Cyber War Calls For A New Look US Soldier

Cyberspace is today what airspace was a century ago. It’s a whole new domain our enemies are rushing to exploit. 

That’s why the US Defense Department created US Cyber Command in 2010. That joint military operation has a goal no different than any tank platoon, carrier group, or fighter wing: to keep the US safe.

The problem facing this new service is finding the right quantity and quality of talent, and herein lies the problem. The best cyber warriors don’t always make the best soldiers. 

Some won’t be able to handle the physical rigors of basic training. Some won’t be able to pass a drug test. Many simply don’t have the kind of brains wired for precision marching and crisp solutes.

Does the Army turn them over to civilian agencies like the NSA, or a quasi-private contractor system? Maybe the Army should just relinquish its cyber branch altogether and allow it to form a completely separate service, like when the Army Air Corps became the US Air Force. 

But if the Army still wants to retain a uniformed presence in cyber space, how do they do it without offending those who’ve literally sweated and bled for the right to call themselves soldiers?

In another time, in another place, our British cousins found themselves in a similar quandary over talent. During World War II, they needed a lot of qualified naval officers to fill a lot of badly needed tasks. 

But putting these Royal Navy Volunteer Reserves (RNVR) in the same threads as the career battleship officers would have offended a tradition going all the way back to the days of ‘wooden ships and iron men.’ 

Their solution was to change the gold stripes on RNVR sleeves from straight to wavy. The message was loud and clear: “We may not be the varsity, but we’re still just as much in the game.”

Creating a new, specialised uniform probably wouldn’t entice new recruits. That’s a much bigger, more complex issue. It might, however, encourage those who already want to serve their country but never thought they could. A distinct stripe or badge, or black and grey camo pattern would send a very clear message to two very diverse communities.

To the traditional warrior-class it would say, “Yes, we know we’re not you and we’re not pretending to be. We respect the risks you take and we honor the sacrifices you make.”

To the civilian world it would say, “We keep your private data private. We keep your democratic process democratic. We keep your lights on and your hospitals running. We may serve behind keyboards, but keep you just as safe as those behind triggers. We stand watch on the digital wall. We are Cyber Warriors.”

The Hill

You Might Also Read: 

US Army Command Learning Cyberwar From Social Media:

Will NSA & CyberCom Split?:

Pentagon Creates New 5,000 Strong Cyber Force:

Waging Cyberwar In Peacetime:

Pentagon To Relaunch $475 Million Cyber Effort:

US Defense Signals Silicon Valley's Cyberwar Help:

 

 

« Ageing Energy Systems Hold Huge Potential For Cyber Attack
Russian Propaganda Connections »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Applicure Technologies

Applicure Technologies

Applicure Technologies develops the leading multi-platform web application security software products to protect web sites and web applications from external and internal attacks.

IronScales

IronScales

IronScales combines human intelligence with machine learning to automatically prevent, detect and respond to email phishing attacks.

Prevalent

Prevalent

Prevalent takes the pain out of third-party risk management. Companies use our services to eliminate the security and compliance exposures that come from working with vendors and suppliers.

CLDigital

CLDigital

CLDigital's no-code risk and resilience platform, CL360, provides leaders with risk and resilience data to make strategic and tactical continuity decisions.

Lifespan Technology

Lifespan Technology

Lifespan Technology provides the full range of IT Asset Disposition services. This includes hardware recycling and disposal, data destruction, and hardware resale.

MISP Project

MISP Project

The MISP threat sharing platform is a free and open source software helping information sharing of threat intelligence including cyber security indicators.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Motiv ICT Security

Motiv ICT Security

Motiv is the ICT security specialist that provides public and private sector organisations with IT security solutions and services to prevent cybercrime, data theft and data breaches.

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

CSRI solves the cyber security threats of tomorrow, today. We work with industry and government leaders on innovative research that has real-world impact.

Advantio

Advantio

Advantio offers a unique combination of technologies and managed, advisory and testing services to increase your cyber resilience and compliance.

ThrottleNet

ThrottleNet

ThrottleNet provides world-class managed IT services and cybersecurity to organizations in St. Louis and throughout Missouri.

DC Two

DC Two

DC Two are a locally operated and supported Australian data centre, offering a suite of vertically integrated services covering every part of the data centre and cloud technology stack.

CyberXposure

CyberXposure

CyberXposure has been built by a team comprising of Cyber Security Professionals and SAAS experts in data backup, disaster recovery and cyber-security.

SecureDNE

SecureDNE

SecureDNE are a leading provider of cutting-edge Fractional CISO, Managed Cybersecurity Services, and Cybersecurity Engineering Solutions.

Lightpath

Lightpath

Lightpath is revolutionizing how organizations connect to their digital destinations by combining our next-generation network with our next-generation customer service.

Clumio

Clumio

Clumio provides autonomous backup and recovery for critical cloud data.