Cyberwar Represents An Existential Threat

Nineteenth century military genius Carl von Clausewitz coined the phrase: “War is a mere continuation of politics by other means.” In his day, the number of wars was limited by the time and expense to organize large armies and then march across borders to inflict pain.

War was much more expensive in the twentieth century, but the number of conflicts expanded because planes and missiles cut the time it took to inflict pain. Proliferating technologies make it now possible for any nation to acquire cyber tools at minimal cost to instantly inflict pain on any other nation. Clausewitz would expect the number of cyber-wars to grow exponentially in the twenty-first century.    

The advent of cyberwar represents a new “high bar risk” as the U.S. faces-off against a deadly triad of cutting-edge digital technologies, advanced military weapons, and the ability to disrupt critical infrastructure. With this type of war built around digital technology, America’s enemies will focus on turning our own technology against us.

The first year of the twenty-first century will be remembered for 19 illegal aliens who trained at a Florida school to use US commercial airliners as improvised explosive devices. The 9/11 terrorists slaughtered more Americans than died at Pearl Harbor. With the U.S. government politically forced to declare war on much of the Middle East, the financial cost from the attacks and subsequent military response is over $3.3 trillion.

Former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States, Richard A. Clarke, defined “cyberwarfare” as “actions by a nation-state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption.” When confronted with the statistic that less than 0.0025% of revenue at the average US corporation was being spent on information technology security, Clarke warned: “If you spend more on coffee than on IT security, then you will be hacked. What’s more, you deserve to be hacked.”

Edward Snowden’s revelations concerning the militarized activities of the NSA highlight cyber-warfare’s danger to the U.S. corporate sector. Military power in the cyber domain is projected through the civilian computer networks of US tech giants such as Google, Facebook, Verizon, and Apple. The cooperation or conscription of private U.S. networks for cyberwarfare attacks or defenses creates an extreme liability for these firms. US tech companies are top targets for suspicion and potential retaliation by enemy states.

The main proliferator of cyberwarfare capabilities to potential enemies of the United States is the boom in attendance by international students at US colleges. The State Department’s 2014 Open Doors Report on International Educational Exchange reported the number of international students studying at U.S. colleges grew since 2000 by 72% to 886,052. About 23% of international students worldwide now study in the US.

Over 315,000 or 35% of international college students in the U.S. are enrolled in science, technology, engineering, and mathematics (STEM). This compares to about 3.1 million or 28% of American-born college students with STEM majors. But unlike international students that overwhelmingly graduate in their major, 48% of American-born students drop STEM majors before graduation.

Forbes reported Chinese cyber-crooks are stealing secrets from leading US weapons systems manufacturers; Iran has invaded the operations of leading American banks to plant malicious viruses that could cause a debilitating financial crisis; and Russian hackers are breaking into the networks of US oil and gas companies to gain access to their industrial control systems.

Yet, 276,000 Chinese, 4,500 Russians, and 8,700 Iranians are legally enrolled as international students at US colleges. Some of these students will eventually return home armed with cyberweapons-of-mass-destruction they can deploy against America.

Clausewitz stressed three centuries ago that great military commanders are prepared to respond to incomplete, dubious, and often completely erroneous information coupled with high levels of fear, doubt, and excitement that he termed the “fog of war.”

Low cost cyberwarfare tools allow adversaries of the United States to inflict pain and instantly create the fog of war by attacking American computer networks. Since no nation on earth currently has the equipment and financial resources to win a conventional military war against America, cyberwar will be the primary existential threat to the peace and security of the United States in the twenty-first century.

Breitbart: http://bit.ly/1PncF6w

 

« Is The Password Dead?
Experts Make 2016 Cybersecurity Predictions »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

WIRED

WIRED

WIRED is the magazine about what's next – the people, the trends and the big ideas that will change our lives. Topics covered include cyber security.

Internet Security Alliance (ISA)

Internet Security Alliance (ISA)

ISA is an international trade association providing thought leadership in advancing a sustainable system of cyber security.

7Safe

7Safe

7Safe has been delivering hands-on digital security training courses since 2001 and offer e a portfolio of university and industry-accredited courses.

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

Sensible Vision

Sensible Vision

SensibleVision helps organizations transparently protect data and prevent costly security breaches by constantly verifying the identities of people who use computers or mobile devices.

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center is dedicated to combating adversaries who desire to harm our citizens, our government, and our industry through cyber-attacks.

CYRISMA

CYRISMA

CYRISMA is a revolutionary cybersecurity platform that helps organizations manage risk without the usual headaches associated with enterprise cybersecurity tools.

Secmation

Secmation

Secmation are an agile engineering services firm providing advanced DoD level security design and consultation services for both commercial and defense hardware and software applications.

Cyber Chasse

Cyber Chasse

Cyber Chasse is an IT consulting and staffing company offering a full range of cybersecurity solutions, contract staffing services and online training courses.

V3 Cybersecurity

V3 Cybersecurity

V3 Cybersecurity is a unique company focused on contextualization of security programs from a business perspective. Our mission is to provide enterprise IT Risk Management capabilities.

Systal Technology Solutions

Systal Technology Solutions

Systal is a global managed network and security service and transformation specialist. We help enterprise-level businesses maximise the security and business value of their complex IT infrastructure.

ConvergePoint

ConvergePoint

ConvergePoint is the leading compliance software provider on the Microsoft Office 365 SharePoint platform.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ExactTrak

ExactTrak

ExactTrak provide embedded cyber security solutions for your digital devices – whenever and wherever you need them.

SentryMark

SentryMark

Stay a Step Ahead of Emerging Threats. Deviate from the traditional siloed defenses and get the proactive and responsive cybersecurity solutions and services you deserve with SentryMark today.

Syteca

Syteca

Syteca is specifically designed to secure organizations against threats caused by insiders. It provides full visibility and control over internal risks.