There is a time for thought and there is a time for action. Most of the items I have posted to this blog are in one form or other thought pieces — journals of ideas. As some of you have pointed out the thoughts are sometimes half-formed or just plain wrong but to me this medium seems best suited to reflections – on my work on the future of media and technology or on the joys of sport and family life.

This piece is different. I want to convince you that all peace-loving people regardless of country face an imminent threat: the threat of cyber attack on the technological infrastructure upon which we and the societies in which we live increasingly rely.

In a recent post Harry Potter and the Conflict of Laws I argued that the transition from a unilateral world dominated by the United States to a multilateral one coupled with the increasing proportion of commerce that is electronic was leading to an international conflict of laws. The US is also losing its status as the sole cyber superpower with the result that other nations and far more ominously small unaligned groups are gaining the capability to wage cyber war.

Think about how reliant we have all become on the internet to live our lives. No I don’t just mean watching Hulu Skyping or Gmailing with our friends or shopping on Gilt. I mean airline reservations navigation and air traffic control systems; power grid just-in-time manufacturing supermarket inventory and ATM systems; and nuclear arsenal and military command and control systems.

The good news is that responsible governments have worried about and taken reasonable precautions to isolate and protect the last category of systems. The bad news is that we are very exposed to attack on all the “civilian” systems upon which we rely. The vast useful and fascinating internet we know today was originally designed as a relatively small network linking the early computers of government and trusted academic institutions. Few security features were included in this early “Arpanet” since its computer endpoints and users were trusted. However as the modern internet has evolved into a sprawling network of unknown and proxied users no corresponding security features were added to authenticate and protect the computers that were connected to it. Thus the inherent power of the network its “network effect” has become its Achilles’ heel.

We should assume that the power grid ATM and financial systems and civilian aviation networks of most advanced nations have already been penetrated. Most of these know incursions have been made by the military or clandestine services of other nation states. While worrying in its own right I more fear the spread of this capability to smaller unaligned criminal and terrorist groups. Sure China could probably take down the US financial system for a few days but they know this would only mean that the US could not calculate and pay the interest due on the trillion dollars of US sovereign debt they hold. While this could still be a risk if hostilities broke out over Taiwan or North Korea I worry more about the threat of asymmetrical warfare: A small group with nothing to lose who decide that one Apple Mac and a couple of smart programmers can inflict more damage than a wave of Predator drones.

So what should we do? I said this was a time for action not ideas. First start at home. Take sensible security precautions with your computers and mobile devices (eg use robust password protection install security software to sweep for malware viruses worms etc. don’t open files from unknown sources). If you would not leave your front door open at night don’t do so with your computing devices. Be prepared to trade off some level of convenience and privacy for security – hey I don’t like to carry keys in my pocket either but it beats sleeping on the front step. Second raise awareness. Talk to your family adopt policies at your company write your government officials. Third don’t assume it’s someone else’s problem. Back-up your data keep paper copies of bank records and remember what it was like to live before the seductive convenience of computers.

Ultimately I believe that the answer lies in creating a “super net” or overlay internet among trusted and authenticated institutions akin to the role mil.net served for the US Department of Defense. We are slowly evolving from an unpoliced network of anonymous nodes to a multi-layered network of authenticated institutions and individuals. Just as individuals must be approved to receive a security clearance from their government so can their machines be identified and approved. What emerges need not be an Orwellian nightmare of government control. Rather I can imagine a layered internet in which the nuclear arsenal is controlled by the highest and most secure level the power grid air traffic control and ATM networks are secured by a sufficiently robust next layer but an open cyber frontier — a wild west — remains for individuals to roam free of government control and authentication but also open to attack and abuse.

No system will ever be perfectly secure but I would like to think that we can find the collective will to act before a harmful attack calls us to action.