Posted on Jun 21, 2016
Pentagon Unleashes Cyber Effort to Counter Militants on Battlefield
990
5
8
5
5
0
Posted >1 y ago
Responses: 4
This is important in more ways than defeating the IS, it is also preparing us to counter the New Generation Warfare being developed and implemented by the Russian Armed Forces: http://www.thepotomacfoundation.org/russias-new-generation-warfare-2/
Electronic Warfare has always been vigorously pursued by Russian/Soviet forces, as all of us Cold War veterans can attest to. Entering Desert Storm we already were using frequency hopping and other OPSEC to ensure secure communications, and in Iraq even our handheld radios were COMSEC secured.
Electronic Warfare has always been vigorously pursued by Russian/Soviet forces, as all of us Cold War veterans can attest to. Entering Desert Storm we already were using frequency hopping and other OPSEC to ensure secure communications, and in Iraq even our handheld radios were COMSEC secured.
» Russia’s New Generation WarfareThe Potomac Foundation
The military conflict between Russia and Ukraine is now in its 25th month. What began as a relatively bloodless superpower intervention in Crimea and morphed into a proxy “separatist” insurrection in the Donbass region has turned into a two-year-long, real war. Despite repeated attempts to negotiate an effective cease-fire, the struggle in Ukraine has involved the largest-scale battles in Europe since the end of World War II.
(0)
(0)
I like to think that with all the extremely talented hackers and computer geeks in the United States, that the only reason we have not gone in and attacked terrorist websites on a Hiroshima and Nagasaki scale is because the NSA is monitoring them to gather intel. Other than that, it would be as derelict in duty to not have done this to date, as was not bombing the fuel tankers ISIS was using to truck fuel out of their AO in order to fund their operations.
(0)
(0)
Maj Kevin "Mac" McLaughlin
Well, if I have access to a system and I'm able to read their mail, learn about their strategies, extrapolate names and key figures, why would I take the site down? Especially when a brand new one could be installed the same day and now with improved security.
A good way to look at this is to compare this to when the Allies cracked the Enigma code during WWII. Instead of thwarting all of the Axis attacks and giving up the fact we were able to read their secure transmissions, we had to selectively pick critical intel and ensure the outcomes would be minimized.
Until we go full scale attack against ISIS, we should not be giving up any presence we have to their systems simply by denying them service.
A good way to look at this is to compare this to when the Allies cracked the Enigma code during WWII. Instead of thwarting all of the Axis attacks and giving up the fact we were able to read their secure transmissions, we had to selectively pick critical intel and ensure the outcomes would be minimized.
Until we go full scale attack against ISIS, we should not be giving up any presence we have to their systems simply by denying them service.
(0)
(0)
MSG (Join to see)
Maj Kevin "Mac" McLaughlin - As I said, I'd like to think that that's what we were doing. But then I think back on those oil tankers.
(0)
(0)
Maj Kevin "Mac" McLaughlin
I'd say we know what to do and I can't offer much insight into the offensive/exploitation side of what we're doing in cyber, but our operators are very much aware that it would be stupid to give up access by pushing Denial of Service attacks unless the system in question is actively performing an action which significantly harms Americans.
(0)
(0)
Great story from Voice of America.If you are tired of the media on local presidential overkill, Voice of America is your news outlet!
(0)
(0)
Read This Next