Cyber War Calls For A New Look US Soldier

Cyberspace is today what airspace was a century ago. It’s a whole new domain our enemies are rushing to exploit. 

That’s why the US Defense Department created US Cyber Command in 2010. That joint military operation has a goal no different than any tank platoon, carrier group, or fighter wing: to keep the US safe.

The problem facing this new service is finding the right quantity and quality of talent, and herein lies the problem. The best cyber warriors don’t always make the best soldiers. 

Some won’t be able to handle the physical rigors of basic training. Some won’t be able to pass a drug test. Many simply don’t have the kind of brains wired for precision marching and crisp solutes.

Does the Army turn them over to civilian agencies like the NSA, or a quasi-private contractor system? Maybe the Army should just relinquish its cyber branch altogether and allow it to form a completely separate service, like when the Army Air Corps became the US Air Force. 

But if the Army still wants to retain a uniformed presence in cyber space, how do they do it without offending those who’ve literally sweated and bled for the right to call themselves soldiers?

In another time, in another place, our British cousins found themselves in a similar quandary over talent. During World War II, they needed a lot of qualified naval officers to fill a lot of badly needed tasks. 

But putting these Royal Navy Volunteer Reserves (RNVR) in the same threads as the career battleship officers would have offended a tradition going all the way back to the days of ‘wooden ships and iron men.’ 

Their solution was to change the gold stripes on RNVR sleeves from straight to wavy. The message was loud and clear: “We may not be the varsity, but we’re still just as much in the game.”

Creating a new, specialised uniform probably wouldn’t entice new recruits. That’s a much bigger, more complex issue. It might, however, encourage those who already want to serve their country but never thought they could. A distinct stripe or badge, or black and grey camo pattern would send a very clear message to two very diverse communities.

To the traditional warrior-class it would say, “Yes, we know we’re not you and we’re not pretending to be. We respect the risks you take and we honor the sacrifices you make.”

To the civilian world it would say, “We keep your private data private. We keep your democratic process democratic. We keep your lights on and your hospitals running. We may serve behind keyboards, but keep you just as safe as those behind triggers. We stand watch on the digital wall. We are Cyber Warriors.”

The Hill

You Might Also Read: 

US Army Command Learning Cyberwar From Social Media:

Will NSA & CyberCom Split?:

Pentagon Creates New 5,000 Strong Cyber Force:

Waging Cyberwar In Peacetime:

Pentagon To Relaunch $475 Million Cyber Effort:

US Defense Signals Silicon Valley's Cyberwar Help:

 

 

« Ageing Energy Systems Hold Huge Potential For Cyber Attack
Russian Propaganda Connections »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSIRT.CZ

CSIRT.CZ

CSIRT.CZ is the National Computer Security Incident Response Team of the Czech Republic.

Allgress

Allgress

Allgress solutions converge disparate risk silos across enterprise networks and automate governance, risk and compliance management processes.

PrimaTech

PrimaTech

PrimaTech provide process safety, cyber and process security, and risk management consulting, training and software for the process industries.

ElcomSoft

ElcomSoft

ElcomSoft is a global leader in computer and mobile forensics, IT security and forensic data recovery.

OSIRIS Lab - NYU Tandon

OSIRIS Lab - NYU Tandon

The Offensive Security, Incident Response & Internet Security Lab (OSIRIS) is a security research environment where students analyze and understand how attackers take advantage of real systems.

netfiles

netfiles

netfiles offers highly secure data rooms for sensitive business processes and secure data exchange.

Uhuru Corp

Uhuru Corp

Uhuru offers a wide variety of IoT products and solutions including enebular® IoT Orchestration Service.

Seekurity

Seekurity

Seekurity is an information security consulting firm specialized in all areas of Cyber Security including Penetration Testing, Vulnerability Assessments and Risk Management.

Kickstart

Kickstart

Kickstart supports your startup in scaling deep technology businesses in Switzerland in areas such as AI, Blockchain and Cybersecurity.

Sequoia Capital

Sequoia Capital

Sequoia Capital is a venture capital firm focused mainly on technology. We partner both with young companies finding their stride and established ones looking for growth.

GAVS Technologies

GAVS Technologies

GAVS is a global IT services provider with focus on AI-led Managed Services and Digital Transformation.

Nuts Technologies

Nuts Technologies

Nuts Technologies are simplifying data privacy and encryption with our innovative and novel data containers we call nuts based on our Zero Trust Data framework.

Telesystem

Telesystem

Telesystem empowers businesses across the USA with a range of innovative network, communication and collaboration solutions.

Skyhawk Security

Skyhawk Security

Skyhawk Security is the originator of Cloud threat Detection and Response (CDR), helping hundreds of users map and remediate sophisticated threats to cloud infrastructure in minutes.

Cybecs Security Solutions

Cybecs Security Solutions

Cybecs was founded to address rapid technological advancement, changing business models, global privacy regulations, and increasing cyber threats for global organizations.

Adili Group

Adili Group

Adili Group is a leading pan-African corporate advisory firm. We deliver tailored solutions in regulation and compliance, risk management, and improving business efficiency.