London, UK - 30 May 2007, 22:04 GMT - Eight years after 
    the 
mi2g initial forecast, and 11 years after we began to do research 
    into the vulnerability of the fragile digital environment, the world has arrived 
    at the predicted precipice with a quantum jump via the Estonia-Russia Cyber 
    War in May 2007, with a significant degradation to the Estonian digital eco-system 
    and infrastructure for a protracted period of nearly one month. During this 
    period of cyber war, the native defence forces, government departments, businesses 
    and individuals all suffered over and beyond their imagination by way of expectations 
    for digital services' reliability, availability and sustainability in the 
    event of adversity.
    
    
        
    Dear ATCA Colleagues
    Re: Cyber Warfare -- Beyond Estonia-Russia, the rise of China's 5th 
      Dimension Cyber Army
    Victor Hugo (1802-1885), French poet, writer and playwright, who witnessed 
      the revolutions in France that succeeded 1789, ie, 1830, 1832, 1848 and 
      1870, has said, "There is nothing more powerful than an idea whose 
      time has come!" 
      
      In January 1999, after three years of research 
      and development, the mi2g Intelligence Unit published an internal 
      memorandum titled, "Cyber Warfare: The Threat to Government, Business 
      and Financial Markets." In the internal memorandum, released in the 
      public domain post the NATO-Serbia first cyber war in April 1999, it was 
      stated, "Historically war has been classified as physical attacks 
      with bombs & bullets between nation states. It was beyond the means 
      of an individual to wage war. Today, in the Information Age, the launch 
      pad for war is no longer a runway but a computer. The attacker is no longer 
      a pilot or soldier but a civilian Hacker. An individual with relatively 
      simple computer capability can do things via the internet that can impact 
      economic infrastructures, social utilities and national security. This is 
      the problem we face in moving from the industrial world to the Information 
      Age, which is the essence of Cyber War."
      
      Eight years after the mi2g initial forecast, and 11 years after we 
      began to do research into the vulnerability of the fragile digital environment, 
      the world has arrived at the predicted precipice with a quantum jump via 
      the Estonia-Russia Cyber War in May 2007, with a significant degradation 
      to the Estonian digital eco-system and infrastructure for a protracted period 
      of nearly one month. During this period of cyber war, the native defence 
      forces, government departments, businesses and individuals all suffered 
      over and beyond their imagination by way of expectations for digital services' 
      reliability, availability and sustainability in the event of adversity.
      
      In November 2002, almost five years before the 
      debilitating Estonia cyber attacks, the mi2g Intelligence Unit released 
      a public briefing titled "Government backed counter-attack-forces 
      necessary in future," which stated, "As the damage done 
      by radical, criminal and intellectually motivated hackers continues to rise, 
      about six Billions Dollars of economic value was destroyed worldwide by 
      overt and covert digital attacks including viruses and worms in October 
      alone. As a result, the mi2g Intelligence Unit predicts there will 
      be a growing requirement for Governments to intervene and to mobilise counter-attack-forces 
      that protect economic targets and critical national infrastructure constituents 
      on a 24/7 basis." 
      
      The 2002 mi2g Intelligence Unit briefing continued: "Historically, 
      politicians in civilised Western democracies have challenged their defence 
      forces to provide adequate defence capability within limited resources. 
      The focus has been on the four physical dimensions - land, sea, air and 
      outer space - and not on the new 5th Dimension, which is cyberspace. There 
      is no real digital defence capability deployed so far -- other than occasional 
      simulations and exercises which are to uncover gaps in the national critical 
      infrastructure's digital defences. The redressal lies primarily in developing 
      counter-attack-forces, which would begin to arrest the imbalance of power 
      between ill-motivated hackers on the one hand and little-prepared businesses 
      on the other. It is unrealistic to expect that any defence department can 
      provide 'counter-attack-forces' against digital attacks for an entire nation's 
      economic targets immediately and, in any case, the expertise needed is relatively 
      fast moving and cannot be 'trained' into would be combatants in a short 
      period of time."
      
      Fast forwarding to May 2007: When Estonian authorities began removing a 
      bronze statue of a Second World War-era Soviet soldier from a park, they 
      expected violent street protests by Estonians of Russian descent. What followed 
      was the second major war in cyberspace, a month-long campaign that has forced 
      Estonian authorities to defend their Baltic nation from a data flood that 
      they say was set off by orders from Russia or ethnic Russian sources in 
      retaliation for the removal of the statue. The Estonians assert that an 
      Internet address involved in the attacks belonged to an official who works 
      in the administration of Vladimir Putin, Russia's President. Computer security 
      experts from NATO, the European Union, the United States and Israel converged 
      on Tallinn in May to offer help and to learn what they can about protracted 
      cyber war in the digital age in the 21st Century. Attacks on Estonia continue 
      albeit at a slower pace as measured against the peak at the start of May. 
      
      
      The Russian government has denied any involvement in the cyber attacks, 
      which came close to shutting down the country's digital infrastructure, 
      clogging the websites of the President, the Prime Minister, Parliament and 
      other government agencies, staggering Estonia's biggest bank and overwhelming 
      the sites of several daily newspapers. "It turned out to be a national 
      security situation," according to Estonia's Defence Minister Jaak 
      Aaviksoo. "It can effectively be compared to when your ports are 
      shut to the sea." 
      
      The attackers used a giant network of bots (enslaved computers) on 9th May 
      -- perhaps as many as one million slave computers in places as far away 
      as North America and the Far East -- to amplify the impact of their assault. 
      In a sign of their financial resources, there is evidence that they rented 
      time from trans-national criminal syndicates on Botnets. The combination 
      of very, very large packets of information streams -- generated by tens 
      of thousands of machines -- provide the mechanism for very damaging Distributed 
      Denial-of-Service (DDoS) attacks. In the early hours of 9th May, traffic 
      spiked to thousands of times the normal flow. It was heavier on 10th May, 
      forcing Estonia's biggest bank to shut down its online service for more 
      than an hour. Even now, the bank, HansaBanka, is under assault and continues 
      to block access to 300 suspect Internet addresses. Finally, on 10th May, 
      it appears that the attackers' time on the rented servers expired, and the 
      botnet attacks fell off abruptly.
      
      China's 5th Dimension Cyber Army
      
      In the meantime, a US military report into the future of geo-political relations 
      with China has claimed that the Chinese government is developing a cyber 
      (5th Dimension) warfare division for use in possible future conflicts. 
    "The Military Power of the People's Republic of China 2007" 
      report suggests that, in addition to the Red Army's army, navy, air 
      force and rocket arms, the Chinese government is putting together a team 
      to deal with "electronic and online arenas." According 
      to the report, "People's Liberation Army authors often cite the 
      need in modern warfare to control information, sometimes termed an 'information 
      blockade'... China is pursuing this ability by improving information and 
      operational security, developing electronic warfare and information warfare 
      capabilities, denial-of-service and deception... China's concept of an 'information 
      blockade' likely extends beyond the strictly military realm to include other 
      elements of state power." 
      
      The same US defence report suggests that the People's Republic of China 
      is developing teams to handle computer network attack, defence and exploitation 
      with a separate section handling electronic countermeasures. It cites logistics 
      systems and satellite communications as possible targets, and claims that 
      exercises have been held in cooperation with other Red Army wings since 
      2005. The report also mentions an article on the subject which appeared 
      in the November 2006 Liberation Army Daily.
      
      Solutions for The Cyber Warfare Paradigm Shift
      
      The Pandora's box of full scale cyber war is open now, post Estonia, and 
      the world is even more dependent on digital networks than it was eight years 
      ago, when the mi2g Internal Memorandum was placed in the public domain 
      in the wake of the NATO-Serbia cyber war. Where are the solutions? Going 
      back to the mi2g Intelligence Briefing from November 2002, governments 
      and large businesses are still in need of following the recommendations 
      made nearly five years ago: 
      
      "In the future, when seeking to protect the critical infrastructure 
      constituents and business digital systems at a national level, the economically 
      prudent way forward would be to combine knowledge management, analysis and 
      counter-attack tools with on-the-ground human intelligence sources. Surveillance 
      and reconnaissance dashboards of digital systems would need to be managed 
      by experienced counter-attack-forces on a 24/7 basis. mi2g believes 
      that this war on digital terrorism can be won decisively and effectively. 
      As in all wars, our collective national defences must excel enemy aggression. 
      We will therefore need to understand that:
      
      . Defence has always been about securing trade routes and markets. Given 
      that several Trillion Dollars of trade is routed digitally, counter-attack-forces 
      with electronic weapons that can disable attacking systems from various 
      parts of the world will ultimately need to be deployed with Governments' 
      backing as part of their 5th dimension defence shield. Counter-attack-forces 
      will save businesses a lot of lost time and money in dealing with rogue, 
      politically motivated, electronic attacks from radical and criminal groups 
      scattered across the world and within the nation(s)....
      
      . Mobilisation of resources including new investment will become necessary 
      on interoperable distributed knowledge management and analysis systems, 
      which allow data to be shared easily from and between different sources 
      and agencies collecting intelligence. Also, investment in more local human 
      intelligence across the globe will be essential. The expertise of the very 
      few available people who are proficient in the technologies of the 5th dimension 
      would need to be utilised to train the counter-attack-forces through the 
      establishment of national centre(s) of excellence for digital defence. Nothing 
      significant can be achieved without this cohesive sharing capability being 
      made available to the future counter-attack-forces, who would be able to 
      ensure reliability, availability, maintainability and scalability of business 
      systems in the event of protracted hacker attacks."
      
      [ENDS]
    For a more in-depth look at this subject, please consult my keynote speeches 
      delivered at: 
      
      1. The First International Conference on the Information Revolution and 
      the Changing Face of International Relations and Security in Lucerne, 
      Switzerland on 24th May 2005, organised by ETH Zurich's Centre for Security 
      Studies (CSS) & Comparative Interdisciplinary Studies Section (CISS) 
      of the International Studies Association (ISA):
      
      Holistic 
      Solutions to Counter Asymmetric Threats: The Pivotal Role of Technology; 
      and
      
      2. The Oxford Internet Institute, University of Oxford, Inaugural Industry 
      Lecture on 10th February 2005: 
      
      Cyberland Security: Organised Crime, Terrorism and The Internet