The Future Of War is Cyber

Gone are the days where battles are fought in person-to-person conflicts. In the coming years, most wars will be waged via computers, servers, and digital weapons. The question is, is the United States prepared for the future?

Military battles have evolved a tremendous amount over the years – most of it due to advances in weaponry and technology. In early centuries, wars were fought with hands, fists, sticks, and stones. You had to be close to your enemy to kill. As weapons become more advanced, things like slingshots, bow and arrows, and catapults gave armies the opportunity to attack from a small distance.

The first guns allowed for mass killing at a distance, though single-shot rifles were inefficient and time-consuming to use. As automatic guns and long-distance rifles entered the picture, it became possible for battles to be waged at distances. As airplanes, helicopters, and long-range missiles emerged, battles became even more sophisticated.

Today, we stand on the precipice of new warfare. No longer is it necessary for people or weapons to be present. Battles of the future won’t be fought on the ground or sea, or even in the air. They’ll be waged behind computers and servers.

As warfare evolves, two terms seem to get thrown around more than most: electronic warfare and cyber warfare. And while related, these two ideas aren’t the same.

“Electronic warfare includes military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy,” security expert Eric Chabrow writes. 

“Cyber warfare involves crippling adversaries through information systems and the Internet. Electronic warfare and cyberspace operations are complementary and have potentially synergistic effects.”

Nations like Russia and China appear well-equipped for this new way of war. The United States, while not totally outmatched, certainly has room for growth.

How the United States stacks up
With all of the whiz kids in Silicon Valley and billion-dollar think tanks in Washington, it would be a safe assumption that the United States is well-prepared to handle sophisticated cyber-attacks and electronic warfare. But this isn’t necessarily true. 
As of right now, the US isn’t fully prepared to ward off attacks from nations like Russia, China, Iran, and North Korea. As recent events have shown, America is actually quite vulnerable.

While some of America’s foes have had opportunities to test their cyber capabilities, the US hasn’t had the same chances. Even when these chances emerge, there are questions about how the government will handle them.

“Complicating the ability to hit back nimbly are strict policies on how the US is willing to conduct digital warfare,” writes Paul D. Shinkman, Senior National Security Writer for US News & World Report. 

“There are hard-line and at times overly dense barriers between cyber operators cleared to carry out the government’s business and those who aren’t, even though the latter often find themselves inadvertently at the front lines of digital warfare.”

The fear is that other nations are gathering valuable real-world experience, while the United States is doing nothing more than accumulating theoretical ideas and knowledge. Nations like Russia and North Korea presumably unleash multiple large-scale attacks per year. 

This gives them an understanding of how different strategies and technologies work in action. On the home front, there’s very little confidence in the application and reliability of cyber and electronic warfare techniques.  There are also glaring issues on the cyber defense front.

“The dilemma is as wide as it is deep,” Lt. Col. Michael Myers of the US Joint  Forces Staff College writes. 

“The majority of the nation’s CI is privately owned and operated. This leaves assessment, oversight and compliance enforcement a challenge for the federal government. Some CI sectors may be more inclined to share with DHS (and the public) their cyber shortcomings than others.”

NextWeb:

You Might Also Read:

US Vs. China - A Different Kind of Cyberwar:

« Cyber Attacks On Critical Infrastructure – A New Frontier In Global Conflict
Millions Of Secret Bank Records Leak Online »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: Learn how SOAR helps you streamline security

ON-DEMAND WEBINAR: Learn how SOAR helps you streamline security

Watch this webinar to explore the Security orchestration, automation, and response (SOAR) paradigm, its relationship with organization IT practices, and its role in your security strategy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Chertoff Group

Chertoff Group

The Chertoff Group provide security advice and risk management services covering cyber security, insider threat, physical security and asset protection.

Mocana

Mocana

Mocana provides a software platform that allows you to develop, test and distribute more secure IoT devices and services.

ControlScan

ControlScan

ControlScan is a Managed Security Services Provider (MSSP) - our primary focus is protecting your business and securing your sensitive data.

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

Robert Bosch Centre for Cyber-Physical Systems (RBCCPS)

Robert Bosch Centre for Cyber-Physical Systems (RBCCPS)

RBCCPS is an interdisciplinary research and academic centre within the Indian Institute of Science focused on research in cyber-physical systems.

Canadian Security Intelligence Service (CSIS)

Canadian Security Intelligence Service (CSIS)

CSIS collects and analyzes threat-related information concerning the security of Canada in areas including terrorism, espionage, WMD, cybersecurity and critical infrastructure protection.

PECB

PECB

PECB is a certification body for persons, management systems, and products on a wide range of international standards in a range of areas including Information Security and Risk Management.

Waratek

Waratek

Waratek is a pioneer in the next generation of application security solutions known as Runtime Application Self-Protection or RASP.

Watchdata Technologies

Watchdata Technologies

Watchdata Technologies is a pioneer in digital authentication and transaction security.

Blueskytec (BST)

Blueskytec (BST)

BST provide accredited, patent-pending commercial cyber security hardware and software to protect your cyber physical systems from attack.

BlockSafe Technologies

BlockSafe Technologies

BlockSafe Technologies is the only US-based company that secures the blockchain ecosystem from all angles: wallets, exchanges, and private blockchains.

Resistant AI

Resistant AI

Resistant AI protects against evolving online fraud. We connect the dots to provide a new layer of trust and performance for our clients’ systems.

Cythereal

Cythereal

Cythereal is the leader in predicting and preventing advanced malware attacks. Security Automation for the Overwhelmed Administrator.

CyberArmor

CyberArmor

Cyber Armor defend everyday IT and OT systems, from government agencies to critical infrastructure, from system integrators to small industries.

Armo

Armo

Armo technology enhances any Kubernetes deployment with security, visibility, and control from the CI/CD pipeline through production.

Kingston Technology

Kingston Technology

Kingston is a leading global manufacturer of memory and storage solutions including encrypted storage solutions to protect data inside and outside the firewall.