Cyber War Calls For A New Look US Soldier

Cyberspace is today what airspace was a century ago. It’s a whole new domain our enemies are rushing to exploit. 

That’s why the US Defense Department created US Cyber Command in 2010. That joint military operation has a goal no different than any tank platoon, carrier group, or fighter wing: to keep the US safe.

The problem facing this new service is finding the right quantity and quality of talent, and herein lies the problem. The best cyber warriors don’t always make the best soldiers. 

Some won’t be able to handle the physical rigors of basic training. Some won’t be able to pass a drug test. Many simply don’t have the kind of brains wired for precision marching and crisp solutes.

Does the Army turn them over to civilian agencies like the NSA, or a quasi-private contractor system? Maybe the Army should just relinquish its cyber branch altogether and allow it to form a completely separate service, like when the Army Air Corps became the US Air Force. 

But if the Army still wants to retain a uniformed presence in cyber space, how do they do it without offending those who’ve literally sweated and bled for the right to call themselves soldiers?

In another time, in another place, our British cousins found themselves in a similar quandary over talent. During World War II, they needed a lot of qualified naval officers to fill a lot of badly needed tasks. 

But putting these Royal Navy Volunteer Reserves (RNVR) in the same threads as the career battleship officers would have offended a tradition going all the way back to the days of ‘wooden ships and iron men.’ 

Their solution was to change the gold stripes on RNVR sleeves from straight to wavy. The message was loud and clear: “We may not be the varsity, but we’re still just as much in the game.”

Creating a new, specialised uniform probably wouldn’t entice new recruits. That’s a much bigger, more complex issue. It might, however, encourage those who already want to serve their country but never thought they could. A distinct stripe or badge, or black and grey camo pattern would send a very clear message to two very diverse communities.

To the traditional warrior-class it would say, “Yes, we know we’re not you and we’re not pretending to be. We respect the risks you take and we honor the sacrifices you make.”

To the civilian world it would say, “We keep your private data private. We keep your democratic process democratic. We keep your lights on and your hospitals running. We may serve behind keyboards, but keep you just as safe as those behind triggers. We stand watch on the digital wall. We are Cyber Warriors.”

The Hill

You Might Also Read: 

US Army Command Learning Cyberwar From Social Media:

Will NSA & CyberCom Split?:

Pentagon Creates New 5,000 Strong Cyber Force:

Waging Cyberwar In Peacetime:

Pentagon To Relaunch $475 Million Cyber Effort:

US Defense Signals Silicon Valley's Cyberwar Help:

 

 

« Ageing Energy Systems Hold Huge Potential For Cyber Attack
Russian Propaganda Connections »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Institute for National Security and Counterterrorism (INSCT)

Institute for National Security and Counterterrorism (INSCT)

INSCT is a center for the study of national security, international security, and counterterrorism. Research programs include New Frontiers in Science, Cyber, & Technology

Centre for International Governance Innovation (CIGI)

Centre for International Governance Innovation (CIGI)

CIGI research areas include Conflict Management & Security which encompass cyber security and cyber warfare.

Odix

Odix

Odix security software neutralizes file embedded targeted cyber attacks before they enter your organization’s network.

Avatier

Avatier

Avatier identity management software products automate identity access management, user provisioning and IT governance to ensure information security and compliance.

Netresec

Netresec

Netresec is an independent software vendor with focus on the network security field. We specialize in software for network forensics and analysis of network traffic.

Naval Dome

Naval Dome

Naval Dome provides the first maritime multilayer cyber defense solution for mission critical onboard systems.

Singular Security

Singular Security

Singular Security help public and private organizations minimize cybersecurity risk and pass their IT compliance audit.

R-Tech

R-Tech

R-Tech GmbH manages the digital start-up initiative, whose goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

Truvantis

Truvantis

Truvantis is a cybersecurity consulting organization providing best-in-class cybersecurity services to secure your organization’s infrastructure, data, operations and products.

Celebrus

Celebrus

Celebrus Fraud Data Platform, by D4t4 Solutions, works with existing fraud structures to augment functionality and turn fraud management into true fraud prevention.

Altospam

Altospam

Altospam is a full service corporate email protection, integrating multiple security levels for your emails.

VicOne

VicOne

With a vision to secure the vehicles of tomorrow, VicOne delivers a broad portfolio of cybersecurity software and services for the automotive industry.

ConvergePoint

ConvergePoint

ConvergePoint is the leading compliance software provider on the Microsoft Office 365 SharePoint platform.

Viatel Technology Group

Viatel Technology Group

Viatel Technology Group is a complete digital services provider. We have over 26 years’ experience delivering fully managed security, networking, cloud and communications services.

Hudson Rock

Hudson Rock

Hudson Rock’s products — Cavalier & Bayonet — are powered by our cybercrime database, composed of millions of machines compromised by Infostealers in global malware spreading campaigns.

Scribe Security

Scribe Security

Scribe security provides end-to-end software supply chain security solutions.