The Battlefield Transformed

The initial phase of warfare now often begins with the hacking of utilities and public entities, before the military aspect of war fighting is about to start. This disruption of infrastructure is the first strike in warfare with the aim to create chaos and disinformation.

Cyber warfare represents a fundamental transformation in the very nature of the concept of conflict, not only changing the weapons of modern conflict, but radically shifting the nature of the battlefield.

Cyber and electronic warfare are distinct entities as the former involves hackers using information systems and the Internet to disrupt or attack states or companies for strategic and military purposes. This can take multiple forms. A denial-of-service attack floods the target with traffic and/or data that triggers a crash intended to shut down a machine or network.

An advanced persistent threat is a network attack in which an unauthorised person accesses a network and remains undetected for a long period of time in order to steal data.

Malware is an overarching term for hostile or intrusive software, such as trojans, computer viruses, worms and ransomware, while spear phishing involves the deployment of fraudulent emails to induce a target into revealing confidential information.

Current Concerns

US intelligence officials believe that malware could give China the power to disrupt or slow American deployments, or resupply operations, including during a Chinese move against Taiwan. “The United States is challenged by malicious cyber actors who seek to exploit our technological vulnerabilities and undermine our military's competitive edge... They target our critical infrastructure and endanger the American people. Defending against and defeating these cyber threats is a Department of Defense (DoD) imperative,” say the US 2023 Cyber Strategy from the US Department of Defence.

Malware has recently been discovered in US military networks on Guam. This could suggest China’s strategy to disrupt military mobilisation at the outset of a conflict, but it is also a signal to significantly increase cyber security preparations, a top defense cyber official said.  

China’s “living off the land” techniques suggest a “theory of disrupting military mobilisation, but also sowing chaos in the United States and for the United States military,” Mieke Eoyang, the deputy assistant secretary of defense for cyber policy, told reporters Friday 15th Sept at the Defense Writers Group. “It is the second piece of that, the sowing chaos, that would cause harm to the American people that we find an anathema. That is not something that we, the United States military, would do to deliberately harm civilians with no military nexus there.”

The Pentagon expects adversaries to disrupt military mobility, but the ‘living off the land’ techniques, which use tools that are built in to a system or network to evade detection, could unduly harm civilians, she said:

“Our obligations under the laws of armed conflict would require us to have some kind of military necessity in the operations that we would conduct… and so we have some real concerns about what that activity might mean.” But China’s use of those tactics is also a call for broad adoption of zero-trust management tools “to better monitor and log network activity to be able to identify things that look anomalous, and be able to figure out if that's in fact, just something weird, or that's actually malicious activity on their networks,” Eoyang said.

The Pentagon wants to have a complete Zero Trust architecture by 2027 as a way to prevent insider threats. In particular, the new document  identifies zero trust as a way to “frustrate future malicious cyber activity” and as a bedrock for expanding cyber capabilities. It could also be essential to relaying classified information on the battlefield, as well as on bases and among offices across tye us defense establishment.

Defense One:     Atlantic Council:     US Army:     New York Times:     US Dept Of Defense:     DNYUZ:    

GlobalDefence:     Arthur D Little:     Grizzly                                               Image: Sashkinw

You Might Also Read: 

The Emerging Domain Of  Cyber War:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Neuromorphic Computing Changes Machine Learning
Cyber Criminals Exploit Legitimate Software »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

GrammaTech

GrammaTech

GrammaTech is a leading developer of software-assurance tools and advanced cyber-security solutions.

AVR International

AVR International

AVR educate, advise, analyse and provide professional, technical consultancy and support to ensure your business is safe, compliant and protected.

ngCERT

ngCERT

ngCERT is the National Computer Emergency Response Team for Nigeria.

Advens

Advens

Advens is a company specializing in information security management. We provide Consultancy, Security Audits and Technology Solutions.

H3Secure

H3Secure

H3 Secure focuses on Secure Data Erasure Solutions, Mobile Device Diagnostics and Information Technology Security Consulting.

Jobsora

Jobsora

Jobsora is an innovative job search platform in the UK and more than 35 other countries around the world. Sectors covered include IT and cybersecurity.

Cyber NYC

Cyber NYC

Cyber NYC is a suite of strategic investments to grow New York City’s cybersecurity workforce, help companies drive innovation, and build networks and community spaces.

Nokia

Nokia

Nokia is a proven leader in fixed, mobile and IoT security offering capabilities that range from systems design to integration and support.

Bitcrack

Bitcrack

Bitcrack Cyber Security helps your company understand and defend your threat landscape using our key experience and skills in cybersecurity, threat mitigation and risk.

SOC Experts

SOC Experts

SOC Experts is a pioneer (we started SOC training well before people realized how big the domain was going to be) and the only institution to provide end-to-end training on Security Operations Centers

Cloud Box Technologies

Cloud Box Technologies

Cloud Box Technologies is one of the premier IT Infrastructure Solution providers in the Middle East.

Snowflake

Snowflake

Empower your cybersecurity and compliance teams with Snowflake. Gain full visibility into security logs, at massive scale, while reducing costs of Security Information and Event Management systems.

Aceiss

Aceiss

Aceiss empowers access security, providing unprecedented visibility and insights into user access.

CommandK

CommandK

CommandK provides companies with infrastructure to protect their sensitive data. Built-in solutions to prevent data-leaks and simplify governance.

Bitdefender Voyager Ventures (BVV)

Bitdefender Voyager Ventures (BVV)

Bitdefender Voyager Ventures is an early-stage investment vehicle focused on cybersecurity, data analytics and automation startups.

Windstream

Windstream

Windstream is a leading provider of advanced network communications and technology solutions for consumers, small businesses, enterprise organizations and carrier partners across the US.