The Future Of War is Cyber

Gone are the days where battles are fought in person-to-person conflicts. In the coming years, most wars will be waged via computers, servers, and digital weapons. The question is, is the United States prepared for the future?

Military battles have evolved a tremendous amount over the years – most of it due to advances in weaponry and technology. In early centuries, wars were fought with hands, fists, sticks, and stones. You had to be close to your enemy to kill. As weapons become more advanced, things like slingshots, bow and arrows, and catapults gave armies the opportunity to attack from a small distance.

The first guns allowed for mass killing at a distance, though single-shot rifles were inefficient and time-consuming to use. As automatic guns and long-distance rifles entered the picture, it became possible for battles to be waged at distances. As airplanes, helicopters, and long-range missiles emerged, battles became even more sophisticated.

Today, we stand on the precipice of new warfare. No longer is it necessary for people or weapons to be present. Battles of the future won’t be fought on the ground or sea, or even in the air. They’ll be waged behind computers and servers.

As warfare evolves, two terms seem to get thrown around more than most: electronic warfare and cyber warfare. And while related, these two ideas aren’t the same.

“Electronic warfare includes military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy,” security expert Eric Chabrow writes. 

“Cyber warfare involves crippling adversaries through information systems and the Internet. Electronic warfare and cyberspace operations are complementary and have potentially synergistic effects.”

Nations like Russia and China appear well-equipped for this new way of war. The United States, while not totally outmatched, certainly has room for growth.

How the United States stacks up
With all of the whiz kids in Silicon Valley and billion-dollar think tanks in Washington, it would be a safe assumption that the United States is well-prepared to handle sophisticated cyber-attacks and electronic warfare. But this isn’t necessarily true. 
As of right now, the US isn’t fully prepared to ward off attacks from nations like Russia, China, Iran, and North Korea. As recent events have shown, America is actually quite vulnerable.

While some of America’s foes have had opportunities to test their cyber capabilities, the US hasn’t had the same chances. Even when these chances emerge, there are questions about how the government will handle them.

“Complicating the ability to hit back nimbly are strict policies on how the US is willing to conduct digital warfare,” writes Paul D. Shinkman, Senior National Security Writer for US News & World Report. 

“There are hard-line and at times overly dense barriers between cyber operators cleared to carry out the government’s business and those who aren’t, even though the latter often find themselves inadvertently at the front lines of digital warfare.”

The fear is that other nations are gathering valuable real-world experience, while the United States is doing nothing more than accumulating theoretical ideas and knowledge. Nations like Russia and North Korea presumably unleash multiple large-scale attacks per year. 

This gives them an understanding of how different strategies and technologies work in action. On the home front, there’s very little confidence in the application and reliability of cyber and electronic warfare techniques.  There are also glaring issues on the cyber defense front.

“The dilemma is as wide as it is deep,” Lt. Col. Michael Myers of the US Joint  Forces Staff College writes. 

“The majority of the nation’s CI is privately owned and operated. This leaves assessment, oversight and compliance enforcement a challenge for the federal government. Some CI sectors may be more inclined to share with DHS (and the public) their cyber shortcomings than others.”

NextWeb:

You Might Also Read:

US Vs. China - A Different Kind of Cyberwar:

« Cyber Attacks On Critical Infrastructure – A New Frontier In Global Conflict
Millions Of Secret Bank Records Leak Online »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Censornet

Censornet

Censornet's autonomous, integrated cloud security gives mid-market organisations the confidence and control of enterprise-grade cyber protection.

Swiss Re

Swiss Re

Swiss Re Group is a leading wholesale provider of reinsurance, insurance and other insurance-based forms of risk transfer including cyber risk.

Digitronic Computersysteme

Digitronic Computersysteme

Digitronic focus on innovative software to protect your personal and sensitive corporate data.

Applied Risk

Applied Risk

Applied Risk is an established leader in Industrial Control Systems security, focused on critical infrastructure security and combating security breaches that pose a significant threat.

Seqrite

Seqrite

Seqrite offers a highly advanced range of enterprise and IT security solutions to protect your organization's most critical data.

Digital Resolve

Digital Resolve

Digital Resolve delivers solutions that help companies maintain trust and confidence through proven and cost-effective fraud-protection and identity intelligence technology.

CNA Insurance

CNA Insurance

CNA offers a market-leading suite of cyber liability insurance products and risk control resources for businesses of all sizes.

SterlingRisk Programs

SterlingRisk Programs

SterlingRisk’s Cyber practice brings experience working with a wide array of clients across a broad spectrum of industries.

Evalian

Evalian

Evalian is a data protection services provider. Working with organisations of all sizes, we specialise in Data Protection, GDPR, ISO Certification & Information Security.

Illuma Labs

Illuma Labs

Illuma Labs delivers real-time voice authentication and fraud prevention solutions.

CyberUSA

CyberUSA

CyberUSA is a collaboration of leaders and states focused on a common mission purpose of enabling innovation, education, workforce development, enhanced cyber readiness and resilience.

Ridge Security

Ridge Security

Ridge Security enables enterprise and web application teams, ISVs, governments, education, DevOps, anyone responsible for ensuring software security to affordably and efficiently test their systems.

Kompleye

Kompleye

Kompleye is a recognized cybersecurity and compliance audit organization that offer a comprehensive solution for different industries.

Pistachio

Pistachio

Pistachio is the new evolution of cybersecurity awareness training and attack simulations.

CYTUR

CYTUR

CYTUR provide trusted and secured maritime cybersecurity solutions to keep ships safe, protecting them, their crews, cargo and all stakeholders from maritime cyber threats.

Downdetector

Downdetector

Downdetector helps people all over the world understand disruptions to vital services such as the internet, social media, web hosting platforms, banks, games, entertainment, and more.