Ana səhifə

BioWarfare and Cyber Warfare a new Kind Of War: Biowarfare And Info warfare


Yüklə 211.5 Kb.
səhifə12/12
tarix26.06.2016
ölçüsü211.5 Kb.
1   ...   4   5   6   7   8   9   10   11   12

10Ongoing And Future Business Practice


We have gone into length to talk about cyber warfare in military scenarios. Very similar scenarios can be played on business grounds and between competing companies.

10.1Business Warfare


Since World War II, business has been customer-oriented, and King Customer has reigned supreme. In the plan of today and the future, a company has to be or will have to be competitor-oriented. The plan will carefully dissect each participant in the marketplace. There might even be a day when the plan will contain a dossier on each of the competitors’ key people, their favorite tactics and style of operation. More and more, successful business campaigns will have to be planned like military campaigns. Companies will have to learn how to attack, to flank competition, to defend positions, and how and when to wage guerrilla warfare.

For these, we may learn from two great works on war: 41



  • Sun-tzu ping-fa or Sun Tzu the Art of War is one of those rare texts that transcends time. Though it was written 6th century B.C., it is arguably still one of the most important works on the subject of strategy today. Written by Sun Wu, Chinese general of the state of Wu, The Art of War was intended only for the military elite of his time period. However, this treatise would later be absorbed by others of influence, from the fearless samurai in feudal Japan to the shrewd business leaders of the 21st century.

  • General Karl von Clausewitz (1780-1831) was one of the greatest writers on war. His magnum opus, On War, is carefully studied in military schools to this day, for its principles are as valid for nuclear as for conventional and guerrilla warfare. Weapons may have changed, but warfare itself is based on two immutable characteristics: strategy and tactics.

These great works have been applied to business: in trading,42 in strategic planning,43 in marketing,44, and others.

10.2Business Cyber War


The business sector has become increasingly dependent on information for decision making and the Internet for dissemination.. Internet users - business, consumers and home users inclusive - now use the Internet for many critical applications as well as online business transactions. A relatively short interruptions in service can cause significant economic loss and can jeopardize critical services.

It is not inconceivable that viruses, worms, Trojan horses, logic bombs, and back doors can be incorporated in software for use by clients so that a vendor can have a handle over the users. Hardware can also be designed with chipping feature for the same purposes. Indeed, in this new world of cut-throat business competition, it is not always economically feasible to develop all critical technologies and supporting software in-house. It is prudent to find a compromise between farming out projects and developing in-house. For example, in the biotechnology sector, it is very common for companies to license software from bioinformatics companies. In an effort for the licensee to avoid possible financial losses resulting from viruses, worms, Trojan horses, logic bombs and back doors, in the licensing agreement between licensor (bioinformatics company) and licensee (biotechnology company), a clause may be included. A sample is provided below:

Viruses; Disabling Codes. Licensor represents and warrants that any Software and computer media furnished to Company pursuant to the License Agreement shall be free from computer viruses and any undocumented or unauthorized methods for terminating or disrupting the operation of, or gaining access to, software, computer systems or other computing resources or data, or other code or features which result in or cause damage, loss or disruption to all or any part of computer systems or other computing resources. Licensor shall not incorporate into Software any termination logic or any means to electronically repossess any Software licensed under the licensing agreement. “Termination logic” shall mean computer code that uses the internal clock of the computer to test for the date and/or time (e.g., Friday the 13th), use count, execution key, or any related techniques, as a trigger to render inoperable or otherwise disable the Software or any related computer system.

“Assassination” in the business sector can also be strategically exercised by hiring away key employees from chief competitors. This has happened. On January 24, 1997, Informix Software Inc., a Menlo Park database software firm, filed a lawsuit against its largest competitor, Oracle Corp. of Redwood Shores, claiming theft of trade secrets. The suit was filed in Oregon’s Circuit Court for Multnomah County in Portland, Oregon, USA. The action stems from Oracle’s recruitment and hiring of 11 employees from the Informix product-development laboratory in Portland. The suit charges Oracle and a former Informix employee with misappropriation of trade secrets and unfair competition. It was seeking injunctive relief and punitive damages.45

Just prior to the incident, Wall Street Journal had predicted Informix to be the database company of the new century. After the incident, and with a legerdemain trick from Oracle by turning news media coverage of the incident into a promotion campaign, Oracle came out the victor in the “assassination” and psychological campaign. During the heydays of dotcoms hype, Larry Ellison, the CEO of Oracle, was briefly the richest man on Earth. The stock of Informix plummeted after the incident and it never recovers to its luster.

“Assassinations” of employees have spurred a lucrative business. Head hunter and executive search agencies spring up to fill the gap. Head hunter agencies are for more routine and project level jobs. Executive search agencies are for management level positions. Essentially, these agencies move the work force from one sector, such as the academic sector, to another, such as the private sector. Or they move the work force from one company to another. At low unemployment, such as during the dotcom heydays, jobs and positions are bountiful and these agencies enjoy their best business. At a time of economic downturn, such as during the demise.com period of 2001, these agencies have a harder time to find vacancies to relocate those out of jobs.

Despite the faltering economy and a flurry of layoff across most industries in 2001, demand for high skilled workers with expertise in biotechnology remains strong. Most companies seem reluctant to relinguish any talent simply to shave costs, and the few employees that have been let go quickly find employment in competing companies.

“Friends and foes” can also be played in the business sector. This comes in the forms of strategic alliances, partnerships, and consortia to pool resources to achieve a goal that would otherwise be impossible or much harder to achieve alone. The International Human Genome Sequencing Consortium of the public sector and Celera Genomics of the private sector are excellent examples.

“Social engineering” is also common in the business sector. Workshops and conferences are fora for social engineering. End-of-the-meeting-day gatherings at pubs are the best places to tune into company secrets or new breakthroughs. It seems, after a few beers and drinks, experts, researchers and scientists talk more freely.

“Psychological wars” are usually waged by companies to their target audiences. For example, pharmaceutical companies use television advertisements to stretch their advertising dollars to the point of misleading viewers by instilling fear such as showing golden age inconveniences and ailments, or else by derogating viewers’ ego such as promoting life-style drugs whose primary functions are to restore social faculties or attributes that tend to diminish with age.

After the September 11 blitz that turned civilian airliners into missiles, killing some 4,000 people, the United States must plan for new and different foes who will rely on surprise, deception and asymmetric weapons, or those meant to overcome the lopsided U.S. edge in conventional arms. “Asymmetric wars” may also be waged in the business sector by smaller, more savvy companies against monopolistic competitors. For example, in the 1980s, while others were losing money in the computer business, Digital Equipment Corporation was making a lot of profit by exploiting IBM’s weakness in small computers.

It is thus not inconceivable that all the information warfare scenarios described above can be nefarious attempts by one company against the other to gain competitive advantage.


11Ending Note


We hope this chapter will not make uncomfortable reading. Our intent is to bring to the readers increased and ongoing awareness and understanding of biowarfare and cyber-security issues, vulnerabilities, and threats to all stakeholders in physical and cyber spaces. We also hope to bring awareness that the business sector is also a war field.

We just cannot deny the deniability.



1 Katherine Stroup, John Horn, and Adam Rogers, “Facing up to our fears”, Newsweek, October 22, 2001, pp. 66-69.

2 M.D. Feldman, J.M. Feldman, Stranger Than Fiction: When Our Minds Betray Us, (American Psychiatric Press, Inc., Washington, D.C., 1998).

3 Robert Taylor, “Bioterrorism report: all fall down”, New Scientist, May 11, 1996, pp. 32.

4 “A new strategic concept for NATO”, Papers on International Security, May 20, 1997, No. 20.

5 John Sopko and Alan Edelman, “Global Proliferation of Weapons of Mass Destruction: A Case Study on the Aum Shinrikyo”, Staff Statement, in Global Proliferation of Weapons of Mass Destruction; in Hearings, Permanent Subcommittee on Investigation, Committee on Governmental Affairs, United States Senate, Part I, 1996, pp. 47-102.

6 Office of Technology Assessment, U.S. Congress. 1993. “Proliferation of Weapons of Mass Destruction”, OTA-ISC-559, (Government Printing Office, Washington, DC), pp. 53-55.

7 T. McKeown, The Origins of Human Diseases, (Basil Backwell, Oxford, UK, 1988).

8 W.H. McNeill, Plagues and Peoples, (Doubleday, New York, 1976).

9 W.M. Denevan, The Native Population of the Americas in 1492, (University of Wisconsin Press, Madison, 1992).

10 Laurie Garrett, The Coming Plague: Newly emerging diseases in a world out of balance, (Penguin Books, New York, 1995).

11 A. Patrick, “Diseases in antiquity: Ancient Greece and Rome”, In: D. Brothwell, and A.T. Sandison (eds.), Diseases in Antiquity, (Charles C. Thomas, Springfield, Illinois, 1967), pp. 238-246.

12 Debora Mackenzie, “Naked into battle”, New Scientist, 28 February, 1998, pp. 4.

13 See Kaiser Permanente Web site, www.kp.org.

14 Geoffrey Cowley, Anne Underwood, and Karen Springen, “A run on antibiotics”, Newsweek, October 22, 2001, pp. 36-37.

15 Julie Creswell, “See this goop? It kills anthrax”, Fortune, November 12, 2001, pp. 147-148.

16 Debora MacKenzie, “Bioarmageddon”, New Scientist, 19 September, 1998.

17 Nell Boyce, “Nowhere to hide”, New Scientist, 21 March, 1998.

18 A Strengthened Biological and Toxin Weapons Convention (BTWC): Potential Implications for Biotechnology – An International information and discussion forum on the potential implications for biotechnology R&D and production of the legally binding protocol being negotiated to strengthen the BTWC

28. - 29. May 1998, Institute of Applied Microbiology, Vienna, Austria.



19 Ken W. Alibek, and Stephen Handelman, Biohazard: The Chilling True Story of the Largest Covert Biological Weapons Program in the World-Told from the Inside by the Man Who Ran It, (Dell Publishing Co., New York, 2000), 336 pages.

20 Debora MacKenzie, “Deadly Secrets”, New Scientist, 28, February, 1998.

21 “Firm but fair”, New Scientist, 28 February, 1998.

22 “Germ for peace”, New Scientist, 8 April, 2000.

23 H. Keith Melton, “Spies in the digital age”, CNN Cold War Experience, Espionage Page, www.cnn.com/SPECIALS/cold.war/experience/spies/melton.essay/.

24 David S. Bennuhum, “Heart of darkness”, Wired Magazine, November 5, 1997.

25 Paul Mungo, and Bryan Clough, Approaching Zero: The extraordinary underworld of hackers, phreakers, virus writers, and keyboard criminals, (Random House, New York, 1992).

26 Christopher H. Schmitt, and Joellen Perry, “World Wide Weapon”, US News & World Report, November 5, 2001, pp. 60-61.

27 Yael Shahar, “Information warfare – the perfect terrorist weapon”, ICT, February 26, 1997.

28 Deborah Russel and G.T. Gangemi, Computer Security Basics, (O'Reilly & Associates, 1994).

29 Reto Haeni, “Introduction to information warfare”, August 23, 1996.

www.guest.seas.gwu.edu/~reto/infowar.



30 John Christensen, “Bracing for guerrilla warfare in cyberspace”, CNN Interactive, April 6, 1999.

31 Katherine McIntire Peters, “Information insecurity”, Government Executive, 31(4), April 1999, (National Journal Group, Inc., Washington), pp. 18-22.

32 Richard D. Pethia, “Information technology – Essential but vulnerable: How prepared are we for attacks?” Testimony before the House Committee on Government Reform, Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations, September 26, 2001.

33 Gene Koprowski, “Hacking the power grid”, Wired News, June 4, 1998.

34 John Arquilla and David Ronfeldt, "Cyberwar is Coming!", article for RAND, 1997.

35 Martin Libicki, “What is Information Warfare?”,  article for the Institute for National Strategic Studies, 1997.

36 Mike Boettcher, “Jordanian intelligence helped thwart attacks, sources said”, CNN News, November 19, 2001.

37 Janine Zacharia, “King Abdullah promises Bush full support”, The Jerusalem Post, September 30, 2001.

38 Hedrick Smith, The New Russians, (Avon Books, New York, 1990).

39 Alvin Toffler and Heidi Toffler, War and Anti War, making sense of today's global chaos, (Warner books 1993).

40 Waller Douglas, “Onward Cyber Soldiers”, Time Magazine, August 21, 1995.

41 The Book of War, (Random House, 1999), paperback reprint of two books: Carl von Clausedwitz, On War, and Sun Tzu, The Art of War.

42 Dean Lundell, The Art of War for Traders and Investors, (McGraw-Hill, 1996).

43 B.H. Boar, The Art of Strategic Planning for Information Technology, (John Wiley & Sons, Inc., New York, 1993).

44 Al Ries, and Jack Trout, Marketing Warfare, (McGraw-Hill, New York, 1986).

45 “Informix sues Oracle over trade secrets”, Business Times, January 24, 1997.

Bioinforming, Biopharming, and Biofarming Hwa A. Lim, Ph.D., MBA

World Scientific Publishing Co. /
1   ...   4   5   6   7   8   9   10   11   12


Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©atelim.com 2016
rəhbərliyinə müraciət