Skip to content
Search

Latest Stories

cipherbrief

Welcome! Log in to stay connected and make the most of your experience.

Input clean

By Land, Sea and Air, U.S. Military Faces Cyber Threats to Mobility

OPINION — A direct military engagement between the United States and a near-peer adversary would require the swift mobilization and deployment of a sizable U.S. military force. Moving troops and equipment efficiently over land, sea, and air is essential to America’s ability to project power, support partners and allies, and sustain forces to fight and win wars. Alongside the U.S. military’s own assets, commercially owned and operated critical infrastructure enables this military mobility. While U.S. Transportation Command (TRANSCOM) conducts logistical operations to facilitate the mobility of U.S. forces, civilian-owned rail networks, commercial ports, and airport authorities will handle transportation of the majority of servicemembers and materiel during a significant, rapid mobilization. U.S. adversaries know that compromising this critical infrastructure through cyber and physical attacks would impede America’s ability to deploy, supply, and sustain large forces. As the U.S. intelligence community’s 2024 annual threat assessment warned, China would “consider aggressive cyber operations against U.S. critical infrastructure and military assets” in the event of an imminent conflict with the United States. Beijing would seek to use these operations not only as a deterrent against further U.S. military action but also specifically to “interfere with the deployment of U.S. forces.”

Over the past year, the intelligence community has revealed how deeply Chinese hackers known as Volt Typhoon penetrated U.S. transportation, energy, and water systems. Volt Typhoon demonstrated China’s capability to gain and maintain persistent access to closed systems and preposition malicious payloads to cause disruption and destruction. Meanwhile, other Chinese Communist Party (CCP) malicious cyber operations, including Flax Typhoon, hijacked cameras and routers, and Salt Typhoon burrowed deep into U.S. telecommunications networks. In addition to enabling potential disruption, compromising critical infrastructure allows Beijing to amass information about the movement of goods, surreptitiously watching as the United States moves its military equipment across the country. Given these threats, the U.S. military has a vested interest in the security of the nation’s critical transportation infrastructure.


The cybersecurity of the critical air, rail, and maritime infrastructure that underpins U.S. military mobility is insufficient. To improve resilience, the United States needs significant investment by the government and private sector as well as improved public-private collaboration. The nation can no longer afford to waste time debating the immediacy of the threat. Washington must identify and resource solutions now.



Experts are gathering at The Cipher Brief’s NatSecEDGE conference June 5-6 in Austin, TX to talk about the future of war. Be a part of the conversation.



Recommendations

For All Transportation Systems:

1. Congress, the executive branch, and independent federal and state regulators should work together to harmonize cybersecurity regulations.

2. Congress should authorize and appropriate funding for cybersecurity grant programs across all transportation critical infrastructure subsectors vital to military mobility.

3. DoD should review interagency coordination and its own implementation of responsibilities for defense critical infrastructure protection.

4. DoD should conduct national and local exercises with private-sector partners simulating the mobilization of military forces while critical infrastructure sustains cyberattacks.

5. The White House should revise the GPS governance strategy and accelerate the transition to the GPS III architecture and the less vulnerable L5 frequency while also exploring the feasibility of terrestrial PNT.

For Maritime Transportation Systems:

6. The Government Accountability Office should conduct an audit of U.S. Coast Guard requirements to effectively exercise its SRMA responsibilities.

7. Congress should provide additional appropriations to support cyber initiatives conducted by U.S. Coast Guard captains of the port.

8. The U.S. Coast Guard and CISA should provide guidance on trusted vendors for maritime operational technology.

For the National Airspace System:

9. Congress should provide oversight and appropriations to ensure that the FAA and TSA collaboration with the private sector is fully resourced.

10. The FAA should produce a cybersecurity roadmap report to be delivered to Congress alongside the FAA NextGen Annual Report.

For the U.S. Freight Rail Industry:

11. TSA should continue investing in building collaboration and trust with rail operators.

12. The White House should direct an interagency supply chain risk assessment for the U.S. freight rail industry.

13. DoD should produce an annex on cybersecurity and resiliency alongside its five-year STRACNET assessments.

The above is excerpted from the FDD report: Persistent Access, Persistent Threat: Ensuring Military Mobility Against Malicious Cyber Actors

A link to the full report can be found here

A conversation with Annie Fixler about the report can be found here at The Cipher Brief YouTube channel.

Related Articles

The Brave New World of Drone Swarms

The Brave New World of Drone Swarms

DEEP DIVE – A drone weapon heads behind enemy lines, on a mission to kill troops and destroy equipment. To its left and right are a dozen other armed [...] More

Hicksville, N.Y.: A Long Island Rail Road employee disinfects a train car with an eco-friendly cleaner while at the Hicksville, New York LIRR station on March 19, 2020.

Can High-Tech “Sensor Fusion” Revolutionize Biosurveillance?

DEEP DIVE – It’s the opening act in a potential public health nightmare: a chicken dies on a farm, for no apparent reason; another perishes at a farm [...] More

Former GCHQ Chief: Cybersecurity, AI, and the New Age of Multilateral Defense

EXPERT INTERVIEW — The last few months have seen a series of major cyber incidents which have frozen airports, crippled companies, compromised [...] More

A New Frontline: How Digital Identity Fraud Redefines National Security Threats

A New Frontline: How Digital Identity Fraud Redefines National Security Threats

DEEP DIVE — From stolen military credentials to AI-generated personas seamlessly breaching critical infrastructure, digital identity fraud is rapidly [...] More

Why Are There No U.S. Offensive Cyber Unicorns?

OPINION -- I recently had a conversation with senior intelligence community leaders about their desire to build stronger partnerships with [...] More

Inside Xi Jinping’s Military Purge: Loyalty, Power, and Taiwan

OPINION — Last week’s Fourth Plenum of the Chinese Communist Party witnessed a purge of China’s senior military leaders, culminating in over two [...] More

{{}}