Difference between revisions of "Cyberwarfare"
(-) |
m (link to cyberdefence) |
||
(3 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
''Not to be confused with "[[cyberterrorism]]", which is a behaviour of non-state "[[terrorists]]".'' | ''Not to be confused with "[[cyberterrorism]]", which is a behaviour of non-state "[[terrorists]]".'' | ||
+ | |||
+ | ''For the threatening of supply chains and [[Disaster/Preparation|disaster planning]], see [[Cyber attack]].'' | ||
{{concept | {{concept | ||
|wikipedia=https://en.wikipedia.org/wiki/Cyberwarfare | |wikipedia=https://en.wikipedia.org/wiki/Cyberwarfare | ||
Line 5: | Line 7: | ||
|constitutes=Covert warfare, Plastic word | |constitutes=Covert warfare, Plastic word | ||
|so_called=1 | |so_called=1 | ||
+ | |description=Cyberwarfare is the use of digital tools and tactics to conduct acts of espionage, disruption, or sabotage in the virtual realm, often with the goal of achieving political, military, or economic objectives. | ||
}} | }} | ||
'''Cyberwarfare''' are attacks against the digital infrastructure of an [[enemy image|enemy state]]. It generally involves the [[hacking]] of [[computer]] systems and networks, but since the rise of [[social media]] has an added information or [[propaganda]] element, to influence foreign audiences and affect the decision-making of the adversary.<ref>https://web.archive.org/web/20150912000739/https://publicintelligence.net/information-operations-are-now-inform-and-influence-activities/</ref> | '''Cyberwarfare''' are attacks against the digital infrastructure of an [[enemy image|enemy state]]. It generally involves the [[hacking]] of [[computer]] systems and networks, but since the rise of [[social media]] has an added information or [[propaganda]] element, to influence foreign audiences and affect the decision-making of the adversary.<ref>https://web.archive.org/web/20150912000739/https://publicintelligence.net/information-operations-are-now-inform-and-influence-activities/</ref> | ||
− | At the same time, "cyberwarfare" is a [[plastic word]] used to promote [[fear]], uncertainty and doubt. The formation of groups like [[The 77th Brigade]] and [[Integrity Initiative]] attest to the fact, that any and all audiences have become a target;<ref>[https://www.aclu.org/sites/default/files/assets/the_art_of_deception_training_for_online_covert_operations_0.pdf The ART of DECEPTION : Training for a New Generation of Online Covert Operations] - This document is an internal GCHQ presentation prepared by the Joint Threat Intelligence Research Group (JTRIG). It describes the division's covert online operations, specifically the control, infiltration and manipulation of online communication between targets. [https://theintercept.com/document/2014/02/24/art-deception-training-new-generation-online-covert-operations/ another link]</ref><ref>https://thegrayzone.com/2021/10/08/nato-cognitive-warfare-brain/</ref> [[psychological operations]] have become a integral part of | + | At the same time, "cyberwarfare" is a [[plastic word]] used to promote [[fear]], uncertainty and doubt. The formation of groups like [[The 77th Brigade]] and [[Integrity Initiative]] attest to the fact, that any and all audiences have become a target;<ref>[https://www.aclu.org/sites/default/files/assets/the_art_of_deception_training_for_online_covert_operations_0.pdf The ART of DECEPTION : Training for a New Generation of Online Covert Operations] - This document is an internal GCHQ presentation prepared by the Joint Threat Intelligence Research Group (JTRIG). It describes the division's covert online operations, specifically the control, infiltration and manipulation of online communication between targets. [https://theintercept.com/document/2014/02/24/art-deception-training-new-generation-online-covert-operations/ another link]</ref><ref>https://thegrayzone.com/2021/10/08/nato-cognitive-warfare-brain/</ref> [[psychological operations]] have become a integral part of cyberwarfare and "[[cyberdefence]]". |
==5D== | ==5D== | ||
Line 32: | Line 35: | ||
==External links== | ==External links== | ||
* Conflicts in Cyberspace - [http://web.archive.org/web/20170416073650/http://conflictsincyberspace.blogspot.com/p/publications.html Academic peer reviewed publications] | * Conflicts in Cyberspace - [http://web.archive.org/web/20170416073650/http://conflictsincyberspace.blogspot.com/p/publications.html Academic peer reviewed publications] | ||
+ | * [[Salon]] ([[2014]]) - [https://www.salon.com/2014/11/16/googles_secret_nsa_alliance_the_terrifying_deals_between_silicon_valley_and_the_security_state/ Google's secret NSA alliance: The terrifying deals between Silicon Valley and the security state] | ||
* [[Mitre]] - [https://attack.mitre.org/groups/ Hacking Groups] | * [[Mitre]] - [https://attack.mitre.org/groups/ Hacking Groups] | ||
{{SMWDocs}} | {{SMWDocs}} | ||
+ | |||
==References== | ==References== | ||
{{reflist}} | {{reflist}} |
Latest revision as of 23:57, 20 September 2023
Not to be confused with "cyberterrorism", which is a behaviour of non-state "terrorists".
For the threatening of supply chains and disaster planning, see Cyber attack.
"Cyberwarfare" (Covert warfare, Plastic word) | |
---|---|
Interest of | • Association of Old Crows • Below Gotham Labs • Fred Chang • George Eliason • Global Commission on the Stability of Cyberspace • Joel Harding • Chris Quick • Rian van Rijbroek • The 77th Brigade |
Cyberwarfare is the use of digital tools and tactics to conduct acts of espionage, disruption, or sabotage in the virtual realm, often with the goal of achieving political, military, or economic objectives. |
Cyberwarfare are attacks against the digital infrastructure of an enemy state. It generally involves the hacking of computer systems and networks, but since the rise of social media has an added information or propaganda element, to influence foreign audiences and affect the decision-making of the adversary.[1]
At the same time, "cyberwarfare" is a plastic word used to promote fear, uncertainty and doubt. The formation of groups like The 77th Brigade and Integrity Initiative attest to the fact, that any and all audiences have become a target;[2][3] psychological operations have become a integral part of cyberwarfare and "cyberdefence".
Contents
5D
The objectives in cyberwar usually include one or more of the “5 Ds”: deny, degrade, disrupt, deceive, and/or destroy.[4]
Information operations
- Full article: Information operations
- Full article: Information operations
Information operations (IO),[5] or Inform and Influence Activities are closely linked to Cyberwar. Sometimes these are having overlap with Psyops.
Integrity Initiative
- Full article: Integrity Initiative
- Full article: Integrity Initiative
There are two leaked documents from the II in 2016, which have argued that a focus for the government should be the recruiting of school children to remain ahead of the competition in the cyber space domain.[6][7]
To foster a world-leading reservoir of potential cyber talent among children and young people (initially 12-18 year olds, but spreading to younger children as the programme evolves).
GCHQ in schools
In 2020 Matt Kennard for Declassified UK reported that GCHQ tries to recruit school children from the age of four years and up,[8] offering lessons on how to hack passwords and vulnerable machines, and how to spy on other children’s wifi traffic. The Cyber Schools Hub programme was set up in 2017 and “seeks to give young students the space and the opportunity to excel and explode into the market of cyber security and innovation”.[9]
Purposes
Bill Blunden opines that "the gilded hyperbole of Cyberwar being peddled to the public is dangerous because it distracts us from focusing on actual threats and constructive solutions."[10]
External links
- Conflicts in Cyberspace - Academic peer reviewed publications
- Salon (2014) - Google's secret NSA alliance: The terrifying deals between Silicon Valley and the security state
- Mitre - Hacking Groups
Examples
Page name | Description |
---|---|
HBGary | Company that developed sophisticated software for the control of sock puppets. |
Russia/Cyberwarfare | |
Stuxnet | A production of the NSA and Unit 8200 installed with AIVD help, designed to sabotage Iranian efforts to develop nuclear weapons. |
Related Quotation
Page | Quote | Author |
---|---|---|
Matthijs Veenendaal | “Trust is a key foundation of a well-functioning society. Without reliable communication, organizations cannot operate effciently, be they corporations or government institutions. Malicious actors are aiming to exploit vulnerabilities in communication flows. With the advent
of new technology, it is possible for adversaries to impersonate leaders and create false impressions among population. The Tallinn based NATO Cooperative Cyber Defence Centre of Excellence will organize a session focusing on questions including: What is at stake? What can nations do to enhance and protect trust in democratic institutions? Or is it already too late?” | Matthijs Veenendaal |
Related Documents
Title | Type | Publication date | Author(s) | Description |
---|---|---|---|---|
Document:CyberGuardian Cyber Security Education Programme for Children and Young People | brainwashing concept paper | 30 January 2016 | Integrity Initiative | II puts lots of thought into how the military can train British children for cyberwarfare. |
Document:Executive Summary Cyber Security Education Programme for Children and Young People | brainwashing concept paper executive summary | 26 February 2016 | Integrity Initiative | II sums up its thought on how the military can train British children for cyberwarfare |
Document:The Terrorists Among US- Traitors and Terror 3 | article | 21 June 2019 | George Eliason Michael Jasinski | George Eliason interviews professor Michael Jasinski about the dire effects of outsourcing intelligence gathering and information dissemination. |
File:Manufactured consent and cyberwar.pdf | Conference Proceedings | June 2010 | Bill Blunden | |
File:US Psychological Warfare in Ukraine Targeting Online Independent Media Coverage.pdf | article | 20 March 2015 | George Eliason | Cyberwarfare operations are getting targeted at anyone. |
References
- ↑ https://web.archive.org/web/20150912000739/https://publicintelligence.net/information-operations-are-now-inform-and-influence-activities/
- ↑ The ART of DECEPTION : Training for a New Generation of Online Covert Operations - This document is an internal GCHQ presentation prepared by the Joint Threat Intelligence Research Group (JTRIG). It describes the division's covert online operations, specifically the control, infiltration and manipulation of online communication between targets. another link
- ↑ https://thegrayzone.com/2021/10/08/nato-cognitive-warfare-brain/
- ↑ https://www.wired.com/beyond-the-beyond/2019/04/deny-degrade-disrupt-deceive-destroy/
- ↑ https://defenseinnovationmarketplace.dtic.mil/wp-content/uploads/2018/02/12102012_io1.pdf saved at Archive.org
- ↑ https://wikispooks.com/wiki/Document:Executive_Summary_Cyber_Security_Education_Programme_for_Children_and_Young_People
- ↑ https://wikispooks.com/wiki/Document:CyberGuardian_Cyber_Security_Education_Programme_for_Children_and_Young_People
- ↑ https://www.dailymaverick.co.za/article/2020-06-02-revealed-the-uks-largest-intelligence-agency-is-infiltrating-british-schools/ saved at Archive.org saved at Archive.is
- ↑ https://www.dailymaverick.co.za/article/2020-06-04-revealed-veterans-of-the-uk-militarys-cyber-warfare-unit-are-teaching-school-children-how-to-launch-cyber-attacks/ saved at Archive.org saved at Archive.is
- ↑ File:Manufactured consent and cyberwar.pdf