Critical infrastructures
In Spain we have standardized that, if we turn on the tap, drinking water comes out, and that we have uninterrupted electricity 24 hours a day, all year round. We also have a telephone connection, and according to data from MINECO, 81% of the Spanish population has Internet coverage at more than 100 Mbps.
Moreover, we have a multimodal transport network that allows us to travel at any time to any place in the territory in less than 24 hours. We also have a health care guarantee, as well as a large number of daily actions that are supported by a set of infrastructures that make this possible.
These infrastructures are the so-called Critical Infrastructures, which according to the European Directive 2008/114/EC of December 8, 2008 are defined as follows:
"The element, system, or part thereof, located in member states that is essential for the maintenance of vital social functions, health, physical integrity, safety, and the social and economic well-being of the population, the disruption or destruction of which would seriously affect a member state by rendering it unable to maintain those functions."
Consequently, and in order to establish a guarantee of operation of these infrastructures, in Spain there is the Critical Infrastructure Protection Law (PIC Law 8/2011), which is complemented by Royal Decree 704/2011, whose objectives are: To establish the strategies that allow directing and coordinating the actions in relation to the protection of critical infrastructures. And to regulate the obligations to be assumed by the Administrations and their operators.
This Law contemplates 12 strategic sectors to which a critical operator may belong, among which we could selectively mention:
A disruption or interruption in its operation due to natural causes (e.g. an earthquake affecting the power supply or the electrical grid) or man-made causes (e.g. a terrorist attack or a cyber attack on a nuclear power plant or a major airport) could have serious consequences for the normal functioning of society, by the standards to which we are accustomed.
The exponential society
On the other hand, at the same time that disruptive and exponential technologies are created and applied in the development, maintenance and protection of critical infrastructures, the question arises as to what the impacts of these technologies may be on these infrastructures and on society.
Before continuing, let's look at a historical anecdote of how technological innovations can have a decisive influence on the environment in which they are developed:
In 1850, Isabel II ordered the construction of the fortress of La Mola in Mahón (Menorca), with the aim of protecting the island from possible attacks by the French and English. This fortress was completed in 1875 and a technological evolution of artillery on ships left it outdated before its inauguration.
In a linear era, and long before the emergence of accelerator technologies or exponential technology, we could already find cases of the power of a technological innovation, in which one of these innovations had disruptive consequences.
Today, in the 21st century, we see brands or companies such as Kodak, Nokia, Blockbuster Video or BlackBerry, which have also been surprised, surpassed, and in some cases even buried by the avalanche and confluence of accelerating technologies. Technological changes with great economic and social impact.
Technology has always had a transformative and revolutionary power. Today, this power is exponential, why is this so? Among other things, because of Moore's Law, which states that approximately every 2 years the number of transistors in a microprocessor doubles. This has allowed the parallel development of several disruptive technologies.
New Capabilities?
Due to the confluence of the latest technological advances, such as the development of renewable energy, the digitalization of organizations, the creation of an internet of things (IoT), the creation of 5G, the development of autonomous mobility, as well as artificial intelligence, has generated a transversality that has already altered influences and is balancing economic powers, while generating new Capabilities ready to be exploited.
Faced with this acceleration of innovations based on technological development, what can we do to adapt to it and take advantage of this increase in Capabilities?
On the other hand, seeking a balance with another network approach, for example, distributed networks, will lead to greater resilience. In the balance of the efficiency-resilience tandem, a good system of networks crucial to the interests of society could be achieved.
Vulnerabilities and protection strategies.
The threats that could jeopardize the vital and strategic interests of Spanish society with respect to its critical infrastructures have been enhanced and have a greater capacity for impact, precisely because of the possible use of the aforementioned disruptive and exponential technologies.
Disruptive technologies, in addition to accelerating the environment, generate complexity, which in turn creates systems with greater fragility. Protecting against the fragility of the new systems created becomes a critical issue.
Consequently, it is necessary to establish mitigation measures and strategies to mitigate the perverse effects of these technologies used in the context of the following threats:
Examples of strategies and actions to be taken to protect against the vulnerabilities mentioned above include:
In conclusion, we have a wide range of sectors with critical infrastructures on which the functioning of our society as we know it rests. In turn, these infrastructures coexist with the development and implementation of a battery of technologies of great technical, economic and social impact.
It is becoming increasingly necessary to establish a strategic framework for action to take advantage of the development of disruptive and accelerating technologies to provide new Capabilities in the evolution of critical infrastructures. On the other hand, a protection and development plan for the aforementioned infrastructures should be considered, taking into account possible attacks and malicious use of these technologies against them.