Shashank Joshi Profile picture
Jul 3 17 tweets 4 min read Read on X
🧵 Last week I attended the Oxford Cyber Forum run by @cyber_conflict. Most of it was under the Chatham House rule, but a few bits & pieces that struck me as notable, all from very well-informed people. Bottom line is that cyber landscape reflects darkening mood in wider security
On the Russian cyber threat landscape: the number of actors is proliferating, with new threat actors 1/ within Russian intelligence services 2/ tied to other parts of the Russian government and 3/ semi-autonomous outside it.
In Israel I heard big concern about Russia passing advanced cyber tools & tradecraft to Iran. In Oxford one person noted that this would be surprising, as Russia has history of infecting Iranian infrastructure for fourth-party collection (i.e. piggybacking on Iranian spying)
Russia & China, despite their wider strategic co-operation, are still liberally hacking one another. One person also noted: "China probably has better insight into the Iranian government than the Iranian government does itself". This puts talk of an "axis" into some perspective!
On China: new threat actors constantly being discovered, but also a new ecosystem of 100+ commercial enablers, providing things like attack infrastructure, data brokerage, anonymisation tools, etc. Combo of enablers from different firms is making it harder to track APTs.
The network of private Chinese threat actors is interesting. The iSoon leaks are one example (). These firms often hack & then try and sell product to Chinese state; in other cases they are tasked by Chinese spies. PLA has officers embedded in some of them.therecord.media/china-commerci…
On the broader cyber landcape, one official noted: "our theories rest on the idea that zero-days are scarce, so countries are hesitant to use them." What, he/she asked, "could change that assumption?"
In Europe officials see "a lot of positioning on our critical infrastructure". Open sources suggest that since 2023 there were 67 cyber incidents involving Russian threat actors (23 targeting CNI). Six came from China (with five of those targeting CNI). And six from Iranians.
Official: "we cannot out-resilience our adversaries" on cyber. "Every kid in the schoolyard who's bullied knows if you want to make the bullies stop, you have to stop them. You have to find allies to help...You have to find long term strategies...to put them back in their box"
Official:" "the same is true in cyberspace. Fortunes in cyberspace favour the brave. Success will depend on whether you can manoeuvre the adversaries and impact will be determined by the quality of alliances you can muster."
"we have a key problem in that all our [European] cyber defenders at the mil level are still operating within an ancient system of peacetime-crisis-conflict. So we have a lot of shiny cyber commands in many allied countries" with "no mandate to operate during supposed peacetime"
Official: "the problem is that many of our military [cyber] operators are not mandated to do anything right now...we need to find ways of bringing them in now to what's happening now, so that we don't expect them to take over when there really is something escalating."
Official: "most of our infrastructure is operated by industry, private sector, most of our intelligence when it comes to cyber comes from industry. I would say even 90% of intelligence in terms of threat info. comes from industry these days." (see also: )economist.com/technology-qua…
One person argued the West was still better at offensive cyber. "some of the actors we count among the top of the line...a lot...don't even have that much operational experience. We talk a lot about the Chinese...but they have far less offensive operational experience than we do"
On defensive cooperation: "when we would go to a cybersecurity conference 10 years ago, Feds were not welcome. They would not step through the door without actually having the game in the room to spot them. Now it's become like a, like a running joke...the trajectory is positive"
"Ukraine is a country that up until a few years ago had vast swathes of its critical infra running on pirated copies of Windows XP. Look how quick the turnaround was, in defending that...collectively together through intel, the flow from the private sector, the public sector"
On cyber lessons from Ukraine. "there is a very strong security culture within the Russian security apparatus that is aggressive, that tests in production, that favours quantity over quality...they expended a lot of their capabilities early on and and truly sub optimal ways."

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Shashank Joshi

Shashank Joshi Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @shashj

Jul 3
"the United States has not tested the ability to mobilize a draft since the transition to the [all volunteer force] more than 50 years ago...a strong capacity to execute a draft will be necessary to fight and win a near-peer conflict" cnas.org/publications/r…
Current plan "to begin the draft with individuals who turn 20...However, the Selective Service System (SSS) [includes] men ages 18–25l...a future combat environment may mean that individuals with more experience or technical proficiency are needed" cnas.org/publications/r…
Good reminder for some UK politicians. "The draft is not a tool solely intended to change social policy—it is a matter of meeting human capital requirements for near-peer conflict." cnas.org/publications/r…
Read 8 tweets
Jul 2
🧵 Our piece on what an Israel-Hizbullah war would look like: bigger, more intense & more destructive than in 2006, with Hizbullah both better prepared & better armed in terms of its ground forces & missile arsenal than the last time round. A few thoughts:
economist.com/middle-east-an…
Officials and experts point to four significant changes in Hizbullah's ground forces. In 2006 the biggest threat was anti-tank missiles (see and below). A new challenge will come from loitering munitions (see, e.g., ) armyupress.army.mil/Portals/7/comb…
jinsa.org/wp-content/upl…
Image
Second, after 2006 Hizbullah's younger members, observing IRGC & IS in Syria, criticised older commanders & urged shift away from fixed defences to greater manoeuvre capability. One result was bigger emphasis on the Radwan force ()
israel-alma.org/2023/01/05/the…
economist.com/middle-east-an…
Read 20 tweets
Jul 1
🧵 Understandably, given the topic, most of the sources who helped to inform this report can't be named. But I want to list some of the papers, books and other articles that can.
A few years ago CSIS published a series of excellent papers on intelligence and technology, co-chaired by Avril Haines, who is now the DNI of course. The PDFs are here:
-
-
-
- csis-website-prod.s3.amazonaws.com/s3fs-public/pu…
csis-website-prod.s3.amazonaws.com/s3fs-public/pu…
csis-website-prod.s3.amazonaws.com/s3fs-public/pu…
csis-website-prod.s3.amazonaws.com/s3fs-public/pu…
The CSIS paper on collection explored how technology might affect "core" HUMINT missions, such as recruiting agents and conducting covert action. csis-website-prod.s3.amazonaws.com/s3fs-public/pu…
Image
Read 23 tweets
Jul 1
In this week's @TheEconomist I have a ten-page report on intelligence, espionage & technology. It covers how tech is affecting human, signals & geospatial intelligence; the role of AI; why private firms can now do things once confined to state agencies. economist.com/technology-qua…
Image
The intro sets the stage. It points out that while technology has always been central to intelligence—both collection & analysis—the relationship has changed profoundly as digital technology has seeped into every aspect of life & become ubiquitous.
economist.com/technology-qua…
Image
The HUMINT chapter sets out why clandestine operations have become riskier and costlier in the digital age. But it also argues that human & technical espionage are symbiotic—and that spy agencies have dealt with suffocating surveillance & scrutiny before. economist.com/technology-qua…
Read 12 tweets
Jun 21
🧵 I wanted to provide some sources and readings on military AI which helped inform the cover story below.
.@SIPRIorg continues to do excellent and rigorous work mapping the autonomous weapon landscape. I think this was the latest, from March 2023, on what the laws of war do and do not permit in this area: sipri.org/publications/2…
Image
This is from @ICRC on AI, decision-making and war. It summarises expert workshops that they held on the topic in 2022. geneva-academy.ch/joomlatools-fi…
Image
Read 21 tweets
Jun 17
Christopher Andrew on the difference between the KGB and western intelligence agencies & their priorities. "What it would take for SIS to send 18 operations officers to the Philippines, I really can't imagine—but it wouldn't be a chess championship"
cia.gov/readingroom/do…
Image
"the turning point for [Mitrokhin] was the same as for Gordievsky, the same as for Sakharov, the same as for Rastushinskaya, the same as for many more—in other words the [Soviet] suppression of the Prague Spring"
cia.gov/readingroom/do…
Image
Andrews on the enormous scale of Soviet SIGINT, which Mitrokhin didn't see as it was in the Eighth and Twelfth directorates of the KGB. "the methodology of HUMINT support for SIGINT collection was...even more effective than maybe we had realised" cia.gov/readingroom/do…
Image
Read 5 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(