Louise Marie Hurel

Louise Marie Hurel

@lmhurel.bsky.social

Tech, Cyber diplomacy, Norms etc. Cyber at @rusi.bsky.social & among other things. Jazz and personal views only. Personal website: www.louisemariehurel.com

579 Followers 100 Following 85 Posts Joined Nov 2024
1 week ago

There are some additional and excellent reporting/background on the cyber bit that I’d highly recommend:
- secalliance.com/blog/us-and-is…
- sophos.com/en-us/blog/cyb�����
- sentinelone.com/blog/seg/sentinelo…
- halcyon.ai/ransomware-ale…
And many others!

0 0 0 0
1 week ago
Preview
Control, Alt, Influence: the Potential for US Cyber Operations in Iran Speculation is mounting over how the US will act if diplomacy fails and a deal with Iran to remove the country’s nuclear capability collapses. As options are debated, ‘cyber’ remains ever elusive.

Ref 3: My colleague had noted earlier jn Feb that operational clarity is an essential element to any potential op.
Unfortunately that is getting trickier and trickier with the spread of the conflict to other parts of the Middle East. www.rusi.org/explore-our-...

0 0 1 0
1 week ago
Preview
The Perils of Military Professionalism Operation Epic Fury follows a familiar pattern of military excellence enabling political malpractice

Ref 2: @jonrlindsay reflects on the mixed signals, objectives and perils of comparing/contrasting US ops. Great read: dolos.substack.com/p/the-perils...

0 0 1 0
1 week ago
Preview
Layered Ambiguity: US Cyber Capabilities in the Raid to Extract Maduro from Venezuela The US operation to remove Maduro succeeded despite fundamental ambiguity about what cyber delivered but that opacity has strategic consequences.

Ref 1: I’ve written on the ‘layered ambiguity’ of the 🇺🇸 description of cyber in 🇻🇪 following claims that such capabilities had led to a ‘blackout’ in Caracas. www.rusi.org/explore-our-...

0 0 1 0
1 week ago

Seventh, uncertainty remains over when and how Iranian cyber activity could expand to directly target the US homeland and its allies, although many are already in alert.

0 0 1 0
1 week ago

The layering of uncertainty, as ever, reinforces, the corollary risk is a period of decentralised, proxy-led escalation with limited central restraint, making the coming days particularly volatile and difficult to attribute.

0 0 1 0
1 week ago

Important to note that we don’t know how much this alleged attack has disrupted the IRGC’s capacity to conduct and plan its cyber campaigns.

0 0 1 0
1 week ago

Sixth, observing and understanding shifts in priorities, chain of command and use of capabilities within the IRGC in this moment of leadership change will be important albeit difficult esp after the IDF claimed to have hit IRGC’s intel directorate and cyber warfare headquarters.

1 0 1 0
1 week ago

Fifth, tracking the cognitive effects/psy ops targeting populations in 🇮🇷 🇺🇸 🇮🇱 will be essential. People are talking about the BadeSaba app hack but we need to look at this within a longer timeline (eg 🇮🇷 broadcast being hacked to air regime change narratives+other examples).

0 0 1 0
1 week ago

Fourth, with the conflict expanding across the broader Middle East following Iranian retaliatory strikes on US bases in Bahrain, Qatar, Kuwait and the UAE, it is also important to monitor hacktivist activities beyond the ‘immediate parties’.

0 0 1 0
1 week ago

Third, and perhaps more importantly, it will be crucial to continue monitoring how proxies might expand the fog of crisis.

0 0 1 0
1 week ago

iii)how the ‘layering’ of intel sources supported by cyber esp can enable strikes of greater precision and therefore limit collateral damage to civilians; (iv) and (again!) an invaluable reminder that cyber is only as good as the other capabilities & intel sources it is paired w/

0 0 1 0
1 week ago

The sequencing of HUMINT, SIGINT and cyber espionage in the killing of the Ayatollah shows: (i) how cyber supports reconnaissance; (ii) how pre-positioning in strategic networks well ahead of an operation can enable it to be used in critical strikes

0 0 1 0
1 week ago

Second, as important as non-kinetic ‘effects’ is the layering of those effects with intelligence collection to support in successfully achieving military objectives throughout an operation.

0 0 1 0
1 week ago

Not to mention that, in the case of Venezuela, infrastructure was suffering from gradual and critical decay & cyber capabilities within the country are far from developed.

0 0 1 0
1 week ago

Midnight Hammer and Absolute Resolve are more contained. Each contains their own set of risks of escalation, of course. But the objectives and scope are clearer. [2, 3]

0 0 1 0
1 week ago

Epic Fury is possibly the most contextually challenging given the leadership decapitation and spillover to other parts of the Middle East and the incredibly ambiguous set of strategic objectives of the US-Israeli intervention.

0 0 1 0
1 week ago

Op Midnight Hammer, Absolute Resolve and now Epic Fury represent successive opportunities that the US has been using to sharpen the institutional, operational and tactical integration of cyber capabilities in military operations but we should think twice before bundling them up.

0 0 1 0
1 week ago

Speaking of ‘layering effects’: Gen Caine’s statement uses similar language to the briefing after Op Absolute Resolve in 🇻🇪[1]. However, rather than only mentioning cyber as helping pave the way for the op, it notes this more sustained approach in disrupting comms&sensor netwrks

0 0 1 0
1 week ago

Gen Caine’s press conference speech notes two roles for cyber in the ‘layering of effects’: as ‘first-movers’ in using ‘non-kinetic effects’ to shape the environment for the subsequent phases of the Op; secondly, in maintaining a ‘continuous layering’ throughout the first 57hs.

0 0 1 0
1 week ago

First, as more information is shared about the operations, these cases might contribute to our ongoing assessment of whether cyber remains more useful as a first-strike enabler, or they may provide additional lessons on how cyber might sustain physical effects.

0 0 1 0
1 week ago

Some of my initial thoughts for @rusi.bsky.social on a seven areas we should keep in mind when assessing the use of cyber capabilities in the context of the US-Israeli operations in Iran + where we should just please drop the 🔮.

🧵

2 0 1 0
1 week ago
Preview
Fog, Proxies and Uncertainty: Cyber in US-Israeli Operations in Iran As Operations Epic Fury and Roaring Lion develop, several dimensions of cyber activity demand attention and careful qualification.

'uncertainty remains over when and how Iranian cyber activity could expand to directly target the US homeland and its allies, although many are already on alert.’

Writes @lmhurel.bsky.social in the latest #RUSICommentary.

14 5 0 2
1 month ago
Preview
Layered Ambiguity: US Cyber Capabilities in the Raid to Extract Maduro from Venezuela The US operation to remove Maduro succeeded despite fundamental ambiguity about what cyber delivered but that opacity has strategic consequences.

'Most governments do not disclose offensive cyber operations. Boasting about capabilities is not the usual game' writes @lmhurel.bsky.social in the latest RUSI Commentary.

18 6 1 2
1 month ago

I don’t argue that it’s new.
I think you should read the piece first.

1 0 1 0
2 months ago
Video thumbnail

🎄Merry Christmas from all of us at RUSI!

58 6 3 0
5 months ago
Post image Post image

Had a marvellous time speaking at Oxford Analytica’s Global Horizons Conference about AI supply chains, tech-trade competition, US-China relations, and the role of AI in the offense-defence balance in cybersecurity w @kellolucas.bsky.social Eduardo Plastino and @tatiabolkvadze.bsky.social.

5 0 0 0
7 months ago
Preview
The Rules of the Road in Cyberspace, 10 Years Later For five years, the Open-Ended Working Group (OEWG) on cybersecurity has negotiated key thematic areas which can undermine international stability. Experts following these negotiations weigh in on the...

The Open-Ended Working Group (OEWG) on cybersecurity recently concluded a five-year negotiation on how nations should behave in cyberspace. Experts who have been tracking these talks offer their insights on the group's progress and what the future holds for the OEWG's goals and themes.

12 5 0 1
7 months ago
Preview
China’s Drone Swarms Gain Advanced Evasion Capabilities: The Next Phase of the Global Drone Arms Race China’s Breakthrough in Drone Swarm Evasion: A New Era in WarfareChina’s military drone program has taken a dramatic leap forward with the unveiling of a new “terminal evasion” technology, a develo…

“This innovation equips drones with side-mounted rocket boosters, enabling them to perform abrupt, high-G maneuvers just seconds before a missile or interceptor strikes. The result: a dramatic increase in the odds that these drones can evade destruction and complete their missions.”

175 60 13 6
7 months ago
Preview
What Singapore's First Public Cyber Attribution Tells Us For the first time, Singapore has called out a China-linked cyber threat actor group, to the chagrin of Asia's regional hegemon.

'Cyber attribution is rarely a binary decision. States do not simply jump from silence to confrontation' writes @lmhurel.bsky.social in the latest RUSI Commentary on the implications of Singapore calling out a Chinese-linked cyber threat actor group for the first time.

8 1 0 0