Transcript
A (0:04)
Hello everyone, this is Tom Uren. I'm here with another between two nerds discussion and the Gruk. G', day Garruk, how are you?
B (0:11)
G', day Tom. I'm fine, and yourself?
A (0:13)
I'm very well. This week's edition is brought to you by Airlock Digital Airlock makes a application whitelisting solution for your endpoints to keep them safe and secure. Find them@airlockdigital.com so Gruk, you sent me actually quite an old blog post by Dave Itel, who used to once upon a time work for nsa and he's got a technical, I think exploit writing type background and he is a policy aficionado, so he's written quite a lot about policy as well. So this post is actually almost a decade old, 2016 and it was I guess inspired by a post on Lawfare which was about the important cyber conflict questions and answers. So I think part of it is interesting to me is that it's just a bit of a, what's the word? A time capsule of what people were thinking a while ago, I would point.
B (1:21)
Out just very briefly, in the middle of getting their asses kicked in the information domain by Russia. This was, yeah, this was the topic of conversation.
A (1:32)
And so Dave, I tell, took a crack at how do we define cyber power? And he came up with what I think of as quite a technical answer. So he talks about, and his blog post, which is quite short, talks about exploitation, implantation, exfiltration and analysis, integration into other capabilities like humit and effect. What struck me as interesting is that this is a very technical way to approach cyber power. And since that time several different think tank type bodies have taken a crack at what is cyber power and none of them would have used any of these criteria at all. And they're looking much more at what it achieves for a state rather than how good your technical capabilities are.
B (2:22)
Right. So I think one of the interesting analogies to think about would be like the Toyota war in, I think it was between Chad and Tunisia or Libya, don't quote me on that. But anyway, you had one state that had T55s from Russia and some, some other sort of like quite advanced military equipment and another state that had AKs, machine guns and Toyota trucks and they made these huge technical armies or basically they put machine guns or rocket launchers onto Toyota trucks and then just drove them through the desert and they were able to defeat the other army because they could just swarm them, hit, hit them, move away, cross deserts that they couldn't. All of this stuff and that they could maintain their equipment. If you're a dictator with a whole bunch of Soviet gear, it's unlikely you have an army that can service your tanks if they have problems. Whereas if you have a whole bunch of like, Toyota Hilux diesel trucks, as long as you've got a rock, a stick and a piece of bendy wire, you could probably fix anything with it. So, yeah, like, if you were talking about military power and you started measuring who has more tanks, you would very quickly come away with, you know, this is a lopsided engagement and it's going to be a crushing victory for the one with the most hardware and military power. Whereas in fact, contextually, what turned out to be much better was investment in things that actually made sense for that domain, that area of operation and stuff. And I think it's a little bit like this in that you have people looking at, say, like the Abrams or the American hardware and saying, like, this is the best military you could ever have. And then if you were to drop it into like a swamp and be like, all right, you know, defeat a bunch of small Vietnamese people who have been fighting for a thousand years and really don't like you, you know, having the most tanks ceases to be a useful metric of military power. I think it's similar to that and that it's. If you're trying to achieve your aims, it's not necessarily the most tanks that's going to help you out. And I think in this case, having the most technically capable, intelligent service is great, but I don't know that that's the necessary criteria for having an effective cyber.
