Cyber Operations in DOD Policy and Plans:
Issues for Congress

Catherine A. Theohary
Specialist in National Security Policy and Information Operations
Anne I. Harrington
APSA Congressional Fellow
January 5, 2015
Congressional Research Service
7-5700
www.crs.gov
R43848


Cyber Operations in DOD Policy and Plans: Issues for Congress

Summary
Cyberspace is defined by the Department of Defense as a global domain consisting of the
interdependent networks of information technology infrastructures and resident data, including
the Internet, telecommunications networks, computer systems, and embedded processors and
controllers. Attacks in cyberspace have seemingly been on the rise in recent years with a variety
of participating actors and methods. As the United States has grown more reliant on information
technology and networked critical infrastructure components, many questions arise about whether
the nation is properly organized to defend its digital strategic assets. Cyberspace integrates the
operation of critical infrastructures, as well as commerce, government, and national security.
Because cyberspace transcends geographic boundaries, much of it is outside the reach of U.S.
control and influence.
The Department of Homeland Security is the lead federal agency responsible for securing the
nation’s non-security related digital assets. The Department of Defense also plays a role in
defense of cyberspace. The National Military Strategy for Cyberspace Operations instructs DOD
to support the DHS, as the lead federal agency, in national incident response and support to other
departments and agencies in critical infrastructure and key resources protection. DOD is
responsible for defensive operations on its own information networks as well as the sector-
specific agency for the defense of the Defense Industrial Base. Multiple strategy documents and
directives guide the conduct of military operations in cyberspace, sometimes referred to as
cyberwarfare, as well as the delineation of roles and responsibilities for national cybersecurity.
Nonetheless, the overarching defense strategy for securing cyberspace is vague and evolving.
This report presents an overview of the threat landscape in cyberspace, including the types of
offensive weapons available, the targets they are designed to attack, and the types of actors
carrying out the attacks. It presents a picture of what kinds of offensive and defensive tools exist
and a brief overview of recent attacks. The report then describes the current status of U.S.
capabilities, and the national and international authorities under which the U.S. Department of
Defense carries out cyber operations. Of particular interest for policy makers are questions raised
by the tension between legal authorities codified at 10 U.S.C., which authorizes U.S. Cyber
Command to initiate computer network attacks, and those stated at 50 U.S.C., which enables the
National Security Agency to manipulate and extrapolate intelligence data—a tension that
Presidential Policy Directive 20 on U.S. Cyber Operations Policy manages by clarifying the
Pentagon’s rules of engagement for cyberspace. With the task of defending the nation from
cyberattack, the lines of command, jurisdiction, and authorities may be blurred as they apply to
offensive and defensive cyberspace operations. A closely related issue is whether U.S. Cyber
Command should remain a sub-unified command under U.S. Strategic Command that shares
assets and its commander with the NSA. Additionally, the unique nature of cyberspace raises new
jurisdictional issues as U.S. Cyber Command organizes, trains, and equips its forces to protect the
networks that undergird critical infrastructure. International law governing cyberspace operations
is evolving, and may have gaps for determining the rules of cyberwarfare, what constitutes an
“armed attack” or “use of force” in cyberspace, and what treaty obligations may be invoked.

Congressional Research Service

Cyber Operations in DOD Policy and Plans: Issues for Congress

Contents
Introduction ...................................................................................................................................... 1
Background ...................................................................................................................................... 2
Cyberspace: The Operating Environment ................................................................................. 2
Cyber Weapons .......................................................................................................................... 3
Malware ............................................................................................................................... 3
Botnets ................................................................................................................................. 3
Distributed Denial of Service Attacks ................................................................................. 4
Automated Defense Systems ............................................................................................... 5
Targets ....................................................................................................................................... 5
Government and Military Networks.................................................................................... 5
Critical Infrastructure and Industrial Control Systems ........................................................ 6
Actors and Attribution ............................................................................................................... 6
Nation States ....................................................................................................................... 6
Politically Motivated Hacktivists ........................................................................................ 7
Terrorists and Organized Crime .......................................................................................... 7
Advanced Persistent Threats ............................................................................................... 7
Attribution Issues ................................................................................................................ 7
Threat Environment ................................................................................................................... 8
Cyberattack Case Studies .................................................................................................... 8
The DOD and U.S. Cyber Command ............................................................................................ 13
Cyber Command Mission and Force Structure ....................................................................... 13
USCYBERCOM and Information Sharing ....................................................................... 15
Authorities ..................................................................................................................................... 15
Legislative Authorities ............................................................................................................. 16
Executive Authorities .............................................................................................................. 17
International Authorities .......................................................................................................... 21
The U.S. Position on International Authorities ................................................................. 21
International Consensus-Building Activities ..................................................................... 22
Existing International Instruments That Bear on Cyberwarfare ........................................ 23
Issues for Congress ........................................................................................................................ 27
Authorities: Is Current Law Enough? ...................................................................................... 27
How Do DOD and Cyber Command Responsibilities for Cybersecurity Fit Within the
Interagency and Private Sector? ........................................................................................... 28
Should U.S. Cyber Command Be Its Own Unified Combatant Command? ........................... 28
Is a Separate Cyber Force Necessary? ..................................................................................... 28
What Are the Authorizing and Oversight Committees and Jurisdictional Implications? ........ 28
Current Legislation .................................................................................................................. 28

Appendixes
Appendix. Timeline of International Attacks ................................................................................. 30

Congressional Research Service

Cyber Operations in DOD Policy and Plans: Issues for Congress

Contacts
Author Contact Information........................................................................................................... 33

Congressional Research Service

Cyber Operations in DOD Policy and Plans: Issues for Congress

Introduction1
Cyberspace has taken on increased strategic importance as states have begun to think of it as yet
another domain—similar to land, sea, and air—that must be secured to protect their national
interests. Cyberspace is another dimension, with the potential for both cooperation and conflict.
The Obama Administration’s 2010 National Security Strategy identifies cybersecurity threats “as
one of the most serious national security, public safety, and economic challenges.”
Cyberattacks are now a common element of international conflict, both on their own and in
conjunction with broader military operations. Targets have included government networks, media
outlets, banking services, and critical infrastructure. The effects and implications of such attacks
may be small or large; cyberattacks have defaced websites, temporarily shut down networks and
cut off access to essential information and services, and damaged industrial infrastructure.
Despite being relatively common, cyberattacks are difficult to identify at their source and thwart,
in particular because politically motivated attacks are often crowd-sourced,2 and online criminal
organizations are easy to join. Suspicions of state-sponsored cyberattacks are often strong but
difficult to prove. The relative anonymity under which actors operate in cyberspace affords a
degree of plausible deniability.
This report focuses specifically on cyberattacks as an element of warfare, separate and distinct
from diplomatic or industrial espionage, financially motivated cybercrime, or state-based
intimidation of domestic political activists.3 However, drawing clean lines between cyberwar,
cyberterrorism, cyberespionage, and cybercrime is difficult. State and non-state actors carry out
cyberattacks every day. When and under what conditions cyberattacks rise to the level of
cyberwar is an open question. Some experts contend that all warfare, including cyberwarfare, by
definition includes the destruction of physical objects. According to this point of view, to be an
act of cyberwarfare, the attack must originate in cyberspace and result in the destruction of
critical infrastructure, military command-and-control capabilities, and/or the injury or death of
individuals.4 On the other hand, some analysts have a more inclusive view of cyberwarfare. These
experts would include, in addition to cyberattacks with kinetic effects, the exfiltration or
corruption of data, the disruption of services, and/or manipulation of victims through distraction.
As our military becomes increasingly information dependent, potential vulnerabilities in network-
centric operations are crystalized. A cyberattack on a military asset may be considered an act of
war to which the military will respond under the Law of Armed Conflict. However, there may
also be attacks on civilian systems which would warrant a military response.


1 Information contained in this report is derived from unclassified open source material and discussions with senior
government officials and industry technology and security experts.
2 Crowd-sourcing refers to the use of online communities to obtain ideas, information, and services.
3 Industrial espionage events are widely covered and notorious: attacks on Target, Home Depot, and Sony have caught
national attention and have serious economic implications. Such events, however challenging, are not considered
warfare for purposes of this report.
4 Bruce Schneier, Schneier on Security (Indianapolis: Wiley, 2008); Michael Schmitt et al., Tallinn Manual on the
Internationl Law Applicable to Cyber Warfare
, prepared by the International Group of Experts at the invitation of the
NATO Cooperative Cyber Defence Centre of Excellence, Cambridge: Cambridge University Press, 2013.
Congressional Research Service
1

Cyber Operations in DOD Policy and Plans: Issues for Congress

Background
Cyberspace: The Operating Environment
The Internet represents a portion of the global domain of cyberspace; however, there are networks
and systems that are not connected to the Internet. Included among these are national strategic
assets whose compromise could have serious consequences. In its 2010 Quadrennial Defense
Review, the Department of Defense (DOD) identified cyberspace as a global commons or
domain, along with air, sea and space. Previous views of cyberspace had focused mainly on the
enabling or force multiplier aspects of information technology and networked workfare.
Cyberspace is currently defined by the DOD as a global domain within the information
environment consisting of the interdependent networks of information technology infrastructures
and resident data, including the Internet, telecommunications networks, computer systems, and
embedded processors and controllers.5 It is also described in terms of three layers: (1) a physical
network, (2) a logical network, and a (3) cyber-persona:6
• The physical network is composed of the geographic and physical network
components.
• The logical network consists of related elements abstracted from the physical
network, (e.g., a website that is hosted on servers in multiple locations but
accessed through a single URL).
• The cyber-persona layer uses the rules of the logical network layer to develop a
digital representation of an individual or entity identity.
Because one individual or entity can have multiple cyber personae, and vice versa, attributing
responsibility and targeting attacks in cyberspace is challenging. Another challenge lies in insider
threats, when an authorized user or users exploits legitimate access to a network for nefarious
purposes.
From a military perspective, the operational environment is a composite of the conditions,
circumstances, and influences that affect the employment of capabilities and bear on the decisions
of the commander.7 The information environment is the aggregate of individuals, organizations,
and systems that collect, process, disseminate, or act on information, further broken down into the
physical, informational, and cognitive dimensions.
Cyberspace operations employ capabilities whose primary purpose is to achieve objectives in or
through cyberspace. The following section gives examples of some of the tools through which
these objectives may be achieved.

5 Department of Defense Joint Publication 3-12, Cyberspace Operations, February 5, 2013.
6 Ibid.
7 Ibid.
Congressional Research Service
2

Cyber Operations in DOD Policy and Plans: Issues for Congress

Cyber Weapons
There are several tools through which effects in cyberspace are achieved. Effects can range in
severity from disrupting or slowing down access to online goods and services, to degrading and
destroying entire network operations. The actors who employ these tools can range from
individual hacker groups to nation states and their proxies. The following section describes the
most common attack tools, or cyber weapons, that these actors employ.
Malware
Malware is a general term for malicious software. Bots, viruses, and worms are varieties of
malware. Bots, as described below, are used to establish communication channels among personal
computers, linking them together into botnets that can be controlled remotely. Botnets are one
way that other forms of malware, such as viruses and worms, spread. As the names imply, viruses
spread by infecting a host. They attach themselves to a program or document. In contrast, worms
are stand alone, self-replicating programs.8
The first known malware aimed at PCs, a virus, was coded in 1986 by two brothers in Pakistan.
They named the virus Brain after their computer shop in Lahore and included their names,
addresses, and phone numbers in the code. Calling Brain malware is slightly misleading because
the brothers had no ill intentions. They were simply curious to find out how far their creation
could travel. Within a year it had traveled around the globe.9
Malware that targets the internal networks of particular companies are often spread by infecting
“watering-holes,” a term for public websites frequented by employees. Another common method
is “spearphishing”—sending emails to targeted individuals that contain malicious links. The
email appears to be innocuous and sent from a trusted source, but clicking on the link opens a
virtual door to outsiders.10 So-called “air-gapped” networks, computer systems that are not
connected to the Internet, are not vulnerable to these types of attacks; however, such networks can
be infected by viruses and worms when an external device, such as a thumb drive, is inserted into
a networked computer.
Botnets
Robotic networks, commonly known as botnets, are chains of home and business PCs linked
together by a script or program. That program (the bot) enables a single operator to command all
of the linked machines. Botnets are not necessarily malicious. The computer code botnets use also
enables desirable communication across the Internet, such as the chat rooms that were popular in
the 1990s. However, programmers have figured out how to exploit vulnerabilities in widely used
Microsoft Windows operating platforms to degrade, destroy, and manipulate computer

8 CRS Report R41524, The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability, by Paul K. Kerr,
John W. Rollins, and Catherine A. Theohary.
9 Joshua Davis, “John McAfee Fled to Belize, But He Couldn’t Escape Himself,” Wired, December 24, 2012,
http://www.wired.com/2012/12/ff-john-mcafees-last-stand/all.
10 Chris Strohm, “Hedge-Fund Hack Part of Wall Street Siege Seen by Cyber-Experts,” BloombergGovernment, June
23, 2014.
Congressional Research Service
3

Cyber Operations in DOD Policy and Plans: Issues for Congress

networks—often without the knowledge of the machine’s owner or local operator.11 Because they
are automated programs, when released, bots lurk on the Internet and take over computers,
turning them into a network of “zombies” that can be operated remotely. The majority of email
spam is generated by botnets without the host computer’s knowledge.12 In fact, owners are often
not aware that their computers are part of a botnet, the only indication of which is sluggish
response time.13
Early botnet operators were often skilled coders. In contrast, today an underground industry of
skilled botnet providers exists, but operators no longer have to be fluent coders. Starting in 2004,
bots got considerably easier to use as the result of new applications that allowed hackers to build
bots by pointing and clicking, resulting in a bloom of spam in email inboxes across the globe.14 In
addition to unwanted advertising, botnets can generate denial-of-service (DoS) attacks and spread
malware.
Distributed Denial of Service Attacks
Distributed Denial of Service (DDoS) attacks flood their target with requests, consuming the
target’s bandwidth and/or overloading the capacity of the host server, resulting in service outages.
These attacks are “distributed” because effective attacks employ botnets, distributing the source
of requests across an entire network of zombie computers. DDoS attacks are unique for three
reasons: (1) they exploit vulnerabilities in their target’s software or operating system that cannot
be easily repaired or “patched;” (2) each individual packet is a legitimate request—only the rate
and total volume of packets gives an attack its destructive impact; and (3) the severity of the
attack is measured in terms of its duration. Unlike malware, which alters or infects its target,
DDoS attacks consist of the same types of packets, a unit of data, that a typical user would send
when making a legitimate request. The only difference is in the number and frequency with which
the attacker generates requests. The goal of a DDoS attack is to render targeted networks
unavailable or non-responsive, thereby preventing users from accessing information for the
duration of the attack.15
The pathway of a DDoS attack is known as a vector. Today it is common for an attack to have
multiple vectors. A DDoS attack carried out by botnets along multiple vectors can interrupt
services for days, weeks, or even months. More sophisticated attacks take advantage of vectors
that amplify their strength through a process that generates exponential reverberations. The ability
to amplify an attack, for instance by tricking a server into responding to a target with an even
larger packet than what was originally sent, increases an already substantial asymmetric
advantage. Botnet applications not only make DDoS attacks relatively easy to mount, but the

11 Zheng Bu, Pedro Bueno, Rahul Kashyap, et al., The New Era of Botnets, McAfee: An Intel Company, white paper,
Santa Clara, CA, 2010, pp. 3-4, http://www.mcafee.com/us/resources/white-papers/wp-new-era-of-botnets.pdf.
12 John Markoff, “A Robot Network Seeks to Enlist Your Computer,” New York Times, October 20, 2008.
13 Richard A. Clark and Robert K. Knake, Cyber War: The Next Threat to National Security and What to Do about It
(New York: HarperCollins, 2010), p. 13.
14 Zheng Bu, Pedro Bueno, Rahul Kashyap, et al., The New Era of Botnets, McAfee: An Intel Company, White Paper,
Santa Clara, CA, 2010, pp. 3-4, http://www.mcafee.com/us/resources/white-papers/wp-new-era-of-botnets.pdf.
15 Ziv Gadot, Eyal Benishti, Lior Rozen, et al., Radware Global Application & Network Security Report 2012,
Radware, White Paper, Mahwah, NJ, 2013, p. 1, file:///C:/Users/aharrington/Downloads/a7b991da-b96e-4cd7-bf8c-
236b1e7e4c67.pdf.
Congressional Research Service
4

Cyber Operations in DOD Policy and Plans: Issues for Congress

redundant and decentralized nature of the Internet makes attribution difficult.16 In theory, a DDoS
attack could temporarily take down the entire web by simultaneously targeting the 13 root servers
on which all Internet traffic depends.17 In practice, this has not yet happened.
Automated Defense Systems
Retaliatory hacking, a response to network breaches that has been used in the private sector, has
gained traction within DOD as a means to stage an “active defense.” These potentially offensive
operations may occur when a systems administrator sees an intrusion and in turn breaches the
assumed point of origin, either to retrieve or destroy information. However, such activities are
complicated for two reasons: uncertainty in attack attribution and active defense may violate
terms enacted in the Computer Fraud and Abuse Act of 1986.18 This law criminalizes
unauthorized breaches and other computer-related activity, including the distribution of malware
and use of botnets. Although the military would be involved in a counterattack only during a
national security crisis, the government may tacitly encourage companies to engage in retaliatory
hacking as the first line of defense for the nation’s critical infrastructure. For example, the
Defense Advanced Research Projects Agency (DARPA) has launched a Cyber Grand Challenge
program to hasten the development of automated security systems capable of responding to and
neutralizing cyberattacks as fast as they are launched. Automated defense systems may also be
configured to launch a counterattack in the direction of a network breach.
Targets
Attacks on information technology destroy, degrade, and/or exfiltrate data from a host computer.
The intended effect of a cyberattack can be related to the attack target. Within the context of
cyberwarfare, two areas are attractive targets for a potential adversary: government and military
networks, and critical infrastructure and industrial control systems.
Government and Military Networks
Nation states and other entities target government and military networks to exfiltrate data, thereby
gaining an intelligence advantage, or to potentially plant a malicious code that could be activated
in a time of crisis to disrupt, degrade, or deny operations. In 2008, The Pentagon itself was a
target of a massive breach, when an infected thumb drive was inserted into a computer connected
to DOD classified networks. The discovery of the malware, named Agent.btz, led to a massive
cleanup operation code-named Buckshot Yankee.19 While the incident appeared to be related to
espionage and theft of sensitive information, it is possible that malware could also contain a
hidden, more nefarious function, such as the capability to disable communications or spread
disinformation.

16 Ziv Gadot, Eyal Benishti, Lior Rozen, et al., Radware Global Application & Network Security Report 2012,
Radware, white paper, Mahwah, NJ, 2013, p. 18.
17 http://www.root-servers.org/.
18 18 U.S.C. §1030.
19 Ellen Nakashima, “Cyber-intruder sparks response, debate” Washington Post, December 8, 2011,
http://www.washingtonpost.com/national/national-security/cyber-intruder-sparks-response-debate/2011/12/06/
gIQAxLuFgO_story.html.
Congressional Research Service
5

Cyber Operations in DOD Policy and Plans: Issues for Congress

Critical Infrastructure and Industrial Control Systems
Civilian critical infrastructure comprises networks and services that are considered vital to a
nation’s operations and are owned and operated by the private sector.20 Examples of these sectors
include energy, transportation, financial services, food supplies, and communications. These
sectors may be particularly vulnerable to cyberattack because they rely on open-source software
or hardware, third-party utilities, and interconnected networks.
Large-scale industrial control systems (ICS), such as the supervisory control and data acquisition
(SCADA) systems that provide real-time information to remote operators, present a unique
vulnerability. Disabling an electric power plant by attacking its SCADA system, for instance, will
have many follow-on effects. These systems, as they control the operations of a particular
platform, are referred to by the Defense Department as “operations technology.”
From highly specialized equipment, such as uranium enrichment plants, to mundane heating and
air conditioning systems and office photocopiers, the capability to remotely control industrial
hardware for maintenance and operations purposes also makes these machines vulnerable to
cyberattacks. Attacks against operations technology (OT) are different than information
technology (IT) attacks because OT attacks can produce kinetic effects. Although OT controls
primarily mundane infrastructure, these built environments are increasingly networked
environments, which adds a complicated layer to training and maintenance.
Actors and Attribution
With low barriers to entry, multiple actors may take part in use of the Internet and networked
technology as a means to achieve strategic effects. These actors may represent nation states,
politically motivated hacker groups or “hactivists,” or terrorist and other criminal organizations.
Directly attributing a cyberattack to any one of these groups can be challenging, particularly as
they may sometimes operate in concert with each other, though for differing motivations.
Nation States
Cyberwarriors are agents or quasi-agents of nation states who develop capabilities and undertake
cyberattacks to support a country’s strategic objectives.21 These entities may or may not be acting
on behalf of the government with respect to target selection, attack timing, or type(s) of
cyberattack. Moreover, cyberwarriors are often blamed by the host country when the nation that
has been attacked levies accusations against that country. Typically, when a foreign government is
presented with evidence that a cyberattack is emanating from its country, the nation that has been
attacked is told that the perpetrators acted of their own volition, not at the behest of the
government.

20 Critical Infrastructure is defined in 42 U.S.C. 5195c(e) as: “systems and assets, whether physical or virtual, so vital to
the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on
security, national economic security, national public health or safety, or any combination of those matters.”
21 For additional information, see CRS Report RL31787, Information Operations, Cyberwarfare, and Cybersecurity:
Capabilities and Related Policy Issues
, by Catherine A. Theohary.
Congressional Research Service
6

Cyber Operations in DOD Policy and Plans: Issues for Congress

Politically Motivated Hacktivists
Cyberhactivists are individuals who perform cyberattacks for pleasure, or for philosophical or
other nonmonetary reasons. Examples include someone who attacks a technology system as a
personal challenge (who might be termed a “classic” hacker), and a “hacktivist,” such as a
member of the cybergroup Anonymous, who undertakes an attack for political reasons. The
activities of these groups can range from simple nuisance-related DoS attacks to disrupting
government and private corporation business processes.
Terrorists and Organized Crime
Cyberterrorists are state-sponsored or non-state actors who engage in cyberattacks as a form of
warfare. Transnational terrorist organizations, insurgents, and jihadists have used the Internet as a
tool for planning attacks, recruiting and radicalizing members, distributing propaganda, and
communicating.22 No unclassified reports have been published regarding a terrorist-initiated
cyberattack on U.S. critical infrastructure. However, the essential components of that
infrastructure are demonstrably vulnerable to access and even destruction via the Internet. In
2007, a U.S. Department of Energy test at Idaho Labs demonstrated the ability of a cyberattack to
shut down parts of the electrical grid. In the test, known as the Aurora Experiment, a cyberattack
on a replica of a power plant’s generator caused it to self-destruct.
Advanced Persistent Threats
The term “Advanced Persistent Threat” (APT) has been used within the intelligence community
to describe nation-state cyberespionage activities. However, organizations that may or may not be
state-sponsored may also use APT techniques to gain a competitive military advantage.
Characteristics of an APT include a high level of sophistication in the malware’s code, along with
the targeting of certain networks or servers to glean specific information of value to the attackers
or to cause damage to a specific target. Likely targets include government agencies and
corporations in critical infrastructure sectors such as financial, defense, information technology,
transportation, and health. In 2013, the U.S. security firm Mandiant published a 60-page
intelligence report on a Chinese operation, which the firm identified as APT1, that allegedly stole
hundreds of terabytes of data from at least 141 organizations across 20 industries worldwide since
2006.23 Mandiant’s analysis concluded that APT1 is likely government-sponsored (believed to be
the 2nd Bureau of the People’s Liberation Army General Staff Department’s 3rd Department) and
one of the most persistent of China’s cyber threat actors.
Attribution Issues
Analysts trying to determine the origin of a cyberattack are often stymied by the use of botnets.
First, computers infected by a botnet may be located in countries around the world, obscuring the
country of origin of the botnet’s commander, known as the bot herder. Second, the identity of the
server controlling the botnet may be obscured by the prevalence of peer-to-peer software24. In

22 For additional background information, see archived CRS Report RL33123, Terrorist Capabilities for Cyberattack:
Overview and Policy Issues
, by John W. Rollins and Clay Wilson.
23 Accessed at http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf.
24 Peer-to-peer software refers to computer networks in which each computer can act as a server for the others,
(continued...)
Congressional Research Service
7

Cyber Operations in DOD Policy and Plans: Issues for Congress

addition to these concerns, Internet provider (IP) addresses that might otherwise trace the location
of a computer that launched an attack can be faked (known as “spoofing”), and even with a valid
IP address, it may be virtually impossible to verify who was behind the computer at the time an
attack was launched. This uncertainty is also true of a computer that has been infected
unbeknownst to the user. At the nation-state level, a certain amount of deniability in terms of
cybersecurity and network control is plausible. Given the proliferation of hacker organizations
and the cyber weapons at their disposal, states can easily claim a lack of responsibility for rogue
cyber actors and attacks that appear to stem from within state borders.
Threat Environment
Cyberattack is a persistent threat. This section describes events that have provoked a political
and/or military response from leaders in one or more state. The case studies provided are not
exhaustive; excluded are many instances of cyber espionage that could arguably be considered
international incidents. Instead, this section focuses primarily on cyberattacks that (1) have had
strategic effects, (2) play a tactical role in a larger military operation, (3) carry implications for
the ability of a state to carry out future military operations, or (4) threaten public trust in the
reliability and security of information on the Internet.
Cyberattack Case Studies
Each of the cyberattacks in this section illustrates a different tactical and/or strategic use of
weapons in cyberspace. The events in each of these cases raised questions about acts of terror
and/or war in cyberspace and the role of the military.
Estonia: Cyberattack as Siege
Estonia is a Baltic state of approximately 1.3 million people that regained its independence from
the Soviet Union in 1991. In 2004, Estonia joined the European Union (EU). Technologically,
Estonia distinguished itself as the home of Skype, a widely popular online voice and video
communication software. Today, Estonia is one of the most wired nations on earth. Estonians
conduct most of their daily business online, even carrying out the basic rights and responsibilities
of democratic citizenship, such as voting, through the Internet. As a result, Estonia is particularly
vulnerable to cyberattack.25
On the morning of April 28, 2007, waves of DDoS attacks besieged websites in Estonia. Over the
next two weeks, attackers targeted crucial sectors, shutting down Internet access to hundreds of
key government, banking, and media web pages. Estonians were unable to bank online or retrieve
cash from ATMs. Attackers also targeted Internet addresses for servers, threatening the telephone
network and the credit card verification system. Vital services simply ceased to function, unable
to stand back up before the next wave of attack. Where possible, organizations cut off all
international traffic, closing the gates against the attack. Unlike previous DoS attacks that hit a

(...continued)
obviating the need for a central server for command and control.
25 Joshua Davis, “Hackers Take Down the Most Wired Country in Europe,” Wired, August 21, 2007,
http://archive.wired.com/politics/security/magazine/15-09/ff_estonia?currentPage=all.
Congressional Research Service
8

Cyber Operations in DOD Policy and Plans: Issues for Congress

single site over the course of days, this attack brought communication and commerce in a
sovereign nation to a halt for weeks.26
The 2007 cyberattacks appear to have originated in Russia. On April 27, 2007, Estonian officials
carried out a controversial plan to relocate a World War II-era statue of a Red Army soldier from a
central location in Tallinn, the nation’s capital, to a military cemetery in a suburb. Despite
ominous warnings from the Russian government that removing the statue honoring the sacrifice
of Russian soldiers would prove “disastrous for Estonians,” Estonia, after 16 years of
independence, decided to move the reminder of Soviet occupation.27
What role, if any, the Russian government actually played in the attack is unclear. The Russian
government claimed the attack was an online version of an angry mob. Evidence suggests that
patriotic hackers played an important role in the attack. The Pro-Putin movement Nashi (“Ours”),
which organizes political events for young adults, claimed at least partial responsibility for
engaging in cyber activities to counter “anti-Fatherland” forces.28 Suspicion remains about
government involvement, though. Patriotic hacking can provide cover for behind-the-scenes
coordination efforts.
The attacks followed instructions posted in Russian language Internet chat rooms on how to
generate DoS attacks. The posts included calls for a coordinated attack at the stroke of midnight
on May 9, the day Russians celebrate their World War II victory. At exactly midnight in Moscow,
11p.m. in Tallinn, nearly 1 million computers around the globe navigated to Estonian websites.
Surging at 4 million packets per second, Internet traffic in Estonia increased 200-fold, squeezing
the bandwidth of an entire nation.29
Prepared for the surge, the head of the Estonian computer emergency response team enlisted the
help of individuals responsible for the health and care of the Internet root server system to follow
attacks back to their source and block specific computers from accessing the servers. This
strategy mitigated the effects of the attack. Then suddenly the surges in traffic stopped as
suddenly as they had started.30
Because Estonia is a member of NATO and the European Union, this event exposed how
unprepared those organizations may have been to respond to a cyberattack against a member
state. Had Estonia invoked NATO’s Article V collective security provision, doing so would have
raised several thorny questions about what kind of attack triggers those alliance obligations. The
fact that the cyberattack was targeted at a member state and prompted an official state response
was complicated by the inability to identify the aggressor. Moreover, the attack did no physical
damage, and in the end did no permanent damage to Estonia’s web-based infrastructure. The
damage was measurable only in terms of short-lived commercial losses.31 This kind of

26 Richard A. Clark and Robert Knake, Cyber War: The Next Threat to National Security and What to Do About It
(New York: HarperCollins, 2010).
27 Ibid.
28 Peter Singer and Allan Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know (Oxford: Oxford
University Press, 2013), pp. 110-111.
29 Joshua Davis, “Hackers Take Down the Most Wired Country in Europe,” Wired, August 21, 2007,
http://archive.wired.com/politics/security/magazine/15-09/ff_estonia?currentPage=all.
30 Ibid.
31 Ibid.
Congressional Research Service
9

Cyber Operations in DOD Policy and Plans: Issues for Congress

cyberattack is sometimes likened to a weather event. Snow storms, although a temporary crisis,
rarely have any lasting effects. How serious a threat the storm presents depends, at least in part,
on one’s capability to weather the storm.32 Although Estonian Defense Ministers viewed this
event in terms of a national security crisis, other security analysts described it as a “cyber riot” or
“costly nuisance,” comparing it to an electronic sit-in where traffic to public and commercial sites
is slowed or blocked to make a political point.
Georgia: Cyberattack and Invasion
In 2008, Russia invaded Georgia by land and air and blockaded the nation by sea.
Simultaneously, pro-Russian hackers besieged Georgia’s Internet, all but locking down
communication for the duration of the armed conflict. Although Georgia is not a heavily wired
society—at the time experts ranked it 74th out of 234 nations in terms of Internet addresses,
behind Nigeria, Bangladesh, Bolivia, and El Salvador33—the attacks were a significant event in
the development of cyberwar because they synchronized patriotic hacking with government-
sponsored military movements.34
Like Estonia, Georgia is a former Soviet state; it declared its independence in 1991. Tensions with
Russia have persisted and were not eased by Georgia’s failed bid to join NATO in the spring of
2008.35 Over the course of that same summer, well-armed Russian-backed separatists began
consolidating control over two predominately Russian-speaking regions on the country’s northern
border, Abkhazia and South Ossetia. As tensions rose, separatists—some of whom were believed
to be Russian special forces—clashed with Georgian police.36
In mid-July, the cyberattacks started. The Georgian President’s website was the first high-profile
target. Although the DDoS attack vector passed through a U.S.-based, commercial IP address,
experts identified the malware that hackers used to generate the attack as a “MachBot” DDoS
controller. Machbot is written in Russian and a known tool of Russian criminal groups.37
Reportedly, pro-Russian hackers were discussing the attacks on websites and in chat rooms; in
addition to the higher-profile attack, hackers also temporarily shut down Georgian servers.38
Three weeks later, on August 8, Russian tanks crossed the border into South Ossetia.
Accompanying the ground invasion was a second round of DDoS attacks. One of the first targets
was an online forum popular with pro-Georgian hackers. This preemptive attack reduced, but did
not entirely eliminate, the number of counterattacks against Russian targets.39 As the troops

32 Martin C. Libicki, Conquest in Cyberspace: National Security and Information Warfare (Washington, DC: RAND,
2007).
33 John Markoff, “Before the Gunfire, Cyberattacks,” New York Times, August 12, 2008, http://www.nytimes.com/
2008/08/13/technology/13cyber.html?_r=0.
34 David Hollis, “Cyberwar Case Study: Georgia 2008,” Small Wars Journal, January 6, 2011.
35 For further discussion, see CRS Report RL34618, Russia-Georgia Conflict in August 2008: Context and Implications
for U.S. Interests
, by Jim Nichol
36 Mikheil Saakashvili, “Let Georgia be a lesson for what will happen to Ukraine,” The Guardian, March 14, 2014.
37 Stephen W. Korns and Joshua E. Kastenberg, “Georgia’s Cyber Left Hook,” Parameters, Winter 2008, p. 65,
http://strategicstudiesinstitute.army.mil/pubs/parameters/articles/08winter/korns.pdf.
38 David Hollis, “Cyberwar Case Study: Georgia 2008 “ Small Wars Journal, January 6, 2011, p. 3
39 Ibid.
Congressional Research Service
10

Cyber Operations in DOD Policy and Plans: Issues for Congress

moved in, Georgians were unable to access 54 local websites with critical information related to
communications, finance, and the government.40
Georgian officials transferred critical Internet resources to U.S., Estonian, and Polish host servers.
Refuge for some websites, including those of the President and Ministry of Defense, was granted
by an American executive from the privately owned web-hosting company Tulip Systems, but
without the knowledge or authority of the U.S. government. Tulip Systems reported experiencing
attacks on its servers, a fact that raises troubling questions about sovereignty in the age of
cyberwarfare.41
The fighting lasted five days. During that time, Georgia’s Internet connection was besieged by
attacks and unable to communicate via web with the media. Reportedly, cyberattacks followed
the same target patterns as the land and air invasions, with DDoS attacks taking out the
communications prior to bombing or ground troop movements. Perhaps most importantly, the
cyberattacks and the air attack spared critical infrastructure associated with Georgia’s energy
sector.42
Iran: Cyberattack with Kinetic Effect
When programmers at a small Belarussian cybersecurity firm first discovered a new computer
worm in June 2010, they knew it was unusually sophisticated because it was exploiting a “zero-
day vulnerability” in Microsoft Windows. Malware that outsmarts programmers and developers
by identifying an unanticipated weakness in the Windows operating systems is rare. Even so, the
cybersecurity specialists who originally detected Stuxnet had no idea just how sophisticated this
new worm would turn out to be.43 The idea of sabotaging industrial control systems from a
remote location was not new, but creating a worm that could search for a single target was
revolutionary, and this is what Stuxnet’s authors had achieved. 44
The intended target appears to have been industrial control systems in Iran’s nuclear facility at
Natanz. The first clue was the pattern of infected computers: the Stuxnet worm attacked air-
gapped networks (i.e., those not connected to the Internet). The worm propagated by infecting
local hosts via a USB thumb drive. While a computer scanned the contents of the inserted thumb
drive, the worm surreptitiously installed a partially encrypted file. This file contained a stolen
security certificate that fooled its host into believing that the Stuxnet worm was a trusted
program. From its initial host computer, Stuxnet could travel throughout a networked system.
Although Stuxnet did not propagate itself through the web, if an infected computer was connected

40 David Hollis, “Cyberwar Case Study: Georgia 2008,” Small Wars Journal, January 6, 2011, p. 2.
41 Stephen W. Korns and Joshua E. Kastenberg, “Georgia’s Cyber Left Hook,” Parameters, Winter 2008, p. 65,
http://strategicstudiesinstitute.army.mil/pubs/parameters/articles/08winter/korns.pdf.
42 David Hollis, “Cyberwar Case Study: Georgia 2008,” Small Wars Journal, January 6, 2011, p. 4.
43 P. Mittal, “How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History,” Wired, July 11,
2011, http://www.wired.com/2011/07/how-digital-detectives-deciphered-stuxnet/all/.
44 In his memoir, Thomas Reed, a former U.S. Air Force secretary who served in the National Security Council during
President Reagan’s tenure, describes a successful CIA plot to sabotage the Soviet Union’s Siberian pipeline in 1982 by
tricking Moscow into stealing booby-trapped software. The faulty ICS software overpressurized the system causing
“the most monumental non-nuclear explosion and fire ever seen from space.” Alec Russell, “CIA plot led to huge blast
in Siberian gas pipeline” The Telegraph, February 28, 2004, http://www.telegraph.co.uk/news/worldnews/
northamerica/usa/1455559/CIA-plot-led-to-huge-blast-in-Siberian-gas-pipeline.html; Michael Joseph Gross, “A
Declaration of Cyber-War,” Wired, April 2011, http://www.vanityfair.com/culture/features/2011/04/stuxnet-201104.
Congressional Research Service
11

Cyber Operations in DOD Policy and Plans: Issues for Congress

to the Internet, the worm would automatically begin sending information back to one of two
domain names hosted on servers in Denmark and Malaysia. Once cybersecurity experts realized
that infected computers were “phoning home,” they redirected that traffic into a sinkhole they
controlled. By analyzing the collected data, the experts were able to map the pattern of infection.
Unlike most malware, which spreads rapidly through densely networked countries like the United
States and South Korea, Stuxnet was overwhelmingly concentrated in Iran. Of the first 38,000
infected computers, 22,000 were located in Iran.45
The second clue as to Stuxnet’s intended target was that, reportedly starting in 2009, International
Atomic Energy Agency inspectors noticed the significantly higher-than-average rate at which Iran
was removing and repairing centrifuges in its uranium enrichment facility at Natanz.46
Centrifuges built to process natural uranium into a form capable of fueling a nuclear power plant,
or building a nuclear warhead, are extremely delicate. Among the fastest spinning objects on
earth, any irregularities in a centrifuge’s rotor will cause imbalances. Even a fingerprint on the
rotor would cause it to spin out of control and do irreparable damage.47 As cybersecurity
specialists dug deeper into the code, they identified commands that were specific to the industrial
control system Simatic WinCC Step7, produced by the German company Siemens. This is the
same controller Iran uses in its uranium-enrichment facilities to control its centrifuges. Once
Stuxnet identified its target, the malware automatically commanded the centrifuges to spin at
frequencies significantly faster and then slower than normal, doing damage to the delicate rotors.
Meanwhile, Stuxnet evaded detection by making it appear to the operators monitoring the system
(via a computer screen) that nothing had changed.48
The overall effect of Stuxnet on the Iranian nuclear program is unclear. Iran has since
acknowledged the attack but maintains that Stuxnet did not change the rate at which it was able to
increase its stockpile of enriched uranium.49 David Albright and Christina Walrond of the Institute
for Science and International Security argue that although the rate of production has not changed,
starting in late 2009, Iran required more centrifuges to perform the same amount of work.
Albright and Walrond did not definitively argue that Stuxnet caused Iran’s efficiency to decline,

45 Eventually, specialists identified over 100, 000 corrupted devices. For more see P. Mittal, “How Digital Detectives
Deciphered Stuxnet, the Most Menacing Malware in History,” Wired, July 11, 2011, http://www.wired.com/2011/07/
how-digital-detectives-deciphered-stuxnet/all/; Ralph Langer, “To Kill a Centrifuge: A Technical Analysis of What
Stuxnet’s Creators Tried to Achieve,” November, 2013, http://www.langner.com/en/wp-content/uploads/2013/11/To-
kill-a-centrifuge.pdf; William J. Broad, John Markoff, and David Sanger, “Israeli Test on Worm Called Crucial in Iran
Nuclear Delay,” New York Times, January 15, 2011, http://www.nytimes.com/2011/01/16/world/middleeast/
16stuxnet.html?pagewanted=all&_r=0; Paul Kerr, John Rollins and Catherine Theohary, “The Stuxnet Computer
Worm: Harbinger of an Emerging Warfare Capability,” Congressional Research Service Report, December 9, 2010.
46 P. Mittal, “How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History,” Wired, July 11,
2011, http://www.wired.com/2011/07/how-digital-detectives-deciphered-stuxnet/all/.
47Anne Harrington and Matthias Englert, “How Much is Enough? The Politics of Technology and Weaponless Nuclear
Deterrence” in International Relations and the Global Politics of Science and Technology, eds. Mariana Carpes and
Maximilian Mayer, Berlin: Springer, 2014.
48 The cybersecurity company Symantec has since established that there were multiple variants of Stuxnet. The earlier
variant closed valves, causing a build-up of pressure that will make the centrifuge wobble and damage the rotors, rather
than directly affecting the rate at which the centrifuge spins. For more, see Institute for Science and International
Security, Basic Attack Strategy of Stuxnet 0.5 rev. 1, Institute for Science and International Security, Washington, DC,
February 28, 2013, http://isis-online.org/isis-reports/detail/basic-attack-strategy-of-stuxnet-0.5/.
49 Dr. Fereydoun Abassi, Vice President of the Islamic Republic of Iran and Head of Atomic Energy Organization of
Iran, “Statement at the IAEA 56th General Conference,” September 17, 2012; P. Mittal, “How Digital Detectives
Deciphered Stuxnet, the Most Menacing Malware in History,” Wired, July 11, 2011, pp. http://www.wired.com/2011/
07/how-digital-detectives-deciphered-stuxnet/all/.
Congressional Research Service
12

Cyber Operations in DOD Policy and Plans: Issues for Congress

nor did they discount that possibility, instead stating, “It is likely that multiple factors have played
a role in the diminished effectiveness of the FEP [fuel enrichment plant].... The available data are
too general to determine the actual situation.”50
No one has claimed responsibility for the attack, but in January 2011, but the New York Times
reported that Stuxnet was a joint venture of the United States and Israel. Reportedly, Israel
constructed a centrifuge plant at Dimona identical to the one in Natanz to simulate the attack. The
United States allegedly provided information about vulnerabilities in the Siemens controller,
access to which had been gained through a cybersecurity collaboration between Siemens and the
Idaho National Lab.51
The DOD and U.S. Cyber Command
The Department of Defense is responsible for securing its own networks, the Department of
Defense information networks (DODIN), or .mil domain, formerly known as the Global
Information Grid (GIG). The requested cybersecurity budget for DOD was approximately $5.1
billion for FY2015.This figure represents a portion of the President’s requested overall IT budget
for DOD that same year (approximately $36 billion). The DOD cybersecurity budget grew by $1
billion from 2013 to 2014, but this increase may reflect changes in how DOD programmatic
elements have defined “cybersecurity” programs. In general, the DOD cybersecurity budget
comprises the following activities: Information Assurance, Cyberspace Operations, National
Cybersecurity Initiative/Defense Industrial Base/Defense Cyber Crime Center, and U.S. Cyber
Command.52
After recognizing that cyberspace is a global operating domain as well as a strategic national
asset, DOD reorganized its cyber resources and established the U.S. Cyber Command in 2010.
This sub-unified command under the U.S. Strategic Command is co-located at Fort Meade,
Maryland with the National Security Agency (NSA). It combines offensive and defensive
capabilities and is commanded by a four-star general, also the director of the NSA. The NSA’s
primary missions are information assurance for National Security Systems and signals
intelligence. Also located within NSA is the Central Security Service, the military’s cryptology
component. As an intelligence agency, NSA operates under the authorities of Title 50 U.S.C., War
and National Defense. U.S. Cyber Command operates under U.S.C. Title 10, Armed Forces—the
authorities through which the military organizes, trains, and equips its forces in defense of the
nation.
Cyber Command Mission and Force Structure
As previously stated, one of the main missions of U.S Cyber Command is to defend and operate
the DODIN. In his nomination hearing before the Senate Armed Services Committee, then-Vice

50 David Albright and Christina Walrond, Performance of the IR-1 Centrifuge at Natanz, Institute for Science and
International Security, Washington, DC, October 18, 2011, http://isis-online.org/isis-reports/detail/test1/8.
51 William J. Broad, John Markoff, and David Sanger, “Israeli Test on Worm Called Crucial in Iran Nuclear Delay,”
New York Times, January 15, 2011, http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html?
pagewanted=all&_r=0.
52 Source: Internal Department of Defense budget documents.
Congressional Research Service
13

Cyber Operations in DOD Policy and Plans: Issues for Congress

Admiral Michael S. Rogers, tapped to become the head of U.S. Cyber Command, described the
duties of the Cyber Commander thusly:
The Commander, U. S. Cyber Command (USCYBERCOM) is responsible for executing the
cyberspace missions specified in Section 18.d.(3)of the Unified Command Plan (UCP) as
delegated by the Commander, U.S. Strategic Command (USSTRATCOM) to secure our
nation’s freedom of action in cyberspace and to help mitigate risks to our national security
resulting from America’s growing dependence on cyberspace. Subject to such delegation and
in coordination with mission partners, specific missions include: directing DODIN
operations, securing and defending the DODIN; maintaining freedom of maneuver in
cyberspace; executing full-spectrum military cyberspace operations; providing shared
situational awareness of cyberspace operations, including indications and warning;
integrating and synchronizing of cyberspace operations with combatant commands and other
appropriate U.S. Government agencies tasked with defending the our nation’s interests in
cyberspace; provide support to civil authorities and international partners. All these efforts
support DoD’s overall missions in cyberspace of defending the nation against cyber attacks,
supporting the combatant commands, and defending Department of Defense networks.53
Operators at the U.S. Cyber Command are sometimes referred to as “cyber warriors,” although
this term does not appear in official Department of Defense definitions. Reports of
USCYBERCOM-planned workforce structures yield clues regarding the activities a so-called
cyber warrior might undertake. First reported in the Washington Post, “The plan calls for the
creation of three types of Cyber Mission Forces under the Cyber Command: ‘national mission
forces’ to protect computer systems that undergird electrical grids, power plants and other
infrastructure deemed critical to national and economic security; ‘combat mission forces’ to help
commanders abroad plan and execute attacks or other offensive operations; and ‘cyber protection
forces’ to fortify the Defense Department’s networks.”54
These multiservice Cyber Mission Forces numbered under 1,000 in 2013, when DOD announced
plans to expand them to roughly 5,000 soldiers and civilians. The target number has since grown
to 6,200, with a deadline at the end of FY2016. In early November 2014, a leaked classified
document was reported to have stated that “additional capability may be needed for both surge
capacity for the [Cyber Mission Forces] and to provide unique and specialized capabilities” for a
whole-of-government and nation approach to security in cyberspace.55 USCYBERCOM
Commander Admiral Michael S. Rogers has said that overall, Cyber Mission Forces will be about
80% military and 20% civilian. At a recent conference, Deputy Commander of USCYBERCOM
Lieutenant General James McLaughlin said the Cyber Mission Force was being formed into 133
teams of tactical units that will 56support all Combatant Commands, and that at least half of these
teams would be used for defensive measures.

53 Advanced Questions for Vice Admiral Michael S. Rogers, Nominee for Commander, United States Cyber
Command, Senate Armed Services Hearing of March 11, 2014, http://www.armed-services.senate.gov/imo/media/doc/
Rogers_03-11-14.pdf.
54 From http://www.washingtonpost.com/world/national-security/pentagon-to-boost-cybersecurity-force/2013/01/27/
d87d9dc2-5fec-11e2-b05a-605528f6b712_story.html.
55 http://www.defensenews.com/article/20141103/TRAINING/311030018/As-cyber-force-grows-manpower-details-
emerge.
56 Wyatt Olson, “Cyber Command trying to get running start, add staff,” Stars and Stripes, December 11, 2014.
Congressional Research Service
14

Cyber Operations in DOD Policy and Plans: Issues for Congress

Each of the four military services provides cyber mission forces to USCYBERCOM. All of the
services’ cyber divisions plan to steadily increase their number of cyber operators over the next
two years.
USCYBERCOM and Information Sharing
In May 2011, DOD launched a pilot voluntary program (the DIB Cyber Pilot) involving several
defense industry partners, the NSA and DOD, to share classified threat-vector information among
stakeholders. Under the DIB Cyber Pilot, NSA shares threat signatures with participating defense
companies. One aspect of the program was sharing by the NSA of threat signatures obtained
through its computer monitoring activities. DHS subsequently initiated the Joint Cybersecurity
Services Pilot (JCSP) in January 2012 and announced in July that the program would be made
permanent, with the renamed DIB Enhanced Cybersecurity Services (DECS) as the first phase. In
this program, DHS communicates with participating commercial Internet service providers
directly, while DOD still serves as the point of contact for participating DIB contractors.
Authorities
Authorities for U.S. military operations in cyberspace are not currently organized according to the
nature of the perceived threat, whether espionage, crime, or war. Instead, authorities are organized
according to the domain (.mil, .gov, .com, etc.) in which the activity is taking place, as opposed to
its motivations or effects. Presidential Policy Directive 20, discussed in greater detail below,
distinguishes between network defense on the one hand and offensive and defensive cyberspace
operations
on the other.
U.S. policy on network defense is to adopt a risk-management framework published by the
Department of Commerce’s National Institute of Standards and Technology. Responsibility for
implementing the framework is shared among different government departments and agencies,
with U.S. Cyber Command responsible for the .mil domain and the Department of Homeland
Security responsible for the .gov domain. Adoption of the NIST framework is voluntary for
private companies and their own network defense.
One of the instruments through which offensive cyberspace operations are conducted may be a
classified “Execute Order,” defined by DOD as an order issued by the Chairman of the Joint
Chiefs of Staff, at the direction of the Secretary of Defense, to implement a decision by the
President to initiate military operations.57 According to The Federation of American Scientists’
Secrecy News, Air Force Instruction 10-1701, entitled “Command and Control (C2) for
Cyberspace Operations,” dated March 5, 2014, states, “Classified processes governing C2
[command and control] of AF [Air Force] offensive and defensive cyberspace operations
conducted by AF Cyber Mission Forces are addressed in a classified CJCS [Chairman, Joint
Chiefs of Staff] Execute Order (title classified) issued on 21 Jun 13.”58 Then-Vice Admiral
Michael Rogers, as a nominee for Commander, U.S. Cyber Command (and NSA Director), said

57 DOD Dictionary of Military and Associated Terms, JP1-02.
58 U.S. Military Given Secret “Execute Order” on Cyber Operations Military Doctrine, Secrecy
http://blogs.fas.org/secrecy/2014/03/execute-order/.

Congressional Research Service
15

Cyber Operations in DOD Policy and Plans: Issues for Congress

before the Senate Armed Services Committee that “geographic combatant commanders already
have authority to direct and execute certain Defensive Cyberspace Operations (DCO) within their
own networks.” However, the Execute Order suggests that there may be standing orders to
conduct offensive cyberspace operations as well.
The following section provides a brief overview of evolving norms in cyberspace and the
authorities that govern network defense and cyberspace operations.
Legislative Authorities
Section 941of the National Defense Authorization Act for Fiscal Year 2013 (P.L. 112-239),
affirms the Secretary of Defense’s authority to conduct military activities in cyberspace. The
provision’s language is similar to that in Section 954 of final conference report to accompany
H.R. 1540, the National Defense Authorization Act for Fiscal Year 2012. In this version, this
section reaffirms that the Secretary of Defense has the authority to conduct military activities in
cyberspace. In particular, it clarifies that the Secretary of Defense has the authority to conduct
clandestine cyberspace activities in support of military operations pursuant to a congressionally
authorized use of force outside of the United States, or to defend against a cyberattack on an asset
of the DOD.59 The section highlights the blurred lines between military operations and
intelligence activities, particularly with respect to cyberspace. In general, Title 10 and Title 50 of
the U.S. Code refer to distinct chains of command and missions belonging to the armed forces
and intelligence agencies, respectively. The U.S. Cyber Command, the military entity responsible
for offensive operations in cyberspace and subject to Title 10 authorities, is co-located with and
led by the Director of the National Security Agency, a Title 50 intelligence organization.
Computer Network Attack, the military parlance for offensive operations, is closely related to and
at times indistinguishable from Computer Network Exploitation, which is used to denote data
extrapolation or manipulation.
According to DOD, a clandestine operation is one that is “sponsored or conducted by
governmental departments or agencies in such a way as to assure secrecy or concealment. A
clandestine operation differs from a covert operation in that emphasis is placed on concealment of
the operation rather than on concealment of the identity of the sponsor.”60 Under Title 50, a
“covert action” is subject to presidential finding and Intelligence Committee notification
requirements. Traditional military activity, although undefined, is an explicit exception to the
Title 50 U.S.C. covert action definition in Section 913 as the identity of the sponsor of a
traditional military activity may be well known.
According to the Joint Explanatory Statement of the Committee of Conference, H.R. 1455, July
25, 1991, traditional military activities

59 The previous version would have given the Secretary of Defense the authority to conduct clandestine cyberspace
activities in support of military operations pursuant specifically to the Authorization for the Use of Military Force (P.L.
107-40; 50 U.S.C. 1541 note) outside of the United States or to defend against a cyberattack on an asset of the
Department of Defense.

60 Department of Defense Dictionary of Military and Associated Terms, Joint Publication1-02, as amended through
August 15, 2014. [reconcile with similar footnote above]
Congressional Research Service
16

Cyber Operations in DOD Policy and Plans: Issues for Congress

include activities by military personnel under the direction and control of a United States
military commander (whether or not the U.S. sponsorship of such activities is apparent or
later to be acknowledged) preceding and related to hostilities which are either anticipated
(meaning approval has been given by the National Command Authorities for the activities
and or operational planning for hostilities) to involve U.S. military forces, or where such
hostilities involving United States military forces are ongoing, and, where the fact of the U.S.
role in the overall operation is apparent or to be acknowledged publicly.
By this reading, a clandestine operation falls under the traditional military activity rubric, because
the identity of the sponsor is not concealed. Hence, by referring only to “clandestine” operations
rather than covert operations, the provision distinguishes between approval and reporting
requirements for military-directed cyberspace operations and those conducted by the intelligence
community. By requiring quarterly briefings to the congressional defense committees, the
language would also appear to address concerns that a “clandestine” or “traditional military
activity” designation for a cyber operation would skirt the strict oversight requirements of its
covert counterpart. However, confusion may remain regarding the proper role and requirements
of the military, because some cyber operations may contain both covert and clandestine elements.
Another consideration is the military’s responsibility to notify congressional intelligence
committees of computer network exploitation activities undertaken as “operational preparation of
the environment.”
Executive Authorities
In December 2008, President-elect Obama offered details about the cybersecurity goals his
Administration would pursue, including “strengthening federal leadership on cybersecurity,
developing next-generation secure computers and networking for national security applications,
and protecting the IT infrastructure to prevent corporate cyberespionage.”61 In February 2009, he
initiated a 60-day interagency review with the goal of developing “a strategic framework to
ensure” that federal cybersecurity initiatives “are appropriately integrated, resourced, and
coordinated with Congress and the private sector.”62 The White House released the Cyberspace
Policy Review
in May 2009.63 At that time, the President announced64 that the Administration
would “pursue a new comprehensive approach to securing America’s digital infrastructure,” and
that he was creating a new White House office to be led by a Cybersecurity Coordinator—a
senior cybersecurity policy official, often referred to as the “Cyber Czar,” assigned to the Office
of the President and responsible for coordinating the nation’s cybersecurity-related policies.
While many security observers saw these initial efforts by the Obama Administration as a positive
step, others were concerned that government-wide collaborative efforts were not keeping pace

61 “Report: White House should oversee cybersecurity,” CNN, December 8, 2008, http://www.cnn.com/2008/TECH/12/
08/cyber.security/.
62 The White House, “President Obama Directs the National Security and Homeland Security Advisors to Conduct
Immediate Cyber Security Review,” press release, February 9, 2009, http://www.whitehouse.gov/the-press-office/
president-obama-directs-national-security-and-homeland-security-advisors-conduct-im.
63 The White House, Cyberspace Policy Review, May 29, 2009, http://www.whitehouse.gov/assets/documents/
Cyberspace_Policy_Review_final.pdf; the White House, “Cyberspace Policy Review [Supporting Documents],” May
2009, http://www.whitehouse.gov/cyberreview/documents/.
64 The White House, “Remarks by the President on Securing Our Nation’s Cyber Infrastructure,” press release, May 29,
2009, http://www.whitehouse.gov/the_press_office/Remarks-by-the-President-on-Securing-Our-Nations-Cyber-
Infrastructure/.
Congressional Research Service
17

Cyber Operations in DOD Policy and Plans: Issues for Congress

with the threats directed at U.S. technological global interests. Between 2009 and 2013, cyber
threats to U.S. infrastructure and other assets became a growing concern to policy makers.65
In the absence of legislative action, in 2012 the Obama Administration announced a new
Presidential policy directive related to U.S. Cyber Operations, the contents of which remain
classified, and began drafting an executive order on cybersecurity practices, Executive Order
13636, Improving Critical Infrastructure Cybersecurity, released after a year of interagency
debate and review.
At the federal level, five executive orders and Presidential directives authorize offensive and
defensive action in cyberspace:
National Security Presidential Directive 54/Homeland Security Presidential
Directive 23—The Comprehensive National Cybersecurity Initiative

The Obama Administration’s Cyberspace Policy Review builds on the Comprehensive National
Cybersecurity Initiative (CNCI) launched in January 2008 by the George W. Bush Administration
via a classified presidential directive.66 The CNCI established a multipronged approach for the
federal government to identify threats, address telecommunications and information-system
vulnerabilities, and respond to or proactively address entities that wish to steal or manipulate
protected data on secure federal systems.67
Presidential Policy Directive 20 (PPD-20)—U.S. Cyber Operations Policy
President Obama implemented PPD-20 on U.S. Cyber Operations Policy in October 2012.
Although subsequently leaked to the public in June of 2013,68 PPD-20’s contents remain
classified, with the exception of what the White House shared in a brief fact sheet. A widely cited
Washington Post article published on November 14, 2012 asserted the significance of PPD-20:
For the first time ... the directive explicitly makes a distinction between network defense and
cyber-operations to guide officials charged with making often-rapid decisions when
confronted with threats. The policy also lays out a process to vet any operations outside
government and defense networks and ensure that U.S. citizens’ and foreign allies’ data and
privacy are protected and international laws of war are followed.
The article went on to quote an unnamed senior administration official on the distinction between
defense and offense, clarifying that “network defense is what you’re doing inside your own

65 CRS Report R41674, Terrorist Use of the Internet: Information Operations in Cyberspace, by Catherine A.
Theohary and John W. Rollins; CRS Report R42507, Cybersecurity: Authoritative Reports and Resources, by Topic, by
Rita Tehan.
66 “The Comprehensive National Cybersecurity Initiative,” http://www.whitehouse.gov/issues/foreign-policy/
cybersecurity/national-initiative; National Security Presidential Directive 54 / Homeland Security Presidential Directive
23 (NSPD-54/HSPD-23).
67 CRS Report R40427, Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy
Considerations
, by John W. Rollins and Anna C. Henning.
68 Joshua Eaton, “American cyber-attack list uncovered,” Al Jazeera, http://america.aljazeera.com/articles/multimedia/
timeline-edward-snowden-revelations.html, accessed August 12, 2014.
Congressional Research Service
18

Cyber Operations in DOD Policy and Plans: Issues for Congress

networks.... Cyber-operations is stuff outside that space, and recognizing that you could be doing
that for what might be called defensive purposes.” 69
PPD-20 closes a perceived gap in the authorities necessary for DOD to defend the nation in
cyberspace, a gap that has not been addressed by Congress. The directive does not create new
powers for federal agencies or the military; however, by distinguishing between network defense
and cyber operations, it provides a policy framework for the Pentagon’s rules of engagement for
cyberspace. As specifically described in the White House fact sheet, PPD-20:
• takes into account the evolution of the threat and growing experience with the
threat;
• establishes principles and processes for using cyber operations so cyber tools are
integrated with the full array of national security tools;
• provides a whole-of-government approach consistent with values promoted
domestically and internationally and articulated in the International Strategy for
Cyberspace;
• mandates that the United States take the least action necessary to mitigate threats;
and
• prioritizes network defense and law enforcement as preferred courses of action.70
Executive Order 13636—Improving Critical Infrastructure Cybersecurity
The White House released EO 13636 on February 12, 2013. This executive order declares that “it
is the policy of the United States to enhance the security and resilience of the Nation’s critical
infrastructure (CI) and to maintain a cyber environment that encourages efficiency, innovation,
and economic prosperity while promoting safety, security, business confidentiality, privacy, and
civil liberties” (Section 1). The order:
• expands information sharing and collaboration between the government and the
private sector, including sharing classified information by broadening a program
developed for the defense industrial base to other CI sectors;
• develops a voluntary framework of cybersecurity standards and best practices for
CI protection, through a public/private effort;
• establishes a consultative process for improving CI cybersecurity;
• identifies CI with especially high priority for protection, using the consultative
process;
• establishes a program with incentives for voluntary adoption of the framework by
CI owners and operators;
• reviews cybersecurity regulatory requirements to determine whether they are
sufficient and appropriate; and

69 Ellen Nakashima, “Obama Signs Secret Directive to Help Thwart Cyberattacks” Washington Post, November 14,
2012.
70 Cheryl Pellerin, “DOD Readiness Elements Crucial to Cyber Operations” U.S. Department of Defense, American
Forces Press Service, http://www.defense.gov/news/newsarticle.aspx?id=120381.
Congressional Research Service
19

Cyber Operations in DOD Policy and Plans: Issues for Congress

• incorporates privacy and civil liberties protections in activities under the order.
In addition to codifying the DECS program, the order provides specific responsibilities to DHS
and the sector-specific agencies, as well as the Departments of Commerce, Defense, and Justice,
the intelligence community, the General Services Administration, and the Office of Management
and Budget, addressed below.
Presidential Policy Directive 21—Critical Infrastructure Security and Resilience
Along with EO 13636, the White House released Presidential Policy Directive 21 (PPD-21),71
“Critical Infrastructure Security and Resilience,” which addresses the protection of CI. PPD-21
supersedes Homeland Security Presidential Directive 7 (HSPD 7), “Critical Infrastructure
Identification, Prioritization, and Protection,” released December 17, 2003. PPD-21 seeks to
strengthen the security and resilience of CI by
• clarifying functional relationships among federal agencies, including the
establishment of separate DHS operational centers for physical and cyber-
infrastructure;
• identifying baseline requirements for information sharing;
• applying integration and analysis capabilities in DHS to prioritize and manage
risks and impacts, recommend preventive and responsive actions, and support
incident management and restoration efforts for CI; and
• organizing research and development (R&D) to enable secure and resilient CI,
enhance impact-modeling capabilities, and support strategic DHS guidance.
The directive provides specific responsibilities to DHS and the sector-specific agencies, as well as
the Departments of Commerce, Interior, Justice, and State; the intelligence community; the
General Services Administration; and the Federal Communications Commission.
National Infrastructure Protection Plan, National Response Framework and
Defense Support for Civil Authorities

The National Infrastructure Response Plan (NIPP), developed by DHS with other federal
agencies and private sector owners of critical infrastructure, outlines how government and private
sector critical infrastructure stakeholders work together to manage risks and achieve security and
resiliency. The NIPP 2013 meets the requirements of PPD-21, “Critical Infrastructure and
Resilience.”
The phrase “defense support of civil authorities” refers to DOD’s mission to help civil authorities
respond to a domestic emergency or other domestic activity. This support may be provided
through the military services, the National Guard, and other DOD resources. For the civil
cybersecurity mission, DHS leads the interagency with DOD support. The National Cyber
Incident Response Plan outlines roles and responsibilities for coordinating and executing a

71 The White House, “Critical Infrastructure Security and Resilience,” Presidential Policy Directive 21, February 12,
2013, http://www.whitehouse.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-infrastructure-
security-and-resil.
Congressional Research Service
20

Cyber Operations in DOD Policy and Plans: Issues for Congress

response to a domestic cyber incident.72 This plan fits into DHS’s National Response Framework,
a tiered response guide for local, state, and federal governments with respect to major disasters or
emergencies. A 2010 memorandum of agreement between DOD and DHS also guides
cooperation between the two entities with respect to securing national cyber assets.73
International Authorities
The DOD’s role in defense of cyberspace follows the body of laws, strategies, and directives
outlined above. For the military to respond to an act of cyberterrorism or cyberwar, a presidential
finding must be issued and an order must be executed. However, discussions have been underway
in various international fora that may affect how the U.S. government views certain actions in
cyberspace and when a military response is warranted. Although the President still decides
ultimately what the military will do, the decisions made in the international arena could affect
how the Department of Defense organizes, trains, and equips its forces in order to fulfill treaty
obligations.
As of yet, no international instruments have been drafted explicitly to regulate inter-state relations
in cyberspace. One apparent reason for the absence of such a treaty is that the international
governance of cyberspace has largely been the purview of private, professional organizations
such as the Internet Engineering Task Force (IETF) and the Internet Corporation for Assigned
Names and Numbers (ICANN). However, politically motivated cyberattacks are increasingly
common and, although difficult to attribute, often raise strong suspicion of government
involvement. More importantly, perhaps, states have become targets of cyberattack, provoking a
sense of urgency regarding the creation of national strategies and capabilities for cyberdefense
and cyberoffense.
The U.S. Position on International Authorities
The Obama Administration has responded to the internationalization of the cyberspace threat
environment by releasing in 2011 an International Strategy for Cyberspace.74 The Strategy calls
for strengthening bilateral and multilateral government partnerships, and a strong role for the
private sector. It does not call for any new treaties or agreements, and the only existing instrument
cited is the Budapest Convention (discussed below). It recommends, instead, preservation of the
openness that has been a hallmark of the Internet age. This puts the United States at odds with
China and Russia, both of which prefer a more nationalistic approach to Internet governance.
In September 2012, the U.S. State Department, for the first time, took a public position on
whether cyber activities could constitute a use of force under Article 2(4) of the U.N. Charter and
customary international law. According to State’s then-legal advisor, Harold Koh, “Cyber
activities that proximately result in death, injury, or significant destruction would likely be
viewed as a use of force.”75 Examples offered in Koh’s remarks included triggering a meltdown at

72 Department of Homeland Security, National Cyber Incident Response Plan, Interim Version, September 2010.
73 Accessed at https://www.dhs.gov/xlibrary/assets/20101013-dod-dhs-cyber-moa.pdf.
74 The White House, International Strategy for Cyberspace, May 2011, http://www.whitehouse.gov/sites/default/files/
rss_viewer/international_strategy_for_cyberspace.pdf.
75 Remarks of Harold Hongju Koh, Legal Advisor U.S. Department of State, at a USCYBERCOM Inter-Agency Legal
Conference, Ft. Meade, MD, September 18, 2012.
Congressional Research Service
21

Cyber Operations in DOD Policy and Plans: Issues for Congress

a nuclear plant, opening a dam and causing flood damage, and causing airplanes to crash by
interfering with air traffic control. By focusing on the ends achieved rather than the means with
which they are carried out, this definition of cyberwar fits easily within existing international
legal frameworks. If an actor employs a cyber weapon to produce kinetic effects that might
warrant fire power under other circumstances, then the use of that cyber weapon rises to the level
of the use of force.
However, the United States recognizes that cyberattacks without kinetic effects are also an
element of armed conflict under certain circumstances. Koh explained that cyberattacks on
information networks in the course of an ongoing armed conflict would be governed by the same
principles of proportionality that apply to other actions under the law of armed conflict. These
principles include retaliation in response to a cyberattack with a proportional use of kinetic force.
In addition, “computer network activities that amount to an armed attack or imminent threat
thereof” may trigger a nation’s right to self-defense under Article 51 of the U.N. Charter. Here
Koh cites the International Strategy for Cyberspace, which affirmed that “when warranted, the
United States will respond to hostile acts in cyberspace as we would to any other threat to our
country.” The International Strategy goes on to say that the U.S. reserves the right to use all
means necessary – diplomatic, informational, military, and economic – as appropriate and
consistent with applicable law, and exhausting all options before military force whenever
possible.
International Consensus-Building Activities
One of the Defense Objectives of the International Strategy for Cyberspace is to work
internationally “to encourage responsible behavior and oppose those who would seek to disrupt
networks and systems, dissuading and deterring malicious actors, and reserving the right to
defend national assets.” A growing awareness of the threat environment in cyberspace has led to
two major international processes geared toward developing international expert consensus
international cyber authorities.
First, the threat environment has spurred NATO interest in understanding how existing
international law applies to cyberwarfare. A year after the 2007 DDoS attack on Estonia, NATO
established the Cooperative Cyber Defense Center of Excellence (CCDCOE) in Tallinn, Estonia.
The CCDCOE hosts workshops and courses on law and ethics in cyberspace, as well as cyber-
defense exercises. In 2009, the center convened an international group of independent experts to
draft a manual on the law governing cyberwarfare. The Tallinn Manual, as it is known, was
published in 2013. It sets out 95 “black letter rules” governing cyber conflict addressing
sovereignty, state responsibility, the law of armed conflict, humanitarian law, and the law of
neutrality. The Tallinn Manual is an academic text: although it offers reasonable justifications for
the application of international law, it is non-binding and the authors stress that they do not speak
for NATO or the CCDCOE.
Second, the cyberspace threat environment has prompted the United Nations to convene Groups
of Governmental Experts (GGE) to study “Developments in the Field of Information and
Telecommunications in the Context of International Security.” The first successful U.N. GGE
report came out in 2010, followed by a second report in 2013. The current GGE is expected to
reach consensus again in 2015. The stated purpose of this process is to build “cooperation for a
peaceful, secure, resilient and open ICT environment” by agreeing upon “norms, rules and
principles of responsible behaviour by States” and identifying confidence and capacity-building
Congressional Research Service
22

Cyber Operations in DOD Policy and Plans: Issues for Congress

measures, including for the exchange of information. Unlike the work done at Tallinn under the
auspices of NATO, this U.S.-led process includes both China and Russia.
Existing International Instruments That Bear on Cyberwarfare
As previously discussed, the military’s role in cyberwarfare is governed by U.S. law. Yet many
international instruments bear on cyberwarfare, including those relating to law enforcement (e.g.,
extradition and mutual legal assistance treaties), defense, and security, along with broad treaties
and agreements, such as the United Nations Charter and the Geneva Conventions, as well as
international law. Such instruments include, but are not limited to, those described below.
Council of Europe Convention on Cybercrime
This law-enforcement treaty, also known as the Budapest Convention, requires signatories to
adopt criminal laws against specified types of activities in cyberspace, to empower law-
enforcement agencies to investigate such activities, and to cooperate with other signatories. Those
activities include both attacks on the integrity of cyber-systems and content-related crimes such
as fraud, pornography, and “hate speech.” The convention focuses on identification and
punishment of criminals rather than prevention of cybercrime. Consequently, it may act as a
deterrent, but it has no remediating effect on the criminal acts that do occur. Also, the provisions
on content may not be consistent with the different approaches of various nations to freedom of
expression. While widely cited as the most substantive international agreement relating to
cybersecurity, some observers regard it as unsuccessful. 76
In addition to most members of the Council of Europe, the United States and three other nations
have ratified the treaty. 77
United Nations Resolutions
A series of U.N. General Assembly resolutions relating to cybersecurity have been adopted over
the past 15 years. One resolution called for a report from an international group of government
experts from 15 nations, including the United States. That 2010 report, sometimes referred to as
the Group of Governmental Experts (GGE) Report, recommended a series of steps to “reduce the
risk of misperception resulting from ICT78 disruptions” but did not incorporate any binding
agreements.79 Nevertheless, some observers believe the report represents progress in overcoming

76 Jack Goldsmith, “Cybersecurity Treaties: A Skeptical View” Future Challenges Essay, June 2, 2011,
http://media.hoover.org/sites/default/files/documents/FutureChallenges_Goldsmith.pdf. He cites “vague definitions,”
reservations by signatories, and loopholes as reasons for its lack of success.
77 Council of Europe, “Convention on Cybercrime, CETS No. 185,” accessed February 18, 2013,
http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&CM=8&DF=&CL=ENG. See also Michael
Vatis, “The Council of Europe Convention on Cybercrime,” in Proceedings of a Workshop on Deterring CyberAttacks:
Informing Strategies and Developing Options for U.S. Policy (Washington, DC: National Academies Press, 2010), pp.
207–223.
78 The abbreviation ICT, which stands for information and communications technologies, is increasingly used instead
of IT, (information technologies) because of the convergence of telecommunications and computer technology.
79 United Nations General Assembly, Report of the Group of Governmental Experts on Developments in the Field of
Information and Telecommunications in the Context of International Security, July 30, 2010, http://www.un.org/ga/
search/view_doc.asp?symbol=A/65/201.
Congressional Research Service
23

Cyber Operations in DOD Policy and Plans: Issues for Congress

differences between the United States and Russia about various aspects of cybersecurity.80 In
December 2001, the General Assembly approved Resolution 56/183, which endorsed the World
Summit on the Information Society (WSIS) to discuss on information society opportunities and
challenges. This summit was first convened in Geneva, in 2003, and then in Tunis, in 2005, and
a10-year follow-on in Geneva in May 2013. Delegates from 175 countries took part in the first
summit, where they adopted a Declaration of Principles—a road map for achieving an open
information society. The Geneva summit left other, more controversial issues unresolved,
including the question of Internet governance and funding. At both summits, proposals for the
United States to relinquish control of ICANN were rejected.
Law of War
The so-called “Law of War” embodied in the Geneva and Hague Conventions and the U.N.
Charter may in some circumstances apply to cyberattacks, but without attempts by nation states to
apply it, or specific agreement on its applicability, its relevance remains unclear. It is also
complicated by difficulties in attribution, the potential use of botnets (see the “Malware” section
above), and possible harm to third parties from cyber-counterattacks, which may be difficult to
contain. In addition, questions of territorial boundaries and what constitutes an armed attack in
cyberspace remain. The law’s application would appear clearest in situations where a cyberattack
causes physical damage, such as disruption of an electric grid. As mentioned above, the Tallinn
Manual addresses many of these questions.81
International Law on Countermeasures
This body of international law relates to “how states may respond to international law violations
that do not rise to the level of an armed attack justifying self-defense.” It does not expressly
address cyberattacks but presumably would be applicable to them, provided the countermeasures
target the responsible nation and are “temporary and instrumentally directed” to induce cessation
of the violation.82 Similar caveats apply to such countermeasures with respect to attribution and
effects on innocent parties.
North Atlantic Treaty Organization (NATO)
Since the 2007 attack on Estonia,83 NATO has established authorities relating to cyberdefense,
with the goals of advancing strategy and centralizing defense capabilities across members. A

80 Oona Hathaway et al., “The Law of Cyber-Attack,” California Law Review 100, no. 4 (2012), http://papers.ssrn.com/
sol3/papers.cfm?abstract_id=2134932.
81 For a detailed discussion, see Hathaway et al., “The Law of Cyber-Attack.” See also CRS Report RL31787,
Information Operations, Cyberwarfare, and Cybersecurity: Capabilities and Related Policy Issues, by Catherine A.
Theohary; James A. Lewis, Conflict and Negotiation in Cyberspace (Center for Strategic and International Studies,
February 2013), https://csis.org/files/publication/130208_Lewis_ConflictCyberspace_Web.pdf; Mary Ellen O’Connell
and Louise Arimatsu, Cyber Security and International Law (London, UK: Chatham House, May 29, 2012),
http://www.tsa.gov/sites/default/files/assets/pdf/Intermodal/pipeline_sec_incident_recvr_protocol_plan.pdf.
82 Hathaway et al., “The Law of Cyber-Attack,” p. 857.
83 See CRS Report RL31787, Information Operations, Cyberwarfare, and Cybersecurity: Capabilities and Related
Policy Issues
, by Catherine A. Theohary.
Congressional Research Service
24

Cyber Operations in DOD Policy and Plans: Issues for Congress

policy on cyberdefense84 and an associated action plan were adopted in 2011, and the NATO
Communications and Information Agency (NCIA) was established in 2012 to facilitate the
centralization effort.85 The NATO Cyber Center of Excellence located in Tallinn, Estonia, is
another source of legal analysis.
International Telecommunications Regulations
The International Telecommunication Union (ITU) regulates international telecommunications
through binding treaties and regulations and nonbinding standards. Regulations prohibit
interference with other nations’ communication services and permit control of non-state
telecommunications for security purposes. The regulations do not, however, expressly forbid
military cyberattacks. Also, ITU apparently has little enforcement authority.86
Other International Law
Some bodies of international law, especially those relating to aviation and the sea, may be
applicable to cybersecurity; for example by prohibiting the disruption of air traffic control or
other conduct that might jeopardize aviation safety.87 Bilaterally, mutual legal assistance treaties
between countries may be applicable for cybersecurity forensic investigations and prosecution.
Defense Instruments
The United States has signed 16 treaties and other agreements with 13 other countries and the
European Union that include information security, mostly of classified military information, or
defense-related information assurance and protection of computer networks. According to news
reports, the United States and Australia have agreed to include cybersecurity cooperation within a
defense treaty, declaring that a cyberattack on one country would result in retaliation by both.88
Other International Organizations
A number of regional associations of nation states have issued declarations of goals and
statements of intent relating to cybersecurity, including:

84 The concept document (available at http://www.nato.int/cps/en/natolive/official_texts_68580.htm) states that NATO
will “develop further our ability to prevent, detect, defend against and recover from cyber-attacks, including by using
the NATO planning process to enhance and coordinate national cyberdefence capabilities, bringing all NATO bodies
under centralized cyber protection, and better integrating NATO cyber awareness, warning and response with member
nations.”
85 North Atlantic Treaty Organization, “NATO and Cyber Defence,” February 19, 2013, http://www.nato.int/cps/en/
SID-537741AA-89F4BEF4/natolive/topics_78170.htm?.
86 Hathaway et al., “The Law of Cyber-Attack.” See also Anthony Rutkowski, “Public International Law of the
International Telecommunication Instruments: Cyber Security Treaty Provisions Since 1850,” Info 13, no. 1 (2011):
13–31, http://www.emeraldinsight.com/journals.htm?issn=1463-6697&volume=13&issue=1&articleid=1893240&
show=pdf&PHPSESSID=9r0c5maa4spkkd9li78ugbjee3.
87 Hathaway et al., “The Law of Cyber-Attack.”
88 See, for example, Lolita Baldor, “Cyber Security Added to US-Australia Treaty,” Security on NBCNews.com, 2011,
http://www.msnbc.msn.com/id/44527648/ns/technology_and_science-security/t/cyber-security-added-us-australia-
treaty/.
Congressional Research Service
25

Cyber Operations in DOD Policy and Plans: Issues for Congress

• the G8 Group of States,
• the Asian Pacific Economic Cooperation (APEC),
• the Organization of American States (OAS),
• the Association of South East Asian Nations (ASEAN),
• the Arab League, and
• the Organization for Economic Cooperation and Development (OECD).
However, none of the documents issued by these organizations appear to be binding in effect.89
SCO-Proposed International Code of Conduct for Information Security
In September 2011, members of the Shanghai Cooperation Organization, including Russia and
China, submitted a proposed voluntary code of conduct for cybersecurity and requested that it be
placed on the U.N. General Assembly agenda.90 Its focus on the rights of governments, such as
“reaffirming that policy authority for Internet-related public issues is the sovereign right of
States,” among other concerns, led to resistance from the United States and other countries.91
OSCE Early Warning Resolution
Under the auspices of the Organization for Security and Cooperation in Europe (OSCE), in 2011
and 2012, the United States, Russia, and other countries negotiated a possible agreement that
would warn parties early on when cyber-operations might lead to unintentional conflict, but they
were unable to reach consensus on the resolution.92 Although some observers have expressed
interest in such an agreement, others doubt its effectiveness, arguing that conflicting interests and
the difficulties of attribution, among other problems, make it unfeasible.93

89 For summaries, see International Telecommunication Union, Global Cybersecurity Agenda (GCA): Global Strategic
Report,
2008, http://www.itu.int/osg/csd/cybersecurity/gca/global_strategic_report/global_strategic_report.pdf.
90 Ministry of Foreign Affairs of the People’s Republic of China, “China, Russia and Other Countries Submit the
Document of International Code of Conduct for Information Security to the United Nations,” September 13, 2011,
http://www.fmprc.gov.cn/eng/zxxx/t858978.htm.
91 Among the concerns cited were the absence of provisions on international law enforcement and combating
cyberespionage; its call for international cooperation relating to “curbing dissemination of information” relating to
“political, economic, and social stability” and “spiritual and cultural environment”; and ambiguity with respect to
censorship policy (Jeffrey Carr, “4 Problems with China and Russia’s International Code of Conduct for Information
Security,” Digital Dao, September 22, 2011, http://jeffreycarr.blogspot.com/2011/09/4-problems-with-china-and-
russias.html).
92 Aliya Sternstein, “U.S., Russia, Other Nations Near Agreement on Cyber Early-Warning Pact,” Nextgov:
Cybersecurity
, December 5, 2012, http://www.nextgov.com/cybersecurity/2012/12/us-russia-other-nations-near-
agreement-cyber-early-warning-pact/59977/; Aliya Sternstein, “Cyber Early Warning Deal Collapses After Russia
Balks,” Nextgov: Cybersecurity, December 7, 2012, http://www.nextgov.com/cybersecurity/2012/12/cyber-early-
warning-deal-collapses-after-russia-balks/60035/.
93 Goldsmith, “Cybersecurity Treaties: A Skeptical View.”
Congressional Research Service
26

Cyber Operations in DOD Policy and Plans: Issues for Congress

ITU Dubai Summit
The ITU convened the World Conference on International Telecommunications (WCIT) in Dubai,
United Arab Emirates, during December 3-14, 2012, to review the International
Telecommunications Regulations. In the run-up to the summit, many security observers expressed
concern over the closed nature of the talks and feared a shift of Internet control away from private
entities such as ICANN toward the U.N. and national governments. Although these concerns
proved to be largely baseless, a controversial deep packet inspection proposal from the People’s
Republic of China was adopted at the summit.94 Dissenting countries, including Germany, fear
that this recommendation will result in accelerated Internet censorship in repressed nations.
Issues for Congress
Authorities: Is Current Law Enough?
Does the military have the authorities it needs to effectively fight and win wars in cyberspace?
Some have argued that to fulfill its homeland defense mission, USCYBERCOM should be given
increased authority over private sector critical infrastructure protection. Yet business owners,
particularly in the IT sector, contend that this would represent a “militarization of cyberspace”
that would create distrust among consumers and shareholders, and could potentially stifle
innovation, leading to decreases in profits. Others argue that the military’s role is to fight and win
wars, rather than to bolster a private company’s cyber defenses.
As discussed, the international community must contend with a certain amount of ambiguity
regarding what constitutes an “armed attack” attack in cyberspace and what the thresholds are for
cyberattack as an act of war, an incident of national significance, or both. Without clear redlines
and specific consequences articulated, deterrence strategies may be incomplete. On the other
hand, a lack of redlines and consequences could constitute a form of strategic ambiguity that
gives the U.S. military operational maneuverability. Congress may wish to consider these
concerns as new legislation regarding critical infrastructure protection is proposed.
Skilled cyber operators are in demand in the military, and the national supply of cyber
professionals tends to reside in the private sector. Some of the services are looking at bolstering
opportunities for officers who wish to pursue careers in cybersecurity by creating new
occupational specialties and career tracks. Yet barriers to hiring skilled civilians for the DOD
cyber mission may hinder the development of a robust workforce. Congress may choose to
consider ways to incentivize and bolster recruitment of talent outside of the military, such as
providing special hiring authorities for certain mission critical positions, streamlining or revising
the clearance process for national security personnel, and compensation comparable to private
sector equivalent jobs.

94 Deep packet inspection allows the content of a unit of data to be examined as it travels through an inspection point, a
process which enables data mining and eavesdropping programs.
Congressional Research Service
27

Cyber Operations in DOD Policy and Plans: Issues for Congress

How Do DOD and Cyber Command Responsibilities for
Cybersecurity Fit Within the Interagency and Private Sector?

Reports have described the USCYBERCOM cyber force’s “National Mission Teams” as
protecting the networks that undergird critical infrastructure. Given that the majority of this
critical infrastructure resides in the private sector, for which DHS has coordinating authority, how
do USCYBERCOM teams protect these assets during peacetime without violating Posse
Comitatus
, the prohibition against using the military for domestic policing? How do these
national teams interact and coordinate with DHS?
Should U.S. Cyber Command Be Its Own Unified Combatant
Command?

The Unified Command Plan organizes combatant commands into geographic and functional
areas. U.S. Cyber Command is currently organized under the functional Strategic Command, and
co-directed and located with the National Security Agency (NSA). With the complicated lines of
authority (Title 10 vs. Title 50) associated with this structure, some have suggested separating the
two organizations and giving civilian control to the NSA while elevating Cyber Command to the
level of a full unified combatant command. DOD has been tasked by Congress to study and report
on the possible implications of this realignment. Specifically, The National Defense Authorization
Act for Fiscal Year 2013 (P.L. 112-239) asks in Section 940 “how a single individual could serve
as a commander of a combatant command that conducts overt, though clandestine, cyber
operations under Title 10, United States Code, and serve as the head of an element of the
intelligence community that conducts covert cyber operations under the National Security Act of
1947.”
Is a Separate Cyber Force Necessary?
Given that the DOD views cyberspace as one of five global domains, some proponents in
Congress contend that a separate cyber force, akin to the Army, Navy, Air Force, or Marine
Corps, is necessary to properly address the military aspects of the domain. However, critics point
to the multi-layered aspect of cyberspace in which all services have equities.
What Are the Authorizing and Oversight Committees and
Jurisdictional Implications?

As previously discussed, blurred lines between operations undertaken under Title 10 and Title 50
authorities can complicate efforts to determine the chain of command and jurisdictional review
process. What does this ambiguity mean for congressional oversight committees? Have some
operations taken place without congressional notification? What has been the Department of
Defense’s role in responding to cyberattacks on private networks?
Current Legislation
The National Defense Authorization Act for Fiscal Year 2015 (P.L. 113-291) contains some
provisions related to DOD cybersecurity and cyber operations. These provisions:
Congressional Research Service
28

Cyber Operations in DOD Policy and Plans: Issues for Congress

• require reporting on cyber incidents with respect to networks and information
systems of operationally critical contractors and certain other contractors.
• require the Principal Cyber Advisor to identify improvements to ensure sufficient
civilian workforce to support USCYBERCOM and components.
• direct a program of decryption to inspect content for threats and insider activity
within DOD networks.
• state the Sense of Congress that as ICANN turns to global community for
leadership, support should be given only if assurances are provided for current
legacy IP numbers used by DOD and the U.S. government.
• direct that a new mission forces, training, manning and equipping plan and
associated programmatic elements be submitted to Congress.
• state a Sense of Congress for consideration regarding role of reserve components
in defense against cyberattacks given their unique experience in private and
public sectors and existing relationships with local and civil authorities for
emergency response.

Congressional Research Service
29

Cyber Operations in DOD Policy and Plans: Issues for Congress

Appendix. Timeline of International Attacks95
February-June 1999: Kosovo was the arena for the first large-scale Internet war, involving pro-
Serbian forces cyberattacking the North Atlantic Treaty Organization (NATO). As NATO planes
bombed Serbia, pro-Serbian hacker groups, such as the “Black Hand,” attacked NATO, U.S., and
UK Internet infrastructure and computers via DoS attacks and virus-infected email. In the United
States, the White House website was defaced. The UK admitted to losing database information.
At NATO Headquarters in Belgium, a public affairs website for the war in Kosovo was “virtually
inoperable for several days.” Simultaneously, NATO’s email server was flooded and choked with
email.96 During the Kosovo conflict, a NATO jet bombed the Chinese embassy in Belgrade in
May 1999. The Chinese Red Hacker Alliance retaliated by launching thousands of cyberattacks
against U.S. government websites. 97
October 2000: Riots in the Palestinian territories sparked rounds of cyberattacks between Israelis
and Palestinians. Pro-Israeli attacks targeted the official websites of the Palestinian Authority,
Hamas, and the government of Iran. Pro-Palestinian hackers retaliated against Israeli political,
military, telecommunications, media, the financial sector, commercial, and university websites.
Since 2000, the Middle East cyberwar has kept pace with the ground conflict.98
April-May 2007: DDoS attacks shutdown websites of Estonia’s parliament, banks, ministries,
newspapers, and broadcasters. Estonian officials accused the Russian government of responding
to their decision to move a Soviet-era war memorial with retaliatory cyberattacks.99
September 2007: Israel disrupted Syrian air defense networks during the bombing of an alleged
nuclear facility in Syria.100
July 2008: Government and corporate websites in Lithuania were defaced. The Soviet-themed
graffiti implicated Russian nationalist hackers.101
August 2008: Georgian government and commercial websites were shut down by DoS attacks at
the same time that Russian ground troops invaded the country.102

95 Unless otherwise noted, these events are cited in “Significant Cyber Events” Washington, DC: Center for Strategic
and International Studies, http://csis.org/program/significant-cyber-events; accessed August 7, 2014.
96 Kenneth Geers, “Cyberspace and the Changing Nature of Warfare,” keynote speech, Japan, 2008,
http://www.blackhat.com/presentations/bh-jp-08/bh-jp-08-Geers/BlackHat-Japan-08-Geers-Cyber-Warfare-
Whitepaper.pdf.
97 Jeffrey Carr, “Real Cyber Warfare: Carr’s Top Five Picks,” Forbes, February 4, 2011, http://www.forbes.com/sites/
jeffreycarr/2011/02/04/real-cyber-warfare-carrs-top-five-picks/; Kenneth Geers, “Cyberspace and the Changing Nature
of Warfare,” keynote speech, Japan, 2008, http://www.blackhat.com/presentations/bh-jp-08/bh-jp-08-Geers/BlackHat-
Japan-08-Geers-Cyber-Warfare-Whitepaper.pdf.
98 Kenneth Geers, “Cyberspace and the Changing Nature of Warfare,” keynote speech, Japan, 2008,
http://www.blackhat.com/presentations/bh-jp-08/bh-jp-08-Geers/BlackHat-Japan-08-Geers-Cyber-Warfare-
Whitepaper.pdf.
99 Joshua Davis, “Hackers Take Down the Most Wired Country in Europe,” Wired, August 21, 2007,
http://archive.wired.com/politics/security/magazine/15-09/ff_estonia?currentPage=all.
100 “Significant Cyber Events” Washington, DC: Center for Strategic and International Studies, http://csis.org/program/
significant-cyber-events; accessed August 7, 2014.
101 Brian Krebs, “Lithuania Weathers Cyberattack, Braces for Round 2,” The Washington Post, July 3, 2008,
http://voices.washingtonpost.com/securityfix/2008/07/lithuania_weathers_cyber_attac_1.html.
Congressional Research Service
30

Cyber Operations in DOD Policy and Plans: Issues for Congress

January 2009: DoS attacks originating in Russia shut down Kyrgyzstan’s two main Internet
servers on the same day that the Russian government pressured Kyrgyzstan to bar U.S. access to a
local airbase.103
July 2009: Servers in South Korea and the United States sustained a series of attacks, reportedly
by North Korea.104
June 2010: “Stuxnet” worm damaged an Iranian nuclear facility. The United States and Israel
were implicated in the attack.105
September 2011: “Keylogger” malware was found on ground control stations for U.S. Air Force
unmanned aerial vehicles (UAVs) and reportedly infected both classified and unclassified
networks at Creech Air Force Base in Nevada.
May 2012: An espionage worm called “Flame,” allegedly 20 times more complex than Stuxnet,
was discovered on computers in the Iranian Oil Ministry, as well as in Israel, Syria, and Sudan.
August 2012: “Gauss” worm infected 2,500 systems worldwide. The malware appeared to have
been aimed at Lebanese banks, and contained code whose encryption has not yet been broken.
August 2012: The “Cutting Sword of Justice,” a group reportedly linked to the government of
Iran, used the “Shamoon” virus to attack major oil companies including Aramco, a major Saudi
oil supplier, and the Qatari company RasGas, a major liquefied natural gass (LNG) supplier. The
attack on Aramco deleted data on 30,000 computers and infected (without causing damage)
control systems.
September 2012-June 2013: The hacker group Izz ad-Din al-Qassam launched DoS attacks
against major U.S. financial institutions in “Operation Ababil.” Izz ad-Din al-Qassam is believed
to have links to Iran and Hamas.
January 2013: The New York Times, Wall Street Journal, Washington Post, and Bloomberg News
revealed that they were targeted by persistent cyberattacks. China was the suspected source.
May 2013: Israeli officials reported a failed attempt by the Syrian Electronic Army to
compromise water supply to the city of Haifa.

(...continued)
102 John Markoff, “Before the Gunfire, Cyberattacks,” New York Times, August 12, 2008, http://www.nytimes.com/
2008/08/13/technology/13cyber.html?_r=0.
103 Daniel McLaughlin, “Lithuania accuses Russian hackers of cyber assault after collapse of over
300 websites” (Irish Times, July 2, 2008) p. 10, http://lumen.cgsccarl.com/login?url=http://proquest.umi.com/pqdweb?
did=1503762091&sid=2&Fmt=3&cl
ientld=5094&RQT=309&VName=PQD.
104 “Significant Cyber Events” Washington, DC: Center for Strategic and International Studies, http://csis.org/program/
significant-cyber-events; accessed August 7, 2014.
105 Ralph Langer, “To Kill a Centrifuge: A Technical Analysis of What Stuxnet’s Creators Tried to Achieve,”
November, 2013, http://www.langner.com/en/wp-content/uploads/2013/11/To-kill-a-centrifuge.pdf.
Congressional Research Service
31

Cyber Operations in DOD Policy and Plans: Issues for Congress

August 2013: Leaks revealed that the U.S. government purportedly conducted 231 cyber
intrusions in 2011 against Russia, China, North Korea, and Iran. Most of the intrusions were
related to nuclear proliferation.
April 2014: The disclosure of the Heartbleed bug revealed vulnerability in the OpenSSL protocol
previously considered the standard for Internet security. Canada reported more than 900
compromised social security numbers.106
May 2014: The United States indicted five Chinese military officers on charges of computer
hacking, economic espionage, and other offenses against six targets in the United States’ nuclear
power, metals, and solar power industries. China has denied the charges.107 According to U.S.
Attorney General Eric Holder, “This is a case alleging economic espionage by members of the
Chinese military and represents the first ever charges against a state actor for this type of
hacking.”108
July 2014: The United States charged a Chinese entrepreneur with breaking into the computer
systems of the U.S. defense giant Boeing and other firms to steal data on military programs
concerning warplanes, including C-17 cargo aircraft, and the F-22 and F-35 fighter jets.109 At the
same time, the security firm Kapersky reported a massive cyber operation dubbed “Energetic
Bear,” which targeted more than 2,800 industrial firms around the globe. Although some reports
identified a Russian hacker group as the source, Kapersky refrained from attributing the attack to
any one country.110
December 2014: U.S. cybersecurity firm Cylance reported that an Iranian hacker group has
breached airlines, energy and defense firms, and the U.S. Marine Corps intranet in an attack
known as “Operation Cleaver.”111


106 http://heartbleed.com/; “OpenSSL Heartbleed Vulnerability” Cyber Security Bulletins. Public Safety Canada. April
11, 2014, retrieved April 14, 2014. SSL (Secure Sockets Layer) is the standard security technology for establishing an
encrypted link between a web server and a browser.
107 Song Sang-ho, “Concerns rise over militarization of cyberspace,” The Korean Herald, July 13, 2014,
http://www.koreaherald.com/view.php?ud=20140713000188.
108 Office of Public Affairs, U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S.
Corporations and a Labor Organization for Commercial Advantage, Department of Justice, May 19, 2014,
http://www.justice.gov/opa/pr/2014/May/14-ag-528.html.
109 Dan Levine, “US Charges Chinese Man with Hacking into Boeing,” Reuters, July 11, 2014,
http://www.reuters.com/article/2014/07/11/boeing-china-cybercrime-idUSL2N0PM2FV20140711.; Song Sang-ho,
“Concerns rise over militarization of cyberspace,” The Korean Herald, July 13, 2014, http://www.koreaherald.com/
view.php?ud=20140713000188.
110 See http://www.darkreading.com/attacks-breaches/energetic-bear-under-the-microscope/d/d-id/1297712.
111 See http://www.defensenews.com/article/20141202/DEFREG04/312020030/Report-Iran-Hackers-Infiltrated-
Airlines-Energy-Defense-Firms.
Congressional Research Service
32

Cyber Operations in DOD Policy and Plans: Issues for Congress

Author Contact Information

Catherine A. Theohary
Anne I. Harrington
Specialist in National Security Policy and
APSA Congressional Fellow
Information Operations

ctheohary@crs.loc.gov, 7-0844


Congressional Research Service
33