Key function of Poles

polska-zbrojna.pl 6 months ago

"Cyber Coalition" is 1 of the largest cyber defence exercises in the world. This year, representatives of the 27 NATO countries, six partner countries and EU institutions were invited to the cyberpoly. “Poles coordinated the efforts of the 10 east states of NATO flank during a complex operation in cyberspace,” said Colonel Przemysław Wilczyński, the spokesperson for DKWOC.

The yearly "Cyber Coalition" exercises, held since 2008, aim to strengthen the operational capabilities of NATO states, allies and partners (including Ukraine, Japan and Switzerland) in cybersecurity and coherent action in cyberspace. They are not only an operational capacity test, but besides a platform for exchanging cognition and experience between allies.

During this year's edition, participants performed tasks in their countries, but the thought ‘Cyber Coalition’ There's cooperation. Most of the soldiers formed the alleged Blue Team. They resisted attacks and reacted to another Red squad actions, in which a tiny group from the NATO Cyber defence Improvement Centre in Tallinn took part.

RECLAMA

Regional Commands were liable for planning and implementing Blue's activities. Polish soldiers headed 1 of them Cyberspace defence Forcesfrom Estonia to Bulgaria. Prime Minister Przemysław Lipczyński, press spokesperson for the WOC Component Command, points out that Polish soldiers have been very strong among experts for years cybersecurity. During the last 3 editions of the Natovian “Locked Shields” maneuvers, Poles each time placed on the podium, and this year they won first place (in a squad with Finns).

The "Cyber Coalition ‘24" was held on the alleged cyberpoly (Cyber Range), which is simply a controlled, interactive technology environment that simulates a wide scope of cybersecurity incidents. Prime Minister Lipczyński stressed that Info Range, an artificial information environment that resembles popular social media platforms specified as Facebook, X or Instagram, was besides utilized for the exercise. All content published there is generated based on artificial intelligence.

Although the victim of cyber attacks was a fictitious allied state, the situations faced by the Blues were based on actual threats, specified as cyber attacks on ICT systems, critical infrastructure and supply chains. The procedures and mechanisms for responding to incidents in cyberspace were besides checked during the exercises. – The script of exercises was mostly based on conclusions drawn from the war in Ukraine and included phases preceding the kinetic clash. By the time the first firearm shot is fired, hostile actions in cyberspace are already very advanced," said DKWOC press spokesman.

NATO experiences hundreds of incidents in cyberspace all month. These attacks include phishing attempts and malware infections, but besides more sophisticated and targeted cyber espionage operations. Their aim is to weaken NATO critical infrastructure, bargain intellectual property, collect intelligence and impede military operations. “ Cyberspace has become a modern conflict field, and specified initiatives strengthen the Alliance’s ability to counter expanding threats,” stressed DKWOC experts.

This year's edition of the "Cyber Coalition" ran from 30 November to 6 December.

Jakub Zagalski
Read Entire Article