Cyber Warriors Need Not Be Soldiers

By Jeremy Hsu | March 8, 2015 9:58 pm
The Cyber Operations Center on Fort Gordon, Ga., is home to signal and military intelligence non-commissioned officers, who watch for and respond to network attacks from adversaries as varied as nation-states, terrorists and "hacktivists." Credit: Michael L. Lewis

The Cyber Operations Center on Fort Gordon, Ga., is home to signal and military intelligence non-commissioned officers, who watch for and respond to network attacks from adversaries as varied as nation-states, terrorists and “hacktivists.” Credit: Michael L. Lewis

Throughout history, warriors of all cultures have trained their bodies to endure physical hardship and combat, whether they wielded swords and shields or carried guns and ammunition. In the 21st century, countries such as China and Estonia have recruited a new breed of warriors who fight as part of cyber militias rather than as official military personnel in uniform. Such cyber warriors often represent civilians with high-tech jobs who spend their days tapping away at keyboards rather than practicing how to accurately shoot an assault rifle or pass fitness tests. A number of U.S. military officers and national security experts say that the United States also needs to begin recruiting tech-savvy civilians without requiring them to become traditional soldiers.

The U.S. military has trained a growing number of uniformed cyber warriors. But it faces a special challenge in recruiting a certain caliber of computer professionals who would rather work at high-paying jobs in Silicon Valley than enlist for military service. That issue came up during a session of the “Future of War” conference hosted by the New America Foundation on Feb. 25, when an audience member asked a panel of experts if the U.S. should “militarize” the country’s technological talent and resources in Silicon Valley.

“Somebody who is high on Coke, skittles and slinging code is not a good candidate for basic training,” said Brad Allenby, professor of engineering and ethics at Arizona State University, in response.

Giving Up Guns for Computers

U.S. military generals have previously echoed Allenby’s sentiment in less colorful terms. Lt Gen Robert Brown, commander of the U.S. Army Combined Arms Centre at Fort Leavenworth, spoke about the challenge of recruiting individuals with cyber skills who were “not natural candidates for a military career” during a previous New America Foundation event in December, according to The Telegraph. The general talked about possibly lowering or removing the physical and combat training standards for cyber warriors.

“They grew up on Google and wear ponytails,” Lt Gen Brown said. “We need to look at ways to bring them into the Army without necessarily going through the same training procedures as our combat troops.”

One possible approach was voiced by Lt Gen Edward Cardon, commanding general for United States Army Cyber Command. Lt Gen Cardon talked about the long-term goal of recruiting 30 percent of the U.S. Army Cyber Command’s talent from civilians through a two-year career field. He spoke during another New America Foundation conference called “Cybersecurity for a New America” on Feb. 23

The U.S. is not alone in trying to ease military training standards for cyber warrior recruits. The U.K.’s Ministry of Defense plans to waive physical fitness requirements on a case by case basis for a new cyber reservist unit made up of 500 computer professionals, according to The Telegraph. Such reservists will also be exempt from carrying weapons or being deployed abroad.

That U.K. approach may prove more appealing for computer experts than serving as a traditional military reservist. But Peter Singer, a strategist and senior fellow at the New America Foundation, suggested that U.S. should consider a civilian militia approach that exists outside the traditional military. During the Future of War conference, Singer pointed to the Estonian Cyber Defense League as a leading example.

“The Estonia model is more like a militia model or a civil air patrol model where you’re pulling in experts but not dropping them into a formal military organization,” Singer said.

You’re in the Cyber Militia Now

Estonia formed the Estonian Cyber Defense League after suffering from cyber attacks during a 2007 incident involving tensions with Russia. The hackers behind the 20o7 cyber assault launched Distributed denial of service (DDoS) attacks that targeted Estonia’s reliance upon Internet service for a fully-functional government and economy. The cyber attacks disrupted credit card and automatic teller transactions for several days, took down the government’s parliamentary email server and crippled the IT capabilities of government ministries.

As a paramilitary organization, the Estonian Cyber Defense League includes some of the country’s best information technology and security professionals from both the public and private sectors, according to LTC Scott Applegate, author of a 2012 paper titled “Leveraging Cyber Militias as a Force Multiplier in CyberOperations.” Such a cyber militia provides motivated civilians with a way to serve in times of crisis without having to formally join the military.

Still, Singer observed that the U.S. Department of Defense and defense contractors might hesitate at the idea of a cyber militia intruding on their turf. He also pointed out that Silicon Valley remains largely distrustful of the U.S. national security establishment, especially after Edward Snowden’s leaks of National Security Agency files revealed widespread surveillance of the Internet and cellular networks. That culture gap means many computer professionals many not be so eager to heed Uncle Sam’s call to become cyber warriors.

The U.S. has already fallen behind the times in recruiting either a cyber reservist force or cyber militia. China has organized a civilian cyber militia to support its military since 2005; even earlier than the Estonian Cyber Defense League. The Chinese cyber militia consists of “workers with high-tech day jobs” who “focus on various aspects of military communications, electronic warfare, and computer network operations,” according to the annual report by the U.S.-China Economic and Security Review Commission released in 2012.

CATEGORIZED UNDER: technology, top posts
  • Uncle Al

    the same training procedures as our combat troops” Management enforces rules, counts things , and avoids risk. Discovery is insubordination. Is this the winning strategy? Everything is roach-infested, including nuclear submarines.

    Our enemies feed roaches while we inspect shopping bags with ISO9000x reportage. If the confluence of overwhelming ignorance with overweening arrogance got us into this mess, why can’t it get us out? Explore closely supervised DCF/ROI managerial studies.

    The U.K.’s Ministry of Defense plans to waive physical fitness requirements on a case by case basis for a new cyber reservist unit ” “It doesn’t matter whether a cat is white or black, as long as it catches mice,” Deng Xiaoping. Our enemies have upped their standards; up ours.

  • Kompani

    Do we need more and more ways to kill people? Today is the anniversary of America dropping napalm on Tokyo and killing 100,000 civilians, haven’t we leaned anything? (

    • Uncle Al

      haven’t we leaned anything?” We learned that Curtis LeMay was not talking to Japan in a convincing manner. One must grok the opposition to meaningfully communicate,

      06 August Hiroshima was not convincing, nor 15 August 1945 Nagasaki entirely conclusive. Radiation poisoning from the first drop was eloquent.

  • saraboulos

    Does vpn prevent ddos and cyberattacks on my entertainment devices?

    • Rakesh Khushwaha

      VPN didn’t prevent ddos and cyber attacks. VPN will help you to browse restricted website in your country.

    • Lydia Walker

      Yes, they do. A VPN allows users to surf the web using an anonymous IP Address. AS this information is crucial for a DDoS attack, the use of a VPN should offer protection from DDoS attacks.Use a VPN provider such as Ivacy that uses the best protocols to deliver their service while using a little of your mobile data as possible. Plus it also prevents cyber attacks, Users simply log into their VPN via special credentials to access a series of discrete networks or computers that encrypt their data. All information is transmitted only under that VPN’s cloak of anonymity, rendering it inaccessible to hackers, snoops, and government entities alike.

      • jack jox

        or if you are using geo restricted kodi addons


Lovesick Cyborg

Lovesick Cyborg examines how technology shapes our human experience of the world on both an emotional and physical level. I’ll focus on stories such as why audiences loved or hated Hollywood’s digital resurrection of fallen actors, how soldiers interact with battlefield robots and the capability of music fans to idolize virtual pop stars. Other stories might include the experience of using an advanced prosthetic limb, whether or not people trust driverless cars with their lives, and how virtual reality headsets or 3-D film technology can make some people physically ill.

About Jeremy Hsu

Jeremy Hsu is journalist who writes about science and technology for Scientific American, Popular Science, IEEE Spectrum and other publications. He received a master’s degree in journalism through the Science, Health and Environmental Reporting Program at NYU and currently lives in Brooklyn. His side interests include an ongoing fascination with the history of science and technology and military history.


See More

Discover's Newsletter

Sign up to get the latest science news delivered weekly right to your inbox!

Collapse bottom bar