{"id":9873,"date":"2014-12-09T12:18:18","date_gmt":"2014-12-09T17:18:18","guid":{"rendered":"https:\/\/lexingtoninstitute.org\/?p=9873"},"modified":"2014-12-09T12:18:18","modified_gmt":"2014-12-09T17:18:18","slug":"prepare-for-cyber-armageddon","status":"publish","type":"post","link":"https:\/\/www.lexingtoninstitute.org\/prepare-for-cyber-armageddon\/","title":{"rendered":"Prepare For Cyber Armageddon"},"content":{"rendered":"

The United States is woefully unprepared to deal with the inevitability of a major cyber attack. Recent hacks of private companies such as Sony, Home Depot, Target and the like are warnings of greater\u00a0dangers to come; like the proverbial canary in the coal mine. These companies don’t represent critical infrastructure such as the power grid, banking system, food distribution and storage or air traffic control. A successful attack on any one of these could bring this country to its knees.<\/p>\n

The Internet was never intended to be secure. Neither is much of the software in use today by individuals, companies and even governments. As anyone with security software on their PCs or devices knows, they receive a continuous stream of updates as security companies such as McAfee strive diligently to stay abreast of the threat.<\/p>\n

Some progress has been made in the area of cyber defense, particularly by the Department of Defense. It created Cyber Command, a component of U.S. Strategic Command, to oversee and direct the activities and operations of the individual Service cyber\u00a0elements. Together with the Defense Information Systems Agency, Cyber Command is said to be doing a very good job securing defense networks. It also has developed very potent offensive capabilities that it doesn’t talk about.<\/p>\n

Unfortunately, the rest of government, state and local as well as federal, is not nearly as well protected as DoD. Neither is the private sector which owns and operates 85 percent of this country’s critical infrastructure. Cyber Command lacks the necessary authorities, not to mention sufficient resources, to enable it to defend the rest of the federal government much less the country as a whole.<\/p>\n

Some parts of the private sector do make an effort to secure their networks. But most companies either don’t know what to do, don’t want to spend the money or don’t even now see the necessity. This is why cyber security experts both inside and outside government\u00a0 like to speak about the possibility of a cyber “Pearl Harbor” as the necessary galvanizing event that will force the nation to address its vulnerability to cyber attack.<\/p>\n

In\u00a0a way, a\u00a0cyber Pearl Harbor is actually a comforting metaphor. To be sure, it\u00a0was a tragic event heralding U.S. involvement in a world war. But within six months, this country was on the offensive. Most of the ships sunk on December 7 were raised and rejoined the Fleet.\u00a0 The Arsenal of Democracy swung into high gear.<\/p>\n

Given how unprepared we are, a serious cyber attack may look more like Armageddon than Pearl Harbor.\u00a0 Prospective adversaries, including Iran and North Korea in addition to Russia and China, are reported to be assiduously working to penetrate the control systems for our critical infrastructure. Were they able to bring down our power grid, for example, the results would be catastrophic.<\/p>\n

It is vital that the United States develop the doctrine, operational concepts and capabilities to deter such attacks and, as necessary, defend the nation. This is as important, perhaps even more so, than deterring a nuclear strike on the homeland or defending against another 9\/11.<\/p>\n

 <\/p>\n","protected":false},"excerpt":{"rendered":"

The United States is woefully unprepared to deal with the inevitability of a major cyber attack. Recent hacks of private companies such as Sony, Home Depot, Target and the like are warnings of greater\u00a0dangers to come; like the proverbial canary in the coal mine. These companies don’t represent critical infrastructure such as the power grid, […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,8],"tags":[],"yoast_head":"\nPrepare For Cyber Armageddon - Lexington Institute<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lexingtoninstitute.org\/prepare-for-cyber-armageddon\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Prepare For Cyber Armageddon - Lexington Institute\" \/>\n<meta property=\"og:description\" content=\"The United States is woefully unprepared to deal with the inevitability of a major cyber attack. Recent hacks of private companies such as Sony, Home Depot, Target and the like are warnings of greater\u00a0dangers to come; like the proverbial canary in the coal mine. These companies don’t represent critical infrastructure such as the power grid, […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lexingtoninstitute.org\/prepare-for-cyber-armageddon\/\" \/>\n<meta property=\"og:site_name\" content=\"Lexington Institute\" \/>\n<meta property=\"article:published_time\" content=\"2014-12-09T17:18:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lexingtoninstitute.org\/wp-content\/uploads\/2015\/02\/lex_share.png\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Daniel Gour\u00e9, Ph.D.\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@LexNextDC\" \/>\n<meta name=\"twitter:site\" content=\"@LexNextDC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Daniel Gour\u00e9, Ph.D.\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lexingtoninstitute.org\/prepare-for-cyber-armageddon\/\",\"url\":\"https:\/\/www.lexingtoninstitute.org\/prepare-for-cyber-armageddon\/\",\"name\":\"Prepare For Cyber Armageddon - Lexington Institute\",\"isPartOf\":{\"@id\":\"https:\/\/www.lexingtoninstitute.org\/#website\"},\"datePublished\":\"2014-12-09T17:18:18+00:00\",\"dateModified\":\"2014-12-09T17:18:18+00:00\",\"author\":{\"@id\":\"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/0c1d5c3983542d8075721908012bed74\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.lexingtoninstitute.org\/prepare-for-cyber-armageddon\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lexingtoninstitute.org\/prepare-for-cyber-armageddon\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lexingtoninstitute.org\/prepare-for-cyber-armageddon\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.lexingtoninstitute.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Prepare For Cyber Armageddon\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lexingtoninstitute.org\/#website\",\"url\":\"https:\/\/www.lexingtoninstitute.org\/\",\"name\":\"Lexington Institute\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lexingtoninstitute.org\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/0c1d5c3983542d8075721908012bed74\",\"name\":\"Daniel Gour\u00e9, Ph.D.\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e98f7534865707f35c080691716b6a28?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e98f7534865707f35c080691716b6a28?s=96&d=mm&r=g\",\"caption\":\"Daniel Gour\u00e9, Ph.D.\"},\"url\":\"https:\/\/www.lexingtoninstitute.org\/author\/daniel-goure-ph-d\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Prepare For Cyber Armageddon - Lexington Institute","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lexingtoninstitute.org\/prepare-for-cyber-armageddon\/","og_locale":"en_US","og_type":"article","og_title":"Prepare For Cyber Armageddon - Lexington Institute","og_description":"The United States is woefully unprepared to deal with the inevitability of a major cyber attack. Recent hacks of private companies such as Sony, Home Depot, Target and the like are warnings of greater\u00a0dangers to come; like the proverbial canary in the coal mine. These companies don’t represent critical infrastructure such as the power grid, […]","og_url":"https:\/\/www.lexingtoninstitute.org\/prepare-for-cyber-armageddon\/","og_site_name":"Lexington Institute","article_published_time":"2014-12-09T17:18:18+00:00","og_image":[{"width":200,"height":200,"url":"https:\/\/www.lexingtoninstitute.org\/wp-content\/uploads\/2015\/02\/lex_share.png","type":"image\/png"}],"author":"Daniel Gour\u00e9, Ph.D.","twitter_card":"summary_large_image","twitter_creator":"@LexNextDC","twitter_site":"@LexNextDC","twitter_misc":{"Written by":"Daniel Gour\u00e9, Ph.D.","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.lexingtoninstitute.org\/prepare-for-cyber-armageddon\/","url":"https:\/\/www.lexingtoninstitute.org\/prepare-for-cyber-armageddon\/","name":"Prepare For Cyber Armageddon - Lexington Institute","isPartOf":{"@id":"https:\/\/www.lexingtoninstitute.org\/#website"},"datePublished":"2014-12-09T17:18:18+00:00","dateModified":"2014-12-09T17:18:18+00:00","author":{"@id":"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/0c1d5c3983542d8075721908012bed74"},"breadcrumb":{"@id":"https:\/\/www.lexingtoninstitute.org\/prepare-for-cyber-armageddon\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lexingtoninstitute.org\/prepare-for-cyber-armageddon\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.lexingtoninstitute.org\/prepare-for-cyber-armageddon\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.lexingtoninstitute.org\/"},{"@type":"ListItem","position":2,"name":"Prepare For Cyber Armageddon"}]},{"@type":"WebSite","@id":"https:\/\/www.lexingtoninstitute.org\/#website","url":"https:\/\/www.lexingtoninstitute.org\/","name":"Lexington Institute","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lexingtoninstitute.org\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/0c1d5c3983542d8075721908012bed74","name":"Daniel Gour\u00e9, Ph.D.","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e98f7534865707f35c080691716b6a28?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e98f7534865707f35c080691716b6a28?s=96&d=mm&r=g","caption":"Daniel Gour\u00e9, Ph.D."},"url":"https:\/\/www.lexingtoninstitute.org\/author\/daniel-goure-ph-d\/"}]}},"_links":{"self":[{"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/posts\/9873"}],"collection":[{"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/comments?post=9873"}],"version-history":[{"count":0,"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/posts\/9873\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/media?parent=9873"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/categories?post=9873"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/tags?post=9873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}