The Defense Department’s IT agency is shoring up the military’s infrastructure to better withstand attacks as China looks for ways to disrupt everyday life in the United States during a conflict, Lt. Gen. Robert Skinner said Wednesday. “That is a key objective for the PRC: to make sure that they can disrupt our day-to-day life,” said Robert Skinner, who leads the Defense Information Systems Agency. “They will want to look at: ‘How can we disrupt, not just militarily, but from an information standpoint, and from our day-to-day lives?’ To see: ‘Is the will there, as a nation, to continue on with whatever kind of conflict is going?’” Skinner said that China’s “risk tolerance continues to change”—meaning that Beijing is willing to go further in its offensive cyber and space operations. National Society of Professional Engineers, NICET, Institute of Industrial and Systems Engineers, INCOSE, INFORMS https://lnkd.in/ewnPe5BV
Ben Amaba, PhD, PE, CPIM, LEED AP’s Post
More Relevant Posts
-
Adversary and General Briefs Comprehensive collection of briefs crafted to provide critical insights into cyber and cognitive warfare landscapes, focusing on China, Iran, and Russia. https://lnkd.in/esBuu2GG
To view or add a comment, sign in
-
Adversary and General Briefs Comprehensive collection of briefs crafted to provide critical insights into cyber and cognitive warfare landscapes, focusing on China, Iran, and Russia. https://lnkd.in/eY5zrAGr
To view or add a comment, sign in
-
Age of commercial cyber espionage and wartime cyber sabotage of mission critical national and corporate infrastructure. Weaponization of nation state backed cyber Warfare. Next is Space Wars and Arms Race. https://lnkd.in/dRbUJD9k
To view or add a comment, sign in
-
Adversary and General Briefs comprehensive collection of briefs crafted to provide critical insights into cyber and cognitive warfare landscapes, focusing on China, Iran, and Russia - rigorous analysis and in-depth research https://lnkd.in/esBuu2GG
To view or add a comment, sign in
-
Age of commercial cyber espionage and wartime cyber sabotage of mission critical national and corporate infrastructure. Weaponization of nation state backed cyber Warfare. Next is Space Wars and Arms Race. https://lnkd.in/dRbUJD9k
To view or add a comment, sign in
-
China is developing the "ability to physically wreak havoc on our critical infrastructure at a time of its choosing," FBI Director Christopher Wray said at the 2024 Vanderbilt Summit on Modern Conflict and Emerging Threats. "Its plan is to land low blows against civilian infrastructure to try to induce panic." Wray said it was difficult to determine the intent of this cyber pre-positioning which was aligned with China's broader intent to deter the U.S. from defending Taiwan. Chinese government-linked hackers have burrowed into U.S. critical infrastructure and are waiting "for just the right moment to deal a devastating blow," said Wray. https://lnkd.in/g4jd8Va4
To view or add a comment, sign in
-
For Your Continuity Preparedness.
Strategist, Cryptologist, Cyber Warfare Officer, Space Cadre, Intelligence Professional. Personal account. Opinions = my own. Sharing ≠ agreement/endorsement.
#China’s #cyber operatives have infiltrated computer networks used to control critical U.S. infrastructure in preparation for future attacks to disrupt American society during a conflict, the director of the National Security Agency warned. Air Force Gen. Tim Haugh, who is also commander of U.S. Cyber Command, said Chinese hackers have been pre-positioning cyber tools in ways that are unique in military terms because the operations provide no intelligence value — suggesting the Chinese military is preparing the ground for large-scale sabotage in the future.
To view or add a comment, sign in
-
Adversary and General Briefs comprehensive collection of briefs crafted to provide critical insights into cyber and cognitive warfare landscapes, focusing on China, Iran, and Russia - rigorous analysis and in-depth research https://lnkd.in/eY5zrAGr
To view or add a comment, sign in
-
🚨 Rocket Man's Hunger Game: Stealing South Korean Military Secrets! 😱 What: 😱 North Korean hackers have successfully stolen critical military technology from South Korea, including sensitive details on advanced defense systems like the K2 battle tank 탱크 and Baekdu & Geumgang reconnaissance aircraft ✈️. How: 🥷 The hackers cleverly exploited a weak link in the defense supply chain, targeting smaller subcontractors responsible for crucial defense documentation. 📄 Why: ☢️ This audacious cyberattack aims to bolster North Korea's military and nuclear programs by acquiring classified technical information and intellectual property. 🧠 What It Does: ⚠️ The breach exposes glaring vulnerabilities in South Korea's defense sector, underscoring the urgent need for robust cybersecurity measures. 🛡️ What It Will Accomplish: 💪 To prevent future breaches, South Korea is implementing enhanced security protocols and pushing for legislative reforms like the Basic Cybersecurity Law to safeguard national security and protect sensitive information. 🔒 Financial Impact: 💰 The cyberattack could trigger increased defense spending on cybersecurity measures and potentially lead to significant economic losses due to compromised technology. 💸 Technical Synopsis: 💻 South Korea faces a formidable cybersecurity threat as North Korean hackers successfully infiltrate its defense systems. The breach highlights the critical vulnerabilities in the defense supply chain. In response, the People Power Party (PPP) is advocating for comprehensive cybersecurity reforms, including a Basic Cybersecurity Law and stricter espionage penalties, to safeguard national security. 🇰🇷 Keywords: South Korea, cybersecurity, North Korea, military technology, K2 battle tank, Baekdu & Geumgang, cyberattack, hacking, defense, supply chain, national security, espionage, Basic Cybersecurity Law Hashtags: #CybersecurityExpert #DefenseContractor #GeopoliticalAnalysis #IntelligenceCommunity #ArmsControl #SouthKoreaCybersecurity #NorthKoreanHacking #K2Tank #BaekduGeumgang #DefenseIndustry #MilitaryEspionage #CybersecurityExpert #DefenseContractor #GeopoliticalAnalysis #IntelligenceCommunity #ArmsControl #CyberAttack #NationalSecurity #SupplyChain #DataBreach #TechNews #AsiaPacific #Geopolitics #MilitaryTechnology #CyberThreat #Hacking #Espionage #CyberWarfare #CybersecurityAwareness
To view or add a comment, sign in
-
Guess what - you can prepare for moderate dangers to your family without being a "prepper." When you eschew the basics of TEMPORARY and MINIMAL self-reliance, you put your family at risk and shift your own responsibilities to neighbors and government. Here is a BASIC PREPAREDNESS resource that can save lives - perhaps even your own: FEMA Basic Preparedness = https://lnkd.in/gQMw6_Mv #cybersecurity #community
Strategist, Cryptologist, Cyber Warfare Officer, Space Cadre, Intelligence Professional. Personal account. Opinions = my own. Sharing ≠ agreement/endorsement.
#China’s #cyber operatives have infiltrated computer networks used to control critical U.S. infrastructure in preparation for future attacks to disrupt American society during a conflict, the director of the National Security Agency warned. Air Force Gen. Tim Haugh, who is also commander of U.S. Cyber Command, said Chinese hackers have been pre-positioning cyber tools in ways that are unique in military terms because the operations provide no intelligence value — suggesting the Chinese military is preparing the ground for large-scale sabotage in the future.
To view or add a comment, sign in