The Future Of War is Cyber

Gone are the days where battles are fought in person-to-person conflicts. In the coming years, most wars will be waged via computers, servers, and digital weapons. The question is, is the United States prepared for the future?

Military battles have evolved a tremendous amount over the years – most of it due to advances in weaponry and technology. In early centuries, wars were fought with hands, fists, sticks, and stones. You had to be close to your enemy to kill. As weapons become more advanced, things like slingshots, bow and arrows, and catapults gave armies the opportunity to attack from a small distance.

The first guns allowed for mass killing at a distance, though single-shot rifles were inefficient and time-consuming to use. As automatic guns and long-distance rifles entered the picture, it became possible for battles to be waged at distances. As airplanes, helicopters, and long-range missiles emerged, battles became even more sophisticated.

Today, we stand on the precipice of new warfare. No longer is it necessary for people or weapons to be present. Battles of the future won’t be fought on the ground or sea, or even in the air. They’ll be waged behind computers and servers.

As warfare evolves, two terms seem to get thrown around more than most: electronic warfare and cyber warfare. And while related, these two ideas aren’t the same.

“Electronic warfare includes military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy,” security expert Eric Chabrow writes. 

“Cyber warfare involves crippling adversaries through information systems and the Internet. Electronic warfare and cyberspace operations are complementary and have potentially synergistic effects.”

Nations like Russia and China appear well-equipped for this new way of war. The United States, while not totally outmatched, certainly has room for growth.

How the United States stacks up
With all of the whiz kids in Silicon Valley and billion-dollar think tanks in Washington, it would be a safe assumption that the United States is well-prepared to handle sophisticated cyber-attacks and electronic warfare. But this isn’t necessarily true. 
As of right now, the US isn’t fully prepared to ward off attacks from nations like Russia, China, Iran, and North Korea. As recent events have shown, America is actually quite vulnerable.

While some of America’s foes have had opportunities to test their cyber capabilities, the US hasn’t had the same chances. Even when these chances emerge, there are questions about how the government will handle them.

“Complicating the ability to hit back nimbly are strict policies on how the US is willing to conduct digital warfare,” writes Paul D. Shinkman, Senior National Security Writer for US News & World Report. 

“There are hard-line and at times overly dense barriers between cyber operators cleared to carry out the government’s business and those who aren’t, even though the latter often find themselves inadvertently at the front lines of digital warfare.”

The fear is that other nations are gathering valuable real-world experience, while the United States is doing nothing more than accumulating theoretical ideas and knowledge. Nations like Russia and North Korea presumably unleash multiple large-scale attacks per year. 

This gives them an understanding of how different strategies and technologies work in action. On the home front, there’s very little confidence in the application and reliability of cyber and electronic warfare techniques.  There are also glaring issues on the cyber defense front.

“The dilemma is as wide as it is deep,” Lt. Col. Michael Myers of the US Joint  Forces Staff College writes. 

“The majority of the nation’s CI is privately owned and operated. This leaves assessment, oversight and compliance enforcement a challenge for the federal government. Some CI sectors may be more inclined to share with DHS (and the public) their cyber shortcomings than others.”

NextWeb:

You Might Also Read:

US Vs. China - A Different Kind of Cyberwar:

« Cyber Attacks On Critical Infrastructure – A New Frontier In Global Conflict
Millions Of Secret Bank Records Leak Online »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

UK Cyber Week Expo & Conference

UK Cyber Week Expo & Conference

Award-winning event organiser ROAR B2B announces the launch of UK Cyber Week and its inaugural event on 4 and 5 April 2023 at the Business Design Centre, London.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

Join this webinar to learn how the cloud threat landscape is evolving and organizations are deploying more advanced and capable security controls at scale.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

OIC-CERT

OIC-CERT

OIC-CERT is the Computer Emergency Response Team for Organisation of Islamic Cooperation (OIC) member countries.

e-Governance Academy (eGA)

e-Governance Academy (eGA)

eGA is a think tank and consultancy founded for the transfer of knowledge and best practice in e-governance, e-democracy and national cyber security.

DEFCON Cyber

DEFCON Cyber

DEFCON CYBER is a solution that seamlessly molds a new, or existing, cybersecurity program into a highly effective risk management operation.

Belden

Belden

Belden is a global leader in signal transmission and security solutions for mission-critical applications in enterprise and industrial markets. Belden brands include Hirschmann and Tofino Security.

Carve Systems

Carve Systems

Carve Systems was founded to bring enterprise level information security, training, and risk management services to organizations of any size and industry.

MyDocSafe

MyDocSafe

MyDocSafe is an all-in-one document security and e-sign software.

SOC.OS Cyber Security

SOC.OS Cyber Security

SOC.OS is an alert correlation and triage automation tool. It correlates and prioritises your alerts, boosting productivity, enhancing threat visibility and shortening mean time to respond.

Nucleon Security

Nucleon Security

Nucleon Endpoint Detection and Response EDR is the most effective way to protect the value created by your organization against any threat.

QuSecure

QuSecure

QuSecure provides a software-driven security architecture that overlays your current infrastructure and provides next-generation security to protect your entire network from quantum threats.

SessionGuardian

SessionGuardian

SessionGuardian (previously SecureReview) is the world's first and only technology which ensures second-by-second biometric identity verification of your remote user, from log on to log off.

PCS Security (PCSS)

PCS Security (PCSS)

PCS Security provides secure, reliable and state-of-the-art security solutions to help our customers address their security concerns.

WhiteJar

WhiteJar

WhiteJar offers an innovative approach to modern cybersecurity needs, empowering Ethical Hackers within its unique crowd platform.

Execweb

Execweb

Execweb are a cybersecurity executive network, comprised of 400+ security practitioners who work at Fortune 500 and SME companies.

CDS

CDS

CDS is a strategic change agency enabling organisations and businesses to create and build better services to meet the evolving needs of customers, employees and citizens.

AHAD

AHAD

AHAD provides cybersecurity, digital transformation, and risk management services and solutions to Government, Fortune 500, And Start-Up Companies in the Middle East region.

Castlepoint Systems

Castlepoint Systems

Castlepoint Systems is a pioneer in information governance, risk and compliance as a service. An all-in-one solution offering powerful risk management, built in compliance, cybersecurity and audit.