ARTICLES

Dec. 22, 2021

Four Questions Indicating Unlearned Lessons Concerning Future Military Digital Systems and Fleet Design

The US military knows well that it is fully engaged in ongoing 'peacetime' cybered conflict against state and nonstate actors intending to harm the US and its allies and partners.[1] This enduring conflict is driven by various motives and takes myriad forms, ranging from ransomware attacks and theft of technical intellectual property to what is, in effect, cyber privateering and piracy. Various issues afflict the cyberspace substrate and extend deep into the socio-technical-economic system (STES) of modern Western democracies. Given the grievous damage that could be done, these vulnerabilities—many self-inflicted—are astounding. Yet, to some extent, the US military (and perhaps its allies as well) perceives its forces and systems to be partially immune (at least internally) from these 'civilian' vulnerabilities since it has 'secure' communications, networks kept apart from the public internet, and air gaps between weapons systems and outside digital threats. But is this accurate?

Dec. 22, 2021

Content as Infrastructure: The Unlearned Lesson about Cyber Security and Information Integrity

Informational content is just beginning to be properly considered as an urgent infrastructure security concern in addition to the physical integrity and functionality of the computers and telecommunications networks that enable the transmission of such content. The 2016 and 2020 presidential elections in the United States (US) raised awareness about disinformation campaigns and greatly increased both public and private sector efforts to combat foreign influence operations. But the importance of informational content goes far beyond its potential cognitive impact on human actors, such as voters. Automated industrial control systems (ICS) and Internet of Things (IoT) devices can be adversely impacted, or even maliciously manipulated, as well. In a world of heightened reliance on artificial intelligence (AI) and/or machine learning (ML) algorithms – which require large volumes of training data – content becomes part of the infrastructure, because each datum that is processed contributes to the future functionality of the algorithm. AI/ML algorithms that are trained on or receive disinformation inputs will yield imperfect outputs.

Dec. 22, 2021

Unlearned Lessons from the First Cybered Conflict Decade – BGP Hijacks Continue

Unlearned lessons are those where the harm, attack methods, or malicious tools are demonstrated publicly and yet neglected by those who need to respond or better plan for future attacks. By 2010, reports of network traffic hijack attacks – called here Internet Protocol (IP) or Border Gateway Protocol (BGP) hijacks – had already surfaced. Most notably publicized was the China Telecom IP hijack attack in that year where 15% of the global Internet traffic was rerouted or "hijacked" through servers in China.While the scale of this original event has been debated, there is little doubt that throughout the following decade, attacks of this kind continued. Eight years later, in 2018, we reported on China Telecom using its otherwise seemingly innocent network servers to reroute (or hijack) Internet traffic through China at its will. At the time, the company had 10 "points of presence" (PoPs, locations where a company's routing equipment is located) in North America, each strategically located and available to hijack or divert network traffic through China from North America. The 2018 paper drew significant attention to the problem by the general public (through popular media outlets), the cybersecurity and research communities, and various stakeholders in western nations' governments, and yet the lesson is still unlearned by many of the same nations currently being victimized by China Telecom illicit activity and other BGP hijacks.

Dec. 22, 2021

The Need for National Cyber Insurance - A Lesson to be Relearned

Securing a nation’s cyber borders requires a high degree of coordination and openness among the relevant units, including real-time information sharing and threat assessment. Unfortunately, however, not only is there little incentive for private sector entities to voluntarily offer the necessary level of cooperation, but policy makers in free societies are reluctant to force such measures on them. Even more unfortunate is the fact that the threats are real, substantial, and have the capacity to have an adverse impact far beyond the initial point of incursion. This raises the question as to whether or not there exist yet-to-be learned lessons that could point us toward a means of motivating businesses and other institutions to accept what would otherwise be unwelcome intrusion and expense.

Dec. 22, 2021

Conclusion: When Experience Speaks and Too Few Listen – Curating the Unlearned Lessons

The past decade has ushered the rise of a 'Cyber Westphalian,' increasingly conflictual world characterized by rising great power competition, which now has escalated into ‘Great Systems Conflict’[2] across all digitally dependent societal domains. These struggles are occurring for, through, and enabled by cyberspace, and are now well in evidence globally. Yet, after ten years of experiments in creating organizations, strategies, policies, and offensive campaigns, consolidated democracies have either neglected or missed some valuable lessons. The essays in this special issue provide a broad overview of what was missed, ignored, mistaken, or simply not learned despite indications and experience. They also offer a way forward to tackle some of the more complex issues discussed. The unlearned lessons identified here range over issues of strategic approach, national scale and capacity, institutional change, and the socio-technical-economic system’s framing of the cybered conflict challenge. The authors here—subject matter experts with considerable and well-recognized expertise—are concerned about what we collectively are failing to appreciate and act upon. They intend by these essays to inform future national strategies, policies, and institutions to ensure that these unlearned lessons do not turn into future strategic failures in a rising, deeply cybered, post-westernized, authoritarian world.

Nov. 15, 2021

The Cyber Defense Review: Thinking of the Future

Since the publication of Johannes Kepler’s novel, Somnium, science fiction has played an interesting role in society. It has been used to inspire (just ask how many current astronauts point to Star Trek as their reason for their chosen profession), to inform about possibilities (driverless cars have appeared in numerous films), or to serve as a warning (pick any post-apocalyptic movie…there’s too many to list). Many of the current cyberspace challenges we face were, at one time, the stuff of science fiction. While it is possible to fixate on the negative aspects of the current and future state, the many authors in this issue offer potential solutions for our challenges. Hopefully, their perspectives and proposals will move us beyond the status quo to reach a more advantageous state.

Nov. 15, 2021

Responding to Proxy Cyber Operations Under International Law

The United States (US), its allies, and other partners are engaged in long-term strategic competition with Russia and China—near-peer adversaries adept at operating in the grey zone of international law, where the precise contours of the law are difficult to discern. They do so to complicate our response options, in part to avoid provoking a direct military response. Increasingly, cyberspace is that grey zone, a domain in which Russia, China, and other adversaries such as Iran and North Korea mount cyber operations ranging from cyber-enabled espionage, theft, and propaganda campaigns to significantly more disruptive and destructive operations. In particular, they often leverage non-state actors—cyber proxies—to do their bidding because proxies further complicate legal and policy assessments of the operations. And those assessments determine the response options available to victim states.

Nov. 15, 2021

Toward a Zero Trust Architecture Implementation in a University Environment

The core concepts of Zero Trust Architecture have existed since the Jericho Forum in 1994 and have served as the goal of cyber security specialists for many years. Zero Trust Networks and Architectures are extremely appealing to institutions of higher learning because they offer the flexibility to support research and learning while protecting resources with different protection levels, depending on the sensitivity of the resource. This paper investigates how other universities can employ the Zero Trust Architectures using the West Point model.

Nov. 15, 2021

What Every Leader Needs Now in This Unprecedented Era of Global Competition

The global pandemic forced recognition of what many already knew: the world has changed in ways that significantly alter every organization’s strategic planning; few will adapt and thrive, but most will remain stagnant and perish. The world as we think we know it no longer exists. Every consequential factor, of a weakened competitive position in this new era, will cascade across our traditional landscape of responsibilities: militaries can no longer defend national borders; governments can no longer control what happens to their constituencies; and businesses are now both the primary targets and prime facilitators of global affairs.

Nov. 15, 2021

Practical Cyber Risk Management for Tactical Commanders

Risk management in today’s complex threat environment necessitates decision rules that integrate cyber risk control into the overall mission risk profile. This article outlines cyber risk management decision rules that are based on lessons learned from the Expeditionary Signal Battalion-Enhanced (ESB-E) prototype, which adapted Special Operations Forces (SOF) and commercial-off-the-shelf (COTS) capabilities by applying a rapid fielding and feedback approaches within the scope of the Army Futures Command. Focus areas include the use of diverse COTS systems and satellite communications providers to mitigate risk, controlled system maintenance processes, capitalizing on behavioral bias in cybersecurity, integrating enterprise services, and keeping pace with technological innovation trends. Lessons learned are intended to give tactical commanders practical cyber risk management options within the overall scope of mission risk management.