By William B. Scott*
Warfighting has moved well beyond the realms of land, sea and air, and is now being waged daily in cyberspace. Over the past few decades, military units engaged primarily in computer network defense (CND) have focused on keeping low-level hackers and nation-state bad actors from penetrating critical U.S. systems. Cyber-warriors now cautiously launch limited computer network attacks (CNA), because leaders are concerned about the unintended consequences of offensive cyber operations. For example, what if a cyber attack on a sophisticated hacker cell in North Korea went astray and seriously disrupted or destroyed an ally’s banking system?
Today, U.S. cyberwar methods and capabilities are highly classified, but one can extrapolate from what is known and make some educated guesses. We know that cyber attacks on Iran’s nuclear facilities seriously damaged dozens of centrifuges. Sources imply—but never confirm—that adversaries’ electrical power grids and oil or natural gas pipelines have been disrupted by “cyber” means. Undoubtedly, other cyberwar engagements have been undertaken with results known only to those holding high-level clearances.
If we look farther into the future, what breakthrough technologies might be used to wage cyberwar? As an old fiction-writer, I ask: What if a number of notional weapon systems evolve from high giggle-factor ideas to real-world capabilities? Could the targets of “cyberwar” gravitate from silicon chips and software to synapses, dendrites and other biological systems? These might include:
• Tailored electromagnetic and electrostatic signals or waveforms that disrupt the electrical activity of a human heart. These would enable remotely triggering heart attacks and strokes to literally decapitate the leadership of rogue nations and terrorist cartels. Such a capability was demonstrated in a university laboratory more than 10 years ago.
• Nano-scale “Smart Dust” devices programmed to operate cooperatively. What if super-small “Hunter-Bot” and “Killer-Bot” swarms were scattered from a drone or aircraft, programmed to search for the DNA of a suicide bomber in a specific community? Once Hunters located the bomber’s family via DNA match, “Killer-Bots” would be cleared in hot. If family members were to inhale these invisible ‘bots, the bio-cyber weapons might alter the behavior of a bomber’s wife, children, siblings or parents. Their subsequent shocking actions—considered outrageous and abhorrent to a particular culture— would bring great shame on the suicide bomber’s memory. Or a wannabe suicide bomber might be ‘bot-programmed to leave his explosive vest in the attic and just keep driving the cab, when his handlers give the “GO” order. Thus, Smart Dust could be a powerful cyber tool for deterring terrorist strikes.
• Perhaps the ultimate cyber attack would be inserting false images in a target’s brain. Imagine a battlefield general officer, who thinks he sees an object with his eyes, but the object isn’t really there. It only exists as an image in his brain, an image created by tailored signals that bypass the optic train and are registered directly into a section of the brain processing information transmitted from the eyes.
The target could no longer tell the difference between what’s actually occurring in the real world and what his brain registers as a false image. Instead of two F-35 fighters and a pair of M1A2 tanks attacking his dug-in force, a targeted combat leader might believe he’s seeing hundreds of fighters and armored vehicles attacking. The panicked general thinks he’s facing an overwhelming force and orders a rapid retreat. His troops only see two jets and two tanks, and wonder whether their general is hallucinating or going crazy. That cyber-targeted battlefield commander would quickly lose the confidence of subordinates and cease to be an effective leader.
Such notional cyber weapons might be mere fantasy today, but clearly would be invaluable for creating fear and doubt among enemy forces. Until they manifest as real-world weapons, these concepts might still serve as deterrents, even if they only “manifest” in fictional books, TV shows and movies.
Sounds wild, but history is filled with examples demonstrating the power of fiction and entertainment to shape perceptions that, in turn, affect behavior. Proactively employed as one element of a combined psychological and cyber warfare campaign, fictional stories and movies can sow distrust and fear within an adversary’s forces.
In fact, perception-shaping is adroitly employed in Hollywood to create often-negative impressions of technology, military services, intelligence agencies and national security space operations. Properly structured, these powerful tools could create alternative, highly positive perceptions, as well.
What if some of these notional cyber and psyop weapons and tactics are already fielded? If they are, who is controlling them? And who are the unsuspecting targets?
*William B. Scott is a Senior Fellow at the Economic Warfare Institute. He is the former Rocky Mountain Bureau Chief for Aviation Week & Space Technology magazine, author of The Permit, a techno-thriller novel based on the murder of his eldest son, and coauthor of License to Kill: The Murder of Erik Scott; Space Wars: The First Six Hours of World War III; Counterspace: The Next Hours of World War III, and Inside The Stealth Bomber: The B-2 Story. A Flight Test Engineer graduate of the U.S. Air Force Test Pilot School, he has logged approximately 2,000 flight hours on 81 types of aircraft. He holds a BS degree in Electrical Engineering.
No comments:
Post a Comment