Next World War - First, Cyberwar. Second, Shooting War

1782bcb5ae89812117edec66f285e426.jpg

The reality of cyberwarfare is total war

Historically, wars are fought over territory or ideology, treasure or tradition, access or anger. When a war begins, the initial aggressor wants something, whether to own a critical path to the sea or strategic oil fields, or "merely" to cause damage and build support among certain constituencies.

At first, the defender defends and protects whatever has been attacked. Over time, however, the defender also seeks strategic benefit, to not only cause damage in return, but to gain footholds that will lead to an end to hostilities, a point of leverage for negotiation, or outright conquest.
Shooting wars are very expensive and very risky. Tremendous amounts of material must be produced and transported, soldiers and sailors must be put into harm's way, and incredible logistics and supply chain operations must be set up and managed on a nationwide (or multi-national level).

One of the big reasons the US won the Cold War (and scored highly in many of its other conflicts) is because it had the economic power to produce goods for war, whether capital ships or food for troops. An economically strong nation can invest in weapons R&D, creating a technological generation gap in terms of leverage and per-capita effectiveness compared to weaker nations.

But cyberwar can lay economic waste to a nation. Worse, the more technologically powerful a nation is, the more technologically dependent that nation becomes. Cyberwar can level the playing field, forcing highly connected nations to thrash, to jump at every digital shadow while attackers can co-opt the very resources of the defending nation to force-multiply their attacks.
Sony is still cleaning up after the hack that exposed many confidential aspects of its relationship with stars and producers. Target and Home Depot lost millions of credit cards.
The Snowden theft, while not the result of an outside hack, shows the economic cost of a national security breach: nearly $47 billion. Cyberwar can also cause damage to physical systems, ranging from electric power stations to smart automobiles.

And when a breach can steal deeply confidential information of a government's most trusted employees, nothing remains safe or secret. The US Office of Personnel Management was unwittingly funneling America's personnel data to its hackers for more than a year. We think China was responsible for the OPM hack. Despite the gargantuan nation's equally gargantuan investments in America (or, perhaps, because of them), China has been accused of many of the most effective and persistent penetrations perpetrated by any nation.

China is backing away from US tech brands for state purchases as NSA revelations continue to make headlines in newspapers all around the world.

Providing additional reason to worry, Russia and China have recently inked an agreement where they agreed to not launch cyberattacks against each other. They have also agreed to share cyberwarfare and cyber defense technology, creating an Asian axis of power that can split the world in half.On the other side of the geopolitical spectrum are the American NSA and British GCHQ, two organizations who share signals intelligence and are said to spy as much upon their own citizens as enemies of the state.

China, of course, supplies us with most of our computer gear. Every iPhone and every Android phone, nearly all our servers, laptop computers and routers have come from China. The same China that has been actively involved in breaching American interests at all levels.

In the center of all this is the main body of Europe, where the last two incendiary world wars were fostered and fought.
Nations fall when they are economically unstable. This time, Germany isn't the instigator of unrest, but instead finds itself caught in the middle, subject to spying by and active in spying on its allies, the only nearly super power of the EU.
An enemy (or even a supposed "friendly" nation) decides it needs the strategic upper hand. After years of breaches, it has deep access to nearly every powerful government and business figure in the United States. Blackmail provides access into command and control and financial systems.

Financial systems are hit and we suffer a recession worse than the Great Recession of 2008-2009. Our budget for just about everything (as well as our will) craters. Industrial systems (especially those that might post a physical or economic threat to our attacker) are hit next. They are shut down or damaged in the way Stuxnet took out centrifuges in Iran.

The former NSA contractor turned whistleblower Edward Snowden said during a Reddit question-and-answer session that the leaks have also improved security and encryption in Silicon Valley.
Every step America takes to respond is anticipated by the enemy, because the enemy has a direct pipeline to every important piece of communication America produces, and that's because the enemy has stolen enough information to corrupt an army of Snowdens.

While this is all going on, the American public is blissfully in the dark. Citizens just get angrier at their leadership for allowing a recession to take hold, and for allowing more and more foreigners to take American jobs.
Europe, which has always relied on America to keep it propped-up in the worst of times, will be on its own. Russia will press in from the north-east. ISIS will continue to explode in the Middle East. China will keep up its careful dance as it grows into the world's leading economic power.

India, second in size only to China and a technological hotbed itself, remains a wild card, physically surrounded by Europe, the Middle East, China, and Russia. India continues to live in conflict with Pakistan, and with Pakistan both unstable and nuclear-tipped, Indo-Pak, too, is on the precipice.

A world war is about huge nations spanning huge geographic territories fighting to rewrite the map of world power. Russia, China, ISIS (which calls itself the Islamic State), India, Pakistan, the US, the UK, and all of the strong and weak members of the EU: we certainly have the cast of characters for another global conflict.
Ein News: http://bit.ly/1GChN2d

« 4 News Apps that Will Change Everything
Naresh Singh : Freelance Ethical Hacker »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CloudDNA

CloudDNA

CloudDNA deliver solutions that enable users and devices to connect over high performance, secure, efficient, scalable cloud networks.

CERT.GOV.AZ

CERT.GOV.AZ

Azerbaijan Government Computer Incident Response Team

Grimm Cyber

Grimm Cyber

GRIMM makes the world a more secure place by increasing the cyber resiliency of our client’s systems, networks, and products.

Neoteric Networks

Neoteric Networks

We deliver a no nonsense procedure to implementing technology. The technology selection process ensures that all customers enjoy an engineered methodology implementing technology.

Smarttech247

Smarttech247

Smarttech247 deliver a range of cyber security solutions, including cognitive security services using IBM Watson for Cybersecurity, SIEM, Compliance & Governance, and Penetration Testing.

SWAT Systems

SWAT Systems

SWAT Systems is an IT support and cyber security managed service provider.

Scout Ventures

Scout Ventures

Scout Ventures is an early stage venture capital firm that is making the world a better, safer place by cultivating standout frontier technologies.

The Cyber AB

The Cyber AB

The Cyber AB is the official accreditation body of the Cybersecurity Maturity Model Certification (CMMC) Ecosystem.

PurpleSynapz

PurpleSynapz

PurpleSynapz provides hyper-realistic Cyber Security Training with a modern curriculum and Cyber Range.

Diateam

Diateam

Diateam is an R&D company specializing in computer security. Diateam develops highly innovative cyber range platforms and Industry-leading systems for cybersecurity training and testing labs.

Protect AI

Protect AI

Protect AI is a cybersecurity company focused on AI & ML systems. Through innovative security products and thought leadership in MLSecOps, we help our customers build a safer AI powered world.

NetRise

NetRise

NetRise was founded as a direct result of the many shortcomings currently in the device security market, specifically targeting the firmware of devices.

Cura Technology

Cura Technology

Cura Technology offers a wide array of security solutions meticulously designed to address specific facets of your security requirements.

ELK Analytics

ELK Analytics

ELK Analytics is a specialized Managed Security Services Provider (MSSP) that focuses on endpoint security and monitoring & alerting for any type of structured or unstructured data.

Hydden

Hydden

Hydden gives security teams the ability to create a solid foundation to build a truly next-gen identity security practice by bridging the gaps between siloed teams and technologies.

ReformIT

ReformIT

ReformIT is a Managed IT Service and Security provider with many years experience helping companies find the right IT solutions to meet the needs of their businesses.