The Cyber Effect On Modern Warfare

Even before the Iranian oil tanker attacks the US had been planning cyber-attacks on Iran, according to a report in The New Yorker magazine. 

On June 20th, hours after the US Global Hawk surveillance drone, which cost over $100m, was destroyed over the Strait of Hormuz by an Iranian surface-to-air missile, the US Cyber Command launched a retaliatory digital strike against an Iranian spy group that had assisted the attacks on commercial ships.

Unusually, the US then used the world press and media to get its message across to the Iranians and the world that it was using cyber as a military attack mode.

Teams at the US Cyber Command have changed the way warfare will be conducted in the future. And so the cyber-attack on Iran has begun the military change to cyber war making it now a method that will be used as the new military surveillance and attack strategy.

During much of the Obama Administration, the United States cyber arsenal was strictly classified but now under Trump this tactic has changed and now the Department of Defense has already issued a strategic plan that not only confirmed the existence of cyber weapons but declared its commitment to using them “to advance US interests” and “defend forward.” 

At Cyber Command, teams are assigned to specific adversaries, Iran, North Korea, Russia, and China, among them, and spend years working alongside the intelligence community to gain access to digital networks. 

While the cyber-attack on Iranian maritime installations appeared to be an immediate response to the destruction of the drone, it was actually a long time in the making. 

Last year, the Pentagon gave Cyber Command the same command positon as the nine other combat commands. which include Central Command and Special Operations Command, an indication of the Internet’s growing importance as both a strategic domain and a military asset. 

In the past, the threat of mutually assured destruction was the way that nuclear powers kept one another’s lethal capabilities in check. Cyber weapons may offer some of the same assurances, but only to a point. Unlike nuclear weapons, which are expensive and stockpiled by a small number of states, cyber weapons are cheap and widely available, not just to nation-states but to criminals and malign actors. 

Also unlike conventional weapons, whose trajectories are easily traced, cyber weapons, which move through fibre-optic cables that crisscross the globe, lend themselves to plausible deniability. 

How do you levy a threat when it’s not clear where an attack is coming from or who is responsible? The impact of a cyber-attack can prove similarly elusive. The Trump Administration, with Bolton in the lead, has made offensive cyber operations an integral arm of statecraft.

It remains an open question whether they will also become lethal weapons of war.

New Yorker:        Yahoo:

You Might Also Read: 

Cyberwar: Covert Cyber Attack Campaign Is Underway:

The Destabilizing Danger Of Cyberattacks On Missile Systems:

 

 

« We Can Reduce Cybercrime, But Why Are We Failing?
Malware Attacks Drop As Encrypted Attacks Increase »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

iStorage

iStorage

iStorage is the leading global provider of PIN Activated, hardware encrypted, portable data storage solutions.

Palo Alto Networks

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.

IT Association of Slovakia (ITAS)

IT Association of Slovakia (ITAS)

ITAS is a professional association of domestic and foreign companies operating in the field of information and communication technologies

Semperis

Semperis

Semperis is an enterprise identity protection company that enables organizations to quickly recover from accidental or malicious changes and disasters that compromise Active Directory.

Neowave

Neowave

Neowave designs, manufactures and markets strong authentication solutions based on smart card components and digital certificates.

ERMProtect

ERMProtect

ERMProtect is a leading Information Security & Training Company that helps businesses improve their cybersecurity posture and comply with regulations.

ECOMPLY

ECOMPLY

ECOMPLY is an all-in-one GDPR Compliance Solution. Efficient data protection management system for businesses and DPOsomply.

Privakey

Privakey

Transaction Intent Verification. Privakey delivers a secure channel to streamline high risk transactions, enabling digital trust between services and their users.

CYRISMA

CYRISMA

CYRISMA is a revolutionary cybersecurity platform that helps organizations manage risk without the usual headaches associated with enterprise cybersecurity tools.

Cubro Network Visibility

Cubro Network Visibility

Cubro network visibility solutions remove network monitoring ‘blind spots’ to provide enhanced visibility and control of all data transiting a company’s network.

HORNE

HORNE

HORNE is a professional services firm supporting clients in public, private & government sectors nationwide.

Matrium Technologies

Matrium Technologies

Matrium Technologies has been a leading provider of technology solutions since 1991, with a strong industry background in Network Testing, Network Visibility and Security.

AMSYS Innovative Solutions

AMSYS Innovative Solutions

AMSYS is a full-service, 24/7/365 IT solutions, Cybersecurity & Managed Service Provider.

CybersCool Defcon

CybersCool Defcon

CybersCool is committed to educate and train, re-skill and up-skill the current workforce of various industries and businesses in the knowledge and know-how of cybersecurity.

Xceptional

Xceptional

Xceptional is a multi-award-winning technology services firm that celebrates the unique strengths of people with autism.

Internet Initiative Japan (IIJ)

Internet Initiative Japan (IIJ)

IIJ is one of Japan's leading Internet-access and comprehensive network solutions providers.

Health Sector Cybersecurity Coordination Center (HC3)

Health Sector Cybersecurity Coordination Center (HC3)

HC3 was created by the US Department of Health and Human Services to aid in the protection of vital, controlled, healthcare-related information.