The Battlefield Transformed

The initial phase of warfare now often begins with the hacking of utilities and public entities, before the military aspect of war fighting is about to start. This disruption of infrastructure is the first strike in warfare with the aim to create chaos and disinformation.

Cyber warfare represents a fundamental transformation in the very nature of the concept of conflict, not only changing the weapons of modern conflict, but radically shifting the nature of the battlefield.

Cyber and electronic warfare are distinct entities as the former involves hackers using information systems and the Internet to disrupt or attack states or companies for strategic and military purposes. This can take multiple forms. A denial-of-service attack floods the target with traffic and/or data that triggers a crash intended to shut down a machine or network.

An advanced persistent threat is a network attack in which an unauthorised person accesses a network and remains undetected for a long period of time in order to steal data.

Malware is an overarching term for hostile or intrusive software, such as trojans, computer viruses, worms and ransomware, while spear phishing involves the deployment of fraudulent emails to induce a target into revealing confidential information.

Current Concerns

US intelligence officials believe that malware could give China the power to disrupt or slow American deployments, or resupply operations, including during a Chinese move against Taiwan. “The United States is challenged by malicious cyber actors who seek to exploit our technological vulnerabilities and undermine our military's competitive edge... They target our critical infrastructure and endanger the American people. Defending against and defeating these cyber threats is a Department of Defense (DoD) imperative,” say the US 2023 Cyber Strategy from the US Department of Defence.

Malware has recently been discovered in US military networks on Guam. This could suggest China’s strategy to disrupt military mobilisation at the outset of a conflict, but it is also a signal to significantly increase cyber security preparations, a top defense cyber official said.  

China’s “living off the land” techniques suggest a “theory of disrupting military mobilisation, but also sowing chaos in the United States and for the United States military,” Mieke Eoyang, the deputy assistant secretary of defense for cyber policy, told reporters Friday 15th Sept at the Defense Writers Group. “It is the second piece of that, the sowing chaos, that would cause harm to the American people that we find an anathema. That is not something that we, the United States military, would do to deliberately harm civilians with no military nexus there.”

The Pentagon expects adversaries to disrupt military mobility, but the ‘living off the land’ techniques, which use tools that are built in to a system or network to evade detection, could unduly harm civilians, she said:

“Our obligations under the laws of armed conflict would require us to have some kind of military necessity in the operations that we would conduct… and so we have some real concerns about what that activity might mean.” But China’s use of those tactics is also a call for broad adoption of zero-trust management tools “to better monitor and log network activity to be able to identify things that look anomalous, and be able to figure out if that's in fact, just something weird, or that's actually malicious activity on their networks,” Eoyang said.

The Pentagon wants to have a complete Zero Trust architecture by 2027 as a way to prevent insider threats. In particular, the new document  identifies zero trust as a way to “frustrate future malicious cyber activity” and as a bedrock for expanding cyber capabilities. It could also be essential to relaying classified information on the battlefield, as well as on bases and among offices across tye us defense establishment.

Defense One:     Atlantic Council:     US Army:     New York Times:     US Dept Of Defense:     DNYUZ:    

GlobalDefence:     Arthur D Little:     Grizzly                                               Image: Sashkinw

You Might Also Read: 

The Emerging Domain Of  Cyber War:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Neuromorphic Computing Changes Machine Learning
Cyber Criminals Exploit Legitimate Software »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ThreatConnect

ThreatConnect

ThreatConnect is an enterprise threat intelligence platform by Cyber Squared bridging incident response, defense, and threat analysis for InfoSec & DFIR teams.

BeOne Development

BeOne Development

BeOne Development provide innovative training and learning solutions for information security and compliance.

Trust in Digital Life (TDL)

Trust in Digital Life (TDL)

TDL is a membership association comprising companies, SMEs, universities and research institutes who exchange experience and insights to make digital services in Europe trustworthy and safe.

NPCore

NPCore

NPCore is specialized in defense solution against unknown APT and Ransomware and provides two-level defense on network and endpoint based on behavior.

Netmarks Indonesia (NMID)

Netmarks Indonesia (NMID)

Netmarks Indonesia is an IT solutions provider offering services related to ICT infrastructure, digital transformation and cyber security.

Cyber Police of Ukraine

Cyber Police of Ukraine

Cyber Police of Ukraine is a law enforcement agency within the the Ministry of Internal Affairs of Ukraine dedicated to combating cyber crime.

BwCIRT

BwCIRT

BwCIRT is the Computer Incident Response Team (CIRT) for Botswana and provides an official point of contact for dealing with computer security incidents.

Templar Shield

Templar Shield

Templar Shield is a premier information security, risk and compliance technology professional services firm serving North America.

Def-Logix

Def-Logix

Def-Logix was founded in 2008 to help solve cyber threats being experienced by government agencies of the United States.

Appalachia Technologies

Appalachia Technologies

Appalachia is a full service Managed Services Provider with a focus on cybersecurity, backed by the best engineers.

RubinBrown

RubinBrown

RubinBrown LLP is a leading accounting and professional consulting firm. The RubinBrown name and reputation are synonymous with experience, integrity and value.

Third Point Ventures

Third Point Ventures

Third Point brings deep technical expertise, a strong network of relationships, and decades of investing experience to add value to our partners throughout their journey from idea to IPO and beyond.

Performance Technologies

Performance Technologies

As a leading IT Solutions Provider in Greece, Performance Technologies delivers reliable, long life solutions, ensuring continuous availability of business-critical services and information.

Bridgenet Solutions

Bridgenet Solutions

Bridgenet specialises as a top-notch Information and Technology Solutions Provider for businesses.

Interlynk

Interlynk

Interlynk's #SBOM and # VEX-powered platform automates and continuously monitors first-party and vendor software supply chains and helps meet #FDA, #CRA, #GSA, and #DoD compliance obligations.

Syteca

Syteca

Syteca is specifically designed to secure organizations against threats caused by insiders. It provides full visibility and control over internal risks.