5
Laws of Cyber Warfare Alan Svejk Cyber Warfare Defensive Countermeasures Counter-PSYOPS, Counter-Propaganda, Counter-Slander Online Reputation protection, Counter-Oppression (Social Media) Counter-Social Engineering, Counter-Honey traps, Counter-Surveillance Information Security (INFOSEC), Frauds prevention, Crisis Management Counter-Infiltration, Counter-Extortion, Counter-Urban Mining Page 1 Laws of Cyber Warfare by Alan Svejk

Laws of Cyber Warfare by Alan Svejk

Embed Size (px)

DESCRIPTION

How can you protect your world and the future, facing new security threats in cyber space? The realm of Cyber Warfare combines several sciences together: Military, Psychology and Technology. Meet a new branch of knowledge. Read about a most unusual experiment.

Citation preview

Page 1: Laws of Cyber Warfare by Alan Svejk

Laws of Cyber WarfareAlan Svejk

Cyber WarfareDefensive Countermeasures

Counter-PSYOPS, Counter-Propaganda, Counter-SlanderOnline Reputation protection, Counter-Oppression (Social Media)

Counter-Social Engineering, Counter-Honey traps, Counter-SurveillanceInformation Security (INFOSEC), Frauds prevention, Crisis Management

Counter-Infiltration, Counter-Extortion, Counter-Urban Mining

Page 1 Laws of Cyber Warfare by Alan Svejk

Page 2: Laws of Cyber Warfare by Alan Svejk

ALAN SVEJK PUBLIC RELATIONSCreate Persuade Influence★ ★

Special Media Operations PSYOPS INFOOPS SPECOPS★ ★

Public Relations Public Affairs Civil Affairs★ ★https://www.linkedin.com/in/alansvejk

Laws of Cyber Warfare by Alan Svejk

How can you protect your world and the future, facing new security threats in cyber space? The realmof Cyber Warfare combines several sciences together: Military, Psychology and Technology. Meet anew branch of knowledge. Read about a most unusual experiment.

Law 1: Remember, you are weak, the adversary strong

There was a time, when many young men entered the Army, even mandatorily, to gain basicmilitary skills, and they were prepared for a service to protect their national values of free-dom and sovereignity for their whole life. Armies exist to this day, and military art is still tea-ched - but the world changed substantially, and the importance of ground forces is decreasing,in favor of cyber warfare. Almost any part of modern military is now connected withelectronics, networks, computers and processors. Every day, every minute, the IT in the mi-litary penetrates deeper and deeper, and so grows its importance.

Future wars will be fought with steadily decreased human participation on the battlefield.Have a look at wide use of UAVs (drones) today already - both opposite sides will want toavoid human casualties, because it looks badly in the news. Moreover, it seems advantageousto use technology, instead of humans with limited abilities.

But there is no general conscription to gain basic cyber warfare skills. For example, manypeople can use physical arms - but how many of them are able to efficiently protect their dataenvironment, or even hack a device, surpass an electronic protection? "Jailbreak" their iPho-ne? How many of this advanced users do you know? If you don´t work for a IT company,probably little. And these men and women can´t help to defend their companies and countriesin a case of emergency.

The result is disturbing: whole countries are insufficiently prepared for uncertain future,filled with these cyber threats. And the same applies for companies. Of course, there are ITdepartments with skilled operators in every company. But if a CEO or boss has no concept,knowledge and understanding of the issue, his "soldiers" will never be as efficient as theycould be, and vast money spent for cyber security will partially wane.

Law 2: Respect and know your adversary, like a friend

Your employees work only for money, it is their motivation, and they often care only a littleabout the happiness of their company. But the opposite side is completely different: they arethe elite volunteers. Intellectual, ingenious, talented, determined, loving their work, extreme-

Page 2 Laws of Cyber Warfare by Alan Svejk

Page 3: Laws of Cyber Warfare by Alan Svejk

ly skilled. They are the most dangerous adversaries. They were raised with computers fromthe low age. Their life is in cyber space and they love any challenge.

Nobody has to push them into work. They sit hours and hours in front of their computers,days and nights, voluntarily, just to have work done, just to fulfill themselves. They are wil-ling to work for free, if anything or anybody offers them a fun, a realization, a mission. It istheir world, not ours - let´s admit it. They move through it swiftly and fast, with perfectknowledge of any corners, they move in the light. We just slowly struggle to make basictasks, and we wander around, missing all the critical information and skills.

And imagine, that one day they decide, they are motivated or persuaded, to choose yourcompany as a target. That will be no fun anymore. The media descript this people as foolishyoungsters, but the truth is completely different: they are elite professionals, and it is notwise to underestimate them. You should respect them, if you want to survive on the cyberbattlefield and save your values.

Go out and meet them, know them, familiarize with them, even become friends with them.Learn about their thinking, motivation, values, stances, approach, opinions. You have to lite-rally become one of them, see the world the same way, to see possible security holes, and tocontain any weak spots.

Law 3: Limit your reactions to an attack

Usually, an action is followed by a reaction. But in the cyber warfare, this approach iscompletely wrong and can bring much more damage, than the basic incident. So if an inci-dent occurs, the worst reaction is to fight back.

"Black Flag Operations" existed for centuries, but there is a big difference: to fake a identi-ty today is the simplest task. It is in the best interest of your adversary, to persuade you, thatthe attacker is someone else.

Then, two sides fight each other and weaken themselves, they are distracted, and the originaladversary waits patiently, saving his powers for a surprise offensive, or uses the commotionto another strikes.

To spend time and energy with investigating the culprit and trying to revenge is not only use-less, but also dangerous, because you could manufacture a strong and angry opponent from athird side, if the false evidence was carefully planted and you eat this bait. So there should bea general policy: there is never a culprit, no blame and suspicion.

Nothing happened. Keep control. Don´t get provoked for some rash actions.

Declare to your surroundings, that you will make no counter actions against anybody, thatyou have no assumptions and suspicions, that this was only your mistake and you blame no-body for it. Assure everybody of not attacking back, and keep this word. If everybody wouldkeep this rule, any effectivity of all black flag operations could become history. And we knowwell from the history, how many times these operations started the most terrible conflicts.

Page 3 Laws of Cyber Warfare by Alan Svejk

Page 4: Laws of Cyber Warfare by Alan Svejk

Law 4: Don´t hide behind firewalls, be mobile

Firewalls are like bunkers - they provide the feeling of a false security. But famous theoretistof political power Niccolo Machiavelli said, that these stable defense positions only bring di-sadvantages, and no fortresses should be built.

If you hide behind a walls of a bunker, it becomes your prison. The enemy can choose thetime, direction and way of attack, and you can only wait, worried. Forces should stay mobile.Go out, read articles about Cyber security, meet hackers and be friendly to them.

Adjust your philosophical perception of data, victory and loss, safety and danger. Considerthe value of your data as low as possible, try to imagine their loss in advance, and persuadeyourself that they are not critical for your life. Only the data you don´t have can´t be stealed,only the non-existing data you can´t lose and be damaged of it.

So don´t rely of any alleged protection too much, and search for additional means of protecti-on from unexpected sides. The more unorthodox you will be, the more your defences willhold and you can survive in a hostile cyber environment. And it also brings new perspectiveon things. Think outside the box. No firewall can be 100% - there is always the human factoras a basic security threat.

Law 5: Count with human weakness

The science of "Social Engineering" works quite simply - instead of silent breaking into so-meone´s computer "hard way", you lure the password from the user. So it is a typical exampleof using the soft power, advanced psychology and human weaknesses. The people are easy topersuade and deceive, to do exactly, what an attackers wants.

People will be the weakest link of cyber security always. It is so easy to forget all precauti-ons and make a bad click, or forget the rules and open a bad email attachment. Count withthis weak link in advance.

Law 6: Women as ultimate assets

Believe it or not, but women will be very efficient soldiers in cyber warfare. Why? Becau-se this strange battlefield is mostly non-material. Soft-power plays an important role here,and it means, that psychological, emotional and sensitive matters are critical. Women havethat needed "feel" of things, that sixth sense.

Cyber security is not only a software solution. As you can see, there is also an important partof psychology, for example, for Social Engineering prevention. In a battle between techno-logy and emotions, emotions will always win. Female operators will be the only, capable ofdefeating whole armies of foreign and domestic hackers, including military hackers. Fe-male assets will be feared, and hard to defeat (perhaps just by another women). Properly in-structed female operators are the aces in any cyber defense.

So diverse your IT security teams, and support women in your IT department as much aspossible - with good wages and pleasant work place.

Page 4 Laws of Cyber Warfare by Alan Svejk

Page 5: Laws of Cyber Warfare by Alan Svejk

Law 7: You can always own less

In May 2013, I performed very unusual experiment, and very hard to repeat, if you want tofeel challenged. I know nobody else in the world, who tried something similar, so maybe thisresearch is unique worldwide. This is the first time, I publicly declare the details of thisadvanced "home" psychological operation.

As many people, I owned the big collection of data - photos from my whole life, favorite andrare music, good movies, books, e-mails, school works, my articles, games. Some of this datawas from 2001, when I had the first computer. So you can imagine, how valuable thiscollection was for me, as it would be precious for everybody.

In that time, I was studying the trend of minimalism. It was quite a fashion after the be-ginning of that economic crisis in 2008, but today, it is gone again. So I decided to shrink thisdata, to own less, to carry less burden, less to take care of. I was enthusiastic, that I will sortthings, and I will get rid of unnecessary files.

I was really excited, how the amount of data was lowering. But then, I decided to try so-mething unusual: to delete it all. I mean, completely - to be absent from any personal data. Iwanted to experience that feeling.

So I accomplished it. Voluntarily - it was no accident or hardware failure. It was the matter ofmy will and decision. It was a challenge, to find, what will happen "on the other side".

Well, I am alive. After a year, I naturally have some new data again, but I know I am not ad-dicted to them anymore. I lost everything once, and second time it would be much easier toaccept.

So the lesson is - don´t attach too much to your data, you can live without it. If you are notattached to data, you won´t be damaged from a successful cyber attack.

Conclusion

If you want to keep the safety of your environment, you personally have to become an ITsecurity asset. Be informed, careful, don´t hide behind illusions, discover the power of femaleunique qualities on the cyber battlefield.

The certain way to defeat all threats is to have no data. This quote is important to know, be-cause it provides you an option. And human soul loves options, it helps her to smile again.

With your cyber skills, you contribute also to the national safety and world stability. Thepresent world is challenged by new, most serious security threats, and all of us are now re-sponsible for keeping our countries safe in the upcoming age of cyber warfare.

© Alan Svejk 2014. VIP Affairs Celebs/Models Media PR PSYOPS Propaganda ★ ★ ★ ★ Cyber Warfare Security Military Special Services. ★ ★ ★ ★ www.linkedin.com/in/alansvejk

Page 5 Laws of Cyber Warfare by Alan Svejk