Fake Elon Musk video produced by generative AI
Cyberdefence

The potential of generative AI as a deception tool

Artificial Intelligence hides enormous potential when it comes to implementing disinformation operations. This is true both for government agencies and, increasingly, for criminal organizations, insurgent groups, and even ordinary citizens. A problem that has multiplied since Generative Artificial Intelligence (Generative AI), capable of creating images and videos from textual content, allows sharing content that is very difficult to discriminate by those who view it. All of which will force the development of new control tools, including the one that will have to be established over companies in the sector. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.

Logo of the IT-Army of Ukraine. Source - Ministry of Digital Transformation of Ukraine.
Cyberdefence

IT-Army of Ukraine: a militia for the cyber domain

The IT-Army of Ukraine is a figure created ad hoc by the Ukrainian government with the aim of fighting Russia in the cyber spectrum. An actor apparently lacking autonomy with respect to Ukrainian government decisions but acting with a notable degree of operational freedom, like a cyber guerrilla. An organization that has recruited dozens of volunteer cyber operators in recent months and has made it possible to attack the websites, infrastructures and networks of Russian companies and government agencies, scoring important successes. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.

Cyberchina. Source - Shutterstock.
Articles

The information domain: cyberspace seen from China

The birth of a new cybernetic domain, known in the West as cyberspace and in China as the information domain, capable of interconnecting the physical with the intangible plane of computing and allowing asymmetric action by the different geopolitical powers, has meant new and important challenges for global security. However, not all states have understood in the same way the impact that the use of network technology can have on military strategic plans. China, as a revisionist power, has perfectly understood that achieving information dominance is crucial to its international interests. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.

Cyberdefence

WhisperGate

On January 14, 2022, in the midst of an escalation of tension with the Russian Government, the Kiev authorities announced that more than 70 of their national organizations had been compromised by a new cyberattack supposedly coming from Russia and for which would have known about the WhisperGate malware. Unlike previous attacks, in many cases massive, everything indicates that in this case the tool was custom designed against Ukraine. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.

Cyberdefence

China in cyberspace

There is little we know about China in cyberspace. Increasingly, the media report on more or less malicious activities, from cyber attacks to information theft, often suspecting the communist regime. However, very little is written about how the People's Republic of China views cyberspace and how it should act in it, or the implications of the need to operate in the "fifth domain." facing the modernization of its Armed Forces. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.

Cyberdefence

Morocco in cyberspace

Currently, due to the technological development that the world has experienced, cyber threats represent one of the greatest risks faced by private companies, citizens and States – in the latter case, without distinction of their economic, international or political importance. Therefore, studying Morocco's role in cyberspace and the way in which our neighbor conceives this domain is of vital importance for Spain. In this focus we will try to observe the impact that cyber threats may have on Morocco, the vision of the Alawite regime on cybersecurity and cyber defense, and based on this, analyze whether our neighbor has the necessary capacity in cyberspace to pose a threat. relevant to our country. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.

Cyberdefence

Russia in cyberspace

Russia's activities in cyberspace are a hot topic. The benefit that the Eurasian giant obtains from the fifth domain as part of its Information Warfare campaigns is difficult to measure and, however, the persistence with which it acts and the importance it gives to its operations are clear indicators of its profitability. In recent years, the Eurasian country has achieved well-known milestones, without ceasing to officially rely on plausible deniability, thus trying to avoid an unprofitable escalation. Throughout the next lines we are going to try to explain in detail what Russia is looking for in cyberspace, what actors are involved and what is its conception of operations in this vital domain. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new [Keep reading…]

Cyberdefence

Deterrence in cyberspace

Like any other domain that can be used for military purposes, two types of positioning can be taken in cyberspace: offensive and deterrence. However, given the relative youth of the cyber domain, there is still a bitter debate among experts as to whether or not it is possible to apply classical theories of military deterrence to it. Over the next few weeks we will try to offer a review and explanation of the main deterrent measures that can be put into practice in cyberspace and their usefulness. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.

Cyberdefence

Responding to the Threats of the Fifth Domain

In an international context marked by the increase in the relevance of states and a rise in confrontation between them, cyberspace - the "fifth domain" - is currently constituted as an element of alteration of the classic parameters of deterrence. state. States play to display their strength in the cyber domain with the aim of deterring their possible rivals, causing cyberspace to become a fundamental part of the defense of nations. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.

Cyberdefence

The security of the cyber domain in Spain

Throughout history we can see that the progressive appearance of new technologies always entails a change in military doctrines, even if this does not occur immediately (Torres, 2013: 331). The way of waging war and its methods have evolved with humanity. The technological development that human beings have been able to experience throughout history has generally been linked to the search for military superiority over their enemies. And just as the development of navigation, aviation or space conquest translated into the opening of new “domains”[1] and spheres of influence in the method of war, today cybernetic technological development has given gives rise to the emergence of a new one: the cyber domain. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access [Keep reading…]