Skip to content
Search

Latest Stories

Welcome! Log in to stay connected and make the most of your experience.

Input clean

Offensive Cyber Operations

Offensive Cyber Operations

Hollywood has a clear idea of what it would look like if someone used cyber-capabilities against us: a man in a room full of screens would be typing madly, planes would fall out of the sky, there would be explosions everywhere, and so forth. According to Director of National Intelligence, James Clapper, that’s not likely to happen anytime soon. In a recent Congressional hearing, Clapper said “the likelihood of a catastrophic attack from any particular actor is remote at this time.” However, the reality is that cyber-weapons do exist, raising questions that have bearing on both defense and industry.

First among these questions is: for what purposes are offensive cyber-capabilities being used? Most of the time, offensive cyber-capabilities are used for espionage or theft. This is because cyber-capabilities make it significantly easier to locate, access, and extract information from companies and countries, as the Target and OPM hacks have demonstrated. There have also been distributed denial of service (DDOS) attacks against a variety of different organizations, from banks to non-governmental organizations (NGOs). This type of attack overwhelms computer systems so they can’t function, but while they are disruptive, they are not particularly destructive in any permanent sense. This is in keeping with the government’s expectations. In his testimony, DNI Clapper said that he expects “an ongoing series of low-to-moderate level cyber attacks from a variety of sources over time, which will impose cumulative costs on U.S. economic competitiveness and national security.”

Keep reading...Show less
Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.

Related Articles

Covering the Blaze the World Forgot

BOOK REVIEW: Fuji Fire: Sifting Ashes of a Forgotten U.S. Marine Corps TragedyBy Chas Henry / Potomac BooksReviewed by: Bill HarlowThe Reviewer — [...] More

The Math Behind Trump's $1 Trillion Defense Budget

OPINION — “The President's FY ‘26 [Fiscal Year 2026] National Defense Budget requests $1.01 trillion, which is a 13 percent increase from FY '25 [...] More

The Downward Spiral of Western Counterintelligence

OPINION — Counterintelligence is one of the most vital functions of the intelligence community, helping protect against foreign threats. [...] More

An Urgent Call to Close the Loopholes on Chips and China

EXPERT PERSPECTIVE / OPINION -- The core lessons from the Cold War should guide us as we face the new “Axis of Aggressors” today. First among these, [...] More

Report for Monday, June 30, 2025

8:29 America/Chicago Monday, June 30 [...] More

A Good NATO Summit, Though Russia Won a Round

EXPERT Q&A — NATO leaders convened in The Hague this week for a summit aiming to strengthen the alliance's defenses, with the ever encroaching threat [...] More

NATO Wins Will Have an Impact

CIPHER BRIEF EXPERT Q&A — NATO leaders convened at The Hague this week and agreed to raise the alliance’s defense spending target to 5% GDP, marking [...] More

Dead Drop: June 27

THIS WEEK: SURPRISES, SECRETS AND SPY COCKTAILS: This week’s best collection of national security gossip is filled with surprises, secrets and a [...] More

NATO Lures Trump Back - at a Cost

NATO Lures Trump Back - at a Cost

CIPHER BRIEF REPORTING – The stakes at this week’s NATO summit were sky-high – support for Ukraine, a shoring up of Europe’s defenses, and the [...] More