Cyberwar Vs. Traditional Conflict

The first difference between cyberwar and traditional warfare is the difficulty in knowing who exactly attacked you. 

Unlike a traditional military conflict, correctly attributing an attack back to its original source is incredibly difficult. Sophisticated countries often hack third-party victims, such as universities or small or medium-size businesses that don't have robust cyber-security.  They then use those businesses to attack their real targets, whether they be critical utilities, other governments' resources or important businesses and industries. 

The second difference is it can be difficult to know when you're under attack, often the impacts can only be felt years after the attack. 

What is cyberwar? 

Cyberwar is the use of technology to cause social, economic or even physical damage to a targeted country. It can range from propaganda or fake news campaigns, which we witnessed in the US and French elections, to the theft of national secrets or intellectual property. It can even escalate to the crippling of banks, telecommunications providers and media outlets, experienced by South Korea in 2013.

In its most brutal stage, a cyberwar could result in the crippling of power plants, airports, transit and thousands of businesses as the Ukraine experienced in December 2015 and 2016 and this past June and July. 

A full cyberwar would likely lead to crippled power utilities, hospitals, transportation systems, retail outlets and more.  No terrorist group has capitalised on networked technology more than ISIS, both for recruitment messaging and commanding their fighters on the ground.

The Internet is their response to asymmetric disadvantage. Where they lack in infrastructure and resources of a state, they use the web to plan attacks, solicit money and reach out to potential members.

The West now suggests it is reducing ISIS future terrorist potential but… 

On the battlefield, physical has merged with digital. ISIS commanders in Iraq and Syria have maneuvered their ranks through urban combat in cities such as Mosul or Raqqa, giving orders and sharing intelligence using networked-devices like phones, tablets, laptops, and small commercial drones. 

They use disposable Twitter accounts to distribute timely operational commands to fighters following specific hashtags, and create Facebook groups or Telegram channels to relay crude combat intelligence in real time.

At its core, cyber warfare, currently, is the use of digital attacks by one country or nation to disrupt the computer systems of another with the aim of create significant infrastructure damage, and potential assistance to more traditional military attack. 

This military strategy is similar to the beginning of aircraft use at the beginning of the 20th century when aircraft were only seen as having a visual intelligence use, then subsequently used in mass bommbing attacks.

What does Cyber-Warfare look like?

Cyber-war is still an emerging concept, but many experts are concerned that it is likely to be a significant component of any future conflicts. As well as troops using conventional weapons like guns and missiles, future wars will also be fought by hackers using computer code to attack an enemy's infrastructure.

Governments and intelligence agencies worry that digital attacks against vital infrastructure, like power grids or Banking systems, will give attackers a way of bypassing a country's traditional defences. Unlike standard military attacks, a cyber-attack can be launched instantaneously from any distance, with little obvious evidence in the build-up, and it is often extremely hard to trace such an attack back to its originators. 

Does Cyber remove traditional Military Strategy and Actions?

In the short run, soldiers, pilots and sailors will still be essential components of any battle, military planners say. This will be particularly true in urban settings, where buildings, tunnels and people create confusing obstacles that no machine will be able to skirt for years to come.

But over time, experts largely agree, remote-sensing and piloting technologies will produce the biggest change in warfare in generations. 

3rd Warfare Revolution

In the history of warfare, there have been a few major revolutions: the advent of the firearm, the introduction of nuclear power and weaponry, and the launch of military satellites to name a few. 

A new revolution is taking place right now on the battlefields of the world: wars are fought increasingly by drones. Of course, people are still in the line of fire, but their role and numbers could be vastly different than they are now. There’s no question that drones are changing the face of warfare: militaries have always been in technology races, but never before has the winner of the race gained the ability to wage war without putting troops on the front line.

Current Situation: Researchers are building drones the size of insects that can be used for reconnaissance or strikes, and although it’s difficult to estimate when this kind of technology will be deployed on the battlefield, it’s a safe bet that they’re currently being tested. Once they’re ready for deployment, there will be no denying that we’ve reached a new military age.

News By CSI

You Might Also Read:

The Future Of War is Cyber:

 

« Chinese Hackers Go After Norwegian Businesses
China Accused Of A Cyber-Attack On Australia's Parliament »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Sapphire

Sapphire

Sapphire deliver flexible and scalable cybersecurity solutions, helping organisations to detect, protect, respond and remediate against cyber threats.

Lutech

Lutech

Lutech is an Italian ICT engineering and services company. Business solution areas include cyber security.

CIO Dive

CIO Dive

CIO Dive provides news and analysis for IT executives in areas including IT strategy, cloud computing, cyber security, big data, AI, software, infrastructure, dev ops and more.

VKANSEE

VKANSEE

VKANSEE offer the world's thinnest optical fingerprint sensor for mobile device protection.

Seqrite

Seqrite

Seqrite offers a highly advanced range of enterprise and IT security solutions to protect your organization's most critical data.

th4ts3cur1ty.company

th4ts3cur1ty.company

th4ts3cur1ty.company specialize in delivering intelligence lead adversary emulation purple teaming & the bespoke building of Security Operation Centers.

ISMS Accreditation Center (ISMS-AC)

ISMS Accreditation Center (ISMS-AC)

ISMS-AC is the national accreditation body for Japan. The directory of members provides details of organisations offering certification services for ISO 27001.

VS Security Products

VS Security Products

VS Security Products design, manufacture and sell the most extensive range of degaussers and data destroyers on the market, suitable for all types of magnetic media.

Charities Security Forum (CSF)

Charities Security Forum (CSF)

The Charities Security Forum is the premier membership group for information security people working for charities and not-for-profits in the UK.

National Institute for Research & Development in Informatics (ICI Bucharest)

National Institute for Research & Development in Informatics (ICI Bucharest)

ICI Bucharest is the most important institute in the field of research, development and innovation in information and communication technology (ICT) in Romania.

MAXXeGUARD Data Safety

MAXXeGUARD Data Safety

MAXXeGUARD: The High Security Shredder. MAXXeGUARD easily destroys hard disks up to the highest security levels as well as other digital data carriers like SSD’s, LTO’s, USB’s, CD’s etc.

VectorRock

VectorRock

Save Your Business From Cyber Criminals. We specialize in uncovering cyber risks which threaten your organization and fixing them.

Menaya

Menaya

Menaya provide Ethical Hackers for leading companies while also providing cyber security solutions to help major infrastructures protect against cyber crime.

Cygna Labs

Cygna Labs

Cygna Labs is a software developer and one of the top three global DDI (DNS, DHCP, and IP address management) vendors.

WPScan

WPScan

With WPScan, you'll be the first to know about vulnerabilities affecting your WordPress installation, plugins, and themes.

Fingerprints

Fingerprints

Fingerprints is the world-leading biometrics company. Our solutions are found in millions of devices providing safe and convenient identification and authentication with a human touch.