The U.S. House Armed Services Subcommittee on Cyber, Information Technologies, and Innovation held a hearing last week to assess the Department of Defense’s cyberwarfare capabilities, its overall cyber defense posture, and the readiness of the Cyber Mission Force and its broader support ecosystem.
Testifying at the hearing, Laurie Buckhout, performing the duties of assistant secretary of defense for cyber policy, and Army Lt. Gen. William Hartman, acting commander of U.S. Cyber Command, called for sharper strategic focus, advanced technological innovation, and a top-tier cyber workforce to confront increasingly sophisticated threats.
Representative Don Bacon, a Republican from Nebraska and chairman of the Cyber, Information Technologies, and Innovation Subcommittee, wrote in his opening statement that the U.S. is at war in the cyber domain. “In just the last two years, the United States has been directly and deliberately attacked by the People’s Republic of China and other nation-states in the cyber domain.
Highlighting the Volt Typhoon, Salt Typhoon, Flax Typhoon, and countless other cyberattacks aimed at U.S. transportation, energy, water, telecommunications, and other critical infrastructure, Bacon noted that it’s time to stop talking about preparing for conflict because ‘we are already in one.’
“I, for one, believe it’s time we start acting like we’re truly at war in the cyber domain,” Bacon said. “But recent actions by this administration make me question whether they actually believe it themselves.”
First, he noted that there is the issue of leadership. Just weeks ago, the commander of U.S. Cyber Command and director of the National Security Agency (NSA), two of the most critical cyber roles in government, was abruptly removed without explanation. General Haugh was the most cyber-experienced officer ever to hold the position, respected by allies, trusted by his teams, and feared by adversaries.
Bacon observed that taking him off the battlefield in this way served no national security interest. It only helped China, Russia, Iran, and North Korea do what they couldn’t achieve on their own.
Second, he added renewed talk about splitting the ‘dual-hat’ leadership structure of CYBERCOM and NSA, a model that has repeatedly proven its value to national security. This idea has been studied to death, yet some still think they know better.
“I’ve spoken with colleagues on both sides of the aisle and in both chambers. There is strong bipartisan, bicameral opposition to ending the dual-hat arrangement,” Bacon wrote. Let me be crystal clear: if the Department thinks it has allies on Capitol Hill who support this move, they are mistaken.”
Third, he voiced ongoing concern over the nation’s cyber training and readiness, warning that current capabilities may not keep pace with growing threats. “There is no room for complacency. We cannot afford to fall behind.”
Strategic realignment amid escalating threats
Buckhout warned that a growing concern is adversaries’ increasing willingness to use cyber tools not just for espionage, but to gain access and ‘preposition’ for disruptive operations. “The interconnectedness of our digital infrastructure means that vulnerabilities in one area can have cascading effects across multiple sectors. This digital infrastructure also underpins other essential functions of our Nation, from how Americans communicate with loved ones, to how we navigate, to how our economy functions at its core, underscoring the need for enhanced cybersecurity and proactive risk mitigation.”
“Our strategic lines of effort are oriented around Secretary Hegseth’s three priorities: homeland defense, lethality, and warfighting,” Buckhout observed. “We will work to increase the number of highly skilled professionals dedicated to securing cyberspace and reinforce the capacity to deter and respond swiftly and decisively to cyberattacks. This necessitates a shift from a reactive posture to a more proactive and assertive approach.”
To that end, the Office of the Assistant Secretary of Defense for Cyber Policy is zeroing in on three strategic priorities: reestablishing deterrence and homeland security, reviving the warrior ethos, and rebuilding military strength.
She also identified that success in this challenging environment necessitates a Joint Force that is ready, capable, and resourced to operate effectively in cyberspace. “The scale and urgency of cyber threats demand clear prioritization and sound strategic choices. DoD must rebuild the military and revitalize America’s defense industry rapidly but at a reasonable cost, consistent with principles of fiscal responsibility. Achieving this objective requires sustained investment in our personnel and our capabilities.”
Speed, agility, and cyber advantage
Hartman mentioned that new technologies are changing the dynamics of cyberspace and the character of conflict. “Cyberspace operations demand and reward agility and rapid capability development, and thus we require acquisition and programming processes that move at the speed of relevance. The unique authorities granted to us by Congress allow USCYBERCOM to be ready, but this also means added expectations on our Command.”
He pointed to the bold efforts by state-sponsored cyber actors to achieve strategic objectives against the U.S. and its allies and partners. “We focus on adversaries probing the DoDIN, U.S. weapons systems, and U.S. and Western critical infrastructure to hold vital economic and national functions at risk. Adversary cyber actors also target Western defense industrial base networks to steal weapon-system technology.”
Additionally, Hartman said that “Non-state cyber actors remain a threat in cyberspace. Cyber criminals’ services continue to find new victims in the United States and globally. We are particularly concerned about the criminal enablers of such activities, such as those providing ransomware-as-a-service to all manner of bad actors. In addition, violent extremist groups still operate in cyberspace.”
In conclusion, he identified that USCYBERCOM creates advantage for the Joint Force, for the Department, for its partners at home and abroad, and most of all for the nation. “We campaign in and through cyberspace to support national strategic goals in competition and set conditions for the Joint Force to prevail in crisis and win the nation’s wars. We must do so faster and better in 2025 because the United States and our allies face increasingly sophisticated cyber threats from both state and non-state actors.”