Next World War - First, Cyberwar. Second, Shooting War

1782bcb5ae89812117edec66f285e426.jpg

The reality of cyberwarfare is total war

Historically, wars are fought over territory or ideology, treasure or tradition, access or anger. When a war begins, the initial aggressor wants something, whether to own a critical path to the sea or strategic oil fields, or "merely" to cause damage and build support among certain constituencies.

At first, the defender defends and protects whatever has been attacked. Over time, however, the defender also seeks strategic benefit, to not only cause damage in return, but to gain footholds that will lead to an end to hostilities, a point of leverage for negotiation, or outright conquest.
Shooting wars are very expensive and very risky. Tremendous amounts of material must be produced and transported, soldiers and sailors must be put into harm's way, and incredible logistics and supply chain operations must be set up and managed on a nationwide (or multi-national level).

One of the big reasons the US won the Cold War (and scored highly in many of its other conflicts) is because it had the economic power to produce goods for war, whether capital ships or food for troops. An economically strong nation can invest in weapons R&D, creating a technological generation gap in terms of leverage and per-capita effectiveness compared to weaker nations.

But cyberwar can lay economic waste to a nation. Worse, the more technologically powerful a nation is, the more technologically dependent that nation becomes. Cyberwar can level the playing field, forcing highly connected nations to thrash, to jump at every digital shadow while attackers can co-opt the very resources of the defending nation to force-multiply their attacks.
Sony is still cleaning up after the hack that exposed many confidential aspects of its relationship with stars and producers. Target and Home Depot lost millions of credit cards.
The Snowden theft, while not the result of an outside hack, shows the economic cost of a national security breach: nearly $47 billion. Cyberwar can also cause damage to physical systems, ranging from electric power stations to smart automobiles.

And when a breach can steal deeply confidential information of a government's most trusted employees, nothing remains safe or secret. The US Office of Personnel Management was unwittingly funneling America's personnel data to its hackers for more than a year. We think China was responsible for the OPM hack. Despite the gargantuan nation's equally gargantuan investments in America (or, perhaps, because of them), China has been accused of many of the most effective and persistent penetrations perpetrated by any nation.

China is backing away from US tech brands for state purchases as NSA revelations continue to make headlines in newspapers all around the world.

Providing additional reason to worry, Russia and China have recently inked an agreement where they agreed to not launch cyberattacks against each other. They have also agreed to share cyberwarfare and cyber defense technology, creating an Asian axis of power that can split the world in half.On the other side of the geopolitical spectrum are the American NSA and British GCHQ, two organizations who share signals intelligence and are said to spy as much upon their own citizens as enemies of the state.

China, of course, supplies us with most of our computer gear. Every iPhone and every Android phone, nearly all our servers, laptop computers and routers have come from China. The same China that has been actively involved in breaching American interests at all levels.

In the center of all this is the main body of Europe, where the last two incendiary world wars were fostered and fought.
Nations fall when they are economically unstable. This time, Germany isn't the instigator of unrest, but instead finds itself caught in the middle, subject to spying by and active in spying on its allies, the only nearly super power of the EU.
An enemy (or even a supposed "friendly" nation) decides it needs the strategic upper hand. After years of breaches, it has deep access to nearly every powerful government and business figure in the United States. Blackmail provides access into command and control and financial systems.

Financial systems are hit and we suffer a recession worse than the Great Recession of 2008-2009. Our budget for just about everything (as well as our will) craters. Industrial systems (especially those that might post a physical or economic threat to our attacker) are hit next. They are shut down or damaged in the way Stuxnet took out centrifuges in Iran.

The former NSA contractor turned whistleblower Edward Snowden said during a Reddit question-and-answer session that the leaks have also improved security and encryption in Silicon Valley.
Every step America takes to respond is anticipated by the enemy, because the enemy has a direct pipeline to every important piece of communication America produces, and that's because the enemy has stolen enough information to corrupt an army of Snowdens.

While this is all going on, the American public is blissfully in the dark. Citizens just get angrier at their leadership for allowing a recession to take hold, and for allowing more and more foreigners to take American jobs.
Europe, which has always relied on America to keep it propped-up in the worst of times, will be on its own. Russia will press in from the north-east. ISIS will continue to explode in the Middle East. China will keep up its careful dance as it grows into the world's leading economic power.

India, second in size only to China and a technological hotbed itself, remains a wild card, physically surrounded by Europe, the Middle East, China, and Russia. India continues to live in conflict with Pakistan, and with Pakistan both unstable and nuclear-tipped, Indo-Pak, too, is on the precipice.

A world war is about huge nations spanning huge geographic territories fighting to rewrite the map of world power. Russia, China, ISIS (which calls itself the Islamic State), India, Pakistan, the US, the UK, and all of the strong and weak members of the EU: we certainly have the cast of characters for another global conflict.
Ein News: http://bit.ly/1GChN2d

« 4 News Apps that Will Change Everything
Naresh Singh : Freelance Ethical Hacker »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

RSA Insurance Group

RSA Insurance Group

RSA is one of the world’s leading multinational quoted insurance groups. Commercial services include cyber risk insurance.

Cleafy

Cleafy

Cleafy protects web and mobile applications from tampering attempts and deploys countermeasures to guarantee data and content integrity at scale.

ESTsoft

ESTsoft

ESTsoft Securedisk is an enterprise-wide file security solution that stores and manages all data in a central file server.

SKKU Security Lab (seclab)

SKKU Security Lab (seclab)

SKKU Security Lab supports research and education in information security engineering. The lab is a part of the College of Software, Sungkyunkwan University.

Viscount Systems

Viscount Systems

Viscount Systems is a global security software solutions company that is changing the way access control is deployed and managed in the enterprise.

th4ts3cur1ty.company

th4ts3cur1ty.company

th4ts3cur1ty.company specialize in delivering intelligence lead adversary emulation purple teaming & the bespoke building of Security Operation Centers.

Africa ICS Cyber Security Conference

Africa ICS Cyber Security Conference

Africa's largest ICS Cyber Security Conference and Expo. The only platform that will proudly present top level B2B and B2C networking opportunities.

Visible Statement

Visible Statement

Visible Statement is a computer-based delivery system designed to insure the retention and recall of your most important security training messages.

Lifetech

Lifetech

Lifetech is a software development, product engineering and system integration company. Cybersecurity services include SIEM deployment and training.

Deft

Deft

Deft (formerly ServerCentral Turing Group) is a trusted provider of colocation, cloud, and disaster recovery services.

BugDazz

BugDazz

BugDazz pentest as a service (PTaaS) platform helps bringing in real-time results, detail coverage, & easy remediation workflows with compliance-ready reports.

Sparrow

Sparrow

Sparrow specializes in application security testing solutions to cope with new technology trends such as cloud, mobile, and DevSecOps.

Team Secure

Team Secure

Team Secure provide Enterprise-grade Cyber Security consultancy, managed security services and cyber security staffing services.

Bright Security

Bright Security

Bright Security is a developer-centric Dynamic Application Security Testing (DAST) solution that helps organizations ship secure applications and APIs quickly and cost-effectively.

The IoT Academy

The IoT Academy

The IoT Academy is a reputed Ed-Tech Institute that provides training in emerging technologies such as embedded systems, the Internet of Things (IoT), Data Science and many more.

PureSquare

PureSquare

PureSquare exist to empower people with simple solutions for their increasingly complex digital security & online privacy needs.