top of page

Forum Comments

National Security Strategy of the United States of America (Dec. 2017)
In Center U.S. National Security
Nathan Danko
Summer 20
Summer 20
Nov 02, 2020
This document starts off strong with the direct acknowledgement of the threat China poses to the US. However, my attention was drawn to section IV. Development of AI and quantum computing will provide an advantage to the US. Quantum computing is a debate with some aware of the threat quantum computing poses from an offensive standpoint [1]. For example, quantum computing poses a significant risk to Blockchain [2]. Development of this hard power would allow the US a significant advantage in cyberspace. However, all advantages are subjected to potential erosion. Foreign powers will seek out the secrets of the US quantum computing should this be developed. Quantum computing deployed in cyberspace would alter the battlefields of the next conflict. Quantum computing does however still have a ways to go before it is an offensive power. Like quantum computing, artificial intelligence is not at a point to an offensive power however the application is there. In 2019 the OpenAI managed to beat the world’s champions team at Dota 2 eSports [3]. This may just be an eSports victory to some however using this technology to power and operate drone technologies changes the role of future warfare. Having an artificial intelligence operate drone strikes would provide a significant advantage to the US military. These emerging concepts as referenced in the article are important for the government to keep a hand in. Threat of Quantum Computing https://securityboulevard.com/2020/08/quantum-computing-and-the-evolving-cybersecurity-threat/ Quantum Computing and Blockchain https://www.mitre.org/sites/default/files/publications/17-4039-blockchain-and-quantum-computing.pdf OpenAI Five beats OG https://www.vox.com/2019/4/13/18309418/open-ai-dota-triumph-og
0
1
Russia: Global Interest
In Center for European Policy
Nathan Danko
Summer 20
Summer 20
Oct 20, 2020
The 2016 election is an interesting case study for cybersecurity. Russia has attempted to interfere with multiple elections through actions in cyberspace. The recent French presidential election comes to mind. Russian intelligence operatives are attributed with spreading disinformation and aggressive cyber actions to influence the elections [1]. The growth of division between US citizens as a goal for the Russian intelligence operatives is interesting to me. Their actions in cyberspace have supported this goal. I remember multiple online profiles that were vocal in support of a specific candidate being geo-located to Russa during the 2016 election. What really interests me is what the US is going to do with this information. The report details critical vulnerabilities in the voting infrastructure. I certainly believe DHS and the NSA will ensure these known vulnerabilities are patched. I however do hope that both organizations are running penetration tests on the voting collection and storage assets to understand and correct potential vulnerabilities. During the 2020 election season, state-sponsored hackers from China have been found targeting the Biden campaign with credential harvesting attacks [2]. Russia and China seem to have similar goals when it comes to the US election this year. Foreign interference in US democracy poses a major issue to the US political system. The last section interests me as it addresses the threat environment with a call to action. “Our adversaries will persist in their efforts to undermine our shared democratic values. In order to ensure that our democracy endures, it is imperative that we recognize the threat and make the investments necessary to withstand the next attack.” Russia and the French Election https://www.politico.eu/article/france-election-2017-russia-hacked-cyberattacks/ Chinese Hackers Target Biden Campaign https://blog.google/threat-analysis-group/how-were-tackling-evolving-online-threats
1
1
Foreign Economic Espionage in Cyberspace
In Center U.S. National Security
Nathan Danko
Summer 20
Summer 20
Oct 19, 2020
The topic of cyber espionage is something I have spent a lot of time researching in my academic career. The role of cyber-espionage eroding US military and economic power is a issue affecting the entire field of cybersecurity. The most prominent example is the data breach caused by Chinese hackers that resulted in the plans for the F-35 being stolen [1]. This breach removed a strategic military advantage from the US. This document has a focus on the role of competitive advantages being manipulated by cyberspace. I believe the document articulates the role of cyber-espionage well, “Despite advances in cybersecurity, cyber espionage continues to offer threat actors a relatively low-cost, high-yield avenue of approach to a wide spectrum of intellectual property.” Just this week the US has indicted six Russian intelligence operatives (GRU employees) for their alleged role in multiple cyber campaigns [2]. Russia will continue their operations in cyberspace regardless of the attributions against them. China operates in a similar vein. The DOD has unmasked and filed multiple indictments against members of the People’s Liberation Army for cyber-crimes, but the actions continue. Cyber-espionage will continue to be a major issue facing US and Western power. The offensive operations countries like China and Russia are able to prey of the US advantages. Protection for the US will be extremely difficult when there are still private companies falling victim to MEOW attacks via unsecured databases of customer information [3]. The role and acceptance of cloud networks private companies handling US data has presented multiple different avenues of attack for US opponents. Two recent cases of cyber-attacks targeting US firms related to the government are the breaches impacting IPG Photonics, lead laser developer and US government software provider Tyler Technologies [4] [5]. I believe we will hear more about these breaches impacting US advantages in due time. An important quote from this document accurately details the threat environment the US faces in cyber from a political perspective, “We anticipate that China, Russia, and Iran will remain aggressive and capable collectors of sensitive U.S. economic information and technologies, particularly in cyberspace.” It is important to note that private cyber criminals also pose a threat to US advantages. I have included sources below for additional reading. 1. F-35 Plans https://www.idga.org/archived-content/news/pentagon-admits-f-35-data-theft-is-a-major-problem 2. US Indictment of six Russian Nationals of Cybercrime https://www.wsj.com/articles/u-s-charges-six-russian-intelligence-officers-with-hacking-11603126931 3. Meow Attack https://blog.qualys.com/product-tech/2020/08/26/meow-attack-a-reminder-for-organizations-to-identify-and-secure-their-databases 4. IPG Photonics https://www.databreaches.net/leading-u-s-laser-developer-ipg-photonics-hit-with-ransomware/ 5. Tyler Technologies https://krebsonsecurity.com/2020/09/govt-services-firm-tyler-technologies-hit-in-apparent-ransomware-attack/
1
1
National Security Strategy of the United States of America (Dec. 2017)
In Center U.S. National Security
Nathan Danko
Summer 20
Summer 20
Sep 03, 2020
Pillar three proved to be an interesting read. Preserving peace through strength is an admirable goal for a state to strive for. I noticed that in the beginning of the document there is a strong theme of us vs them. There is a specific notion that it is the US vs its competitors with support of allies. I found this interesting as these competitors are directly named and their threat to US prosperity identified. I was however drawn to the sections of Space and Cyberspace. I have always enjoyed learning about outer space. I am glad that the US government is focused on outer space. The role of satellites is crucial to a lot of US operations. I have noticed that cybersecurity and cyberspace are referenced a lot in this document as a whole. There have been multiple references to cyberspace in all three pillars so far. The role of identifying foreign nations that use their Cybercraft to project influence is a large part of threat intelligence. One thing that stuck out to me is the priority action of improving attribution, accountability, and response. Making attributions towards cybercrimes is not an easy task. Making attributions is a strategic choice. DOJ made the indictment against the four Chinese hackers as a part of their attributions towards China for the Equifax breach. The same can be said for the Lockheed Martin breach that resulted in the F-35 plans being stolen. The importance of a rapid response is stated in this pillar. However, the type and level of response are not mentioned. I find myself still curious if the current administration would be willing to use a kinetic response to a cyber-attack. However, the US has yet to resort to kinetic means as a response to Cybercraft. The priority action of enhancing cyber tools and expertise ties in with pillar two. Leading innovation in the cyber capabilities of the US requires research and development in part with the private sector. I do believe these pillars are heavily related in that manner. I look forward to reading pillar four.
2
National Security Strategy of the United States of America (Dec. 2017)
In Center U.S. National Security
Nathan Danko
Summer 20
Summer 20
Sep 01, 2020
I enjoyed reading through this document. Admittedly my eyes were drawn to the sections on cyber security. I appreciate the focus on keeping America safe in the era of cyber. “The government must do a better job of protecting data to safeguard information and the privacy of the American people”. I agree with this statement. Cyber security is an uphill battle for governments and increasing protections helps level the field. The document illustrates the need for government and private sector partnership to achieve this goal. In response there has been an expansion of Air Force Civilian careers in cyber and partnerships with private companies. Since the document was published in 2017 is it interesting to think about the recent developments and events in cyber after this document was posted. The indictment of four Chinese nation state hackers by the DOJ comes to mind. The individuals attributed with the Equifax breach have been identified and indictments followed. Another note that stood out is the inclusion of improving information sharing and sensing. This is something that occurred more than once in the previous administrator. The U.S. China cyber agreement of 2015 was a link between U.S. and China for information sharing regarding to cyber space. The current national security strategy outlines the swift consequences for malicious actors in cyber space. The vagueness of swift consequences interests me. I recall the recent drone strike on Hamas hackers in Palestine by the Israeli military. This document makes me wonder if kinetic responses are on the table for U.S. reactions to cyber attacks. Cyber is considered a battlefield according to NATO. I am excited to read the upcoming security strategy and see the changes to cybersecurity. For more about the events I’ve referenced: Chinese Hackers Indicted https://www.wired.com/story/equifax-hack-china/#:~:text=In%20a%20sweeping%20nine-count%20indictment%2C%20the%20DOJ%20alleged,state-sponsored%20thefts%20of%20personally%20identifiable%20information%20on%20record. U.S. China Cyber Agreement (2015) https://fas.org/sgp/crs/row/IN10376.pdf#:~:text=S.-China%20Cyber%20Agreement%20During%20the%20state%20visit%20on,States%20and%20China%20agreed%2C%20among%20other%20things%2C%20to Hamas Hackers Target of Drone Strike https://www.zdnet.com/article/in-a-first-israel-responds-to-hamas-hackers-with-an-air-strike/
2
3

Nathan Danko

Summer 20
Foreign Affairs
+4
More actions
bottom of page