Paul Quanrud is a writer and blogger with American Citizens for Economic Freedom (http://truecapitalism.org/).
This is the first in a two-part series on growing threats and strategies in the Internet age. CyberSecurity at Risk Part 1: Growing Threats demonstrates the rising impact of CyberCrime on business and that CyberWarfare is a key military strategy our enemies are quickly grasping. CyberSecurity at Risk Part 2: Changing the Rules Again shows the national security strategies to protect our vital interests.
The digital revolution has turned mainstream. Just 30 years after the first PC, we celebrate progress with each new iPhone and iPad release. Facebook was the highly publicized initial public offering of stock for 2012. Mark Zuckerberg, Steve Jobs, and Bill Gates are household names.
Hazards of the same digital age have also gone mainstream as many of us experience identity theft, online scams, computer viruses, and online predators. With the growth of social media and mobile devices providing new opportunities for criminals to ambush the unsuspecting, the Cyber world is a dangerous place for our citizens and nation.
Cyber threats take on two primary forms:
CyberCrime makes big money from industrial espionage, fraud, spam, viruses, and more. Symantec estimates the cost of CyberCrime is $338 billion globally. Cybercrime is more lucrative than the drug trade. There has been a dramatic rise in attacks on small businesses over the last six months while the attacks on large businesses have declined; 36% of attacks are now on small business.
CyberWarfare has been on the rise more than a decade with the objectives of achieving a battlefield advantage and dominating covert operations. The U.S. and Israel developed the computer virus Stuxnet to secretly disrupt Iran’s uranium enrichment process. Stuxnet accidentally “escaped” due to a programming error and was discovered in 2010. In a New York Times article, author David Sanger disclosed strategies used by the White House to deploy Stuxnet. The White House is under investigation by the U.S. Attorney General for classified intelligence leaks.
Those seeking to exploit any weaknesses in our defenses are talented and motivated:
Organized crime syndicates – Russia leads in making a business out of CyberCrime. The breakup of the Soviet Union and their lax government oversight led highly motivated and talented former state-security operatives to join with organized crime. "They're incredibly persistent. If it takes a year to set up their targets, then they'll wait the year," said Jose Granado, Ernst & Young's information security practice leader.
Rogue nations – A recent Department of Defense report stated, “Sensitive U.S. economic information and technology are targeted by the intelligence services, private sector companies, academic and research institutions, and citizens of dozens of countries. Chinese actors are the world’s most active and persistent perpetrators of economic espionage." The “actors” – those who steal and disrupt – use a variety of methods to take intellectual property ranging from computer intrusions to more personal methods. Chinese intelligence services exploit people with ties to China to steal trade secrets using insider access to corporate networks.
With Russia and China possessing the capability to push CyberWarfare forward, other nations are making strides. North Korea recently increased its CyberWarfare unit to 3,000 elite staff. In an address to the U.S. House subcommittee overseeing CyberSecurity, General James Clapper was reported as saying Iran’s cyber capabilities “have dramatically increased in recent years in depth and complexity.” 
Highly-motivated individuals – It takes only one technically savvy criminal or attacker to cause serious damage.
Some prosecutors are learning to use the Internet to go on the offensive. U.S. Attorney Jenny Durkan told a press conference, "People think that cyber criminals cannot be found or apprehended. Today we know that's not true. You cannot hide in cyberspace. We will find you. We will charge you. We will extradite you and we will prosecute you." 
Our Nation at Risk
Our national infrastructure is susceptible to two types of attack:
President Obama recently wrote in the Wall Street Journal Opinion section that his administration made CyberSecurity a priority, since "the cyber threat to our nation is one of the most serious economic and national security challenges we face.” He added, “So far, no one has managed to seriously damage or disrupt our critical infrastructure networks. But foreign governments, criminal syndicates and lone individuals are probing our financial, energy and public safety systems every day.” 
Have we succeeded in advancing the CyberSecurity priority? Three years ago, Stuxnet dictated new rules in CyberWarfare. Yet Stuxnet is old CyberSecurity news. As attackers become more sophisticated, we must change the rules of the game again.
The next article – CyberSecurity at Risk Part 2: Changing the Rules Again – looks at key CyberSecurity strategies taking us beyond the Cold War and to government’s role in protecting our vital interests.
For more solutions to the problems facing America in a post 9-11 world, go to http://truecapitalism.org/.
 Office of National Counterintelligence Executive - http://www.ncix.gov/publications/reports/fecie_all/Foreign_Economic...
 U.S. House of Representatives Committee on Homeland Security - http://homeland.house.gov/sites/homeland.house.gov/files/Testimony%...
 Wall Street Journal - http://online.wsj.com/article/SB10000872396390444330904577535492693...