Thursday, March 24, 2022

U.S Army Launches the Cyber Military Intelligence Group (CMIG)

The U.S Army has recently announced the development and public launch of the Cyber Military Intelligence Group (CMIG) which aims to use both proprietary sources including public sources on its way to build situational awareness in the world of cyber warfare and malicious and fraudulent adversaries.

An excerpt:

"The CMIG’s function is to direct, synchronize and coordinate intelligence support to information advantage, cyberspace, information operations and electronic warfare operations."

Possible use for the newly formed and developed U.S Army cyber military intelligence group could possibly include the use of public cyber threat intelligence sources which the group could use to further enrich and properly respond to both using public sources and proprietary and possibly sensitive and classified databases.

Israel Blocks Ukraine From Purchasing Pegasus Spyware

According to the Guardian Israel blocked Ukraine from purchasing the Pegasus spyware from the infamous NSO Group vendor of lawful surveillance hacking tools.

Not surprisingly this is a bit over-exaggerated and self-serving statement that actually does more PR harm other than good despite the fact that the article is mentioning Israel's "2007 Defense Export Control Act" which prevents the country from selling access to lawful surveillance type of hacking tools to other countries.

Appreciate the rhetoric. Since when does a country that's basically denying other countries the opportunity to buy commercial lawful surveillance hacking tools from them is positioning itself as as a market-leading provider of commercial lawful surveillance hacking tools? Basically never. Long story short any country that wants to monitor journalists or basically launch lawful surveillance campaigns using hacking tools against individuals can basically outsource the malicious software "know-how" to local companies that develop such type of tools.

Positioning yourself as a market and country-tolerated vendor of commercial and market leading lawful surveillance hacking tools is prone to result in negative publicity and basically turn and position the company as a mockery among hardcore vendors of commercial and lawful surveillance hacking tools that also includes the bad guys including other nations that develop and actually present such releases on the market.

Assessing the U.S Intelligence Community's Annual Threat Report for 2022

In the most recently released "U.S Intelligence Community's Annual Threat Report for 2022" the U.S Intelligence Community states that China remains the U.S's most sophisticated and relevant cyber adversary which possesses the necessary sophistication to target the country both using cyber espionage and attacks against U.S critical infrastructure.

An excerpt:

"We assess that China presents the broadest, most active, and persistent cyber espionage threat to U.S. Government and private sector networks. China’s cyber pursuits and export of related technologies increase the threats of attacks against the U.S. homeland, suppression of U.S. web content that Beijing views as threatening to its control, and the expansion of technology-driven authoritarianism globally."

The report actively discusses Iran, North Korea, China and Russia in a variety of dangerous aspects to U.S National Security with the report courtesy of the U.S Intelligence Community.

What the report also emphasizes on is the use of malicious influence both in the cyber domain and internationally where the U.S publicly acknowledges in its report that China is attempting to mimic Russia on its way to launch foreign influence operations serving the needs of China by using publicly disclosed training material and real-life case studies courtesy of Russia in terms of foreign influence operations which could set a dangerous precedent in case China fully realizes the vast potential of Russian's capabilities in foreign influence operations that also includes the cyber domain on its way to dominate a country including the information and electromagnetic spectrum which also includes the launching of foreign influence campaigns both in real-life and virtually.