The definition of hybrid warfare designates a combination of tactics and strategies; some from the conventional school, some from the asymmetrical and some from the cyber. It is this integration of cyber techniques that can make traditional and asymmetric battlefield strategies much more deadly and efficient.
Imagine this: a small insurgent force, (platoon strength or around 30 men) is planning a vehicle ambush on a convoy of enemy trucks thought to be carrying small arms, ammunition and explosives. The plan is to ambush the trucks, kill the drivers and soldiers guarding it and confiscate the weapons. The standard “L” ambush is agreed upon, and positions assigned (In this case, for the sake of clarity, the platoon is divided up into 3 “Elements”; Assault, Support and Security. The team leader of the Assault element is told that the goal is the safe retrieval of the weapons and explosives; not the destruction of them, so pass along the word to it is crucial that the drivers are killed first so there is a smaller chance for escape. After the drivers, then focus on the small contingent of guards, which we estimate only to be around 10 men with small arms. Once all the specifics have been worked out, a key member of the ambush team, the “Cyber” element speaks.
“I will start hacking the internal systems of the lead vehicle 1/8 mile from the ambush zone, killing all the electronics in a systematic fashion and hopefully immobilizing the lead vehicle here, at or around point here.” The cyber-tech points to a spot on the map marked “Kill Box”. “Once the lead vehicle is immobilized, the other vehicles will be forced to stop and will be unable to turn around due to a blocking action of the rear element. It is imperative that the ambush starts ONLY after the lead vehicle is immobile. If the enemy are alerted to our presence too early, they will surely call for reinforcements and with the QRF response times we have monitored averaging 12 to 15 minutes, combined with the distance from the nearest base, they will be on top of us in under 45 to 50 minutes, so it is imperative that 5 minutes before the ambush, all cell phone and radio freqs are jammed by our Commo (Communications Officer). Once the lead vehicle is immobile, it will be the job of the support element to execute a blocking formation by moving our ‘requisitioned’ school bus across the road to prevent escape. With the lead vehicle immobile and the rear exit blocked, the remaining guards will either fight or flee, if they run, it will be the job of the security elements to scoop them up. Once the guards are eliminated or captured, trucks will be searched for GPS beacons and disabled. Seeing the trucks are still driveable, they will then be driven out, if not, and they are damaged, arms and ammo will be unloaded into our trucks, this will eat up valuable time, so again, all efforts must be made not to damage the enemy vehicles during the ambush!”
Now although the above is presented as a fictional “what could be” event, a recent article in WIRED showed just how easy hacking and hijacking a vehicles internal computer can be with the right gear and know-how.
If one wanted to go even further on the “what if” scale, consider if local municipality or statewide infrastructure like traffic lights, CCTV cameras (for operational surveillance) train crossings, HOV Lanes and even drawbridge controls were hacked for the purpose of physically stopping or slowing down a vehicle so an ambush, assassination, robbery, etc., could take place.
Hollywood of course, has picked up on this theme, but focusing mainly on just the “cyber” side of things and not the “hybrid” integration we are discussing. In the Showtime series Homeland, the United States VP’s Pacemaker is hacked by a terrorist group causing rapid heart arrhythmia and eventually death. Again, considering what the OPM hack showed us in how sensitive data (like sensitive medical records for example) are vulnerable to manipulation, this is something to consider as we traverse what will most likely be known in history as the 21st “Cyber” Century.
The “Hybrid” integration of cyber threats with asymmetrical warfare has unlimited possibilities. Of course what I have hypothesized here today is thinking very “small” in terms of overall strategy, but I wanted to show that for all practical purposes, these types of hybrid tactics, when planned and executed with violence of action, can and will work.
Stay Armed and Stay Dangerous!
Reblogged this on Brittius.