Multiple Perspectives on Security

Security Journal

Subscribe to Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Security Journal Authors: Mehdi Daoudi, John Walsh, Liz McMillan, Elizabeth White, Pat Romanski

Related Topics: Cloud Computing, Security Journal, Internet of Things Journal

Blog Post

Global Net Superiority: Preparing for NANOKRIEG© By @JamesCarlini | @ThingsExpo #IoT

Cyber warfare is not a futuristic theory being discussed on one of the military channels by some obscure software architect

"The United States has had Air superiority since 1947. Its military has shown dominance on the land, sea and in the air for decades, but what about having Global Net Superiority today - and tomorrow?" - James Carlini

Cyber warfare is not a futuristic theory being discussed on one of the military channels by some obscure software architect anymore. It is a common occurrence in today's global economy and it appears some are trying to test the electronic defenses we have set up on the Internet.

The question becomes, are we susceptible to a cyberattack? How much would we lose in a cyberattack? Would the damages be even greater than in a war waged with conventional weapons and/ or atomic weapons? That would be a great discussion.

We continue to spend billions of dollars on physical weapon systems for traditional land, air and sea battles, but how much are we spending on electronic cyber defenses? Should we be spending our money in a different direction? Are we going to fight the next war on land and in the air, or on the Sea? Or, it is going to be electronically?

I think it is going to be something totally different compared to what the traditional "military experts" are thinking. Terrorist countries don't have the resources to build multi-billion dollar ships and billion dollar planes. They do have the talent to build viruses, Trojan horses, and other types of destructive software needed to bring down systems and total economies. And, these types of weapon systems can act in a fraction of a second to take hold. Hence, the new term, Nanokrieg©: War in less than microseconds.

Compared to Blitzkrieg (the Lightning War strategy) of the Second World War, the inventions of new software-based weapons have made many traditional weapons systems and platforms obsolete. NANOKRIEG©, the "under microsecond" war will be the next big conflict. Are we prepared, both militarily and from a national homeland security defense perspective?

"Quickness is the essence of the war." - Sun Tzu

Today, more organizations are looking at security breaches and intrusions into their operations. These compromises are occurring not only in the private sector, but government agencies as well. Both have been broken into and information has been stolen.

Full data base and applications security is a must have, not a hoped for. In some cases, Chief Security Officers (CSOs) in some organizations have not been earning the checks they have been cashing.

From Platform for Commerce, to Framework for War
The US Army of Engineers recently referenced my definition, the "Platform for Commerce", which defines infrastructure and economic growth and their impact on regional economic viability. It is a framework was first developed for my white paper, "Intelligent Infrastructure: Securing Regional Sustainability", for the US Department of Homeland Security (2009) defining all the layers of infrastructure built up in the last 5,000 years with the latest layer focusing on Broadband Connectivity.

Now, there needs to be a framework defining the military infrastructure, its current strategies, and tactics and how they combine to successfully defend against all types of threats and potential conflicts in the layers defined in MINDSET. (See Chart 1)

Visualizing Intrusion-Proof Intelligent Infrastructure
If we look at the CYBER layer of the MINDSET framework, it is critical to adopt standards in order to move forward to build critical elements of intelligent infrastructure and be able to communicate with those in different disciplines to develop and insure a solid, resilient defense.

Cloud computing, the Internet of Things (IoT), the Internet of Everything (IoE), 5G Networks, and other cutting-edge concepts will not materialize successfully in the future, if the supporting infrastructure is not solid and resilient against attacks. If it does have gaping holes in its defensive architectural framework against cyberattacks and EMP, it will fail.

"Air Superiority" is a concept well-established and totally accepted as a critical strategy in the military foundation in the Department of Defense. "Global Net Superiority" and its implications of having a resilient, intelligent infrastructure impervious to cyberattacks must also have that same amount of clarity of understanding and acceptance by the Department of Defense and Department of Homeland Security as well.

(More details will be discussed in an upcoming book.)

Carlini's current visionary book, LOCATION LOCATION CONNECTIVITY is available on Amazon.

Follow daily Carlini-isms at www.TWITTER.com/JAMESCARLINI

More Stories By James Carlini

James Carlini, MBA, a certified Infrastructure Consultant, keynote speaker and former award-winning Adjunct Professor at Northwestern University, has advised on mission-critical networks. Clients include the Chicago Mercantile Exchange, GLOBEX, and City of Chicago’s 911 Center. An expert witness in civil and federal courts on network infrastructure, he has worked with AT&T, Sprint and others.

Follow daily Carlini-isms at www.twitter.com/JAMESCARLINI

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.