The Battlefield Transformed

The initial phase of warfare now often begins with the hacking of utilities and public entities, before the military aspect of war fighting is about to start. This disruption of infrastructure is the first strike in warfare with the aim to create chaos and disinformation.

Cyber warfare represents a fundamental transformation in the very nature of the concept of conflict, not only changing the weapons of modern conflict, but radically shifting the nature of the battlefield.

Cyber and electronic warfare are distinct entities as the former involves hackers using information systems and the Internet to disrupt or attack states or companies for strategic and military purposes. This can take multiple forms. A denial-of-service attack floods the target with traffic and/or data that triggers a crash intended to shut down a machine or network.

An advanced persistent threat is a network attack in which an unauthorised person accesses a network and remains undetected for a long period of time in order to steal data.

Malware is an overarching term for hostile or intrusive software, such as trojans, computer viruses, worms and ransomware, while spear phishing involves the deployment of fraudulent emails to induce a target into revealing confidential information.

Current Concerns

US intelligence officials believe that malware could give China the power to disrupt or slow American deployments, or resupply operations, including during a Chinese move against Taiwan. “The United States is challenged by malicious cyber actors who seek to exploit our technological vulnerabilities and undermine our military's competitive edge... They target our critical infrastructure and endanger the American people. Defending against and defeating these cyber threats is a Department of Defense (DoD) imperative,” say the US 2023 Cyber Strategy from the US Department of Defence.

Malware has recently been discovered in US military networks on Guam. This could suggest China’s strategy to disrupt military mobilisation at the outset of a conflict, but it is also a signal to significantly increase cyber security preparations, a top defense cyber official said.  

China’s “living off the land” techniques suggest a “theory of disrupting military mobilisation, but also sowing chaos in the United States and for the United States military,” Mieke Eoyang, the deputy assistant secretary of defense for cyber policy, told reporters Friday 15th Sept at the Defense Writers Group. “It is the second piece of that, the sowing chaos, that would cause harm to the American people that we find an anathema. That is not something that we, the United States military, would do to deliberately harm civilians with no military nexus there.”

The Pentagon expects adversaries to disrupt military mobility, but the ‘living off the land’ techniques, which use tools that are built in to a system or network to evade detection, could unduly harm civilians, she said:

“Our obligations under the laws of armed conflict would require us to have some kind of military necessity in the operations that we would conduct… and so we have some real concerns about what that activity might mean.” But China’s use of those tactics is also a call for broad adoption of zero-trust management tools “to better monitor and log network activity to be able to identify things that look anomalous, and be able to figure out if that's in fact, just something weird, or that's actually malicious activity on their networks,” Eoyang said.

The Pentagon wants to have a complete Zero Trust architecture by 2027 as a way to prevent insider threats. In particular, the new document  identifies zero trust as a way to “frustrate future malicious cyber activity” and as a bedrock for expanding cyber capabilities. It could also be essential to relaying classified information on the battlefield, as well as on bases and among offices across tye us defense establishment.

Defense One:     Atlantic Council:     US Army:     New York Times:     US Dept Of Defense:     DNYUZ:    

GlobalDefence:     Arthur D Little:     Grizzly                                               Image: Sashkinw

You Might Also Read: 

The Emerging Domain Of  Cyber War:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Neuromorphic Computing Changes Machine Learning
Cyber Criminals Exploit Legitimate Software »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Berkman Klein Center for Internet & Society

Berkman Klein Center for Internet & Society

The Berkman Klein Center for Internet & Society is a research center at Harvard University that focuses on the study of cyberspace.

Computer Laboratory - University of Cambridge

Computer Laboratory - University of Cambridge

Computer security has been among the Laboratory’s research interests for many years, along with related topics such as cryptology

Granite Partners

Granite Partners

Granite is a cloud service for the development of business risk management, cyber security and privacy and occupational safety and health.

ISC2

ISC2

ISC2 is an international, non-profit membership association for information security leaders. Our information security certifications are recognized as the global standard for excellence.

Platin Bilişim

Platin Bilişim

Platin Bilisim is an IT Security company providing consultancy, solutions and operational support services.

KLDiscovery

KLDiscovery

KLDiscovery is a global leader in delivering best-in-class eDiscovery, information governance and data recovery solutions.

PBOSecure

PBOSecure

PBOSecure is a dynamic and progressive IT consultancy company specializing in IT and Industrial Control System (ICS) security.

Westminster Insight - Cyber Security Conference

Westminster Insight - Cyber Security Conference

Join colleagues this December for Westminster Insight’s Cyber Security Conference, as you’ll assess how new technologies such as AI can secure your organisation against future threats.

Black Hills Information Security (BHIS)

Black Hills Information Security (BHIS)

Black Hills Information Security provide security testing and vulnerability assessment services.

MOXFIVE

MOXFIVE

MOXFIVE is a specialized technical advisory firm founded to bring clarity to the complexity of cyber attacks.

neoEYED

neoEYED

neoEYED helps banks and fintech to detect and prevent frauds using a Behavioral AI that recognizes the users just by looking at “how” they interact with the applications.

F1 Security

F1 Security

F1 Security provides a family of web security solutions including web application firewalls, web shell detection solutions, and web shell scanners.

iON United

iON United

iON United is a full-service IT security solutions provider and one of the most trusted names in cybersecurity in Canada.

Creative Destruction Lab (CDL)

Creative Destruction Lab (CDL)

Creative Destruction Lab is a nonprofit organization that delivers an objectives-based program for massively scalable, seed-stage, science- and technology-based companies.

Cyber Legion

Cyber Legion

Cyber Legion Ltd is a UK-based Cyber Security as a Service (CSaaS) start-up that provides IT security testing services to various organizations around the globe.

Hetz Ventures

Hetz Ventures

Hetz Ventures is a global-facing VC investing in highly talented and ambitious Israeli founders who operate at the cutting edge of deep technology.