Our Adversaries Are Using Cyberwarfare. We Must Be Prepared.

The recent incidents between U.S. and Iranian forces demonstrate the importance of cyberwarfare for national security and reinforce the importance of funding and developing the cyber capabilities of the United States.

Following the June attacks by Iran on oil tankers
and then the downing of a U.S. unmanned drone, President Donald Trump chose not
to retaliate with physical attacks. Instead, he reportedly approved an offensive cyberstrike that disabled the computer
systems used to control Iran’s rocket and missile launches.

That was considered a more proportionate
retaliation for the downing of the drone. 

America’s adversaries are operating with cyber in the
so-called “gray zone” between diplomacy and war, choosing actions that fall
short of sparking a conventional military retaliation.

In 2007, Russia used cyber to disrupt communications channels in the Baltic states as part of its unconventional strategy to destabilize the region.

In 2015, China hacked the Office of Personnel Management and stole the records of employees holding security clearances. That’s in addition to ongoing theft of intellectual property.

North Korea used cyber against Sony in 2014, and Iran has targeted the U.S. government and companies with cyberattacks as well.

Given these threats, and the challenges of defending
networks, offensive cyberattacks are an important tool for the U.S. against its
adversaries. In 2018, U.S. Cyber Command confirmed it had launched an offensive cyberattack in
order to silence a Russian troll farm, an organization used to spread
disinformation and sway public opinion during the 2018 U.S. midterm elections.

Sometimes, offense is the best defense.

The release of National Security Presidential Memorandum 13 in 2018 allows for offensive and defensive cyber operations to be conducted without presidential approval. 

Last year, the Department of Defense also
released a plan that confirmed its commitment to using cyberattacks “to
advance U.S. interests” and “defend forward.” The U.S. retaliatory offensive
cyberattacks on Iran and Russia are examples of this type of approach.

Unlike nuclear weapons, which are held in reserve and used to deter other nations through the threat of use, cyber capabilities are readily available, and cyber forces are in near-constant contact with one another.

While many cyberattacks seem immediate, as though a button was pushed to trigger it at will, most are actually the result of months of work and planning. Constant effort goes into identifying cyber targets and ensuring that there is still an ability to access them.

If
the target updates its software, for example, that means an entirely new plan
of attack must be laid out.

The organization primarily responsible for these
missions is U.S. Cyber Command. It has come a long way from its humble origins,
recently filling out its Cyber Mission Forces, the operational units within the
command, to full operational
capacity
.

In 2018, it was promoted to a full unified combatant
command. That designation made it equal in rank to the other nine combat
commands, such as Special Operations and Central Command.

That’s not to suggest that Cyber Command does
not have more work to do.  It still needs
to train those forces up to a high level of readiness and continue to develop
its infrastructure. Fully staffed does not necessarily mean fully mission-ready
and capable.

Cyber Command is constantly deterring, disrupting,
and defeating cyberthreats. Its capabilities must be able to handle the persistent
nature of cyberwarfare.

Just as we maintain our ships and improve our conventional military forces, we must do the same with our cyber capability. The U.S. should continue to develop Cyber Command’s capacity and readiness so it can meet those challenges into the future.

The United States cannot afford to rest on its current cyber capabilities. Our adversaries continue to sharpen their cyber forces, and the U.S. cannot afford to lose that competition.  

We must stay ahead of our adversaries and continue to invest in the U.S. Cyber Command so it can reach its full potential.

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)

Source material can be found at this site.

Posted in Freedoms and tagged , , , , , , .

Leave a Reply

Your email address will not be published. Required fields are marked *

Optionally add an image (JPEG only)

 

This site uses Akismet to reduce spam. Learn how your comment data is processed.