Welcome!

@CloudExpo Authors: Pat Romanski, Rostyslav Demush, Elizabeth White, Automic Blog, Liz McMillan

Related Topics: @CloudExpo, Cloud Security, @ThingsExpo

@CloudExpo: Blog Post

Asymmetric Warfare Includes Cyberwarfare By @JamesCarlini | @CloudExpo #Cloud

Are your enterprise’s clouds resilient to Cyber Storms? Or are they susceptible to a Cyber-Tsunami of hostile transactions?

This is an excerpt of some concepts from his upcoming book, Nanokrieg: Beyond Blitzkrieg, a book covering the changes in Military Infrastructure, Strategies and Tactics needed to win the War on Terrorism. It includes chapters on cyberterrorism and cyberwarfare.

With the latest terrorist occurrences in Brussels, Belgium, and Paris, France, on hard targets, we tend to equate terrorism with overt acts of small groups in shootings, stabbings, and bombings of people in order to disrupt their day-to-day lives and create fear in a region's economy.

This is referred to as "asymmetrical warfare", where one enemy has a totally different level of resources and personnel to apply. Both sides are not equal in strength, but the weaker enemy makes up for it with non-traditional and guerilla warfare tactics to defeat and demoralize their enemy.

Iron-Clad Clouds Are a Must in Today's Terrorist Environment
In another facet of asymmetric warfare, the whole tactic of cyberterrorism thrives as another tool to disrupt economic commerce and put fear into those trying to accomplish business and transactions on the Internet. In cyberterrorism, you don't need a huge computer, a large programming staff, or a large fully redundant data center to inflict huge problems into an organization's or country's cyber-economy and intelligent infrastructure.

Most enterprise clouds and their platforms are not resistant to mass cyberattacks. Is your company's enterprise network a Digital Alamo environment waiting to happen with its administrators not even aware of all its vulnerabilities?

If you are using a third-party cloud service, are they as secure as their glossy brochures claim their services to be?

As warfare, strategies, and tactics were being redefined as World War II was coming to an end, tactics for large military components were being redeveloped and shifted to smaller, less-equipped units. Resources and available manpower were dwindling. You had to do more with less as far as personnel and resources.

As the war started to end in 1945, some in Germany did not want to give up and, instead, wanted to keep the war and the Third Reich going. One of the key people in developing a new type of warfare for Germany at the end of the war was Otto Skorzeny, a Nazi SS officer who did some very high-level work leading commando-type raids as well as developing a new style of warfare.

"You cannot waste time on feinting and sidestepping. You must decide on your target and go in."
- Otto Skorzeny, Nazi Commando, "The Most Dangerous Man in Europe"

Skorzeny made headlines and another promotion when he led a group of well-trained German commandos in Operation Eiche (Operation Oak) to rescue Benito Mussolini in 1943 from a prison in Italy. Skorzeny was one of Hitler's "go-to" men on dangerous and difficult assignments and with the success of this rescue raid, he got promoted to Sturmbannfuhrer (Major) as well as being awarded the Knight's Cross of the Iron Cross.

As to developing a strategy for asymmetrical warfare where there is a real disparity between a traditional standing army and a terrorist insurgency group, Skorzeny had a plan.

Nazi "Werwolf Tactics Forerunner to Al Qaeda Tactics
Instead of uniformed regiments of soldiers fighting each other on a well-defined battlefield, the new strategy was to have some small roving bands of guerilla fighters attacking different priority targets and then melting back into the background of society. No large fighting units, only small units or cells. Skorzeny called this werwolf (German spelling of "werewolf") warfare. It was the related grandfather to ISIS terrorist cells.

This type of warfare is hard to counter because the opposing soldiers are not in a traditional military uniform. Nor are they working in a structured environment. It is more of a commando type or covert operations approach to warfare and is seen in contemporary terrorist groups like cells of ISIS.

Going back to when Skorzeny was perfecting these new ideas, a lack of full resources as well as highly trained personnel dictated a new approach to waging war and being creative with insurgency tactics.

The trail of training guerilla warfare and tactics may have started in Germany at the end of World War II, but it moved forward into Egypt, South America, and even into the United States after the war with Skorzeny as a paid consultant. Eventually, it spread into Al Qaeda through the efforts of Skorzeny and his subordinates with Yasser Arafat. Skorzeny was, in effect, a consultant for hire to whoever wanted his new tactical ideas including the United States Special Forces.

In recent years, this type of asymmetrical warfare has bled into the whole area of computers, data centers, and internet infrastructures. It raises the question of where should we be spending money on national defenses to fight the War on Terrorism? Do we buy more $1 billion air superiority fighters or develop new cyber-security tools, monitors, and counter-weapons?

Asymmetrical warfare that was born in the last days of the Third Reich, spread into the Middle East in the early Post-War Days and later meetings of Otto Skorzeny and Yasser Arafat. Now, cyberwarfare has grown out of this guerilla warfare approach.

—James Carlini, 2016


Carlini will be the Keynote Speaker on Intelligent Infrastructure & Cybersecurity at the CABA Intelligent Buildings and Digital Homes Forum in San Diego on April 26.

Carlini's book will be out at the end of this year. His current book, LOCATION LOCATION CONNECTIVITY is available on AMAZON

Copyright © 2016 - James Carlini, All Rights Reserved

More Stories By James Carlini

James Carlini, MBA, a certified Infrastructure Consultant, keynote speaker and former award-winning Adjunct Professor at Northwestern University, has advised on mission-critical networks. Clients include the Chicago Mercantile Exchange, GLOBEX, and City of Chicago’s 911 Center. An expert witness in civil and federal courts on network infrastructure, he has worked with AT&T, Sprint and others.

Follow daily Carlini-isms at www.twitter.com/JAMESCARLINI

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@CloudExpo Stories
"Infoblox does DNS, DHCP and IP address management for not only enterprise networks but cloud networks as well. Customers are looking for a single platform that can extend not only in their private enterprise environment but private cloud, public cloud, tracking all the IP space and everything that is going on in that environment," explained Steve Salo, Principal Systems Engineer at Infoblox, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventio...
Data scientists must access high-performance computing resources across a wide-area network. To achieve cloud-based HPC visualization, researchers must transfer datasets and visualization results efficiently. HPC clusters now compute GPU-accelerated visualization in the cloud cluster. To efficiently display results remotely, a high-performance, low-latency protocol transfers the display from the cluster to a remote desktop. Further, tools to easily mount remote datasets and efficiently transfer...
It is of utmost importance for the future success of WebRTC to ensure that interoperability is operational between web browsers and any WebRTC-compliant client. To be guaranteed as operational and effective, interoperability must be tested extensively by establishing WebRTC data and media connections between different web browsers running on different devices and operating systems. In his session at WebRTC Summit at @ThingsExpo, Dr. Alex Gouaillard, CEO and Founder of CoSMo Software, presented ...
In his session at 21st Cloud Expo, James Henry, Co-CEO/CTO of Calgary Scientific Inc., introduced you to the challenges, solutions and benefits of training AI systems to solve visual problems with an emphasis on improving AIs with continuous training in the field. He explored applications in several industries and discussed technologies that allow the deployment of advanced visualization solutions to the cloud.
Gemini is Yahoo’s native and search advertising platform. To ensure the quality of a complex distributed system that spans multiple products and components and across various desktop websites and mobile app and web experiences – both Yahoo owned and operated and third-party syndication (supply), with complex interaction with more than a billion users and numerous advertisers globally (demand) – it becomes imperative to automate a set of end-to-end tests 24x7 to detect bugs and regression. In th...
"NetApp is known as a data management leader but we do a lot more than just data management on-prem with the data centers of our customers. We're also big in the hybrid cloud," explained Wes Talbert, Principal Architect at NetApp, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"Space Monkey by Vivent Smart Home is a product that is a distributed cloud-based edge storage network. Vivent Smart Home, our parent company, is a smart home provider that places a lot of hard drives across homes in North America," explained JT Olds, Director of Engineering, and Brandon Crowfeather, Product Manager, at Vivint Smart Home, in this SYS-CON.tv interview at @ThingsExpo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"We work around really protecting the confidentiality of information, and by doing so we've developed implementations of encryption through a patented process that is known as superencipherment," explained Richard Blech, CEO of Secure Channels Inc., in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
High-velocity engineering teams are applying not only continuous delivery processes, but also lessons in experimentation from established leaders like Amazon, Netflix, and Facebook. These companies have made experimentation a foundation for their release processes, allowing them to try out major feature releases and redesigns within smaller groups before making them broadly available. In his session at 21st Cloud Expo, Brian Lucas, Senior Staff Engineer at Optimizely, discussed how by using ne...
Agile has finally jumped the technology shark, expanding outside the software world. Enterprises are now increasingly adopting Agile practices across their organizations in order to successfully navigate the disruptive waters that threaten to drown them. In our quest for establishing change as a core competency in our organizations, this business-centric notion of Agile is an essential component of Agile Digital Transformation. In the years since the publication of the Agile Manifesto, the conn...
While some developers care passionately about how data centers and clouds are architected, for most, it is only the end result that matters. To the majority of companies, technology exists to solve a business problem, and only delivers value when it is solving that problem. 2017 brings the mainstream adoption of containers for production workloads. In his session at 21st Cloud Expo, Ben McCormack, VP of Operations at Evernote, discussed how data centers of the future will be managed, how the p...
"Cloud Academy is an enterprise training platform for the cloud, specifically public clouds. We offer guided learning experiences on AWS, Azure, Google Cloud and all the surrounding methodologies and technologies that you need to know and your teams need to know in order to leverage the full benefits of the cloud," explained Alex Brower, VP of Marketing at Cloud Academy, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clar...
"MobiDev is a software development company and we do complex, custom software development for everybody from entrepreneurs to large enterprises," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
"There's plenty of bandwidth out there but it's never in the right place. So what Cedexis does is uses data to work out the best pathways to get data from the origin to the person who wants to get it," explained Simon Jones, Evangelist and Head of Marketing at Cedexis, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"Codigm is based on the cloud and we are here to explore marketing opportunities in America. Our mission is to make an ecosystem of the SW environment that anyone can understand, learn, teach, and develop the SW on the cloud," explained Sung Tae Ryu, CEO of Codigm, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"We're focused on how to get some of the attributes that you would expect from an Amazon, Azure, Google, and doing that on-prem. We believe today that you can actually get those types of things done with certain architectures available in the market today," explained Steve Conner, VP of Sales at Cloudistics, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
The question before companies today is not whether to become intelligent, it’s a question of how and how fast. The key is to adopt and deploy an intelligent application strategy while simultaneously preparing to scale that intelligence. In her session at 21st Cloud Expo, Sangeeta Chakraborty, Chief Customer Officer at Ayasdi, provided a tactical framework to become a truly intelligent enterprise, including how to identify the right applications for AI, how to build a Center of Excellence to oper...
"IBM is really all in on blockchain. We take a look at sort of the history of blockchain ledger technologies. It started out with bitcoin, Ethereum, and IBM evaluated these particular blockchain technologies and found they were anonymous and permissionless and that many companies were looking for permissioned blockchain," stated René Bostic, Technical VP of the IBM Cloud Unit in North America, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventi...
"We're developing a software that is based on the cloud environment and we are providing those services to corporations and the general public," explained Seungmin Kim, CEO/CTO of SM Systems Inc., in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.