Cyber Warfare

Cyber Warfare and War in Ukraine

Abstract:

Today cyberspace is a one military domain. The new cyber capacities of armed forces create new possibilities to achieve the goals of war. These new and advanced cyber capabilities are a part of the new non-kinetic environment where cyber operations are used in combination with information warfare (IW) and electronic warfare (EW). These non-kinetic operations are used with lethal weapons systems to produce an operational advantage. This article is a preliminary review of cyber operations in the Ukraine conflict. The article reviews the balance between defense and offense in cyberspace, the utility of offensive cyber operations, and the requirements for effective cyber defence.

Information Warfare and Critical Infrastructure: The Combined Power of Information Warfare Threats

Abstract:

Critical Infrastructure (CI) is an area that has historically been rife with vulnerabilities, open to foreign and domestic threats. Recent events such as the Colonial Pipeline and JBS Foods provider ransomware attacks highlight the need for better security and resiliency from cyber threats. However, within the Information Warfare (IW) constructs that have become increasingly refined by peer adversaries like China and Russia, the areas of Electromagnetic Warfare (EW), Intelligence, Surveillance, and Reconnaissance (ISR), and Information Operations (IO) have become equally important to consider in the panoply of IW. This raises the important question regarding whether CI assets are adequately protected from the full complement of IW threats. Each IW area will be discussed from a threat perspective and examples will be presented to show how these threats can be combined to disrupt, deny, and destroy CI and CI assets with special attention given to peer and non-peer adversaries and the asymmetric advantages of each.

Building an Integrated Cyber Defence Capability for African Missions

Abstract:

Cyberspace has been designated by organizations such as NATO as the fifth domain for battlespace, and many nations are already having and/or building their capabilities in the cyber defence environment in order to protect and defend their assets against any onslaught by their adversaries. It is a common belief that many African countries are not well positioned or prepared to respond effectively to cyberattacks against their citizens, critical infrastructure, and government. In many instances, the gap can be traced to the shortage of skills, lack of cybersecurity readiness and preparedness, and lack of investment in cybersecurity programmes, including policies within the military’s strategic, tactical, and operational environments.

Utilisation of the Cyber Security Challenge for Learning within the South African Perspective

Abstract:

Globally, cyber security is one of the fastest growing fields—where the number of cyber warfare and jobs for cyber defense professionals far outpaces the number of available professionals. Industry and government professionals in South Africa who have seen and experienced these gaps are involved in various initiatives to support cyber security education. One such initiative is the annual Cyber Security Challenge, with the main aim to introduce students to the real-world applications of cyber security, to motivate them to consider a career path in this industry, and to expose them to cyber warfare and defence as career options.

Cyber Warfare Evolution and Role in Modern Conflict

Abstract:

With the advent of powered flight came a shift in military tactics. This shift was not sudden or spectacular but evolved slowly over decades. Similarly, the development of the cyber domain and its impact on the information domain is creating a shift in warfare that nation states are adapting to as it evolves. This shift appears to be not only affecting the way international actors interact within the cyber realm but is also having a strong impact on conflict within the information domain. 

Evolution of Australia’s Cyber Warfare Strategy

Abstract: 

Since 2000, Australia has re-positioned itself from a country having scant recognition of cyber warfare to a nation with limited offensive and defensive capability facing increasing cyber incidents from at least one state-based actor (informally attributed as China). The dominance of a continental defence culture hindered the early development of a robust cyber warfare capability, resulting in a limited focus towards national infrastructure security. 

Cyberwarfare: Threats, Security, Attacks, and Impact

Abstract: 

Cyberwarfare, an emerging topic within computer science, has the potential to disrupt power grids, cripple economies, and cause political unrest. This paper first discusses investigations into the different groups behind cyberwarfare activities, from nation states to individual hackers. This is followed by an overview of cyberwarfare attacks covering methods, targets, and impact. Next, the economic, socio-political, and infrastructure impacts from cyberwarfare are considered. The paper concludes with a discussion of ways to mitigate the damage from these types of attacks, the importance of learning from the attack methods, and suggestions to prevent future attacks.

Strategic Culture and Cyber Warfare:A Methodology for Comparative Analysis

Abstract:

A nation state’s strategic culture inluences policy and behaviour in cyberspace. An approach to comparative research is provided herein to enhance the field and provide practical outcomes for policy formation and establishment of norms. This paper proposes a mixed-methods framework, combining policy analysis with key informant interviews and a survey.

Towards a Literature Review on Cyber Counterintelligence

Abstract:

For those connecting the dots, the threat landscape continues to affirm the necessity of having Cyber Counterintelligence (CCI) at the centre of cybersecurity efforts. Concurrent with the growing interest in CCI in corporate boardrooms and the corridors of governments, CCI is evolving from a field of academic enquiry to a distinctive academic sub-discipline. 

Developing a Cyber Operations Computational Ontology

Abstract: 

Cyber operations lack models, methodologies, and mechanisms to describe relevant data and knowledge. This problem is directly reflected when cyber operations are conducted, and their effects assessed, and it can produce dissonance and disturbance in corresponding decision-making processes and communication between different military actors.

Informing Active Cyber Defence with Realistic Adversarial Behaviour

Abstract:

In this paper, a cross-disciplinary approach is employed to inform the planning efforts of active cyber defence for military leaders. Militaries across the world are operating under the assumption that cyberspace infrastructure is vulnerable, and potentially compromised, at any given time. Therefore, proactive measures are being taken to secure critical systems, and these measures are known as active cyber defence. In this work, a dataset of empirically observed adversary behaviour activities, collected at the 2015 North American International Cyber Summit (NAICS), is added to an existing cyber warfare simulation framework.

Set Your Drones to Stun: Using Cyber-Secure Quadcopters to Disrupt Active Shooters

Abstract:

This paper will examine pairing the autonomous precision-flight capabilities of Micro- Unmanned Aerial Vehicles (UAVs) with the growing capability of Artificial Intelligence (specifically AI based on neuromorphic computing systems) to field cyber-secure, active-shooter response systems to counter the active-shooter threat to civilian ‘soft targets’, such as schools or train stations. This paper proposes a pilot to demonstrate the feasibility of disrupting terrorist attacks with a micro-UAV, armed with less than lethal weapons, for instance, a stun gun, where such a ‘stun-drone’ is part of an emergency-response system that is trustworthy and correctly engages only active shooters.

Utilising Journey Mapping and Crime Scripting to Combat Cybercrime and Cyber Warfare Attacks

Abstract:

This paper discusses ways in which utilising methods from typically non-cyber disciplines, business and criminology, can successfully be applied to the cyber domain to aid the fight  against  and  the  prevention  of  cyber-attacks,  including  those  used  in  cyber  warfare. Through the provision of a visual representation, this paper clarifies how journey mapping and crime scripting can help build an understanding of the steps criminals or adversaries in general undertake during the execution of a cybercrime or cyber-warfare attack.

The impact of Increase in Broadband Access on South African National Security and the Average Citizen

Abstract

South Africa is the entry point to Africa and with the impending increase in broadband access, the average citizen could in future be used as a hub for launching cyber attacks on the rest of the world. This will pose a national security threat not only to South Africa but also to the rest of the world. This exponential increase in internet broadband will also result in an increase in security threats. A national security generic framework is used to analyse these threats and the impact on the average citizen with some proposals of addressing the threats.

The Myth of Cyberterrorism

ABSTRACT

Media and emerging experts often misapply the term ‘cyberterrorism’ portraying cyber attacks as a separate form of terrorism or a new terrorism. It is simply the terrorists’ use of Computer Network Operations (CNO) as a tactic in their operations. It is important to understand the psychology of terrorism in order to evaluate the plausibility of cyberterrorism. Terrorists exercise cyber related capabilities, which are generally related in the media as extreme and exaggerated vignettes of cyberterrorism. These incidents include the popular Digital Pearl Harbor, the U.S. stock market crash, utilities infrastructure attack, and crashing airliners. Is there a likely and logical application of cyber related activities by a terrorists group in pursuit of their goals, or is simply hype by media, business, and self anointed experts?

Teaching Competitive Intelligence and Cyberwarfare in a Business Context

ABSTRACT

Competitive intelligence has risen in profile over the past decade to become a key contributor to the survival of organizations operating in highly competitive environments. It is seen as an essential management tool in the current global marketplace. Several authors claim there is a need for the inclusion of competitive intelligence in Masters level studies however the area is rarely included in educational programs offered by tertiary institutions. This paper describes a course in competitive intelligence and cyberwarfare offered within IT-related Masters programs at Curtin University. The dominant teaching tool used is scenario work simulating realistic organizational situations incorporating competitive intelligence and cyberwarfare activities.

Dominating the Attacker: Use of Intelligence and Counterintelligence in Cyberwarfare

ABSTRACT

In the event of cyberwarfare the defender must harden the attacker’s target by secure design, a defined security perimeter, and a suite of tools. Indeed, the defender must be ever alert and ready to react to attack. Over many years, defenders in traditional warfare have learned to predict the style, magnitude and possible outcomes of a physical attack, and how to deceive and confuse an attacker with the objective of changing the outcome. Perhaps the cyberwarfare defender can take a similar approach, by employing intelligence and counterintelligence techniques that are superior to those of the attacker.

Information Operations from an Asian Perspective: A Comparative Analysis

ABSTRACT

This article is a comparative study of the practice of state-sponsored influence activities in its various forms (namely propaganda, public diplomacy, psychological operations, public affairs, cyber warfare, electronic warfare and so on) in selected Asian countries (China, Taiwan, Thailand and Japan). It highlights the state of Asian development, differences in concepts, organization and application as compared to the Western models that today dominate discussions on information operations and influence activity.  By doing so, it provides alternative ways of approaching Information Operations (IO) that might contribute to the generation of challenges and solutions facing today’s policy makers. Finally, it will serve to broaden the body of knowledge in influence activities to include both Eastern and Western viewpoints. 

An Approach to Teaching Cyber Warfare Tools and Techniques

ABSTRACT

This paper looks at an approach to teaching offensive and defensive skills in cyberwarfare. The teaching strategy presented has been developed in an active defense education environment. Action learning is an important facet of this cyberwarfare learning environment allowing students to experience application of the theory and reflect on the learning process whilst gaining proficiency in the tools and techniques.

Principles of Information Warfare

ABSTRACT

This paper examines the fundamental concepts needed to understand the broad spectrum of activities encompassed by the Information Warfare phenomenon. It provides a theoretical background to these activities, and examines the context in which these are most effective.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com