Friday, 19 April 2024
logo
Up-to-the-minute perspectives on defence, security and peace
issues from and for policy makers and opinion leaders.
        



dv-header-dday
     |      View our Twitter page at twitter.com/defenceredbox     |     
cybersecurity

A report by Intellect, July 2010

Introduction

Information Superiority (IS) is essential to protecting and defending UK nationals from various threats. Whereas the utility of platform capabilities such as warships, submarines, and military aircrafts provide a very visible role in enhancing the nation's security, IS capabilities, whilst less visible, are the most critical capabilities in achieving the UK's defence and security goals. This paper, written by Intellect, will illustrate how these technologies benefit the UK's defence and security operations. Intellect is the trade association for the UK technology Industry, representing around 800 companies across the information technology, telecommunications, and electronics sectors. Its members include the strategically important companies active in the defence and security markets of interest to the UK.

IS provides the foundation for the UK's intelligence and information capabilities. These capabilities form the eyes, ears, and nervous system to the Ministry of Defence's (MoD) military operations. The UK's success in defending and securing the country from current and future threats depends on the country's ability to understand its adversaries' movements and intentions and the environments that they operate in. Gaining this understanding means that UK Armed Forces must be capable of continuously collecting (sense) critical data, interpreting what this data means by transforming it into useful and usable information or intelligence (understand), communicating this information to those who need it (share), and exploiting this information to make better informed decisions (decide).

Tangible benefits arising from various IS capabilities are evident in the context of the UK's current and likely future operations. For example, when conducting counter-insurgency operations, a strategy employed by UK forces in Afghanistan, information is the key capability for determining success. The UK must understand the operational environment better than the enemy, i.e., achieve information superiority. Industry's IS capabilities also play a critical role in ensuring the security and resilience of the UK, its public and private sector, and its critical national infrastructure. In this capacity, IS is critical in policing and emergency response activities.

By investing in these capabilities, the UK's defence and security operations benefit from increased effectiveness in the precision of action and the ability to conduct joint operations, which often lead to reduced fratricide and improved survivability both of defence and security forces and equipment. Therefore, IS capabilities allow the UK to defend and secure the nation at a smaller cost, both in terms of money and the loss of life.

Read more...  

By Sean Noonan

A recent batch of WikiLeaks cables led Der Spiegel and The New York Times to print front-page stories on China's cyber-espionage capabilities Dec. 4 and 5. While China's offensive capabilities on the Internet are widely recognized, the country is discovering the other edge of the sword.

China is no doubt facing a paradox as it tries to manipulate and confront the growing capabilities of Internet users. Recent arrests of Chinese hackers and People's Liberation Army (PLA) pronouncements suggest that China fears that its own computer experts, nationalist hackers and social media could turn against the government. While the exact cause of Beijing's new focus on network security is unclear, it comes at a time when other countries are developing their own defenses against cyber attacks and hot topics like Stuxnet and WikiLeaks are generating new concerns about Internet security.

One of the U.S. State Department cables released by WikiLeaks focuses on the Chinese-based cyber attack on Google's servers that became public in January 2010. According to a State Department source mentioned in one of the cables, Li Changchun, the fifth highest-ranking member of the Communist Party of China (CPC) and head of the Party's Propaganda Department, was concerned about the information he could find on himself through Google's search engine. He also reportedly ordered the attack on Google. This is single-source information, and since the cables WikiLeaks released do not include the U.S. intelligence community's actual analysis of the source, we cannot vouch for its accuracy. What it does appear to verify, however, is that Beijing is regularly debating the opportunities and threats presented by the Internet.

Read more...  
 

Cookies
We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the Defence Viewpoints website. However, if you would like to, you can modify your browser so that it notifies you when cookies are sent to it or you can refuse cookies altogether. You can also delete cookies that have already been set. You may wish to visit www.aboutcookies.org which contains comprehensive information on how to do this on a wide variety of desktop browsers. Please note that you will lose some features and functionality on this website if you choose to disable cookies. For example, you may not be able to link into our Twitter feed, which gives up to the minute perspectives on defence and security matters.