Experts: Military still catching up to the benefits of the Internet
The Internet and related technologies will bring even more upheaval to modern life, experts say
IDG News Service - If members of the U.S. military and their families have seen major changes in their lives because of the Internet and related technologies, then they should expect even more upheaval, a group of tech experts said Thursday.
The Internet isn't done changing the way people learn and are entertained and the way government works, said a group of panelists speaking to the National Military Family Association in Arlington, Virginia. The Internet will also create new security problems, as cybercriminals find ways to attack electric grids and water systems and as the Internet takes power away from national governments, said Michael Hayden, former director of the U.S. National Security Agency and the U.S. Central Intelligence Agency.
"You and I haven't caught up yet culturally ... with what this delivers to us," he said to the crowd, containing many senior military officials. "We're still trying to cope with the full potential of the information explosion."
Hayden, now a principal at security consulting firm the Chertoff Group, compared the changes brought by the Internet to the European discovery of the Western Hemisphere. "When have we seen something so disruptive to practically every aspect of human life?" he said. "This is a fundamental change."
Until the end of the 20th century, nearly all the important players on the global stage were nation states, Hayden noted. In the Industrial Age, "practically everything in national life" re-enforced the nation state, he said, but the Internet has changed the dynamic.
"In this era, practically all the external trends weaken the traditional unit of power, which is the nation state, and pushes power down ... to private enterprise and pushes power down even to individuals," he said.
The Internet has been "incredibly liberating and empowering for all of us," Hayden added. But it has also empowered cybercriminals and terrorists who wouldn't have raised concerned for national security officials a couple of decades ago, he said.
Hayden and Eric Schmidt, executive chairman of Google, also said they expect a growing reliance on cyberwarfare. The creation of the Stuxnet malware, which attacked devices used by the Iranian nuclear program, was the first shot in a new era of cyberwarfare, Hayden said. Many security experts believe the U.S. or Israeli governments created Stuxnet.
The Internet will not only transform the way governments wage war, but also the way government does other business, said Vivek Kundra, former CIO in President Barack Obama's administration. Kundra predicted "algorithmic regulations" that replace some traditional lawmaking by congressional bodies.
Smartphone users can already petition the government in a "digital public square," said Kundra, now executive vice president for emerging markets at Salesforce.com. In the future, algorithmic regulations will move faster than traditional law-making efforts, he said.
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- Agility & Scalability for Oracle EBS R12 and RAC on VMware vSphere 5
- This white paper outlines extensive performance and scalability testing of Oracle EBS applications on a Vblock™ Systems with vSphere 5.
- Oracle and VCE: The Next Step in Integrated Computing Platforms
- In this ESG Lab review you will learn how a VCE system driven by Oracle, delivers the perfect blend of high performance and...
- Migrate Oracle Apps from RISC/UNIX to Virtualized x86
- Ready to move Oracle to a virtualized environment? This brief explains how true converged infrastructure can help you migrate from a RISC/UNIX environment...
- Step Out of the Bull's-Eye
- Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe. All Government IT White Papers
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their...
- DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational. An ING executive...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- All Government IT Webcasts