, these targeted attacks are more prevalent and cause more damage than attacks by air,
  • 2. land, or sea. Yet the cyber-space domain is not considered a battlefield by the vast majority of states. It is because of attacks like Stuxnet and the potential for further escalation of these attacks in cyber-space that all states should declare cyber-space the newest battlefield domain. The urgency of this situation is at a critical stage. Technology is ever changing and quickly evolving. If we wait any longer to make this declaration and start creating and enforcing laws governing the cyber-space domain, we will be forced to wait exponentially longer for those laws to catch up with the current technological landscape. In order to define what a domain is, the features of a domain, and the historical trends for recognizing a new domain I would direct your attention to "The Information Sphere Domain Increasing Understanding and Cooperation" by Dr. Patrick D. Allen and Dennis P. Gilbert Jr. To sum it up for the sake of making my point to those readers who didn’t feel like clicking the link. The key features an environment needs in order to define it as a new domain are as follows: 1. Unique capabilities are required to operate in that domain. 2. A domain is not fully encompassed by any other single domain. 3. A shared presence of friendly and opposing capabilities is possible. 4. Control can be exerted. 5. Provides opportunities for synergy. 6. Provides asymmetric opportunities. Using this as a template and applying it to the cyber space is very simple: 1. Unique capabilities are required to operate in that domain: Cyber-space capabilities are required to operate in the cyber-space realm. Cyber-space requires unique equipment and personnel skills to function effectively, accomplish missions, and dominate any enemy presence. These skills are unique from any of the other domains (air, sea, space, land); in that, it takes a specialized set of skills in order to conduct operations in this domain. Hackers require a completely separate skill set from that of pilots, sailors, soldiers or astronauts. As computer systems and cyber-space evolves the skills of individuals working to both protect and operate in this domain evolves with it. 2. A domain is not fully encompassed by any other single domain: Cyber-space is not fully encompassed by any combination of land, sea, air, or space domains. Cyber-space has capabilities and functions that are meaningful only in its environment. 3. A shared presence of friendly and opposing capabilities is possible: Nearly every device in the world shares the internet currently. Where devices are not connected to the internet; they are either connected to a wide area network or other devices attach to them directly. Due to this shared presence across the domain, there is a constant struggle for dominance and control in this domain.
  • 3. 4. Control can be exerted: Control in terms of cyber-space can be exerted in many different ways. Attackers can deny services to states, regions, etc. In addition, attacks can force one state’s system to come under control of another state unbeknownst to the state being attacked. Stuxnet was a perfect example of how Iran’s systems could be taken over by an attacker unbeknownst to the state, and the devastating effect that could have. 5. Provides opportunities for synergy: Cyber-space is already being used in conjunction with every other domain and vice versa. Gathering information from enemy systems can give valuable Intel related to wartime operations, and likewise taking out key cyber-space targets can disrupt the flow of cyber-space intelligence to an enemy state. 6. Provide asymmetric opportunities: Cyber-space capabilities can easily provide an asymmetric threat against enemy capabilities in other domains. Again, I bring up Stuxnet; while the attack was made within the cyber-space domain, it did physical damage to their nuclear programs. Attacks like this can be developed to effect targeting systems, navigation systems, and space programs just as they were used against Iran’s nuclear program. When looking at this information it is very easy to see how easy it would be to define cyber-space as a domain, as well as the newest battlefield. Some people would argue that defining cyber-space, as a domain will lead to more attacks and thus have a negative effect to cyber-space as it stands. To that, I say: While true, there will most likely be an increase to cyber-attacks across the board and those cyber-attacks will have more collateral damage than what we are experiencing. We would see that increase regardless of whether or not cyber- space has been identified as a domain or not. By identifying and defining cyber- space as a domain where in it is possible to conduct war, we are taking the step to acknowledge the possibility of and prepare for cyber-warfare. As targeted attacks have already started, it is time that we declare cyber-space as the new- age battlefield and start defining the legalities surrounding cyber-warfare before we become the victims of it.