nltimes.nl
Saturday, 13 September 2025 - 08:15
The Royal Netherlands Army is deploying hackers to the front lines as part of the newly formed 101 CEMA Battalion, officials said Thursday. According to De Telegraaf, the unit, officially established in Stroe, merges companies specialized in electronic warfare and cyber operations.
Electronic warfare includes disrupting enemy communications and tracking opponents through signal detection. The Netherlands reportedly gained experience in Afghanistan, where specialists traveled in armored vehicles equipped with large antennas.
During early experiments, soldiers hacked webcams, smart doorbells, and robotic vacuum cleaners to gather intelligence on buildings holding hostages. In Ukraine, hackers can take control of drawbridges to block enemy advances without permanently destroying infrastructure.
Field hacking is a newer capability. “We could have had more if the military budget had allowed,” Lieutenant Colonel Peter Masseling, commander of 101 CEMA, told De Telegraaf. “But the priorities were different. Fortunately, only our quantity suffered; our quality remains at the forefront internationally.”
Funding constraints have now been lifted. The battalion currently employs 20 hackers, with plans to grow to 50 within a 250-person unit. Over the next five years, millions will reportedly be invested in the Cyber and Electronic Warfare branch. The ultimate goal is three battalions, so each brigade has dedicated cyber specialists. “With a tank, you don’t shut down a website,” Masseling told the newspaper.
The 101 CEMA Battalion embeds hackers directly with combat units, unlike the Cyber Command, which operates from bases to disrupt enemy systems. Most members are trained for frontline deployment, while the unit also includes skilled personnel who work behind the lines and do not meet physical military requirements.
Established in 2024, the People's Liberation Army Cyberspace Force merges cyber and electronic warfare to disrupt, deter, and dominate in future conflicts.
With the launch of its Cyberspace Force, China has elevated the digital domain to a theatre of war. The Cyberspace Force of the People’s Liberation Army (PLA) is China’s newest military branch, launched on 19 April 2024.
Based in Haidian District, Beijing, and with five antennas across the country, it operates under the direct authority of the Central Military Commission (CMC).
Its creation followed the dissolution of the Strategic Support Force (SSF) and shows a broader shift in China’s approach to modern warfare. The force is tasked with both defending and attacking in the cyber domain. Additionally, it covers:
Network security
Electronic warfare
Information dominance
The Cyberspace Force plays a central role in China’s preparation for future conflicts, particularly in what the PLA calls “informatised warfare”, a doctrine focused on controlling the flow of information across all domains. By placing the unit directly under the CMC, China ensures centralised control, operational discipline, and strategic reach in cyberspace.
On 19 April 2024, the CMC formally dissolved the SSF and created three independent forces:
This marked the first time China designated cyberspace as an independent warfare domain with dedicated command, personnel, and budgetary autonomy. The Cyberspace Force now operates as a Corps Leader-grade service, headquartered in Beijing. It is led by Lieutenant General Zhang Minghua, with Lieutenant General Han Xiaodong serving as its political commissar. Its emergence reflects a shift from fragmented technical capabilities to centralised, strategic integration of cyber warfare into China’s military planning.
In December 2023, the Molfar website experienced a DDoS attack. This occurred immediately after the publication of our extensive investigation into the production of Shaheds and Lancets, which included the deanon of the family of chief designer Zakharov. Recently, Molfar discovered who was behind that DDos attack.
Molfar's OSINT analysts, in collaboration with the DC8044 F33d community team, identified several Russian hackers allegedly connected to Russian state structures and received funding from them. Some of these individuals are Ukrainian.
Federal authorities have arrested and indicted a 20-year-old U.S. Army soldier on suspicion of being Kiberphant0m, a cybercriminal who has been selling and leaking sensitive customer call records stolen earlier this year from AT&T and Verizon. As first reported by…