Shockwave - A Global Transformation In Warfare

We are at the outset of an electronic revolution that like earlier industrial revolutions will substantially alter our society and change the way most people live. 

The revolution is taking place far quicker than previous revolutions and will significantly change our engagement with others. This substantial transformation will involve the intergration of digital, physical and biological electronics which, radically alters our individual, national and global connections, our jobs, personal life, electronic systems, politics and particularly warfare. 

This has been called a Cyber Innovation or Web 0.3, but is probably best described as the 4th Industrial Revolution.

Background 
The innovation process will alter everything from enhance human brain thinking to automated avionics and robotics and will disintegrate and remodel many types of jobs within the media, education, business, transportation, policing, the military, medical, legal, finance and government.

This revolution will quickly develop by employing emerging technologies such as cognitive electronics, advanced analysis, nanotechnology, biotechnology, and quantum computing.  The process will develop new methods of communication, inter-connection, commercial production, to specific focused data analysis and deepening into the realms of robotic bio-technology. 

The Internet is connecting billions of people more by using mobile devices, electronic connections, storage capability, information accessibility and processing power and it will substantially increase the size of the interconnected the world. 
From 2000 to 2015, the number of global Internet users rose from 394 million to 3.5 billion and today there are over one billion Google searches every day and two billion videos viewed daily on YouTube.

Social media technology is a massive technological and social phenomenon, but its power as a business tool is still being discovered. 

Never before has a communications medium been adopted as quickly or as widely as social media. It took commercial television 13 years to reach 50 million households and the initial Internet service providers just over three years to sign 50 million subscribers. However, it took Facebook just a year and Twitter just under 9 months to reach the same milestone.
Now we have the dangers that cyber-weapons pose domestically and internationally which is already becoming part of operational warfare and will be the new conventional electronic aspect of attack and battlefields.  

What is Cyber War? 
Cyber war is the use of technology to cause social, economic or even physical damage to a targeted country. And there is currently discussion and argument in a number of countries as to whether cyber is currently part of armed conflict and if the international laws on conflict can and should be applied to hacking attacks on the web. 

Cyber war is still an emerging concept, but many experts are concerned that it is likely to be a significant component of any future conflicts. As well as troops using conventional weapons like guns and missiles, future wars will also be fought by hackers using computer code to attack an enemy's infrastructure.

At its core, cyber warfare, currently, is the use of digital attacks by one country or nation to disrupt the computer systems of another with the aim of create significant infrastructure damage, and potential assistance to more traditional military attack, this military strategy and tactics is similar to the beginning of aircraft use at the beginning of the 20th century when aircraft were only seen as having a visual intelligence use.

It can also range from propaganda or fake news campaigns, which we witnessed in the last few years of US and French and other elections, to the theft of national secrets or intellectual property

It can even escalate to the crippling of banks, telecommunications providers and media outlets, experienced by South Korea.
In its most brutal stage, a cyberwar could result in the crippling of power plants, airports, transit and thousands of businesses and a full cyberwar would likely lead to crippled power utilities, hospitals, transportation systems, retail outlets and more.

So far no terrorist group has capitalised on networked technology more than ISIS, both for recruitment messaging and commanding their fighters on the ground.

The Internet is their response to asymmetric disadvantage. Where they lack in infrastructure and resources of a state, they use the web to plan attacks, solicit money and reach out to potential members.

On the battlefield, physical has merged with digital. ISIS commanders in Iraq and Syria have maneuvered their ranks through urban combat in cities such as Mosul or Raqqa, giving orders and sharing intelligence using networked-devices like phones, tablets, laptops, and small commercial drones. 

They use disposable Twitter accounts to distribute timely operational commands to fighters following specific hashtags, and create Facebook groups or Telegram channels to relay crude combat intelligence in real time.

Current Situation
While recent headlines and news stories are focused on growing tensions between the US, Russia, China and North Korea, a much more insidious threat has been steadily growing and has the potential to cause as much havoc for the global community as traditional war. Researchers are building drones the size of insects that can be used for reconnaissance or strikes, and although it’s difficult to estimate when this kind of technology will be deployed on the battlefield, it’s a safe bet that they’re currently being tested. 

Once they’re ready for deployment, there will be no denying that we’ve reached a new military age.
The world has entered a dangerous new phase of warfare that can cause billions of dollars of damage and endanger lives.

Does Cyber Remove Traditional Military Strategy and Tactics?
In the short run, soldiers, pilots and sailors will still be essential components of any battle, military planners say. This will be particularly true in urban settings, where buildings, tunnels and people create confusing obstacles that no machine will be able to skirt for years to come.

But over time, experts largely agree, remote-sensing and piloting technologies will produce the biggest change in warfare in generations. 

It is a dream/nightmare long in the making that has been stunningly accelerated by the war in Afghanistan. 
There, several pilotless surveillance aircraft turned in unexpectedly strong performances, including the Air Force's Predator and its missile-toting cousin from the Central Intelligence Agency. They piped streaming video of Taliban and Qaeda movements to command posts in Saudi Arabia and the Pentagon, where commanders could then call almost immediate air strikes.

By 2025 or earlier, if the Pentagon and its many supporters in Congress and the White House have their way, pilotless planes and driverless buggies will direct remote-controlled bombers toward targets; pilotless helicopters will coordinate driverless convoys, and unmanned submarines will clear mines and launch cruise missiles. Advances in artificial intelligence, or AI, and a subset called machine learning are occurring much faster than expected. 

The range of coming advanced AI weapons include: robot assassins, superfast cyber-attack machines, driverless car bombs and swarms of small explosive kamikaze drones. 

AI will produce a revolution in both military and intelligence affairs comparable to the emergence of aircraft, noting that there were unsuccessful diplomatic efforts in 1899 to ban the use of aircraft for military purposes.

Entire regiments of unmanned tanks; drones that can spot an insurgent in a crowd of civilians; and weapons controlled by computerised "brains" that learn as they operate, are all among the "smart" tech being unleashed by an arms industry and some experts believe is now entering a 3rd Revolution in Warfare. 

Alfred Rolington Co-founder of Cyber Security Intelligence and a noted expert on Cyber Security and Intelligence matters

You Might Also Read:

Jamie Bartlett: Tech Will Change Us:

The ‘Rules’ Of Modern Warfare Are Being Rewritten:

 

« Cyber Security Jobs & The Skills Gap
Russian Agents Are Behind Many Recent Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Reed Smith LLP

Reed Smith LLP

Reed Smith LLP is an international law firm with offices in the USA, Europe, Middle East and Asia. Practice areas include Information Technology, Privacy & Data Security.

Kaseya

Kaseya

Kaseya Traverse enables you to get to the bottom of problems quickly via root cause analysis, across Cloud, on-premise, hybrid Cloud, virtualized and distributed IT environments.

Trust Guard

Trust Guard

Trust Guard services provide complete security for your website.

idappcom

idappcom

idappcom provides unique industry approved software solutions for auditing and enhancing the threat recognition and response capabilities of your corporate security defences.

Zeneth Technology Partners

Zeneth Technology Partners

Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

Cycura

Cycura

Cycura provide advanced, customized, and confidential cyber security services, cyber investigation services, and digital forensic services to governments, companies, and organizations.

Alsid

Alsid

Alsid helps corporates to anticipate attacks by detecting breaches before hackers can exploit them.

Cyber Threat Defense (CT Defense)

Cyber Threat Defense (CT Defense)

CT Defense specialize in penetration testing and security assessments.

Verificient Technologies

Verificient Technologies

Verificient Technologies specializes in biometrics, computer vision, and machine learning to deliver world-class solutions in continuous identity verification and remote monitoring.

The Cyber AB

The Cyber AB

The Cyber AB is the official accreditation body of the Cybersecurity Maturity Model Certification (CMMC) Ecosystem.

Cyber Intelligence 4U

Cyber Intelligence 4U

Cyber Intelligence 4U is an educational services company that provides two levels of cybersecurity training programs: executive and technical.

Qualcomm Technologies

Qualcomm Technologies

Qualcomm invents breakthrough technologies that transform how the world connects, computes and communicates.

Schweitzer Engineering Laboratories (SEL)

Schweitzer Engineering Laboratories (SEL)

SEL specializes in creating digital products and systems that protect, control, and automate power systems around the world.

Code Intelligence

Code Intelligence

Code Intelligence offers a platform for automated software security testing to help developers make their software more robust and secure.

Realsec

Realsec

RealSec is an international company and is a developer of encryption and digital signature systems and Blockchain for the Banking and Methods of Payment sectors, Government and Defense and Multisector

CYGNVS

CYGNVS

CYGNVS is a guided cyber crisis response platform providing anytime, anyplace access. A SaaS platform for cyber crisis management – a safe way to connect and control your response.