Chapter 5
Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct 1
5.1. Introduction
Since the beginning of 2000, the increased amount of computerized attacks has triggered an increasing number of investigations. In particular, the generalized computer attack on Estonia in 2007 gave way to a wide field of reflection on what we call cyberwar and cyberattacks, without the difference between the two being clearly defined.
These reflections have gotten straight down to the State prerogative, and that States themselves have quickly come to understand, in an inevitable context of national security, the urgent need to rigorously define the concept. In addition, they have also seen the need for legislation, on the international front as much as the national, and to organize themselves in an aim for defense (defensive cyberwar). But more recently, as an unavoidable consequence from any field related to the State context, this may be in an aim to attack (offensive cyberwar). The publication of the French White Paper on Defense and National Security [LBD 08] has initiated this last aspect, as also other countries have.
If there is a relatively successful reflection on the human aspects (legal, societal, historical, etc.) of what a cyberwar might be, then on the other hand there is no open study on the technical and especially operational aspects regarding the materialization of a cyberattack. Yet, from a purely military point of view, this “practical” question is very important. ...
Get Cyberwar and Information Warfare now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.