Cyberwar Represents An Existential Threat

Nineteenth century military genius Carl von Clausewitz coined the phrase: “War is a mere continuation of politics by other means.” In his day, the number of wars was limited by the time and expense to organize large armies and then march across borders to inflict pain.

War was much more expensive in the twentieth century, but the number of conflicts expanded because planes and missiles cut the time it took to inflict pain. Proliferating technologies make it now possible for any nation to acquire cyber tools at minimal cost to instantly inflict pain on any other nation. Clausewitz would expect the number of cyber-wars to grow exponentially in the twenty-first century.    

The advent of cyberwar represents a new “high bar risk” as the U.S. faces-off against a deadly triad of cutting-edge digital technologies, advanced military weapons, and the ability to disrupt critical infrastructure. With this type of war built around digital technology, America’s enemies will focus on turning our own technology against us.

The first year of the twenty-first century will be remembered for 19 illegal aliens who trained at a Florida school to use US commercial airliners as improvised explosive devices. The 9/11 terrorists slaughtered more Americans than died at Pearl Harbor. With the U.S. government politically forced to declare war on much of the Middle East, the financial cost from the attacks and subsequent military response is over $3.3 trillion.

Former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States, Richard A. Clarke, defined “cyberwarfare” as “actions by a nation-state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption.” When confronted with the statistic that less than 0.0025% of revenue at the average US corporation was being spent on information technology security, Clarke warned: “If you spend more on coffee than on IT security, then you will be hacked. What’s more, you deserve to be hacked.”

Edward Snowden’s revelations concerning the militarized activities of the NSA highlight cyber-warfare’s danger to the U.S. corporate sector. Military power in the cyber domain is projected through the civilian computer networks of US tech giants such as Google, Facebook, Verizon, and Apple. The cooperation or conscription of private U.S. networks for cyberwarfare attacks or defenses creates an extreme liability for these firms. US tech companies are top targets for suspicion and potential retaliation by enemy states.

The main proliferator of cyberwarfare capabilities to potential enemies of the United States is the boom in attendance by international students at US colleges. The State Department’s 2014 Open Doors Report on International Educational Exchange reported the number of international students studying at U.S. colleges grew since 2000 by 72% to 886,052. About 23% of international students worldwide now study in the US.

Over 315,000 or 35% of international college students in the U.S. are enrolled in science, technology, engineering, and mathematics (STEM). This compares to about 3.1 million or 28% of American-born college students with STEM majors. But unlike international students that overwhelmingly graduate in their major, 48% of American-born students drop STEM majors before graduation.

Forbes reported Chinese cyber-crooks are stealing secrets from leading US weapons systems manufacturers; Iran has invaded the operations of leading American banks to plant malicious viruses that could cause a debilitating financial crisis; and Russian hackers are breaking into the networks of US oil and gas companies to gain access to their industrial control systems.

Yet, 276,000 Chinese, 4,500 Russians, and 8,700 Iranians are legally enrolled as international students at US colleges. Some of these students will eventually return home armed with cyberweapons-of-mass-destruction they can deploy against America.

Clausewitz stressed three centuries ago that great military commanders are prepared to respond to incomplete, dubious, and often completely erroneous information coupled with high levels of fear, doubt, and excitement that he termed the “fog of war.”

Low cost cyberwarfare tools allow adversaries of the United States to inflict pain and instantly create the fog of war by attacking American computer networks. Since no nation on earth currently has the equipment and financial resources to win a conventional military war against America, cyberwar will be the primary existential threat to the peace and security of the United States in the twenty-first century.

Breitbart: http://bit.ly/1PncF6w

 

« Is The Password Dead?
Experts Make 2016 Cybersecurity Predictions »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Internet Security Alliance (ISA)

Internet Security Alliance (ISA)

ISA is an international trade association providing thought leadership in advancing a sustainable system of cyber security.

Genie Networks

Genie Networks

Genie Networks is a leading technology company providing networking and security solutions for optimizing the performance of large networks.

Atos

Atos

Atos provides a unique Cyber Security end to end solution with a data-centric and pre-emptive security approach.

CIRT.GY

CIRT.GY

CIRT-GY is the national Computer Incident Response Team for Guyana.

RedShield Security

RedShield Security

RedShield is the world's first web application shielding-with-a-service company.

NSIT

NSIT

NSIT SAS is a consulting, advisory and service provider in IT systems. Solution areas include networking & infrastructure, IT management & administration, and cyber security.

Elliptic

Elliptic

Elliptic solve the crucial problem of identity in cryptocurrencies, with the sole purpose of combating suspicious and criminal activity.

Aversafe

Aversafe

Aversafe provides individuals, employers and certificate issuers around the world with a first line of defense against credential fraud.

MCPc

MCPc

MCPc improves the security and well-being of our clients. We protect data, manage the complexity and sustainability of technology, empower employee performance, and ultimately reduce business risk.

Kontron

Kontron

Kontron offers a combined portfolio of secure hardware, middleware and services for Internet of Things (IoT) and Industry 4.0 applications.

Dataships

Dataships

We help companies automate their privacy compliance while building healthy, transparent data relationships with their customers.

Gunnison Consulting Group

Gunnison Consulting Group

Gunnison Consulting Group serves the Federal Government with high quality IT consulting services.

Surfshark

Surfshark

Surfshark is a cybersecurity company focused on developing humanized privacy & security protection solutions to secure people's digital lives.

Babble

Babble

Babble is a Unified Comms, Contact Centre and Cyber Solutions provider. We believe in making next-generation technology simple to use, deploy and manage.

Abacus Group

Abacus Group

Abacus Group is a global IT services firm for alternative investment firms, providing an enterprise technology platform specifically designed to meet the unique needs of financial services.

Piiano

Piiano

Piiano offers developer-friendly privacy and security products. Reduce risk and protect your data by using our specialized security and privacy SaaS tools.