Cyber Warfare Creates Ghosts In Our Machines

Almost our entire modern way of life, from communication, social engagement, government, commerce to conflict, often relies on the InternetTechnological developments have completely changed social life by creating new cyber and technological inventions that even recently were considered science fiction and yet now are everyday use.

These changes stem from the growing importance of advanced technologies like AI, cyber, drones, cloud computing, data analytics and hypersonic missiles. These are fast becoming the foundation technologies for new mission areas and strategies and the threat of cyber warfare presents a multitude of threats towards any nation.

Cyberwarfare refers to cyber attacks executed by one country or state against another; however, it can also be an attack by hackers or terrorists aimed at furthering the mission of the individual nation. In most cases, the computers are not the final target, but the systems they control.

A well-planned attack could alter stock prices, knock out traffic light systems, knock out emergency services, weaken military responsiveness and disrupt the economy. Cyberwarfare can be launched instantly, leaving room for speculation and making it difficult to counter. The weapons of cyberwar are like those being used by cyber criminals. It can vary from the very sophisticated to the complete basic.

At the most basic level a cyber attack can be used to support traditional warfare methods. For example, tampering with the operation of air defences via cyber means a hacking attack that facilitates an air attack.

This time has also seen a dramatic growth of cyberspace which is now the modern threat environment has remade th globe as we see it and country borders in the electronic world don’t operate and cyber warfare is taking place. Adversaries of the United States and allies are using the cyberspace domain as a platform for warfare where rule of law is abstract and limitations are mostly self-imposed.

The military importance of cyber has been growing fast and there is still an active debate regarding how cyber warfare should be defined and no absolute definition is widely agreed, as can be seen in the recent events in Crimea and the operationalisation of the Stuxnet virus in Iran.

Hybrid warfare is the use of political, economic, technological, and informational tools that together make up the phenomenon of social infrastructure.

One particular element of this type of event, human political protest, is now known to be a very important component in what we are learning about hybrid warfare.This is supplemented by military means of a concealed character, including carrying out actions of informational conflict, combined arms tactics, cyber operations and the actions of Special Operations forces.

Cyber weapons are accessible to anyone with the requisite computer expertise; not just governments, but individuals too. Indeed, non-governmental individuals and bodies have already caused significant damage. For instance, 2017’s WannaCry virus, which targeted the UK National Health Service’s outdated Windows operating systems.

Even if cyberspace is still not the subject of any binding treaty, cyber-operations remain the preserve of the largest powers because of their complexity. 

Now hacktivists use their knowledge and software tools to gain unauthorized access to computer systems they seek to manipulate or damage not for material gain or to cause widespread destruction, but to draw attention to their cause through well-publicised disruptions of select targets. Anonymous and other hacktivist groups are often portrayed in the media as cyber-terrorists, wreaking havoc by hacking websites, posting sensitive information about their victims, and threatening further attacks if their demands are not met. However, hacktivism is more than that. Actors are politically motivated to change the world, through the use of fundamentalism. Groups like Anonymous, however, have divided opinion with their methods.

Each new technology is quickly obsolete, posing the question of the ability of actors to remain ahead. According to a recent National Cyber Power Index Report published by Harvard University’s Belfer Center, China ranks second, after the US, in cyber power.The report has identified seven national objectives that countries pursue using cyber means including surveillance, foreign intelligence collection, and cyber defenses.  “Countries with high levels of both intent and capability for a specific objective are among the highest-ranking countries in the NCPI...These countries both signal in strategies and previously attributed cyber-attacks that they intend to use cyber to achieve policy goals and have the capabilities to achieve them” says the Report.

Currently the United States, China, and Russia are sharply increasing their investment in technology to the hunt for mobile missiles. 

  • The United States is doing this to find missiles in North Korea, Iran and other places. 
  • China uses satellite and cyber analysis to track maritime targets like ships and aircraft. China also uses its cyber hacking as a focus on stealing intellectual property, trade secrets, and technological advancements in Artificial Intelligence to gain market advantages for its China based corporations, says the threat intelligence experts at IntSights.
  • Russia’s emphasis is on disruption of NATO’s ability to project military power into Poland, the Baltics, and Ukraine. 

Currently, cyberwarfare is an uncharted area, but by increasing security and collecting intelligence, countries can build new policies and strengthen their security.

Foreign Policy Research Inst:       US National Defense University:   Association of MBAs:    Anadolu:    Portswigger:

Infosecurity Magazine

You Might Also Read: 

Cyberwar Vs. Traditional Conflict:

 

« Australia Wants Google & Facebook To Pay For News
Too Many Employees Use Their Own Devices To Access Corporate Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Bob's Business

Bob's Business

Bob's Business adopts a fresh approach to information security awareness and compliance training, delivering key information through the use of short animated movies.

ISACA Conferences

ISACA Conferences

ISACA is dedicated to offering the most dynamic and inclusive conferences to keep you abreast of the latest advances in IT and Information Security.

Kaymera Technologies

Kaymera Technologies

Kaymera’s comprehensive mobile enterprise security solution defends against all mobile threat and attack vectors.

IoT Now

IoT Now

IoT Now explores the evolving opportunities and challenges facing CSPs, and we pass on some lessons learned from those who have taken the first steps in next gen IoT services.

Circadence

Circadence

Circadence offer the only fully immersive, AI-powered, patent-pending, proprietary cybersecurity training platform in the market today.

Security & Intelligence Agency (SOA) - Croatia

Security & Intelligence Agency (SOA) - Croatia

SOA is the Croatian security and intelligence service. Areas of activity include Cyber Security and Information Security.

Axcient

Axcient

Axcient offers MSPs the most secure backup and disaster recovery technology stack with a proven Business Availability suite.

Level39 (L39)

Level39 (L39)

Level39 is the world's most connected tech community, with over 200 tech startups and scaleups based onsite.

Corsha

Corsha

Corsha is on a mission to simplify API security and allow enterprises to embrace modernization, complex deployments, and hybrid environments with confidence.

Digital Element

Digital Element

Digital Element is a global IP geolocation and intelligence leader with unrivaled expertise in leveraging IP address insights to deliver new value to companies.

Avint

Avint

Avint delivers transformational cybersecurity solutions that help both commercial and government entities achieve mission success.

Hook Security

Hook Security

Setting a new standard in security awareness. Hook Security is a people-first company that uses psychological security training to help companies create security-aware culture.

Innov8tif

Innov8tif

Innov8tif is an AI company specialised in providing ID assurance solutions — helping digital businesses to prevent frauds by verifying and authenticating customers identity.

SureCloud Cyber Services

SureCloud Cyber Services

Our Cyber Testing capability has been honed since we were founded in 2006 as a disrupter in the penetration testing market.

Advania UK

Advania UK

Advania are one of Microsoft’s leading partners in the UK, specialising in Azure, Security, Dynamics 365 and Microsoft 365.

DeltaSpike

DeltaSpike

DeltaSpike empowers individuals and organizations worldwide through its comprehensive cybersecurity solutions.