Sabotaging Critical Infrastructure as a Tool of Cyber Warfare
Mostafa Elframawy
Chief Judge & PhD Researcher.
Sabotaging Critical Infrastructure as a Tool of Cyber Warfare
Conflict in the contemporary international environment is no longer managed solely through direct military confrontations; rather, it has taken on more complex forms based on continuous pressure without reaching the threshold of conventional war. In this context, the importance of critical infrastructure—including ports, railways, undersea cables, satellites, and navigation systems—has emerged as a new arena for this type of conflict.
The question is no longer related to a state's capacity for traditional military deterrence, but rather its ability to maintain the continuity of its systems’ operations under simultaneous and multi-dimensional pressure in light of cyberattacks on its critical infrastructure.
First: The Logic of Attrition Instead of Destruction
Modern cyber operations rely on a repetitive pattern based on limited disruption. These operations do not aim for widespread destruction, but rather to cause recurring disturbances that confuse the management of the targeted state.
This pattern is evident in incidents of damaging undersea cables, disrupting communication lines, or causing temporary malfunctions in supply chains. Although each incident alone may seem limited in impact, their repetition leads to changing the operating environment itself, imposes additional costs, slows response times, and creates a continuous state of distrust in defensive capabilities.
Over time, this accumulation turns into a strategic pressure tool that does not require direct military escalation.
Second: Ports
Ports represent a vital meeting point between the civilian economy and military capability.
They are not merely logistical hubs, but platforms for converting trade flows into operational capabilities during times of crisis, whether by supporting reinforcements, facilitating supplies, or enabling evacuation operations.
The danger regarding ports lies in the fact that they are complex and interconnected systems, combining physical, digital, and human infrastructure. This entanglement makes them vulnerable to various forms of pressure that do not require their destruction, but rather their partial disruption. Data manipulation or a limited breach of operating systems may lead to a temporary halt in operations, which is sufficient to cause confusion within the government’s working system.
Furthermore, threats related to drones, organized crime, and ambiguous maritime activities increase the fragility of this environment, as they all provide low-cost, high-impact tools to impose disruptions that are difficult to attribute directly to a specific state.
Third: Railways
In the context of crises, railways transform from a means of civilian transport into a decisive element in supporting military capability, given their ability to transport heavy equipment and supplies with an efficiency that road networks cannot provide.
For this reason, railways represent an ideal target for cyber operations. Instead of targeting them directly, they can be weakened by disrupting signals, causing malfunctions at switching points, or creating repeated delays. All these actions or targets, despite their simplicity, lead to slowing down reinforcements and reducing the capacity for military supplies.
Fourth: Space
Modern systems increasingly rely on satellites in the fields of communications, navigation, and reconnaissance, which has made them a field for cyberattacks. Jamming, manipulation, or cyber-hacking can turn data into a source of doubt, leading to a loss of coordination and a decline in operational effectiveness.
The danger also lies in the fact that these systems are not isolated; they rely on ground infrastructure, digital networks, and supply chains, which expands the scope of a cyberattack's impact.
Fifth: Drones as a Low-Cost Pressure Tool
Drones have become one of the most prominent tools of hybrid operations due to their low cost, ease of use, and the difficulty of attribution. They can be employed in surveillance and information-gathering missions.
The problem lies not so much in the technical capabilities of these systems as in the legal and regulatory framework governing them. As they are a modern weapon, there is still ambiguity in authorities and overlapping jurisdictions in dealing with these drones—all factors that slow down response and increase the effectiveness of this type of threat.
Sixth: Jamming Navigation Systems
Jamming Global Navigation Satellite Systems (GNSS) represents one of the most complex cyber pressure tools, as it does not lead to direct disruption but rather to a gradual decline in the systems' accuracy and reliability.
The distinction between jamming and spoofing here is fundamental: while the former leads to signal loss, the latter provides misleading data that appears correct, increasing the risk of operational error.
This affects multiple sectors, from aviation and maritime navigation to logistics, energy, and communications.
Seventh: The Law and Policy Gap
Cyber operations function in spaces not clearly covered by law; they do not reach the level of a military attack, yet they exceed accidental incidents, creating a challenge in determining the nature of the response. Traditional legal frameworks require a high level of evidence, while cyber operations rely on ambiguity.
In this context, the problem is not the ability to monitor the threat, but the ability to act against it in a timely manner, making the time factor a pressure tool in itself.
Eighth: Toward an Expanded Understanding of Multi-Domain Security
These challenges show that the concept of multi-domain operations is no longer sufficient if limited to traditional military dimensions. It has become necessary to integrate critical infrastructure, the civilian sector, regulatory bodies, and the industrial sector within the operational framework of national security.
Modern threats target the gaps between these components and exploit the lack of coordination and speed in information exchange. Therefore, enhancing resilience requires a comprehensive approach based on the integration of these elements rather than dealing with them as separate sectors.
Conclusion
Cyber strategy is not based on direct destruction, but on causing a gradual erosion of the ability to function. It does not aim to bring down systems, but to weaken them, slow them down, and reduce confidence in them.
In this framework, security is not measured by the absence of incidents, but by the ability of systems to continue operating despite being targeted. As this pattern of conflict escalates, the primary challenge becomes not just possessing capabilities, but ensuring their continuity under pressure.
Accordingly, the protection of critical infrastructure is no longer a technical or service-related matter; it has moved to the heart of the national security equation and has become a major arena defining the features of conflict in the twenty-first century.
Leave a Reply
We welcome your thoughts and feedback on this post. Please keep your comment respectful, on-topic, and free of spam or promotional links. Your email address will not be published, and all comments are reviewed to maintain a constructive conversation
Required fields are marked *.

عربي






