Recent Cyber Events and Possible
Implications for Armed Forces
#6 – October 2020
About this paper
This paper is the collaborative view of NATO CCDCOE researchers highlighting the potential effects
on the military of current events and of developments in cyberspace during the previous month,
based on publicly available information. It does not set out to be exhaustive. While the authors have
made every effort to describe events from a perspective relevant to NATO and partner nations, there
may be national and regional differences which this paper does not address.
The authors of this paper are independent researchers at the NATO CCDCOE; they do not represent
NATO, nor does this paper reflect NATO’s position. The aim of the paper is not to replace information
about vulnerabilities and incidents provided by CSIRTs and providers of CIS products and services.
1. Targeted threats against the
military and national security
Wearable tokens can make
authentication less distracting
’The U.S. Army’s wearable authentication
tokens intended for the tactical environment
could be used for nontactical purposes, such
as accessing strategic-level systems,
enterprise networks and medical systems,
researchers say. ’ (AFCEA Signal, September
2020)
Communication and information systems
called tactical networks are essential for
supporting the modern armed forces. They
aim to provide an extensive range of services,
such as: command, control, communications,
computers, cyber, intelligence, surveillance
and reconnaissance (C5ISR). Access to that
system has been quite difficult since soldiers
need to use a keyboard to log in and out when
needed, which keeps them occupied by the
keyboard and not with the battlefield. Since
2017, the US has been developing wearable
authentication
Army Times: Wearable ID to give soldiers access
to networks downrange, do more than smartcards
wireless technology built into a small token
that can be attached to the uniform or worn as
a wristband. A second factor, such as a
personal identification number or a fingerprint,
will complement the token when logging in.
The wearable technology will allow soldiers to
be more focused to the battlefield than on the
keyboard since automatic logout is provided
and the use of the keyboard will only be
needed for the first login or when a soldier
comes back to the equipment. However, this
solution is raising some concerns and
challenges. For example: secure wireless
connection, protection of bio-metrical data,
upgrades and updates of equipment and
losing the wearable access card. Therefore, it
is necessary to make a thorough risk
assessment and to mitigate the risks
identified.
Belfer National Cyber Power Index
(NCPI) released
‘In contrast to existing cyber-related indices,
we believe there is no single measure of cyber
power. Cyber Power is made up of multiple
components and should be considered in the
context of a country’s national objectives.’
(Belfer Center, September 2020)