The End Of The American Cyber Empire

American specialists in history and foreign policy love predicting the end of things.  The most famous example was Francis Fukuyama whose book the “End of History” was touted as showing the rather benign capitalist, democratic way forward following the fall of the Soviet Empire.  Unfortunately, no one told Osama Bin Laden, Vladimir Putin, Xi Jinping, etc., about it.  Or, at least, they weren’t paying attention in class in the few elite institutions which crank out US foreign policy “experts” who hope someday to sitting around negotiating tables in Paris talking grand political strategies – none of that ugly economic, cyber stuff for them.

In the fine tradition of such broad predictions, allow me to announce The End of the American Cyber Empire. As for evidence, I give you this week’s reveal that the Russians have penetrated just about every web link in America and Facebook/Google now under formal Federal investigation for malignant trade practices (with Amazon in the wings.)

For the first part, what can I say about the Russians?  As a spy, I say well done you.  You’ve have accomplished your goal of undermining the entire low intensity conflict “battlefield” of the American cyber system. 

As a U.S. citizen and taxpayer, I am outraged.  The good news is we have an initial job for the new National Cyber Director to figure out. 

The bad news – which is the real point here – is that tens of billions of dollars of security have been spent on cyber security public and private. Thousands of security personnel added. Bureaucracy like the new agency at DHS – The Cybersecurity and Infrastructure Security Agency (CISA) – with Security in the name twice.  Public/Private partnerships and other cliches of outreach. Massive changes in protocols and additional safety measures mandated and put in place. Innumerable warnings for other relatively smaller break ins were issues (Remember that little OMB one.) And we still get "skunked" – by what is reported to be an insider mistake.

Once again man triumphs over machine. And all our experts can do is say – well, we saw it coming and the Russians had a new way of doing it.  So, let me ask the question: what do we pay you guys for?

Meanwhile, three quarters of the bulwark of the new American Cyber Age (FANG) is now under federal scrutiny and legal action.  Facebook/Alphabet (Google)/Amazon – not Netflix which has escaped for now thanks to a heavily competitive market; though seeming unlimited resources – are all accused of stifling competition or unfair trading practices.

It’s not like they didn’t get warned either.  However, the hubris they have shown regarding the effectiveness of D.C. to do anything (save Amazon with a politically savvy Jeff Bezos at the helm) has been nothing less than breathtaking. 

 I am afraid Silicon Valley is going to discover an ancient truth that their Robber Baron ancestors also discovered – D.C. makes laws that you have to follow, taxes you have to pay, elected officials you have to answer to, and laws by the ton.  Oh yes, we have lawyers too.  An entire department filled with nothing but lawyers.  That you pay for with your tax money.  A Funny thing.  No borders nor boundaries is an illusion.  Welcome to the United States.

So where does this leave the incoming Biden Administration?  Well, worldwide we are declining in influence fast.  Our share of the world’s internet population is 280 million out of five billion users and the other nation state users are balkanizing fast regarding rules of the road like privacy and information “control.”  Our cyber security has proven to be say “flawed.”  And the major players in the first wave of App giants are monopolists which are going to be tough to breakup given their structure.

None of these issues is easily solved because they are wicked problems – the very people causing the problems are trying to solve the problem.  My condolences to the first National Cyber Director.  You have a nasty job on your hands.  We cannot rebuild the American Cyber Empire.  But we need to think hard about what is to replace it.

 Ronald Marks is Term Visiting Professor, George Mason University, Schar School of Policy and Government. He is President of ZPN Cyber & National Security Strategies

You Might Also Read:

The Rise and Fall Of America’s Unregulated Internet:

 

« Russian Hackers Have Stolen US Secrets
Tech Support Scams Steal Millions »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Mimecast

Mimecast

Mimecast delivers cloud-based email management for Microsoft Exchange and Microsoft Office 365 including archiving, continuity and security.

Hyve

Hyve

Hyve provide a wide range of managed web hosting services including private, hybrid and public VMware cloud hosting.

Guardtime

Guardtime

Guardtime's Black Lantern platform provides real-time cybersecurity and data-centric asset protection.

Avanan

Avanan

Avanan is The Cloud Security Platform. Protect all your SaaS applications using tools from over 60 industry-leading vendors in just one click.

Claroty

Claroty

Claroty was conceived to secure and optimize OT networks that run the world’s most critical infrastructures.

Secret Double Octopus

Secret Double Octopus

Secret Double Octopus offers the world’s only keyless multi-shield authentication technology for users and things.

TokenOne

TokenOne

TokenOne is a Cyber Security software company that makes it easy to replace passwords, tokens and other forms of authentication with a more secure solution.

RunSafe Security

RunSafe Security

RunSafe Security is the pioneer of a patented cyberhardening transformation process designed to disrupt attackers and protect vulnerable embedded systems and devices.

First Point Group (FPG)

First Point Group (FPG)

First Point Group provide a global technological recruitment service worldwide. Within that we have a specialist team of Cyber Security recruiters.

Field Effect Software

Field Effect Software

Field Effect Software build sophisticated and integrated IT security, threat surface reduction, training and simulation capabilities for enterprises and small businesses.

Genius Guard

Genius Guard

Genius Guard specializes in DDoS Protection, DDoS Protected Webhosting, HYIP Hosting, Bitcoin Hosting, Cryptocurrency Hosting.

SafeCipher

SafeCipher

At SafeCipher, we pride ourselves on being your single vendor-neutral resource for navigating the complexities of cryptographic data encryption.

Stealth Software Technologies

Stealth Software Technologies

Stealth Software Technologies is focused on the generation of research and software products focused on applied cryptography and cybersecurity.

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries is America’s largest military shipbuilding company and a provider of professional services to partners in government and industry.

Wabbi

Wabbi

Wabbi’s continuous security platform centralizes, automates and orchestrates security governance and vulnerability management to empower development teams to own appsec.

Afripol

Afripol

AFRIPOL was set up to strengthen cooperation between the police agencies of AU member states in the prevention and fight against organized transnational crime, terrorism, and cybercrime.