The End Of The American Cyber Empire

American specialists in history and foreign policy love predicting the end of things.  The most famous example was Francis Fukuyama whose book the “End of History” was touted as showing the rather benign capitalist, democratic way forward following the fall of the Soviet Empire.  Unfortunately, no one told Osama Bin Laden, Vladimir Putin, Xi Jinping, etc., about it.  Or, at least, they weren’t paying attention in class in the few elite institutions which crank out US foreign policy “experts” who hope someday to sitting around negotiating tables in Paris talking grand political strategies – none of that ugly economic, cyber stuff for them.

In the fine tradition of such broad predictions, allow me to announce The End of the American Cyber Empire. As for evidence, I give you this week’s reveal that the Russians have penetrated just about every web link in America and Facebook/Google now under formal Federal investigation for malignant trade practices (with Amazon in the wings.)

For the first part, what can I say about the Russians?  As a spy, I say well done you.  You’ve have accomplished your goal of undermining the entire low intensity conflict “battlefield” of the American cyber system. 

As a U.S. citizen and taxpayer, I am outraged.  The good news is we have an initial job for the new National Cyber Director to figure out. 

The bad news – which is the real point here – is that tens of billions of dollars of security have been spent on cyber security public and private. Thousands of security personnel added. Bureaucracy like the new agency at DHS – The Cybersecurity and Infrastructure Security Agency (CISA) – with Security in the name twice.  Public/Private partnerships and other cliches of outreach. Massive changes in protocols and additional safety measures mandated and put in place. Innumerable warnings for other relatively smaller break ins were issues (Remember that little OMB one.) And we still get "skunked" – by what is reported to be an insider mistake.

Once again man triumphs over machine. And all our experts can do is say – well, we saw it coming and the Russians had a new way of doing it.  So, let me ask the question: what do we pay you guys for?

Meanwhile, three quarters of the bulwark of the new American Cyber Age (FANG) is now under federal scrutiny and legal action.  Facebook/Alphabet (Google)/Amazon – not Netflix which has escaped for now thanks to a heavily competitive market; though seeming unlimited resources – are all accused of stifling competition or unfair trading practices.

It’s not like they didn’t get warned either.  However, the hubris they have shown regarding the effectiveness of D.C. to do anything (save Amazon with a politically savvy Jeff Bezos at the helm) has been nothing less than breathtaking. 

 I am afraid Silicon Valley is going to discover an ancient truth that their Robber Baron ancestors also discovered – D.C. makes laws that you have to follow, taxes you have to pay, elected officials you have to answer to, and laws by the ton.  Oh yes, we have lawyers too.  An entire department filled with nothing but lawyers.  That you pay for with your tax money.  A Funny thing.  No borders nor boundaries is an illusion.  Welcome to the United States.

So where does this leave the incoming Biden Administration?  Well, worldwide we are declining in influence fast.  Our share of the world’s internet population is 280 million out of five billion users and the other nation state users are balkanizing fast regarding rules of the road like privacy and information “control.”  Our cyber security has proven to be say “flawed.”  And the major players in the first wave of App giants are monopolists which are going to be tough to breakup given their structure.

None of these issues is easily solved because they are wicked problems – the very people causing the problems are trying to solve the problem.  My condolences to the first National Cyber Director.  You have a nasty job on your hands.  We cannot rebuild the American Cyber Empire.  But we need to think hard about what is to replace it.

 Ronald Marks is Term Visiting Professor, George Mason University, Schar School of Policy and Government. He is President of ZPN Cyber & National Security Strategies

You Might Also Read:

The Rise and Fall Of America’s Unregulated Internet:

 

« Russian Hackers Have Stolen US Secrets
Tech Support Scams Steal Millions »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

GTB Technologies

GTB Technologies

GTB Technologies is a cyber security company that focuses on providing enterprise class data protection and data loss prevention solutions.

Antiy Labs

Antiy Labs

Antiy Labs is a vender of antivirus engine and solution, providing the best-in-breed antivirus engine and next generation antivirus services for confronting PC malware and mobile malware.

Lumen Technologies

Lumen Technologies

Lumen is an enterprise technology platform that enables companies to capitalize on emerging applications and power the 4th Industrial Revolution (4IR).

Austrian Trust Circle

Austrian Trust Circle

Austrian Trust Circle is an initiative of CERT.at and the Austrian Federal Chancellery and consists of Security Information Exchanges in the areas of the strategic information infrastructure.

Innovative Solutions (IS)

Innovative Solutions (IS)

Innovative Solutions is a specialized professional services company delivering Information Security products and solutions for Saudi Arabia and the Gulf region.

Cyber Struggle

Cyber Struggle

At Cyber Struggle, our aim is training and certifying the special forces of the cyber world.

KnectIQ

KnectIQ

Building Trust Environments in a Zero-Trust World. KnectIQ offers KIQAssure, an Ultra High Security Solution for Data in Flight.

Precursor Security

Precursor Security

Precursor Security are information security specialist, delivering all aspects of Security testing, Cyber Risk Management, and Continuous Security Testing.

Everything Blockchain

Everything Blockchain

Everything Blockchain offer solutions that transform enterprise data-management capabilities. Increased efficiency, super-charged performance and all with government grade security.

International Association of Financial Crimes Investigators (IAFCI)

International Association of Financial Crimes Investigators (IAFCI)

International Association of Financial Crimes Investigators provides services and information about financial fraud, fraud investigation and fraud prevention.

Network Coverage

Network Coverage

Network Coverage align, maintain, and integrate technology and cloud solutions with business operations to improve productivity and security with as few issues and disruptions as possible.

IDCARE

IDCARE

IDCARE is Australia and New Zealand’s national identity & cyber support service. Our service is the only one of its type in the world.

Applaudo

Applaudo

Applaudo specializes in helping the world’s most admired brands optimize their IT solutions, reduce delivery costs, and accelerate their digital transformation.

Cyber Castellum

Cyber Castellum

Cyber Castellum is a cybersecurity consulting firm that specializes in the identification of security vulnerabilities in an organization’s technology landscape.

Kali Linux

Kali Linux

Kali Linux is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing.

Point3 Security

Point3 Security

Point3 Security is a premier information security organization that provides the industry with the talent screening and analytical tools to enhance its workforce.