DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
Cyberspace_New Operational Domain
1. Cyberspace-New Operational field of confrontations
Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant
Cyberspace
New Operational field of confrontations
Technological progress gives mankind the advantage of easily carrying out of
all kinds of activities through system interconnection (networking), causing increasing
dependency on smooth and seamless operation of these systems.
This advantage, under specific conditions could turn into a vulnerability.
A vulnerability, as the single, continuous, dynamic set of interconnected systems
(people, information systems, computer networks, communications, databases,
information, software, equipment and processes), which is used in every field of human
activities (military, political, economic, social, etc.), is vulnerable partly or as a whole to
threats that have arisen, as a consequence of this very interconnection.
These threats may stem from individuals, organized groups, or even from states,
while the risk they (threats) represent is directly proportional, among other things, to
the breadth of networking combined with the development of broadband as well as
the criticality of the activities it supports.
With emphasis on the last decade and in combination with the so-called
"globalization", the dominant pillar of which is the extensive use of technology and in
particular the Internet, a new man-made (non- physical) , "field of confrontation"
analogous and overlapping to the existing physical spaces/fields (land, sea, air, space)
was created, the cyberspace.
Cyberspace can be defined as:
2. Cyberspace-New Operational field of confrontations
Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant
"...The global domain consisting of all interconnected communication,
information and other electronic systems, networks and their data, including those that
are separate or independent, that process, store or transmit data...".
Cyberspace can be considered as a multi-dimensional space that takes shape
on three levels with their respective components:
(1) Physical Layer
(2) Logical Layer
(3) Social Layer-Social Layer
The new area of confrontation and the asymmetric threats arising from its
existence and use against adversary critical information infrastructures (civil or military)
make it an accessible low-cost strategic weapon and force multiplier, as it is possible
using this field to:
1. Attack part or whole country's Information Infrastructure and of course state’s
command and control system (political or military) that depends on it, without
requiring the existence of heavy industry, strategic reserves of raw materials or the
payment of high costs , regardless of geographical boundaries and with zero possibility
of human losses on the part of the attacker.
2. To occur, disruption of operations in Command and Control (C4I) systems,
financial systems, interception or alteration of information, questioning the reliability
of data and therefore confusion the decision-making procedures, financial burden,
increased staff workload, influence on public opinion, social unrest and possibly
natural disasters and human casualties.
Cyberspace constitutes the fifth dimension of confrontations with the difference
that it provides the right conditions for conducting a covert war, in which there is a
possibility that neither side recognizes that takes part in conflict or even that it has
been attacked, but even if it does recognize this, it is very difficult or even impossible
to clear identify the opponent, the area and the way he operates.
In particular, for military activity in the era of the "Information Revolution",
cyberspace is considered a new field, where various belligerent forces seek to prevail
over their adversaries. However, dominance in cyberspace is a complex issue, as it is
not equivalent to the dominance of a single material space (such as space or ground)
subject to the laws of nature, but instead it is about securing an advantageous position
in a complex human construction, which can be repeated and whose function is based
on the coordinated action of material elements, artificial rules and real data.
The generalized perception that Cyberspace is one and only, but also treating
the two terms (Cyberspace and Internet) as identical, without their interchange
implying any conceptual differentiation is a fallacy, as each individual electronic
system-network has the ability to creates its own cyberspace, within which the right of
access and the very existence of a user-actor should be recognized, so that his actions
acquire meaning and interact with the actions of others. Therefore, in the context of a
3. Cyberspace-New Operational field of confrontations
Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant
conflict, it is crucial to ensure the sovereignty of the cyberspace in which each faction's
military target is located.
Cyberspace as an operational environment has several unique features:
1. It does not obey in space-time limitations since an action in or through it can
be performed in a short time (seconds), from significantly long distances (global
coverage) without requiring proximity to the opponent, and in most cases without
early warning.
2. Attribution for an aggressive action is extremely difficult , since the
perpetrators could act in disguise, hiding their real identity and goals.
3. The cost of developing cyber capabilities as well as conducting cyber
operations in this field is much lower, compared to the cost of conventional operations.
4. It contains constantly dynamically configured, huge amounts of high and/or
classified information of high value, in structured or unstructured form which are
mainly transmitted through commercial networks and without following the same path
from the issuer to the recipient, or the same safety standards.
5. It has created global conditions of dependence from it (according to
information technology degree of penetration in each state) to all forms of human
activity, since within or through it, daily actions take place that serve the total of
economic, business, communication, social, state, military activities of citizens and
states.
In order for respective groups to understand and analyze the unique
operational environment, cyberspace and cyber operations are inextricably linked with
the use of eight interrelated operational variables (political, economic, social, military,
informational, infrastructure, physical environment, time).
Under these circumstances and taking into account the phenomenal rate of
diffusion, evolution and penetration of information and communication technologies,
combined with the ever-increasing addition of critical infrastructure in this field, states
should:
1. Address cyber operations in terms of an "Asymmetric Threat" and as "Force
Multiplier" since the increasing state dependence on information and communication
technologies combined with the low cost of developing cyber-capabilities and the
severity of the damage which may cause, reducing them to a unique solution that
many adversaries can exploit in order to maintain the balance or gain some advantage
in terms of military power over an adversary.
2. Develop and use appropriate defense capabilities (cyber defense) in
cyberspace in order to protect national critical infrastructures.
3. Operate against a wide range of actors (Nation-states, state-sponsored
actors, non-state actors, legitimate enterprises, criminal organizations, and individuals,
etc.), with different levels of education, training, skills, motivations and abilities, which
is a significant change in traditional geopolitical and military perceptions of enemy and
4. Cyberspace-New Operational field of confrontations
Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant
threat of a specific orientation (geographical, ideological, etc.) and requires a new
perspective in terms of operations as well as a different type of training.
4. Develop on a daily basis effective relationships and collaborations with all
actors (public, private, academic institutes, military forces) involved in the field of
cyberspace since this field is created, owned, maintained and operated by public,
private, and government agencies around the world, with the result that research, and
development carried out by these agencies will largely be the catalyst for changes in
cyberspace operations.
New trends want the field of cyberspace to be considered as a subset of the
wider information environment which also includes other fields such as the
electromagnetic spectrum, space, etc., and correspondingly cyberspace operations
integrated into information operations to achieve their maximum potential.