New Yorker – The country’s cyber forces have raked in billions of dollars for the regime by pulling off schemes ranging from A.T.M. heists to cryptocurrency thefts. Can they be stopped?
CIMSEC – Great Power Competition will dominate our military’s focus for the foreseeable future and the Information Warfare Community, including Naval Intelligence, must adjust accordingly. Understanding that China intends to enhance its military modernization efforts with AI, that it thinks differently about warfare in the 21stcentury, and that we need to modify our own warfare model to effectively respond, the Information Warfare Community’s newfound status should elevate new technologies into our Navy’s decision-making and combat DNA.
CIMSEC – While the United States is not at war with Russia or China, the U.S. is in a persistent “shadow war” below armed conflict across the globe with these strategic adversaries.
CIMSEC – Earning serious proficiency in offensive and defensive cyber capabilities will become fundamental. Especially in the maritime domain, with its vast interdependencies, cyber threats must be faced cooperatively to ensure a resilient and reliable cyberspace, which has become indispensable for the functioning of the global maritime commons.
CIMSEC – Just as the sextant enabled celestial navigation of ships far from shore, and signal flags and lights allowed ships to communicate with one another more effectively, the adoption of digital technology has allowed sailors to shoot, move, and communicate even more rapidly. While this technology allows seafarers to navigate more precisely and communicate and coordinate with others more easily, it introduces new vulnerabilities to modern warships.
CIMSEC – Maritime security, through cybersecurity, will become a much more complex endeavor. It will require a considered combination of the human element, technical innovation, management procedures, security protocols, and classical maritime know-how.
CIMSEC – The underpinnings of the global economy rely not on centralized control of a benevolent organization, but on the collective efforts of the global maritime ecosystem to take the necessary actions to ensure that the maritime commons remain credible and viable to transport the world’s goods. But the maritime industry must acknowledge that they are already under siege and act accordingly.
– Bloomberg – Niall Ferguson writes that the U.S. won the Cold War by exporting its values, and China has a similar plan for Cold War II.
– Washington Times – In 21st century conflict, even the crisis hotline could become a weapon of war.
– CIMSEC – In a time when people are more interconnected than ever, the power of information is paramount.
– War on the Rocks – AI is sure to permeate every aspect of warfighting — from movement to communication, logistics, intelligence, weapons, and people. Delivering these warfare-changing technologies to the frontlines and into American hands will depend on less glamorous activities — namely, expediting the procurement process to more quickly field AI, and securing supply chains by collaborating with U.S. companies.
– USNI Blog – Can we learn to do any better if the next surprise attack comes in cyberspace?
– CIMSEC – In a data-rich and knowledge-poor circumstance, challenged with sophisticated competitors, as IWC you will be more than just the conductor of this information orchestra; you will be the instrument builder and tuner, the composer, and the producer. You will rely on advanced technologies and computers to perform the heavy lifting so our forces can act dynamically with precision and purpose. Modern information warfare requires this nimble shift from orchestra to jazz, or to the raw power and disruption of punk rock.
– Washington Free Beacon – Several nations, including China and Russia, are building powerful nuclear bombs designed to produce super-electromagnetic pulse (EMP) waves capable of devastating all electronics—from computers to electric grids—for hundreds of miles, according to a newly-released congressional study.
– CIMSEC – Today, there are state and non-state actors challenging nations, institutions, and private companies through a wide range of overt and covert activities targeted at their vulnerabilities. Both NATO and the European Union refer to these as “hybrid threats” and the maritime domain has proven to be especially vulnerable.
– New Yorker – American companies that fall victim to data breaches want to retaliate against the culprits. But can they do so without breaking the law?
– CIMSEC – The 2017 back-to-back collisions of two Navy destroyers led to much speculation about the role of cyberphysical interference in the disasters. As the senior officer representing the U.S. Navy engineering community during the USS McCain cyber assessment, it is clear that we do not yet have the basic tools to definitively answer the question, “were we hacked or did we break it?”
– Breaking Defense – The US military is “not prepared” to conduct radio and radar jamming against high-end adversaries, a veteran electronic warfare officer now in Congress says.
– CIMSEC – To stay ahead of competing ports and technological developments, automation has been heralded as inevitable. Major transshipment hubs and aspiring ports bet their future on automation, which raises the impact cyber risks could have in the long-run.
– New York Times – A serial leak of the agency’s cyberweapons has damaged
morale, slowed intelligence operations and resulted in
hacking attacks on businesses and civilians worldwide.
– Washington Post – How Russia conducts information warfare against the US, via Facebook.
– New York Times Magazine – How the Kremlin built one of the most powerful information weapons of the 21st century — and why it may be impossible to stop.
– CIMSEC – A conversation with Dr. Alison Russell of Merrimack College about navies and their relationship with cyber. It’s about the distinct layers of cybersecurity, how navies use them to enhance their capabilities, and the challenges in securing and maintaining that domain.
– New Yorker – What lay behind Russia’s interference in the 2016 election—and what lies ahead? A look at information warfare, Russian-style.
– New York Times Magazine – After a maker of surveillance software was hacked, its leaked documents shed light on a shadowy global industry that has turned email theft into a terrifying — and lucrative — political weapon.