WARFARE EVOLUTION BLOG. I can speak to this topic with some level of experience. My old military intelligence unit, Army Security Agency (ASA) was the military arm of the National Security Agency (NSA). Our primary mission was to find, identify, fix, and track every significant military unit on the planet, including both our enemies and our allies. As Sun Tzu is credited with saying (or maybe it was Machiavelli, or Petrarch, or Michael Corleone): "Keep your friends close, and your enemies closer."
WARFARE EVOLUTION BLOG: When I first started researching this topic, I thought writing this article would be straight-forward and easy. As with many other subjects in this series, that was not the case. Targeting models are integrated into kill chains, or vice-versa, and that creates some confusion. The available stream of information about this subject is both narrow and shallow. However, we are seeing a sequence of evolving kill chain models, at the strategic and tactical levels.
In this Q&A with Deon Viergutz, Vice President of Cyber Solutions at Lockheed Martin Information Systems & Global Solutions in Fort Meade, Md., he discusses the most common cyber attacks against the military, the biggest threats are going forward such as insider attacks, and how Lockheed Martin leverages its Cyber Kill Chain approach to defend [...]