The End Of The American Cyber Empire

American specialists in history and foreign policy love predicting the end of things.  The most famous example was Francis Fukuyama whose book the “End of History” was touted as showing the rather benign capitalist, democratic way forward following the fall of the Soviet Empire.  Unfortunately, no one told Osama Bin Laden, Vladimir Putin, Xi Jinping, etc., about it.  Or, at least, they weren’t paying attention in class in the few elite institutions which crank out US foreign policy “experts” who hope someday to sitting around negotiating tables in Paris talking grand political strategies – none of that ugly economic, cyber stuff for them.

In the fine tradition of such broad predictions, allow me to announce The End of the American Cyber Empire. As for evidence, I give you this week’s reveal that the Russians have penetrated just about every web link in America and Facebook/Google now under formal Federal investigation for malignant trade practices (with Amazon in the wings.)

For the first part, what can I say about the Russians?  As a spy, I say well done you.  You’ve have accomplished your goal of undermining the entire low intensity conflict “battlefield” of the American cyber system. 

As a U.S. citizen and taxpayer, I am outraged.  The good news is we have an initial job for the new National Cyber Director to figure out. 

The bad news – which is the real point here – is that tens of billions of dollars of security have been spent on cyber security public and private. Thousands of security personnel added. Bureaucracy like the new agency at DHS – The Cybersecurity and Infrastructure Security Agency (CISA) – with Security in the name twice.  Public/Private partnerships and other cliches of outreach. Massive changes in protocols and additional safety measures mandated and put in place. Innumerable warnings for other relatively smaller break ins were issues (Remember that little OMB one.) And we still get "skunked" – by what is reported to be an insider mistake.

Once again man triumphs over machine. And all our experts can do is say – well, we saw it coming and the Russians had a new way of doing it.  So, let me ask the question: what do we pay you guys for?

Meanwhile, three quarters of the bulwark of the new American Cyber Age (FANG) is now under federal scrutiny and legal action.  Facebook/Alphabet (Google)/Amazon – not Netflix which has escaped for now thanks to a heavily competitive market; though seeming unlimited resources – are all accused of stifling competition or unfair trading practices.

It’s not like they didn’t get warned either.  However, the hubris they have shown regarding the effectiveness of D.C. to do anything (save Amazon with a politically savvy Jeff Bezos at the helm) has been nothing less than breathtaking. 

 I am afraid Silicon Valley is going to discover an ancient truth that their Robber Baron ancestors also discovered – D.C. makes laws that you have to follow, taxes you have to pay, elected officials you have to answer to, and laws by the ton.  Oh yes, we have lawyers too.  An entire department filled with nothing but lawyers.  That you pay for with your tax money.  A Funny thing.  No borders nor boundaries is an illusion.  Welcome to the United States.

So where does this leave the incoming Biden Administration?  Well, worldwide we are declining in influence fast.  Our share of the world’s internet population is 280 million out of five billion users and the other nation state users are balkanizing fast regarding rules of the road like privacy and information “control.”  Our cyber security has proven to be say “flawed.”  And the major players in the first wave of App giants are monopolists which are going to be tough to breakup given their structure.

None of these issues is easily solved because they are wicked problems – the very people causing the problems are trying to solve the problem.  My condolences to the first National Cyber Director.  You have a nasty job on your hands.  We cannot rebuild the American Cyber Empire.  But we need to think hard about what is to replace it.

 Ronald Marks is Term Visiting Professor, George Mason University, Schar School of Policy and Government. He is President of ZPN Cyber & National Security Strategies

You Might Also Read:

The Rise and Fall Of America’s Unregulated Internet:

 

« Russian Hackers Have Stolen US Secrets
Tech Support Scams Steal Millions »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Navista

Navista

Navista's hardware and software modules are especially designed to ease the deployment of secure networks.

ManTech International

ManTech International

ManTech provides comprehensive, integrated cyber security support, which includes computer and network design, implementation, and operations.

PlainID

PlainID

PlainID provides IAM teams with a simple and intuitive means to control their organization’s entire authorization process.

National Cyber and Information Security Agency (NUKIB) - Czech Republic

National Cyber and Information Security Agency (NUKIB) - Czech Republic

NUKIB is the central Czech government body for cyber security, the protection of classified information in the area of information and communication systems and cryptographic protection.

Hacker House

Hacker House

Hacker House teaches you what hackers can learn about your business and systems so that preventative solutions to protect your assets can be applied through active measures.

Maximus Consulting (MX)

Maximus Consulting (MX)

Maximus designs and delivers corporate-wide information security management system with our full-time IRCA Accredited consulting team.

Trustonic

Trustonic

Trustonic is a leader in the device security market. Our mission is to protect apps, secure devices & enable trust.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CyberSec Hub

CyberSec Hub

The goal of CyberSec Hub is to create a centre of excellence for cybersecurity in Krakow, a new European “Cyber-Silicon Valley”.

Thridwayv

Thridwayv

Thirdwayv helps your enterprise realize the full potential of loT connectivity. All while neutralizing security threats that can run ruin the customer experience - and your reputation.

Delfigo Security

Delfigo Security

Delfigo Security, a pioneer in intelligent authentication, provides a strong, multi-factor authentication solution to prevent identity theft and reduce fraud.

NexGenT

NexGenT

NexGenT have combined military-style training with decades of network engineering and cyber security experience into an immersive program to get people into cyber security fast and effectively.

Netstar

Netstar

Netstar is an IT Support company based in Central London providing fully managed IT Support, Cyber Security and Technology Consulting services.

Cyber Insurance Academy

Cyber Insurance Academy

Cyber Insurance Academy was founded to provide insurance professionals with the knowledge needed to work in cyber-insurance and cyber-related insurance fields.

Dope Security

Dope Security

Dope Security is a fly-direct Secure Web Gateway that eliminates the data center stopover architecture required by legacy providers, instead performing security directly on the endpoint.

Cranium

Cranium

Cranium are an international consultancy organisation specialised in privacy, security and data management.