US Offers Its Cyber Secrets To NATO

The Pentagon recently released a new cyber security strategy that maps out a more aggressive use of military cyber capabilities. The US is expected to announce that it will offer its cyber warfare capabilities on NATO's behalf as it acts to counter Russian aggression. 

Senior Pentagon official Katie Wheelbarger said the US is committing to use offensive and defensive cyber operations for NATO allies, but America will maintain control over its own personnel and capabilities.

The decision comes on the heels of the NATO summit in July, when members agreed to allow the alliance to use cyber capabilities that are provided voluntarily by allies to protect networks and respond to cyber-attacks. 
The US considers cyber as a theatre of war, much like air, sea, space and ground operations.

In recent weeks the Pentagon released a new cyber security strategy that maps out a more aggressive use of military cyber capabilities. And it specifically calls out Russia and China for their use of cyber-attacks.

China, it said, has been "persistently" stealing data from the public and private sector to gain an economic advantage.
And it said Russia has used cyber information operations to "influence our population and challenge our diplomatic processes".

US officials have repeatedly accused Moscow of interfering in the 2016 elections, including through online social media.
"We will conduct cyberspace operations to collect intelligence and prepare military cyber capabilities to be used in the event of a crisis or conflict," the new strategy states.

The US is said to be prepared to use cyber warfare along with other military weapons against its enemies when needed, including to counter malicious cyber activities targeting the country. The document adds that the Pentagon will "work to strengthen the capacity" of allies and partners.

It reflects growing concerns by the US and its allies over Moscow's use of cyber operations to influence elections in America and elsewhere.

"Russia is constantly pushing its cyber and information operations," said Ms Wheelbarger, adding that this is a way for the US to show its continued commitment to NATO. She told reporters travelling to NATO with Mr Mattis that the move is a signal to other nations that the alliance is prepared to counter cyber-attacks waged against the alliance or its members. 

Much like America's nuclear capabilities, the formal declaration of cyber support can help serve as a military deterrent to other nations and adversaries.

Forces.net:

You Might Alsdo Read: 

NATO Can’t Agree On What A Cyber Attack Is:

NATO Could Go To War In Response To A Cyber Attack:

Handbook Of Russian Information Warfare:
 

 

« Russia Stands Accused Of Global Hacking Campaign
The Weaponization Of Social Media »

Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Sherweb

Sherweb

Over the years, SherWeb has become one of the most renowned and respected worldwide hosted services leaders in the cloud industry.

We Watch Your Website

We Watch Your Website

We Watch Your Website provide website monitoring, protection, malware removal and root cause analysis services to help you keep your website secure.

EdgeWave

EdgeWave

EdgeWave provides simple but highly effective data security and advanced threat protection in solutions that are affordable, scalable and easy to use.

GovCERT Austria

GovCERT Austria

GovCERT Austria is the Austrian Government Computer Emergency Response Team. Its constituency consists of Austria's public administration.

FRSecure

FRSecure

FRSecure is a full-service information security management company that protects sensitive, confidential business information from unauthorized access, disclosure, distribution and destruction.

Lifespan Technology

Lifespan Technology

Lifespan Technology provides the full range of IT Asset Disposition services. This includes hardware recycling and disposal, data destruction, and hardware resale.

Perch Security

Perch Security

Perch is a co-managed threat detection and response platform backed by an in-house Security Operations Center (SOC).

Raonsecure

Raonsecure

Raonsecure is one of Korea’s leading ICT security software companies – providing a variety of PC and mobile security solutions to financial institutions, government, and enterprise.