Advertisement

The Defense Department is dealing with a remarkable capacity space.

Talk to this article

0:00

More information. This characteristic uses an automated message, which may cause sporadically incorrect pronunciation, tone, or sentiment.

On September 5, 2024, the United States Army Corps of Engineers-Far East District remodels a Suwon Air Base’s telecoms service. The work includes both interior and exterior ends as well as HVAC, plumbing, and electrical systems. ( Photo by Rachel Napolitan of the US Army )

A number of significant Chinese cyberattacks that target U.S. critical infrastructure are the backdrop of the Trump administration. The Department of Defense ( DOD ) is faced with a startling capacity gap in the department of defense ( COD ): While incoming officials struggle with long-standing failures to stop China and other adversaries from launching cyberattacks on the United States, the civilian and military professionals who are responsible for protecting the same kind of assets that China compromised receive inadequate training in recognizing, defending against, and recovering from malicious state-sponsored cyber activity. There is no house in an institution for this crucial education.

With 800 installations spread out over more than 70 nations and territories, the U.S. government has an extensive world footprint. The power lines, water pipes, and fiber optic cables that supply these foundations are owned and operated by public and private infrastructure. The U.S. military is responsible for ensuring that those systems ‘ safe and reliable operation and restoration during an attack once they cross the border range onto military installations.

The issue is that many of the experts in charge of maintaining these crucial systems may not realize a cyberattack as what it is because they haven’t received specific training. They frequently notice an operating disruption, assume it is just a system malfunction, and swiftly restore systems, probably erasing the forensics data needed by cyber professionals to understand how an attacker entered and hacked the system.

Engineers who respond to an attack’s symptoms may just regress the system back to the initial, vulnerable state without conducting a thorough criminal analysis. The origin and purpose of the attack did remain unknown.

Advertisement

The Army and the U.S. Army Corps of Engineers ( USACE ) provide world-class training to the professionals who maintain both our military and civilian critical infrastructure at Fort Leonard Wood (FTLW), Missouri. However, there is no simple security curriculum in the vast majority of these applications.

Due to this crucial absence, America is vulnerable and the professionals who respond are ill-equipped to deal with vile state-backed actors who aim to sacrifice the operation of power systems. This is not just a security issue, but also a national security issue. The contested online website is also on the battlefield today. The benefits of two large oceans that have resulted in standoff and a reasonable country do not avoid the battlefield from reaching our military installations. Our adversaries want to undermine or refuse the technical superiority that supports our army’s ability to project power. Our military designers must have the necessary training to combat the development of contemporary war.

Other national organizations stress the value of engineers receiving security education. Three years ago, the Department of Energy released a regional strategy on cyber-informed architecture, which placed cybersecurity at the heart of energy systems engineering. In the same vein, the Cybersecurity and Infrastructure Security Agency ( CISA ) has spent the last two years promoting the importance of integrating security into systems from the beginning with work with technology and device manufacturers. For industrial control systems, the National Institute of Standards and Technology, the Department of Commerce, has published” computer resilient executive” guidelines.

Despite these efforts, silos also exist between the engineers responsible for maintaining essential systems and the DOD digital incident response and restoration teams. Military technicians are not being taught by the DOD to work with system protectors to protect industrial control systems from cyberattacks.

Military outposts are high-value for nation-state , as subsequent headlines have confirmed. Initial goals of their electricity grids, HVAC and airport light, access security, gas systems, and water utilities were reliability, no security. However, these systems cannot be protected if they are not trustworthy, and America’s allies are aware that compromising system reliability results in lower military readiness and our ability to project power.

Advertisement

Our professionals ‘ knowledge gap and the harmful national security risk that comes with it need not continue. The multi-service Maneuver Support Center of Excellence is located in FTLW for training in engineering, military authorities, biological, chemical, imaging, and nuclear weapons. With this education background, it is possible for its Prime Power School to increase its multi-service curriculum to include cybersecurity-driven architecture for all Army Combat Engineers and Navy Seabees. Red Horse Models of the Air Force and public works personnel may also learn how to recognize and respond to computer threats.

A thorough cybersecurity curriculum will give these engineers the best chance of maintaining military readiness, responding to emerging threats, and surviving all hazards, including cyber malfeasance, by prioritizing a complete curriculum. These technicians will continue to provide the military with the essential equipment needed for conducting military operations both domestically and abroad again trained and deployed.

Establishing a joint-service gymnasium at FTLW, which will be co-located with the USACE’s Prime Power School, will establish a hub of knowledge and a network for an pure DOD labor. This program will strengthen the resilience of our home-based and forward-deploying forces, particularly in the Indo-Pacific, where China is earnestly working to undermine our military’s ability to accomplish national security objectives that begin here in the country.

Professionals have been a significant part in the defense of our forces and the defeat of army counterefforts since the Battle of Iwo Jima. Engineers in the U.S. military don’t simply build system; instead, they create the battlefield itself, guaranteeing victory through innovation. The exact expertise must then change as wars spread to the cyberspace. Establishing an all-service education program at FTLW that focuses on discovering, analyzing, analyzing, remediating, and sharing information about harmful digital conduct would guarantee their reputation of paving the way to defeat continues in the digital age.

Alison King is Forescout’s vice president of state affairs and a senior fellow at Auburn University’s McCrary Institute for Cyber and Essential Infrastructure Security. Ali spent more than ten years in the national civic service before joining Forescout, working for the Department of the Navy and the Cybersecurity Infrastructure Security Agency.

Advertisement

The Director of the Foundation for Defense of Democracies ‘ Center on Cyber and Technology Innovation (CCTI), Annie Fixler also facilitates the Department of Energy’s Operational Technology Defender Fellowship.

Exterior Adm. ( Ret. ) Mark Montgomery is the top producer of the Cyberspace Solarium Commission, which was mandated by Congress. He served as a nuclear-trained exterior war officer for 32 years before resigning as a rear admiral in 2017.

Written by Rear Adm., Annie Fixler, and Alison King. ( Ret. ) Montgomery, Mark

The newest apps