Cyber Spying For A Future War

New information and communications technologies are beginning to profoundly affecting how current and future wars will be waged.  Driven by a combination of 5G mobile networks, long-endurance drones and low-earth-orbit satellites we are moving towards a future where almost everyone will have easy access to real-time geolocation and and  video data.

As a consequence, powerful states and non-state actors alike will soon be able to track US and allied military equipment, detecting patterns of training and operations.

The countermeasures of past decades, from shutter control to careful timing of sensitive force movements, are all but drained of their potency. Nearly 20 years ago, a thesis titled The End of Secrecy by then US Air Force Lt. Col. Beth Kaspar, discussed the implications of transparency to US military competitiveness. 

“Information and communications technologies are having a profound impact, both domestically and globally, on how future war will be waged.... These technologies are providing affordable, worldwide, near real-time, 24-hour, CNN-like news coverage; worldwide Internet access; and more importantly, access to commercial space systems, including remote sensing, communications and navigation..... Unfortunately, this explosion in world-wide information and communication systems creates vulnerabilities for US national security.” 

Kaspar recommended a variety of activities ranging from innovating new doctrine and developing fast decision-making processes to integrating camouflage, concealment, and deception both vertically and horizontally into military operations. 

In 2012, the US  journalist and security specialis David Sanger reported that the United States, in conjunction with Israel, had unleashed a massive virus into the computer system of the Iranian nuclear reactor at Natanz, where the Iranians were engaged in enriching uranium for use in nuclear weaponry, a starling example of effective and covert cyber warfare. More recently Lt. Col. Kaspar has written “DoD should go back to basics and actively incorporate deception into all organisational levels and all levels of warfare.”

Typical deception and denial techniques, such as camouflage, are well known to military operators and warfighters. But these ideas must be advanced in ways that adjust to frequent and continuous monitoring in various bands of the electromagnetic spectrum. Hyperspectral sensors can identify chemical elements from space and could, in principle, make a camouflage canopy stick out like a sore thumb. 

The US national security estalishment's attempts to maintain levels of secrecty and surprise by limiting commercial space-based imaging have created a false sense of security and neglected developments that are not under US regulatory control. 

Even today, exercising shutter control, in the form of ordering an American company to limit its overhead image collection at a certain time and place, is time-consuming and cumbersome. Such requests must pass from the military operator to the Chairman of the Joint Chiefs of Staff, to the Secretary of Defense, and to the Secretary of Commerce, who then notifies the company operating the satellite.  Furthermore, these limits have no bearing on high altitude pseudo satellites including balloons; airplanes; international space companies, foreign governments.

Better deception and denial techniques would allow the military to dispense with the increasingly irrelevant tool of shutter control, lifting the regulatory burden on the domestic commercial remote sensing sector and helping compete on a global scale. It would also allow commercial imaging to support public messaging for national security without revealing the capabilities of the existing government systems.

Advancing and developing new deception and denial techniques may appear costly at first. But the alternative may be more expensive; indeed, restricting remote sensing licenses now would simply delay the cost to a later time when existing methods have become ineffective due to the growth of foreign remote sensing capabilities.

A “don’t look at me” approach to maintaining a military advantage is not feasible anymore. Instead, operators need to find new ways to hide. As Kaspar wrote in her thesis… “The appearance of the written word, a few millennia before the invention of the printing press in the Seventeenth Century, transformed military power...It enabled the preparation and dissemination of complex orders and the delegation and coordination of operational and tactical command functions and organising logistics.

As a result, larger armed forces could be mobilised, logistically supported, and deployed effectively in combat. “Today is information revolution is analogous to the written word revolution. It is the catalyst for economic, political and military change on a global scale... If the US military wants to maintain its competitive position, it must evolve doctrine, acquire superior weapons and systems, and adapt a viable organisational structure. If we fail in this, commercial technology diffusion and advances will outstrip doctrinal and weapon system developments with potentially devastating consequences. 

“After all, as an ancient Roman general said, ‘He who desires peace, let him prepare for war.’“The time to prepare is now.” 

CSIS:         DefenseOne:        Federation of American Scientists:          University of Pennsylvania Law School:

You Might Aso Read:

Shockwave - A Global Transformation In Warfare:

Reshaping The Future Of War With Malware:

 

« N.Korean Hackers Are Working With European Criminals
Cyber Criminals Demand Ransom From Travelex »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

INCIBE-CERT

INCIBE-CERT

INCIBE-CERT is the reference security incident response center for citizens and private law entities in Spain

SQNetworks

SQNetworks

SQNetworks provides a full range of cybersecurity consultancy, services and solutions.

Aspen Insurance

Aspen Insurance

Aspen is a leading diversified specialty insurance and reinsurance company. Products offered include cyber insurance.

Perseus Cyber Security

Perseus Cyber Security

Perseus provides all-around digital protection for small and medium-sized businesses through state-of-the-art software solutions, flexible online training and emergency response.

Veriff

Veriff

Veriff provides highly-automated identity-verification services that prevent fraud like nothing else on the market.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

CyberFortress

CyberFortress

CyberFortress is an insuretech startup offering a new kind of online business interruption policy designed for small business.

Google for Startups

Google for Startups

Google for Startups is Google’s initiative to help startups thrive across every corner of the world.

TalaTek

TalaTek

TalaTek is a full-service risk management firm providing expert services in risk management, cybersecurity, and compliance.

MOXFIVE

MOXFIVE

MOXFIVE is a specialized technical advisory firm founded to bring clarity to the complexity of cyber attacks.

Trilateral Research

Trilateral Research

Trilateral Research provide regulatory and policy advice; develop new data-driven technologies and contribute to the latest standards in safeguarding privacy, ethics and human rights.

Ekco

Ekco

Ekco is one of Europe’s leading managed cloud providers. With a network of infrastructure and security specialists across Europe, we’ve perfected our approach to supporting digital transformation.

AnyTech365

AnyTech365

AnyTech365 is a leading European IT Security and Support company helping end users and small businesses have a worry-free experience with all things tech.

Strivacity

Strivacity

Strivacity lets brands quickly add secure login and identity management capabilities to their customer-facing applications without tying up an army of developers or consultants to do it.

Castlepoint Systems

Castlepoint Systems

Castlepoint Systems is a pioneer in information governance, risk and compliance as a service. An all-in-one solution offering powerful risk management, built in compliance, cybersecurity and audit.

Jericho Security

Jericho Security

Jericho Security is on a mission to defend the world from the new threats of generative AI cyber attacks.