The cyber derivatives of the Palestinian-Israeli conflict
Cyberdefence

Hamas's war against Israel (VI): the cyber derivatives of the Palestinian-Israeli conflict

The Hamas attack against Israel has been, according to the data that has emerged subsequently, even more complex than initially believed. In addition to involving actions in the land, sea and air domains, as well as having a strong cognitive component, it was accompanied by attacks in the cyber domain, aimed at confusing the Israeli population or denying them important information regarding the Palestinian rocket threat. . What we have seen constitutes one more episode of a conflict that, although it has once again taken the step to the physical, in the form of an Israeli military intervention that seeks to undermine Hamas, has also been raging for years on the networks. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.

Conflict

Open source intelligence (OSINT) in the Ukrainian war

Open Source Intelligence (OSINT) began its journey in the interwar period, consolidating during the Second World War and fully developing with computerization. Since then, a long way has been traveled and progress has been made in the use of tools that an incipient community of analysts has been able to capitalize on during the current war in Ukraine, although not only: from the geolocation of enemy positions, to the analysis of shared information. In social networks, there are many fields in which, increasingly, experts outside the Armed Forces or traditional intelligence services are used. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.

Quantum Cryptography
Articles

Quantum cryptography

The leaps and bounds of technological development that human beings have experienced in recent decades at the hands of engineering and computing have represented a major innovation with respect to the societies that have preceded us, allowing the emergence of important processes of social modernization, whose greatest exponent currently seems to lie in the evolution of artificial intelligence. However, despite the immediacy and contemporaneousness that these technological advances represent for a generation of developers and digital natives, they will soon be eclipsed by the future of a new progress with a name and surname: quantum processing. This, in turn, will require the development of quantum cryptography solutions that keep files and data, both public and private, safe. An aspect in which Spain, far from being a backward nation, is located in an enviable position facing the future. The [Keep reading…]

Chat GPT-4, OpenAI's artificial intelligence capable of generating content and interacting with the user, has already experienced significant development in the evolution of syntactic language, emulating human interaction more and more accurately. Source - Aries Workspace.
Cyberdefence

Chat GPT, artificial intelligence as a factor of change

Chat GPT-4, OpenAI's artificial intelligence capable of generating content and interacting with the user, has experienced significant development in the evolution of syntactic language, emulating human interaction more and more accurately. The great advance represented by the development of this type of tools is, in addition to a risk, an opportunity. Ultimately, it is essential that we are aware that the different existing and upcoming artificial intelligences will pose important challenges for security, while at the same time they will be an important support in the implementation of defense. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.

TacticMedAid app. Source - Supruniuk, 2022.
Cyberdefence

The Ukrainian war and mobile applications

COTS technologies are undoubtedly among the main protagonists of the Ukrainian war. However, although great importance is generally given to elements such as commercial drones or some communications equipment, they are by no means the only commercial products susceptible to militarization. In the last year we have witnessed the constant development and reconversion of mobile applications, web-level tools and bots, by Ukrainian developers and programmers forced to become combatants. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.

Joint Cyber ​​Defense Command. Source - EMAD.
Cyberdefence

Military technology in Spain: cyber defense

Technologies related to cyber defense require a very special breeding ground for their development. Firstly, they need a National Plan capable of organizing and channeling efforts in the appropriate direction. Secondly, the raw materials, in the form of trained personnel and specialized companies, capable of providing the appropriate technologies and tools. Thirdly, that both factors be combined based on public-private collaboration projects capable of putting all the capabilities of these companies and the State at the service of defense (and offense) in the "fifth domain." (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.

The microchip war
Cyberdefence

The microchip war

The trade and technological war between the United States and China has only just begun, a confrontation in which the European Union is trying to join, although it is at a disadvantage. At the moment it seems difficult to predict the effects that the internal protectionist policies that the actors involved are adopting will produce in the medium and long term on technological development and international relations. However, it is easy to draw a powerful conclusion: contemporary powers are learning by force that there are national sectors that must be independent of third actors. The manufacturing and design of microchips is one of them. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.

Cyberdefence

The risks of digital democracies

Digital democracies, understood not only as those that are digitizing the voting process, but also as those in which citizens have broad access to the Internet, run the double risk of being attacked both during the holding of the elections themselves, through cyberattacks, such as through disinformation campaigns. Given that digitalization - at least in some aspects - does not seem reversible, protective measures will have to be established to prevent a repeat of what happened in electoral campaigns such as the 2016 US election or the May 2019 elections to the European Parliament. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.

Cyberdefence

The war between Russia and Ukraine in the cyber domain

Before the invasion of Ukraine by Russia, this State already stood out for the hyperactivity and lack of stealth of its cyber activities. NotPetya, SolarWinds, Colonial Pipeline, were just some examples that allowed us to observe the offensive capabilities that Russia had in cyberspace. Although this situation has been considerably altered by the Russian-Ukrainian conflict, as Russia has seen war as a way to test its abilities in the cyber domain on a large scale, it is also true that, far from what they might have thought, a large number of experts, “cyber-armageddon” has not occurred. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.

Cyberdefence

Disinformation operations in cyberspace

In the era of communications, where social networks have taken on a particularly relevant role in Western societies, together with the phenomenon of cyberattacks, an even more intangible security vulnerability has been confirmed: the existence of disinformation campaigns in the cyberspace in order to modify public opinion and currents of thought in society. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.