Cyber Warfare Creates Ghosts In Our Machines

Almost our entire modern way of life, from communication, social engagement, government, commerce to conflict, often relies on the InternetTechnological developments have completely changed social life by creating new cyber and technological inventions that even recently were considered science fiction and yet now are everyday use.

These changes stem from the growing importance of advanced technologies like AI, cyber, drones, cloud computing, data analytics and hypersonic missiles. These are fast becoming the foundation technologies for new mission areas and strategies and the threat of cyber warfare presents a multitude of threats towards any nation.

Cyberwarfare refers to cyber attacks executed by one country or state against another; however, it can also be an attack by hackers or terrorists aimed at furthering the mission of the individual nation. In most cases, the computers are not the final target, but the systems they control.

A well-planned attack could alter stock prices, knock out traffic light systems, knock out emergency services, weaken military responsiveness and disrupt the economy. Cyberwarfare can be launched instantly, leaving room for speculation and making it difficult to counter. The weapons of cyberwar are like those being used by cyber criminals. It can vary from the very sophisticated to the complete basic.

At the most basic level a cyber attack can be used to support traditional warfare methods. For example, tampering with the operation of air defences via cyber means a hacking attack that facilitates an air attack.

This time has also seen a dramatic growth of cyberspace which is now the modern threat environment has remade th globe as we see it and country borders in the electronic world don’t operate and cyber warfare is taking place. Adversaries of the United States and allies are using the cyberspace domain as a platform for warfare where rule of law is abstract and limitations are mostly self-imposed.

The military importance of cyber has been growing fast and there is still an active debate regarding how cyber warfare should be defined and no absolute definition is widely agreed, as can be seen in the recent events in Crimea and the operationalisation of the Stuxnet virus in Iran.

Hybrid warfare is the use of political, economic, technological, and informational tools that together make up the phenomenon of social infrastructure.

One particular element of this type of event, human political protest, is now known to be a very important component in what we are learning about hybrid warfare.This is supplemented by military means of a concealed character, including carrying out actions of informational conflict, combined arms tactics, cyber operations and the actions of Special Operations forces.

Cyber weapons are accessible to anyone with the requisite computer expertise; not just governments, but individuals too. Indeed, non-governmental individuals and bodies have already caused significant damage. For instance, 2017’s WannaCry virus, which targeted the UK National Health Service’s outdated Windows operating systems.

Even if cyberspace is still not the subject of any binding treaty, cyber-operations remain the preserve of the largest powers because of their complexity. 

Now hacktivists use their knowledge and software tools to gain unauthorized access to computer systems they seek to manipulate or damage not for material gain or to cause widespread destruction, but to draw attention to their cause through well-publicised disruptions of select targets. Anonymous and other hacktivist groups are often portrayed in the media as cyber-terrorists, wreaking havoc by hacking websites, posting sensitive information about their victims, and threatening further attacks if their demands are not met. However, hacktivism is more than that. Actors are politically motivated to change the world, through the use of fundamentalism. Groups like Anonymous, however, have divided opinion with their methods.

Each new technology is quickly obsolete, posing the question of the ability of actors to remain ahead. According to a recent National Cyber Power Index Report published by Harvard University’s Belfer Center, China ranks second, after the US, in cyber power.The report has identified seven national objectives that countries pursue using cyber means including surveillance, foreign intelligence collection, and cyber defenses.  “Countries with high levels of both intent and capability for a specific objective are among the highest-ranking countries in the NCPI...These countries both signal in strategies and previously attributed cyber-attacks that they intend to use cyber to achieve policy goals and have the capabilities to achieve them” says the Report.

Currently the United States, China, and Russia are sharply increasing their investment in technology to the hunt for mobile missiles. 

  • The United States is doing this to find missiles in North Korea, Iran and other places. 
  • China uses satellite and cyber analysis to track maritime targets like ships and aircraft. China also uses its cyber hacking as a focus on stealing intellectual property, trade secrets, and technological advancements in Artificial Intelligence to gain market advantages for its China based corporations, says the threat intelligence experts at IntSights.
  • Russia’s emphasis is on disruption of NATO’s ability to project military power into Poland, the Baltics, and Ukraine. 

Currently, cyberwarfare is an uncharted area, but by increasing security and collecting intelligence, countries can build new policies and strengthen their security.

Foreign Policy Research Inst:       US National Defense University:   Association of MBAs:    Anadolu:    Portswigger:

Infosecurity Magazine

You Might Also Read: 

Cyberwar Vs. Traditional Conflict:

 

« Australia Wants Google & Facebook To Pay For News
Too Many Employees Use Their Own Devices To Access Corporate Data »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

SAMATE

SAMATE

The Software Assurance Metrics And Tool Evaluation project is an inter-agency project between the US Department of Homeland Security and NIST.

e2e-assure

e2e-assure

e2e Protective Monitoring and Security Operations Centre (SOC) Service is a complete cyber defence service to protect your critical assets from cyber attacks and GDPR breaches.

Resilia

Resilia

RESILIA is a comprehensive portfolio of tools and training to help your organization achieve global best practice in cyber security.

Brainloop

Brainloop

Brainloop's security architecture enables you to work on and distribute strictly confidential documents both within and beyond the firewall.

Cybersecurity Competence Center (C3)

Cybersecurity Competence Center (C3)

The Cybersecurity Competence Center was created to further strengthen the Luxembourg economy in the field of cybersecurity.

Assertion

Assertion

Assertion secures your collaboration (UC/CC) systems from cyber risks. Enforcing the right set of controls and monitoring them continually brings down risk to acceptable levels.

National Initiative for Cybersecurity Education (NICE) - USA

National Initiative for Cybersecurity Education (NICE) - USA

NICE is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development.

Google for Startups

Google for Startups

Google for Startups is Google’s initiative to help startups thrive across every corner of the world.

Guardian Digital

Guardian Digital

Guardian Digital makes email safe for business. Threat-ready business email protection. Fully supported.

Intersistemi Italia

Intersistemi Italia

Intersistemi is a leading Italian company in the field of information technology integration and digital transformation including cybersecurity.

Chestnut Hill Technologies (CHT)

Chestnut Hill Technologies (CHT)

CHT provide Best Practices IT Cybersecurity and Technology Solutions and Consulting Support to the Mid Cap through Fortune 1000 Nationwide.

Fortreum

Fortreum

Fortreum aim to simplify cybersecurity in the marketplace to accelerate your business outcomes.

Modern Networks

Modern Networks

Modern Networks is a leading provider of IT managed services to the UK’s commercial property sector and medium sized enterprises.

ZainTech

ZainTech

Zaintech is a regional digital & ICT solutions provider offering comprehensive digital solutions and services to enterprise and government customers in the MENA region.

GISEC Global

GISEC Global

GISEC Global provides vendors and companies from around the world with access to lucrative opportunity to capitalize on what's set to become one of the world's booming markets.

SecuCenter

SecuCenter

Secucenter is a trusted partner for SOC services, offering security expertise in a cost-effective way.