Video Summary

The First Targets of a Modern War (And Why)

Sideprojects

Main takeaways
01

Modern conflict often begins with cyber and electronic attacks that disable communications and sensors before any troops move.

02

Air-defense and radar networks are priority targets to secure air superiority and allow precision-strike aircraft to operate.

03

Attacking transmission components (like large power transformers) can cause longer outages than striking power plants.

04

Undersea internet cables and satellites are physical vulnerabilities that adversaries can exploit to sever connectivity.

05

Events like Stuxnet and the 2022 satellite modem outage show cyber operations can produce decisive, physical effects.

Key moments
Questions answered

What happened to satellite communications on February 24, 2022?

A coordinated cyberattack knocked out tens of thousands of satellite modems across Europe, disrupting Ukrainian military communications and civilian internet services just before the Russian invasion.

Why do militaries target air-defense radars early in a campaign?

Destroying or forcing radars offline denies the enemy the ability to detect incoming aircraft, creating corridors for stealth and strike aircraft to operate with far lower risk.

Why are large power transformers targeted instead of power plants?

Large transformers are costly, specialized, and have long manufacture lead times; destroying them can produce prolonged outages that are harder to fix than damaged power plants.

How physically vulnerable is the global internet?

Roughly 95% of international internet traffic travels through about 570 undersea cables—concentrated, physical points that can be sabotaged or damaged to cut connectivity.

What made Stuxnet a turning point in cyberwarfare?

Stuxnet demonstrated that malware could cause direct physical destruction—damaging Iranian centrifuges—showing cyber operations can achieve strategic effects without kinetic forces.

The Silent Start of Modern Warfare 00:24

"Most people think war starts when troops cross the border or when planes appear on the horizon. But really, that comes second."

  • Modern warfare begins long before the sight of troops or aircraft; it starts with invisible attacks that disrupt critical infrastructure.

  • On February 24, 2022, a coordinated cyber attack knocked out tens of thousands of satellite modems across Europe, severely impacting communications, especially for the Ukrainian military.

  • This "opening move" demonstrates the shift in military strategy where cyber warfare precedes traditional combat.

  • By crippling communications, modern militaries are able to effectively control the battlefield before any physical fighting begins.

Targeting Air Defense Systems 01:07

"If you can blind your enemy's air defenses, you own the sky."

  • The first step in modern combat often involves targeting enemy air defenses to establish air superiority.

  • During Operation Desert Storm in 1991, the U.S. targeted Iraqi radar systems before conventional forces were deployed. This strategy was crucial for allowing stealth aircraft like the F-117 Nighthawk to carry out successful missions.

  • The success of the Apache helicopter missions aimed at radar stations illustrates the importance of eliminating these targets first to create a gap in enemy defenses.

The Impact of Communication Breakdown 05:15

"The problem is that there is a gap between what militaries plan for and what they actually end up building."

  • Effective communication is critical in any military operation, and the attack on communication nodes in Iraq during Operation Desert Storm highlights this.

  • Once the Iraqi communication systems were destroyed, local commanders were left isolated, unable to coordinate their operations. This resulted in a fragmented defense where individual units acted independently without a strategic overview.

  • Colonel John Warden III's Five Ring Model for targeting strategy emphasizes the importance of disrupting the enemy's ability to communicate and command, arguing that removing leadership effectively dismantles fielded forces.

The Importance of Communication in Warfare 08:34

"A military with functioning weapons but no communication is less dangerous than one with worse weapons and a working communication network."

  • The Gulf War demonstrated that overwhelming force against a nation’s command structure can decisively alter the course of a conflict. In just the first six days, the coalition targeted strategic nodes that held everything together, severely impairing Iraq's coordination.

  • Once Iraq's command and control network was neutralized, Iraqi units were left without the necessary intelligence or coordination to mount an effective defense. Many units awaited orders that would never arrive.

  • Despite having one of the largest and most modern armies at the time, Iraq's inability to communicate rendered their strong military capabilities ineffective.

Changing Tactics: From Power Plants to Transformers 10:40

"Power plants, even badly damaged ones, can be patched back together surprisingly fast."

  • Historically, the destruction of power plants was seen as the key to crippling a nation's electricity supply. However, recent conflicts, such as those in Ukraine, revealed that power plants can often be quickly repaired despite significant damage.

  • In response, Russian military tactics evolved to target large power transformers (LPTs), which are essential for stabilizing electricity transmission across the national grid. The destruction of these components, which are costly and time-consuming to replace, can halt electrical supply for extended periods.

  • Unlike power plants, which can be restored relatively quickly, the large transformers used in electric grids have long lead times for production and cannot be repaired without specialized manufacturing.

Nuclear Power and Grid Vulnerability 11:25

"The bottleneck in any electrical system isn't generation; it's the transmission and distribution of electricity."

  • Understanding the importance of infrastructure, Russia focused on incapacitating substations that connect nuclear plants to the electrical grid rather than targeting the reactors themselves, which could trigger catastrophic consequences.

  • The lesson from the Gulf War was clear: it is often more effective to undermine the distribution system of electricity rather than directly destroying generation capabilities. During the Gulf War, coalition forces targeted Iraq's transformer yards and switching stations to neutralize their electrical grid without destroying expensive power plants.

  • Ukraine has begun reinforcing its electrical grid against such vulnerabilities by moving critical components underground and promoting decentralized energy production to mitigate the risks associated with concentrated infrastructure.

The Physical Vulnerabilities of Internet Infrastructure 13:44

"About 95% of all international internet traffic travels through roughly 570 physical cables lying on the ocean floor."

  • The internet, often perceived as an intangible entity floating in the cloud, is significantly dependent on a physical network of undersea cables, which are susceptible to physical attacks.

  • Previous incidents, such as the explosion along the Nord Stream pipeline, underline the risks associated with undersea infrastructure. Despite heavy surveillance, explosives were able to rupture critical pipeline lines.

  • With countries like Russia actively mapping undersea cable routes, the vulnerability of internet infrastructure continues to pose a significant risk, making effective cybersecurity strategies a pressing issue.

Space-Based Communication and GPS Vulnerability 15:35

"GPS jamming and spoofing have become routine in certain parts of the world."

  • The dangers associated with space-based communication systems have also escalated, especially with the advent of missile tests that have shown the capability to destroy satellites in orbit, generating debris clouds that threaten existing satellites.

  • Practical implications become evident as military operations depend heavily on GPS technology, which when disrupted, turns precision-guided munitions into ineffective and imprecise weapons.

  • The increasing occurrence of GPS signal disruption highlights the modern military's dependence on communication technologies for effective operations, thereby stressing the need for resilient systems amid the growing vulnerability of such infrastructures.

The Vulnerability of Modern Warfare 16:49

"The most connected society in history is also the most vulnerable to disconnection."

  • The last three decades of American military dominance hinge upon a network of satellites that can be easily compromised. This makes conventional military assets like warships reliant on backup systems, such as celestial navigation using sextants.

  • With the United States being the most interconnected civilization, this connectivity poses a significant threat as adversaries can disrupt crucial points, leading to grave vulnerabilities in times of conflict.

The Evolution of Cyber Warfare 17:50

"Stuxnet was the moment the definition of warfare changed."

  • Historically, cyberattacks were viewed simply as nuisances, addressing data theft and minor disruptions rather than posing real threats to human safety. However, the emergence of sophisticated malware like Stuxnet in 2010 marked a turning point.

  • Stuxnet successfully targeted Iran's nuclear facilities, leading to the destruction of uranium enrichment centrifuges without any physical military presence, thus transforming perceptions of conflict.

The Prelude to Modern Conflicts 21:57

"Modern war starts quietly, weeks before any missile flies; cyber operatives are already underway."

  • The maintenance of war is now often initiated with cyber infiltration weeks before traditional military action takes place. This includes placing malware in critical infrastructures like power grids and communication networks, remaining dormant until activated.

  • The sequence of modern warfare is meticulously timed: the first phase typically involves disabling defense systems, followed by targeting command centers, and subsequently dismantling vital resources to ensure troop mobility and effectiveness in combat situations.

Historical Insights and Tactical Simulations 23:20

"The Gulf War proved the sequence works."

  • The Gulf War exemplified the effectiveness of the modern warfare sequence, as air superiority was established quickly, leading to a severely degraded Iraqi military by the time ground forces engaged.

  • The subsequent swift ground operations highlight how the essential factors in war often occur in the unnoticed steps of cyber and satellite dominance rather than the visible battles depicted in media.