Cyber Warfare Creates Ghosts In Our Machines

Almost our entire modern way of life, from communication, social engagement, government, commerce to conflict, often relies on the InternetTechnological developments have completely changed social life by creating new cyber and technological inventions that even recently were considered science fiction and yet now are everyday use.

These changes stem from the growing importance of advanced technologies like AI, cyber, drones, cloud computing, data analytics and hypersonic missiles. These are fast becoming the foundation technologies for new mission areas and strategies and the threat of cyber warfare presents a multitude of threats towards any nation.

Cyberwarfare refers to cyber attacks executed by one country or state against another; however, it can also be an attack by hackers or terrorists aimed at furthering the mission of the individual nation. In most cases, the computers are not the final target, but the systems they control.

A well-planned attack could alter stock prices, knock out traffic light systems, knock out emergency services, weaken military responsiveness and disrupt the economy. Cyberwarfare can be launched instantly, leaving room for speculation and making it difficult to counter. The weapons of cyberwar are like those being used by cyber criminals. It can vary from the very sophisticated to the complete basic.

At the most basic level a cyber attack can be used to support traditional warfare methods. For example, tampering with the operation of air defences via cyber means a hacking attack that facilitates an air attack.

This time has also seen a dramatic growth of cyberspace which is now the modern threat environment has remade th globe as we see it and country borders in the electronic world don’t operate and cyber warfare is taking place. Adversaries of the United States and allies are using the cyberspace domain as a platform for warfare where rule of law is abstract and limitations are mostly self-imposed.

The military importance of cyber has been growing fast and there is still an active debate regarding how cyber warfare should be defined and no absolute definition is widely agreed, as can be seen in the recent events in Crimea and the operationalisation of the Stuxnet virus in Iran.

Hybrid warfare is the use of political, economic, technological, and informational tools that together make up the phenomenon of social infrastructure.

One particular element of this type of event, human political protest, is now known to be a very important component in what we are learning about hybrid warfare.This is supplemented by military means of a concealed character, including carrying out actions of informational conflict, combined arms tactics, cyber operations and the actions of Special Operations forces.

Cyber weapons are accessible to anyone with the requisite computer expertise; not just governments, but individuals too. Indeed, non-governmental individuals and bodies have already caused significant damage. For instance, 2017’s WannaCry virus, which targeted the UK National Health Service’s outdated Windows operating systems.

Even if cyberspace is still not the subject of any binding treaty, cyber-operations remain the preserve of the largest powers because of their complexity. 

Now hacktivists use their knowledge and software tools to gain unauthorized access to computer systems they seek to manipulate or damage not for material gain or to cause widespread destruction, but to draw attention to their cause through well-publicised disruptions of select targets. Anonymous and other hacktivist groups are often portrayed in the media as cyber-terrorists, wreaking havoc by hacking websites, posting sensitive information about their victims, and threatening further attacks if their demands are not met. However, hacktivism is more than that. Actors are politically motivated to change the world, through the use of fundamentalism. Groups like Anonymous, however, have divided opinion with their methods.

Each new technology is quickly obsolete, posing the question of the ability of actors to remain ahead. According to a recent National Cyber Power Index Report published by Harvard University’s Belfer Center, China ranks second, after the US, in cyber power.The report has identified seven national objectives that countries pursue using cyber means including surveillance, foreign intelligence collection, and cyber defenses.  “Countries with high levels of both intent and capability for a specific objective are among the highest-ranking countries in the NCPI...These countries both signal in strategies and previously attributed cyber-attacks that they intend to use cyber to achieve policy goals and have the capabilities to achieve them” says the Report.

Currently the United States, China, and Russia are sharply increasing their investment in technology to the hunt for mobile missiles. 

  • The United States is doing this to find missiles in North Korea, Iran and other places. 
  • China uses satellite and cyber analysis to track maritime targets like ships and aircraft. China also uses its cyber hacking as a focus on stealing intellectual property, trade secrets, and technological advancements in Artificial Intelligence to gain market advantages for its China based corporations, says the threat intelligence experts at IntSights.
  • Russia’s emphasis is on disruption of NATO’s ability to project military power into Poland, the Baltics, and Ukraine. 

Currently, cyberwarfare is an uncharted area, but by increasing security and collecting intelligence, countries can build new policies and strengthen their security.

Foreign Policy Research Inst:       US National Defense University:   Association of MBAs:    Anadolu:    Portswigger:

Infosecurity Magazine

You Might Also Read: 

Cyberwar Vs. Traditional Conflict:

 

« Australia Wants Google & Facebook To Pay For News
Too Many Employees Use Their Own Devices To Access Corporate Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Renaissance

Renaissance

Renaissance is Ireland's premier value added distributor of IT security solutions and a leading independent provider of business continuity consultancy.

Cybercrowd

Cybercrowd

Cybercrowd is a cyber security specialist offering technical services, cyber security assessments, guidance and security thought leadership.

European Recruitment

European Recruitment

European Recruitment is an award-winning, international recruitment agency specialising in niche technology areas including Cyber Security.

ReversingLabs

ReversingLabs

ReversingLabs develops cyber threat detection and mitigation tools that address the the latest directed attacks, advanced persistent threats and polymorphic malware.

Sasa Software

Sasa Software

Sasa Software is a cybersecurity software developer specializing in the prevention of file-based network attacks.

Squalio

Squalio

Squalio is an information technology group that delivers solutions and services for secure and effective IT management.

Hub One

Hub One

Hub One is a leading player in digital transformation with expertise in broadband connectivity, business solutions for traceability and mobility, IOT in industrial environments and cybersecurity.

NodeSource

NodeSource

NodeSource helps organizations run production-ready Node.js applications with greater visibility into resource usage and enhanced awareness around application performance and security.

Blackbird.AI

Blackbird.AI

Blackbird.AI provides an intelligence and early-warning system to help users detect disinformation and take action against threats.

New Net Technologies (NNT)

New Net Technologies (NNT)

NNT SecureOps provides ultimate protection against all forms of cyberattack and data breaches by automating the essential security controls.

Ampere Industrial Security

Ampere Industrial Security

Ampere is an industrial security firm. We specialize in industrial control systems (ICS) and operational technology (OT) security.

Park Place Technologies

Park Place Technologies

Park Place Technologies' mission is to drive uptime, performance and value for critical IT infrastructure.

TIM Enterprise

TIM Enterprise

TIM Enterprise offers innovative, sustainable and secure 360-degree digital solutions to companies and public administrations.

Fairly AI

Fairly AI

Fairly AI is on a mission to democratize safe, secure, and compliant AI across the enterprise.

Information Security Society of Africa – Nigeria (ISSAN)

Information Security Society of Africa – Nigeria (ISSAN)

The Information Security Society of Africa – Nigeria (ISSAN) is a not-for-profit organization dedicated to the protection of Nigeria’s cyberspace.

SECTA5

SECTA5

SECTA5 is a cybersecurity company building a next-generation Continuous Threat and Exposure Management platform, leveraging the expertise of offensively trained cyber defenders.