Next World War - First, Cyberwar. Second, Shooting War

1782bcb5ae89812117edec66f285e426.jpg

The reality of cyberwarfare is total war

Historically, wars are fought over territory or ideology, treasure or tradition, access or anger. When a war begins, the initial aggressor wants something, whether to own a critical path to the sea or strategic oil fields, or "merely" to cause damage and build support among certain constituencies.

At first, the defender defends and protects whatever has been attacked. Over time, however, the defender also seeks strategic benefit, to not only cause damage in return, but to gain footholds that will lead to an end to hostilities, a point of leverage for negotiation, or outright conquest.
Shooting wars are very expensive and very risky. Tremendous amounts of material must be produced and transported, soldiers and sailors must be put into harm's way, and incredible logistics and supply chain operations must be set up and managed on a nationwide (or multi-national level).

One of the big reasons the US won the Cold War (and scored highly in many of its other conflicts) is because it had the economic power to produce goods for war, whether capital ships or food for troops. An economically strong nation can invest in weapons R&D, creating a technological generation gap in terms of leverage and per-capita effectiveness compared to weaker nations.

But cyberwar can lay economic waste to a nation. Worse, the more technologically powerful a nation is, the more technologically dependent that nation becomes. Cyberwar can level the playing field, forcing highly connected nations to thrash, to jump at every digital shadow while attackers can co-opt the very resources of the defending nation to force-multiply their attacks.
Sony is still cleaning up after the hack that exposed many confidential aspects of its relationship with stars and producers. Target and Home Depot lost millions of credit cards.
The Snowden theft, while not the result of an outside hack, shows the economic cost of a national security breach: nearly $47 billion. Cyberwar can also cause damage to physical systems, ranging from electric power stations to smart automobiles.

And when a breach can steal deeply confidential information of a government's most trusted employees, nothing remains safe or secret. The US Office of Personnel Management was unwittingly funneling America's personnel data to its hackers for more than a year. We think China was responsible for the OPM hack. Despite the gargantuan nation's equally gargantuan investments in America (or, perhaps, because of them), China has been accused of many of the most effective and persistent penetrations perpetrated by any nation.

China is backing away from US tech brands for state purchases as NSA revelations continue to make headlines in newspapers all around the world.

Providing additional reason to worry, Russia and China have recently inked an agreement where they agreed to not launch cyberattacks against each other. They have also agreed to share cyberwarfare and cyber defense technology, creating an Asian axis of power that can split the world in half.On the other side of the geopolitical spectrum are the American NSA and British GCHQ, two organizations who share signals intelligence and are said to spy as much upon their own citizens as enemies of the state.

China, of course, supplies us with most of our computer gear. Every iPhone and every Android phone, nearly all our servers, laptop computers and routers have come from China. The same China that has been actively involved in breaching American interests at all levels.

In the center of all this is the main body of Europe, where the last two incendiary world wars were fostered and fought.
Nations fall when they are economically unstable. This time, Germany isn't the instigator of unrest, but instead finds itself caught in the middle, subject to spying by and active in spying on its allies, the only nearly super power of the EU.
An enemy (or even a supposed "friendly" nation) decides it needs the strategic upper hand. After years of breaches, it has deep access to nearly every powerful government and business figure in the United States. Blackmail provides access into command and control and financial systems.

Financial systems are hit and we suffer a recession worse than the Great Recession of 2008-2009. Our budget for just about everything (as well as our will) craters. Industrial systems (especially those that might post a physical or economic threat to our attacker) are hit next. They are shut down or damaged in the way Stuxnet took out centrifuges in Iran.

The former NSA contractor turned whistleblower Edward Snowden said during a Reddit question-and-answer session that the leaks have also improved security and encryption in Silicon Valley.
Every step America takes to respond is anticipated by the enemy, because the enemy has a direct pipeline to every important piece of communication America produces, and that's because the enemy has stolen enough information to corrupt an army of Snowdens.

While this is all going on, the American public is blissfully in the dark. Citizens just get angrier at their leadership for allowing a recession to take hold, and for allowing more and more foreigners to take American jobs.
Europe, which has always relied on America to keep it propped-up in the worst of times, will be on its own. Russia will press in from the north-east. ISIS will continue to explode in the Middle East. China will keep up its careful dance as it grows into the world's leading economic power.

India, second in size only to China and a technological hotbed itself, remains a wild card, physically surrounded by Europe, the Middle East, China, and Russia. India continues to live in conflict with Pakistan, and with Pakistan both unstable and nuclear-tipped, Indo-Pak, too, is on the precipice.

A world war is about huge nations spanning huge geographic territories fighting to rewrite the map of world power. Russia, China, ISIS (which calls itself the Islamic State), India, Pakistan, the US, the UK, and all of the strong and weak members of the EU: we certainly have the cast of characters for another global conflict.
Ein News: http://bit.ly/1GChN2d

« 4 News Apps that Will Change Everything
Naresh Singh : Freelance Ethical Hacker »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Vaddy

Vaddy

Vaddy provide an automatic web vulnerability scanner for DevOps that performs robust security checks to ensure that web app code is secure.

Assertion

Assertion

Assertion secures your collaboration (UC/CC) systems from cyber risks. Enforcing the right set of controls and monitoring them continually brings down risk to acceptable levels.

ENAC

ENAC

ENAC is the national accreditation body for Spain. The directory of members provides details of organisations offering certification services for ISO 27001.

Wontok

Wontok

Wontok deliver innovative value-added data security services that fill the gaps left in traditional security solutions.

Gray Analytics

Gray Analytics

Gray Analytics is a Cybersecurity Risk Management company providing best-practice services across a broad spectrum of cyber scenarios for both government and commercial customers.

FDD Center on Cyber and Technology Innovation (CCTI)

FDD Center on Cyber and Technology Innovation (CCTI)

The Foundation for Defense of Democracies is a nonprofit research institute focusing on foreign policy and national security. Ares of focus include cyber security and technology innovation.

Redbot Security

Redbot Security

Redbot Security provides industry leading manual penetration testing. Protecting critical systems and data - red team attack and breach simulations, (OT) critical infrastructure testing.

Execweb

Execweb

Execweb are a cybersecurity executive network, comprised of 400+ security practitioners who work at Fortune 500 and SME companies.

AdronH

AdronH

AdronH is a company of Cyber Security consultants. We support companies and public institutions with their digital transformation to new and secure business platforms.

Edge Security

Edge Security

Edge Security is an information security research and consulting firm of expert hackers.

Secure Blink

Secure Blink

Secure Blink provides automated application and API security solutions that empower developers and security engineers to protect critical assets from exploitation.

Token Security

Token Security

Token is the new approach designed for the identity boom era. Introducing Machine-First Identity Security.

Waterleaf International

Waterleaf International

Waterleaf provide advanced network and cybersecurity solutions - informed by data sciences. Transforming Connectivity, Security and Information for Municipalities, Government & Enterprise.

Merlin Ventures

Merlin Ventures

Merlin Ventures is a strategic investor focused on driving growth and value for cybersecurity software companies with market-leading potential.

Computer Futures

Computer Futures

Computer Futures are a global specialist IT recruitment partner, matching candidates with roles across niche IT markets and core technologies.

DataGuard

DataGuard

DataGuard is a security and compliance software company trusted by organisations across the globe.