
Defending Against a Digital Storm: How to Stop China’s Cyber ‘Typhoons’
DEEP DIVE — The “Salt Typhoon,” “Volt Typhoon” and “Silk Typhoon” cyber espionage campaigns have become symbols of China’s efforts to hack U.S. infrastructure – and […] More
Mr. President, as you know the United States has faced cyber attacks of increasing frequency and viciousness from our adversaries. Your NSC is about to bring you both a new cyber strategy and a proposal to modify a previous NSC document called PPD-20 to give US Cyber Command more authority to interfere with these adversary attacks without checking back with you and the NSC as much.
You should approve these changes but with some very important conditions or else the Department of Defense might just drag you into more unwanted fights.
BACKGROUND
US cyber operations for offensive or intelligence purposes goes back decades – the first combat unit was formed by the Air Force in 1995. It is nothing new. What is new is the attacks from all sides with increasingly little respect for restraint or norms. At some point one of these attacks – such as WannaCry (North Korea), WannaCry (Russia) or one from Iran or China – will kill people and drag nations into a real war.
US Cyber Command has a new vision of wanting to “defend forward” with more agility to prevail in the “persistent engagement” of cyber conflict. Generally it is the right vision, though not without risks.
Your primary means to control escalation is a document called PPD-20. It is still classified, though leaked in its entirety on the Internet, so we won’t quote from it here. But it generally allows the military only limited flexibility to respond to cyber attacks, such as by disrupting the enemy’s command and control networks before they have a chance to attack us. You, or your designee, has to approve these.
Your NSC and DoD will be pushing for changes to PPD-20 for more agility and to defend forward, per the new vision from Cyber Command, so that these operations can be approved at lower levels. These changes are also likely to be in your new national cyber strategy.
DISCUSSION
It is a common view that if only we use more force against our adversaries they will back down – this is often called active defense, or deterrence, or raising their costs. But it might not be true; maybe cyber conflict is more like the irregular warfare in Iraq or Afghanistan where three presidents have been told “with just a bit more force we can win this thing.”
Cyber conflict be similar to irregular warfare, where more force causes the other side to rise up, not back down, unless we team with those most affected. In this case, that’s the private sector.
Or maybe it will work just as DoD says and pushing back on adversaries will bring everyone back to sanity. Either way, it is an experiment, so you need to be careful lest you create more crises that distract you from your agenda.
The US has been giving perhaps as well as we’ve been getting. Your military officials correctly note that our adversaries are ignoring restraint and norms and “extending their influence without resorting to physical aggression,” but that is exactly what our adversaries think we are up to. We don’t have to agree but remember about the reaction of many here and abroad to the Snowden revelations and Stuxnet attack on Iran.
Our military has been restrained (what we call Title 10) but certainly not our espionage or covert operations (Title 50). Your NSC needs to keep adversary views of our operations in mind or we’re likely to cause more problems than we solve.
RECOMMENDATIONS
Adversary attacks like WannaCry and NotPetya have been well beyond international norms – and you have promised to stand up for America – so it is worth approving these changes to delegate authority for more forward defense and agility.
But just as you wouldn’t fully trust sub-contractors to deliver on what they promise without proving it to you, the same goes here. Write them an initial check but be sure they have to keep coming back to you to show improvement and keep getting more checks. Here are four key items to press for:
Related Articles
DEEP DIVE — The “Salt Typhoon,” “Volt Typhoon” and “Silk Typhoon” cyber espionage campaigns have become symbols of China’s efforts to hack U.S. infrastructure – and […] More
EXPERT INTERVIEW — While much of the world’s attention in recent weeks has been on Europe, and the U.S. tilt to Russia in its pursuit for […] More
EXPERT INTERVIEW — World leaders and tech executives are gathered in Paris for the latest global summit on artificial intelligence. The French AI summit, co-hosted by […] More
BOTTOM LINE UP FRONT — When word first came last week that China’s AI startup DeepSeek had launched an artificial intelligence (AI) assistant that could compete […] More
BOTTOM LINE UP FRONT — The U.S. is facing an onslaught from adversaries in cyberspace, and while conversations about the response has focused on bolstering cybersecurity […] More
EXPERT INTERVIEWS — While the North Atlantic Treaty Organization (NATO) has long counted the United States among its most generous and loyal members, many NATO nations […] More
Search