HOME WELCOME ARTICLES ARCHIVES BIOGRAPHY FEEDBACK BLOG LINKS Continuous Engagement in Cyberspace
ASCF Report, 1.1.19
By Alan W. Dowd

U.S. Cyber Command (CYBERCOM) was elevated to full combatant-command status last spring, joining other regional and functional combatant commands such as European Command and Special Operations Command. And last summer the Pentagon authorized CYBERCOM to carry out “constant, disruptive” operations against adversary computer networks in order “to disable cyberweapons before they can be unleashed,” according to published reports. Given the scale and number of cyberattacks against America’s swath of cyberspace, the move to stand up and unfetter CYBERCOM is long overdue.

Cyberattacks targeting U.S. citizens, allies, institutions, interests and infrastructure are happening so frequently that it’s nearly impossible to keep track of the onslaught. But here’s a list of some of the worst attacks.

Russia
Since March 2016, according to the Department of Homeland Security, “Russian government cyber actors…targeted government entities and multiple U.S. critical infrastructure sectors, including the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors.” Russia’s cyber-soldiers at one point even gained the ability to disable America’s power grid.

The risks posed by such infrastructure intrusions and attacks are very real. Just ask the people of Ukraine. In 2015, Ukraine endured “the first blackout caused by a cyberattack,” when eight Ukrainian utilities were hit by a malware attack emanating from Russia. The attack left 80,000 people without power—in the dead of winter. Related attacks crippled the network at Kiev’s main airport.

Moreover, a decade ago, Russia launched “Web War I” against NATO member and U.S. ally Estonia—crippling Estonia’s communications infrastructure; targeting the nation’s mobile-phone network, 9-1-1 equivalent and largest bank; and knocking out government websites.

Russia’s interference in the 2016 U.S. presidential election was enabled by hacks into the Democratic National Committee’s computer network. As DNI Dan Coats explains, Russia is using cyber-weapons to carry out “hack-and-leak influence operations, distributed denial-of-service attacks, and false flag operations” aimed at “degrading our democratic values and weakening our alliances.”

China
According to a U.S.-China Economic and Security Review Commission study, China’s use of “computer network exploitation activities to support espionage has opened rich veins of previously inaccessible information that can be mined both in support of national-security concerns and, more significantly, for national economic development.” 

Specifically, Beijing has used cyberattacks to infiltrate subcontracting firms and systems related to the development of the F-35 and C-17. Beijing exploited cyberspace to gain “full functional control over networks at the Jet Propulsion Laboratory,” according to an investigation conducted by the U.S.-China Economic and Security Review Commission. And China has launched “spearphishing” attacks—a tactic using email that appears to be from a trusted source to gain access to a target’s computer—against Westinghouse Electric, Alcoa, Allegheny Technologies Incorporated and U.S. Steel.

Gen. Keith Alexander, former head of CYBERCOM, calls China’s cyber-siege of the United States “the largest transfer of wealth in history.”

Equally worrisome, China has penetrated the Office of Personnel Management and compromised the personal, financial and employment data of 21.5 million Americans. U.S. officials describe it as “the most devastating cyberattack in our nation’s history.” With Beijing holding all that personal information on current and former federal employees, the worst may be yet to come.

North Korea
North Korea’s “DarkSeoul” attacks targeted and destroyed 32,000 computers at South Korea’s largest banks and broadcasting companies. “The true intention of the DarkSeoul adversaries,” according to McAfee, was to “disrupt South Korea’s military and government activities.”

Iran
Iranian cyberattacks against the U.S. have stolen intellectual property from 144 U.S. universities and 36 U.S. companies, including 11 tech companies and two banks, Reuters reports. And Iran’s Shamoon computer virus destroyed 30,000 computers supporting the Saudi oil industry.

Response
If our enemies were conducting these sorts of attacks against U.S. territory, military bases or physical facilities, the American people and their elected representatives would recognize that we are under attack and demand a military response. But since these attacks are confined to that invisible realm of terabytes and code and identities, rather than the realm of blood and bullets and bombs, we somehow overlook this new form of warfare. That mindset must change, and CYBERCOM is leading the way.

“Achieving superiority in the physical domains in no small part depends on superiority in cyberspace,” CYBERCOM explains, adding in an unclassified report that America’s cyber-soldiers are now “continuously engaging and contesting adversaries and causing them uncertainty wherever they maneuver.” This strategy of “continuous engagement” imposes “strategic costs on our adversaries, compelling them to shift resources to defense and reduce attacks,” CYBERCOM bluntly concludes.

In short, Washington is finally heeding the counsel of Gen. James Cartwright, former vice-chairman of the Joint Chiefs of Staff, who argued a decade ago that America must “apply the principles of warfare to the cyber domain.” More recently, he has suggested that Washington may need “to do something that’s illustrative” in cyberspace to signal America’s foes.

In Russia, CYBERCOM could use its newfound authorities and growing capabilities to undermine support for Putin inside Russia by embarrassing him and/or creating doubts about the competence of his regime. For instance, it’s not difficult to imagine the U.S. executing a cyberoperation that turns Putin’s stage-managed elections into a full-blown farce: returns showing Leonid Brezhnev finishing second or Czar Nicholas II winning a few oblasts or no one at all winning. Further up the ladder, America’s cyber-soldiers could temporarily turn off the Internet in Moscow, zero-out the off-shore accounts of his oligarch cronies, or disable the banks and mobile-phone system in Crimea, just as Putin did in Estonia. Putin would get the message.

In China, America’s cyber-soldiers could turn the Internet on, using cyber-tools to create cracks and doorways in the Great Firewall of China, thus allowing Xi’s subjects to share information and ideas. Further up the ladder, the Pentagon, NSA and CIA could use cyberweapons to cut off the illegal “Made in China” islands in the South China Sea from command and control in Beijing; disable or scramble China’s information networks in the South China Sea; implant bugs or backdoors in the schematics and other intellectual property China has stolen from U.S. defense contractors, and then activate those digital timebombs to yield defective military hardware for the PLA.

In 2013, Gen. Martin Dempsey, who was Joint Chiefs chairman at the time, mentioned “cyberwarfare” and “electronic attack” as key to protecting the U.S. from the mushrooming missile threat. We now know that the Obama administration secretly launched cyberoperations around that time targeting North Korea’s illicit missile program. “Soon, a large number of the North’s military rockets began to explode, veer off course, disintegrate in midair and plunge into the sea,” as the New York Times reports. One North Korean missile, which had enjoyed a solid test record, began to see failure rates of 88 percent, the Times notes. The flurry of missile mishaps reportedly led Kim Jong Un to order investigations into U.S. sabotage—and executions of some of his most senior military aides. “Disrupting their tests,” according to former Defense Secretary William Perry, is “a pretty effective way of stopping their ICBM program.” And as we have seen, these disruptive cyberoperations have a beneficial second-order effect: inciting Kim’s ire to the point of eliminating his own military commanders and rocket scientists.

CYBERCOM and other U.S. agencies should dial up this “left-of-launch” cyber-campaign and expand it into other aspects of Kim’s military—and into other hostile regimes.

Iran is an ideal candidate in this regard, given its recent spasm of illegal missile tests, each increasing Tehran’s range and reach. A left-of-launch cyberoperation against Iran’s missile enterprise can be an effective way to delay the development of long-range Iranian capabilities—and destabilize its military. We know that Iran was the target of a massive and sophisticated cyberoperation known as “Olympic Games” that began under the Bush administration and continued under the Obama administration. A key element of Olympic Games was the Stuxnet computer virus, which became the first cyberattack “used to effect physical destruction,” as former CIA director Michael Hayden has explained. According to Ralph Langner, an expert in industrial computer systems, Stuxnet “was as effective as a military strike,” setting Iran’s nuclear program back years. Hopefully, CYBERCOM is using its new authorities to develop and deploy the next generation of Stuxnet against Iran’s terrorist tyranny.

CYBERCOM must also keep ISIS, al Qaeda and other terror groups on the defensive by using cyber-enabled weapons to exacerbate fissures within the jihadist movement and pit them against each other; prevent jihadist groups from spreading their message and attracting new recruits to the ranks; and publicly counter their claims.

Cyber-Defense Doctrine
These are not fanciful concepts. In addition to Stuxnet and the left-of-launch ops, we know the U.S. has conducted these sorts of cyberoperations in the recent past: Published reports indicate that U.S. assets have hacked into the operations and hardware outputs of Chinese telecommunications Huawei and ZTE. Beijing itself claims that U.S.-based entities have “directly controlled 1.18 million host computers in China.”

North Korea’s swath of the Internet went dark for a period of time in 2014. Doubtless, this was the result of a U.S. retaliatory cyber-strike following Pyongyang’s hacking of Sony.

We also know that under an operation codenamed “Nitro Zeus” the U.S. has developed cyberweapons capable of disabling Iran’s air defenses, communications capabilities and power grids. Hopefully, CYBERCOM is expanding and tailoring these sorts of cyberweapons systems to Russian, Chinese and North Korean defenses.

Regardless of when or if Washington decides to fire a cyber-shot across the bow of Beijing or Moscow, policymakers need to put hostile regimes on notice that the U.S. will make no distinction between kinetic attacks and cyberattacks on America’s interests and infrastructure. The template is President Trump’s warning about attacks on U.S. space assets: “Any harmful interference with or an attack upon critical components of our space architecture that directly affects this vital U.S. interest,” the president declared in 2017, “will be met with a deliberate response at a time, place, manner and domain of our choosing.” A similar statement about America’s cyberspace assets and interests would assist warfighters in their deterrence mission.