Cyber War Calls For A New Look US Soldier

Cyberspace is today what airspace was a century ago. It’s a whole new domain our enemies are rushing to exploit. 

That’s why the US Defense Department created US Cyber Command in 2010. That joint military operation has a goal no different than any tank platoon, carrier group, or fighter wing: to keep the US safe.

The problem facing this new service is finding the right quantity and quality of talent, and herein lies the problem. The best cyber warriors don’t always make the best soldiers. 

Some won’t be able to handle the physical rigors of basic training. Some won’t be able to pass a drug test. Many simply don’t have the kind of brains wired for precision marching and crisp solutes.

Does the Army turn them over to civilian agencies like the NSA, or a quasi-private contractor system? Maybe the Army should just relinquish its cyber branch altogether and allow it to form a completely separate service, like when the Army Air Corps became the US Air Force. 

But if the Army still wants to retain a uniformed presence in cyber space, how do they do it without offending those who’ve literally sweated and bled for the right to call themselves soldiers?

In another time, in another place, our British cousins found themselves in a similar quandary over talent. During World War II, they needed a lot of qualified naval officers to fill a lot of badly needed tasks. 

But putting these Royal Navy Volunteer Reserves (RNVR) in the same threads as the career battleship officers would have offended a tradition going all the way back to the days of ‘wooden ships and iron men.’ 

Their solution was to change the gold stripes on RNVR sleeves from straight to wavy. The message was loud and clear: “We may not be the varsity, but we’re still just as much in the game.”

Creating a new, specialised uniform probably wouldn’t entice new recruits. That’s a much bigger, more complex issue. It might, however, encourage those who already want to serve their country but never thought they could. A distinct stripe or badge, or black and grey camo pattern would send a very clear message to two very diverse communities.

To the traditional warrior-class it would say, “Yes, we know we’re not you and we’re not pretending to be. We respect the risks you take and we honor the sacrifices you make.”

To the civilian world it would say, “We keep your private data private. We keep your democratic process democratic. We keep your lights on and your hospitals running. We may serve behind keyboards, but keep you just as safe as those behind triggers. We stand watch on the digital wall. We are Cyber Warriors.”

The Hill

You Might Also Read: 

US Army Command Learning Cyberwar From Social Media:

Will NSA & CyberCom Split?:

Pentagon Creates New 5,000 Strong Cyber Force:

Waging Cyberwar In Peacetime:

Pentagon To Relaunch $475 Million Cyber Effort:

US Defense Signals Silicon Valley's Cyberwar Help:

 

 

« Ageing Energy Systems Hold Huge Potential For Cyber Attack
Russian Propaganda Connections »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Kore Telematics

Kore Telematics

Kore is a leading managed service provider for IoT and M2M applications.

Nethemba

Nethemba

Nethemba provide pentesting and security audits for networks and web applications. Other services include digital forensics, training and consultancy.

Clavister

Clavister

Clavister is a network security vendor delivering a full range of network security solutions for both physical and virtualized environments.

Scientific Cyber Security Association (SCSA)

Scientific Cyber Security Association (SCSA)

The main goal of Scientific Cyber Security Association is the development of scientific and practical directions of cyber security.

CTM360

CTM360

CTM360 is a unified external security platform offering 24x7x365 Cyber Threat Management for detecting and responding to cyber threats.

Trapp Technology

Trapp Technology

Trapp Technology combines the very best cloud, Internet, IT managed services, and IT consulting to provide a true all-in-one IT solution for small to mid-sized businesses.

Automation Workz

Automation Workz

Automation Workz has been ranked as a top 10 Cybersecurity Bootcamp in the US by Career Karma.

Clarabot Nano

Clarabot Nano

Nano is the secure file sharing tool to improve content search, data access and collaboration between multiple parties.

Zenity

Zenity

Zenity is the first and only security governance platform for low-code/no-code applications.

Verichains

Verichains

Verichains Lab is a pioneer and leading APAC blockchain security firm with extensive expertise in the areas of security, cryptography and core blockchain technology.

Access Venture Partners

Access Venture Partners

Access Venture Partners are an early stage VC firm investing in bold founders and helping every step of the way. Areas we give special focus to include cybersecurity.

Avanade

Avanade

Avanade is a leading provider of innovative digital, cloud and advisory services, industry solutions and design-led experiences across the Microsoft ecosystem.

Ironblocks

Ironblocks

Ironblocks is a pioneering cybersecurity firm that specializes in delivering comprehensive, end-to-end security solutions for the rapidly evolving Web3 ecosystem.

PlanNet 21 Communications

PlanNet 21 Communications

PlanNet 21 Communications is Ireland most specialised technology solution provider.

HeroDevs

HeroDevs

HeroDevs is the trusted leader in providing secure, long-term support for deprecated open-source software.

ThreatMon

ThreatMon

Gain insights into emerging threats with real-time data and AI-driven analysis to stay ahead of cyber risks. Detect, analyze, and respond to threats before they happen.