Asymmetrical
This is a term that may elude you. This is especially true when the term is applied to warfare. A definition of asymmetrical; “is the absence of, or a violation of, a symmetry”. In warfare it represents a disproportional result from a belligerent action. Israel has one of the most powerful militaries in the world with nuclear capability. But Israel has been stymied by asymmetrical actions. A single bomber or rocket can have the psychological effect of a major military operation. The World Trade Center action resulted in the death of a dozen people in its execution. It has precipitated billions of dollars of war expenses, culture change and a thousand soldier deaths for America.
In warfare asymmetrical actions can be devastating. This is particularly true for the very powerful. America is conducting a war on peer-to-peer technology. It is even enlisting its Allies. America has spent billions of dollars to create a worldwide communication monitoring capability beyond imagination. It is accomplished by tapping into the network backbones for communication. America has also automated this monitoring and analysis capability. In tapping several thousand items to monitor is manageable, several million short duration peer-to-peer connections is not.
Peer-to-peer works by establishing a connection between two computers through a third party machine. Once the connection is established, the third party drops out. America would have to identify and tap each individual peer-to-peer connection. The capability does not exist. So America is trying to keep peer-to-peer as a technology from greatly proliferating in the world. It is an asymmetrical threat. This means a couple of thousand dollars of computer equipment can thwart a hundred billion dollar capability.
It was reported that the Pentagon security was breeched and information about the latest jet in development was obtained. This attack was through the internet. It has also been reported that the electric grid and water works have been breeched. America is not saying who is behind these efforts. However, it is suspected that China is working on a cyber attack strategy. To America this would represent an asymmetrical capability.
America increasingly finds itself in asymmetrical situations in business and industry, infra-structure, education and warfare.
This is a term that may elude you. This is especially true when the term is applied to warfare. A definition of asymmetrical; “is the absence of, or a violation of, a symmetry”. In warfare it represents a disproportional result from a belligerent action. Israel has one of the most powerful militaries in the world with nuclear capability. But Israel has been stymied by asymmetrical actions. A single bomber or rocket can have the psychological effect of a major military operation. The World Trade Center action resulted in the death of a dozen people in its execution. It has precipitated billions of dollars of war expenses, culture change and a thousand soldier deaths for America.
In warfare asymmetrical actions can be devastating. This is particularly true for the very powerful. America is conducting a war on peer-to-peer technology. It is even enlisting its Allies. America has spent billions of dollars to create a worldwide communication monitoring capability beyond imagination. It is accomplished by tapping into the network backbones for communication. America has also automated this monitoring and analysis capability. In tapping several thousand items to monitor is manageable, several million short duration peer-to-peer connections is not.
Peer-to-peer works by establishing a connection between two computers through a third party machine. Once the connection is established, the third party drops out. America would have to identify and tap each individual peer-to-peer connection. The capability does not exist. So America is trying to keep peer-to-peer as a technology from greatly proliferating in the world. It is an asymmetrical threat. This means a couple of thousand dollars of computer equipment can thwart a hundred billion dollar capability.
It was reported that the Pentagon security was breeched and information about the latest jet in development was obtained. This attack was through the internet. It has also been reported that the electric grid and water works have been breeched. America is not saying who is behind these efforts. However, it is suspected that China is working on a cyber attack strategy. To America this would represent an asymmetrical capability.
America increasingly finds itself in asymmetrical situations in business and industry, infra-structure, education and warfare.