🧵 Last week I attended the Oxford Cyber Forum run by @cyber_conflict. Most of it was under the Chatham House rule, but a few bits & pieces that struck me as notable, all from very well-informed people. Bottom line is that cyber landscape reflects darkening mood in wider security
On the Russian cyber threat landscape: the number of actors is proliferating, with new threat actors 1/ within Russian intelligence services 2/ tied to other parts of the Russian government and 3/ semi-autonomous outside it.
In Israel I heard big concern about Russia passing advanced cyber tools & tradecraft to Iran. In Oxford one person noted that this would be surprising, as Russia has history of infecting Iranian infrastructure for fourth-party collection (i.e. piggybacking on Iranian spying)
Russia & China, despite their wider strategic co-operation, are still liberally hacking one another. One person also noted: "China probably has better insight into the Iranian government than the Iranian government does itself". This puts talk of an "axis" into some perspective!
On China: new threat actors constantly being discovered, but also a new ecosystem of 100+ commercial enablers, providing things like attack infrastructure, data brokerage, anonymisation tools, etc. Combo of enablers from different firms is making it harder to track APTs.
The network of private Chinese threat actors is interesting. The iSoon leaks are one example (). These firms often hack & then try and sell product to Chinese state; in other cases they are tasked by Chinese spies. PLA has officers embedded in some of them.therecord.media/china-commerci…
On the broader cyber landcape, one official noted: "our theories rest on the idea that zero-days are scarce, so countries are hesitant to use them." What, he/she asked, "could change that assumption?"
In Europe officials see "a lot of positioning on our critical infrastructure". Open sources suggest that since 2023 there were 67 cyber incidents involving Russian threat actors (23 targeting CNI). Six came from China (with five of those targeting CNI). And six from Iranians.
Official: "we cannot out-resilience our adversaries" on cyber. "Every kid in the schoolyard who's bullied knows if you want to make the bullies stop, you have to stop them. You have to find allies to help...You have to find long term strategies...to put them back in their box"
Official:" "the same is true in cyberspace. Fortunes in cyberspace favour the brave. Success will depend on whether you can manoeuvre the adversaries and impact will be determined by the quality of alliances you can muster."
"we have a key problem in that all our [European] cyber defenders at the mil level are still operating within an ancient system of peacetime-crisis-conflict. So we have a lot of shiny cyber commands in many allied countries" with "no mandate to operate during supposed peacetime"
Official: "the problem is that many of our military [cyber] operators are not mandated to do anything right now...we need to find ways of bringing them in now to what's happening now, so that we don't expect them to take over when there really is something escalating."
Official: "most of our infrastructure is operated by industry, private sector, most of our intelligence when it comes to cyber comes from industry. I would say even 90% of intelligence in terms of threat info. comes from industry these days." (see also: )economist.com/technology-qua…
One person argued the West was still better at offensive cyber. "some of the actors we count among the top of the line...a lot...don't even have that much operational experience. We talk a lot about the Chinese...but they have far less offensive operational experience than we do"
On defensive cooperation: "when we would go to a cybersecurity conference 10 years ago, Feds were not welcome. They would not step through the door without actually having the game in the room to spot them. Now it's become like a, like a running joke...the trajectory is positive"
"Ukraine is a country that up until a few years ago had vast swathes of its critical infra running on pirated copies of Windows XP. Look how quick the turnaround was, in defending that...collectively together through intel, the flow from the private sector, the public sector"
On cyber lessons from Ukraine. "there is a very strong security culture within the Russian security apparatus that is aggressive, that tests in production, that favours quantity over quality...they expended a lot of their capabilities early on and and truly sub optimal ways."
• • •
Missing some Tweet in this thread? You can try to
force a refresh
"the United States has not tested the ability to mobilize a draft since the transition to the [all volunteer force] more than 50 years ago...a strong capacity to execute a draft will be necessary to fight and win a near-peer conflict" cnas.org/publications/r…
Current plan "to begin the draft with individuals who turn 20...However, the Selective Service System (SSS) [includes] men ages 18–25l...a future combat environment may mean that individuals with more experience or technical proficiency are needed" cnas.org/publications/r…
Good reminder for some UK politicians. "The draft is not a tool solely intended to change social policy—it is a matter of meeting human capital requirements for near-peer conflict." cnas.org/publications/r…
🧵 Our piece on what an Israel-Hizbullah war would look like: bigger, more intense & more destructive than in 2006, with Hizbullah both better prepared & better armed in terms of its ground forces & missile arsenal than the last time round. A few thoughts: economist.com/middle-east-an…
Officials and experts point to four significant changes in Hizbullah's ground forces. In 2006 the biggest threat was anti-tank missiles (see and below). A new challenge will come from loitering munitions (see, e.g., ) armyupress.army.mil/Portals/7/comb… jinsa.org/wp-content/upl…
Second, after 2006 Hizbullah's younger members, observing IRGC & IS in Syria, criticised older commanders & urged shift away from fixed defences to greater manoeuvre capability. One result was bigger emphasis on the Radwan force () israel-alma.org/2023/01/05/the… economist.com/middle-east-an…
🧵 Understandably, given the topic, most of the sources who helped to inform this report can't be named. But I want to list some of the papers, books and other articles that can.
In this week's @TheEconomist I have a ten-page report on intelligence, espionage & technology. It covers how tech is affecting human, signals & geospatial intelligence; the role of AI; why private firms can now do things once confined to state agencies. economist.com/technology-qua…
The intro sets the stage. It points out that while technology has always been central to intelligence—both collection & analysis—the relationship has changed profoundly as digital technology has seeped into every aspect of life & become ubiquitous. economist.com/technology-qua…
The HUMINT chapter sets out why clandestine operations have become riskier and costlier in the digital age. But it also argues that human & technical espionage are symbiotic—and that spy agencies have dealt with suffocating surveillance & scrutiny before. economist.com/technology-qua…
.@SIPRIorg continues to do excellent and rigorous work mapping the autonomous weapon landscape. I think this was the latest, from March 2023, on what the laws of war do and do not permit in this area: sipri.org/publications/2…
This is from @ICRC on AI, decision-making and war. It summarises expert workshops that they held on the topic in 2022. geneva-academy.ch/joomlatools-fi…
Christopher Andrew on the difference between the KGB and western intelligence agencies & their priorities. "What it would take for SIS to send 18 operations officers to the Philippines, I really can't imagine—but it wouldn't be a chess championship" cia.gov/readingroom/do…
"the turning point for [Mitrokhin] was the same as for Gordievsky, the same as for Sakharov, the same as for Rastushinskaya, the same as for many more—in other words the [Soviet] suppression of the Prague Spring" cia.gov/readingroom/do…
Andrews on the enormous scale of Soviet SIGINT, which Mitrokhin didn't see as it was in the Eighth and Twelfth directorates of the KGB. "the methodology of HUMINT support for SIGINT collection was...even more effective than maybe we had realised" cia.gov/readingroom/do…