https://defencescience.blog.gov.uk/2016/05/20/the-cyber-front-a-view-from-industry/

The cyber front: a view from industry

45158108

Cyber warfare has become the latest addition to the arsenal of countermeasures that the military operator must now consider alongside other force multipliers such as Electronic Warfare (EW).

For hundreds of years we formed armies; when we learned how to sail we created navies and in the last century we learned how to fly and enter space. Many, including within the military, argue that cyber is the fifth domain - land, air, sea, space and cyber. Some even argue that the ubiquity of these technologies transcend the other domains, making cyber an even more important consideration.

When a new threat emerges in a theatre - either a real physical threat, or a threat within the network - the Operational Commander cannot operate freely without increased risk to his resources. The threat and its associated risks need to be mitigated through countermeasures or removed, to maintain operational freedom. This is as relevant in the cyber domain as it is in land, maritime, air and space.

EW countermeasures and cyber countermeasures achieve the same effect – mitigating the risk and supporting operational effect. However, it is rare that EW and cyber are discussed openly in a collaborative manner. This is a shortcoming because the combination of effective EW and cyber together provide protection to assets through robust countermeasures. In addition, EW and cyber together can contribute to understanding the evolving operational environment through intelligence and data collection, collation and analysis, as well as the maintenance of an intelligent real-time picture.

An early military example reported of the offensive combination of air and cyber capabilities for military effect was in 2007 when Israeli jets bombed a Syrian facility that intelligence had indicated was developing nuclear capability. The reports suggest that knowing that Syrian air defences deployed Russian radar, air-to-ground electronic warfare attack, combined with cyber techniques to penetrate the computer networks, were used to plot false positions of attacking aircraft in order to evade detection.

As technology has moved on, systems have become more sophisticated, meaning that they have more complex vulnerabilities; this is as true for our systems as it is for the systems of an adversary. The nature of EW countermeasures has become more complex, as have cyber countermeasures.

The operational commander needs to understand his vulnerabilities. To do this, the increasingly complex and multi-dimensional operational environment needs to be represented visually. At a glance, this allows information regarding the operating domain, be it land, sea, air or computer networks, to be understood and acted upon. Advances in visualisation techniques are helping the operational commander to make decisions and act accordingly, either deploying countermeasures or launching an offensive response.

It isn’t just the combined effect of EW and cyber in the military domain that provides a powerful force. Commercial organisations with capabilities in software, modelling and simulation and working in the EW and cyber domains are another powerful force. Use of the expertise in the commercial environment allows the Government’s scientific arm to develop and sustain enhanced capability more effectively. Reaching out to commercial organisations also enhances national EW and cyber capabilities through access to subject matter experts and their links into academia. This access introduces diversity of thinking as well as innovation and an agile methodology in responding to the technically complex problems that arise in both the EW and cyber domains.

Chris

Chris Stanley - EWOS and Cyber Security Director
MASS is a world-leading authority in electronic warfare operational support, cyber security and secure ICT networks. MASS is an industry partner in the Electronic Warfare and Cyber framework run by Dstl for MOD's S&T Programme.

Leave a comment

We only ask for your email address so we know you're a real person