Logical Policy?
The obvious choice, to avoid the risk of unintended consequences from tactical cyber usage, is to escalate decision-making about cyber activity to strategic command level.
“Teach your troops to hack correctly because being good at Red Team makes them great at Blue Team”
False flags, disinformation and proxy actors have made attribution of cyber-warfare slow and uncertain. Wildcat cyber activity by partially trained operators within our armed forces could unwittingly cause geopolitical complications or even prompt military retaliation in some sensitive theatres.
The obvious choice, to avoid the risk of unintended consequences from tactical cyber usage, is to escalate decision-making about cyber activity to strategic command level.
However, this policy translates into an unintended ‘ban’ on cyber-activity at a tactical level and cyber training has been halted for combat troops.
Our troops are training, exercising and operating in urban environments without realizing they are surrounded by internet-connected access points and devices, all of which can be used against them.
Troops on the ground are scanned, tracked, targeted, misguided, sabotaged and out-manoeuvred by cyber-tactics, techniques and tools that they know little or nothing about and are ill-equipped to defend themselves against - they deserve our help!
A comprehensive introduction to the true nature of the 5th Domain of warfare, from nation-state efforts to tactical cyber threats. This briefing will raise awareness of the tools and techniques used in cyber activity.
The way this briefing is delivered will motivate troops to learn more about hybrid warfare.
Ex CAMBRIAN PATROL, the British Army’s toughest patrolling event, 9 tests across 60km, with 40kg in 2 days. Tanks, crashed helicopters, medivacs, night attacks, river crossings, drones and now, cyber attacks! Capture-the-Flag exercises, run parallel to patrols, link the OpInt chain from handing in a laptop found in a building-clearance to hacking the laptop then passing intel back to the patrols helping their tests. End-to-end multi-domain interoperability.
Red Team content
1. Cyber Intelligence Briefing
2. Passive & Active Reconnaissance
3. Weaponisation of Code
4. Delivery Methodologies
5. Exploitation of Vulnerabilities
6. Establishing Command & Control
7. Actions On – Damage Control
Blue Team content
8. Threats in Urban Environments
9. Vulnerabilities in Equipment
The SudoCyber platform is a SaaS-based gamified system, designed by serving military people, specifically to help develop cyber capability in the armed forces. Ex-SF, Royal Marine and SigInt operators are able to deliver complex cyber content in military context, speaking from their own experiences. The platform has restricted access that enables classified and hardware-specific content to be delivered and managed securely.
A range of courses, with qualifications from CompTIA and the EC-Council’s Certified Ethical Hacking, complimented by 1,000+ labs and challenges in a Cyber Range that can be filtered by difficulty, topic and technique, are supported by Streams of labs on popular skills like Crypto, AI & OSINT. Accessible through a browser, troops can learn and develop new skills, at their own pace, in their own time, on exercise or on deployment
Ready to find out more and see how our solutions can help