US Offers Its Cyber Secrets To NATO

The Pentagon recently released a new cyber security strategy that maps out a more aggressive use of military cyber capabilities. The US is expected to announce that it will offer its cyber warfare capabilities on NATO's behalf as it acts to counter Russian aggression. 

Senior Pentagon official Katie Wheelbarger said the US is committing to use offensive and defensive cyber operations for NATO allies, but America will maintain control over its own personnel and capabilities.

The decision comes on the heels of the NATO summit in July, when members agreed to allow the alliance to use cyber capabilities that are provided voluntarily by allies to protect networks and respond to cyber-attacks. 
The US considers cyber as a theatre of war, much like air, sea, space and ground operations.

In recent weeks the Pentagon released a new cyber security strategy that maps out a more aggressive use of military cyber capabilities. And it specifically calls out Russia and China for their use of cyber-attacks.

China, it said, has been "persistently" stealing data from the public and private sector to gain an economic advantage.
And it said Russia has used cyber information operations to "influence our population and challenge our diplomatic processes".

US officials have repeatedly accused Moscow of interfering in the 2016 elections, including through online social media.
"We will conduct cyberspace operations to collect intelligence and prepare military cyber capabilities to be used in the event of a crisis or conflict," the new strategy states.

The US is said to be prepared to use cyber warfare along with other military weapons against its enemies when needed, including to counter malicious cyber activities targeting the country. The document adds that the Pentagon will "work to strengthen the capacity" of allies and partners.

It reflects growing concerns by the US and its allies over Moscow's use of cyber operations to influence elections in America and elsewhere.

"Russia is constantly pushing its cyber and information operations," said Ms Wheelbarger, adding that this is a way for the US to show its continued commitment to NATO. She told reporters travelling to NATO with Mr Mattis that the move is a signal to other nations that the alliance is prepared to counter cyber-attacks waged against the alliance or its members. 

Much like America's nuclear capabilities, the formal declaration of cyber support can help serve as a military deterrent to other nations and adversaries.

Forces.net:

You Might Alsdo Read: 

NATO Can’t Agree On What A Cyber Attack Is:

NATO Could Go To War In Response To A Cyber Attack:

Handbook Of Russian Information Warfare:
 

 

« Russia Stands Accused Of Global Hacking Campaign
The Weaponization Of Social Media »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Applicure Technologies

Applicure Technologies

Applicure Technologies develops the leading multi-platform web application security software products to protect web sites and web applications from external and internal attacks.

DataVantage

DataVantage

DataVantage data masking and data management software helps you prevent data breaches, pass compliance audits and meet regulatory requirements such as HIPAA and PCI DSS.

XBOSoft

XBOSoft

XBOSoft is a software QA and testing company. We cover the entire QA and testing life cycle including software and application security.

Coro Cybersecurity

Coro Cybersecurity

Coro (formerly Coronet) empowers organizations to protect against malware, ransomware, phishing, and botnets - across devices, users, and cloud applications.

SySS

SySS

SySS is a market leader in penetration testing in Germany and Europe.

limes datentechnik

limes datentechnik

limes datentechnik is an authority in the fields of cryptography and data compression. The FLAM product family is an internationally accepted standard for efficient and safe handling of data.

Alyne

Alyne

Alyne is a Munich based 2B RegTech offering organisations risk insight capabilities through a Software as a Service.

XPO IT Services

XPO IT Services

XPO IT Services are dedicated to providing secure, high quality IT recycling and asset disposal services.

Tokio Marine HCC

Tokio Marine HCC

Tokio Marine HCC is a leading specialty insurance group with a Financial and Professional product line including Tech and Cyber.

Elevate Security

Elevate Security

Elevate is the leading Security Behavior Platform, changing employee security habits while giving security teams unprecedented visibility.

Stratosphere Networks

Stratosphere Networks

Stratosphere Networks offer managed cybersecurity services rooted in Managed Detection and Response and Security Operations Center services that our team can tailor to meet your needs.

MazeBolt Technologies

MazeBolt Technologies

Israel-based MazeBolt is an innovation leader in cybersecurity, with over two decades of experience in pioneering DDoS protection solutions.

Artjoker

Artjoker

Artjoker is a full cycle software development partner specialized in Blockchain projects and smart contract development including full cycle information security of all projects.

Custodia Continuity

Custodia Continuity

Custodia Continuity manage your Security, Backup, Continuity and Compliance. You get on with your business.

UberEther

UberEther

UberEther are a dedicated group of software developers and consultants developing and deploying the next generation of identity management and cloud solutions.

RKON

RKON

RKON Technologies provides managed IT and cybersecurity services to organizations across various industries, helping businesses mitigate risks and secure their digital infrastructures.