People’s Information Warfare Concept vs the U.S DoD Cyber Warfare Doctrine

I recently came across to the most recently published DoD Cyberspace Strategy 2018 which greatly reminded me of a variety of resources that I recently took a look at in terms of catching up with some of the latest cyberwarfare trends and scenarios. It appears that the U.S is re-claiming back the dominance over the “communication channel” using a variety of real-life oriented cyber threats including referencing and citing security researchers and NGOs (Non-Profit Organization) as potential threats. Takes you back – doesn’t it?

We cannot discuss these if we don’t compare their cyber warfare approaches next to one another. It’s rather ironic situation, since China has built its cyber warfare doctrine based on the research conducted into the topic by U.S military personnel. At a later stage, Chinese military thinkers perceived the combination of Sun Tzu’s military strategies in the virtual realm

The countless number of allegations by countries across the world that China’s As for the U.S DoD put in a “catch-up mode” by major news outlets. Pushing the boundaries of the irrelevance? That’s for sure.

– Russia doctrine – people’s information warfare

With Russia continuing to dominate the threat landscape of terms of massive and large scale economic and financial espionage in the face of cybercrime-driven fraudulent and malicious economy which can be best described as something in the lines of economic terrorism

– China doctrine – people’s information warfare – U.S copycats
– Iran’s doctrine – academic playground

Let’s compare China’s People’s Army and the U.S DoD to Germany whose vision is that if they forbid the use of “hacking tools” to some and real-life pen-testing tools

The U.S botnet of military hosts was the last indication of total misunderstanding of the current threatscape, by putting the emphasis on the “striking capability”, which is rather logical when you have real-life military personnel converted to cyber warriors.

A doctrine that’s aiming to prevent sensitive military secrets of leaking is forgetting some of the basics of information warfare – disinformation, or come and hack us, and steal our tweaked sensitive military secrets. On purposely, disinformation on the actual state of cyber warfare preparedness by on purposely suffering security breaches, then whining how they have managed to break.

The left hand never knows what the right one is doing,

Capability matching vs threat acquisition?

China’s already reached the unrestricted warfare stage, a phrase when its hacking capabilities empowered Internet users self-mobilize themselves, the U.S DoD is implementing its cyber warfare doctrine, and the rest of the world is whining for yet another password stealer for online games that’s phoning back to China.

A little less conversation, a little more action “babe”.

Now that’s its becoming increasingly clear that cyber jihad is entering into a “stay tuned for a webcast with your favorite terrorist” stage, what we may witness next is terrorist on sand-proof Segways. Cutting the sarcasm, it’s becoming boring the listen to the same song played on a different media device.

Leave a Reply

Your email address will not be published. Required fields are marked * E-shop Owner Information

Who is Dancho Danchev?

Focused on delivering daily batches of personally-produced never-ending supply of high-quality and never-published and released before classified and sensitive Intelligence Deliverables.

Latest Products