Welcome!

@CloudExpo Authors: Elizabeth White, John Rauser, Mark Leake, Liz McMillan, Derek Weeks

Related Topics: @CloudExpo, Cloud Security, @ThingsExpo

@CloudExpo: Blog Post

Asymmetric Warfare Includes Cyberwarfare By @JamesCarlini | @CloudExpo #Cloud

Are your enterprise’s clouds resilient to Cyber Storms? Or are they susceptible to a Cyber-Tsunami of hostile transactions?

This is an excerpt of some concepts from his upcoming book, Nanokrieg: Beyond Blitzkrieg, a book covering the changes in Military Infrastructure, Strategies and Tactics needed to win the War on Terrorism. It includes chapters on cyberterrorism and cyberwarfare.

With the latest terrorist occurrences in Brussels, Belgium, and Paris, France, on hard targets, we tend to equate terrorism with overt acts of small groups in shootings, stabbings, and bombings of people in order to disrupt their day-to-day lives and create fear in a region's economy.

This is referred to as "asymmetrical warfare", where one enemy has a totally different level of resources and personnel to apply. Both sides are not equal in strength, but the weaker enemy makes up for it with non-traditional and guerilla warfare tactics to defeat and demoralize their enemy.

Iron-Clad Clouds Are a Must in Today's Terrorist Environment
In another facet of asymmetric warfare, the whole tactic of cyberterrorism thrives as another tool to disrupt economic commerce and put fear into those trying to accomplish business and transactions on the Internet. In cyberterrorism, you don't need a huge computer, a large programming staff, or a large fully redundant data center to inflict huge problems into an organization's or country's cyber-economy and intelligent infrastructure.

Most enterprise clouds and their platforms are not resistant to mass cyberattacks. Is your company's enterprise network a Digital Alamo environment waiting to happen with its administrators not even aware of all its vulnerabilities?

If you are using a third-party cloud service, are they as secure as their glossy brochures claim their services to be?

As warfare, strategies, and tactics were being redefined as World War II was coming to an end, tactics for large military components were being redeveloped and shifted to smaller, less-equipped units. Resources and available manpower were dwindling. You had to do more with less as far as personnel and resources.

As the war started to end in 1945, some in Germany did not want to give up and, instead, wanted to keep the war and the Third Reich going. One of the key people in developing a new type of warfare for Germany at the end of the war was Otto Skorzeny, a Nazi SS officer who did some very high-level work leading commando-type raids as well as developing a new style of warfare.

"You cannot waste time on feinting and sidestepping. You must decide on your target and go in."
- Otto Skorzeny, Nazi Commando, "The Most Dangerous Man in Europe"

Skorzeny made headlines and another promotion when he led a group of well-trained German commandos in Operation Eiche (Operation Oak) to rescue Benito Mussolini in 1943 from a prison in Italy. Skorzeny was one of Hitler's "go-to" men on dangerous and difficult assignments and with the success of this rescue raid, he got promoted to Sturmbannfuhrer (Major) as well as being awarded the Knight's Cross of the Iron Cross.

As to developing a strategy for asymmetrical warfare where there is a real disparity between a traditional standing army and a terrorist insurgency group, Skorzeny had a plan.

Nazi "Werwolf Tactics Forerunner to Al Qaeda Tactics
Instead of uniformed regiments of soldiers fighting each other on a well-defined battlefield, the new strategy was to have some small roving bands of guerilla fighters attacking different priority targets and then melting back into the background of society. No large fighting units, only small units or cells. Skorzeny called this werwolf (German spelling of "werewolf") warfare. It was the related grandfather to ISIS terrorist cells.

This type of warfare is hard to counter because the opposing soldiers are not in a traditional military uniform. Nor are they working in a structured environment. It is more of a commando type or covert operations approach to warfare and is seen in contemporary terrorist groups like cells of ISIS.

Going back to when Skorzeny was perfecting these new ideas, a lack of full resources as well as highly trained personnel dictated a new approach to waging war and being creative with insurgency tactics.

The trail of training guerilla warfare and tactics may have started in Germany at the end of World War II, but it moved forward into Egypt, South America, and even into the United States after the war with Skorzeny as a paid consultant. Eventually, it spread into Al Qaeda through the efforts of Skorzeny and his subordinates with Yasser Arafat. Skorzeny was, in effect, a consultant for hire to whoever wanted his new tactical ideas including the United States Special Forces.

In recent years, this type of asymmetrical warfare has bled into the whole area of computers, data centers, and internet infrastructures. It raises the question of where should we be spending money on national defenses to fight the War on Terrorism? Do we buy more $1 billion air superiority fighters or develop new cyber-security tools, monitors, and counter-weapons?

Asymmetrical warfare that was born in the last days of the Third Reich, spread into the Middle East in the early Post-War Days and later meetings of Otto Skorzeny and Yasser Arafat. Now, cyberwarfare has grown out of this guerilla warfare approach.

—James Carlini, 2016


Carlini will be the Keynote Speaker on Intelligent Infrastructure & Cybersecurity at the CABA Intelligent Buildings and Digital Homes Forum in San Diego on April 26.

Carlini's book will be out at the end of this year. His current book, LOCATION LOCATION CONNECTIVITY is available on AMAZON

Copyright © 2016 - James Carlini, All Rights Reserved

More Stories By James Carlini

James Carlini, MBA, a certified Infrastructure Consultant, keynote speaker and former award-winning Adjunct Professor at Northwestern University, has advised on mission-critical networks. Clients include the Chicago Mercantile Exchange, GLOBEX, and City of Chicago’s 911 Center. An expert witness in civil and federal courts on network infrastructure, he has worked with AT&T, Sprint and others.

Follow daily Carlini-isms at www.twitter.com/JAMESCARLINI

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@CloudExpo Stories
In his session at @ThingsExpo, Eric Lachapelle, CEO of the Professional Evaluation and Certification Board (PECB), provided an overview of various initiatives to certify the security of connected devices and future trends in ensuring public trust of IoT. Eric Lachapelle is the Chief Executive Officer of the Professional Evaluation and Certification Board (PECB), an international certification body. His role is to help companies and individuals to achieve professional, accredited and worldwide re...
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...
Wooed by the promise of faster innovation, lower TCO, and greater agility, businesses of every shape and size have embraced the cloud at every layer of the IT stack – from apps to file sharing to infrastructure. The typical organization currently uses more than a dozen sanctioned cloud apps and will shift more than half of all workloads to the cloud by 2018. Such cloud investments have delivered measurable benefits. But they’ve also resulted in some unintended side-effects: complexity and risk. ...
It is ironic, but perhaps not unexpected, that many organizations who want the benefits of using an Agile approach to deliver software use a waterfall approach to adopting Agile practices: they form plans, they set milestones, and they measure progress by how many teams they have engaged. Old habits die hard, but like most waterfall software projects, most waterfall-style Agile adoption efforts fail to produce the results desired. The problem is that to get the results they want, they have to ch...
With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend 21st Cloud Expo October 31 - November 2, 2017, at the Santa Clara Convention Center, CA, and June 12-14, 2018, at the Javits Center in New York City, NY, and learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
In 2014, Amazon announced a new form of compute called Lambda. We didn't know it at the time, but this represented a fundamental shift in what we expect from cloud computing. Now, all of the major cloud computing vendors want to take part in this disruptive technology. In his session at 20th Cloud Expo, Doug Vanderweide, an instructor at Linux Academy, discussed why major players like AWS, Microsoft Azure, IBM Bluemix, and Google Cloud Platform are all trying to sidestep VMs and containers wit...
The taxi industry never saw Uber coming. Startups are a threat to incumbents like never before, and a major enabler for startups is that they are instantly “cloud ready.” If innovation moves at the pace of IT, then your company is in trouble. Why? Because your data center will not keep up with frenetic pace AWS, Microsoft and Google are rolling out new capabilities. In his session at 20th Cloud Expo, Don Browning, VP of Cloud Architecture at Turner, posited that disruption is inevitable for comp...
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists examined how DevOps helps to meet the de...
When growing capacity and power in the data center, the architectural trade-offs between server scale-up vs. scale-out continue to be debated. Both approaches are valid: scale-out adds multiple, smaller servers running in a distributed computing model, while scale-up adds fewer, more powerful servers that are capable of running larger workloads. It’s worth noting that there are additional, unique advantages that scale-up architectures offer. One big advantage is large memory and compute capacity...
"When we talk about cloud without compromise what we're talking about is that when people think about 'I need the flexibility of the cloud' - it's the ability to create applications and run them in a cloud environment that's far more flexible,” explained Matthew Finnie, CTO of Interoute, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Cloud applications are seeing a deluge of requests to support the exploding advanced analytics market. “Open analytics” is the emerging strategy to deliver that data through an open data access layer, in the cloud, to be directly consumed by external analytics tools and popular programming languages. An increasing number of data engineers and data scientists use a variety of platforms and advanced analytics languages such as SAS, R, Python and Java, as well as frameworks such as Hadoop and Spark...
The Internet giants are fully embracing AI. All the services they offer to their customers are aimed at drawing a map of the world with the data they get. The AIs from these companies are used to build disruptive approaches that cannot be used by established enterprises, which are threatened by these disruptions. However, most leaders underestimate the effect this will have on their businesses. In his session at 21st Cloud Expo, Rene Buest, Director Market Research & Technology Evangelism at Ara...
Join us at Cloud Expo June 6-8 to find out how to securely connect your cloud app to any cloud or on-premises data source – without complex firewall changes. More users are demanding access to on-premises data from their cloud applications. It’s no longer a “nice-to-have” but an important differentiator that drives competitive advantages. It’s the new “must have” in the hybrid era. Users want capabilities that give them a unified view of the data to get closer to customers and grow business. The...
"We are a monitoring company. We work with Salesforce, BBC, and quite a few other big logos. We basically provide monitoring for them, structure for their cloud services and we fit into the DevOps world" explained David Gildeh, Co-founder and CEO of Outlyer, in this SYS-CON.tv interview at DevOps Summit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
"Loom is applying artificial intelligence and machine learning into the entire log analysis process, from start to finish and at the end you will get a human touch,” explained Sabo Taylor Diab, Vice President, Marketing at Loom Systems, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
"Tintri focuses on the Ops side of the DevOps, which basically is pushing more and more of the accessibility of the infrastructure to the developers and trying to get behind the scenes," explained Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
@DevOpsSummit at Cloud Expo taking place Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center, Santa Clara, CA, is co-located with the 21st International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is ...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
A look across the tech landscape at the disruptive technologies that are increasing in prominence and speculate as to which will be most impactful for communications – namely, AI and Cloud Computing. In his session at 20th Cloud Expo, Curtis Peterson, VP of Operations at RingCentral, highlighted the current challenges of these transformative technologies and shared strategies for preparing your organization for these changes. This “view from the top” outlined the latest trends and developments i...