Information Warfare: Too Big To Defend

Archives

March 28, 2012:  Over the last decade the U.S. Department of Defense has become aware of elaborate Chinese plans to use Internet based attacks to support more conventional military operations. This awareness initially elicited incredulity, followed by fear, which led to a more detailed investigation of the situation. Now there are attempts to deal with the problem.

The problem is huge and more dangerous than anyone initially believed. The basic problem is that the U.S. military embraced the Internet early and has by now become one of the heaviest users on the planet. With millions of users, over a million devices connected to the Internet, and over 10,000 separate networks, the Department of Defense is also one of the most difficult Internet targets to defend. With so much exposure, and not enough money to install (and manage) adequate security, the Department of Defense has been searching for the most efficient strategy to deal with expected Chinese attacks.

This has led to studies of what kind of damage the Chinese could do and how best to cope with it. This sort of thing involves finding out what operations could be shut down (and for how long) and what impact this would have on military operations. The most vulnerable operations involve logistics. This covers everything from handling requests for spare parts, ammo, and fuel as well as requests for specialized maintenance services and control of aircraft and ships moving supplies.

Having fallback plans (or "Plan B") ready beforehand is much more effective than scrambling to cope right after your Internet systems have been interrupted or corrupted. In effect, the Department of Defense is getting into wargaming possible Internet based attacks, including working out what you do if the defenses, such as they are, don't work. This also involves non-military systems used by companies that provide logistics services (goods, transportation, and management) for the Department of Defense. At the moment, it appears that the U.S. Department of Defense computer systems are too vast to defend and that the best strategy is to figure out how to recover from the inevitable damage.

 

 


Article Archive

Information Warfare: Current 2022 2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001 2000 1999 


X

ad
0
20

Help Keep Us Soaring

We need your help! Our subscription base has slowly been dwindling. We need your help in reversing that trend. We would like to add 20 new subscribers this month.

Each month we count on your subscriptions or contributions. You can support us in the following ways:

  1. Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on Twitter.
  2. Subscribe to our daily newsletter. We’ll send the news to your email box, and you don’t have to come to the site unless you want to read columns or see photos.
  3. You can contribute to the health of StrategyPage. A contribution is not a donation that you can deduct at tax time, but a form of crowdfunding. We store none of your information when you contribute..
Subscribe   Contribute   Close