Ten Technologies Needed on the Digital Battlefield

FavoriteLoadingInsert to favorites

“How quite a few hackers has the Pope”?

As warfare significantly focuses to the digital battlefield, 10 emerging systems have been identified that could enable Western protection forces repel so-identified as grey zone attacks.

The growing risk posed by grey zone or hybrid conflict – where attacks are carried out by exploiting IT vulnerabilities and other non-traditional struggle routes, instead than open up warfare – indicates defence and protection organizations must be rethinking their technique and searching to quickly deploy emerging systems, in accordance to a new report.

The Assurance in Chaos report from defence and protection corporation organization QinetiQ, charts the shift from traditional open up warfare to grey zone or sub-threshold strategies used by each state and non-state adversaries and highlights the central function that technology plays in each enabling grey zone attacks and defending from them.

Examine Extra: NATO is Hiring its Initially CIO

High-profile attacks targeting gatherings these as elections have develop into commonplace in latest yrs, and earlier this thirty day period Australian defence minister Linda Reynolds exposed the extent to which the line among war and peace has develop into “blurred”, stating that he country is under constant cyber assault.

“We’re now facing an setting where cyber-enabled actions have the possible to push disinformation, and also specifically help interference in our economic system, interference in our political procedure, and also in what we see as significant infrastructure,” she stated.

“This sort of activity seriously does blur what we formerly recognized to be peace and war, which is what we contact that grey zone in among.”

The Keyboard is Mightier Than the Bullet

Mike Sewart

Mike Sewart is group CTO at QinetiQ, and informed Computer system Business enterprise Evaluation: “Defence has usually been characterised by navy may how quite a few tanks have you got? How quite a few submarines? How quite a few ships? That actual physical presence is the deterrent for the enemy.

“Now, in the hybrid beat situation, you really do not require those people actual physical funds assets to have a important impact on the enemy. A couple of keystrokes can be much more devastating than a bullet.

“The shifting dynamic in technology which is presented rise to much more technology becoming obtainable by a broader vary of people today and in the fingers of the undesirable men, then that is not a superior position to be in. I consider the West has to now figure out that the risk envelope has modified very significantly.

“Classic warfare techniques are continue to legitimate simply because we’re in this hybrid entire world. But we have to also look at that a weaponized application is a is a important enabler for the enemy correct now, and have to plan appropriately.”

10 Systems to Cease Grey Zone Attacks

The report breaks grey zone attacks down into five types:

  1. Deniable attacks: A cyber assault on utilities or drones attacking an airport
  2. Info attacks: Foreign election interference or wrong textual content message/electronic mail scames
  3. User of proxy force: Terrorist attacks on towns or infrastructure
  4. Economic coercion: An adversary obtaining and disabling a piece of infrastructure these as an oil refinery
  5. Territorial encroachment: Seizing a fishing lane or sovereign territory

It also describes 10 technology places that QinetiQ sees as becoming crucial to serving to the West counter grey zone strategies.

Mike states: “Grey zone strategies are today’s fact and the West and its allies have no choice but to adapt. Rising and current systems hold the important to accomplishing aggressive gain when countering grey zone attacks. Just doing what we’ve often performed is neither proposed nor feasible. As a substitute, we have to embrace a much more scientific and technology-centered technique to defence and protection.”

The systems highlighted in the report are:

  1. AI, analytics and highly developed computing – By drawing and fusing information from a number of sources, AI can deduce enemy spots and even product predicted behaviours to decrease the covert nature of enemy attacks.
  2. Cyber and electromagnetic actions – The cyber domain is a vital entrance in grey zone level of competition, with a ton of specialists debating the matter. Much less discussed is the vulnerability of the electromagnetic spectrum.
  3. Novel weapons, systems and consequences – there are a wide vary of choices to kinetic weapons, but in the context of the grey zone, directed electricity is the most relevant. It can obtain traditional mission aims covertly and deniably. For illustration, a ship could expend tens of millions of dollars’ well worth of munitions defending from a swarm of low-cost, explosive-laden quadcopters, or a modest fleet of rigid inflatable boats. Alternatively, a laser weapon could neutralise them at what is described to be the price tag of a greenback for every shot.
  4. Ability sources, electricity storage and distribution – Some eventualities involve highly specialised electricity storage and power delivery systems, as opposed to relying on grid electricity.
  5. Robotics and autonomous systems (RAS) – in the grey zone, RAS could harness the collective power of a number of systems to supply much more granular situational recognition, as properly as serving to to broaden a user’s sphere of influence.
  6. Secure communications and navigation – Conversation lies at the heart of all grey zone functions. Shifting information close to is essential to building an intelligence on which to base strategic determination-producing.
  7. Sensing, processing and information fusion – The important to grey zone gain is recognition. Improvements in sensor technology are building new opportunities to obtain that information from the actual physical entire world
  8. Advanced components and producing – The grey zone’s quickly shifting nature indicates new abilities have to frequently be speedy-tracked into assistance in reaction to emerging and evolving threats. The ability to manufacture swiftly and at scale is therefore crucial to securing the gain over adversaries.
  9. Human security and overall performance – New abilities are unable to be introduced securely or properly devoid of first understanding how humans might interact with them. Sudden human responses can undermine the strengths of technology. All new systems and procedures must therefore be formulated with the human in intellect and analyzed in are living physical exercises to expose hidden challenges. Being familiar with how people today answer to items like disinformation strategies gives clues as to how ideal to guard from them
  10. System and procedure design and evaluation – Below the threshold of war, the principal function of large platforms like warships and tanks is to act as a deterrent from navy aggression. By relocating absent from lengthy lifetime systems which are typically more challenging to adapt, to a modular technique that permits main abilities to be augmented, though preserving vital capabilities, will provide considerably bigger benefit for income.

Mike concludes:With defence shelling out close to the entire world coming under growing general public and govt scrutiny, we are at cross-roads in how we evolve our defence and protection infrastructure to be in good shape for reason. The traditional supremacy of allied forces in traditional navy conflicts at present doesn’t increase to grey zone strategies, so a new technique requires to be readily viewed as and deployed”.

Now Examine This: British Army CIO on IoT and ‘Buzzword Bingo’