Cyber War Calls For A New Look US Soldier

Cyberspace is today what airspace was a century ago. It’s a whole new domain our enemies are rushing to exploit. 

That’s why the US Defense Department created US Cyber Command in 2010. That joint military operation has a goal no different than any tank platoon, carrier group, or fighter wing: to keep the US safe.

The problem facing this new service is finding the right quantity and quality of talent, and herein lies the problem. The best cyber warriors don’t always make the best soldiers. 

Some won’t be able to handle the physical rigors of basic training. Some won’t be able to pass a drug test. Many simply don’t have the kind of brains wired for precision marching and crisp solutes.

Does the Army turn them over to civilian agencies like the NSA, or a quasi-private contractor system? Maybe the Army should just relinquish its cyber branch altogether and allow it to form a completely separate service, like when the Army Air Corps became the US Air Force. 

But if the Army still wants to retain a uniformed presence in cyber space, how do they do it without offending those who’ve literally sweated and bled for the right to call themselves soldiers?

In another time, in another place, our British cousins found themselves in a similar quandary over talent. During World War II, they needed a lot of qualified naval officers to fill a lot of badly needed tasks. 

But putting these Royal Navy Volunteer Reserves (RNVR) in the same threads as the career battleship officers would have offended a tradition going all the way back to the days of ‘wooden ships and iron men.’ 

Their solution was to change the gold stripes on RNVR sleeves from straight to wavy. The message was loud and clear: “We may not be the varsity, but we’re still just as much in the game.”

Creating a new, specialised uniform probably wouldn’t entice new recruits. That’s a much bigger, more complex issue. It might, however, encourage those who already want to serve their country but never thought they could. A distinct stripe or badge, or black and grey camo pattern would send a very clear message to two very diverse communities.

To the traditional warrior-class it would say, “Yes, we know we’re not you and we’re not pretending to be. We respect the risks you take and we honor the sacrifices you make.”

To the civilian world it would say, “We keep your private data private. We keep your democratic process democratic. We keep your lights on and your hospitals running. We may serve behind keyboards, but keep you just as safe as those behind triggers. We stand watch on the digital wall. We are Cyber Warriors.”

The Hill

You Might Also Read: 

US Army Command Learning Cyberwar From Social Media:

Will NSA & CyberCom Split?:

Pentagon Creates New 5,000 Strong Cyber Force:

Waging Cyberwar In Peacetime:

Pentagon To Relaunch $475 Million Cyber Effort:

US Defense Signals Silicon Valley's Cyberwar Help:

 

 

« Ageing Energy Systems Hold Huge Potential For Cyber Attack
Russian Propaganda Connections »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Mako Group

Mako Group

The Mako Group specializes in protection - providing security through auditing, testing, and assessments. And, we do it all with the highest quality standards possible.

CERT-MU

CERT-MU

CERT-MU is the Mauritian National Computer Security Incident Response Team.

Early Warning Services

Early Warning Services

Early Warning Services identity, authentication and payment solutions empower financial institutions to make confident decisions, enable payments and mitigate fraud.

Austrian Trust Circle

Austrian Trust Circle

Austrian Trust Circle is an initiative of CERT.at and the Austrian Federal Chancellery and consists of Security Information Exchanges in the areas of the strategic information infrastructure.

Fraugster

Fraugster

Fraugster provides the most precise anti-fraud solution for e-commerce businesses.

itbox.online

itbox.online

Itbox.online offers IT solutions to ensure that your company's technologies are always available and secure as your business demands.

LogicHub

LogicHub

LogicHub is built on the principle that every decision process for threat detection and response can and should be automated.

Samurai Digital Consulting

Samurai Digital Consulting

Samurai Digital Security are a cyber and Information security services provider, specialising in penetration testing, incident response, user awareness and information governance solutions.

Belcan

Belcan

Belcan is a global supplier of engineering, manufacturing & supply chain, workforce and government IT solutions to customers in the aerospace, defense, automotive, industrial, and private sector.

Titan Labs

Titan Labs

Titan Labs is a Cyber Security Consultancy that provides advice and technical expertise to government, international finance and telecommunications providers.

Hackuity

Hackuity

Hackuity is a breakthrough technology solution that rethinks the way of managing IT vulnerabilities in enterprises.

Antigen Security

Antigen Security

Antigen Security is a Digital Forensics, Incident Response and Recovery Engineering firm helping businesses and service providers prepare for, respond to, and recover from cyber threats.

Agile Defense

Agile Defense

Agile Defense is an Information Technology services provider, delivering leading-edge Digital Transformation solutions to the Federal Government.

ERCOM

ERCOM

Ercom, a subsidiary of the Thales Group, is a French company known for its mobility security solutions.

Security Risk Advisors (SRA)

Security Risk Advisors (SRA)

Security Risk Advisors deliver cybersecurity services to leading companies in the Financial Services, Healthcare, Pharmaceuticals, Technology and Retail industries.

Mediatech

Mediatech

Mediatech, specialized in managed Cybersecurity and Cloud services, a single point of contact for your company's IT and infrastructure.