Cybersecurity: Policymakers Need a Consistent Means to Assess Capabilities

Report Defense

Cybersecurity: Policymakers Need a Consistent Means to Assess Capabilities

August 25, 2021 15 min read Download Report
James Di Pane
James Di Pane
Policy Analyst, Defense Policy, Center for National Security
James was a Policy Analyst for Defense Policy at The Heritage Foundation.

Summary

A U.S. Cyber Mission Force should be adequately supported. Budgets and manpower levels for U.S. Cyber Command should meet its operational demands. Force structure assessments should be done regularly to ensure its forces are being used to maximum efficiency. Manpower should be adequately trained to complete its missions, and talent should be carefully cultivated and retained. Training should be standardized to foster consistent skills and practices across the services, and policymakers should actively question whether the force is adequately trained. Building a competent force also requires ensuring that its technology is always cutting edge. Strengthening public–private partnerships will enable the Cyber Command to benefit from the developments made in the private sector.

Key Takeaways

The United States faces a vast cybersecurity landscape with constantly evolving threats; a robust and capable Cyber Mission Force is a national security imperative.

The cost of under resourcing U.S. Cyber Command could mean failing to deter a catastrophic cyberattack.

The Department of Defense and Congress need to ensure budgets and manpower levels meet U.S. Cyber Command’s operational demands.

Two recent cyber hacks, the SolarWinds and the Chinese use of Microsoft products to infiltrate client networks, highlight the fact that sophisticated cyber threats are tangible and immediate.REF The cost of under-resourcing cyber capability could mean failing to deter a catastrophic cyberattack against U.S. critical infrastructure or operational defeat of American forces in an armed conflict. If offensive cyber capability lags behind the capabilities of likely adversaries, America’s policy options will shrink, and its security policy objectives will be undermined. These are high stakes indeed.

When assessing U.S. cyber capabilities, policymakers and Members of Congress should keep a few fundamental questions in mind: Is U.S. Cyber Command adequately staffed to meet the demands put on it? Are its people of sufficiently high quality and appropriately trained to meet the challenges of today and thwart the threats of tomorrow? Does it have the right organization to be effective? Does it have the most cutting-edge technology available? And are its offensive and defensive capabilities being best utilized in support of U.S. national security?

While the answers to these questions are normally classified as military secrets and normally unavailable to the general public, policymakers should nonetheless press to achieve a full understanding of this most critical area.

U.S. Cyber Command and Its Action Arm: Cyber Mission Forces

U.S. Cyber Command is America’s primary military organization for offensive and defensive cyber operations against America’s adversaries. Originally created with a focus on defending military networks from cyber espionage, Cyber Command has expanded to cover defending the nation’s critical infrastructure, election security, and supporting military cyber objectives with both offensive and defensive operations.REF

The Cyber Mission Forces (CMF) are the operational units of Cyber Command and provide the backbone for offensive and defensive cyber operations. When the Department of Defense (DOD) stood up the CMF in 2013, it envisioned a force of 133 teams with 6,200 personnel based on the mission requirements at that time. All 133 CMF teams reached full operational capability in 2018.REF

These teams are broken down into functional areas. There are 13 National Mission Teams that defend the United States against high-impact cyberattacks and provide election security. There are 68 Cyber Protection Teams focusing on defending DOD networks and systems. There are also 27 Combat Mission Teams that support or conduct operations across the globe either in tandem with or independent of other military forces. Additionally, 25 Support Teams provide support with analysis and planning.REF

In addition, there are about 12,000 personnel outside U.S. Cyber Command who maintain DOD networks under the command of the various services.

Adversary Cyber Capabilities: Growing and Dynamic

As robust as U.S. cyber capabilities are, those of America’s adversaries are formidable as well. China, Russia, Iran, North Korea, and non-state actors ranging from international terrorists to criminal organizations are the key adversaries for the U.S. in cyberspace. According to the most recent Worldwide Threat Assessment published by the Office of the Director of National Intelligence: “Our adversaries and strategic competitors will increasingly use cyber capabilities—including cyber espionage, attack, and influence—to seek political, economic, and military advantage over the United States and its allies and partners.”REF

  • The Chinese have invested heavily in cyber with the intention of becoming a cyber superpower.REF It is the most active adversary in cyber espionage, targeting vast amounts of important intellectual data in public and private networks. One example is the Office of Personnel Management hack, detected in 2014, in which the Chinese were able to steal millions of personnel records with sensitive information on individuals holding security clearances.REF A more recent example is the Microsoft hack this past year, in which Chinese hackers reportedly used flaws in SolarWinds software to infiltrate U.S. government networks as well.REF
  • Russia has extensive cyber capabilities and poses a large threat to U.S. critical infrastructure networks. The Worldwide Threat Assessment contained a stark warning about Russia’s cyber capabilities: “Russia has the ability to execute cyber attacks in the United States that generate localized, temporary disruptive effects on critical infrastructure—such as disrupting an electrical distribution network for at least a few hours—similar to those demonstrated in Ukraine in 2015 and 2016. Moscow is mapping our critical infrastructure with the long-term goal of being able to cause substantial damage.”REF
  • Iran and North Korea are continuing to improve their cyber capabilities. Iran’s capabilities for disruptive or destructive cyberattacks are growing, and they have a clear intent to challenge the United States in cyberspace. North Korea has the ability to strike the United States in cyberspace and uses its cyber forces to evade United Nations sanctions.REF
  • Complicating the situation further is the opaque threat landscape in cyber. There are a number of Advanced Persistent Threats that act in concert with or on behalf of nation-states, as well as on their own. In the case of the SolarWinds hack, the hacking group was most likely “Cozy Bear,” a group thought to be affiliated with Russian intelligence.REF

The DOD faces millions of attempted intrusions every dayREF—and this is a peacetime level of activity. The observed cyber activity could dramatically increase during wartime in both tempo and severity.

How Much Is Enough?

In March 2020 testimony, the commander of Cyber Command, General Paul Nakasone, acknowledged that the CMF was created before election security and international developments increased its workload.REF Later in 2021, he stated, “Recent demand across DOD has demonstrated that the original 133 teams in the CMF are not enough. The strategic environment has changed since the original CMF was designated in 2012. Added forces will ensure [Cyber Command] can fulfill its responsibility as both a supported and a supporting command.”REF

It appears the original organization and manpower levels are insufficient for handling today’s missions. But how should policymakers and Members of Congress assess the need for more? Should they just take Nakasone’s word for it? And what could the DOD do to ensure that there is ample understanding of the requirement?

For more conventional military forces, this is an easier question to answer: Navies can be measured by ship counts, missile magazines, or tonnage; armies by tanks, soldiers, or artillery. Cyber is more challenging because of the secrecy that surrounds cyber forces and methods, as well as the different character of cyber conflict.

One solution to this problem would be the development of consistent metrics to convey a relative sense of the security of the DOD in cyberspace. These metrics should include quantifiable elements such as manpower levels, budgets, and the numbers of offensive and defensive cyber incidents in addition to assessments of how U.S. cyber forces compare to their adversaries, how effective their offensive and defensive cyber operations are, and whether the current force is able to meet the demands placed on it. Other factors, such as training and partnerships, could also be included.

Financial Metrics

The President’s budget request for cybersecurity was $9.7 billion for fiscal year (FY) 2021. The DOD had requested $9.8 billion for cyber, with $3.8 billion of that going toward cyber operations.REF For FY 2020, the DOD requested $9.6 billion for cyber, $3.7 billion of which was designated for offensive and defensive cyber operations.REF Cyber Command’s budget for FY 2021 is approximately $605 million;REF in FY 2020, it was reported to be $596 million.REF

It is important to highlight that “throwing money at the problem” is not always an effective way of improving U.S. government capabilities. Money can be misallocated or inefficiently spent. The budget request for cybersecurity says nothing about how effectively that money will be spent. However, as higher priorities often see more funding, changes in year-to-year funding are useful as a snapshot of how high of a priority cybersecurity is considered.

Manpower Metrics

Manpower levels are another easy-to-track metric. In the same way that funding levels change from year to year, personnel levels can show if there is more attention going to cyber or less. If the CMF were to be cut in half or doubled, that would say a lot about their institutional priority.

President Biden is reportedly requesting an increase for the CMF of approximately 600 personnel—an increase of around 10 percent—in his FY 2022 budget request.REF

However, the drawback with assessing people is similar to the issue with tracking money. People can be mismanaged and poorly organized to the point that adding more people will not improve the situation.

For example, defense officials have stated that teams are being reassigned from the counterterrorism mission to the great-power competition mission, a reflection of the growing importance of peer and near-peer competition.REF This shows that decisions must be made with how best to use the available teams, and more attention to one mission set means less attention to another.

In addition, cyber is an unforgiving domain in which quality is valued over quantity. General Nakasone has stated that the best cyber personnel—such as talented coders—could be 10–20 times more valuable than their peers.REF This places an imperative on developing and retaining cyber personnel.

Every effort should be made to retain and develop talent. It is not enough to fully staff a sufficiently large cyber force. That force must also be effective to have its intended impact in understanding and countering the adversaries in the cyber domain.

Training, incentives, and allowing individuals to remain in cyber positions for extended periods of time could all help to foster a stronger and more effective cyber workforce.

Successes of Past Operations

Another means of assessing U.S. cyber effectiveness is to judge the effectiveness of particular operations toward achieving their goals. One example is the 2016 cyber war in which the United States used cyber operations to fight the Islamic State’s ability to distribute propaganda online and fundraise.REF Another is Cyber Command activity to deter Russian and IranianREF interference in the 2020 U.S. elections. A third example is the cyber retaliation taken against Iran following the downing of the U.S. drone in the Strait of Hormuz in 2019. Reports indicated the U.S. conducted a cyber operation action that actually affected physical hardware in Iran.REF

The vast majority of these operations are classified, and some may never be made public. This means the available information will always be limited. As in the cyber operations against Iran, press reporting can indicate suspected cyber activity, but they cannot provide a real understanding of how the U.S. cyber forces are doing operationally. In the case of Iran, all our information came from Iranian sources, and they are not known for their truthfulness.

Without access to the classified material, it is also exceedingly difficult to get a sense of the volume of cyber operations, their success or failure rates, or how successful adversaries are in targeting U.S. networks. General Nakasone testified that U.S. Cyber Command launched over two dozen operations in advance of the 2020 elections,REF but without that testimony, this information would not have come to light.

Cyber officials should ensure that Congress and policymakers are kept adequately informed on the offensive cyber capabilities and options that can be employed to secure U.S. interests. The better informed leaders are on these options, the better able they will be to effectively use these important tools.

But there is also room for the DOD to release more information without giving away vulnerabilities to adversaries. Cyber officials could make a better case for additional resources by releasing more information about the volume and effectiveness of their operations.

Recommendations

The DOD should:

  • Provide more information to the public on the state of cybersecurity. The need for secrecy regarding America’s cyber forces is critical. However, it must be balanced with the need to make the case for more resources to Congress and the American people.
  • Develop consistent criteria for briefing Congress on the state of the CMF and cybersecurity. Congress should be able to fully understand the shortfalls in cyber and their impacts in an objective way. The DOD should develop performance metrics based on personnel, technology, and policies and procedures to provide stability and objectivity to congressional briefings.
  • Conduct a force structure assessment on U.S. Cyber Command every three years. The 133 CMF teams were originally created and sized in 2013 to meet the needs of eight years ago. But since then, the world has changed in significant ways, and election security has been added as a core mission for Cyber Command. Conducting a force structure assessment would help ensure that the military has the right amount of personnel to conduct their vital offensive and defensive missions, taking into account the increased activity from cyber criminals and nation-states.REF
  • Cultivate a better cyber force by enhancing training, attracting quality talent, and providing a cyber career track. In 2019, the Government Accountability Office identified a lack of consistency in training protocols for U.S. Cyber Command.REF The DOD should address this problem.
  • Strengthen public–private partnerships to ensure the CMF have access to cutting-edge technologies. It is essential for U.S. Cyber Command to have strong relationships with the private sector in order to benefit from technological developments.REF One way to strengthen these relationships is to increase the amount of threat intelligence given to the private sector.
  • Strengthen partnerships and cyber cooperation with key allies. Strengthening cyber capabilities among U.S. allies helps to build resilience and enhance deterrence. The United States should actively work with its “Five Eyes” allies—Australia, Canada, New Zealand, and the United Kingdom—to defend against common threats in cyberspace. Cooperation could also expand to other NATO allies and to partners such as India, Japan, and South Korea.

Congress should:

  • Mandate an annual report on the state of the DOD’s cybersecurity, with both a classified and unclassified version for release. This report could serve as the basis for briefing materials and should be based on metrics, especially at the classified level. The unclassified version would educate the public on the broad state of cybersecurity and the possible need for increased funding.
  • Provide sufficient funding for the CMF to handle the new mission set of election security and threats to critical infrastructure. Congress should support the growth of the CMF to ensure it is adequate to meet the demands required of it. U.S. Cyber Command is currently engaged in a force structure assessment, and Congress should support its findings with resources.

Ensuring the Force Is Capable Against Its Likely Adversaries

A robust and capable CMF is a national security imperative that should be adequately supported. The first step is to ensure the budgets and manpower levels are adequate for U.S. Cyber Command to meet its operational demands. Also, force structure assessments should be done regularly to ensure the CMF keeps up with its dynamic mission set and that its forces are being used to maximum efficiency to cover the most important missions.

The next step is to ensure that the force is as competent and effective as it can be by cultivating and retaining talent. Cyber Command officials have pointed to the success of transitioning cyber personnel from active duty to reserve roles in order to retain them, as well as the contributions provided by National Guard personnel.REF Other options include increasing performance incentives, extending the time cyber personnel spend in cyber billets, and ensuring there is a clear promotion path within the cyber infrastructure. Training should be standardized in order to foster consistent skills and practices across the services, and policymakers should actively question whether the force is adequately trained.

James Di Pane is Policy Analyst for Defense Policy in the Center for National Defense, of the Kathryn and Shelby Cullom Davis Institute for National Security and Foreign Policy, at The Heritage Foundation.

Authors

James Di Pane
James Di Pane

Policy Analyst, Defense Policy, Center for National Security

Exclusive Offers

5 Shocking Cases of Election Fraud

Read real stories of fraudulent ballots, harvesting schemes, and more in this new eBook.

The Heritage Guide to the Constitution

Receive a clause-by-clause analysis of the Constitution with input from more than 100 scholars and legal experts.

The Real Costs of America’s Border Crisis

Learn the facts and help others understand just how bad illegal immigration is for America.