The US Steps Up Its Cyberwar Capability

In the 21st century military attack and defence increasingly involves the use of cyber operations between rival states. Cyberspace is a warfighting domain, and the US military is beginning to take an active role in cyber defending the country and its allies from threats in that realm, US Defense Secretary Mark T. Esper has said.

US military superiority in the air, land, sea, and space domains is critical to its ability to defend their interests and protect values. Achieving superiority in the physical domains now often depends on superiority in cyberspace. The security of the US has become also partly dependent on cyber security and this issue will increase with th development AI and cyber-attacks.

China and Russia are honing their offensive cyber capabilities. Both have been focused on extracting COVID-19-related research, but post-pandemic China’s cyber campaigns will go back to targeting Western intellectual property and other valuable commercial information, while Russia will pursue anti-Western political manipulation.

Technological decoupling, most apparent in geopolitical divisions over Huawei’s role in building 5G telecoms infrastructure, forms part of the West’s defensive cyber security strategy.

US Defense policy and processes need to keep pace with the speed of events in cyberspace to maintain a decisive advantage and superior strategic effects depend on the alignment of operations, capabilities, and processes, and the seamless integration of intelligence with operations. Indeed, some military analysts have promoted the idea of a coming “Cyber Pearl Harbor,” but instead the domain is littered with covert operations meant to manage escalation and deter future attacks. Cyber strategy and policy must start from an accurate understanding of the domain, not imagined realities.

Recently Montenegro has faced increased harassment from Russia since joining NATO in 2017, and the Cyber Command team has been there to investigate signs that hackers had penetrated the Montenegrin government’s networks. Working side by side with Montenegrin partners, the team saw an opportunity to improve American cyber defenses ahead of the 2020 election. 

The 'Hunt Forward' mission to Montenegro represented a new, more proactive strategy to counter online threats that reflects Cyber Command’s evolution over the last ten years from a reactive, defensive posture to a more effective, proactive posture called “persistent engagement.” The findings enable the US government to defend critical networks more effectively and allow large antivirus companies to update their products to better protect their users.

When Cyber Command was established in 2010, the assumption was that its focus should be on trying to prevent the military’s networks from being infiltrated or disabled. But a reactive and defensive posture proved inadequate to manage evolving threats.​ Even as the military learned to better protect its networks, adversaries’ attacks became more frequent, sophisticated, and severe.
 
Russia uses cyberspace for espionage and theft and to disrupt US infrastructure while attempting to erode confidence in the nation’s democratic processes. Iran undertakes online influence campaigns, espionage efforts, and outright attacks against government and industrial sectors. In the face of these threats, the US government has changed how it will respond. In 2018, Congress clarified the statutory authority for military cyber operations to enable Cyber Command to conduct traditional military activities in addition to the mostly preparatory operations to which it had been limited previously.

The White House also released a National Cyber Strategy, which aligned economic, diplomatic, intelligence, and military efforts in cyberspace.

Some specialists have speculated that competing with adversaries in cyberspace will increase the risk of escalation, from hacking to physical war. The thinking goes that by competing more proactively in cyberspace, the risk of miscalculation, error, or accident increases and could escalate to a crisis.

US Cyber Command takes these concerns seriously, and reducing this risk is a critical part of the planning process, however, cyberspace operations are not silver bullets and to be most effective, they require much planning and preparation. Cyber Command thus works closely with other combatant commands to integrate the planning of kinetic and non-kinetic effects.

Cyber Command’s capabilities are meant to complement, not replace, other military capabilities, as well as the tools of diplomacy, sanctions, and law enforcement. Controlling cyberspace as a military domain is a challenge that demands critically assessing issues, questions, and assumptions, especially those at the foundation of the military’s decision making for operations and requirements. 

Foreign Affairs:      US  Cyber Command:      CATO Institute:      US Dept. of Defense

You Might Also Read:

Cyber Command’s Plan to ‘frustrate’ Hackers Is Working:

 

« Superhuman Brain-Hacking Device
Fixing Britain's Digital Skills Gap »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CyTech Services

CyTech Services

CyTech provides Forensics Incident Response, Cyber Security and Training services.

Civica

Civica

Civica provides cloud-based managed IT services, hosting and outsourcing.

CONCERT

CONCERT

CONCERT is a Computer Emergency Response Team and cyber security information sharing network for companies, institutes and government in Korea.

Centre for Development of Advanced Computing (C-DAC)

Centre for Development of Advanced Computing (C-DAC)

C-DAC is the premier R&D organization of the indian Ministry of Electronics & Information Technology. Areas of research include cyber security.

Sparta Consulting

Sparta Consulting

Sparta Consulting is an information management and business development full service provider.

PCI Compliance Guide

PCI Compliance Guide

The PCI Compliance Guide is one of the leading educational websites available focused exclusively on PCI compliance.

Namogoo

Namogoo

Namogoo’s disruptive technology identifies and blocks unauthorized product ads that are injected into customer web sessions by client-side Digital Malware.

Dreamlab Technologies

Dreamlab Technologies

Dreamlab specialises in securing critical IT infrastructures. We offer qualitative support and advice for managing your infrastructure and cyber security needs.

ITonlinelearning

ITonlinelearning

ITonlinelearning specialises in providing professional certification courses to help aspiring and seasoned IT professionals develop their careers.

Exponential-e

Exponential-e

Exponential-e provide Cloud and Unified Communications services and world-class Managed IT Services including Cybersecurity.

Security Engineered Machinery (SEM)

Security Engineered Machinery (SEM)

SEM provides comprehensive end-of-life solutions for the protection of sensitive information in government and commercial markets.

Capsule8

Capsule8

Capsule8 is the only company providing high-performance attack protection for Linux production environments.

CerraCap Ventures

CerraCap Ventures

CerraCap Ventures invest globally into early-stage B2B companies in Healthcare, Enterprise AI and Cyber Security.

RAND Corporation

RAND Corporation

The RAND Corporation is a non-profit institution that helps improve policy and decision making through research and analysis.

Acclaim Technical Services (ATS)

Acclaim Technical Services (ATS)

ATS provide operational products, services and solutions to the defense and intelligence communities for all types of critical mission needs.

Beacon Technology

Beacon Technology

Beacon Technology offers a comprehensive platform consisting of XDR, VMDR, and Breach and Attack simulation tools.