From the Blogosphere
Asymmetric Warfare Includes Cyberwarfare By @JamesCarlini | @CloudExpo #Cloud
Are your enterprise’s clouds resilient to Cyber Storms? Or are they susceptible to a Cyber-Tsunami of hostile transactions?
By: James Carlini
Apr. 13, 2016 05:15 PM
This is an excerpt of some concepts from his upcoming book, Nanokrieg: Beyond Blitzkrieg, a book covering the changes in Military Infrastructure, Strategies and Tactics needed to win the War on Terrorism. It includes chapters on cyberterrorism and cyberwarfare.
With the latest terrorist occurrences in Brussels, Belgium, and Paris, France, on hard targets, we tend to equate terrorism with overt acts of small groups in shootings, stabbings, and bombings of people in order to disrupt their day-to-day lives and create fear in a region's economy.
This is referred to as "asymmetrical warfare", where one enemy has a totally different level of resources and personnel to apply. Both sides are not equal in strength, but the weaker enemy makes up for it with non-traditional and guerilla warfare tactics to defeat and demoralize their enemy.
Iron-Clad Clouds Are a Must in Today's Terrorist Environment
Most enterprise clouds and their platforms are not resistant to mass cyberattacks. Is your company's enterprise network a Digital Alamo environment waiting to happen with its administrators not even aware of all its vulnerabilities?
If you are using a third-party cloud service, are they as secure as their glossy brochures claim their services to be?
As warfare, strategies, and tactics were being redefined as World War II was coming to an end, tactics for large military components were being redeveloped and shifted to smaller, less-equipped units. Resources and available manpower were dwindling. You had to do more with less as far as personnel and resources.
As the war started to end in 1945, some in Germany did not want to give up and, instead, wanted to keep the war and the Third Reich going. One of the key people in developing a new type of warfare for Germany at the end of the war was Otto Skorzeny, a Nazi SS officer who did some very high-level work leading commando-type raids as well as developing a new style of warfare.
"You cannot waste time on feinting and sidestepping. You must decide on your target and go in."
Skorzeny made headlines and another promotion when he led a group of well-trained German commandos in Operation Eiche (Operation Oak) to rescue Benito Mussolini in 1943 from a prison in Italy. Skorzeny was one of Hitler's "go-to" men on dangerous and difficult assignments and with the success of this rescue raid, he got promoted to Sturmbannfuhrer (Major) as well as being awarded the Knight's Cross of the Iron Cross.
As to developing a strategy for asymmetrical warfare where there is a real disparity between a traditional standing army and a terrorist insurgency group, Skorzeny had a plan.
Nazi "Werwolf Tactics Forerunner to Al Qaeda Tactics
This type of warfare is hard to counter because the opposing soldiers are not in a traditional military uniform. Nor are they working in a structured environment. It is more of a commando type or covert operations approach to warfare and is seen in contemporary terrorist groups like cells of ISIS.
Going back to when Skorzeny was perfecting these new ideas, a lack of full resources as well as highly trained personnel dictated a new approach to waging war and being creative with insurgency tactics.
The trail of training guerilla warfare and tactics may have started in Germany at the end of World War II, but it moved forward into Egypt, South America, and even into the United States after the war with Skorzeny as a paid consultant. Eventually, it spread into Al Qaeda through the efforts of Skorzeny and his subordinates with Yasser Arafat. Skorzeny was, in effect, a consultant for hire to whoever wanted his new tactical ideas including the United States Special Forces.
In recent years, this type of asymmetrical warfare has bled into the whole area of computers, data centers, and internet infrastructures. It raises the question of where should we be spending money on national defenses to fight the War on Terrorism? Do we buy more $1 billion air superiority fighters or develop new cyber-security tools, monitors, and counter-weapons?
Asymmetrical warfare that was born in the last days of the Third Reich, spread into the Middle East in the early Post-War Days and later meetings of Otto Skorzeny and Yasser Arafat. Now, cyberwarfare has grown out of this guerilla warfare approach.
—James Carlini, 2016
Carlini will be the Keynote Speaker on Intelligent Infrastructure & Cybersecurity at the CABA Intelligent Buildings and Digital Homes Forum in San Diego on April 26.
Carlini's book will be out at the end of this year. His current book, LOCATION LOCATION CONNECTIVITY is available on AMAZON
Copyright © 2016 - James Carlini, All Rights Reserved
Reader Feedback: Page 1 of 1
Latest Cloud Developer Stories
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
SYS-CON Featured Whitepapers
Most Read This Week