The Future Of War is Cyber

Gone are the days where battles are fought in person-to-person conflicts. In the coming years, most wars will be waged via computers, servers, and digital weapons. The question is, is the United States prepared for the future?

Military battles have evolved a tremendous amount over the years – most of it due to advances in weaponry and technology. In early centuries, wars were fought with hands, fists, sticks, and stones. You had to be close to your enemy to kill. As weapons become more advanced, things like slingshots, bow and arrows, and catapults gave armies the opportunity to attack from a small distance.

The first guns allowed for mass killing at a distance, though single-shot rifles were inefficient and time-consuming to use. As automatic guns and long-distance rifles entered the picture, it became possible for battles to be waged at distances. As airplanes, helicopters, and long-range missiles emerged, battles became even more sophisticated.

Today, we stand on the precipice of new warfare. No longer is it necessary for people or weapons to be present. Battles of the future won’t be fought on the ground or sea, or even in the air. They’ll be waged behind computers and servers.

As warfare evolves, two terms seem to get thrown around more than most: electronic warfare and cyber warfare. And while related, these two ideas aren’t the same.

“Electronic warfare includes military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy,” security expert Eric Chabrow writes. 

“Cyber warfare involves crippling adversaries through information systems and the Internet. Electronic warfare and cyberspace operations are complementary and have potentially synergistic effects.”

Nations like Russia and China appear well-equipped for this new way of war. The United States, while not totally outmatched, certainly has room for growth.

How the United States stacks up
With all of the whiz kids in Silicon Valley and billion-dollar think tanks in Washington, it would be a safe assumption that the United States is well-prepared to handle sophisticated cyber-attacks and electronic warfare. But this isn’t necessarily true. 
As of right now, the US isn’t fully prepared to ward off attacks from nations like Russia, China, Iran, and North Korea. As recent events have shown, America is actually quite vulnerable.

While some of America’s foes have had opportunities to test their cyber capabilities, the US hasn’t had the same chances. Even when these chances emerge, there are questions about how the government will handle them.

“Complicating the ability to hit back nimbly are strict policies on how the US is willing to conduct digital warfare,” writes Paul D. Shinkman, Senior National Security Writer for US News & World Report. 

“There are hard-line and at times overly dense barriers between cyber operators cleared to carry out the government’s business and those who aren’t, even though the latter often find themselves inadvertently at the front lines of digital warfare.”

The fear is that other nations are gathering valuable real-world experience, while the United States is doing nothing more than accumulating theoretical ideas and knowledge. Nations like Russia and North Korea presumably unleash multiple large-scale attacks per year. 

This gives them an understanding of how different strategies and technologies work in action. On the home front, there’s very little confidence in the application and reliability of cyber and electronic warfare techniques.  There are also glaring issues on the cyber defense front.

“The dilemma is as wide as it is deep,” Lt. Col. Michael Myers of the US Joint  Forces Staff College writes. 

“The majority of the nation’s CI is privately owned and operated. This leaves assessment, oversight and compliance enforcement a challenge for the federal government. Some CI sectors may be more inclined to share with DHS (and the public) their cyber shortcomings than others.”

NextWeb:

You Might Also Read:

US Vs. China - A Different Kind of Cyberwar:

« Cyber Attacks On Critical Infrastructure – A New Frontier In Global Conflict
Millions Of Secret Bank Records Leak Online »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Industrial Cyber Security

Industrial Cyber Security

Industrial Cyber Security provides specialist consulting services in enterprise and SCADA system security.

Team8

Team8

Team8 is Israel’s most prestigious cybersecurity think tank and venture creation foundry.

PrimeKey

PrimeKey

PrimeKey provides organisations with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.

Bechtel

Bechtel

Bechtel’s Industrial Control Systems Cyber Security Laboratory focuses on protecting large-scale industrial and infrastructure systems that support critical infrastructure.

Cryptovision

Cryptovision

Cryptovision GmbH is one of the leading specialists for modern, user-friendly cryptography and solutions for secure electronic identities.

Strategic Cyber Ventures (SCV)

Strategic Cyber Ventures (SCV)

SCV grow cybersecurity companies that disrupt advanced cyber adversaries and revolutionize the cyber product marketplace.

Cryptika

Cryptika

Cryptika is a fully integrated IT security and managed services provider, specialized in Next-Generation Cyber Security Technologies.

ForAllSecure

ForAllSecure

ForAllSecure’s mission is to make the world’s software safe by pioneering autonomous cybersecurity tools that automatically find and fix vulnerabilities in run-time executable software.

Acceptto

Acceptto

Acceptto offers the first unified and continuous authentication identity access platform with No-Password.

SecureStrux

SecureStrux

SecureStrux are a cybersecurity consulting firm providing specialized services in the areas of compliance, vulnerability assessment, computer network defense, and cybersecurity strategies.

RealTyme

RealTyme

RealTyme is a secure communication and collaboration platform with privacy and human experience at its core.

Cyber Tzar

Cyber Tzar

Cyber Tzar is a new approach at dealing with an old problem; assessing and managing risks to your IT estate.

Wadilona Cyber Securities

Wadilona Cyber Securities

Wadilona Cyber Securities' sole aim is to bring and secure Information and Communications Technology (ICT) to and work for humans in its simplest terms.

coc00n

coc00n

coc00n secures the devices of high-value and high-interest individuals against cyber attacks.

Cyex

Cyex

Cyex helps people to become cyber wise. We enable our clients to find, track and improve cyber awareness in one place.

ArmorX AI

ArmorX AI

ArmorX AI (formerly Kapalya) operates an encryption management platform designed to encrypt all data in transit and at rest on mobile end-points, corporate servers, and cloud servers.