The Cyber Effect On Modern Warfare

Even before the Iranian oil tanker attacks the US had been planning cyber-attacks on Iran, according to a report in The New Yorker magazine. 

On June 20th, hours after the US Global Hawk surveillance drone, which cost over $100m, was destroyed over the Strait of Hormuz by an Iranian surface-to-air missile, the US Cyber Command launched a retaliatory digital strike against an Iranian spy group that had assisted the attacks on commercial ships.

Unusually, the US then used the world press and media to get its message across to the Iranians and the world that it was using cyber as a military attack mode.

Teams at the US Cyber Command have changed the way warfare will be conducted in the future. And so the cyber-attack on Iran has begun the military change to cyber war making it now a method that will be used as the new military surveillance and attack strategy.

During much of the Obama Administration, the United States cyber arsenal was strictly classified but now under Trump this tactic has changed and now the Department of Defense has already issued a strategic plan that not only confirmed the existence of cyber weapons but declared its commitment to using them “to advance US interests” and “defend forward.” 

At Cyber Command, teams are assigned to specific adversaries, Iran, North Korea, Russia, and China, among them, and spend years working alongside the intelligence community to gain access to digital networks. 

While the cyber-attack on Iranian maritime installations appeared to be an immediate response to the destruction of the drone, it was actually a long time in the making. 

Last year, the Pentagon gave Cyber Command the same command positon as the nine other combat commands. which include Central Command and Special Operations Command, an indication of the Internet’s growing importance as both a strategic domain and a military asset. 

In the past, the threat of mutually assured destruction was the way that nuclear powers kept one another’s lethal capabilities in check. Cyber weapons may offer some of the same assurances, but only to a point. Unlike nuclear weapons, which are expensive and stockpiled by a small number of states, cyber weapons are cheap and widely available, not just to nation-states but to criminals and malign actors. 

Also unlike conventional weapons, whose trajectories are easily traced, cyber weapons, which move through fibre-optic cables that crisscross the globe, lend themselves to plausible deniability. 

How do you levy a threat when it’s not clear where an attack is coming from or who is responsible? The impact of a cyber-attack can prove similarly elusive. The Trump Administration, with Bolton in the lead, has made offensive cyber operations an integral arm of statecraft.

It remains an open question whether they will also become lethal weapons of war.

New Yorker:        Yahoo:

You Might Also Read: 

Cyberwar: Covert Cyber Attack Campaign Is Underway:

The Destabilizing Danger Of Cyberattacks On Missile Systems:

 

 

« We Can Reduce Cybercrime, But Why Are We Failing?
Malware Attacks Drop As Encrypted Attacks Increase »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Code Decode Labs

Code Decode Labs

Code Decode Labs provides consulting for IT Technology, Cyber Security, Advanced Defense & Policing Technologies, Intelligent Networks, and Information Security.

National Cyber Security Centre (NKSC) - Lithuania

National Cyber Security Centre (NKSC) - Lithuania

NKSC is the main Lithuanian cyber security institution, responsible for unified management of cyber incidents, monitoring and control of the implementation of cyber security requirements.

Backup Technology

Backup Technology

Backup Technology is a world leader in the Online Cloud Backup, Disaster Recovery and Business Continuity market.

Uleska

Uleska

Uleska is a scalable platform that provides automated and continuous software security testing whilst translating cyber risk.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NuCrypt

NuCrypt

NuCrypt is developing technology that is applicable to ultrahigh security data encryption as well as key distribution.

Privacyware

Privacyware

Privacyware's ThreatSentry combines a state-of-the-art Web Application Firewall and port-level firewall with advanced behavioral filtering to block unwanted IIS traffic and web application threats.

StrikeReady

StrikeReady

StrikeReady have developed CARA, an advanced technology solution that offers personalized and proactive assessment and remediation of future and current risk in real-time.

Datastream Cyber Insurance

Datastream Cyber Insurance

DataStream Cyber Insurance is designed to give SMB’s across the US greater confidence in the face of increasing cyber attacks against the small and medium business community.

Limes Security

Limes Security

Limes Security GmbH is the leading OT Security expert in the German-speaking region of Europe.

iomart Group

iomart Group

iomart is a cloud computing and IT managed services business providing secure hybrid cloud, network connectivity, data management, and digital workplace capability.

RightCue Assurance

RightCue Assurance

RightCue Assurance identify opportunities for improvement in the Information Security for your organisation and work with you to reduce cyber risk.

Zeus Cloud

Zeus Cloud

Zeus Cloud provide clients with world-class web hosting services to businesses both big and small.

TerraEagle

TerraEagle

Terraeagle is a boutique cyber security services company providing tailor-made solutions. Our core competency is in SOCaaS, MDRaaS & and Incident Response Retainer Services.

Secure Enterprise Engineering (SEE)

Secure Enterprise Engineering (SEE)

SEE provides disruptive cybersecurity system engineering, architecture, and operational capabilities to make our customer’s missions execute faster, smarter, and more securely.

AmiViz

AmiViz

AmiViz is the first B2B enterprise marketplace focussed on Cybersecurity business in the Middle East and Africa, designed specially to serve the interests of enterprise resellers and vendors.

Relyance AI

Relyance AI

Relyance AI - One unified platform for privacy, security, & governance.