Pages

12 June 2024

The Soft Cyber Underbelly of the U.S. Military

W. Stone Holden

Footage beamed live around the world on social media showed paragliders armed with automatic weapons swooping from the sky, terrorists on motorcycles flooding through gaps in a vaunted defensive line, and civilians massacred and dragged from their homes to serve as hostages. A hail of rockets threatened to overwhelm the defensive systems that protect millions of Israelis.

Not visible were the hackers who eroded the ability of the country’s security organizations to provide warning and took advantage of civilian safety apps to install malware, not to mention the years of reconnaissance they conducted through the personal devices of Israelis. The 7 October Hamas attacks on Israel were notable for many reasons, one of which was their integrated employment of the information environment before, during, and after.

Hamas’s attacks demonstrate the kinds of asymmetric and nontraditional cyber threats in the information environment that must be addressed to keep U.S. forces secure. While until recently nonstate actors were not generally associated with cyber capabilities, such actors can affect advanced militaries with increasing effectiveness as they gain access to better tools and skills. Furthermore, the integrated attacks illustrate the effects of attacks on individuals within a force unprotected in cyberspace. They demonstrate that the capabilities are a real and growing threat to Marines and sailors operating around the world.

No comments:

Post a Comment