Operational Technology Cybersecurity Vulnerabilities in Military Critical Infrastructure
Strategic Data Ops — A Comprehensive Assessment of OT/ICS/SCADA Attack Surfaces Across U.S. Military Installations
Key Findings at a Glance
4,800
U.S. Military Installations
85%
Infrastructure Outside-the-Fence
77%
Federal Energy Consumed by DoD
20–30 yr
OT System Lifecycle
18,000+
Orgs Compromised (SolarWinds)
$2B+
DPRK Crypto Theft
Strategic Warning
Nation-state adversaries have already pre-positioned within U.S. critical infrastructure supporting military installations. The presumed “air gap” protecting operational technology systems is a myth—professional security assessments consistently find magnitudes greater numbers of connections than system operators believe exist. Approximately 85% of infrastructure supporting military operations is owned and operated by civilian entities with minimal cybersecurity oversight.
Executive Summary
The United States military maintains approximately 4,800 installations across all 50 states, territories, and overseas locations. These installations exhibit near-universal dependence on civilian-provided infrastructure for essential operational capabilities—from electrical power and natural gas to water treatment and telecommunications. This dependency translates directly into operational technology (OT) system exposure, as the industrial control systems managing these services represent attack surfaces that adversaries have already demonstrated the capability and intent to exploit.
Research conducted by the Stanford Program on Geopolitics, Technology, and Governance in partnership with the Army Cyber Institute at West Point has systematically mapped these dependencies through open-source intelligence methodologies that replicate adversary reconnaissance capabilities with disturbing fidelity. The findings are unambiguous: the Department of Defense—the single largest energy consumer in the United States, accounting for approximately 77% of federal government energy consumption—depends on OT systems it neither owns nor controls, protected by cybersecurity standards that are fragmented, inadequate, or entirely absent.
Operational technology systems present fundamentally different cybersecurity challenges than information technology systems. Where IT prioritizes confidentiality, OT prioritizes availability and safety. Where IT systems cycle every 3–5 years, OT systems persist for 20–30 years with flat network architectures, implicit trust models, and authentication mechanisms that are often entirely absent. Patching cadences measured in months to years—compared to days or weeks for IT—create persistent windows of exploitation that adversaries have systematically catalogued.
“The benefits of internet connectivity are so great that it’s unavoidable. Professional security assessments will find connections, often magnitudes greater numbers of connections than the system operator thinks they have.”
The Volt Typhoon campaign—publicly attributed to Chinese PLA units by U.S. government agencies in 2023–2024—represents the most extensive documented penetration of U.S. critical infrastructure for potential disruption purposes, with specific targeting of infrastructure serving military installations. Russian and Iranian state-sponsored actors have demonstrated complementary capabilities, while the DPRK’s Lazarus Group has stolen over $2 billion in cryptocurrency, funding further offensive cyber development. These are not theoretical threats. They are documented, ongoing operations.
The OT Attack Surface in Military Operations
2.1 Critical Infrastructure Dependencies
Military installations depend on six critical infrastructure sectors, each managed by operational technology systems with distinct vulnerability profiles. The dependency structure spans electricity, natural gas, water, wastewater, freight rail, and telecommunications—virtually none of which the Department of Defense owns or directly controls.
| Sector | Function | Ownership | Oversight |
|---|---|---|---|
| Electricity | Power for all installation functions | Investor-owned / municipal utilities | FERC / NERC |
| Natural Gas | Heating, industrial processes | Interstate pipelines / private | TSA / State PUCs |
| Water | Personnel consumption, sanitation | Municipal utilities | EPA / State |
| Wastewater | Sanitary waste treatment | Municipal utilities | EPA / State |
| Freight Rail | Heavy equipment movement | Class I railroads | TSA |
| Telecom | Command and control | Commercial carriers | FCC |
Table 1: Critical Infrastructure Dependencies for Military Installations
2.2 The IT vs OT Security Gap
The distinction between operational technology and information technology extends far beyond nomenclature to encompass fundamentally different design philosophies, operational requirements, and security trade-offs. This gap creates a persistent and dangerous weakness in national defense posture that adversaries have systematically exploited.
| Dimension | Information Technology | Operational Technology |
|---|---|---|
| Primary Objective | Confidentiality, Integrity, Availability | Availability, Safety, Reliability |
| Patching Cadence | Days to weeks; automated | Months to years; extensive testing |
| Technology Lifecycle | 3–5 years typical | 20–30 years; legacy persists |
| Network Architecture | Hierarchical with trust boundaries | Flat, implicit trust |
| Authentication | Standard, mandatory | Often absent; legacy protocols |
| Downtime Tolerance | Acceptable for maintenance | Often unacceptable (99.999%) |
Table 2: IT vs OT Security Model Comparison
2.3 The Air Gap Myth
A persistent and dangerous misconception pervades military cybersecurity planning: the assumption that critical OT systems benefit from “air gap” isolation. The empirical reality is that presumed air-gapped systems maintain numerous connectivity pathways that render isolation illusory. Modern OT environments incorporate internet-connected devices, contractor IT networks that serve as attack vectors, and foreign-manufactured components with undisclosed functionality.
Case Example: Marine Corps Battery Incident
The Marine Corps Base Camp Lejeune energy resilience project provides instructive illustration of how infrastructure hardening initiatives can inadvertently compound rather than reduce cybersecurity risk when supply chain security is inadequately addressed. Foreign-manufactured components, particularly from China, present specific security concerns given strategic competition, demonstrated capabilities for supply chain exploitation, and discovered instances of undisclosed functionality.
2.4 Inside-the-Fence vs Outside-the-Fence
Effective analysis of military OT cybersecurity vulnerabilities requires careful delineation of two distinct but interdependent risk domains. Outside-the-fence infrastructure encompasses approximately 85% of critical services supporting military installations—owned and operated by civilian entities with varying and often inadequate cybersecurity standards. Inside-the-fence infrastructure presents a different but equally complex risk profile, with legacy systems, contractor dependencies, and procurement gaps creating correlated vulnerability risk.
2.5 Supply Chain and Procurement Vulnerabilities
Military infrastructure dependencies frequently involve concentrated reliance on single contractors for critical services, creating systemic risk that contractor compromise or failure could have cascading mission impact. A central finding of the research is the absence of OT-specific cybersecurity requirements in contracts for infrastructure services—identified as the most flexible and most impactful leverage point for risk reduction.
CMMC Program Gaps
The Cybersecurity Maturity Model Certification (CMMC) program represents the Department of Defense’s most significant recent initiative for contractor cybersecurity improvement. Yet fundamental gaps in its applicability to operational technology environments create a misleading impression of comprehensive coverage. CMMC was designed for IT environments and does not address the unique characteristics of OT systems—legacy protocols, safety-critical operations, and extended lifecycles.
Adversary Threat Assessment
3.1 Nation-State Cyber Capabilities
Five nation-state actors maintain dedicated offensive cyber capabilities targeting operational technology and critical infrastructure. Their operations span peacetime intelligence collection, crisis-phase deterrence, and conflict-phase disruption—representing a spectrum of threat that the current defensive posture is inadequately configured to address.
| Nation | Primary Groups | Key Operations | Strategic Focus |
|---|---|---|---|
| United States | Equation Group / TAO | Stuxnet (joint w/ Israel) | Offensive disruption, intelligence collection |
| Russia | Sandworm (GRU) / Fancy Bear | Ukraine grid attacks (2015/2016), NotPetya | Infrastructure disruption, coercion |
| China | Volt Typhoon / APT groups | U.S. critical infrastructure pre-positioning | Conflict-phase disruption capability |
| DPRK | Lazarus Group | $2B+ cryptocurrency theft, WannaCry | Financial operations, asymmetric disruption |
| Iran | APT33 / APT34 | Shamoon, water treatment targeting | Regional deterrence, retaliatory capability |
Table 3: Nation-State OT Cyber Capabilities Comparison
3.2 Chinese PLA: Volt Typhoon
The Volt Typhoon campaign, publicly attributed by U.S. government agencies in 2023–2024, represents the most extensive documented penetration of U.S. critical infrastructure for potential disruption purposes, with specific targeting of infrastructure serving military installations. The campaign’s focus on pre-positioning—rather than immediate exploitation—indicates strategic investment in conflict-phase disruption capability, designed to delay or prevent effective U.S. force projection during a regional crisis.
3.3 Russian Operations: From Ukraine to Global Reach
Russian state-sponsored actors have demonstrated the most extensive operational track record in OT attacks. The GRU’s Sandworm unit executed the first confirmed cyberattacks against civilian electrical infrastructure—shutting down portions of Ukraine’s power grid in December 2015, affecting approximately 225,000 customers, and launching a more sophisticated attack against Kyiv’s transmission system in December 2016. These operations provided proof of concept for capabilities that could be directed against any nation’s grid infrastructure.
NotPetya: The $10 Billion “Ransomware”
The 2017 NotPetya attack, attributed to Russian GRU, demonstrated how a cyber weapon designed for one target—Ukraine—could cascade globally, causing over $10 billion in damages across multinational corporations including Maersk, Merck, and FedEx. The attack masqueraded as ransomware but was in fact a destructive weapon with no recovery mechanism. It remains the most economically damaging cyberattack in history.
3.4 Attack Vectors and Techniques
Contractor networks provide the predominant initial access vector for adversary campaigns targeting military infrastructure dependencies, exploiting trust relationships and technical access that maintenance and support functions require. Once initial access is achieved, lateral movement from IT to OT environments exploits the connectivity that undermines air gap assumptions. The ultimate objective is frequently physical process manipulation—disruption, degradation, or destruction of infrastructure function through cyber-enabled control system exploitation.
3.5 Strategic Objectives Across the Conflict Spectrum
| Phase | Objective | Activity |
|---|---|---|
| Peacetime | Intelligence Collection | Network mapping, vulnerability cataloguing, access maintenance |
| Crisis | Deterrence & Coercion | Demonstrated or threatened disruption to influence U.S. response options |
| Conflict | Force Projection Disruption | Delay or prevent military deployment through infrastructure degradation |
Table 4: Adversary Strategic Objectives Across the Conflict Spectrum
Case Studies in OT Warfare
The history of OT-targeted cyber operations provides empirical evidence of capabilities that are frequently dismissed as theoretical. Each case study below demonstrates escalating sophistication, expanding scope, and increasing willingness to target civilian infrastructure for strategic effect.
| Year | Operation | Attribution | Impact |
|---|---|---|---|
| 2010 | Stuxnet | US / Israel | ~1,000 Iranian centrifuges destroyed |
| 2015 | Ukraine Grid Attack I | Russia (Sandworm) | 225,000 customers without power |
| 2016 | Ukraine Grid Attack II | Russia (Sandworm) | Kyiv transmission system disrupted |
| 2017 | NotPetya | Russia (GRU) | $10B+ global damages |
| 2020 | SolarWinds | Russia (SVR) | 18,000 organizations compromised |
| 2021 | Colonial Pipeline | DarkSide (criminal) | 5,500 mi pipeline shut down; $4.4M ransom |
| 2023–24 | Volt Typhoon | China (PLA) | U.S. critical infrastructure pre-positioning |
Table 5: Major OT Cyber Operations Timeline
4.1 Stuxnet: The Weapon That Changed Everything
Stuxnet, jointly developed by the United States and Israel, was the first cyber weapon to cause physical destruction of industrial equipment. Targeting Iran’s Natanz uranium enrichment facility, the malware manipulated Siemens S7-300 PLCs controlling centrifuge motor speeds while feeding normal telemetry to operators—the digital equivalent of hijacking a plane while showing the pilot a false horizon. The weapon destroyed approximately 1,000 centrifuges, setting back Iran’s nuclear program by an estimated 1–2 years.
Stuxnet crossed what was presumed to be an air gap, delivered via USB drive through contractor networks. It demonstrated that physical isolation is not a defense when the human supply chain can be exploited. Every OT-targeted operation since has built upon the conceptual framework Stuxnet established: target the physical process, not the data.
4.2 Colonial Pipeline: Critical Infrastructure Fragility
The May 2021 Colonial Pipeline attack demonstrated how a single cybersecurity incident could paralyze critical infrastructure serving 5,500 miles of pipeline carrying 45% of the U.S. East Coast’s fuel supply. The DarkSide ransomware group’s $4.4 million ransom demand was paid, but the operational impact—fuel shortages, panic buying, military logistics disruption—far exceeded the monetary cost. Notably, the ransomware affected IT systems, not OT directly. Colonial Pipeline shut down OT operations voluntarily because it lacked visibility into whether the attack had spread—a decision that revealed the absence of IT/OT segmentation as clearly as any penetration test.
4.3 SolarWinds: Supply Chain as Attack Surface
The SolarWinds compromise, attributed to Russia’s SVR intelligence service, demonstrated supply chain attacks at unprecedented scale. By inserting malicious code into the Orion platform’s update mechanism, attackers gained access to approximately 18,000 organizations including the U.S. Treasury, Commerce Department, Department of Homeland Security, and portions of the Pentagon. The operation persisted undetected for approximately nine months, demonstrating that even the most security-conscious organizations can be compromised through trusted third-party software.
The Convergence Threat
The accelerating convergence of IT and OT environments represents the most significant structural shift in military infrastructure vulnerability. Driven by legitimate operational requirements—remote monitoring, predictive maintenance, data analytics—this convergence is systematically eliminating the security boundaries that once provided passive defense. The result is an attack surface that is expanding faster than defensive capabilities can adapt.
5.1 IT/OT Convergence
Industrial Internet of Things (IIoT) devices are proliferating across military-adjacent infrastructure, connecting previously isolated control systems to enterprise networks and, frequently, to the internet. Each connected sensor, actuator, or controller represents a potential pivot point from the IT domain—where adversaries are comfortable operating—to the OT domain where physical processes can be manipulated. The connectivity that enables operational efficiency simultaneously enables adversary access.
5.2 Supply Chain Complexity
The global manufacturing ecosystem for industrial control system components creates extensive foreign sourcing that national security considerations must address. China represents a particular concentration of concern, with foreign-manufactured components discovered in critical military energy systems. The SolarWinds and Volt Typhoon campaigns demonstrate that supply chain compromise is not a theoretical risk but an operational reality that adversaries are already exploiting at scale.
5.3 Regulatory Fragmentation
The cybersecurity governance landscape for critical infrastructure serving military installations is characterized by substantial fragmentation. Jurisdiction is distributed across multiple federal agencies (FERC, NERC, EPA, TSA, FCC), state governments, and local authorities in patterns that create significant coverage gaps. Water and wastewater systems represent perhaps the most acute regulatory gap following the EPA’s 2023 regulatory withdrawal, leaving municipal water systems serving military installations with effectively no federal cybersecurity requirements.
The Water Sector Gap
Following the EPA’s 2023 withdrawal of cybersecurity requirements for water systems, municipal water and wastewater utilities serving military installations operate with effectively zero federal cybersecurity mandates. This means the water consumed by military personnel, used for fire protection, and required for industrial processes on base depends on OT systems that may have no cybersecurity standards, no monitoring, and no incident response capability.
Testing Methodologies and Frameworks
6.1 Five-Phase Vulnerability Management
Effective vulnerability management for military OT systems requires a systematic five-phase approach that accommodates the unique constraints of operational technology environments. Unlike IT vulnerability management, OT assessment must explicitly account for safety-critical operations, availability requirements measured at 99.999%, and systems that cannot be taken offline for testing.
| Phase | Activity | OT-Specific Considerations |
|---|---|---|
| 1. Framing | Scope definition & risk context | Inside/outside fence delineation; safety boundaries |
| 2. Identification | Asset discovery & inventory | Passive monitoring required; active scanning risks |
| 3. Assessment | Risk scoring & prioritization | CVSS alone inadequate; operational context essential |
| 4. Remediation | Mitigation implementation | Direct patching often infeasible; compensating controls |
| 5. Verification | Control effectiveness validation | Operational validation; safety regression testing |
Table 6: Five-Phase OT Vulnerability Management Framework
6.2 Three-Tiered Military Approach
The military approach to OT security operates across three tiers. The strategic level encompasses policy development, standard establishment, resource allocation, and interagency coordination. The operational level includes campaign planning, contractor oversight, information sharing, and exercise coordination. The tactical level covers asset management, monitoring and detection, incident response, and operational integration.
6.3 OT-Specific Testing Techniques
Testing OT environments requires fundamentally different approaches than IT penetration testing. Passive network monitoring provides asset discovery and vulnerability assessment without scan-induced instability risks. Controlled fuzzing of OT protocols enables discovery of implementation vulnerabilities with appropriate safety constraints. Hardware-in-the-loop testing integrates actual control system hardware with simulated physical processes. Red team exercises in OT environments must incorporate physical process safety constraints that have no parallel in IT testing.
6.4 Open-Source Intelligence Assessment
The research methodology successfully employed open-source intelligence (OSINT) for military infrastructure dependency mapping, demonstrating that adversary-accessible reconnaissance capabilities can identify critical dependencies through government databases, corporate disclosure filings, technical documentation, and internet-connected device searches (Shodan, Censys). If researchers using publicly available tools can map these dependencies, nation-state intelligence services certainly already have.
Defense and Mitigation Strategies
7.1 Immediate Tactical Controls
The most urgent defensive priority is comprehensive asset inventory—you cannot protect what you cannot see. Implementation priorities include passive network monitoring deployment, physical inspection programs, documentation integration, and continuous discovery processes. Network segmentation must be layered across enterprise-OT boundaries, OT zone boundaries, system-level segments, and microsegmentation for legacy system accommodation.
The First Rule of OT Security
“It should begin, as all cybersecurity should begin, with an inventory of assets, inside and outside the fence.” Without knowing what OT devices exist, what protocols they use, and what connections they maintain, all subsequent security measures are built on assumption rather than evidence.
7.2 Procurement and Contract Reform
The research identifies procurement reform as the most flexible and most impactful leverage point for OT security improvement. Specific reforms include OT-specific cybersecurity clauses in all infrastructure contracts, adoption of ISA/IEC 62443 standards for industrial automation security, integration of NSA OT security control guidance, and supplier certification requirements spanning product, system, organizational, and continuous monitoring dimensions.
7.3 Architectural Resilience
Resilience architecture must address generation diversity (multiple fuel types), distribution redundancy (segregated circuits), islanding capability (ability to disconnect from compromised grids and operate independently), and diverse supply chains (multiple qualified vendors across geographic regions). Zero trust architecture principles must be adapted for OT environments: never trust, always verify; assume breach; and verify explicitly with device attestation.
7.4 Monitoring Solutions
Purpose-built OT monitoring platforms—Nozomi Networks, Claroty, Dragos—provide protocol-aware visibility that general IT security tools cannot deliver. These solutions understand ICS-specific protocols (Modbus, DNP3, OPC UA, EtherNet/IP) and can detect anomalous behavior patterns that indicate adversary presence without generating false positives from normal OT operations.
Implementation Roadmap and Strategic Recommendations
| Timeline | Priority Actions | Success Metrics |
|---|---|---|
| Near-Term (0–12 months) | • Installation-level asset inventory completion • Critical contractor cybersecurity assessment • OT compromise emergency response plans | 100% critical asset visibility; contractor risk baseline established |
| Medium-Term (1–3 years) | • Department-wide OT security standard publication • CMMC-OT program design and pilot • Red team exercise expansion to OT systems | Standards adopted; pilot results validated; OT red team cadence established |
| Long-Term (3–5 years) | • Resilient energy architecture deployment • Domestic critical manufacturing capability • Integrated IT-OT security operations center maturation | Energy independence for critical installations; supply chain risk reduced |
Table 7: Implementation Roadmap with Success Metrics
8.1 Senior Leadership Decision Framework
Senior leaders must make explicit risk acceptance decisions across four dimensions: mission-criticality assessment (how dependent is force projection on each infrastructure element?), cost-benefit analysis (what is the investment required relative to risk reduction achieved?), risk transfer mechanisms (can insurance or contractual structures shift residual risk?), and explicit risk acceptance (what vulnerabilities are acknowledged and accepted with contingency preparation?).
8.2 Governance and Accountability
Clear accountability chains must be established from Service Secretary policy implementation through Service Chief operational implementation to Component Commander tactical execution. Installation Commanders require defined operational control scope, security enforcement capabilities, and incident response authority. Contractor performance must be measured through security compliance metrics, operational performance tracking, and continuous improvement evaluation with enforcement mechanisms.
8.3 Congressional and Private Sector Engagement
Legislative engagement objectives include regulatory gap awareness, resource requirement articulation, and development of legislative authorization for a CMMC-OT program that extends contractor cybersecurity maturity requirements to operational technology environments. Private sector partnership must encompass infrastructure provider collaboration, technology vendor engagement, and security service provider integration with clearly defined value propositions and information sharing frameworks that serve both national security and commercial interests.
The Procurement Lever
Of all available policy interventions, procurement reform offers the most immediate impact. Every contract for infrastructure services supporting military installations is an opportunity to impose OT-specific cybersecurity requirements—asset inventory obligations, network monitoring mandates, incident reporting timelines, and supply chain security provisions. This requires no new legislation, no new agencies, and no new budgets. It requires only the will to include these clauses in contracts that are being written and renewed continuously.
Conclusion
The operational technology cybersecurity landscape facing U.S. military critical infrastructure represents a strategic vulnerability of the first order. The Department of Defense’s near-universal dependence on civilian-owned infrastructure creates an attack surface that adversaries—particularly China’s Volt Typhoon campaign—have already penetrated for pre-positioned disruption capability. The air gap is a myth. The regulatory framework is fragmented. The procurement system does not require OT cybersecurity from the contractors upon whom military readiness depends.
Yet the analysis also reveals that the most impactful interventions are among the most achievable. Procurement reform requires no new legislation. Asset inventory is a matter of organizational will, not technological breakthrough. Network segmentation and monitoring solutions exist commercially and are proven in industrial environments worldwide. The gap is not between what is needed and what is possible—the gap is between what is known and what is acted upon.
“The gap is not between what is needed and what is possible. The gap is between what is known and what is acted upon.”
The adversary is already inside. The question is not whether military-critical infrastructure will be targeted in a future conflict—it is whether the systems and processes will be in place to detect, contain, and recover from attacks that are being prepared today. Every month of inaction is a month of adversary preparation. The clock is not running down to zero. It may already be past midnight.
Document ID
JPANDA-2026-OTSEC-001
Version
1.0
Publication Date
2026-02-03
Classification
UNCLASSIFIED // FOR OFFICIAL USE ONLY
Review Date
2027-02-03
Point of Contact
JPanda Papers Editorial Board