Intelligence In The Age of Cyber Warfare

The cyber age has brought incalculable advantages to modern life. The world is connected and accessible like never before. But like all technological advances, there is a dark side to this progress: Quite simply, the cyber age is revolutionising warfare.

Whereas security threats were once visible and easily identifiable, today’s cyber-threats are invisible and anonymous. Where once warfare had clear rules and boundaries, modern cyber warfare is largely anarchic and without borders. As a result, governments and corporations alike are struggling to identify threats, let alone combat them effectively.

This calls for an entirely new security discourse.

All’s Fair in Cyber Warfare

A brief glance at some of the most recent cyberattacks illustrates the scope of the task ahead. It appears French presidential candidate Emmanuel Macron’s campaign was targeted by a cyber espionage group recently. Late last year, the San Francisco transit system was disrupted by a ransomware attack, prompting concern over the safety of other US transport networks. Additionally, half of UK businesses reportedly suffered a breach in 2016.

Enemies can seemingly strike anywhere at any time. This is not the work of a conventional army; it is usually the work of a small, dedicated group of fraudsters who wear no identifiable uniform. They are armed with everyday hardware, invisible codes and malware. And in the digital world, borders are irrelevant. A cyber-criminal’s battleground knows no boundaries.

The difficulty of identifying a cyber-attack is compounded by the rapid advances of malicious actors. As connectivity escalates between people, companies and organisations across the globe, fresh opportunities to launch attacks are opening up all the time. Technological developments are inevitably seized upon by enemies up to no good. In this regard, the growth of the Internet of Things (IoT) is set to make the challenge of cyber-security even more complex.

Strategy and Intelligence Over Technology

Until now, the standard response to this increasing danger has been to match technology with technology, in other words, a cyber arms race. In this cat-and-mouse game, an ever-more sophisticated arsenal is developed to counter the latest weapons being deployed. This amounts to applying an increasing number of Band-Aids to all manner of illnesses and infections. It is a piecemeal and inadequate response.

A fresh, more sustainable approach is required. This approach must be holistic, comprehensive and adaptable to the new nature of warfare. Most importantly, intelligence must play a meaningful role.

As a first step, determine exactly who constitutes an enemy in cyberspace. Given that anyone with a computer could theoretically be an attacker, it is critical to narrow down the possibilities. After all, even a colleague can become a threat, or at least an unwitting accomplice to a security event. In cyber warfare, it is often unclear who is friend and who is foe. A clear distinction based on an accurate intelligence assessment must be made between enemies, opponents and allies.

Since cyber warfare is so widespread and varied, it’s important to accept that not every attack can be repelled. Because there is no hermetic cyber-defense system, an intelligence evaluation is required to determine which attacks require an instant response. This means calculating critical interests and resolving to defend them, while at the same time being prepared to tolerate threats to lesser assets.

By doing so, government leaders and corporate managers can better understand the parameters to the cyber threats they face. They will then be able to clearly define what constitutes critical defense and set their security priorities accordingly. Consequently, they will be able to develop a workable cyber-defense strategy, establishing a critical and long-lasting mode of operation.

A War of Attrition

Of course, in today’s world, everything is interconnected. The individual process of establishing a holistic cyber strategy must be complimented by a wider legal and societal consideration of contemporary threats.

Legal systems need to define the lawful boundaries of cyber defense. Meanwhile, workers and network users must be educated and trained to spot the signs of a digital attack. In doing so, they can provide valuable help to the intelligence gathering process.

If governments and corporations seriously wish to win the cyber war, they must make a paradigm shift. Warfare is no longer a question of weaponry, but a matter of strategy. Only a sustainable, strategic approach, with intelligence at its core, can triumph. The alternative is an expensive, never-ending and, ultimately, futile battle against those who wish to cause harm.

Security Intelligence:

You Might Also Read:

Global C4ISR Has A Cyber Warfare Surge:

US vs. North Korea Cyberwar Underway:

A Geneva Convention For Cyber War:

NATO Tools Up For Cybewar:

 

 

« Google Neutralizes Phishing Scam
We Are Not Paid Agents of Russia… »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CERT Polska

CERT Polska

CERT Polska is the first Polish computer emergency response team and operates within the structures of NASK (Research and Academic Computer Network) research institute.

Willis Towers Watson

Willis Towers Watson

Willis Towers Watson is a global risk management, insurance brokerage and advisory company. Services offered include Cyber Risks insurance.

Cyber8Lab

Cyber8Lab

Cyber8Lab provides cybersecurity training programmes simulating real world cybersecurity incidents such as web defacement, malware, phishing, digital forensics analysis and wireless intrusion.

Executive Women's Forum (EWF)

Executive Women's Forum (EWF)

The Executive Women's Forum is the largest member organization serving emerging leaders and influential female executives in the Information Security, Risk Management and Privacy industries.

Bottomline Technologies

Bottomline Technologies

Bottomline Technologies is an innovator in business payment automation technology, helping companies make complex business payments simple, smart and secure.

US Secret Service

US Secret Service

The US Secret Service has a pivotal role in securing the nation’s critical infrastructures, specifically in the areas of cyber, banking and finance.

BlackhawkNest

BlackhawkNest

Blackhawk is the only cyber security solution on the market that combines network monitoring and incident response into a cohesive appliance.

Vircom

Vircom

With a large majority of cyber attacks starting with email, Vircom provides protection against the worst email security threats to your business.

Tech Seven Partners

Tech Seven Partners

At TechSeven Partners, we provide a full suite of cyber security solutions for your business including network monitoring, onsite and cloud backup solutions, HIPAA or PCI compliance.

Amazon Web Services (AWS)

Amazon Web Services (AWS)

Amazon Web Services is the world’s most comprehensive and broadly adopted cloud platform, offering fully featured services from data centers globally.

ANY.RUN

ANY.RUN

ANY.RUN is an interactive online malware analysis service created for dynamic as well as static research of multiple types of cyber threats.

Attestiv

Attestiv

Attestiv puts authenticity into photos, videos and documents by utilizing advanced technologies in AI and tamper-proofing.

Ark Technology Consultants

Ark Technology Consultants

Ark Technology Consultants is a unique IT Services Firm which blends technology solutions with consultative insight around governance and process management.

Bitdefender Voyager Ventures (BVV)

Bitdefender Voyager Ventures (BVV)

Bitdefender Voyager Ventures is an early-stage investment vehicle focused on cybersecurity, data analytics and automation startups.

MergeBase

MergeBase

Reduce software supply chain risk with MergeBase proven Software Composition Analysis (SCA).

CyberHive

CyberHive

CyberHive offer a complete suite of threat protection modules that seamlessly integrate to block current, as well as future threats.