scorecard
  1. Home
  2. international
  3. news
  4. The US is scrambling to deal with cyberattacks, and that may mean new roles and missions for special-ops units

The US is scrambling to deal with cyberattacks, and that may mean new roles and missions for special-ops units

Stavros Atlamazoglou   

The US is scrambling to deal with cyberattacks, and that may mean new roles and missions for special-ops units
International5 min read
  • A spate of cyberattacks has the US government scrambling to devise a response.
  • Increasing interconnectivity also means the the public and private companies are more exposed.
  • For US special operators, the trend may mean more responsibility and more operations in the cyber domain.

SolarWinds. Colonial Pipeline. New York City's subway. These are only some of the targets of cyberattacks on the US government and private sector in recent months.

Although damage from these mostly unattributed cyberattacks - Russia and China are suspected - varies, private citizens have started feeling the impact in their daily lives, as shown by the gas shortage after the Colonial Pipeline cyberattack.

In light of these cyberattacks, the US government is pondering a more aggressive strategy, even starting to give ransomware investigations the same attention as terrorism cases.

Meanwhile, NATO's secretary general said a cyberattack against a member could meet "the thresholds for triggering Article 5," the alliance's collective-defense clause.

In military parlance, the US government must figure out how it can "threaten to impose unacceptable costs" by, with, and through persistent physical and virtual engagement.

Although the Geneva Conventions and Tallinn Accords offer some guidance, they are by no means definite. There is also the issue of attribution. If Russia, for example, used a criminal group as proxy, the US would have to verify Moscow's role before responding.

That response also has to deal with questions of proportionality.

Would halting Moscow's subway be a proportionate response to election interference? Would publishing the personal information of Chinese intelligence officers be a proportionate response to the theft of classified personal information of millions of US government employees and troops?

The absence of rules of engagement or, at the very least, of red lines only enables adversaries to test the US.

Special operations and cyberwarfare

The Pentagon and the Intelligence Community have differing aims for cyber operations, and inside the military there are varying capabilities and goals - mainly those of US Cyber Command and US Special Operations Command - in that domain.

Those divides underline the absence of a broader cyber strategy.

The US special-operations community has been paying more attention to the cyber domain, which offers the community an opportunity to understand an adversary, find its weaknesses, and use them against it.

American commandos have already used these capabilities to fight ISIS. In the age of great-power competition with more sophisticated adversaries, like China and Russia, US commandos deployed to study Chinese capabilities or to track Russian influence operations can also take advantage of those capabilities.

"Not only does SOF have an interest in more cyber, but they have made it known they plan on significantly increasing their investment in cyber- and electronic-warfare capabilities," Herm Hasken, a partner and senior operations consultant at MarkPoint Technologies, told Insider.

For Special Operations Command and Joint Special Operations Command, that investment is reflected in the National Defense Authorization Act, an annual bill that funds defense and national-security programs.

The special-operations community's push for more cyber powers suggests a desire for more expansive offensive roles. For example, special-operations teams might find themselves placing sensors in Southeast Asia to provide insight on Chinese cyber capabilities and how to deter them.

But the special-operations community should broaden how it uses that investment and where it is applied, according to Hasken, who has extensive special-operations and intelligence-community experience - including time as chief cryptologist for Special Operations Command - as well as several combat deployments.

"Why not send special operations out with commercial, off-the-shelf tools that can help us understand what the environment is out there?" Hasken said.

"If I look at the SOF community, there are commandos deployed in 70 countries or more on any given day. That's access in gray spaces we want to get into," Hasken said, noting that more access yields more insight and that "insight equals decision dominance."

In addition to offensive operations, the US special-operations community is flexible and can use cyber to gain an advantage against adversaries in more traditional missions.

For example, Special Operations Command's Army Special Forces, Civil Affairs, and Psychological Operations units can use cyber operations to better understand the local populations they work with and to influence their views of the US. Information gathered through cyber operations can also be used to improve US training of foreign partner forces.

Conversely, Cyber Command is more interested in knowing where an adversary's communications networks are and how to take them out. In the absence of a broader US cyber strategy, such a capability is wasted, as it's reserved for combat operations.

A strategic danger at home

Great-power competition doesn't necessarily mean war, and those gray spaces where it takes place can also emerge at home, ensnaring critical infrastructure, private companies, and the public.

The US Cybersecurity and Infrastructure Security Agency identifies 16 sectors as critical infrastructure - including communications, emergency services, healthcare, and nuclear energy - because of their role in how the country works and in private citizens' lives.

Government and industry need to move beyond discussions and develop defenses for those sectors, Hasken told Insider.

Failing to defend them will have "devastating impacts" on the global economy and on Americans' trust in their government "to execute any meaningful consequence management," Hasken added.

"SolarWinds, Colonial Pipeline, and even the JBS Meat Packing cyberattacks are going to appear as mere pinpricks compared to attacks in the future if we do not get this right," Hasken said.

As people give more devices more access to their daily lives - whether through online banking or internet-enabled appliances - cybersecurity takes on more importance for ordinary citizens, and demand for private-sector cybersecurity services is growing is growing.

Companies like SMU - which is led by former special-operations and intelligence professionals who specialize in individual online privacy and cybersecurity - are becoming the go-to choice.

"There's no longer a need to wait for the NSA or FBI or DHS to put out a bulletin warning individual citizens of the risks of cybercrime," an expert at the Signature Management Unit, one of those firms, told Insider.

The increasing potential for cyber operations by a nation-state or a criminal group to affect the public has raised the stakes for those families and businesses, according to the SMU expert, who has joint special operations and intelligence experience and spoke anonymously to discuss the firm's projects.

"While we invest a lot in national cyber and the cybersecurity infrastructure protection, this is not a replacement for individual responsibility," the SMU expert said.

READ MORE ARTICLES ON


Advertisement

Advertisement