By constantly flexing the military’s cyber muscles to defend the homeland from inbound criminal cyber activity, the public demand for a broad federal response to illegal cyber activity is satisfied. Still, over time, the potential adversary will understand our military’s offensive cyber operations’ tactics, techniques and procedures.
Critical infrastructure is a significant attack vector to track and defend. Still, cyberattacks on U.S. critical infrastructure create reactions that might not be wholly predictable — creating risk for the adversary. For the U.S., the risk is that we try too hard to find strategic intent where there is none.