<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Geo Cyber Global]]></title><description><![CDATA[The convergence of geopolitical cyber security policy and operations.]]></description><link>https://www.geocyberglobal.com</link><image><url>https://substackcdn.com/image/fetch/$s_!eYjF!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd95d1975-eec9-4c3e-9af9-32a693ac2c74_244x244.png</url><title>Geo Cyber Global</title><link>https://www.geocyberglobal.com</link></image><generator>Substack</generator><lastBuildDate>Tue, 14 Apr 2026 02:59:02 GMT</lastBuildDate><atom:link href="https://www.geocyberglobal.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Geo Cyber Global]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[geocyberglobal@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[geocyberglobal@substack.com]]></itunes:email><itunes:name><![CDATA[Geo Cyber Global]]></itunes:name></itunes:owner><itunes:author><![CDATA[Geo Cyber Global]]></itunes:author><googleplay:owner><![CDATA[geocyberglobal@substack.com]]></googleplay:owner><googleplay:email><![CDATA[geocyberglobal@substack.com]]></googleplay:email><googleplay:author><![CDATA[Geo Cyber Global]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[What Is The Future of USCYBERCOM?]]></title><description><![CDATA[A recent Cyber Defense Review edition was dedicated to the discussion of capability reform]]></description><link>https://www.geocyberglobal.com/p/what-is-the-future-of-uscybercom</link><guid isPermaLink="false">https://www.geocyberglobal.com/p/what-is-the-future-of-uscybercom</guid><dc:creator><![CDATA[Geo Cyber Global]]></dc:creator><pubDate>Fri, 09 Jan 2026 16:57:34 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/5fff459d-d9cd-41a3-a2c8-92e437ba311e_1117x670.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Did the US Use Cyber Power Against Venezuela?</h2><p>The past week, the potential for cyber and kinetic military convergence came to the fore, with the US interactions with Venezuela. Numerous news outlets have speculated on how cyber technologies - for intelligence gathering and offensive operations - could have been utilised.</p><p>The BBC recently published a story focused on &#8220;<a href="https://www.bbc.co.uk/news/articles/cp37yr2xq7no?utm_source=geocyberglobal.com">The continued mysteries surrounding the intelligence operation to capture Maduro</a>&#8221;. The article goes on to explain:</p><blockquote><p>&#8220;The fact that the US Cyber Command was publicly thanked for its role in the operation has led to speculation that US military hackers got inside Venezuelan networks in advance to shut the grid down at the right moment - but details are limited.</p><p>The failure of Chinese and Russian air defences has also led to speculation of what kind of jamming or electronic warfare technology was deployed by the US in the air to aid the operation. The US Space Command, which operates satellites, also received credit for creating a &#8220;pathway&#8221; for the special forces to enter unseen.&#8221;</p></blockquote><p>Polito had an article on 7th January more boldly entitled &#8220;<a href="https://www.politico.com/news/2026/01/07/venezuela-us-cyber-warfare-00713507?utm_source=geocyberglobal.com">Venezuela strike marks a turning point for US cyber warfare</a>&#8221;. They again nodded to the sudden power outage that occurred prior to the physical landing of troops:</p><blockquote><p>&#8220;<strong>Trump, at the same press conference, was more overt in his description of U.S. cyber involvement: &#8220;The lights of Caracas were largely turned off due to a certain expertise that we have,&#8221; he said. &#8220;It was dark, and it was deadly.&#8221;</strong></p><p><strong>Beyond these small-but-significant nods toward U.S. cyber power, details about how exactly the U.S. was able to pull off such a feat were slim. A spokesperson for the Pentagon declined to comment on the specifics of U.S. cyber operations in Venezuela, while a spokesperson for Cyber Command said it was &#8220;proud to support&#8221; the mission. A spokesperson for the White House did not respond to requests for comment.&#8221;</strong></p></blockquote><p>Of course, the details will never be known - for a long time yet - and  a policy of strategic ambiguity supports a stance that denying the fact gains nothing - whilst loosely acknowledging some sort of cyber capability is a potential deterrent option and show of strength.</p><p>Whatever the underlying capability and success of it - which is difficult to measure - the structure, growth and operational involvement of USCYBERCOM is being hotly debated.</p><div><hr></div><h2>What Next for USCYBERCOM?</h2><p>A recent special edition of the Cyber Defense Review tackled just this topic.</p><p>The <a href="https://cyberdefensereview.army.mil/">Cyber Defense Review</a> (CDR) describes themselves as:</p><blockquote><p>&#8220;&#8230;an open-access, peer-reviewed, scholarly journal that serves as a forum for current and emerging research on cyber operations. Its focus is on strategy, operations, tactics, history, ethics, law, and policy in the cyber domain. CDR positions itself as a leading venue for interdisciplinary work at the intersection of cyber and defense, welcoming contributions from the military, industry, professional, and academic communities.&#8221;</p></blockquote><p>Their most recent <a href="https://cyberdefensereview.army.mil/Issues-Articles/Current-Issue/">issue</a> was a special edition focusing on the USCYBERCOM and the future of US cyber forces.</p><h3>What Issues is USCYBERCOM Facing?</h3><p>Other than restructure for restructuring&#8217;s sake, it seems there are some reasonable issues that are being discussed:</p><ul><li><p><strong>Insufficient Force Size:</strong> The current active-duty cyber workforce is considered too small to effectively manage the sheer volume and increasing sophistication of global cyber threats. This results in a significant gap between operational demand and available manpower.</p></li><li><p><strong>Talent Recruitment and Retention:</strong> There is a persistent structural challenge in recruiting and retaining highly skilled technical talent. The government struggles to compete with the private sector, leading to a need to look &#8220;Beyond the Uniform&#8221; and develop better strategies for leveraging national cyber expertise.</p></li><li><p><strong>Sub-optimal Management and Readiness:</strong> The current management framework is seen as needing modernization to ensure sustainable force readiness. Issues include:</p><ul><li><p>Lack of codified maximum operational tempo thresholds, potentially leading to burnout.</p></li><li><p>Need for better alignment of technical personnel to demanding technical roles.</p></li><li><p>Insufficient integration of auxiliary units (National Guard and Reserve) into joint exercises.</p></li></ul></li></ul><p>These are some pretty complex issues to solve - and will be familiar with many large scale cyber operations teams - be they private sector or nation state.</p><h3>What Can be Done?</h3><p>The core debate in the CDR issue revolves around whether to simply reform and empower USCYBERCOM or to create an entirely new military branch for cyberspace.</p><p>The proposals for expansion fall into a few key areas:</p><p>1. <strong>Expansion of Cyber Force Size and Management</strong></p><p>A primary recommendation is to significantly expand the active-duty cyber workforce, arguing that the current force is simply too small to manage the volume and sophistication of threats.</p><p><strong>&#8220;Go Big&#8221; on Force Size:</strong> The proposal argues that the scale of malicious cyber activity far exceeds the capacity of the current military cyber forces. Expanding the force would help close the gap between operational demand and available manpower.</p><ul><li><p><strong>Management Reforms:</strong> Workforce expansion must be paired with management modernization to ensure sustainable readiness gains, which could include:</p><ul><li><p>Codifying maximum operational tempo thresholds.</p></li><li><p>Adopting rotational assignment models.</p></li><li><p>Creating &#8220;force health&#8221; reporting metrics that link readiness to personnel workload.</p></li><li><p>Aligning technical personnel to demanding technical roles and reserving less complex tasks for less experienced individuals.</p></li></ul></li></ul><p>2. <strong>Reforming and Empowering USCYBERCOM</strong></p><p>Many contributions suggest that incremental reform is the fastest, least risky, and most effective path, especially as USCYBERCOM is already increasing its capabilities.</p><ul><li><p><strong>Utilize New Authorities:</strong> Empowering USCYBERCOM to fully execute the authorities it already possesses, such as full training authority over cyber operational forces, is critical for standardization and interoperability.</p></li><li><p><strong>Leverage Auxiliaries and Exercises:</strong> Incorporate National Guard, Reserve, and other auxiliary units, particularly by integrating them into joint exercises that involve foreign and domestic partners.</p></li><li><p><strong>Avoid Disruptive Restructuring:</strong> Critics of a new Cyber Service warn it would be costly, slow, and counterproductive, risking years of turmoil, duplicating functions, and diverting scarce resources and expert personnel from current operations.</p></li></ul><p>3. <strong>Reconnecting with the Private Sector</strong></p><p>A structural challenge is the struggle to recruit and retain technical talent, leading to a proposal to look &#8220;Beyond the Uniform&#8221; by leveraging the national cyber workforce outside of the government.</p><ul><li><p><strong>Cyber Mission Support Framework (CMSF):</strong> This framework is proposed to reconnect uniformed forces with trusted, highly skilled cyber professionals in the private sector for scalable mission augmentation and, potentially, regulated cyber proxy operations.</p></li><li><p><strong>Industry Collaboration:</strong> USCYBERCOM should foster deeper collaboration with the commercial industry, which dominates cyber defenses at home and abroad.</p></li></ul><p>4. <strong>Radical Organizational Change</strong></p><p>Other contributors argue that patchwork fixes are insufficient, advocating for a significant structural overhaul to fully expand capabilities.</p><ul><li><p><strong>Create a Separate Cyber Service:</strong> One option is to create a new, separate cyber service or military department&#8212;similar to the Space Force&#8212;to establish a unified career progression system and better align technical skills with advancement.</p></li><li><p><strong>Revising Doctrine:</strong> Another suggestion is to revise U.S. doctrine to treat cyberspace as a battlespace and not merely a function that supports kinetic force.</p></li></ul><div><hr></div><p>It seems the continued hiring and structural challenges facing USCYBERCOM will continue as none of the suggested proposals are quick to implement. The ability to acknowledge &#8220;winning&#8221; narratives associated with &#8220;cyberwar&#8221; usage however, does bring some additional attention on the entire area - which may be good for the hiring apparatus, but ultimately makes integration and success metrics more complex.</p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[The Great Firewall of China - The What and The Why]]></title><description><![CDATA[Leaked data outlines technical and cognitive strategy]]></description><link>https://www.geocyberglobal.com/p/the-great-firewall-of-china-the-what</link><guid isPermaLink="false">https://www.geocyberglobal.com/p/the-great-firewall-of-china-the-what</guid><dc:creator><![CDATA[Geo Cyber Global]]></dc:creator><pubDate>Fri, 05 Dec 2025 15:36:03 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/973c78e2-355b-4762-be34-87a1f47c9f7a_901x601.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The <a href="https://dti.domaintools.com/">research section</a> of DomainTools released a long-read three-part series taking a look at the Great Firewall of China. This was based on some highly detailed leaked material that outlines both the technical and strategic purpose of a such a highly controlled internet.</p><p>DomainTools released three separate articles which are well worth reading (it will take a good 45 mins or so) but they do provide an end to end view of the scale and completeness of the solution.</p><ol><li><p><a href="https://dti.domaintools.com/inside-the-great-firewall-part-1-the-dump/">Inside the Great Firewall Part 1: The Dump</a></p></li><li><p><a href="https://dti.domaintools.com/inside-the-great-firewall-part-2-technical-infrastructure/">Inside the Great Firewall Part 2: Technical Infrastructure</a></p></li><li><p><a href="https://dti.domaintools.com/inside-the-great-firewall-part-3-geopolitical-and-societal-ramifications/">Inside the Great Firewall Part 3: Geopolitical and Societal Ramifications</a></p></li></ol><div><hr></div><h3>What is the Great Firewall?</h3><p>The Great Firewall (GFW) of China is a vast and sophisticated system of digital control that goes far beyond simple website filtering. It is the centerpiece of China&#8217;s digital repression strategy, designed not only to block content but also to control user behavior, shape perceptions, and enforce ideological conformity.</p><p>Core Purpose and Strategy</p><ul><li><p><strong>Ideological Containment:</strong> The GFW&#8217;s primary domestic function is to preempt the circulation of narratives, symbols, or software deemed threatening to the Chinese Communist Party (CCP) legitimacy. It enforces a state-defined version of reality by algorithmically suppressing politically sensitive terms, foreign platforms, and civil society organizing.</p></li><li><p><strong>Digital Sovereignty:</strong> It is the digital expression of a strategic doctrine rooted in state control, asserting that information space is equivalent to territorial space. It insulates the domestic population from foreign influence and enables centralized surveillance.</p></li><li><p><strong>Economic Engineering:</strong> The GFW systematically blocks foreign software (like Google Docs, Zoom, and Dropbox), which nurtures a domestic ecosystem and accelerates the adoption of Chinese-developed alternatives (e.g., Tencent Docs, DingTalk) that are integrated with state surveillance requirements.</p></li></ul><h3>Technical Components</h3><p>The GFW operates as a modular and hierarchical system that combines central orchestration with distributed enforcement nodes, built on cooperation between state-run ISPs, telecom vendors, and research labs. Key technical components include:</p><ul><li><p><strong>Traffic Secure Gateway (TSG) System:</strong> This is a core modular, exportable Deep Packet Inspection (DPI) platform capable of <strong>application-layer proxying</strong>, <strong>SSL/TLS interception</strong>, and centralized policy enforcement across national ISP backbones and regional access points.</p></li><li><p><strong>Layered Filtering:</strong></p><ul><li><p><strong>DPI:</strong> Deep Packet Inspection processes TCP streams in real-time to inspect HTTP headers, TLS handshakes, and apply keyword filtering.</p></li><li><p><strong>SNI-based TLS Detection:</strong> Filters encrypted circumvention traffic (e.g., Psiphon, Shadowsocks, V2Ray) based on patterns in the TLS handshake process without decrypting content.</p></li><li><p><strong>URL, Host Header, and DNS Hijack Strategies:</strong> Used to block, redirect, or monitor suspect endpoints.</p></li></ul></li><li><p><strong>Monitoring and Logging:</strong> Systems like <strong>MAAT</strong> (Modular Automated Analysis Tool) and <strong>Gohangout</strong> (a log processing framework) are used for pervasive visibility, continuous telemetry, and real-time policy enforcement. Logs reveal fine-grained behavioral fingerprinting, tying user sessions to device IDs and remote IP patterns.</p></li><li><p><strong>Behavioral Prediction Engines:</strong> These systems go beyond static rules to flag and act on traffic that deviates from normal patterns, assigning a risk score to sessions in real-time and preemptively routing or terminating sessions (e.g., injecting artificial latency).</p></li><li><p><strong>Vendor Integration:</strong> The GFW is a distributed ecosystem of hardware and software from Chinese technology companies, such as <strong>A Hamson Technology Co., Ltd., Venustech, Topsec, and Huaxin</strong>, which supply customized routers, DPI cards, and orchestration platforms.</p></li></ul><p>It is pretty clear that to get the level of interoperability and management, a <strong>state</strong> <strong>level</strong> top-down approach to control is needed. The vast breadth and depth of both the physical infrastructure components and the technical skills needed to design and maintain such components has to be directed from a strategic point of view.</p><p>Of course, having so many moving parts (including the hiring, validating and training of staff) requires a strong set of security controls. </p><p>However, the vast scale and size of such an operation is likely to house opportunities for information leakage, subversion and insider threat.</p><h3>Geopolitical and Societal Impact</h3><p>The leaked material clearly has an emphasis on the technical bits and bytes and architectural choices that have been made. Whilst that is interesting, perhaps the more long term analysis such ends up asking more about the &#8220;<strong>why</strong>&#8221; than the &#8220;<strong>how</strong>&#8221;. </p><ol><li><p>What is the aim?</p></li><li><p>What does success look like?</p></li><li><p>How closely does this policy interact with both domestic and foreign policy?</p></li></ol><p>From a technology point of view there are some conceptual and architectural design patterns that can be &#8220;exported&#8221; - either for monetary gain or ideological expansion and support of countries that have similar ethics and ethos.</p><ul><li><p><strong>Global Fragmentation (&#8221;Splinter-net&#8221;):</strong> China&#8217;s model is exported to other authoritarian regimes, such as Iran, Vietnam, and Russia, often through initiatives like the <strong>Digital Silk Road</strong>. This promotes the idea of &#8220;cyber sovereignty&#8221;&#8212;the right of states to regulate information flows within their borders&#8212;contributing to the fragmentation of the global internet.</p></li><li><p><strong>Transnational Repression:</strong> The GFW&#8217;s cyber capabilities are used to monitor and harass groups that the PRC views as security threats, including <strong>Falun Gong practitioners, Uyghurs, Tibetans, supporters of Taiwanese independence, and pro-democracy activists</strong>, even those living in diaspora communities abroad.</p></li><li><p><strong>Arms Race with Resistance:</strong> Despite the GFW&#8217;s sophistication, resistance is persistent. The system&#8217;s countermeasures provoke an ongoing arms race with developers creating new circumvention tools like <strong>Shadowsocks, V2Ray, and Trojan</strong>, which continuously iterate to evade detection. Dissent also manifests in creative, coded cultural forms (satire, homophones) to evade keyword filters.</p></li></ul><p>The model is clearly not one for simple technical experimentation. It is a strategic implementation based on a controlling narrative - that supports internal information manipulation and  the removal of external and counterpoint sources of opinion.</p><p>Whilst not necessarily in line with Russia&#8217;s view of a separate sovereign network that can limit technical denial of service to ISP and network access, the GFW could provide similar functions.</p><div><hr></div><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Scottish Cyber Resilient Framework 2025 - 2030]]></title><description><![CDATA[The Scottish government recently released their strategic vision for cyber resilience for the next 5 years.]]></description><link>https://www.geocyberglobal.com/p/scottish-cyber-resilient-framework</link><guid isPermaLink="false">https://www.geocyberglobal.com/p/scottish-cyber-resilient-framework</guid><dc:creator><![CDATA[Geo Cyber Global]]></dc:creator><pubDate>Fri, 14 Nov 2025 13:19:46 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/f9fc70a1-9795-45d9-9733-0dea5f875fa9_761x818.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Scottish government recently released their <a href="https://www.gov.scot/publications/strategic-framework-cyber-resilient-scotland-2025-2030/documents/">strategic vision</a> for cyber resilience for the next 5 years.</p><p>Such strategies of course are used for a multitude of functions - from enablement and awareness, funding, risk identification but also public awareness and partnership generation.</p><p>The Scottish approach is no different and amplifies the need that such country-wide approaches require a broad spectrum of stakeholders - as well as public/private integration.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gxc7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff169d018-a44f-422b-906e-c041cdf4a343_602x619.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gxc7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff169d018-a44f-422b-906e-c041cdf4a343_602x619.png 424w, https://substackcdn.com/image/fetch/$s_!gxc7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff169d018-a44f-422b-906e-c041cdf4a343_602x619.png 848w, https://substackcdn.com/image/fetch/$s_!gxc7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff169d018-a44f-422b-906e-c041cdf4a343_602x619.png 1272w, https://substackcdn.com/image/fetch/$s_!gxc7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff169d018-a44f-422b-906e-c041cdf4a343_602x619.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gxc7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff169d018-a44f-422b-906e-c041cdf4a343_602x619.png" width="602" height="619" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f169d018-a44f-422b-906e-c041cdf4a343_602x619.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:619,&quot;width&quot;:602,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:112841,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.geocyberglobal.com/i/178884351?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff169d018-a44f-422b-906e-c041cdf4a343_602x619.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gxc7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff169d018-a44f-422b-906e-c041cdf4a343_602x619.png 424w, https://substackcdn.com/image/fetch/$s_!gxc7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff169d018-a44f-422b-906e-c041cdf4a343_602x619.png 848w, https://substackcdn.com/image/fetch/$s_!gxc7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff169d018-a44f-422b-906e-c041cdf4a343_602x619.png 1272w, https://substackcdn.com/image/fetch/$s_!gxc7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff169d018-a44f-422b-906e-c041cdf4a343_602x619.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Image Source: Scottish Cyber Strategic <a href="https://www.gov.scot/binaries/content/documents/govscot/publications/strategy-plan/2025/11/strategic-framework-cyber-resilient-scotland-2025-2030/documents/plan-page/plan-page/govscot%3Adocument/plan-page.pdf?utm_source=geocyberglobal.com">Plan on a Page</a></p><p>Key questions remain around how to measure resilience success? Speedy response to attack? Faster detection? An improved ability to defend?</p><p>The vision statement is clear however : <strong>&#8220;Scotland thrives by being a digitally secure and resilient nation.&#8221; </strong>Cyber resilience is framed as a <em>whole-of-society responsibility</em>, not just a technical activity - which could be difficult to attain and also measure. The plan aligns with Scotland&#8217;s wider goals&#8212;economic growth, reducing child poverty, public-service improvement, and climate action. So essentially a force multiplier or extension of general governmental aims.</p><p>However, cyber crime in Scotland has <strong>doubled since 2019&#8211;20</strong>, reaching ~14,000 cases in 2024&#8211;25.</p><p>To work towards this cyber-resilience aim requires a village. The broad ecosystem consists of:</p><ul><li><p><strong>Scottish Cyber Coordination Centre (SC3)</strong> &#8211; 24/7 threat intelligence, incident coordination.</p></li><li><p><strong>Police Scotland (Cyber and Fraud Unit)</strong> &#8211; operational response and victim support.</p></li><li><p><strong>National Cyber Security Centre (NCSC)</strong> &#8211; technical authority for cyber security.</p></li><li><p><strong>CyberScotland Partnership</strong> &#8211; cross-sector awareness, education, public engagement.</p></li><li><p><strong>National Cyber Resilience Advisory Board (NCRAB)</strong> &#8211; strategic guidance.</p></li></ul><p>If &#8220;success&#8221; is being earmarked as being &#8220;strong, capable and resilient&#8221; how will that be acheived?</p><h2><strong>The Seven Strategic Outcomes</strong></h2><h3><strong>1. People recognise cyber risks and are prepared to manage them</strong></h3><ul><li><p>Public awareness campaigns.</p></li><li><p>Cyber resilience embedded across lifelong learning&#8212;from early years to adult education.</p></li><li><p>Targeted support for vulnerable groups (rural, disabled, older adults, non-English speakers).<br></p></li></ul><h3><strong>2. National cyber coordination and incident response are effective</strong></h3><ul><li><p>SC3 leads multi-agency response.</p></li><li><p>Stronger early-warning systems and national incident management.<br></p></li></ul><h3><strong>3. Digital public services are secure and resilient</strong></h3><ul><li><p>Protective controls, secure-by-design architecture, and resilience built into critical services such as health and education.</p></li></ul><h3><strong>4. Public sector organisations manage cyber risk effectively</strong></h3><ul><li><p>Consistent standards across government bodies.</p></li><li><p>Regular testing, assurance, and cyber maturity improvement.</p></li></ul><h3><strong>5. Businesses recognise cyber risks and manage them</strong></h3><ul><li><p>SMEs supported with guidance, toolkits, and Cyber Essentials adoption.</p></li><li><p>Large organisations encouraged to lead on supply-chain security.</p></li></ul><h3><strong>6. Third-sector organisations are prepared and protected</strong></h3><ul><li><p>Tailored guidance for charities and voluntary organisations, which often have limited resources but hold sensitive data.</p></li></ul><h3><strong>7. Scotland has a strong cyber security industry and skilled workforce</strong></h3><ul><li><p>Growth of the cyber security sector.</p></li><li><p>Enhanced research, innovation, and talent pipelines.</p></li><li><p>Support for CyberFirst schools and national cyber skills initiatives.</p></li></ul><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.gov.scot/binaries/content/documents/govscot/publications/strategy-plan/2025/11/strategic-framework-cyber-resilient-scotland-2025-2030/documents/strategic-framework-cyber-resilient-scotland-20252030/strategic-framework-cyber-resilient-scotland-20252030/govscot%3Adocument/strategic-framework-cyber-resilient-scotland-20252030.pdf?utm_source=geocyberglobal.com&quot;,&quot;text&quot;:&quot;Download Full Report&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.gov.scot/binaries/content/documents/govscot/publications/strategy-plan/2025/11/strategic-framework-cyber-resilient-scotland-2025-2030/documents/strategic-framework-cyber-resilient-scotland-20252030/strategic-framework-cyber-resilient-scotland-20252030/govscot%3Adocument/strategic-framework-cyber-resilient-scotland-20252030.pdf?utm_source=geocyberglobal.com"><span>Download Full Report</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Role of Cyber in Russian Sabotage Operations]]></title><description><![CDATA[A review of a recent IISS report of attacks against Europe critical infrastructure]]></description><link>https://www.geocyberglobal.com/p/role-of-cyber-in-russian-sabotage</link><guid isPermaLink="false">https://www.geocyberglobal.com/p/role-of-cyber-in-russian-sabotage</guid><dc:creator><![CDATA[Geo Cyber Global]]></dc:creator><pubDate>Fri, 07 Nov 2025 13:34:07 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/958ffe9f-9995-4d51-9f40-f384ac9072eb_866x1037.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The <a href="https://www.iiss.org/">International Institute of Strategic Studies</a> released a <a href="https://www.iiss.org/research-paper/2025/08/the-scale-of-russian--sabotage-operations--against-europes-critical--infrastructure/?utm_source=geocyberglobal.com">report</a> in August taking a look at Russian sabotage operations against European critical national infrastructure (CNI).</p><p>It is interesting to see not only physical events - cable cutting as one example - versus the increasing role of  <strong>cyber</strong> as part of a broader <strong>information</strong> <strong>warfare</strong> operations play.</p><p>Cyber operations are described as a <strong>core enabler and integral component</strong> of Russia&#8217;s wider sabotage strategy &#8212; not a separate or secondary activity. The report situates cyber activity within Moscow&#8217;s <strong>&#8220;gibridnaya voyna&#8221; (hybrid warfare)</strong> doctrine, where physical, informational, and digital tools are fused to weaken adversaries below the threshold of open war.</p><p>A a breakdown of <strong>cyber&#8217;s specific role in Russia&#8217;s sabotage attacks</strong>, includes:</p><div><hr></div><h3><strong>1. Integrated in Hybrid Sabotage Doctrine</strong></h3><ul><li><p>Russian military doctrine <strong>treats cyber operations as part of information warfare</strong>, combining &#8220;information-technical&#8221; (cyber, hacking, electronic attacks) and &#8220;information-psychological&#8221; (propaganda, disinformation) methods.</p></li><li><p>Cyber is therefore <strong>used alongside physical sabotage</strong>&#8212;for instance, hacking logistics or communications systems to support or conceal physical attacks.</p></li><li><p>The goal is to <strong>blur the line between war and peace</strong>, disrupting without triggering a conventional NATO response.</p></li></ul><h3><strong>2. Cyber as Reconnaissance and Targeting Tool</strong></h3><ul><li><p>Russia&#8217;s intelligence services (especially the <strong>GRU and SVR</strong>) use cyber intrusions to <strong>map critical infrastructure networks</strong>&#8212;energy grids, transport hubs, and communications links&#8212;identifying single points of failure for later physical attacks.</p></li><li><p>These cyber intrusions often <strong>precede or accompany physical sabotage</strong> (e.g., rail disruptions, water-supply incidents, or cable damage), providing operational intelligence and coordination.</p></li><li><p>Russian operatives have used <strong>cyber-espionage to track NATO logistics</strong> and <strong>supply routes</strong> for Ukraine, and to help recruited proxies locate targets such as energy substations or communication nodes.</p></li></ul><h3><strong>3. Cyber as a Tool of Coercion and Confusion</strong></h3><ul><li><p>Cyber activity is paired with <strong>disinformation and deepfake campaigns</strong> to amplify fear and distrust after sabotage incidents&#8212;portraying them as government failures or accidents.</p></li><li><p>Such &#8220;information-psychological&#8221; operations aim to <strong>erode public confidence</strong>, <strong>increase societal anxiety</strong>, and <strong>divide allied responses</strong>.</p></li><li><p>The IISS notes that the <strong>&#8220;grey-zone&#8221; framing</strong> has allowed Russia to use cyberattacks to intimidate Europe while staying below the escalation threshold.</p></li></ul><h3><strong>4. Exploitation of Civilian Digital Infrastructure</strong></h3><ul><li><p>The Kremlin leverages <strong>commercial IT supply chains</strong>, weak network defenses, and the <strong>private ownership of 90% of NATO transport and communications infrastructure</strong>.</p></li><li><p>Cyber intrusions into <strong>dual-use civilian networks</strong> (e.g., rail control systems, air logistics software, port communications) increase the impact of physical sabotage.</p></li><li><p>Russia&#8217;s <strong>&#8220;gig economy&#8221; approach</strong>&#8212;outsourcing low-skill acts to recruited proxies&#8212;relies on encrypted messaging, dark web payments, and <strong>online coordination</strong>, all of which are cyber-enabled.</p></li></ul><h3><strong>5. A Blended Threat Environment</strong></h3><ul><li><p>Russia&#8217;s hybrid operations use a <strong>continuum of effects</strong>:</p><ul><li><p><em>Cyber reconnaissance &#8594; physical sabotage &#8594; disinformation amplification.</em></p></li><li><p>Attacks on <strong>undersea cables and satellite links</strong> combine both physical damage and digital disruption, impacting internet traffic, GPS, and secure communications.</p></li></ul></li><li><p>NATO data show that <strong>energy and communication networks</strong>, often targeted by Russian cyber groups, overlap with physical sabotage zones (Baltic Sea, Poland, Germany).</p></li></ul><h3><strong>6. Strategic Impact</strong></h3><ul><li><p>While <strong>no mass-casualty cyberattack</strong> has occurred, the cumulative effect is to <strong>undermine resilience</strong>, complicate attribution, and <strong>delay collective response</strong>.</p></li><li><p>The report warns that the <strong>cyber-physical convergence</strong> in Russian sabotage campaigns is raising the risk of escalation and <strong>strategic miscalculation</strong> &#8212; where a blended attack could unintentionally cross NATO&#8217;s Article 5 threshold.</p></li></ul><p><strong>In summary:</strong></p><p>Cyber operations are the <em>connective tissue</em> of Russia&#8217;s sabotage campaign &#8212; enabling reconnaissance, coordination, psychological impact, and plausible deniability. The IISS assesses that Russia&#8217;s use of cyber tools is not about stand-alone attacks but about <strong>amplifying and concealing physical sabotage</strong>, forming a seamless part of its hybrid war against Europe</p><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.iiss.org/research-paper/2025/08/the-scale-of-russian--sabotage-operations--against-europes-critical--infrastructure/?utm_source=geocyberglobal.com&quot;,&quot;text&quot;:&quot;Download Full Report&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.iiss.org/research-paper/2025/08/the-scale-of-russian--sabotage-operations--against-europes-critical--infrastructure/?utm_source=geocyberglobal.com"><span>Download Full Report</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[North Korean Linked Lazarus Expands Attacks to European Drone Makers]]></title><description><![CDATA[A recent research article by ESET (available here) highlights the evolution of the Lazarus group to now attacking UAV (unmanned aerial vehicles or drones) manufacturers and suppliers across Europe.]]></description><link>https://www.geocyberglobal.com/p/north-korean-linked-lazarus-expands</link><guid isPermaLink="false">https://www.geocyberglobal.com/p/north-korean-linked-lazarus-expands</guid><dc:creator><![CDATA[Geo Cyber Global]]></dc:creator><pubDate>Fri, 24 Oct 2025 12:21:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4iF8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f7ce68c-19c4-41a1-8f5c-b5805b3f111e_702x642.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A recent research article by ESET (available <a href="https://www.welivesecurity.com/en/eset-research/gotta-fly-lazarus-targets-uav-sector/">here</a>) highlights the evolution of the Lazarus group to now attacking UAV (unmanned aerial vehicles or drones) manufacturers and suppliers across Europe. They claim is part of a strategic initiative by North Korea to bolster its own drone operations.</p><p>They state:</p><blockquote><p><em>&#8220;ESET researchers have recently observed a new instance of Operation DreamJob &#8211; a campaign that we track under the umbrella of North Korea-aligned Lazarus &#8211; in which several European companies active in the defense industry were targeted. Some of these are heavily involved in the unmanned aerial vehicle (UAV) sector, suggesting that the operation may be linked to North Korea&#8217;s current efforts to scale up its drone program. This blogpost discusses the broader geopolitical implications of the campaign, and provides a high-level overview of the toolset used by the attackers.&#8221;</em></p></blockquote><p>It sounds like a potential two-bird win for Lazarus - in the sense of helping to disrupt existing manufacturers of potentially enemy operators (aka Ukraine and those supporting Ukraine against Russia, which North Korea is an ally) as well as helping streamline and optimize their own drone and UAV systems designs through mere intellectual property theft.</p><h3>Strategic purpose</h3><ul><li><p>The attacks likely sought <strong>intellectual property and manufacturing know-how</strong> to accelerate <strong>North Korea&#8217;s drone program</strong>, which is expanding with Russian assistance and modeled on U.S. systems such as the RQ-4 Global Hawk and MQ-9 Reaper.</p></li><li><p>Victims made parts for UAVs currently deployed in Ukraine, suggesting Lazarus wanted data on <strong>Western-made weapons used on the front line</strong>.</p></li><li><p>The campaign aligns with Pyongyang&#8217;s pattern of <strong>reverse-engineering foreign UAV designs</strong> via cyberespionage.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4iF8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f7ce68c-19c4-41a1-8f5c-b5805b3f111e_702x642.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4iF8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f7ce68c-19c4-41a1-8f5c-b5805b3f111e_702x642.png 424w, https://substackcdn.com/image/fetch/$s_!4iF8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f7ce68c-19c4-41a1-8f5c-b5805b3f111e_702x642.png 848w, https://substackcdn.com/image/fetch/$s_!4iF8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f7ce68c-19c4-41a1-8f5c-b5805b3f111e_702x642.png 1272w, https://substackcdn.com/image/fetch/$s_!4iF8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f7ce68c-19c4-41a1-8f5c-b5805b3f111e_702x642.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4iF8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f7ce68c-19c4-41a1-8f5c-b5805b3f111e_702x642.png" width="702" height="642" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2f7ce68c-19c4-41a1-8f5c-b5805b3f111e_702x642.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:642,&quot;width&quot;:702,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:91656,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.geocyberglobal.com/i/177005927?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f7ce68c-19c4-41a1-8f5c-b5805b3f111e_702x642.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4iF8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f7ce68c-19c4-41a1-8f5c-b5805b3f111e_702x642.png 424w, https://substackcdn.com/image/fetch/$s_!4iF8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f7ce68c-19c4-41a1-8f5c-b5805b3f111e_702x642.png 848w, https://substackcdn.com/image/fetch/$s_!4iF8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f7ce68c-19c4-41a1-8f5c-b5805b3f111e_702x642.png 1272w, https://substackcdn.com/image/fetch/$s_!4iF8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f7ce68c-19c4-41a1-8f5c-b5805b3f111e_702x642.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Image Source: ESET report on new Lazarus attack patterns</p><h3>Attack chain and tools</h3><ul><li><p><strong>Initial access:</strong> classic DreamJob social-engineering &#8212; fake &#8220;dream job&#8221; offers sent to defense engineers with a <strong>malicious PDF reader</strong> that installs malware.</p></li><li><p><strong>Loader stage:</strong> trojanized open-source projects from GitHub (e.g., TightVNC Viewer, MuPDF Reader, DirectX Wrappers, Notepad++ plugins).</p></li><li><p><strong>DLL proxying/side-loading:</strong> fake system libraries such as <code>DroneEXEHijackingLoader.dll</code>, <code>webservices.dll</code>, and <code>radcui.dll</code> run under legitimate Windows executables.</p></li><li><p><strong>Main payload:</strong> <strong>ScoringMathTea</strong>, a 40-command remote-access trojan giving full control of the host, using <strong>encrypted HTTP/S C2</strong> via compromised WordPress servers.</p></li><li><p>Encryption and reflective DLL injection keep payloads only in memory; data are exfiltrated through the C2 channel.</p></li></ul><h3>Take Aways</h3><p>ESET attributes the campaign to Lazarus with high confidence. The <strong>&#8220;DroneEXE&#8221;</strong> internal naming, target selection, and timing indicate an <strong>espionage operation in support of Pyongyang&#8217;s UAV industrial expansion</strong>.</p><p><br>In essence, North Korea is combining social-engineering intrusion with code theft to <strong>steal UAV blueprints and production methods</strong>, improving its own drone arsenal and export capability.</p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.welivesecurity.com/en/eset-research/gotta-fly-lazarus-targets-uav-sector/?utm_source=geocyberglobal.com&quot;,&quot;text&quot;:&quot;Read ESETs Report in Full&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.welivesecurity.com/en/eset-research/gotta-fly-lazarus-targets-uav-sector/?utm_source=geocyberglobal.com"><span>Read ESETs Report in Full</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[US Cyberspace Implementation Stalling]]></title><description><![CDATA[US CSC report states the ability to protect itself and allies from cyber threats is stalling]]></description><link>https://www.geocyberglobal.com/p/us-cyberspace-implementation-stalling</link><guid isPermaLink="false">https://www.geocyberglobal.com/p/us-cyberspace-implementation-stalling</guid><dc:creator><![CDATA[Geo Cyber Global]]></dc:creator><pubDate>Thu, 23 Oct 2025 10:32:49 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!MUxh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44fec52-ad8a-43c6-b74a-aa4456d14d7e_812x734.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Apparently the US is slipping behind peer nation states with respect to cyber operations, strategy and implementation of core structural change.</p><p>The recent U.S. Cyberspace Solarium Commission&#8217;s (CSC&#8217;s) <a href="https://www.fdd.org/wp-content/uploads/2025/10/fdd-csc2.0-2025-annual-report.pdf">annual report</a> on implementation started its report with a scathing introduction:</p><blockquote><p>&#8220;<em>Our nation&#8217;s ability to protect itself and its allies from cyber threats is stalling and, in several areas, slipping. For five years, the U.S. Cyberspace Solarium Commission&#8217;s (CSC&#8217;s) recommendations have served as a benchmark against which to measure policymakers&#8217; commitment to strengthening the nation&#8217;s cybersecurity. This report assesses that approximately 35 percent of the commission&#8217;s original 82 recommendations have been fully implemented, 34 percent are nearing implementation, and an additional 17 percent are on track to be implemented. By comparison, however, last year&#8217;s report concluded that 48 percent had been implemented, 32 percent were nearing implementation, and an additional 12 percent were on track. For the first time, there has been a substantial reversal of the advances made in previous years. Nearly a quarter of fully implemented recommendations have lost that status &#8212; an unprecedented setback that underscores the fragility of progress.&#8221;</em></p></blockquote><p>That is a pretty damning verdict. Of course in recent months federal budgets across a host of US services have been cut and it seems cyber is also part of that. Reports like this of course do no harm in amplifying the need for more personnel and resources.</p><p>Zooming, out what is the both the report and US cyber capabilities in general trying to achieve?</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MUxh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44fec52-ad8a-43c6-b74a-aa4456d14d7e_812x734.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MUxh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44fec52-ad8a-43c6-b74a-aa4456d14d7e_812x734.png 424w, https://substackcdn.com/image/fetch/$s_!MUxh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44fec52-ad8a-43c6-b74a-aa4456d14d7e_812x734.png 848w, https://substackcdn.com/image/fetch/$s_!MUxh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44fec52-ad8a-43c6-b74a-aa4456d14d7e_812x734.png 1272w, https://substackcdn.com/image/fetch/$s_!MUxh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44fec52-ad8a-43c6-b74a-aa4456d14d7e_812x734.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MUxh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44fec52-ad8a-43c6-b74a-aa4456d14d7e_812x734.png" width="812" height="734" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d44fec52-ad8a-43c6-b74a-aa4456d14d7e_812x734.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:734,&quot;width&quot;:812,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:334219,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.geocyberglobal.com/i/176908847?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44fec52-ad8a-43c6-b74a-aa4456d14d7e_812x734.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MUxh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44fec52-ad8a-43c6-b74a-aa4456d14d7e_812x734.png 424w, https://substackcdn.com/image/fetch/$s_!MUxh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44fec52-ad8a-43c6-b74a-aa4456d14d7e_812x734.png 848w, https://substackcdn.com/image/fetch/$s_!MUxh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44fec52-ad8a-43c6-b74a-aa4456d14d7e_812x734.png 1272w, https://substackcdn.com/image/fetch/$s_!MUxh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44fec52-ad8a-43c6-b74a-aa4456d14d7e_812x734.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Image Source: CSC Report</p><p>The ability to deliver &#8220;layered cyber deterrence&#8221; is a powerful objective - which basically aims to reduce the <em><strong>frequency</strong></em> and <em><strong>severity</strong></em><strong> of cyber attacks</strong>. Both of those points (the likelihood and impact in standard risk management parlance) are complex things to both achieve and measure.</p><p>Hardening defences is one aspect, but identifying and in turn attributing attacks to actors linked to nation state orders is also another. The ability to consistently call out attacks, attribute specifically and support with technical evidence (often in line with a broad cast of allies, academia, technology providers and legal stakeholders) is becoming a powerful deterrence in itself. Actor and sponsor denials can only go so far.</p><p>The report goes in detail to specify where the US with respect to its strategic cyber progress.</p><h3><strong>Overall Assessment</strong></h3><ul><li><p><strong>Only 35%</strong> of the CSC&#8217;s 116 recommendations have been fully implemented (down from 48% in 2024).</p></li><li><p><strong>34%</strong> are nearing completion, <strong>17%</strong> on track, and the rest face limited progress or major barriers.</p></li><li><p>Nearly <strong>one-quarter of previously implemented reforms lost their status</strong>, showing fragility in institutional progress.</p></li><li><p>Leadership gaps, budget cuts, and administrative turnover have slowed coordination, especially at <strong>CISA</strong>, the <strong>State Department</strong>, and the <strong>Office of the National Cyber Director (ONCD)</strong>.</p></li></ul><h3><strong>Strategic Framework: &#8220;Layered Cyber Deterrence&#8221;</strong></h3><p>The CSC&#8217;s cyber strategy centers on <strong>three layers of deterrence</strong>:</p><ol><li><p><strong>Shaping behavior</strong> &#8212; promoting norms of responsible state behavior through diplomacy.</p></li><li><p><strong>Denying benefits</strong> &#8212; hardening critical infrastructure and aligning public-private cyber defenses.</p></li><li><p><strong>Imposing costs</strong> &#8212; disrupting adversaries through law enforcement and military operations.</p></li></ol><p>The report finds that:</p><ul><li><p>The U.S. continues to apply this model inconsistently.</p></li><li><p>Technical progress is outpacing federal reform.</p></li><li><p>Cyber diplomacy, talent development, and collaboration are under-resourced.</p></li></ul><h3><strong>Top Five Recommendations for 2025&#8211;26</strong></h3><ol><li><p><strong>Enhance ONCD&#8217;s Authority</strong></p><ul><li><p>Give ONCD budgetary and regulatory coordination powers to align cyber policy across agencies.</p></li><li><p>Trump should issue an executive order revising Presidential Policy Directive 41 to grant ONCD formal convening power.</p></li></ul></li><li><p><strong>Restore CISA&#8217;s Workforce and Funding</strong></p><ul><li><p>CISA faces a <strong>17% budget cut</strong> and up to <strong>one-third workforce loss</strong>.</p></li><li><p>Congress should provide multiyear stable funding to maintain its role as the <strong>national coordinator</strong> for critical infrastructure resilience.</p></li></ul></li><li><p><strong>Rebuild Cyber Diplomacy at the State Department</strong></p><ul><li><p>The Bureau of <strong>Cyberspace and Digital Policy (CDP)</strong> lost key staff and funding, impairing U.S. engagement abroad.</p></li><li><p>The report urges restoration of CDP&#8217;s capacity to counter PRC digital influence and support allies.</p></li></ul></li><li><p><strong>Reinstate Public&#8211;Private Collaboration Mechanisms</strong></p><ul><li><p>The administration&#8217;s <strong>termination of CIPAC</strong> (the Critical Infrastructure Partnership Advisory Council) has eroded industry trust and chilled information sharing.</p></li><li><p>Congress should restore legal protections for private-sector collaboration.</p></li></ul></li><li><p><strong>Expand and Diversify the Cyber Workforce</strong></p><ul><li><p>Workforce cuts and the rollback of diversity programs have shrunk the talent pipeline.</p></li><li><p>The U.S. should reinvest in <strong>skills-based hiring, apprenticeships, and retention incentives</strong>.</p></li></ul></li></ol><h3><strong>Key Takeaways</strong></h3><ul><li><p><strong>Cyber deterrence is faltering</strong> &#8212; adversaries like China continue large-scale intrusions despite U.S. actions.</p></li><li><p><strong>Institutional reforms remain fragile</strong> without sustained funding, legal authority, and bipartisan political will.</p></li><li><p>The U.S. needs to <strong>restore trust with industry and allies</strong>, reinforce its cyber diplomacy capacity, and rebuild a resilient domestic cyber workforce.</p></li></ul><p>In essence, the CSC report warns that <strong>the U.S. cyber strategy risks erosion without renewed executive and congressional action</strong> to institutionalize past progress and adapt to accelerating threats.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.fdd.org/wp-content/uploads/2025/10/fdd-csc2.0-2025-annual-report.pdf&quot;,&quot;text&quot;:&quot;Read Full Report&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.fdd.org/wp-content/uploads/2025/10/fdd-csc2.0-2025-annual-report.pdf"><span>Read Full Report</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[PRC Cyber Strategy Explained]]></title><description><![CDATA[A review of a recent Booz Allen Report on China's cyber plans]]></description><link>https://www.geocyberglobal.com/p/prc-cyber-strategy-explained</link><guid isPermaLink="false">https://www.geocyberglobal.com/p/prc-cyber-strategy-explained</guid><dc:creator><![CDATA[Geo Cyber Global]]></dc:creator><pubDate>Wed, 22 Oct 2025 14:18:22 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/e54cd4d8-7a97-496a-aa2d-a62ad46b4db8_660x854.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Booz Allen have recently released a <a href="https://www.boozallen.com/insights/cyber/predict-prevent-and-prevail-over-the-prc-cyber-threat.html">report</a> (email reg required) taking a look at the People&#8217;s Republic of China and their strategic use of cyber as part of their overall foreign policy goals.</p><p>The report highlights the strategic, long-term and integrated use of cyber and information operations across a variety of targets with varying levels of success.</p><h3><strong>Strategic Objectives</strong></h3><p>The PRC&#8217;s cyber strategy is <strong>global, persistent, and state-directed</strong>, using cyber power as an instrument of <strong>geopolitical coercion</strong>. Its main goals are to:</p><ul><li><p><strong>Constrain U.S. strategic options</strong> and freedom of action.</p></li><li><p><strong>Erode alliance cohesion</strong> among the U.S., Europe, and the Indo-Pacific.</p></li><li><p><strong>Embed influence and leverage</strong> in developing nations.</p></li><li><p><strong>Pre-position access</strong> to critical infrastructure for crisis or conflict advantage.</p></li></ul><div><hr></div><h3><strong>Core Operating Logic</strong></h3><p>Beijing fuses <strong>state policy, technical innovation, and systemic exploitation</strong> into a cohesive architecture of cyber power. Rather than one-off hacks, PRC campaigns are <strong>deliberate, cumulative efforts</strong> to:</p><ul><li><p>Shape global political and security environments.</p></li><li><p>Undermine adversaries&#8217; decision-making ecosystems.</p></li><li><p>Precondition outcomes in future crises or conflicts.</p></li></ul><div><hr></div><h3><strong>Four Force Multipliers</strong></h3><p>The PRC&#8217;s operational edge is built around four reinforcing &#8220;force multipliers&#8221;:</p><ol><li><p><strong>Trusted Relationship Exploitation</strong> &#8211; Compromising software vendors, supply chains, and service providers to scale access and persistence while bypassing traditional defenses.</p></li><li><p><strong>Network Edge Device Exploitation</strong> &#8211; Systematic targeting of routers, VPNs, and firewalls to gain stealthy, long-term access to networks worldwide.</p></li><li><p><strong>AI Acceleration</strong> &#8211; Using AI for faster reconnaissance, targeting, translation, and influence operations; moving toward fully AI-enabled cyber operations.</p></li><li><p><strong>Attribution Contestation</strong> &#8211; Blurring responsibility through criminal proxies, misinformation, and counter-narratives to preserve escalation control and deniability.</p></li></ol><div><hr></div><h3><strong>Operational Arenas</strong></h3><p>The PRC applies these methods across <strong>three global arenas</strong>:</p><ul><li><p><strong>East Asia:</strong> Undermining U.S. agility around Taiwan, Japan, and the South China Sea by embedding access and using influence operations to shape domestic sentiment.</p></li><li><p><strong>U.S. Alliance System:</strong> Targeting political cohesion in the Five Eyes and Europe, monitoring leadership transitions, and influencing narratives that fracture unity.</p></li><li><p><strong>Developing World:</strong> Building digital dependency via PRC technology, exploiting infrastructure for espionage and leverage, and influencing governance through cyber and information operations.</p></li></ul><div><hr></div><h3><strong>Emerging Trends (2025&#8211;2030 Forecast)</strong></h3><ul><li><p><strong>Scaling of trusted-access abuse</strong> through contractors and vendor ecosystems.</p></li><li><p><strong>Expansion to nontraditional edge devices</strong> (satellite terminals, cellular gateways).</p></li><li><p><strong>AI becoming a core operational enabler</strong>, not just a support tool.</p></li><li><p><strong>Shift from denial to structured denial operations</strong> &#8212; organized, fast-response attribution counterclaims.</p></li><li><p><strong>Cyber prepositioning for crisis leverage</strong> in East Asia and critical minerals supply chains.</p></li><li><p><strong>Embedded influence and coercion</strong> in developing countries aligned with Belt and Road interests.</p></li></ul><div><hr></div><h3><strong>Strategic Effect</strong></h3><p>Beijing seeks to <strong>reshape global competition</strong> by:</p><ul><li><p>Eroding U.S. and allied <strong>decision-making agility</strong>.</p></li><li><p>Maintaining <strong>plausible deniability</strong> below conflict thresholds.</p></li><li><p>Establishing <strong>persistent strategic leverage</strong> through digital entrenchment.</p></li></ul><div><hr></div><h3><strong>Counter-Strategy (U.S. Recommendations)</strong></h3><p>The report calls for the U.S. and allies to:</p><ul><li><p><strong>Close the &#8220;trusted back door&#8221;</strong> (vendor access control).</p></li><li><p><strong>Fortify edge infrastructure</strong> (firewalls, VPNs, OT systems).</p></li><li><p><strong>Reform procurement</strong> to factor in adversarial control risks.</p></li><li><p><strong>Disrupt PRC botnets and infrastructure-as-a-service ecosystems.</strong></p></li><li><p><strong>Out-automate and undermine PRC AI operations.</strong></p></li><li><p><strong>Expose and contest attribution at speed.</strong></p></li><li><p><strong>Forward-posture with allies and secure the developing world&#8217;s digital terrain.</strong></p></li></ul><div><hr></div><p><strong>In short:</strong><br>The PRC&#8217;s cyber strategy is not just about hacking&#8212;it&#8217;s <strong>systematic digital statecraft</strong> designed to <strong>erode U.S. initiative, exploit global interdependencies, and secure long-term positional advantage</strong> through scale, stealth, speed, and deniability. </p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Hello World]]></title><description><![CDATA[The convergence of geopolitical cyber security policy and operations.]]></description><link>https://www.geocyberglobal.com/p/hello-world</link><guid isPermaLink="false">https://www.geocyberglobal.com/p/hello-world</guid><dc:creator><![CDATA[Geo Cyber Global]]></dc:creator><pubDate>Wed, 22 Oct 2025 10:12:41 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/f784478a-c4a1-4b27-893c-0869ad614eab_333x244.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The convergence of geopolitical cyber security policy and operations.</p>]]></content:encoded></item></channel></rss>