
How the U.S. is Tapping a Much Bigger Well in The Middle East
EXPERT DEEP DIVE – President Donald Trump’s first official trip to the Middle East during his current administration may have tapped a well that runs […] More
OPINION — “[Asymmetric] challenges have two things in common. First, they are, by their nature, long-term, requiring patience over years and across multiple presidencies. Second, they cannot be overcome by military means alone, and they extend well beyond the traditional domain of any single government agency or department. They require our government to operate with unity, agility, and creativity, and will require devoting considerably more resources to non-military instruments of national power.”
(Robert M. Gates, January 2008)
During the Cold War, the national security community had one defining challenge—containing the Soviet Union. After 9/11, attention turned to counterterrorism. Today, the nation faces a vast array of threats. Increasingly, these are “gray zone” activities—coercive or subversive actions below the threshold of armed conflict.
Recent cyber intrusions into U.S. critical infrastructure attributed to People’s Republic of China (PRC) and Russian cyber actors, attempts by Iran and Russia to influence the upcoming U.S. presidential election, and ransomware attacks against U.S. healthcare providers by Russian cyber criminals are leading examples of this dangerous trend.
FBI Director Christopher Wray says the PRC dangerously “combines cyber means with traditional espionage and economic espionage, foreign malign influence, election interference, and transnational repression,” but he’s quick to add that “China is not the only adversary we’re up against, Russia, Iran, and North Korea are all determined to use cyber means to take aim at things we all hold sacred—our freedoms, prosperity, and democratic norms.”
Malign activities in cyber, economic, information, legal, military/security, and space domains all fall under this umbrella. They either violate global norms or exploit normative gaps. They’ve become weapons of choice for U.S. adversaries who often fail to discriminate between civilian and government boundaries and see instead one contiguous target-rich battlespace. These threats undermine democratic institutions, threaten critical infrastructure and economic resources, and subvert international order. They can only be countered by thoughtfully and comprehensively applying all elements of national power in partnership with allies.
Sign up for the Cyber Initiatives Group newsletter. Better results in cyber require better thinking. Sign up for the CIG newsletter today.
More hostility in the shadows
Between now and 2030, the intelligence community (IC) forecasts more frequent, diverse, and damaging acts of coercion and subversion by the PRC, Iran, Russia, and North Korea, according to a July 2024 National Intelligence Estimate (NIE) on conflict in the gray zone. The IC expects more hostile activity as these four governments look to challenge the U.S. and advance their goals while also aiming to avoid direct war.
Such shadowy campaigns are likely to increase and diversify as new technologies enable them, countervailing norms are eroding or missing entirely, attribution remains challenging, and adversaries consider the campaigns useful. Fundamentally, in the eyes of adversaries, the risks for conducting these activities are low and the benefits are high. The PRC, for instance, has a strategy for annexing Taiwan without fighting.
What’s more, the NIE notes there is a rising risk that adversaries could collaborate more directly on gray zone activities in the future.
Overcoming “unprecedented burdens”
Current challenges are pressure testing the U.S. defense and national security community, partners, allies, and industry like never before. As Director of National Intelligence Avril Haines testified to Congress, the dynamics are creating “unprecedented burdens on the institutions and the relationships that the United States relies on to manage such challenges.”
To be fair, there are examples of successful actions by the U.S. government and foreign partners to contest malign influence operations and disruptive cyberattacks. Successful operations are intelligence driven, may be led by law enforcement, and often include collaboration with foreign partners and commercial providers.
But there is a lot more that needs to be done. Recent disruptive cyber threats and malign influence activities are so significant that they require an urgent and decisive whole of-nation response.
Watch The World Deciphered, a new weekly talk show from The Cipher Brief with expert commentary on national and global security available exclusively on The Cipher Brief’s YouTube channel. Subscribe today.
Next Steps for National Security Leaders
By strengthening U.S. policy, as well as partnerships abroad and with industry, national security leaders can accelerate the speed, scale, persistence, and effectiveness of efforts to counter and diminish the impacts of gray zone activities.
Policy and legislation:
Operations:
Geopolitical and industry partnerships:
Together, the U.S., partners, and industry can chart a clear path for national security through the gray zone.
Booz Allen is focused on accelerating mission outcomes for national security. Learn more here.
The Cipher Brief is committed to publishing a range of perspectives on national security issues submitted by deeply experienced national security professionals.
Opinions expressed are those of the author and do not represent the views or opinions of The Cipher Brief.
Have a perspective to share based on your experience in the national security field? Send it to [email protected] for publication consideration.
Read more expert-driven national security insights, perspective and analysis in The Cipher Brief
Related Articles
EXPERT DEEP DIVE – President Donald Trump’s first official trip to the Middle East during his current administration may have tapped a well that runs […] More
DEEP DIVE – Coverage of the U.S.-China tariff war has focused on the impact for consumers – the potential for spikes in the prices of […] More
BOTTOM LINE UP FRONT – As the U.S. faces unprecedented threats from cyberattacks, experts are warning about the impact of cuts to the nation’s cyber […] More
EXCLUSIVE INTERVIEW – It’s hard to overstate the complexity and importance of the work of the National Geospatial-Intelligence Agency (NGA), which — by its own […] More
EXPERT INTERVIEWS – Ukrainian President Volodymyr Zelensky announced this week that Ukraine plans to take an already-booming domestic drone industry and boost it to “the […] More
EXCLUSIVE CIPHER BRIEF REPORTING — The Cipher Brief was the first to report on Thursday in the weekly Dead Drop column that Director of the […] More
Search