The Cyber Effect On Modern Warfare

Even before the Iranian oil tanker attacks the US had been planning cyber-attacks on Iran, according to a report in The New Yorker magazine. 

On June 20th, hours after the US Global Hawk surveillance drone, which cost over $100m, was destroyed over the Strait of Hormuz by an Iranian surface-to-air missile, the US Cyber Command launched a retaliatory digital strike against an Iranian spy group that had assisted the attacks on commercial ships.

Unusually, the US then used the world press and media to get its message across to the Iranians and the world that it was using cyber as a military attack mode.

Teams at the US Cyber Command have changed the way warfare will be conducted in the future. And so the cyber-attack on Iran has begun the military change to cyber war making it now a method that will be used as the new military surveillance and attack strategy.

During much of the Obama Administration, the United States cyber arsenal was strictly classified but now under Trump this tactic has changed and now the Department of Defense has already issued a strategic plan that not only confirmed the existence of cyber weapons but declared its commitment to using them “to advance US interests” and “defend forward.” 

At Cyber Command, teams are assigned to specific adversaries, Iran, North Korea, Russia, and China, among them, and spend years working alongside the intelligence community to gain access to digital networks. 

While the cyber-attack on Iranian maritime installations appeared to be an immediate response to the destruction of the drone, it was actually a long time in the making. 

Last year, the Pentagon gave Cyber Command the same command positon as the nine other combat commands. which include Central Command and Special Operations Command, an indication of the Internet’s growing importance as both a strategic domain and a military asset. 

In the past, the threat of mutually assured destruction was the way that nuclear powers kept one another’s lethal capabilities in check. Cyber weapons may offer some of the same assurances, but only to a point. Unlike nuclear weapons, which are expensive and stockpiled by a small number of states, cyber weapons are cheap and widely available, not just to nation-states but to criminals and malign actors. 

Also unlike conventional weapons, whose trajectories are easily traced, cyber weapons, which move through fibre-optic cables that crisscross the globe, lend themselves to plausible deniability. 

How do you levy a threat when it’s not clear where an attack is coming from or who is responsible? The impact of a cyber-attack can prove similarly elusive. The Trump Administration, with Bolton in the lead, has made offensive cyber operations an integral arm of statecraft.

It remains an open question whether they will also become lethal weapons of war.

New Yorker:        Yahoo:

You Might Also Read: 

Cyberwar: Covert Cyber Attack Campaign Is Underway:

The Destabilizing Danger Of Cyberattacks On Missile Systems:

 

 

« We Can Reduce Cybercrime, But Why Are We Failing?
Malware Attacks Drop As Encrypted Attacks Increase »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Mako Group

Mako Group

The Mako Group specializes in protection - providing security through auditing, testing, and assessments. And, we do it all with the highest quality standards possible.

Granite Partners

Granite Partners

Granite is a cloud service for the development of business risk management, cyber security and privacy and occupational safety and health.

Paygilant

Paygilant

Paygilant’s disruptive technology is designed to protect mobile payment  financial transactions against fraudulent attacks, whether executed by NFC, QR code, P2P or in-app.

HYPR

HYPR

HYPR Decentralized Authentication minimizes the risk of enterprise data breaches while providing an enhanced user experience for your customers and employees.

Lirex

Lirex

Lirex offer consulting and outsourcing services, complete design, construction and maintenance of ICT solutions and systems including cybersecurity.

Nakivo

Nakivo

NAKIVO is dedicated to delivering the ultimate backup, ransomware protection and disaster recovery solution for virtual, physical, cloud and SaaS environments.

iZOOlogic

iZOOlogic

iZOOlogic protects hundreds of the world’s leading brands, across banking, finance and government from cybercrime. We provide strong cyber defence solutions to protect client digital assets.

Citalid

Citalid

The Citalid cyber risk management platform combines threat and business intelligence to identify the risks scenarios you face.

Cubro Network Visibility

Cubro Network Visibility

Cubro network visibility solutions remove network monitoring ‘blind spots’ to provide enhanced visibility and control of all data transiting a company’s network.

Armo

Armo

Armo technology enhances any Kubernetes deployment with security, visibility, and control from the CI/CD pipeline through production.

BlueAlly

BlueAlly

BlueAlly helps clients scale, optimize, and manage their IT resources to reach their business goals.

Alethea

Alethea

Alethea is a technology company helping companies, nonprofits, and democracies protect themselves from harms stemming from disinformation and social media manipulation.

Teleskope

Teleskope

Teleskope are on a mission to empower businesses to protect sensitive data by default.

Flawnter

Flawnter

Flawnter is a security testing software that finds hidden security and quality flaws in your applications.

Teal Technology Consulting

Teal Technology Consulting

TEAL Technology Consulting is your trusted advisor for all your information security needs.

CirrusHQ

CirrusHQ

CirrusHQ are a Specialist AWS Advanced Consulting Partner with a focus on Cloud Management, DevOps, Migration and Consulting Services for the private and public sectors.