Cyber Spying For A Future War

New information and communications technologies are beginning to profoundly affecting how current and future wars will be waged.  Driven by a combination of 5G mobile networks, long-endurance drones and low-earth-orbit satellites we are moving towards a future where almost everyone will have easy access to real-time geolocation and and  video data.

As a consequence, powerful states and non-state actors alike will soon be able to track US and allied military equipment, detecting patterns of training and operations.

The countermeasures of past decades, from shutter control to careful timing of sensitive force movements, are all but drained of their potency. Nearly 20 years ago, a thesis titled The End of Secrecy by then US Air Force Lt. Col. Beth Kaspar, discussed the implications of transparency to US military competitiveness. 

“Information and communications technologies are having a profound impact, both domestically and globally, on how future war will be waged.... These technologies are providing affordable, worldwide, near real-time, 24-hour, CNN-like news coverage; worldwide Internet access; and more importantly, access to commercial space systems, including remote sensing, communications and navigation..... Unfortunately, this explosion in world-wide information and communication systems creates vulnerabilities for US national security.” 

Kaspar recommended a variety of activities ranging from innovating new doctrine and developing fast decision-making processes to integrating camouflage, concealment, and deception both vertically and horizontally into military operations. 

In 2012, the US  journalist and security specialis David Sanger reported that the United States, in conjunction with Israel, had unleashed a massive virus into the computer system of the Iranian nuclear reactor at Natanz, where the Iranians were engaged in enriching uranium for use in nuclear weaponry, a starling example of effective and covert cyber warfare. More recently Lt. Col. Kaspar has written “DoD should go back to basics and actively incorporate deception into all organisational levels and all levels of warfare.”

Typical deception and denial techniques, such as camouflage, are well known to military operators and warfighters. But these ideas must be advanced in ways that adjust to frequent and continuous monitoring in various bands of the electromagnetic spectrum. Hyperspectral sensors can identify chemical elements from space and could, in principle, make a camouflage canopy stick out like a sore thumb. 

The US national security estalishment's attempts to maintain levels of secrecty and surprise by limiting commercial space-based imaging have created a false sense of security and neglected developments that are not under US regulatory control. 

Even today, exercising shutter control, in the form of ordering an American company to limit its overhead image collection at a certain time and place, is time-consuming and cumbersome. Such requests must pass from the military operator to the Chairman of the Joint Chiefs of Staff, to the Secretary of Defense, and to the Secretary of Commerce, who then notifies the company operating the satellite.  Furthermore, these limits have no bearing on high altitude pseudo satellites including balloons; airplanes; international space companies, foreign governments.

Better deception and denial techniques would allow the military to dispense with the increasingly irrelevant tool of shutter control, lifting the regulatory burden on the domestic commercial remote sensing sector and helping compete on a global scale. It would also allow commercial imaging to support public messaging for national security without revealing the capabilities of the existing government systems.

Advancing and developing new deception and denial techniques may appear costly at first. But the alternative may be more expensive; indeed, restricting remote sensing licenses now would simply delay the cost to a later time when existing methods have become ineffective due to the growth of foreign remote sensing capabilities.

A “don’t look at me” approach to maintaining a military advantage is not feasible anymore. Instead, operators need to find new ways to hide. As Kaspar wrote in her thesis… “The appearance of the written word, a few millennia before the invention of the printing press in the Seventeenth Century, transformed military power...It enabled the preparation and dissemination of complex orders and the delegation and coordination of operational and tactical command functions and organising logistics.

As a result, larger armed forces could be mobilised, logistically supported, and deployed effectively in combat. “Today is information revolution is analogous to the written word revolution. It is the catalyst for economic, political and military change on a global scale... If the US military wants to maintain its competitive position, it must evolve doctrine, acquire superior weapons and systems, and adapt a viable organisational structure. If we fail in this, commercial technology diffusion and advances will outstrip doctrinal and weapon system developments with potentially devastating consequences. 

“After all, as an ancient Roman general said, ‘He who desires peace, let him prepare for war.’“The time to prepare is now.” 

CSIS:         DefenseOne:        Federation of American Scientists:          University of Pennsylvania Law School:

You Might Aso Read:

Shockwave - A Global Transformation In Warfare:

Reshaping The Future Of War With Malware:

 

« N.Korean Hackers Are Working With European Criminals
Cyber Criminals Demand Ransom From Travelex »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

OPSWAT

OPSWAT

OPSWAT is a software company that provides solutions to secure and manage IT infrastructure.

Deltagon

Deltagon

Deltagon develops information security solutions to protect companies’ confidential information in e-communication and e-services.

Exprivia

Exprivia

Exprivia is active in the design, development and integration of IT systems including cyber security.

La Fosse Associates

La Fosse Associates

The InfoSec Recruitment team at La Fosse Associates specialises in placing Information Security & Risk professionals on a permanent and contract basis.

101 Blockchains

101 Blockchains

101 Blockchains is a professional and trusted provider of enterprise blockchain research and training.

Paladin Capital Group

Paladin Capital Group

Paladin is a leading global investor that supports and grows the world’s most innovative cyber companies.

CybX Security LLC

CybX Security LLC

CybX is the first company of its kind to merge the practice of computer forensics with computer security and information security.

Intrinium

Intrinium

Intrinium is an Information Technology and Security Solutions company, providing comprehensive consulting and managed services to businesses of all sizes.

Whistic

Whistic

Whistic is a cloud-based platform that uses a unique approach to address the challenges of third-party risk management.

ACSG Corp

ACSG Corp

ACSG Corp is a Critical Infrastructure Protection Company with a multi-disciplinary focus on building analytics software for various industry sectors.

Otto

Otto

Stop Client-Side Attacks. Plug otto into your application security suite and protect your supply chain.

Databarracks

Databarracks

Databarracks deliver award winning IT resilience and continuity services. We help organisations get the most out of the cloud and protect their data, wherever it lives.

Panoplia Digital Protection

Panoplia Digital Protection

Panoplia Digital Protection is a cutting-edge cybersecurity company that leverages the power of AI and ML to help businesses and consumers protect themselves against cyber threats.

Sensity

Sensity

Sensity is a company that offers an AI-driven solution to detect and verify deepfakes and other forms of identity fraud.

Saidot

Saidot

Saidot is a Finnish AI governance and alignment company committed to helping businesses safely and transparently integrate AI into their operations.

CSIRT-Gnd

CSIRT-Gnd

CSIRT-Gnd provides 24x7 Computer Security Incident Response Services to citizens, companies and government agencies in Grenada.