2019

 

2018

 

2017

 

2016

 

2015

 

2014

 

2013

The developing countries weak cyber security measures is an opportunity for offensive cyber operations through proxies without their consent.

The growth of the African Internet and services related to the Internet has been rapid over the last decade. Following this market expansion, a variety of service providers have started to provide access. A fast-growing market put pressure on the providers to deliver services first and only then seek to secure the networks, which is natural in an emerging business landscape. The massive buildup of IT infrastructure with limited security in place in an opportunity for potential adversaries that seek to attack vital interests through proxies to avoid attribution and repercussions. I wrote about the issue in African Security Review. See Kallberg, Jan, and Steven Rowlen. “African nations as proxies in covert cyber operations.” African Security Review 23, no. 3 (2014): 307-311.

2012

The effectiveness of strategic cyber campaigns are dependent on the institutional stability of the targeted society.

I started to think along these lines in 2010 and by 2012 I wrote a white paper for AFOSR that was invited to a full proposal. Not every nation is alike. The institutional stability determines when a strategic cyber campaign will have a direct impact on regime stability – and be strategically successful. It can be flipped – e contrario – if the strategic campaign does not challenge the stability it will not have a decisive impact. In 2012 I started writing on my Strategic Cyberwar Theory (SCWT), which culminated in the publishing of “Strategic Cyberwar Theory – A Foundation for Designing Decisive Strategic Cyber Operations” in The Cyber Defense Review Vol. 1, No. 1 (SPRING 2016), pp. 113-128 (16 pages) (download). This also means that in a regional cyber conflict, the societal stability gives one party an advantage over the other. Published as Kallberg, Jan. “Assessing India’s Cyber Resilience: Institutional Stability Matters.” Strategic Analysis 40, no. 1 (2016): 1-5.

2011

For an adversary that seeks to avoid a direct confrontation the covert way to destroy satellites and spaceborne assets is to cyber attack and move space junk, that responds to radio signals and have residual fuel, into orbits that will collide with targeted assets. When collission occur the space terrain will be polluted by debris and an area denial emerges.

Cyber attacks in outer space is a topic that has surfaced and gained traction lately (2017-2018). As an indication, satellites travel at approximate 18 000 miles an hour so the impact of a collision is massive and a targeted asset is vaporized, creating a cloud of hyper-velocity fragments. My initial ideas and the first concept were published in “Designer Satellite Collisions from Covert Cyber War” in Strategic Studies Quarterly, Vol. 6, No. 1 (SPRING 2012), pp. 124-136 (13 pages) (download).