The Future Of War is Cyber

Gone are the days where battles are fought in person-to-person conflicts. In the coming years, most wars will be waged via computers, servers, and digital weapons. The question is, is the United States prepared for the future?

Military battles have evolved a tremendous amount over the years – most of it due to advances in weaponry and technology. In early centuries, wars were fought with hands, fists, sticks, and stones. You had to be close to your enemy to kill. As weapons become more advanced, things like slingshots, bow and arrows, and catapults gave armies the opportunity to attack from a small distance.

The first guns allowed for mass killing at a distance, though single-shot rifles were inefficient and time-consuming to use. As automatic guns and long-distance rifles entered the picture, it became possible for battles to be waged at distances. As airplanes, helicopters, and long-range missiles emerged, battles became even more sophisticated.

Today, we stand on the precipice of new warfare. No longer is it necessary for people or weapons to be present. Battles of the future won’t be fought on the ground or sea, or even in the air. They’ll be waged behind computers and servers.

As warfare evolves, two terms seem to get thrown around more than most: electronic warfare and cyber warfare. And while related, these two ideas aren’t the same.

“Electronic warfare includes military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy,” security expert Eric Chabrow writes. 

“Cyber warfare involves crippling adversaries through information systems and the Internet. Electronic warfare and cyberspace operations are complementary and have potentially synergistic effects.”

Nations like Russia and China appear well-equipped for this new way of war. The United States, while not totally outmatched, certainly has room for growth.

How the United States stacks up
With all of the whiz kids in Silicon Valley and billion-dollar think tanks in Washington, it would be a safe assumption that the United States is well-prepared to handle sophisticated cyber-attacks and electronic warfare. But this isn’t necessarily true. 
As of right now, the US isn’t fully prepared to ward off attacks from nations like Russia, China, Iran, and North Korea. As recent events have shown, America is actually quite vulnerable.

While some of America’s foes have had opportunities to test their cyber capabilities, the US hasn’t had the same chances. Even when these chances emerge, there are questions about how the government will handle them.

“Complicating the ability to hit back nimbly are strict policies on how the US is willing to conduct digital warfare,” writes Paul D. Shinkman, Senior National Security Writer for US News & World Report. 

“There are hard-line and at times overly dense barriers between cyber operators cleared to carry out the government’s business and those who aren’t, even though the latter often find themselves inadvertently at the front lines of digital warfare.”

The fear is that other nations are gathering valuable real-world experience, while the United States is doing nothing more than accumulating theoretical ideas and knowledge. Nations like Russia and North Korea presumably unleash multiple large-scale attacks per year. 

This gives them an understanding of how different strategies and technologies work in action. On the home front, there’s very little confidence in the application and reliability of cyber and electronic warfare techniques.  There are also glaring issues on the cyber defense front.

“The dilemma is as wide as it is deep,” Lt. Col. Michael Myers of the US Joint  Forces Staff College writes. 

“The majority of the nation’s CI is privately owned and operated. This leaves assessment, oversight and compliance enforcement a challenge for the federal government. Some CI sectors may be more inclined to share with DHS (and the public) their cyber shortcomings than others.”

NextWeb:

You Might Also Read:

US Vs. China - A Different Kind of Cyberwar:

« Cyber Attacks On Critical Infrastructure – A New Frontier In Global Conflict
Millions Of Secret Bank Records Leak Online »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cybersecurity Credentials Collaborative (C3)

Cybersecurity Credentials Collaborative (C3)

C3 provides a forum for collaboration among vendor-neutral information security and privacy and related IT disciplines certification bodies.

Lumen Technologies

Lumen Technologies

Lumen is an enterprise technology platform that enables companies to capitalize on emerging applications and power the 4th Industrial Revolution (4IR).

Vuntie

Vuntie

Vuntie blend European craftsmanship, performance and open-source technology to deliver cybersecurity services including penetration testing, incident response, training and consultancy.

ReconaSense

ReconaSense

ReconaSense helps protect people, assets, buildings and cities with its next-gen access control and converged physical security intelligence platform.

MicroEJ

MicroEJ

MicroEJ is a software vendor of cost-driven solutions for embedded and IoT devices.

CyCognito

CyCognito

CyCognito empowers companies to take full control over their attack surface by uncovering and eliminating the critical security risks they didn't even know existed.

Rizikon Assurance

Rizikon Assurance

Rizikon Assurance is an Online System that improves Third-Party Assurance and Risk Management, through efficiency, automation and better visibility.

Blackwall

Blackwall

Blackwall (formerly BotGuard) is a security infrastructure company focused on protecting web ecosystems from automated threats, while optimizing performance for hosting environments.

ERI

ERI

ERI is the largest fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company in the United States.

Phished

Phished

Phished is an AI-driven platform that focuses on the human side of cybersecurity. By combining fully automated training software with personalised, realistic simulations of cyberattacks.

Incognia

Incognia

Incognia have created a ubiquitous private identity based on location behavior, that enables a personalized frictionless experience with mobile apps and connected devices.

ARC Risk and Compliance

ARC Risk and Compliance

ARC Risk and Compliance is a consulting company comprised of a team of AML Specialists completely focused on anti-money laundering compliance and the technologies used to support compliance programs.

Exodata

Exodata

Exodata is a French digital services company specializing in the outsourcing of IT Systems and solutions.

DYOPATH

DYOPATH

At DYOPATH we work with the single purpose of helping our clients combat the ongoing increase of cyber threats, the growth in more complex IT environments, and ever-increasing human capital shortages.

Prismo Systems

Prismo Systems

Prismo provides a unified platform to secure software development across the entire SDLC and deployment on any cloud or on-premises infrastructure.

TrustFour

TrustFour

TrustFour is a pioneer in workload and non-human identity security, providing innovative solutions for compliance, remediation, post quantum resiliency, and advanced threat defense.