Cyberwar: A New Front For US Military

Warfare has traditionally been executed within easily defined periods of time and geographic boundaries. These conflicts have been fought on identifiable terrain in the air, on the ground, under the sea and, as of the last 20 years, in space.

Even the changing tools of war have been easily defined: the rifle, bomb, aircraft, tank, ship, et al. Some of the newer tools, such as the improvised explosive device, are equally tangible and identifiable.

But the Internet has opened a whole new domain for warfare. There are no geographical boundaries. Cyber-warfare is a game-changer in how we assess our enemies, meet their challenges and enact policies that match the growth of the cyber-domain.

To understand cyber warfare, we need a clear understanding of what the term means and how this form of battle differs from traditional warfare. Unfortunately, no universal definition of cyber warfare exists. Even agreement on a single way to spell the term has proven elusive. Is it “cyber warfare,” “Cyber-Warfare,” “Cyberwarfare” or “Cyber warfare”? The subtle differences reflect a large difference in the word’s connotation. Is the emphasis on “cyber”? Is the emphasis on “war” to reflect an offensive focus versus a more conventional defensive positioning? Or is the term meant to reflect a select type of warfare? Is it only limited to actions taken on a computer?

It also is important to differentiate a cyber-attack from cyber warfare. Calling it “war” implies a wider scope and longevity. An attack is understood to be a singular event, while war is a series of attacks.

My emphasis is on using a digital means to attack an opponent, what constitutes an attack and the warranted response.
Cyber-warfare should not be thought of as computer against computer, but a much broader concept. These attacks could range from state-sponsored infiltration with the objective of disrupting information systems to hackers trying to make a political statement or influence outcomes.

With the advent of non-state-sponsored terrorist organisations and the ubiquity of Internet access, offensive cyber-attacks have become frequent occurrences. Reaching agreement on terms and meanings will be critical to achieving and determining how to best deal with this new type of warfare.

The Department of Defense and others have spent billions viewing cyber-space and solutions in traditional physical terms, likely because that is what is familiar to them. A new paradigm must be developed that reflects the realities of cyber-space, which expands the battlefield past the supposedly-safe borders of our homeland and into almost every aspect of our lives.
That so much activity relies on this technology means escaping the impact of cyber-warfare is unlikely. The capacity for a single solution is equally unlikely.

All of these developments present the Department of Defense with a new challenge and beg the question: What will “traditional warfare” mean in 2025 or 2030?

The American military does not possess sufficient numbers of skilled operators to counter this growing threat, much less obtain superiority in the cyberspace domain. We need to train for a different set of skills and knowledge.
The tools that will advance US military capabilities are also creating vulnerabilities since they operate on the same Internet that is under attack. As US policies evolve and incorporate innovative technologies into defense systems, they need to be designed with an eye toward security. Developing a strong military without protecting the electrical grids at home is short-sighted and will hinder longer-term success.

A proactive planning approach will prove the most effective way to move forward. The focus must be on finding solutions within the network. As history has shown, military strategy must adapt to new domains.
Cyberspace is that next domain. A traditional system that cannot respond in “digital time” to a multi-pronged threat or that cannot provide protection while attacking others may be of little use in the future. It would be the equivalent of the Polish army attempting to use their horse cavalry team against the German armored brigades at the beginning of World War II. Society and warfare have evolved from horses against metal to metal against the matrix.

Going forward, many political and military questions will need to be addressed as we determine how to conduct and respond to cyber warfare. Unanimous agreement is unlikely, but an informed dialogue with the public on these issues is essential. That will pave the way for compromise necessary to establish new policies and principles for this complicated subject of cyber-warfare.

Ein News:

You Might Also Read:

Ten Years Since The Outbreak Web War One:

How A Nation Became Russia's Cyberwar Experiment:

NATO Could Go To War In Response To A Cyber Attack:

 

« Latest: All About Petya
Ukraine Police Trace Petya Attack Source »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CCL Solutions Group

CCL Solutions Group

CCL is one of Europe’s leading digital investigation specialists, supporting law enforcement, government and organisations across both public and private sectors.

VaultOne

VaultOne

VaultOne is a next-generation security solution that addresses security issues from different domains (Password Manager, Secure Access, PAM, Identity Management) as a single, integrated solution.

Trinity Cyber

Trinity Cyber

Trinity Cyber’s patent-pending technology stops attacks before they reach internal networks,reducing risk and increasing cost to adversaries.

GK8

GK8

GK8 is a cyber security company that offers a high security custodian technology for managing and safeguarding digital assets. Secure, Compliant and Practical.

Swisscom Blockchain

Swisscom Blockchain

Swisscom Blockchain is focused on supporting the implementation and adaption of Blockchain-based platforms in enterprises across diverse industries.

Prove Identity

Prove Identity

Prove (formerly Payfone) is a leader in mobile & digital identity authentication for the connected world.

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC) is an information security company providing website vulnerability scanning and monitoring services.

Canopius Group

Canopius Group

Canopius is a global specialty lines insurance and reinsurance company and one of the top 10 insurers in the Lloyd’s insurance market.

HackEDU

HackEDU

HackEDU provides secure coding training to companies ranging from startups to the Fortune 500.

Kingston Technology

Kingston Technology

Kingston is a leading global manufacturer of memory and storage solutions including encrypted storage solutions to protect data inside and outside the firewall.

MailChannels

MailChannels

MailChannels protects companies against malicious email threats. Used by 750+ hosting providers around the world.

Onwardly

Onwardly

For everyday folks tasked with implementing security and privacy. Do it faster with Onwardly - build, launch and scale your cyber resilience program in 30 minutes per week.

WillJam Ventures

WillJam Ventures

WillJam Ventures are a private equity firm focused on investing in world-class cybersecurity companies that will become the next generation of leaders in protecting the world’s digital assets.

Simbian

Simbian

Simbian, with its hardened TrustedLLM system, is the first to accelerate security by empowering every member of a security team from the C-Suite to frontline practitioners.

CardinalOps

CardinalOps

The CardinalOps platform continuously assesses your detection posture and eliminates coverage gaps in your existing detection stack so you can easily implement a threat-informed defense.

NetAlly

NetAlly

NetAlly network test solutions help engineers and technicians better deploy, manage, maintain, and secure today’s complex wired and wireless networks.