The Cyber Effect On Modern Warfare

Even before the Iranian oil tanker attacks the US had been planning cyber-attacks on Iran, according to a report in The New Yorker magazine. 

On June 20th, hours after the US Global Hawk surveillance drone, which cost over $100m, was destroyed over the Strait of Hormuz by an Iranian surface-to-air missile, the US Cyber Command launched a retaliatory digital strike against an Iranian spy group that had assisted the attacks on commercial ships.

Unusually, the US then used the world press and media to get its message across to the Iranians and the world that it was using cyber as a military attack mode.

Teams at the US Cyber Command have changed the way warfare will be conducted in the future. And so the cyber-attack on Iran has begun the military change to cyber war making it now a method that will be used as the new military surveillance and attack strategy.

During much of the Obama Administration, the United States cyber arsenal was strictly classified but now under Trump this tactic has changed and now the Department of Defense has already issued a strategic plan that not only confirmed the existence of cyber weapons but declared its commitment to using them “to advance US interests” and “defend forward.” 

At Cyber Command, teams are assigned to specific adversaries, Iran, North Korea, Russia, and China, among them, and spend years working alongside the intelligence community to gain access to digital networks. 

While the cyber-attack on Iranian maritime installations appeared to be an immediate response to the destruction of the drone, it was actually a long time in the making. 

Last year, the Pentagon gave Cyber Command the same command positon as the nine other combat commands. which include Central Command and Special Operations Command, an indication of the Internet’s growing importance as both a strategic domain and a military asset. 

In the past, the threat of mutually assured destruction was the way that nuclear powers kept one another’s lethal capabilities in check. Cyber weapons may offer some of the same assurances, but only to a point. Unlike nuclear weapons, which are expensive and stockpiled by a small number of states, cyber weapons are cheap and widely available, not just to nation-states but to criminals and malign actors. 

Also unlike conventional weapons, whose trajectories are easily traced, cyber weapons, which move through fibre-optic cables that crisscross the globe, lend themselves to plausible deniability. 

How do you levy a threat when it’s not clear where an attack is coming from or who is responsible? The impact of a cyber-attack can prove similarly elusive. The Trump Administration, with Bolton in the lead, has made offensive cyber operations an integral arm of statecraft.

It remains an open question whether they will also become lethal weapons of war.

New Yorker:        Yahoo:

You Might Also Read: 

Cyberwar: Covert Cyber Attack Campaign Is Underway:

The Destabilizing Danger Of Cyberattacks On Missile Systems:

 

 

« We Can Reduce Cybercrime, But Why Are We Failing?
Malware Attacks Drop As Encrypted Attacks Increase »

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Obrela Security Industries (OSI)

Obrela Security Industries (OSI)

Obrela Security Industries provides professional and managed services to assess and manage information risk for complex enterprise environments.

Ars Technica

Ars Technica

Ars Technica is a technology news and information website.

Rockwell Automation

Rockwell Automation

Rockwell Automation offer industrial security solutions to protect the integrity and availability of your complex automation solutions.

Joe Security

Joe Security

Joe Security specializes in the development of automated malware analysis systems for malware detection and forensics.

Polyverse

Polyverse

Polyverse offers application security, zero-day defense, proactive cyber resiliency and more. Protect your critical applications with moving target defense.

Arcanum Information Security (AIS)

Arcanum Information Security (AIS)

Arcanum Information Security is a specialist Information Assurance Consultancy and a leading provider of Cyber Security services to UK Defence, UK Government, Enterprise businesses and SMEs.

ZEBOX

ZEBOX

ZEBOX is an international incubator & accelerator of innovative startups. Focus is on Transport/Logistics and Industry X.0 including technologies such as AI, Blockchain and Cybersecurity.

Ascend Technologies

Ascend Technologies

Ascend Technologies offers a full suite of managed IT services including: Cloud & Infrastructure Management, Cybersecurity Management, Service Desk Management, Application Management , Data Management