The BEST DEFeNSE is ATTACK
Over a decade Complexity Management Technology (CMT) has been applied to protection, problem prevention, early warnings and identification of crisis precursors in diverse fields and industries (manufacturing, engineering design, economics, finance, traffic control, medicine, etc.).
CODE is a new application of the CMT – the use of complexity as a systemic offensive tool. The goal is not to prevent crises or systemic collapses – the goal is to cause them.
Complexity is a systemic characteristic of networks and processes and is measured in bits. Every system (network, process, infrastructure) possesses at a given time a certain complexity as well as the so-called critical complexity. In proximity of critical complexity the dynamics of systems tends to be dominated by uncertainty, becoming chaotic and uncontrollable. This reduces structural stability, rendering them less resilient hence vulnerable. Systemic collapses happen in the presence of high fragility and propagate quickly in proximity of critical complexity.
The function of the CODE cyberweapon to reduce/neutralize the overall resilience of the enemy by deliberately introducing harmful and targeted complexity into adversarial networks. This induces fragility and structural instabilities leading, potentially, to systemic/catastrophic collapse.
The goal of CODE is to ‘inject’ complexity into adversary’s networks in a surgical manner, damaging or debilitating their hubs which helps propagate on a large-scale the effects of an attack. The goal is to increase network/process complexity to levels in the vicinity of critical complexity, so as to induce systemic fragility, vulnerability and cascading failures.
Inducing critical complexity levels in strategic networks can offer an effective preemptive measure which can soften the enemy’s critical infrastructures/networks prior to a more conventional attack.
Complexity-based aggression, when implemented on a large-scale (i.e. when targeted at large networks or interconnected systems of networks) can offer a ‘subtle’ low-intensity and low-visibility intervention in virtue of its highly distributed nature. In other words, instead of a highly concentrated attack, a more diluted action may result more difficult to trace and counter and, at the same time, lead to devastating systemic consequences. What it takes is plenty of supercomputer fire power. And the CMT.
When it comes to attacking very large highly complex systems or networks, which may contain millions of nodes, there are two questions that are key to the success of an aggression:
where to strike - an attack should maximize damage with given energy expenditure. Good targets for attack are complexity hubs, which do not necessarily correspond to locations of maximum traffic or transfer of energy or data. Complexity hubs happen to drive the fragility of a network and they are often non-intuitive.
when to strike - timing is always a crucial factor. In highly complex systems the mentioned complexity hubs change over time. It is crucial to stike a system not just at its weakest points but also to do so when maximum damage can be expected.
In a highly complex and dynamic context it is not easy to answer the above questions with conventional technologies. This is because conventional techniques do not measure complexity - the enemy of large and critical inftastructures.
In addition to the CODE cyberweapon, we offer complexity-based defensive technology which provides precious early-warnings of system-level anomalies or systemic collapse.
Systemic collapse is a catastrophic failure of an entire system or network, that is triggered by an event causing severe structural instability. Real-time monitoring of the complexity of large and critical systems, infrastructures or mobile platforms, such as aircraft carriers, submarines or strategic bombers, provides a quantitative and novel assessment and indicators of:
Systemic complexity and overall state of health
Resistance to shocks - endogenous and/or exogenous
Critical complexity - the level of complexity at which a given system inevitably becomes non-governable
Complexity drivers - a ranked list of potential problem sources
This approach has been tested successfully in diverse industrial sectors. Since 2005.