De Philosophia Scotica
De Philosophia Scotica
De Philosophia Scotica
Nikolaos C. Moulios serves as the representative of the European Student Think Tank (EST) to
Greece since September 2018. Also, he is an international affairs analyst with a focus on Science
and IR interaction in the Student Association of International Affairs (SAFIA). He is especially
interested in European and Eurasian affairs.
Source: A Review on Internet of Things for Defense and Public Safety, Sensors Magazine
Introduction
Our alliance faces complex challenges: from terrorism to political extremism and from the
European migrant crisis to low intensity naval crises. NATO should provide security to its members
in a context of a significant socio-economic transformation to a completely data-driven society.
Both states and non-state actors already, use the cyberspace for political warfare,
intelligence gathering, and attacks to critical infrastructure. In a world which is controlled by
1
intelligent algorithms and sensors without sufficient human supervision, few malicious hackers can
cause disasters of magnitudes in certain cases comparable to warfare. Furthermore, the IoT will give
them approximately 50 billion “eyes” in the more sensitive aspects of our lives, both public and
personal. The analysis of data gathered from that sensors gives to their owner a significant strategic
advantage, more important than the ownership of oil wells. NATO is the most capable organisation
to plan and imply a strategic dogma for cyber-warfare, using new technologies like quantum
cryptography, photonics and blockchain in a close partnership with academia, industry and other
organisations such as the EU.
The development of IoT is based mainly on four pillars: 1) hardware (sensors, controllers
etc) are becoming more powerful, cheaper and smaller with exponential rates. 2) emerging
technologies like 5G networks increase data transfer speed and offer cost and energy efficient
connectivity solutions 3) Data processing and storage capacity increases rapidly. Innovative
technologies like biocomputers, DNA based storage devices and quantum computers may affect
significantly this sector in the near future. 4) Developments on software, especially on Artificial
Intelligence and deep learning algorithms as well as big data analysis increase the analytical
capacity of systems allowing evidence-based forecasts using huge amounts of data collected by
multiple sources .
2
Many technological challenges should be addressed to achieve the full potential of IoT. A
significant challenge is the integration and combination of data collected from heterogeneous
sources; that basic prerequisite to achieve the best efficiency as well as cost reduction of a cyber-
physical system needs common communication protocols (standardisation). Furthermore, the
continuous operation of IoT on a global scale needs significant distribution of energy sources, new
technologies like biotechnology and nanotechnology along with the large scale utilisation of
renewable energy sources may provide a sustainable solution. Lastly, the protection of those
systems by accidental and malicious actions are technically complicated. Safety, Security and
Privacy challenges rising while we should keep a sustainable balance between effectiveness and
cost, as well as openness and protection. Because of the disruption of IoT technologies, except of
critical organisations, businesses and citizens should be aware about these challenges.
Cyber-Physical networks are highly valuable for both businesses and states. They support
informed decision making using pattern recognition, prevent crises by the early detection of
(possibly harmful) changes, and decrease the cost but can cause extremely serious, large-scale
dysfunctions in an organisation, city, and state level. And of course, such attacks could be initiated
by state or non-state actors, and could also be addressing critical infrastructure and/or critical
governance processes, or could even be harming the reputation and/or relations of individuals in
important positions.
Every device connected with the internet, immediately or not, should be always considered
as a potentially insecure device. Every sensor is a potential “eye”, that might prove more efficient
than the most capable spy on the monitoring of one parameter. The access to the data collected by
3
the sensors of a completed IoT system of a target is a high-value intelligence, actually an fMRI of
this particular system/infrastructure. A “smart mega-city” for example, using the internet of
Everything to control and motion every aspect of life may be attacked by evil actors or it can be
recorded in multiple layers providing a strategic advantage to the owner of the data.
5
NATO recognizes the cyber-defence as a core task of collective defence. With the
assumption that the international law applies in cyberspace, NATO should, except the protection of
its own networks, develops a common strategy in cyberspace, specialised regulatory and technical
guidances, as well as, doctrines while it provides training, technical, financial support in cyber-
defence related projects. Since 2008 (Georgia-Russia conflict and cyber-attack against Esthonia)
NATO start developing its cyber-defence capabilities with the founding of the Cooperative Cyber
Defence Centre of Excellence in Tallinn, Estonia. Since 2012 the NCIA (NATO Communications &
Information Agency) is the executive agency which ensures the protection of NATO’s systems.
Another significant development is the extended cooperation with the EU since 2016 in a technical
level, cyber-security, and emergency response. In the operational level, after the 2017 ministerial
agreement on a Cyberspace Operations Centre (will be fully operational in 2023) the NATO
capability on cyber operations is significantly increased.
The new cyber-environment which is dominated by artificial intelligence, big data sets, IoT
and quantum computing ( which can decrypt many of the previously "unbreakable" encryption
algorithms) requires a multifaceted strategy. In broad terms, an emphasis needed in the sectors of:
1. Training and Exercise, with the organisation of annual NATO exercise on Cyber Warfare and
courses provided to allies’ civil & critical infrastructures servants (both operational and in
systems protection and security);
3. Research & Development, via Science for Peace and Security projects, and cooperation with
academia and industry as well, with an emphasis in AI, IoT systems, and Social Engineering
fields;
4. Public Awareness, with an emphasis in targeted groups (sensitive industries, journalists etc);
6
7. Development of guidelines on IoT networks protection, especially in critical infrastructures.
Conclusion
Nato has a leading role in the new cybersecurity partnership, shaped by technological
challenges as well as disruptive, emerging technologies like IoT, especially in innovation and
development of new solutions, policy-making and with a focus on the protection of critical
infrastructures. Also, a data-based security approach protects the new fuel by malicious actors, like
“thieves” and terrorists. Furthermore, other emerging technologies in material science, networks
and energy will boo the IoT. To protect “oil wells” and our strategic advantages we should
implement innovative technological solutions while increasing awareness and grow a security
culture.
List of References
1. Lewis J.-A., Managing Risk for the Internet of Things, CSIS, Washington DC, 2016
4. Alexander Klimburg (Ed.), National Cyber Security Framework Manual, NATO CCD COE
Publication, Tallinn 2012
5. Popescu N., Secrieru N., HACKS, LEAKS AND DISRUPTIONS, RUSSIAN CYBER
STRATEGIES, EU ISS, Paris, 2018
6. Fraga-Lamas, P., Fernández-Caramés, T.M., Suárez-Albela, M., Castedo, L., & González-
López, M. (2016). A Review on Internet of Things for Defense and Public Safety.
Sensors.
7. Covington M., Carskadden R., Threat Implications of the Internet of Things, NATO CCD COE
Publications, Tallinn, 2013
7
8. Gazula M., Cyber Warfare Conflict Analysis and Case Studies, Working Paper CISL# 2017-10,
2017
9. Defense Policy and the Internet of Things Disrupting Global Cyber Defenses, Deloitte
10. Mapleston M., The Internet of Things for Munitions Health Management, NATO
11. J. Publication 3-12, Cyberspace Operations, US Chairman of the Joint Chiefs of Staff (2018)