Military Review English Edition May-June 2014 | Page 8
example, by the 16th century, armies had combined
muskets with pikes and armored knights. During
the 2008 Russian-Georgian War, some speculated
that Russian forces integrated OCO with traditional
operations to enhance their overall operational
effectiveness. The Russians evidently conducted
numerous cyberspace attacks that rendered Georgia’s governmental and media networks inoperable.6 These attacks severely disrupted Georgian
military C2. They were synchronized with the Russian troops’ crossing of the Georgian border.7 Cyber
expert Eli Jellenc stated this event represented
“the birth of true, operational cyber warfare,” as it
appeared to be the first coordinated usage of cyber
and conventional attacks on a nation state.8
A complementary weapon eventually can evolve
into a primary weapon. For example, the musket
equipped with a socket bayonet replaced the pike
by the early 18th century as the universal infantry
arm. In 2010, a computer worm known as Stuxnet
evidently was used as a primary offensive weapon
to create tangible operational effects. Stuxnet, while
of unknown origin, was a “fire and forget” program,
considered the world’s first “cyber missile.”9 The
program apparently was deployed to sabotage Iran’s
nuclear fuel-refining centrifuges, which could be
used to develop weapons-grade uranium, by altering the electrical current.10 According to German
researcher Ralph Langner, the attack may have
been intended to destroy the centrifuge rotor by
vibration—which could cause the centrifuge to
explode—or simply to degrade the output over
time (by slowing down and speeding up the
motor).11 Stuxnet—although delivered through
what is perceived as a nonphysical and nonlethal
domain—achieved decidedly physical effects by
damaging Iranian nuclear facilities.
The examples from Iran and Georgia show how
OCO have produced effects ranging from nonphysical harassment and information operations
through physical damage to key infrastructure.
Without forces or weapons having direct physical
contact, OCO can create nonphysical and physical operational effects. They can shut down air
defense systems and C2 nodes, open or close a
dam’s floodgates, and destroy or damage industrial
machines such as nuclear centrifuges.12 Offensive
cyberspace capabilities, like standard lethal and
tangible weapons, can be arrows in a JTF commander’s quiver. They can enable a commander to
address a range of targets efficiently, on their own
or in conjunction with other weapons.
The ”I don’t understand it” or “I can’t get
to it” misconception. Cyberspace capabilities,
particularly OCO, tend to be shrouded in secrecy.
OCO are highly classified because the nature of
these operations could
divulge strategic and operational intentions if they
are revealed. If a hostile
power learned about even
one OCO target under
development, that power
could learn much about
U.S. cyberspace capabilities and a combatant command’s operations. If certain enemies learned that
an operation plan featuring
them as a target involved
a cyberspace attack on an
infrastructure node, they
could use U.S. military
doctrine to develop some
understanding of the plan.
Further, if technical data
An Iranian technician works at the Uranium Conversion Facility just outside the city of Isfahan 255 miles south of
were compromised, an
Tehran, Iran, 3 February 2007. (AP Photo/Vahid Salemi)
6
May-June 2014
MILITARY REVIEW