Houthi Red Sea Attacks and the Impact on the Global Order
SUBSCRIBER+EXCLUSIVE INTERVIEW – For months, Yemen’s Houthis have been launching repeated missile and drone attacks againstcommercial and military ships in the southern Red Sea and […] More
Mr. President, as you know the United States has faced cyber attacks of increasing frequency and viciousness from our adversaries. Your NSC is about to bring you both a new cyber strategy and a proposal to modify a previous NSC document called PPD-20 to give US Cyber Command more authority to interfere with these adversary attacks without checking back with you and the NSC as much.
You should approve these changes but with some very important conditions or else the Department of Defense might just drag you into more unwanted fights.
BACKGROUND
US cyber operations for offensive or intelligence purposes goes back decades – the first combat unit was formed by the Air Force in 1995. It is nothing new. What is new is the attacks from all sides with increasingly little respect for restraint or norms. At some point one of these attacks – such as WannaCry (North Korea), WannaCry (Russia) or one from Iran or China – will kill people and drag nations into a real war.
US Cyber Command has a new vision of wanting to “defend forward” with more agility to prevail in the “persistent engagement” of cyber conflict. Generally it is the right vision, though not without risks.
Your primary means to control escalation is a document called PPD-20. It is still classified, though leaked in its entirety on the Internet, so we won’t quote from it here. But it generally allows the military only limited flexibility to respond to cyber attacks, such as by disrupting the enemy’s command and control networks before they have a chance to attack us. You, or your designee, has to approve these.
Your NSC and DoD will be pushing for changes to PPD-20 for more agility and to defend forward, per the new vision from Cyber Command, so that these operations can be approved at lower levels. These changes are also likely to be in your new national cyber strategy.
DISCUSSION
It is a common view that if only we use more force against our adversaries they will back down – this is often called active defense, or deterrence, or raising their costs. But it might not be true; maybe cyber conflict is more like the irregular warfare in Iraq or Afghanistan where three presidents have been told “with just a bit more force we can win this thing.”
Cyber conflict be similar to irregular warfare, where more force causes the other side to rise up, not back down, unless we team with those most affected. In this case, that’s the private sector.
Or maybe it will work just as DoD says and pushing back on adversaries will bring everyone back to sanity. Either way, it is an experiment, so you need to be careful lest you create more crises that distract you from your agenda.
The US has been giving perhaps as well as we’ve been getting. Your military officials correctly note that our adversaries are ignoring restraint and norms and “extending their influence without resorting to physical aggression,” but that is exactly what our adversaries think we are up to. We don’t have to agree but remember about the reaction of many here and abroad to the Snowden revelations and Stuxnet attack on Iran.
Our military has been restrained (what we call Title 10) but certainly not our espionage or covert operations (Title 50). Your NSC needs to keep adversary views of our operations in mind or we’re likely to cause more problems than we solve.
RECOMMENDATIONS
Adversary attacks like WannaCry and NotPetya have been well beyond international norms – and you have promised to stand up for America – so it is worth approving these changes to delegate authority for more forward defense and agility.
But just as you wouldn’t fully trust sub-contractors to deliver on what they promise without proving it to you, the same goes here. Write them an initial check but be sure they have to keep coming back to you to show improvement and keep getting more checks. Here are four key items to press for:
Related Articles
SUBSCRIBER+EXCLUSIVE INTERVIEW – For months, Yemen’s Houthis have been launching repeated missile and drone attacks againstcommercial and military ships in the southern Red Sea and […] More
SUBSCRIBER+ EXCLUSIVE — When U.S. and British officials filed charges of cyberespionage and imposed sanctions against China Monday, for a campaign which they said had […] More
OPINION / EXPERT PERSPECTIVE — On the night of March 22, four masked individuals armed with automatic weapons entered the Crocus City Hall in the […] More
SUBSCRIBER+ EXCLUSIVE INTERVIEW — While wars rage in Ukraine and Gaza, the past week has seen a spike in tensions over a global conflict that […] More
SUBSCRIBER+ EXCLUSIVE ANALYSIS — Along with expressions of sympathy for the victims and pledges to bring the perpetrators to justice, Russia’s response to Friday’s deadly […] More
OPINION / EXPERT PERSPECTIVE – The death toll from last week’s terrorist attack inside a concert hall in a suburban Moscow neighborhood is now at […] More
Search