Cyber Primer
AEWhbF
AEWhbF
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>Cyber</strong> threats<br />
2.7. Threat actors exploit cyberspace’s characteristics through innovative<br />
approaches that often have a low-entry cost and they are helped by the<br />
ease of access often presented to them. Such malevolent actors may seek to<br />
create uncertainty and mistrust through:<br />
• direct access to people and systems;<br />
• attacking and exploiting our national and economic infrastructures;<br />
and<br />
• attacking military capabilities including command and control<br />
systems, logistical support and personnel.<br />
2.8. Nation states. The most sophisticated threat is likely to come from<br />
established, capable states (or their proxies) who exploit cyberspace to<br />
gather intelligence on government, military, industrial and economic targets.<br />
Defence is particularly concerned when states:<br />
• seek intelligence about UK military plans;<br />
• steal intellectual property and intelligence on UK military<br />
capabilities;<br />
• exploit UK military capabilities using their military and intelligence<br />
services with knowledge of the vulnerabilities of our capabilities;<br />
• deny the UK use of its cyberspace communications channels;<br />
• conduct subversive activities using their intelligence services; and<br />
• use proxies or large numbers of synchronised and coordinated<br />
partisans to cover the true origin of their activities within<br />
cyberspace.<br />
The theft of personal data from the United States Office of Personnel<br />
Management shows the alleged use of cyber operations by a state. 23<br />
23 Details on this case study can be found at Annex 2A on pages 36-37.<br />
24<br />
<strong>Cyber</strong> <strong>Primer</strong> (2nd Edition)