The Battlefield Transformed

The initial phase of warfare now often begins with the hacking of utilities and public entities, before the military aspect of war fighting is about to start. This disruption of infrastructure is the first strike in warfare with the aim to create chaos and disinformation.

Cyber warfare represents a fundamental transformation in the very nature of the concept of conflict, not only changing the weapons of modern conflict, but radically shifting the nature of the battlefield.

Cyber and electronic warfare are distinct entities as the former involves hackers using information systems and the Internet to disrupt or attack states or companies for strategic and military purposes. This can take multiple forms. A denial-of-service attack floods the target with traffic and/or data that triggers a crash intended to shut down a machine or network.

An advanced persistent threat is a network attack in which an unauthorised person accesses a network and remains undetected for a long period of time in order to steal data.

Malware is an overarching term for hostile or intrusive software, such as trojans, computer viruses, worms and ransomware, while spear phishing involves the deployment of fraudulent emails to induce a target into revealing confidential information.

Current Concerns

US intelligence officials believe that malware could give China the power to disrupt or slow American deployments, or resupply operations, including during a Chinese move against Taiwan. “The United States is challenged by malicious cyber actors who seek to exploit our technological vulnerabilities and undermine our military's competitive edge... They target our critical infrastructure and endanger the American people. Defending against and defeating these cyber threats is a Department of Defense (DoD) imperative,” say the US 2023 Cyber Strategy from the US Department of Defence.

Malware has recently been discovered in US military networks on Guam. This could suggest China’s strategy to disrupt military mobilisation at the outset of a conflict, but it is also a signal to significantly increase cyber security preparations, a top defense cyber official said.  

China’s “living off the land” techniques suggest a “theory of disrupting military mobilisation, but also sowing chaos in the United States and for the United States military,” Mieke Eoyang, the deputy assistant secretary of defense for cyber policy, told reporters Friday 15th Sept at the Defense Writers Group. “It is the second piece of that, the sowing chaos, that would cause harm to the American people that we find an anathema. That is not something that we, the United States military, would do to deliberately harm civilians with no military nexus there.”

The Pentagon expects adversaries to disrupt military mobility, but the ‘living off the land’ techniques, which use tools that are built in to a system or network to evade detection, could unduly harm civilians, she said:

“Our obligations under the laws of armed conflict would require us to have some kind of military necessity in the operations that we would conduct… and so we have some real concerns about what that activity might mean.” But China’s use of those tactics is also a call for broad adoption of zero-trust management tools “to better monitor and log network activity to be able to identify things that look anomalous, and be able to figure out if that's in fact, just something weird, or that's actually malicious activity on their networks,” Eoyang said.

The Pentagon wants to have a complete Zero Trust architecture by 2027 as a way to prevent insider threats. In particular, the new document  identifies zero trust as a way to “frustrate future malicious cyber activity” and as a bedrock for expanding cyber capabilities. It could also be essential to relaying classified information on the battlefield, as well as on bases and among offices across tye us defense establishment.

Defense One:     Atlantic Council:     US Army:     New York Times:     US Dept Of Defense:     DNYUZ:    

GlobalDefence:     Arthur D Little:     Grizzly                                               Image: Sashkinw

You Might Also Read: 

The Emerging Domain Of  Cyber War:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Neuromorphic Computing Changes Machine Learning
Cyber Criminals Exploit Legitimate Software »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CircleCI

CircleCI

CircleCI’s platform allows developers to rapidly release code (for web and mobile apps) they trust by automating the build, test, and deploy process.

HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking, a Hewlett Packard Enterprise company, is a leading provider of next-generation network access solutions for the mobile enterprise.

ISTQB

ISTQB

ISTQB has defined the "ISTQB Certified Tester" scheme that has become the world-wide leader in the certification of competences in software testing.

Alarum Technologies

Alarum Technologies

Alarum Technologies (formerly Safe-T) is a global provider of cyber security and privacy solutions to consumers and enterprises.

Raytheon Technologies

Raytheon Technologies

Raytheon Intelligence & Space delivers solutions that protect every side of cyber for government agencies, businesses and nations.

SparkCognition

SparkCognition

SparkCognition’s AI-powered solutions enhance cybersecurity, identify and prevent equipment failures before they happen, and provide prescriptive intelligence for maintaining your most critical assets

Innovative Solutions (IS)

Innovative Solutions (IS)

Innovative Solutions is a specialized professional services company delivering Information Security products and solutions for Saudi Arabia and the Gulf region.

SkillCube

SkillCube

SkillCube is one of the pioneers in India focusing on Cyber Security Skill Development Solutions.

Octane OC

Octane OC

OCTANe is building the SoCal of tomorrow. We drive innovation and growth by connecting people, resources and capital. Our Incubator focus is FinTech, Data Analytics and Cybersecurity.

VirtualArmour

VirtualArmour

VirtualArmour is a managed security services provider with global reach and local attitude.

Snowflake

Snowflake

Empower your cybersecurity and compliance teams with Snowflake. Gain full visibility into security logs, at massive scale, while reducing costs of Security Information and Event Management systems.

Knowledge Lens

Knowledge Lens

Knowledge Lens builds innovative solutions on niche technology areas such as Big Data Analytics, Data Science, Artificial Intelligence, Internet of Things, Augmented Reality, and Blockchain.

RedHunt Labs

RedHunt Labs

RedHunt Labs is a premier Cybersecurity Solutions provider, offering Attack Surface Management solution 'NVADR' and Penetration Testing services.

Gunnison Consulting Group

Gunnison Consulting Group

Gunnison Consulting Group serves the Federal Government with high quality IT consulting services.

Progress Partners

Progress Partners

Progress Partners is a corporate advisory firm that works with buyers and sellers of emerging growth companies to complete M&A or private placement transactions. Our sectors include cybersecurity.

Northdoor

Northdoor

Northdoor provides a comprehensive set of services around information security and works with leading global technology vendors to deploy and manage cyber security solutions.

LetsData

LetsData

LetsData uses AI to provide governments, intergovernmental organizations, civil society, and businesses with data-empowered decisions on communication in the age of online disinformation.

Cyber Unicorns

Cyber Unicorns

Cyber Unicorns is a cyber security consultancy created to help drive cyber security outcomes in the small to medium-sized business space.