Cybersecurity:
The Next Great Battlefield

Cyber Dilemma: Personal Privacy vs. Public Security

Cyber Dilemma: Personal Privacy vs. Public Security

On May 23, 2013, President Obama delivered a speech at Fort McNair, a military base where Americans have worn the uniform of their country since 1791. The long war against Muslim t...(full article)

Alamo Bowl Winners: UVA Cyber Defense Team

Alamo Bowl Winners: UVA Cyber Defense Team

In the third podcast, Carl Cannon & Andrew Walworth interview the winners of the 2018 National Collegiate Cyber Defense Competition (NCCDC), the University of Virginia Cyber De...(full article)

The Perils of Confusing Nuclear & Cyber Strategy

The Perils of Confusing Nuclear & Cyber Strategy

It seemed fitting, even at the time, that the vast carnage of World War II was finally ended by a weapon of such enormous destructive power that it altered mankind’s concept ...(full article)



Most Recent Articles

Cyberthreats Heighten U.S. Energy Vulnerability - James Marks, RealClearPolitics

In this series of articles running through July, RealClearPolitics and RealClearDefense take an in-depth look at the intersection of cybersecurity, technology, and warfare in the 2...

Let's Not Paper Over Election Security - Phil Stupak, RealClearPolitics

As our nation focuses on election security, an errant notion has emerged that paper-only balloting is some kind of panacea against potential threats. While it is vital to election ...

How the Boom in Cyber Insurance Could Cripple Global Finance - John Wasik, RealClearInvestigations

Nuance Communications, which provides speech and imaging software and operates in 35 countries, lost $68 million in revenue last fiscal year due to the attack, according to company...

How the Military Is an Impossible Place for Hackers - Josh Lospinoso, War on the Rocks

The U.S. military established Cyber Command almost a decade ago, but it fails to maximize its contributions to national mission. Struggles on all levels — from the polit...

Cyber Inertia: Destruction by Stagnation? - Justin Sherman, RealClearDefense

For years, American society has suffered from a serious bout of cyber inertia. That is, while some great thinkers have done much to advance cyber thought—in academia, governm...

Cyber in Movies Is Cool, But Can the Army Do It? - Mark Pomerleau, C4ISRNET

Leaders on an Army team that experiments with bringing cyber weapons to the battlefield say their top priority is managing commanders’ expectations. The Army is testing givin...

Is Cyber the Perfect Weapon? - Joseph Nye, Project Syndicate

For years, political leaders have warned of the danger of a Cyber Pearl Harbor. Thus far, however, cyber weapons seem to be oversold, more useful for signaling or sowing confusion ...

Cyber Conflict: What Comes Next? - David Sanger, RealClearPolitics

In the fifth and final video installment, Andrew Walworth asks his guest, David Sanger, author of The Perfect Weapon, War, Sabotage and Fear in the Cyber Age, about whether he is o...

Does Cyber Require a New Strategy? - David Sanger, RealClearPolitics

In the second video installment, Andrew Walworth and his guest, David Sanger, author of The Perfect Weapon, War, Sabotage and Fear in the Cyber Age, compare the current state of st...

Are We Already In a Cyber War? - David Sanger, RealClearPolitics

In the first video installment, Andrew Walworth and his guest, David Sanger, author of The Perfect Weapon, War, Sabotage and Fear in the Cyber Age, discuss the many forms of cyber ...

Business Needs Defense-Grade Cyber Capabilities - Sarah Pompei, RealClearPolitics

Today more than ever, people are accessing transportation, financial information, entertainment, health services and shopping in an instant on their phones, computers, and tablets....

Encryption Is the Key - Carl Cannon, RealClearPolitics

Although the bad blood between President Trump and James Comey helped shape our current contentious political environment, on one highly charged policy issue both men were in compl...

Intersecting Threats in Our Cyber-Connected World - Dee Smith, RealClearPolitics

Cyberattacks take many forms, but most are never seen. They fall into at least two general categories: those that seek to steal and those that seek to disrupt or destroy. The forme...

Cyber Chief Confirms 2016 'Stand Down' Against Russians - Michael Isikoff, Yahoo

Michael Daniel, Obama White House's chief cyber official testified that proposals he was developing to counter Russia's attack on the U.S. presidential election were put on a back ...

Cyber Security in the Cloud: One or Multiple Cloud Service Providers? - William Schneider, RealClearDefense

The inconsistent security protocols across the federal government's decentralized IT architecture have made its entire information system a particularly inviting target for attacks...

Our Infant Information Revolution - Joseph Nye, The Strategist

It is frequently said that we are experiencing an information revolution. But what does that mean, and where is the revolution taking us? Information revolutions are not new. In 14...

Training Cyberspace Maneuver - Andrew Schoka, Small Wars Journal

The principle of maneuver in military operations has dominated strategic military thinking for over two thousand years. Foundational to the understanding of maneuver theory is the ...

From Russia, With Malice - Carl M. Cannon, RealClearPolitics

Four summers ago, over the skies of eastern Ukraine, the twisted fragments of a disintegrating Boeing 777 plummeted to earth....

Forum: Addressing Cyber Deficiencies Would Fuel Job Growth - Alexander Stern, RCP

Our technology seems to be slipping out of our hands. We are increasingly unable to anticipate its dangers and guard against its misuses. In 2016, we failed to keep our elections a...

This Administration Must Lead on Cyber - Patrick Gaul, The Hill

Patrick Gaul is executive director of the National Technology Security Coalition (NTSC) The recent departure of Tom Bossert, coupled with the announcement that Rob Joyce would be r...

How to Protect the Private Sector from Cyber Attacks - Constance Douris, RCP

Recently, a malware called Trisis was discovered that was specifically designed to access controls and cause leaks or explosions and sabotage an electric company’s industrial...

Congress, Worried About Cyber? Fill a Key DOJ Position - Megan Brown, RCP

Political inaction threatens to undermine our country’s cyber agenda at time of unrelenting threats....

The Navy's Cyber War Breakthrough - Kris Osborn, Warrior Maven

Algorithms calling upon advanced AI are being used to quickly access vast pools of data to perform real-time analytics designed to detect patterns and anomalies associated with mal...

Russian Troll Farm Hijacked American Teen Girls' Computers for Likes - Kevin Poulsen, The Daily Beast

Online propaganda was phase one. Then came hijacking computers. The Kremlin-linked Russian troll farm known as the Internet Research Agency took an ominous detour into ma...

Digital Photocopiers Loaded With Secrets - Armen Keteyian, CBS News

At a warehouse in New Jersey, 6,000 used copy machines sit ready to be sold. CBS News chief investigative correspondent Armen Keteyian reports almost every one of them ho...

Bolton Pushing to Eliminate White House Cyber Job - Eric Geller, Politico

President Donald Trump’s national security team is weighing the elimination of the top White House cybersecurity job, multiple sources told POLITICO — a move that would...

Meeting the Cyber Skills Gap - M. Anthony Mills, RealClearPolitics

Start with a truism: There is a gap between the demand for technical skills in the modern economy and the supply of workers who possess those skills. Employers cannot find enough q...

Are We Really Ready for a Cyberattack? - Max Brooks, Bloomberg

Threats are growing by the day. And yet the U.S. has no master plan for responding....

Thinking Through an Attack on Our Electric Grid - Neil Chatterjee, Washington Examiner

Imagine for a moment what a prolonged electrical outage would look like for families and communities across America....

Episode 2: Cybersecurity - The Next Great Battlefield - Andrew Walworth, RealClearPolitics

In the second podcast, Andrew Walworth discusses how war is waged and won in cyberspace with Christian Liflander, who serves as the senior cyber policy official of NATO’s int...

Cyber Adversaries: It's Not Just Russia - Joel Weickgenant, RealClearPolitics

The first great cyberattack of the century was a deliberate, targeted and slow-moving affair. It was a sophisticated operation tailored toward a specific tactical outcome to serve ...

High Tech and Government: A Culture Clash - Carl Cannon, RealClearPolitics

Six years ago, while describing the inexorable march of progress, President Obama casually slandered one of his predecessors, Rutherford B. Hayes. In Obama’s telling, Hayes w...

Cyber-Espionage Is Shifting World Power Dynamics - Carl Cannon, RealClearPolitics

“Cybersecurity: The Next Great Battlefield” is a four-part podcast that explores this new front in 21st-century warfare, including how governments and shadowy players a...

Cities Held For Ransom - Lessons From Atlanta's Cyber Extortion - Dante Disparte, Forbes

Time has run out on the city of Atlanta to respond to cyber extortionists who have successfully crippled several critical systems across the city. From first responders like the po...

Episode 1 - Cybersecurity: The Next Great Battlefield Podcast - Carl Cannon, RealClearPolitics

In the first podcast, RCP Washington Bureau Chief Carl Cannon focuses on cyber crime with James Lewis of the Center for Strategic and International Studies. He then spotlights Liza...

Should Paying Ransom to Hackers Be a Federal Crime? - Megan McArdle, Wash Post

Atlanta is under attack. Hackers have seized control of many of the city’s computers and are demanding a ransom of $51,000 in bitcoin to release them. Police office...

Someone Is Watching You - Mitch Daniels, Washington Post

Isn’t technology wonderful? At Purdue University, the same IT infrastructure that enables us to manage student assignments and grades, operate residential and dining faciliti...

U.S. Corporations Need Military-Caliber Cybersecurity Capabilities and Methods - Michael Marks, Morning Consult

Today’s cyberthreat landscape presents unprecedented risks to the nation’s private sector and to our economic security. Major security breaches, some of them state-spon...

GOP Chair Urges Passage of Homeland Security Cyber Legislation - Morgan Chalfant, The Hill

Bill would reorganize, rename office tasked with securing critical infrastructure from cyberattacks....

Preparing for Warfare's Fifth Domain - David Craig, RealClearPolitics

Nearly four decades ago, Ronald Reagan ran for president vowing to upgrade U.S. armed forces on land, sea, and in the air. Thirty-five years ago this month, even as he made good on...

The Attacker Has the Advantage in Cyberspace. Can We Fix That? - Jason Healey, The Cipher Brief

It is not news that cyberspace is insecure. Attackers have had the advantage over defenders for not just years, but decades. Quotes from decades ago make it clear that cyber defend...

Who Says Cyber Warriors Need to Wear a Uniform? - Butch Bracknell, Modern War Institute

Gallons of ink have been spilled since the Department of Defense began exploring plans to permit cyber-qualified information technology specialists to join the military at ranks ab...

Cyber-Enabled Economic Warfare: Assessing US Strategy - Mercy A. Kuo, The Diplomat

Without a concerted effort, the United States economy will become increasingly vulnerable to hostile adversaries seeking to undermine our military and political strength. While ana...

How DoD Can Integrate Cyber Into Battle Plans - Mark Pomerleau, Fifth Domain

The Department of Defense is continuing to ingrate cyber planning and effects into traditional military operations as Cyber Command nears elevation to a unified combatant command.O...

Why the U.S. Is More Vulnerable to Cyberattack - Ross Rustici, Warrior Maven

In January of this year there was significant press about how the Department of Defense was considering nuclear retaliation for a cyber attack. The Joint Chiefs of Staff pushed bac...

Russians Are Hacking Our Electric Grid. What's the Plan? - Suedeen Kelly, USA Today

There can no longer be any doubt: In a warning issued March 15, the Department of Homeland Security and the FBI confirmed that Russian hackers have infiltrated the U...

Cyber Threats to the Aviation Industry - Constance Douris, RealClearDefense

There are 5,000 planes in U.S. skies at any given time, and most aircraft operations rely on software. As the air travel industry has become dependent on information and communicat...

Cyberthreats: Vexing New Front in Modern Warfare - Carl M. Cannon, RealClearPolitics

On the morning of September 11, 2001, Leon Panetta was testifying to a House committee about the health of Earth’s oceans when he was handed a note informing him about the at...

How We Can Protect Our Votes From Election Hacking - Buell, DeMillo & Hoke, USAT

The first ballots of the 2018 mid-term elections will soon be cast, but many Americans will exercise this constitutional right without much confidence that their votes will be...

Navy Beefing Up At-Sea Enterprise Network - Vivienne Machi, National Defense Magazine

SAN DIEGO — The Navy is working to make its enterprise networks more agile and easily updated as the service prepares for future multi-domain conflict with near-peer competit...

ODNI Common Cyber Threat Framework - Robert Zager & John Zager, Small Wars Journal

A Common Cyber Threat Framework: A Foundation for Communication (Cyber Threat Framework) is a new cyber security analytical framework published by the Office of the Director of Nat...

The US military could begin drafting 40-year-old hackers - Bryan Clark, The Next Web

A document set to be published in the Federal Register later this week outlines a series of possible tweaks to selective service requirements, including allowing men and women with...

How Will New Cybersecurity Norms Develop? - Joseph S. Nye, The Strategist

Last month, United Nations Secretary-General António Guterres called for global action to minimize the risk posed by electronic warfare to civilians. Guterres lamented that ...

The 'Greek Tragedy' of Cyber Security - Thomas Donahue, The Cipher Brief

Cyber events of the past two years—perpetrated by state actors in several notable cases, according to public statements by the U.S. and British Governments&mda...

Balance and Power of Cyber Partnership - Jason Healey, The Cipher Brief

Everyone loves public-private sector partnerships (PPPs).For over 20 years, these initiatives have been critical to a range of cybersecurity solutions. Perhaps 85 percent of the cr...

How To Recruit Young Cyber Warriors - Colin Clark, Breaking Defense

COLORADO SPRINGS: One topic dominates just about every conversation here at the AFCEA cyber symposium: where to find promising cyber warriors and how to hire them and kee...

False Flags in Cyberspace - Levi Maxey, The Cipher Brief

Bottom Line: In the digital age, determining the origins of cyberattacks is already difficult, but cyber actors can further muddy attribution by diverting blame for attacks to othe...

U.S. Cyber Command: An Assiduous Actor, Not a Warmongering Bully - Max Smeets, The Cipher Brief

Jason Healey recently posted an interesting piece on The Cipher Brief, US Cyber Command: “When faced with a bully…hit him harder.” Healey writes: &ldqu...

The Cyber-Luddites Are at It Again - Michael Nordeen, RealClearDefense

Defense News recently reported that the Department of Defense (DoD) is considering a cell phone ban at the Pentagon. The report further suggests a potential ban could include other...

Data Breaches Pose New Threat to Juveniles - Megan Reiss & Nila Bala, RealClearPolicy

We all know drugs, guns, and junk food are bad for kids. But now, children — specifically those involved in the juvenile justice system — are subject to a new dang...

Marine Corps Unveils New Cyber Job Field - Shawn Snow, IndeOnline

The Marine Corps on Thursday approved the creation of a new cyber occupational field as the force continues to adapt to new emerging threats and an increasingly hostile i...

Army Looking to Award Electronic Warfare Drone Contract - Mark Pomerleau, C4ISRNET

As part of an Army plan to rebuild its electronic warfare capabilities, the service plans to award a major contract later this year that would bolster EW capabilities.The contract ...

Narrative Warfare - Ajit Maan, RealClearDefense

While the art of non-kinetic warfare is as old as the hills, the alacrity and multi-dimensional strategy of the attacks generated by adversaries of the U.S. and her allies to creat...

U.S. Cyber Command: 'When Faced With a Bully...hit Him Harder.' - Jason Healey, The Cipher Brief

In Washington, there may be division and confusion about how to deal with Russian cyber-based interference. But 25 miles north, at Fort Meade, home of U.S. Cyber Command, they are ...

Game On: Getting American Power Back in the Field - Nate Freier, War Room

With William “Trey” Braun, Albert Lord, Jr., Lieutenant Colonel Michael Hatfield, Lieutenant Colonel James Hayes, and Lieutenant Colonel Andrew Ulmer.A real e...

What the Budget Request Explains About Cyber Command's Goals - Mark Pomerleau, Fifth Domain

The Department of Defense's budget process makes it difficult, if not impossible, to determine specifically how combatant commands request to spend their money.Cyber Command reques...

The Army Is Integrating Cyber, EW Teams Into Bcts - Todd South, Army Times

Years of training led Army Cyber Command to develop expeditionary cyber-electromagnetic teams that can be tailored to the needs of brigade commanders for specific mission...

The Low-Tech Secret to Cyber Resilience - Andreas Kuehn, RealClearDefense

War Books: Cybersecurity and Information Warfare - Crispin Burke, Modern War Institute

In the twenty-first century, battles won't just be fought on land, at sea, and in the air—they'll also be fought in cyberspace. Cyber enemies are everywhere—North Korea...

The Air Force Wants to Develop a 'Cyber Carrier' - Mark Pomerleau, Fifth Domain

Much like traditional military capabilities have platforms from which to launch attacks, Cyber Command and the services' cyber components need a comparable platform.This effort und...

Navy Wants Permission to Bring in New Cyber Sailors in at Higher Ranks - John Grady, USNI News

The Navy continues to ask Congress for more flexibility to bring in, keep with selective rewards for talent and promote to higher rank its officers to better compete in the career ...

When Might Cyber Command and the NSA Split? - Mark Pomerleau, Fifth Domain

Already tasked with making Cyber Command a full unified combatant command, national security leaders are working on a separate, but parallel effort: splitting of the dual hat relat...

Believe Me, Encryption Keeps Us Safe - Robby Mook, The Guardian

How the Army Is Spending in Information Operations - Mark Pomerleau, C4ISRNET

After admittedly having stepped away from information operations after the Cold War, the joint force is looking to reinvest in capabilities, training and experimentation to figure ...

A Nationalized 5G Network as Counter to China? - Don Tse, RealClearDefense

Navy Pivots to 'Decentralized' Approach to Cloud Migration - Jared Serbu, Federal News Radio

Two years after it decided to consolidate the management of its data center consolidation and cloud migration operations into one office because its migrations to the commercial cl...

Pentagon Could Impose New Cyber Regulations on Industry - Vivienne Machi, National Defense Magazine

SAN DIEGO — The Defense Department may take larger steps to ensure industry partners and their suppliers practice proper cyber hygiene as it looks to better secure its i...

Russia's Disinformation Offensive - Clifford D. May, Washington Times

Just so there's no confusion: This column is not about Americans conspiring or colluding or coordinating with Russians. That's a separate controversy about which I don't have a lot...

Too Busy To Train? The Navy's Cyber Dilemma - Sydney Freedberg, Breaking Defense

SAN DIEGO: The Navy's overworked IT teams need new “virtual training tools” and more time to train, especially for all-out cyber/electronic warfare against a ...

New Global Competitive Model: Cyber and Asymmetrical Hybrid Warfare - T. Casey Fleming, Eric L. Qualkenbush & Anthony M. Chapa, Cyber Defense Review

IntroductionImagine if Pearl Harbor had been attacked and there had been no response from Washington.This is the actual case today due to a highly sophisticated, mature, and stealt...

Cyber Assault on U.S. Electric Grid, Think Hurricane Ravaged Puerto Rico - Constance Douris, Forbes

If a mass power outage were to result from a successful cyberattack on the electric grid, national security and economic stability would be threatened. This is because hospitals, b...

Probing, Persistent Attacks Against Critical Infrastructure - Suzanne Kelly, The Cipher Brief

During times when the country expresses passionate opinions over the politics of the day, I wonder what U.S. adversaries focus on.One thing always in the back of my mind, as a form...

NATO's Crossed Swords Exercise Preps Cyber Warriors - Daniel Cebul, C4ISRNET

WASHINGTON ― NATO has concluded an exercise meant to prepare the alliance's cyber warriors for future cyber-kinetic operations has concluded. Crossed Swords 18 hosted 80 particip...

Dark Clouds Form Around the DoD's Data Strategy - Mytheos Holt, RealClearDefense

What is Hybrid Warfare? - Joshua Stowell, Global Security Review

Conventional Western concepts of war are incompatible and fundamentally misaligned with the realities of conflict in the twenty-first century. The emergence of a unipolar post...

Understanding the 'IN' in COIN - Dean Shumate, Small Wars Journal

After the Vietnam War, it has been apparent that the Department of Defense (DOD) wanted to ignore any counterinsurgency (COIN) lessons learned. It was as if the DOD wanted to downg...

Electronic Warfare Trumps Cyber For Deterring Russia - Sydney Freedberg, Breaking Defense

CENTER FOR STRATEGIC & INTERNATIONAL STUDIES: NATO's plans to defend the Baltic States are “inadequate” because they don't take full account of Russia's electronic ...

Foreign Intelligence and Strava's 'Global Heatmap' - Tom Uren, The Strategist

Six Cyber Threats to Really Worry About in 2018 - Martin Giles, MIT Technology Review

Hackers are constantly finding new targets and refining the tools they use to break through cyberdefenses. The following are some significant threats to look out for this year.The ...

We're at Cyberwar. And the Enemy Is Us - David Von Drehle, Washington Post

Russia's Worrisome Push to Control Cyberspace - David Ignatius, Washington Post

Overview

In this series of articles scheduled to run from mid-March to July, RealClearPolitics and RealClearDefense will take an in-depth look at the intersection of cybersecurity, technology, and the warfare of the 21st century. The series will examine how the world’s leaders are using cyber-espionage to fundamentally shift international power dynamics.

#CyberSecure

Receive Updates

Sign up to receive email notifications of newly published articles.

Topics

Battlefield of the 21st Century - An Overview
Cyberthreats: Vexing New Front in Modern Warfare

Cybersecurity Issues Facing the Trump Administration
Preparing for Warfare's Fifth Domain

Cyber Podcast
Episode 1 - The Cost of Cyber Crime

The Silicon Valley-D.C. Divide
High Tech and Government: A Culture Clash

China, Korea, Iran, and Who-Knows-Else
Cyber Adversaries: It's Not Just Russia

Cyber Podcast
Episode 2 - NATO and the Next Great Battlefield

Cybersecurity Skills Gap
Meeting the Cyber Skills Gap

Protecting Critical Infrastructure
To Protect Private Sector, Multilayered Strategies Are Needed

Interview with Gen. Michael Hayden

Latest Tweets