ARTICLE

Prepare For The Era Of Cyber Warfare

News Image By Mac Slavo/SHTFplan.com December 30, 2016
Share this article:

The revival of the Cold War attitudes between the U.S. and Russia are just the beginning of the an expanding scene of digital vulnerabilities and shocks to the system that could shut down the grid, cut off grocery and supply lines or leave millions without power in the cold. With global tension, the pretext could come from anywhere.

The coming era could be the age of electronic disruption, as ATMs, power grids, bank accounts, Internet servers and other important entities in society are intercepted, taken down, hacked or shut off by criminals and commandos in the ongoing cyberwar. 

Dissidents will be flagged and cut off from their accounts. Natural disasters will compound with these factors, testing the infrastructure and the integrity of the people themselves, who are in danger of devolving into civil unrest.

With the possibility of outright war with Russia or another power, DARPA is seeking advances in disruptive technologies for this quickly evolving age of electronic warfare that will center around domain dominance in a battlefield that has many complex dimensions. 


Russia has strategically positioned itself to take advantage of this tactic of modern warfare, and Putin has invested considerable capitol into developing these technologies, which utilize RF frequency to achieve a wide-range of objectives.

Now, President Obama is beefing up the cyberwarfare command, expanding its offensive engagements, and splitting its mission from more traditional NSA communication intercept activities.

During his final weeks in office, he gave new powers and agency independence to the dual-hat Cybercom mission that was created in 2009 under the NSA. Weaponizing data is at the center of its activities, which are now due to take on a new role during a time of heightened tension with Russia, China and other potential rivals.

via Washington Post:

With weeks to go in his tenure, President Obama on Friday moved to end the controversial "dual-hat"arrangement under which the National Security Agency and the nations cyberwarfare command are headed by the same military officer.

U.S. Cyber Command, or Cybercom, needed its own leader to become a full-fledged fighting force... Cybercom has since matured"

Cybercoms mission is, when ordered, to disrupt and destroy adversaries' networks. It is also to defend the nation against incoming threats to critical systems and to protect the militarys computers from cyberattack.

The NSA also has a defensive mission  to protect the governments classified networks  but is better known for its role in conducting electronic spying on overseas targets to gather intelligence on adversaries and foreign governments.

"The Congress should not place unnecessary and bureaucratic administrative burdens and conditions on ending the dual-hat arrangement at a time when the speed and nature of cyber threats requires agility in making decisions about how best to organize and manage the nations cyber capabilities, Obama wrote.

One way or another, information warfare has dominated U.S. affairs over the past several years of Obamas administration, where Edward Snowden, Julian Assange and Chelsea Manning figured prominently. 

The last election cycle saw claims of Russian hacking, however dubious, leaks from whistleblowing organizations, and a shadow government system with offline emails now partially exposed.

Propaganda flows down from official channels, and swirls around on the forums of the Internet; cyberwarfare soldiers at the DoD and NSA are engaged in data collection, profiling, infiltration and disinfo trolling operations online with risk groups across the spectrum.

And there will be much more where that came from.

An award for a contract posted at FedBizOpps reveals that DARPA is actively seeking to manipulate new strategies in electronic warfare to regain dominance in a field that this grant itself admits: "military use of GPS and other electronic communication devices has evolved from strategic advantage to vulnerability."


In particular, as Russian and Chinese forces have become increasingly sophisticated, only state-of-the-art strategic technologies, tuned to precise frequency ranges are relevant. It is a highly sophisticated and secretive field. Part of the summary for DARPAs grant states:

DARPA is seeking innovative ideas and disruptive technologies that offer the potential for significant capability improvement across the Strategic Technology Office focus areas. 

This includes technology development related to Battle Management, Command and Control (BMC2), Communications and Networks, Electronic Warfare, Intelligence, Surveillance, and Reconnaissance (ISR), Position, Navigation, and Timing (PNT), Maritime, and Foundational Strategic Technologies and Systems.

As SHTF has reported before, every major branch of the armed services has been upgrading its technological capabilities as electronic warfare increasingly dominates the new age of warfare, where tensions are ever rising, and the threat of another world war has never been more apparent.

Though the events have been little talked about, air traffic networks, government computer systems, train systems and other vital infrastructure have all been hacked in recent months. 

The responsible parties have been rarely identified, and could represent a foreign adversary, a terrorist cell, punk kids and hackers, or tests with the shadow governments own cyberwarfare army.

Originally published at SHTFplan.com - reposted with permission.


Other News

February 21, 2019Will The U.S. Military Invade Venezuela?

We are getting dangerously close to war with Venezuela. Last month, 35-year-old Juan Guaido declared himself to be the new president of V...

February 21, 2019Was Today's Technology Foretold in the Bible?

Daniel couldn't possibly understand many end time prophecies because certain events and advancements in technology would have to happen fi...

February 21, 2019The Empty Planet: Population Bust, Not Population Bomb

Virtually every dire prediction Paul Ehrlich made fifty years ago in his book "The Population Bomb" was wrong. Spectacularly wrong, in fac...

February 21, 2019A Palestinian Terrorist Too Brutal For Fatah

The Palestinian Authority has finally found a terrorist act committed by a Palestinian against an Israeli that it wants to disassociate fr...

February 20, 2019How 1984 Turned Into An Instruction Manual

One of the key themes from George Orwell's dystopic novel 1984 is that the Party can do and say whatever it wants. And more importantly, y...

February 20, 2019The Progressive Mandela Effect

The "Mandela Effect," which is the Internet's way of describing shared false memories is named for the legions of armchair historians who ...

February 20, 2019The Kushner Compromise?

"Israeli compromises" will involve reducing Israel to nine miles wide at its mid-section. That's not even as wide as Washington, D.C., or ...

Get Breaking News