There’s an unseen world war that has been fought for years with no clear battle lines, few rules of engagement, and no end in sight.
But it’s not a shooting war; not a war where combatants have been killed or wounded — at least not yet.
It’s a war that pits nations against each other for dominance in cyberspace, and the United States, like other nations employing professional hackers as “cyber soldiers,” sees it as a battlefield just like any other.
You've reached your daily free article limit.
Subscribe and support our veteran writing staff to continue reading.
There’s an unseen world war that has been fought for years with no clear battle lines, few rules of engagement, and no end in sight.
But it’s not a shooting war; not a war where combatants have been killed or wounded — at least not yet.
It’s a war that pits nations against each other for dominance in cyberspace, and the United States, like other nations employing professional hackers as “cyber soldiers,” sees it as a battlefield just like any other.
“It’s like an operational domain: Sea, land, air, space, and cyber,” Charlie Stadtlander, chief spokesperson for US Army Cyber Command, told Tech Insider. “It’s a place where our presence exists. Cyber is a normal part of military operations and needs to be considered as such.”
As US military leaders warn of the growing progress of Russia, China, and North Korea in cyberspace, the Pentagon has ramped up its own efforts in what it calls the “cyber domain” after the release of a new cyber strategy in April 2015.
Read More- Tech Insider
Image courtesy of CBS News
Luigi Mangione, Suspect in UnitedHealthcare CEO Murder, Held in Custody in PA
Inside Delta Force: America’s Most Elite Special Mission Unit
Navy SEALs To Rally Behind Pete Hegseth in a March on Washington
Head Coast Guard Chaplain Removed Due To Knowledge of Sexual Misconduct
What Assad’s Downfall Means for Syria and the Middle East
Join SOFREP for insider access and analysis.
TRY 14 DAYS FREEAlready a subscriber? Log In
COMMENTS
You must become a subscriber or login to view or post comments on this article.