Doctor No has worked in the Cybersecurity field for more than 15 years. He has also served in the military. He has a keen interest in following the latest developments in foreign policy, information security, intelligence, military, space and technology-related issues. You can follow him on Twitter @DoctorNoFI. The author wishes to remain anonymous due to the work he is doing. The author also wishes to thank @LadyRed_6 for help in editing. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.
Title: An Assessment of the 2018 U.S. Department of Defense Cyber Strategy Summary
Date Originally Written: November 11, 2018.
Date Originally Published: December 3, 2018.
Summary: On September 18, 2018, the U.S. Department of Defense (DoD) released a summary of its new Cyber Strategy. While the summary indicates that the new document is more aggressive than the 2015 strategy, that is not surprising as President Donald Trump differs significantly from President Barack Obama. Additionally, many areas of adversary vulnerabilities will likely be taken advantage of based upon this new strategy.
Text: The U.S. DoD released a summary of its new Cyber Strategy on September 18, 2018. This 2018 strategy supersedes the 2015 version. Before looking at what has changed between the 2015 strategy and the new one, it is important to recap what has happened during the 2015-2018 timeframe. In 2015, President Obama met with China’s Premier Xi Jinping, and one of the issues discussed was China’s aggressive cyber attacks and intelligence gathering targeting the U.S. Government, and similar activities targeting the intellectual property of U.S. companies. The meeting and the sanctions before that did bear some fruit, as information security company FireEye reported cyber attacks from China against the U.S. decreased after that meeting.
Russia on the other hand, has increased cyber operations against the U.S. and other nations. During 2014 in Ukraine, Russia seized Crimea, participated in military operations in Eastern Ukraine, and also demonstrated its might in cyber capabilities during these conflicts. Perhaps the most significant cyber capability demonstrated by Russia was the hacking and immobilizing of Ukrainian power grid in December 2015. This event was significant in that it attacked a critical part of another country’s essential infrastructure.
The cyber attack that had the most media coverage likely happened in 2016. The media was shocked when Russians hacked the U.S. Democratic National Committee and used that data against Presidential candidate and former Secretary of State Hillary Clinton, specifically in social media during the U.S. Presidential election.
The U.S. had its own internal cyber-related problems as well. “Whistleblower” Reality Winner and the criminal negligence of Nghia Hoang Pho have somewhat damaged the National Security Agency’s (NSA) capabilities to conduct cyber operations. The Nghia Hoang Pho case was probably the most damaging, as it leaked NSA’s Tailored Access Operations attacking tools to adversaries. During this timeframe the U.S. Government also prohibited the use of Kaspersky Lab’s security products in its computers due to security concerns.
Also worthy of note is that the U.S. administration has changed how it conducts diplomacy and handles military operations. Some have said during President Obama’s tenure his administration micromanaged military operations. This changed when President Trump came to the White House as he gave the U.S. military more freedom to conduct military operations and intelligence activities.
Taking these events into account, it is not surprising that the new DoD Cyber Strategy is more aggressive in its tone than the previous one. Its statement to “defend forward to disrupt or halt malicious cyber activity at its source,” is perhaps the most interesting. Monitoring adversaries is not new in U.S. actions, as the Edward Snowden leaks have demonstrated. The strategy also names DoD’s main adversaries, mainly China and Russia, which in some fields can be viewed as near-peer adversaries. The world witnessed a small example of what to expect as part of this new strategy when U.S. Cyber Command warned suspected Russian operatives of upcoming election meddling.
Much has been discussed about U.S. reliance on the Internet, but many forget that near-peer adversaries like China and Russia face similar issues. What China and Russia perhaps fear the most, is the so-called Orange Revolution, or Arab Spring-style events that can be inspired by Internet content. Fear of revolution leads China and Russia to control and monitor much of their population’s access to Internet resources via the Great Firewall of China, and Russia’s SORM. Financial and market data, also residing on the Internet, presents a vulnerability to Russia and China. Much of the energy sector in these countries also operates and monitors their equipment thru Internet-connected resources. All of these areas provide the U.S. and its allies a perfect place to conduct Computer Network Attack (CNA) and Computer Network Exploitation (CNE) operations, against both state and non-state actors in pursuit of U.S. foreign policy goals. It is worth noting that Britain, arguably the closest ally to the U.S., is also investing in Computer Network Operations, with emphasis on CNA and CNE capabilities against Russia’s energy sector for example. How much the U.S. is actually willing to reveal of its cyber capabilities, is in the future to be seen.
Beyond these changes to the new DoD Cyber Strategy, the rest of the document follows the same paths as the previous one. The new strategy continues the previous themes of increasing information sharing with allies, improving cybersecurity in critical parts of the homeland, increasing DoD resources, and increasing DoD cooperation with private industry that works with critical U.S. resources.
The new DoD Cyber Strategy is good, provides more maneuver room for the military, and its content will likely be of value to private companies as they think about what cyber security measures they should implement on their own systems.
 U.S. Department of Defense. (2018). Summary of the Department of Defense Cyber Strategy. Retrieved from https://media.defense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_STRATEGY_SUMMARY_FINAL.PDF
 Fireeye. (2016, June). REDLINE DRAWN: CHINA RECALCULATES ITS USE OF CYBER ESPIONAGE. Retrieved from https://www.fireeye.com/content/dam/fireeye-www/current-threats/pdfs/rpt-china-espionage.pdf
 Zetter, K. (2017, June 03). Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid. Retrieved from https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/
 Lipton, E., Sanger, D. E., & Shane, S. (2016, December 13). The Perfect Weapon: How Russian Cyberpower Invaded the U.S. Retrieved from https://www.nytimes.com/2016/12/13/us/politics/russia-hack-election-dnc.html
 Office of the Director of National Intelligence. (2017, January 6). Background to “Assessing Russian Activities and Intentions in Recent US Elections”: The Analytic Process and Cyber Incident Attribution. Retrieved from https://www.dni.gov/files/documents/ICA_2017_01.pdf
 Philipps, D. (2018, August 23). Reality Winner, Former N.S.A. Translator, Gets More Than 5 Years in Leak of Russian Hacking Report. Retrieved from https://www.nytimes.com/2018/08/23/us/reality-winner-nsa-sentence.html
 Cimpanu, C. (2018, October 01). Ex-NSA employee gets 5.5 years in prison for taking home classified info. Retrieved from https://www.zdnet.com/article/ex-nsa-employee-gets-5-5-years-in-prison-for-taking-home-classified-info/
 Volz, D. (2017, December 12). Trump signs into law U.S. government ban on Kaspersky Lab software. Retrieved from https://www.reuters.com/article/us-usa-cyber-kaspersky/trump-signs-into-law-u-s-government-ban-on-kaspersky-lab-software-idUSKBN1E62V4
 Altman, G. R., & III, L. S. (2017, August 08). The Obama era is over. Here’s how the military rates his legacy. Retrieved from https://www.militarytimes.com/news/2017/01/08/the-obama-era-is-over-here-s-how-the-military-rates-his-legacy/
 Barnes, J. E. (2018, October 23). U.S. Begins First Cyberoperation Against Russia Aimed at Protecting Elections. Retrieved from https://www.nytimes.com/2018/10/23/us/politics/russian-hacking-usa-cyber-command.html
 Zasenko, O. E., & Kryzhanivsky, S. A. (2018, October 31). Ukraine. Retrieved November 1, 2018, from https://www.britannica.com/place/Ukraine/The-Orange-Revolution-and-the-Yushchenko-presidency#ref986649
 History Channel Editors. (2018, January 10). Arab Spring. Retrieved November 1, 2018, from https://www.history.com/topics/middle-east/arab-spring
 Chew, W. C. (2018, May 01). How It Works: Great Firewall of China – Wei Chun Chew – Medium. Retrieved November 1, 2018, from https://medium.com/@chewweichun/how-it-works-great-firewall-of-china-c0ef16454475
 Lewis, J. A. (2018, October 17). Reference Note on Russian Communications Surveillance. Retrieved November 1, 2018, from https://www.csis.org/analysis/reference-note-russian-communications-surveillance