Cyber Warriors Need Not Be Soldiers

By Jeremy Hsu | March 8, 2015 9:58 pm
The Cyber Operations Center on Fort Gordon, Ga., is home to signal and military intelligence non-commissioned officers, who watch for and respond to network attacks from adversaries as varied as nation-states, terrorists and "hacktivists." Credit: Michael L. Lewis

The Cyber Operations Center on Fort Gordon, Ga., is home to signal and military intelligence non-commissioned officers, who watch for and respond to network attacks from adversaries as varied as nation-states, terrorists and “hacktivists.” Credit: Michael L. Lewis

Throughout history, warriors of all cultures have trained their bodies to endure physical hardship and combat, whether they wielded swords and shields or carried guns and ammunition. In the 21st century, countries such as China and Estonia have recruited a new breed of warriors who fight as part of cyber militias rather than as official military personnel in uniform. Such cyber warriors often represent civilians with high-tech jobs who spend their days tapping away at keyboards rather than practicing how to accurately shoot an assault rifle or pass fitness tests. A number of U.S. military officers and national security experts say that the United States also needs to begin recruiting tech-savvy civilians without requiring them to become traditional soldiers.

The U.S. military has trained a growing number of uniformed cyber warriors. But it faces a special challenge in recruiting a certain caliber of computer professionals who would rather work at high-paying jobs in Silicon Valley than enlist for military service. That issue came up during a session of the “Future of War” conference hosted by the New America Foundation on Feb. 25, when an audience member asked a panel of experts if the U.S. should “militarize” the country’s technological talent and resources in Silicon Valley.

“Somebody who is high on Coke, skittles and slinging code is not a good candidate for basic training,” said Brad Allenby, professor of engineering and ethics at Arizona State University, in response.

Giving Up Guns for Computers

U.S. military generals have previously echoed Allenby’s sentiment in less colorful terms. Lt Gen Robert Brown, commander of the U.S. Army Combined Arms Centre at Fort Leavenworth, spoke about the challenge of recruiting individuals with cyber skills who were “not natural candidates for a military career” during a previous New America Foundation event in December, according to The Telegraph. The general talked about possibly lowering or removing the physical and combat training standards for cyber warriors.

“They grew up on Google and wear ponytails,” Lt Gen Brown said. “We need to look at ways to bring them into the Army without necessarily going through the same training procedures as our combat troops.”

One possible approach was voiced by Lt Gen Edward Cardon, commanding general for United States Army Cyber Command. Lt Gen Cardon talked about the long-term goal of recruiting 30 percent of the U.S. Army Cyber Command’s talent from civilians through a two-year career field. He spoke during another New America Foundation conference called “Cybersecurity for a New America” on Feb. 23

The U.S. is not alone in trying to ease military training standards for cyber warrior recruits. The U.K.’s Ministry of Defense plans to waive physical fitness requirements on a case by case basis for a new cyber reservist unit made up of 500 computer professionals, according to The Telegraph. Such reservists will also be exempt from carrying weapons or being deployed abroad.

That U.K. approach may prove more appealing for computer experts than serving as a traditional military reservist. But Peter Singer, a strategist and senior fellow at the New America Foundation, suggested that U.S. should consider a civilian militia approach that exists outside the traditional military. During the Future of War conference, Singer pointed to the Estonian Cyber Defense League as a leading example.

“The Estonia model is more like a militia model or a civil air patrol model where you’re pulling in experts but not dropping them into a formal military organization,” Singer said.

You’re in the Cyber Militia Now

Estonia formed the Estonian Cyber Defense League after suffering from cyber attacks during a 2007 incident involving tensions with Russia. The hackers behind the 20o7 cyber assault launched Distributed denial of service (DDoS) attacks that targeted Estonia’s reliance upon Internet service for a fully-functional government and economy. The cyber attacks disrupted credit card and automatic teller transactions for several days, took down the government’s parliamentary email server and crippled the IT capabilities of government ministries.

As a paramilitary organization, the Estonian Cyber Defense League includes some of the country’s best information technology and security professionals from both the public and private sectors, according to LTC Scott Applegate, author of a 2012 paper titled “Leveraging Cyber Militias as a Force Multiplier in CyberOperations.” Such a cyber militia provides motivated civilians with a way to serve in times of crisis without having to formally join the military.

Still, Singer observed that the U.S. Department of Defense and defense contractors might hesitate at the idea of a cyber militia intruding on their turf. He also pointed out that Silicon Valley remains largely distrustful of the U.S. national security establishment, especially after Edward Snowden’s leaks of National Security Agency files revealed widespread surveillance of the Internet and cellular networks. That culture gap means many computer professionals many not be so eager to heed Uncle Sam’s call to become cyber warriors.

The U.S. has already fallen behind the times in recruiting either a cyber reservist force or cyber militia. China has organized a civilian cyber militia to support its military since 2005; even earlier than the Estonian Cyber Defense League. The Chinese cyber militia consists of “workers with high-tech day jobs” who “focus on various aspects of military communications, electronic warfare, and computer network operations,” according to the annual report by the U.S.-China Economic and Security Review Commission released in 2012.

CATEGORIZED UNDER: technology, top posts
  • Uncle Al

    the same training procedures as our combat troops” Management enforces rules, counts things , and avoids risk. Discovery is insubordination. Is this the winning strategy? Everything is roach-infested, including nuclear submarines.

    Our enemies feed roaches while we inspect shopping bags with ISO9000x reportage. If the confluence of overwhelming ignorance with overweening arrogance got us into this mess, why can’t it get us out? Explore closely supervised DCF/ROI managerial studies.

    The U.K.’s Ministry of Defense plans to waive physical fitness requirements on a case by case basis for a new cyber reservist unit ” “It doesn’t matter whether a cat is white or black, as long as it catches mice,” Deng Xiaoping. Our enemies have upped their standards; up ours.

  • Kompani

    Do we need more and more ways to kill people? Today is the anniversary of America dropping napalm on Tokyo and killing 100,000 civilians, haven’t we leaned anything? (

    • Uncle Al

      haven’t we leaned anything?” We learned that Curtis LeMay was not talking to Japan in a convincing manner. One must grok the opposition to meaningfully communicate,

      06 August Hiroshima was not convincing, nor 15 August 1945 Nagasaki entirely conclusive. Radiation poisoning from the first drop was eloquent.

  • saraboulos

    Does vpn prevent ddos and cyberattacks on my entertainment devices?

    • Rakesh Khushwaha

      VPN didn’t prevent ddos and cyber attacks. VPN will help you to browse restricted website in your country.

    • Lydia Walker

      Yes, they do. A VPN allows users to surf the web using an anonymous IP Address. AS this information is crucial for a DDoS attack, the use of a VPN should offer protection from DDoS attacks.Use a VPN provider such as Ivacy that uses the best protocols to deliver their service while using a little of your mobile data as possible. Plus it also prevents cyber attacks, Users simply log into their VPN via special credentials to access a series of discrete networks or computers that encrypt their data. All information is transmitted only under that VPN’s cloak of anonymity, rendering it inaccessible to hackers, snoops, and government entities alike.

      • jack jox

        or if you are using geo restricted kodi addons

  • serdavos

    Fusion Kodi:- We are aware how amazing Kodi is when it comes to multimedia services. It enables us to explore the world of entertainment with ease. The best part about Kodi is its ability to work with add-ons. Add-ons work like the extension for Kodi. They improve its capacity. By default Kodi comes with a limited add-on that just helps Kodi to shape its usability but to get the best experience, it is imperative to select the best possible addon that suits your need. There are multiple add-ons available in the market that you can try according to your desires, but in this article, I would be guiding you to use and install Fusion addon on Kodi. Fusion Kodi is a must-have addon.

  • serdavos

    These are some of the reasons why countries like the UK banned this platform. Due to this ban, users have turned their focal attention to finding proxies and alternatives for the brilliant platform. Users are working on finding workable VPNs to access 123Movies website and have scattered their searches over the following phrases; 123movies proxy, 123movies proxy list, 123 movies proxy uk, 123 movies proxy ru, 123movies proxy server list, 123movies proxy unblocked, 123movies proxy twitter, 123movies proxy server, 123movies proxy india, 123movies proxy site, proxy and proxy. These phrases and search terminologies go on to explain the need for its alternatives and how people had become dependent on this important platform that created enough wildfire to blow Westeros (Pun Intended).

  • serdavos

    AceStream multimedia player is capable of capturing video from several different sources, synchronizing it with external audio and also of supporting subtitles.

    The user can even add logos or even watermarks and capture frames. It supports most of the audio and video formats which includes AVI, WAV, MKV and other without the need of installing codecs. To run it on MacOS, we need to install another software called SODA PLAYER, which is one of the best in the market right now.

    The developer team finally released a version of the application that supported AceStreams few months ago. They used the latest AceStream engines, not the one that comes with the famous KODI addon. Early test indicated that the casting is better/more stable than the official AceStream app, even on windows. Great application where finally AceStream on Mac + HEChromeCast was supported.

    It Works like a charm! The only other options for Mac users was super sketchy, which is not a favorite with users.

  • serdavos

    Exodus Kodi has changed hands a few times. Previously, it was transferred over to the TV Add-ons site and development team. However, now that TVADDONS has removed all gray area add-ons, Exodus can be found in a few different repositories. Exodus Kodi firestick was pretty popular.

    However, all noteworthy add-on developers have officially dropped support for Exodus. Although a formerly discontinued Github account, lewblack125, had reappeared and was adding updated versions of various add-ons, including Exodus, they themselves said that sometimes Exodus Kodi not working might happen.

  • serdavos

    Why Spotify you ask? Well, there is a reason why it is one of the most famous music streaming and downloading app. The UI is so beautiful and cool. Everyone loves cool looking dark UIs. As well as the features. It has a lot of awesome features which you won’t find in any other app. Why Spotify Premium APK and not the normal one? Well, because there are some important features that the premium apk has but the free one doesn’t.

  • serdavos

    Video editing on Windows PC is easy as compared to the Android because there are not much good video editors for Android. Fortunately, VivaVideo Pro APK is one of the finest video editors for Android which has a lot of features. It is supported on Android Gingerbread version and above.

    It has both Free and Paid Versions available on the Google Play store. The free version has fewer features as compared to the paid version. One of the biggest Con of Free Version is that it displays Watermark on Edited Videos.

  • niga higa

    Dolby Atmos is a new audio layout for creating and playing back multichannel movie soundtracks. It changed into developed to provide film sound a greater three-dimensional effect. traditional five.1- and 7.1-channel surround setups supply fascinating sound the usage of speakers located all around your room. Dolby Atmos apk.Dolby Atmos takes this to every other degree with speakers to create a “top” layer of sound above the listener.

  • niga higa

    NEKKI’s Shadowfight3 is the 0.33 launch of their Shadow combat series of fighting video games. For what began out as a fb flash-based totally recreation has now moved directly to cellular for the reason that release of Shadow combat 2. For the most part, you could count on Shadow fight three to have a few high-quality images and clean gameplay, however it’s far completely ruined by an exceptionally grasping upgrade path. Download Shadowfight 3 apk

  • Charles Grey

    Minecraft is a great sandbox game that Markus Persson created and Mojang later developed. games like minecraft main idea is simple; you just have to enter the world of 3D textures cube that entertains millions of people from all over the globe.

  • amulya katti

    Join Indian Army Women Recruitment 2018: In the year of 1992, the Indian army has opened the entry for the women as an officer in the military.

    Join Indian Army


Lovesick Cyborg

Lovesick Cyborg examines how technology shapes our human experience of the world on both an emotional and physical level. I’ll focus on stories such as why audiences loved or hated Hollywood’s digital resurrection of fallen actors, how soldiers interact with battlefield robots and the capability of music fans to idolize virtual pop stars. Other stories might include the experience of using an advanced prosthetic limb, whether or not people trust driverless cars with their lives, and how virtual reality headsets or 3-D film technology can make some people physically ill.

About Jeremy Hsu

Jeremy Hsu is journalist who writes about science and technology for Scientific American, Popular Science, IEEE Spectrum and other publications. He received a master’s degree in journalism through the Science, Health and Environmental Reporting Program at NYU and currently lives in Brooklyn. His side interests include an ongoing fascination with the history of science and technology and military history.


See More

Discover's Newsletter

Sign up to get the latest science news delivered weekly right to your inbox!

Collapse bottom bar