America’s industry and agencies perform a spectacular moment that most of the world admires. From South Africa to the Philippines to a small town in Kansas, each has its contribution to a safer society.
The three decades of research of American intelligence agencies yield a similar analysis of our five years yet as an Italian proverb state, “At the end of the game both the king and pawn go in the same box.”
There’s a fog of war, and now C5ISR. We have threats and data ex-filtration without knowing it. It’s no mistake that the Chinese fighter “looks similar” to the American F-35.
It’s an adapt or fail trajectory – Amy’s “five mores” yield a significant three: more threats, more speed and more analysis. Yet the open-source industry cannot facilitate or remediate a complete response. Amy and the whole of the industry are crossing a chasm. No one has enough time to analyze or respond as assurance that are we even looking at the correct data?
Small attacks of guerilla warfare in a city center are challenging as the cyber war cannot even be seen. Reliance on digital systems can hamper kinetic responses. Deterrence and attribution are seen as difficult yet these could be easier.
Essentially the open-source community has contributed yet let’s not be remiss of close-source industry efforts.