You are on page 1of 3

“Deception and Manoeuvre Warfare utilising Cloud Resources”: Stilianos Vidalis & Olga

Angelopoulou (2013) Deception and Maneuver Warfare Utilizing Cloud Resources,


Information Security Journal

Introduction:

The introduction of control systems and the Web over the last two decades has led to the creation of
a fifth warfare domain called cyberspace. The new field has its own set of different aspects and
obstacles which overlaps substantially all four of the other areas of warfare. The U.S army defines
maneuvers as the willingness of resources to perform operations through the obtaining of strategic
benefits before and during warfare operations. Although this definition refers to cyberspace
behaviors, it is evident that this transparent, seamless, interactive world greatly affects this concept
and an attempt must be taken to recognize and codify these shifts. There is a capture of serious
computational power, the robbed of economic and industrial secrets, the compromising of business
plans and diplomacy talks and the infiltration of the central government and corporate military
systems and resources, all to gain the technological edge of States which initiate such attacks.

Cyber Maneuver:

Cyber Maneuver involves the use of action to intercept, interrupt, refuse, damage, harm or exploit
data and software power to achieve an advantageous position in relation to rivals. Cyberspace
manoeuvre requires adding pressure at different assault and defence locations. This power is the
code for particular purpose written to achieve the goals of the intruder or protector and introduced
by their selection. The cyber maneuver is used to affect the behavior of humans and machines. It is a
contradictory statement up in a particular sense because of the intent of controlling machine
behavior. In describing cyber-maneuver, the properties that create maneuvering in cyberspace
special and the principal aspects of both offensive and defensive maneuvers that have been
developed in this arena so far must be understood. The characteristics of cyber maneuvers are
speed, operational reach, access and control, dynamic evolution, stealth, and limited attribution,
rapid concentration, non-serial and distributed.

Offensive Cyber Operation:

For offensive operations, Cyber Maneuver is the most unique from its film predecessors. Although
the goal is reasonably consistent with the cinematic handling to ensure positional advantages with
respect to an enemy or competitive state, the way to do this differs greatly as maneuvering takes
place at machinery speeds within a virtual structure. The exploitive maneuver, Positional Maneuver,
influencing maneuver are the types of offensive maneuvers. Exploitable Maneuver is the method of
data collection in order to achieve a favorable political, organizational and functional benefit. It is
advanced intelligence gathering at its best, but it makes it a legitimate and harmful form of cyber
maneuver by using this data in carry-on operations. Place maneuver is the mechanism by which the
main physical or conceptual nodes in the data system are identified or manipulated and then used
during subsequent operations. Such nodes could be seen as hubs of severity in the data set, which
would give the perpetrator major benefits and power in the midst of an outbreak of violence, in
general in the event of war or other military operations. Influencing Maneuver is the method of
cyber operations to enter the judgment period of a foe or even impose it into direct or indirect
movement via this decision cycle. The aim is to achieve dominance and control of information and
preserve freedom of movement in the cyberspace. This is a specific type of strategy. Influencing
techniques are also used together with other types of attacks.

Defensive Cyber Operation:

Cyberspace's defensive strategy is usually similar to its cinematical predecessors. Fenceline defenses,
network monitoring, and depth defense are almost perfect in terms of whether performed in
rotational protection or in the digital world of cyberspace and the Deceptive Defense, but they are
somewhat like a firefight. Cyber defense is always seen to be much harder than offensive activities
because it is viewed by the intruder as an asymmetric advantage. Perimeter Defense in Depth,
Moving Target defense, Deceptive Defence, and Counterattack are the types of Defensive cyber
operations. Line Protection is the cyberspace Maginot line and it is very vulnerable to maneuvering,
such as this historical example. Most companies employ line defencing but left their networking
interiors largely undefended without devote resources to protect their infrastructure network with
firewalls, intrusion detection systems, and other security acts. Deep defense is a remediation
technique that tries to reduce the defense weaknesses by also hardening the inside of the system
and the network. Unlike the line defense mentioned above, the Moving Target Defense does not try
to create unbreakable protective rings for attack avoidance and asset security. This method of
defensive maneuver employs strategic techniques to constantly change the features of controlled
structures to make it much harder for an aggressor to locate, track or strike a goal effectively. The
cyberspace comparison to the ambush is a difficult technique. Deception maneuver uses methods
for attracting an intruder to take action that demonstrates his technique or assists the protector in
assigning it. Another type of defensive maneuver is a counterattack, and it is explicitly kinetic.
Whereas the idea of the counterattack is quite simple, it's hard to attribute it and the reality that a
number of incidents derive in broken third party systems. The counterattack attacks are carried out
in cyberspace.

Conclusion:

The theory of maneuver is an important principle in warfare in cyberspace, but when describing the
definition there are many variations to take into account. Data is the cyberspace fighting money. In
cyberspace, the manoeuvre is used to frame and use strength to attack or protect assets, just as
cinematic maneuver utilizes the main terrain of the physical environment. Proper use of digital
operations enables a government to preserve freedom of action inside cyberspace and can bring
society, diplomacy and the military competitive edge. Cyberspace strategies are special to
themselves and are the same as their film predecessors, aimed at an edge over a foe and at taking
this stance as a definitive achievement. The emerging theory of mobility in cyberspaces must,
therefore, be followed in order to ensure the effectiveness of operations in this modern warfare
field.

References:

[1] Joint Publication 3-0: Joint Operations, JP 3-0. Joint Chiefs of Staff, United States Department of
Defense, Washington D.C., 2011, p. III-27.

[2] J. Markoff, “Before the Bunfire, Cyberattacks,” The New York Times, Aug. 12, 2008;
http://www.nytimes.com/2008/08/13/technology/13cyber.html.

[3] J.N. Wasson, “Innovator or Imitator: Napoleon’s Operational Concepts and the Legacies of
Bourcet and Guibert,” SAMS Monograph, School of Advanced Military Studies, Command and
General Staff College, Fort Leavenworth, KS, 1998.

[4] M.J. Lyons, “Napoleon, ‘Stonewall’ Jackson, and Operational Art,” Desaxx – Military History –
Military Art – National Security, Sep. 7, 2010, http://desaxx.blogspot.com/2010/09/napoleon-
stonewall-jackson-and.html.

[5] F. Zachar, “Strategic Maneuver: Defined for the Future Army,” SAMS Monograph, School of
Advanced Military Studies, Command and General Staff College, Fort Leavenworth, KS, 2000;
http://cgsc.cdmhost.com/cdm/singleitem/collection/p4013coll3/id/576/rec/8.

[6] L. Wells II., “Maneuver in the Global Commons – The Cyber Dimension,” SIGNAL Magazine, Dec.
2010; http://www.afcea.org/signal/articles/templates/Signal_Article_Template.asp?
articleid=2472&zoneid=306.

[7] S. Jajodia, A.K. Ghosh, V. Swarup, C. Wang & X.S. Wang, Eds. New York, Springer Science +
Business Media, 2011.

[8] S.W. Korns, “Botnets outmaneuvered,” Armed Forces Journal, Jan. 2009;
http://www.armedforcesjournal.com/2009/01/3801084/.

[9] J.R. Schilling, “Defining Our National Cyberspace Boundaries,” Masters Thesis, National War
College, Washington D.C., 2010.

[10] J.R. Schilling, “Defining Our National Cyberspace Boundaries,” Masters Thesis, National War
College, Washington D.C., 2010.

[11] J.R. Schilling, “Defining Our National Cyberspace Boundaries,” Masters Thesis, National War
College, Washington D.C., 2010.

You might also like