I recently came across to the most recently published DoD Cyberspace Strategy 2018 which greatly reminded me of a variety of resources that I recently took a look at in terms of catching up with some of the latest cyberwarfare trends and scenarios. It appears that the U.S is re-claiming back the dominance over the "communication channel" using a variety of real-life oriented cyber threats including referencing and citing security researchers and NGOs (Non-Profit Organization) as potential threats. Takes you back - doesn't it?
We cannot discuss these if we don't compare their cyber warfare approaches next to one another. It's rather ironic situation, since China has built its cyber warfare doctrine based on the research conducted into the topic by U.S military personnel. At a later stage, Chinese military thinkers perceived the combination of Sun Tzu's military strategies in the virtual realm
The countless number of allegations by countries across the world that China's As for the U.S DoD put in a "catch-up mode" by major news outlets. Pushing the boundaries of the irrelevance? That's for sure.
- Russia doctrine - people's information warfare
With Russia continuing to dominate the threat landscape of terms of massive and large scale economic and financial espionage in the face of cybercrime-driven fraudulent and malicious economy which can be best described as something in the lines of economic terrorism
- China doctrine - people's information warfare - U.S copycats
- Iran's doctrine - academic playground
Let's compare China's People's Army and the U.S DoD to Germany whose vision is that if they forbid the use of "hacking tools" to some and real-life pen-testing tools
The U.S botnet of military hosts was the last indication of total misunderstanding of the current threatscape, by putting the emphasis on the "striking capability", which is rather logical when you have real-life military personnel converted to cyber warriors.
A doctrine that's aiming to prevent sensitive military secrets of leaking is forgetting some of the basics of information warfare - disinformation, or come and hack us, and steal our tweaked sensitive military secrets. On purposely, disinformation on the actual state of cyber warfare preparedness by on purposely suffering security breaches, then whining how they have managed to break.
The left hand never knows what the right one is doing,
Capability matching vs threat acquisition?
China's already reached the unrestricted warfare stage, a phrase when its hacking capabilities empowered Internet users self-mobilize themselves, the U.S DoD is implementing its cyber warfare doctrine, and the rest of the world is whining for yet another password stealer for online games that's phoning back to China.
A little less conversation, a little more action "babe".
Now that's its becoming increasingly clear that cyber jihad is entering into a "stay tuned for a webcast with your favorite terrorist" stage, what we may witness next is terrorist on sand-proof Segways. Cutting the sarcasm, it's becoming boring the listen to the same song played on a different media device.
Independent Contractor. Bitcoin: 15Zvie1j8CjSR52doVSZSjctCDSx3pDjKZ Email: dancho.danchev@hush.com OMEMO: ddanchev@conversations.im | OTR: danchodanchev@xmpp.jp | TOX ID: 2E6FCA35A18AA76B2CCE33B55404A796F077CADA56F38922A1988AA381AE617A15D3D3E3E6F1
Wednesday, November 28, 2018
People's Information Warfare Concept vs the U.S DoD Cyber Warfare Doctrine
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com