The Cyber Effect On Modern Warfare

Even before the Iranian oil tanker attacks the US had been planning cyber-attacks on Iran, according to a report in The New Yorker magazine. 

On June 20th, hours after the US Global Hawk surveillance drone, which cost over $100m, was destroyed over the Strait of Hormuz by an Iranian surface-to-air missile, the US Cyber Command launched a retaliatory digital strike against an Iranian spy group that had assisted the attacks on commercial ships.

Unusually, the US then used the world press and media to get its message across to the Iranians and the world that it was using cyber as a military attack mode.

Teams at the US Cyber Command have changed the way warfare will be conducted in the future. And so the cyber-attack on Iran has begun the military change to cyber war making it now a method that will be used as the new military surveillance and attack strategy.

During much of the Obama Administration, the United States cyber arsenal was strictly classified but now under Trump this tactic has changed and now the Department of Defense has already issued a strategic plan that not only confirmed the existence of cyber weapons but declared its commitment to using them “to advance US interests” and “defend forward.” 

At Cyber Command, teams are assigned to specific adversaries, Iran, North Korea, Russia, and China, among them, and spend years working alongside the intelligence community to gain access to digital networks. 

While the cyber-attack on Iranian maritime installations appeared to be an immediate response to the destruction of the drone, it was actually a long time in the making. 

Last year, the Pentagon gave Cyber Command the same command positon as the nine other combat commands. which include Central Command and Special Operations Command, an indication of the Internet’s growing importance as both a strategic domain and a military asset. 

In the past, the threat of mutually assured destruction was the way that nuclear powers kept one another’s lethal capabilities in check. Cyber weapons may offer some of the same assurances, but only to a point. Unlike nuclear weapons, which are expensive and stockpiled by a small number of states, cyber weapons are cheap and widely available, not just to nation-states but to criminals and malign actors. 

Also unlike conventional weapons, whose trajectories are easily traced, cyber weapons, which move through fibre-optic cables that crisscross the globe, lend themselves to plausible deniability. 

How do you levy a threat when it’s not clear where an attack is coming from or who is responsible? The impact of a cyber-attack can prove similarly elusive. The Trump Administration, with Bolton in the lead, has made offensive cyber operations an integral arm of statecraft.

It remains an open question whether they will also become lethal weapons of war.

New Yorker:        Yahoo:

You Might Also Read: 

Cyberwar: Covert Cyber Attack Campaign Is Underway:

The Destabilizing Danger Of Cyberattacks On Missile Systems:

 

 

« We Can Reduce Cybercrime, But Why Are We Failing?
Malware Attacks Drop As Encrypted Attacks Increase »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clifford Chance

Clifford Chance

Clifford Chance are one of the world's pre-eminent law firms with resources across five continents. Practice areas include Cyber Security & Information Protection

FinalCode

FinalCode

FinalCode offers a file encryption and file-based enterprise digital rights management (eDRM) platform.

Secure Technology Alliance

Secure Technology Alliance

Secure Technology Alliance is a multi-industry association working to stimulate the adoption and widespread application of secure solutions.

Tempered Networks

Tempered Networks

Tempered Networks delivers the first purpose-built platform for IIoT cybersecurity that allows customers to connect and secure devices in minutes without the need for specialized skills.

Metro Systems

Metro Systems

Metro Systems offer fully integrated IT solutions & services covering Digital Transformation, Digital Infrastructure, Cyber Security and Training.

ODSC

ODSC

ODSC is a security systems integrator that provides services and expertise in identity management and access.

Bureau Veritas

Bureau Veritas

Bureau Veritas are a world leader in Testing, Inspection and Certification. We provide certification and training services in areas including cybersecurity and data protection.

Thrive

Thrive

Thrive delivers the experience, resources, and expertise needed to create a comprehensive cyber security plan that covers your vital data, SaaS applications, end users, and critical infrastructure.

Vumetric Cybersecurity

Vumetric Cybersecurity

Vumetric is an ISO9001 certified company offering penetration testing, IT security audits and specialized cybersecurity services.

Eureka Technology Partners

Eureka Technology Partners

Eureka Technology Partners are committed to helping you focus on your business by taking care of your IT infrastructure and data security needs.

Patriot Consulting Technology Group

Patriot Consulting Technology Group

Patriot Consulting's mission is to help our clients manage cybersecurity risk through secure deployments of Microsoft 365.

Northrop Grumman

Northrop Grumman

Northrop Grumman is a global provider and integrator of complex, advanced and rapidly adapting information technology, cybersecurity, mobility and optimized services and solutions.

Focus Digitech

Focus Digitech

Focus Digitech helps you with your digital transformation journey with our main core offerings of Cloud, Cybersecurity, Analytics and DevOps.

Esprinet

Esprinet

The Esprinet Group is an enabler of the technology ecosystem: a team of people who promote access to technology through an extensive network of professional resellers.

vpnMentor

vpnMentor

We started vpnMentor to offer users a really honest, committed and helpful tool when navigating VPNs and web privacy.

Tenchi Security

Tenchi Security

Tenchi Security are specialized in Third-Party Cyber Risk Management (TPCRM) and aim to reduce information asymmetry when it comes to third and Nth-Party security and compliance risk management.