Fake Elon Musk video produced by generative AI
Cyberdefence

The potential of generative AI as a deception tool

Artificial Intelligence hides enormous potential when it comes to implementing disinformation operations. This is true both for government agencies and, increasingly, for criminal organizations, insurgent groups, and even ordinary citizens. A problem that has multiplied since Generative Artificial Intelligence (Generative AI), capable of creating images and videos from textual content, allows sharing content that is very difficult to discriminate by those who view it. All of which will force the development of new control tools, including the one that will have to be established over companies in the sector. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.

The cyber derivatives of the Palestinian-Israeli conflict
Cyberdefence

Hamas's war against Israel (VI): the cyber derivatives of the Palestinian-Israeli conflict

The Hamas attack against Israel has been, according to the data that has emerged subsequently, even more complex than initially believed. In addition to involving actions in the land, sea and air domains, as well as having a strong cognitive component, it was accompanied by attacks in the cyber domain, aimed at confusing the Israeli population or denying them important information regarding the Palestinian rocket threat. . What we have seen constitutes one more episode of a conflict that, although it has once again taken the step to the physical, in the form of an Israeli military intervention that seeks to undermine Hamas, has also been raging for years on the networks. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.

Logo of the IT-Army of Ukraine. Source - Ministry of Digital Transformation of Ukraine.
Cyberdefence

IT-Army of Ukraine: a militia for the cyber domain

The IT-Army of Ukraine is a figure created ad hoc by the Ukrainian government with the aim of fighting Russia in the cyber spectrum. An actor apparently lacking autonomy with respect to Ukrainian government decisions but acting with a notable degree of operational freedom, like a cyber guerrilla. An organization that has recruited dozens of volunteer cyber operators in recent months and has made it possible to attack the websites, infrastructures and networks of Russian companies and government agencies, scoring important successes. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.

Quantum Cryptography
Articles

Quantum cryptography

The leaps and bounds of technological development that human beings have experienced in recent decades at the hands of engineering and computing have represented a major innovation with respect to the societies that have preceded us, allowing the emergence of important processes of social modernization, whose greatest exponent currently seems to lie in the evolution of artificial intelligence. However, despite the immediacy and contemporaneousness that these technological advances represent for a generation of developers and digital natives, they will soon be eclipsed by the future of a new progress with a name and surname: quantum processing. This, in turn, will require the development of quantum cryptography solutions that keep files and data, both public and private, safe. An aspect in which Spain, far from being a backward nation, is located in an enviable position facing the future. The [Keep reading…]

Chat GPT-4, OpenAI's artificial intelligence capable of generating content and interacting with the user, has already experienced significant development in the evolution of syntactic language, emulating human interaction more and more accurately. Source - Aries Workspace.
Cyberdefence

Chat GPT, artificial intelligence as a factor of change

Chat GPT-4, OpenAI's artificial intelligence capable of generating content and interacting with the user, has experienced significant development in the evolution of syntactic language, emulating human interaction more and more accurately. The great advance represented by the development of this type of tools is, in addition to a risk, an opportunity. Ultimately, it is essential that we are aware that the different existing and upcoming artificial intelligences will pose important challenges for security, while at the same time they will be an important support in the implementation of defense. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.

Cyberchina. Source - Shutterstock.
Articles

The information domain: cyberspace seen from China

The birth of a new cybernetic domain, known in the West as cyberspace and in China as the information domain, capable of interconnecting the physical with the intangible plane of computing and allowing asymmetric action by the different geopolitical powers, has meant new and important challenges for global security. However, not all states have understood in the same way the impact that the use of network technology can have on military strategic plans. China, as a revisionist power, has perfectly understood that achieving information dominance is crucial to its international interests. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.

TacticMedAid app. Source - Supruniuk, 2022.
Cyberdefence

The Ukrainian war and mobile applications

COTS technologies are undoubtedly among the main protagonists of the Ukrainian war. However, although great importance is generally given to elements such as commercial drones or some communications equipment, they are by no means the only commercial products susceptible to militarization. In the last year we have witnessed the constant development and reconversion of mobile applications, web-level tools and bots, by Ukrainian developers and programmers forced to become combatants. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.

Joint Cyber ​​Defense Command. Source - EMAD.
Cyberdefence

Military technology in Spain: cyber defense

Technologies related to cyber defense require a very special breeding ground for their development. Firstly, they need a National Plan capable of organizing and channeling efforts in the appropriate direction. Secondly, the raw materials, in the form of trained personnel and specialized companies, capable of providing the appropriate technologies and tools. Thirdly, that both factors be combined based on public-private collaboration projects capable of putting all the capabilities of these companies and the State at the service of defense (and offense) in the "fifth domain." (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.

The microchip war
Cyberdefence

The microchip war

The trade and technological war between the United States and China has only just begun, a confrontation in which the European Union is trying to join, although it is at a disadvantage. At the moment it seems difficult to predict the effects that the internal protectionist policies that the actors involved are adopting will produce in the medium and long term on technological development and international relations. However, it is easy to draw a powerful conclusion: contemporary powers are learning by force that there are national sectors that must be independent of third actors. The manufacturing and design of microchips is one of them. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.

Cyberdefence

The risks of digital democracies

Digital democracies, understood not only as those that are digitizing the voting process, but also as those in which citizens have broad access to the Internet, run the double risk of being attacked both during the holding of the elections themselves, through cyberattacks, such as through disinformation campaigns. Given that digitalization - at least in some aspects - does not seem reversible, protective measures will have to be established to prevent a repeat of what happened in electoral campaigns such as the 2016 US election or the May 2019 elections to the European Parliament. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.