Thursday 28 May 2015

THE CYBERSECURITY INFANTRY, PART I: RETREAT FOR ADVANTAGE

Read retired Marine H. John Poole’s Phantom Soldier. It doesn’t matter if you’re not in the infantry; read it anyway. It will open your eyes to the Eastern way of small-unit tactics. And while you’re reading it, contemplate the manifold parallels to cybersecurity. It will open your eyes to the global and all-pervading way of modern conflict on the plane of computer and communication systems.

While the squad leader and the cybersecurity professional might consider themselves residents of separate worlds, strong conceptual parallels exist between their domains. Before discussing specifics, it’s worth reviewing some of the core differences between the Eastern and Western perspectives. In Poole’s words,

IF ONE WERE TO SUMMARIZE THE DIFFERENCES BETWEEN EASTERN- AND WESTERN-STYLE ARMIES, ONE MIGHT SAY THAT THE FORMER GENERALLY DO A BETTER JOB OF HARNESSING THE PERCEPTIONS AND COMMON SENSE OF THE PEOPLE IN CONTACT WITH THE ENEMY. DECEPTIVE AND MULTIFACETED, THIS ALTERNATIVE “STYLE OF WAR” IS DIFFICULT FOR THE WESTERN, “TOP DOWN” THINKER TO COMPREHEND. AT TIMES, IT EMPLOYS MASSIVE FIREPOWER; BUT MORE OFTEN, IT RELIES ON SURPRISE. ITS ESSENCE LIES NOT IN ESTABLISHED PROCEDURE, BUT RATHER IN FLEXIBILITY TO CHANGE. IT ENCOURAGES ITS PRACTITIONERS TO SHIFT RAPIDLY BETWEEN OPPOSITES—TO ALTERNATIVELY USE ONE MANEUVER AS A DECEPTION AND ITS REFLECTION AS A FOLLOW THROUGH. ((POOLE, PHANTOM SOLDIER, P. 13.))

To put this in Western terms, the Eastern perspective intuitively embraces systems thinking and includes a strong bottom-up aspect. Throughout his discussion of the Eastern approach, Poole peppers his narrative with multiple examples of how the Eastern approach influenced infantry engagements during World War II and Vietnam. In several of the cases, it’s actually a bit disturbing to read just how obstinate Western tacticians and leaders remained in the face of a more fluid way of fighting. It reinforces the notion that you see precisely what you want to see.

But how does this relate to cybersecurity? Several points of connection exist throughout the book. Here I introduce one with the intent of introducing more in follow-on posts.

Prior to reading Phantom Soldier, I seriously underestimated the importance of the ancient stratagem “[When the situation is growing hopeless,] running away [in good time] is the best stratagem.” ((Harro von Senger, The 36 Stratagems for Business, p. 189.)) I considered this, the last of the 36 stratagems, to be the stratagem of desperation, pursued only when all options have failed. The examples in Phantom Soldier caused me to reconsider. In fact, as Poole notes, “Of the 36 ruses, the last—running away—is probably the most important [italics mine] and least understood. When continuing to fight holds no strategic import, the Easterner will secretly withdraw.” ((Poole, p. 29.))

In support of this point, Poole cites the preface of the version of the 36 stratagems published by the Foreign Languages Press in Beijing. In fact, the opening sentence of the preference is “‘Of the 36 strategies, running away is the best choice.’” ((The Wiles of War: 36 Military Strategies from Ancient China, p. i.)) It’s on my shelf, but I never caught that. I’m not sure how I missed it, but I don’t think it would have meant much without reading the examples in Poole’s book, where he cites several cases of infantry employing efficacious tactical withdrawals. In one case, for example, a Japanese patrol on Guadalcanal engages Evans Carlson’s 2nd Raider Battalion, only to retreat. Poole follows the example by noting once again, that “While considered less than manly in the West, running away has always been tactically valid in the East. It helps a valued resource to live to fight another day. It also helps him to bait a trap.” ((Poole, p. 51.))

In another case, Poole discusses at length a harrowing engagement between U.S. Marines and Chinese troops at the southern end of the Chosin Reservoir in November 1950. Amid Poole’s discussion, we find this quote from Eric Hammel’s Chosin: Heroic Ordeal of the Korean War: “[L]ight probes were launched by very small Chinese groups along the Fox/5 line. The Chinese recoiled whenever they met resistance, but by drawing fire they exposed the locations of … Marine automatic weapons.” ((Hammel, pp. 56–59, as quoted in Poole, p. 90.)) Once again, tactical probing and withdrawal was used intentionally to shrewd effect. This isn’t to say that Western infantry units have never employed such a maneuver; it’s merely another example among many of a common and longstanding theme in Eastern small-unit tactics.

It’s also interesting to note how the various stratagems can be used to complement one another. In the Chosin example, the Chinese units combined stratagem 13 (“Beat the grass to frighten the snake”) with stratagem 36 (running away) to yield a deadly synergy. ((Note that not all presentations of the 36 stratagems employ the same numbering scheme.)) To summarize, then, a tactical engagement followed by a timely withdrawal can be used not only to setup an ambush, it can also be used to reveal information, a fact made clear in the full translation of stratagem 13: “Ascertain the doubtful; find out about the enemy before taking action. Return and bring the enemy’s secrets to light.” ((Wiles of War, p. 115.))

One more point of interest shows up in the Wiles of War translation of stratagem 36: “Evade the enemy to preserve the troops. The army retreats: No blame [italics mine].” ((Wiles of War, p. 328.)) This may be the most significant difference between the Eastern and Western perspective on the timely retreat: in Western culture, a retreat—no matter how justified—is viewed as a failure and subject to blame and recrimination, regardless of the fact that it may represent the best choice and offer a tremendous opportunity for learning. In this, the Eastern way is superior and represents tremendous wisdom. Learning is difficult when superior options are culturally forbidden and, when taken, lead to blame.

Turning to the domain of cybersecurity, it’s possible to extract several lessons. In the highly fluid world of cybersecurity, no attacker should adopt a rigid attitude of “no retreat,” and it’s doubtful that many do. For whatever reason, the nature of conflict on the cyber plane lends itself more intuitively to the systems-oriented, bottom-up perspective. As noted above, however, the value of the stratagem 36 lies not simply in the maxim “don’t retreat” but more importantly in the maxim “retreat for advantage.”

An attacker, for instance, might probe a system and withdraw simply to induce a defender to believe that his or her system is sufficiently secured. Alternatively, an attacker might attack and withdraw repeatedly to condition a defender to look in the direction of the attack and overlook attacks coming at other times from other directions. Finally, an attacker might engage and retreat simply to learn, as stratagem 13 suggests. The options available to the attacker are, if not endless, at the very least abundant enough to put the inelastic defender who thinks only in terms of the tangible at a tremendous disadvantage.

Clearly, a disconnect arises when the culturally “Western” defender views cybersecurity in terms of traditional conflict and expects the adversary to act accordingly. To lessen this disadvantage, the defender should ask (1) if everything is as it appears to be, (2) what the attacker wants the defender to do, and (3) what the attacker might have learned from the engagement. Additionally, the defender should always remember that an apparent retreat on the attacker’s part does not mean that the defender has “won” the engagement; indeed, the defender who believes this is quite possibly facilitating the attacker’s longer-ranged plan to deliver a doubly painful surprise somewhere down the road. Finally, the savvy defender will maintain an active learning loop, in which knowledge gained from observing fluid attackers is fed back into his or her defense.

View the original content and more from this author here: http://ift.tt/1Bq5jcA



from cyber security caucus http://ift.tt/1G3jdbY
via IFTTT

No comments:

Post a Comment