2018 Index of Military Strength Cyber
2018 Index of Military Strength Cyber
2018 Index of Military Strength Cyber
2018
INDEX OF
U.S. MILITARY
STRENGTH
DAVIS INSTITUTE FOR NATIONAL SECURITY AND FOREIGN POLICY
Edited by
Dakota L. Wood
the ability to attack anywhere, at any time, with Department of Defense (DOD), Department
a keystroke. There is no need to deploy a physi- of Homeland Security (DHS), and Department
cal force, gain physical access to a region (other- of Justice (DOJ):
wise done by ship, plane, or overland movement),
or be encumbered by mounds of equipment and The United States will work to promote an
supplies. An attacker acts in absolute silence, open, interoperable, secure, and reliable
perhaps visible only to the most skilled cyber information and communications infrastruc-
ture that supports international trade and
defender. There is no need to limit ones force commerce, strengthens international security,
to specific ages, physical conditions, or body and fosters free expression and innovation.
size, nor is there a need for sprawling bases, ex- To achieve that goal, [the U.S.] will build and
pensive facilities (like ports or airfields), square sustain an environment in which norms of
miles of training areas, extensive stockpiles of responsible behavior guide states actions,
sustain partnerships, and support the rule of
munitions, or assured access to fuel.
law in cyberspace.2
Cyber is generally not affected by environ-
mental concerns or weather conditions. To
the extent that cyber operations can be fully Cyberspace
automated, they can be undertaken relent- Cyberspace has three layers: the physi-
lessly, without regard for time, periods of rest, cal network, the logical network, and the cy-
or any other constraint related to the normal ber persona.
The cyber persona is made up of the lenges. Wikileaks has revealed to the world
people who are operating in cyberspace. stolen U.S. diplomatic communications, em-
Like the physical network, they are pres- barrassing the United States, irritating friends,
ent within states and subject to their laws and empowering enemies. Information is
and policies. harder and harder to secure and easier and eas-
ier to steal. Economically, cyberspace has en-
Colloquially, these three components are abled criminals: Cyber crime cost the U.S. $100
known as hardware, software, and wetware.3 billion and the global economy $400 billion in
The cyber domain has effectively pene- 2015, and the total is projected to reach $2 tril-
trated the worlds advanced economies and is lion by 2019.5 For the U.S. military, compromise
making headway in the rest of the world. Many of the U.S. global command and control capa-
places in Africa, for instance, have skipped bility can be turned against the Department
over the land line and gone straight to smart of Defense, frustrating or even preventing the
phones; currently, approximately 3.74 billion execution of military operations.
people are connected to the Internet.4
This connectivity provides a number of Vulnerabilities and Actors
opportunities and challenges. It enables The U.S. has begun to confront challenges
both states and individuals across all of the to its major interests in cyberspace: protec-
elements of national power: diplomacy, in- tion and enhancement of the economy, secure
formation, the military, and the economy. It command and control of national defense as-
makes diplomatic activity more effective, for sets, reliable collection of cyber intelligence,
example, linking embassies and capitals with and protection of cyber intelligence and
almost instant communications and allowing information.6
for better research. In addition, the opportuni- Three major groups threaten U.S. national
ties that cyberspace provides for information security: people, states, and non-state actors.
are almost unlimited. Humankind creates People include the general population, lead-
huge amounts of information annually, and ers, workers in nearly all business sectors, and
individuals and organizations are constantly insider threats. States primarily include Russia,
posed to these varied threats. In general, peo- ing e-mail.12 Workers are a favorite target be-
ple usually have not received training or educa- cause the chance of success goes up when more
tion that would enable them to deal with varied people are targeted. Roughly 20 percent of
cyber threats. Additionally, most people do not trained workers will click on a phishing link13
see their information as having value. even if they have been trained not to do so.
Leaders. Research supporting the 2014 Insider Threats. These involve a variety of
Chairman of the Joint Chiefs of Staff war game motivations and are very difficult to identify
Iron Crucible identified understanding as the ahead of time. Edward Snowden and Bradley
major challenge in the 21st century.8 Because Manning are well-known cases in the U.S. The
most senior leaders typically are not involved Computer Emergency Response Team (CERT)
in the information business, there is a wide Insider Threat Center at Carnegie Mellon
variation in their knowledge of or insistence University maintains a database of more than
on best practices in the cyber domain. 1,000 insider threat cases and provides analysis
The U.S. Office of Personnel Management and support to organizations working to pre-
(OPM) hacks of 2015 are a telling example of vent insider threats.14 Another type of insider
poor leadership in this area. Although OPMs threat is the Lone Wolf or Wolf Pack. These
Assistant Inspector General for Audits indi- are individuals or groups that have been radi-
cated that security shortfalls were well known, calized, typically through cognition-shaping
having been publicly acknowledged since cyber operations.
of tens of millions of files containing sensitive ongoing. States seek to undermine the global
personal data.17 Additionally, the Russians order to their own advantage. Individual ac-
have returned to their Cold War practices of tors and organizations seek to advance their
aggressive information operations seeking to own political agendas. Criminals seek to make
undermine developed countries18 as well as in- illegal financial gains from cyberspace.
ternational organizations.19 All of these can be inimical to the goals of
Iran and North Korea are second-tier the United States and its allies and partners.
threats for the United States, and both coun- Russia seeks to use cyber-enabled informa-
tries are continuously performing cyber op- tion operations to sow discord inside and
erations against economic and government among the states that are trying to keep Rus-
targets in the U.S. In 2016, the DOJ indicted sia at bay in Europe; China uses cyberspace
seven Iranian hackers for operating against a to steal secrets that it can use for economic
dam and banks in the U.S.,20 and North Korean gain or to avoid the research and develop-
hackers have been involved in stealing both ment costs (in time and money) for impor-
money and military designs.21 tant military systems; Iran seeks to weaken
Non-State Actors. This category includes its opponents around the world; and North
threats from proxies, hacktivists, and criminals. Korea maneuvers in cyberspace to avoid in-
Proxies work on behalf of a government that ternational sanctions.
seeks cyber effects without paying a political Because of the low barrier to entry into cy-
price, hoping to achieve plausible deniability berspace and the potential gains to be made,
by outsourcing such work to individuals. The the scale of the challenge is large and growing.
Russians often use criminals as proxies,22 and The U.S. and its allies and partners need to safe-
the Chinese use other groups that may or may guard their own government spaces, their eco-
not be affiliated with each other or other simi- nomic activities, and their citizens. Although
lar criminal entities. the U.S. has strengths including a wide variety
Hacktivists will perform a wide range of op- of resources and a large, educated workforce,
erations. Much like the difference between ter- these bad actors use cyberspace to challenge
rorists and freedom fighters, hacktivists attack the U.S. at every turn. The U.S. is having a hard
tion and mitigation of, and recovery from ation in response to their attacks on U.S. as-
cyber incidents; and coordinates cyber sets. Effective cyber retaliation requires that
threat investigations. operators perform an attack and leave behind
digital fingerprints identifying the origina-
The DOD is charged with securing the tor or an explicit message naming the origin
nations freedom of action in cyberspace of the attack.
and helping to mitigate risks to national But this presents two further problems: Cy-
security resulting from Americas grow- ber operators do not want to compromise their
ing dependence on cyberspace. Specific capabilities by performing an operation that
mission sets include directing, securing, can be traced to them, and it has been difficult
and defending DOD Information Network to receive clearance to perform offensive cyber
(DODIN) operations (including the .mil operations (OCOs). Any OCO that has major
domain); maintaining freedom of maneu- effects can alert an opponent to the presence
ver in cyberspace; executing full-spectrum of intruders, which allows opponents to defend
military cyberspace operations; providing against the intrusion. It can also reveal cyber
shared situational awareness of cyber- capabilities, which is anathema to the com-
space operations, including indications munity that prizes its ability to work in secret.
and warning; and providing support to civ- Moreover, it sometimes takes months to pen-
il authorities and international partners.24 etrate opposition cyber systems. Executing an
they need to pay as much attention to cyber a cyber-enabled information operation.33 The
issues as they would pay to air, sea, land, and information was obtained through cyber oper-
space issues. ations but released through Wikileaks.34 Cyber
There are four sets of cyberspace activities information operations would include Daesh
that pertain to the military: intelligence, infor- recruiting videos, an information operation
mation, crime, and military operations.29 Al- that takes place entirely in cyberspace.
though the military has equities in all of these Military operations can also be cyber-en-
areas, it predominates only in the military op- abled or executed purely in cyberspace. A nor-
erations portion. However, there are aspects of mal military operation would be the invasion
intelligence, information, and criminal activi- of Iraq. A normal special operation would be
ties in cyberspace that do involve the military. the raid to kill Osama bin Laden. An example
In any of these fields, there is a spectrum of a cyber-enabled conventional military op-
of activity that ranges from conventional to eration would be Russian operations in Geor-
cyber-enabled to cyber-centric to pure cy- gia in 2008 when Russia conducted cyber op-
ber operations. erations against Georgian targets to degrade
Normal intelligence operations like steal- Georgian command and control in support of
ing secrets and developing sources would Russian conventional military operations on
have been the traditional approach before the ground and in the air.35 An example of a
the advent of cyberspace. Cyber-enabled in- cyber-enabled special operation would be the
telligence operations would use cyber capa- Mumbai attack of 2008. Planners used a Go-
bilities in support of these operations, such as Pro camera while walking the route to be used
analysis of a terrorist network using data that in the attack so everyone could see videos of
had been gathered by traditional intelligence their routes before the operation. They also
means. Cyber intelligence operations would be used Google Earth during their planning pro-
operations that occur entirely in cyberspace, cess. The command element monitored Indian
such as the 2012 operation by Chinese hackers social media and traditional media (such as
that penetrated Indian Navy computers and radio and television) to track the response by
compromised sensitive information.30 Purely Indian security forces and steered the ground
low visibility. attacks are rare but have the potential to be
Criminal operations do not usually pertain catastrophic in their effects.
to militaries in the conventional sense. In cy- Shaping cognition is using information to
berspace, however, there are crimes that in- cause people to think in a certain way. This can
volve members of the DOD, as well as crimes be benign like Facebook or malign like cyber
that involve the Defense Industrial Base. Ad- crime. It is perhaps the most significant op-
ditionally, members of the DOD participate portunity and challenge for cyber today. Due
in several types of activities that pertain to to the pervasive nature of information in the
cyber crime and cyber-enabled crime, includ- 21st century, everyone who connects to the
ing cyber security and critical infrastructure Internet can shape the thoughts of others.
protection, law enforcement and counterintel- Radicalization by state and non-state actors
ligence, document and media exploitation, and is a significant challenge, especially lone-wolf
counterterrorism.39 or wolf-pack radicalization. The Islamic State
Each of these provides examples of how the has successful influence operations running
military would be involved in four areas: crime, globally 24 hours a day. The fact that volun-
intelligence, information operations, and mili- teers have been to ISIS territory from around
tary operations. Although military forces are the world indicates how successful these op-
involved in these areas, they are not involved in erations are. Other actors target populations
all operations in these areas (the DOJ handles of other countries (to radicalize); government
ware that will allow them to achieve an effect, the right place at the right time. It also allows
such as opening the gates on a dam. Among re- for a significant improvement in the ability to
cent examples, as noted, are the seven Iranians shape cognition.
who were indicted for hacking into banks and While it allows all of these to assist friendly
a dam in New York.40 forces, however, it also allows our opponents
OCOs are a means by which to achieve an to do the same. They will have a better un-
end, another tool that provides additional ca- derstanding ofand consequently an oppor-
pabilities to the President and battlefield com- tunity to copy or defeatour technologies
manders and relevant forces. and capabilities. They will be able to access
Cyber operations are limited only by the our command and control and logistics net-
imagination and capability of the attackers, yet works, potentially modifying orders so that
there are only two types of cyber-attacks: syn- forces or spare parts end up in the wrong
tactic and semantic.41 Syntactic operations in- place. They also will be able to use patterns
volve the actual coding used in a piece of cyber in the movement of information to improve
programming (the syntax of the coding), and their own intelligence, identifying our units
semantic operations seek to shape thoughts and their capabilities.
using language or semantics. As an example, These capabilities require the U.S. govern-
a phishing operation begins as a semantic op- ment generally, as well as the U.S. military
eration, asking the target to click on this link, specifically, to modify its practices. Leaders
and then, once the link is activated, changes to and organizations need to do a better job of
a syntactic attack by which the malicious code selecting and utilizing new technology. Laws
enters the targets system and changes the syn- and policies need to be updated to leverage
tax of the code in the targeted platform. Shap- the new technology. Older leaders need to un-
ing the thoughts of others may be the more derstand how younger followers perceive and
important of these two types of attack. use technology.
A cyberspace attack produces two forms of Implications for Operations. Cyber-
effect: manipulation and denial. Manipulation space permeates all aspects of our daily lives
means controlling or changing the adversarys and therefore all operations whether military,
They also will have access to limited OCOs if
their particular mission warrants access to U.S. Military Cyber
that level of support. The Office of the Secretary of Defense artic-
Automation and information flows will ulates three primary cyber missions: defend
make day-to-day operations easier. However, DoD networks, systems, and information;
while attention to sound DCOs and skillful ex- defend the nation against cyberattacks of
ecution of OCOs will lead to military success, significant consequence; and support mili-
failure in each case will present exploitable tary operational and contingency plans.44
opportunities to an enemy. Because the DOD is a very large, bureau-
Implications for the Services. As oc- cratic organization that operates around the
curred when airplanes, tanks, and automatic world, it is proving difficult for it to fully em-
weapons were introduced to war, forces will brace cyberspace operations. First, there are
need to reorganize to integrate robust cyber DOD legacy structures. Services such as the
and particularly information capabilities. Spe- Army provide trained and equipped forces,
cifically, the services will have to: while Combatant Commands (CCMDs) like
U.S. European Command (EUCOM) and
Modify training and equipping to en- U.S. Pacific Command (PACOM) use those
sure that units practice DCO at all times forces for missions. This means that the DOD,
and will have to stand up additional the largest organization in the world, must
computers, devices, and components and has operations like those conducted by the Navy
its own procedures for doing so.46 Each service and Air Force. The Army must protect ground
defends itself, at least in part, and the DOD units, the Navy must protect groups of ships
maintains separate organizations to defend operating at sea across the globe, and the Air
the larger organization and defense agencies Force must protect individual flying platforms.
apart from the individual services and opera- At the same time, each service must protect its
tional commands, all of which makes training own infrastructure.
and equipping for operations in cyberspace Therefore, under their Title 10 role as
very bureaucratic and cumbersome. This is force providers to the combatant command-
exacerbated by the overall defensive tone of ers, the services recruit, train, educate, and
the three mission sets: The DOD mainly de- retain their own military cyber forces. There
fends their networks and provides defensive are four service component commands un-
assistance to other agencies as required, a set der U.S. Cyber Command (USCYBERCOM):
of tasks that must be attended to every second U.S. Army Cyber Command, U.S. Fleet Cyber
of the day. Command/U.S. 10th Fleet, 24th Air Force, and
The DOD also performs offensive missions U.S. Marine Corps Forces Cyber Command.48
when directed to do so by the President. This These service-specific units have several func-
is a very circumscribed set of missions, for sev- tions: They operate and defend their portion
eral reasons. First, much as the entire U.S. Ma- of the DODIN; perform full-spectrum cyber
rine Corps would be swallowed by a megacity operations, meaning offensive and defensive;
like Lagos, Nigeria, DOD offensive cyber assets provide for cyber training and education; and
would be overwhelmed by being everywhere undertake cyber research and capabilities de-
and helping everyone. Additionally, many as- velopment for their respective services.
pects of ongoing cyberspace activity do not Combatant Commands are responsible
pertain to the DOD at all. Just as most avia- for geographic areas (such as European Com-
tion activity does not concern the Air Force mand) or functional areas (such as Special
and most maritime activity does not involve Operations Command or U.S. Transporta-
the Navy, most cyber activity does not concern tion Command) and provide operations
CCMD operations. growing. Additionally, the U.S. has certain so-
USCYBERCOMs main instrument of pow- cietal vulnerabilities at home that make facing
er is the Cyber National Mission Force, which these challenges more difficult. The Depart-
conducts cyberspace operations to disrupt and ment of Defense, Department of Homeland
deny adversary attacks against national critical Security, and Department of Justice have to
infrastructure. It is the U.S. militarys first joint operate in this environment as the U.S. gov-
tactical command with a dedicated mission fo- ernments three principal actors, which also
cused on cyberspace operations. It planned to seek partnerships with the private sector that
create 133 cyber mission teams by the end of operates almost all of the Internet.
fiscal year 2016;52 the current plan is for all the The U.S. government seeks to protect the
teams to be fully functional by 2018.53 The force United States through protection and deter-
eventually will consist of 13 National Mission rence. Because of the size and complexity of
Teams (NMTs), which are designed to defend cyberspace as well as domestic legal and cul-
the United States and its interests against cy- tural constructs in the United States, the DOD
berattacks of significant consequence; 68 Cy- must circumscribe the scope of its operations
ber Protection Teams (CPTs), which defend in cyberspace, operating in the military cyber
priority DOD networks and systems against domain as required in the criminal, informa-
priority threats; 27 Combat Mission Teams tional, intelligence, and operational fields. The
(CMTs), which aid Combatant Commands by DOD must defend itself, assist the President in
Inspector General Questioned Over Hacking Report, CNN, updated June 17, 2015, http://www.cnn.com/2015/06/16/politics/opm-
hack-ig-testimony/index.html (accessed June 26, 2017).
10. Ellen Nakashima, Hacks of OPM Databases Compromised 22.1 Million People, Federal Authorities Say, The Washington Post,
July 9, 2015, https://www.washingtonpost.com/news/federal-eye/wp/2015/07/09/hack-of-security-clearance-system-affected-
21-5-million-people-federal-authorities-say (accessed June 26, 2017).
11. Kaspersky Lab, Top 10 Tips for Educating Employees About Cybersecurity, 2015, http://go.kaspersky.com/rs/kaspersky1/images/
Top_10_Tips_For_Educating_Employees_About_Cybersecurity_eBook.pdf?mkt_tok=3RkMMJWWfF9wsRonuKXNcO%2FhmjTE
U5z16OglWa%2BzlMI%2F0ER3fOvrPUfGjI4ITMZjI%2BSLDwEYGJlv6SgFQrDHMalq1LgPXxE%3D (accessed July 5, 2017).
12. News release, McAfee Labs Report Highlights Success of Phishing Attacks with 80 Percent of Business Users Unable to Detect
Scams, McAfee, September 4, 2014, http://www.mcafee.com/us/about/news/2014/q3/20140904-01.aspx (accessed June 26,
2017).
13. Susan Richardson, Leaky End Users Star in DBIR 2016, Data on the Edge, May 23, 2016, http://blog.code42.com/leaky-end-
users-star-in-dbir-2016/ (accessed June 26, 2017).
14. Computer Emergency Response Team, CERT Insider Threat Center, Carnegie Mellon University, Software Engineering Institute,
2017, http://www.cert.org/insider-threat/cert-insider-threat-center.cfm (accessed June 26, 2017).
15. News release, U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S. Corporations and a Labor
Organization for Commercial Advantage, U.S. Department of Justice, May 19, 2014, https://www.justice.gov/opa/pr/us-charges-
five-chinese-military-hackers-cyber-espionage-against-us-corporations-and-labor (accessed July 5, 2017).
16. Kevin McCaney, Report: US Suspects Russia in Most Sophisticated Joint Staff Hack, Defense Systems, August 6, 2015, https://
defensesystems.com/articles/2015/08/06/joint-staff-email-hack-most-sophisticated.aspx (accessed June 26, 2017).
26, 2017).
47. U.S. Department of Defense, Joint Chiefs of Staff, Cyberspace Operations, p. ix.
48. U.S. Department of Defense, Department of Defense Strategy for Operating in Cyberspace, July 2011, http://csrc.nist.gov/groups/
SMA/ispab/documents/DOD-Strategy-for-Operating-in-Cyberspace.pdf (accessed July 5, 2017).
49. Andrew Feickert, The Unified Command Plan and Combatant Commanders: Background and Issues for Congress, Congressional
Research Service Report for Congress, January 3, 2013, http://fas.org/sgp/crs/natsec/R42077.pdf (accessed July 5, 2017).
50. Rita Boland, Commands Cybersecurity Crosses Domains, Directorates, Signal, June 1, 2013, www.acyberstrategufcea.org/
content/?q=command%E2%80%99s-cybersecurity%E2%80%A8-crosses-domains-directorates (accessed June 26, 2017).
51. U.S. Strategic Command, U.S. Cyber Command (USCYBERCOM), September 30, 2016, http://www.stratcom.mil/Media/
Factsheets/Factsheet-View/Article/960492/us-cyber-command-uscybercom/ (accessed June 26, 2017).
52. Crowther and Ghori, Detangling the Web.
53. U.S. Department of Defense, The DoD Cyber Strategy.
54. Ibid.