Skip to content
Contact
JPanda Papers

Operational Technology Cybersecurity Vulnerabilities in Military Critical Infrastructure

Strategic Data Ops — A Comprehensive Assessment of OT/ICS/SCADA Attack Surfaces Across U.S. Military Installations

February 2026|JPANDA-2026-OTSEC-001|Unclassified // For Official Use Only

Key Findings at a Glance

4,800

U.S. Military Installations

85%

Infrastructure Outside-the-Fence

77%

Federal Energy Consumed by DoD

20–30 yr

OT System Lifecycle

18,000+

Orgs Compromised (SolarWinds)

$2B+

DPRK Crypto Theft

Strategic Warning

Nation-state adversaries have already pre-positioned within U.S. critical infrastructure supporting military installations. The presumed “air gap” protecting operational technology systems is a myth—professional security assessments consistently find magnitudes greater numbers of connections than system operators believe exist. Approximately 85% of infrastructure supporting military operations is owned and operated by civilian entities with minimal cybersecurity oversight.

01

Executive Summary

The United States military maintains approximately 4,800 installations across all 50 states, territories, and overseas locations. These installations exhibit near-universal dependence on civilian-provided infrastructure for essential operational capabilities—from electrical power and natural gas to water treatment and telecommunications. This dependency translates directly into operational technology (OT) system exposure, as the industrial control systems managing these services represent attack surfaces that adversaries have already demonstrated the capability and intent to exploit.

Research conducted by the Stanford Program on Geopolitics, Technology, and Governance in partnership with the Army Cyber Institute at West Point has systematically mapped these dependencies through open-source intelligence methodologies that replicate adversary reconnaissance capabilities with disturbing fidelity. The findings are unambiguous: the Department of Defense—the single largest energy consumer in the United States, accounting for approximately 77% of federal government energy consumption—depends on OT systems it neither owns nor controls, protected by cybersecurity standards that are fragmented, inadequate, or entirely absent.

Operational technology systems present fundamentally different cybersecurity challenges than information technology systems. Where IT prioritizes confidentiality, OT prioritizes availability and safety. Where IT systems cycle every 3–5 years, OT systems persist for 20–30 years with flat network architectures, implicit trust models, and authentication mechanisms that are often entirely absent. Patching cadences measured in months to years—compared to days or weeks for IT—create persistent windows of exploitation that adversaries have systematically catalogued.

“The benefits of internet connectivity are so great that it’s unavoidable. Professional security assessments will find connections, often magnitudes greater numbers of connections than the system operator thinks they have.”

The Volt Typhoon campaign—publicly attributed to Chinese PLA units by U.S. government agencies in 2023–2024—represents the most extensive documented penetration of U.S. critical infrastructure for potential disruption purposes, with specific targeting of infrastructure serving military installations. Russian and Iranian state-sponsored actors have demonstrated complementary capabilities, while the DPRK’s Lazarus Group has stolen over $2 billion in cryptocurrency, funding further offensive cyber development. These are not theoretical threats. They are documented, ongoing operations.

02

The OT Attack Surface in Military Operations

2.1 Critical Infrastructure Dependencies

Military installations depend on six critical infrastructure sectors, each managed by operational technology systems with distinct vulnerability profiles. The dependency structure spans electricity, natural gas, water, wastewater, freight rail, and telecommunications—virtually none of which the Department of Defense owns or directly controls.

SectorFunctionOwnershipOversight
ElectricityPower for all installation functionsInvestor-owned / municipal utilitiesFERC / NERC
Natural GasHeating, industrial processesInterstate pipelines / privateTSA / State PUCs
WaterPersonnel consumption, sanitationMunicipal utilitiesEPA / State
WastewaterSanitary waste treatmentMunicipal utilitiesEPA / State
Freight RailHeavy equipment movementClass I railroadsTSA
TelecomCommand and controlCommercial carriersFCC

Table 1: Critical Infrastructure Dependencies for Military Installations

2.2 The IT vs OT Security Gap

The distinction between operational technology and information technology extends far beyond nomenclature to encompass fundamentally different design philosophies, operational requirements, and security trade-offs. This gap creates a persistent and dangerous weakness in national defense posture that adversaries have systematically exploited.

DimensionInformation TechnologyOperational Technology
Primary ObjectiveConfidentiality, Integrity, AvailabilityAvailability, Safety, Reliability
Patching CadenceDays to weeks; automatedMonths to years; extensive testing
Technology Lifecycle3–5 years typical20–30 years; legacy persists
Network ArchitectureHierarchical with trust boundariesFlat, implicit trust
AuthenticationStandard, mandatoryOften absent; legacy protocols
Downtime ToleranceAcceptable for maintenanceOften unacceptable (99.999%)

Table 2: IT vs OT Security Model Comparison

2.3 The Air Gap Myth

A persistent and dangerous misconception pervades military cybersecurity planning: the assumption that critical OT systems benefit from “air gap” isolation. The empirical reality is that presumed air-gapped systems maintain numerous connectivity pathways that render isolation illusory. Modern OT environments incorporate internet-connected devices, contractor IT networks that serve as attack vectors, and foreign-manufactured components with undisclosed functionality.

Case Example: Marine Corps Battery Incident

The Marine Corps Base Camp Lejeune energy resilience project provides instructive illustration of how infrastructure hardening initiatives can inadvertently compound rather than reduce cybersecurity risk when supply chain security is inadequately addressed. Foreign-manufactured components, particularly from China, present specific security concerns given strategic competition, demonstrated capabilities for supply chain exploitation, and discovered instances of undisclosed functionality.

2.4 Inside-the-Fence vs Outside-the-Fence

Effective analysis of military OT cybersecurity vulnerabilities requires careful delineation of two distinct but interdependent risk domains. Outside-the-fence infrastructure encompasses approximately 85% of critical services supporting military installations—owned and operated by civilian entities with varying and often inadequate cybersecurity standards. Inside-the-fence infrastructure presents a different but equally complex risk profile, with legacy systems, contractor dependencies, and procurement gaps creating correlated vulnerability risk.

2.5 Supply Chain and Procurement Vulnerabilities

Military infrastructure dependencies frequently involve concentrated reliance on single contractors for critical services, creating systemic risk that contractor compromise or failure could have cascading mission impact. A central finding of the research is the absence of OT-specific cybersecurity requirements in contracts for infrastructure services—identified as the most flexible and most impactful leverage point for risk reduction.

CMMC Program Gaps

The Cybersecurity Maturity Model Certification (CMMC) program represents the Department of Defense’s most significant recent initiative for contractor cybersecurity improvement. Yet fundamental gaps in its applicability to operational technology environments create a misleading impression of comprehensive coverage. CMMC was designed for IT environments and does not address the unique characteristics of OT systems—legacy protocols, safety-critical operations, and extended lifecycles.

03

Adversary Threat Assessment

3.1 Nation-State Cyber Capabilities

Five nation-state actors maintain dedicated offensive cyber capabilities targeting operational technology and critical infrastructure. Their operations span peacetime intelligence collection, crisis-phase deterrence, and conflict-phase disruption—representing a spectrum of threat that the current defensive posture is inadequately configured to address.

NationPrimary GroupsKey OperationsStrategic Focus
United StatesEquation Group / TAOStuxnet (joint w/ Israel)Offensive disruption, intelligence collection
RussiaSandworm (GRU) / Fancy BearUkraine grid attacks (2015/2016), NotPetyaInfrastructure disruption, coercion
ChinaVolt Typhoon / APT groupsU.S. critical infrastructure pre-positioningConflict-phase disruption capability
DPRKLazarus Group$2B+ cryptocurrency theft, WannaCryFinancial operations, asymmetric disruption
IranAPT33 / APT34Shamoon, water treatment targetingRegional deterrence, retaliatory capability

Table 3: Nation-State OT Cyber Capabilities Comparison

3.2 Chinese PLA: Volt Typhoon

The Volt Typhoon campaign, publicly attributed by U.S. government agencies in 2023–2024, represents the most extensive documented penetration of U.S. critical infrastructure for potential disruption purposes, with specific targeting of infrastructure serving military installations. The campaign’s focus on pre-positioning—rather than immediate exploitation—indicates strategic investment in conflict-phase disruption capability, designed to delay or prevent effective U.S. force projection during a regional crisis.

3.3 Russian Operations: From Ukraine to Global Reach

Russian state-sponsored actors have demonstrated the most extensive operational track record in OT attacks. The GRU’s Sandworm unit executed the first confirmed cyberattacks against civilian electrical infrastructure—shutting down portions of Ukraine’s power grid in December 2015, affecting approximately 225,000 customers, and launching a more sophisticated attack against Kyiv’s transmission system in December 2016. These operations provided proof of concept for capabilities that could be directed against any nation’s grid infrastructure.

NotPetya: The $10 Billion “Ransomware”

The 2017 NotPetya attack, attributed to Russian GRU, demonstrated how a cyber weapon designed for one target—Ukraine—could cascade globally, causing over $10 billion in damages across multinational corporations including Maersk, Merck, and FedEx. The attack masqueraded as ransomware but was in fact a destructive weapon with no recovery mechanism. It remains the most economically damaging cyberattack in history.

3.4 Attack Vectors and Techniques

Contractor networks provide the predominant initial access vector for adversary campaigns targeting military infrastructure dependencies, exploiting trust relationships and technical access that maintenance and support functions require. Once initial access is achieved, lateral movement from IT to OT environments exploits the connectivity that undermines air gap assumptions. The ultimate objective is frequently physical process manipulation—disruption, degradation, or destruction of infrastructure function through cyber-enabled control system exploitation.

3.5 Strategic Objectives Across the Conflict Spectrum

PhaseObjectiveActivity
PeacetimeIntelligence CollectionNetwork mapping, vulnerability cataloguing, access maintenance
CrisisDeterrence & CoercionDemonstrated or threatened disruption to influence U.S. response options
ConflictForce Projection DisruptionDelay or prevent military deployment through infrastructure degradation

Table 4: Adversary Strategic Objectives Across the Conflict Spectrum

04

Case Studies in OT Warfare

The history of OT-targeted cyber operations provides empirical evidence of capabilities that are frequently dismissed as theoretical. Each case study below demonstrates escalating sophistication, expanding scope, and increasing willingness to target civilian infrastructure for strategic effect.

YearOperationAttributionImpact
2010StuxnetUS / Israel~1,000 Iranian centrifuges destroyed
2015Ukraine Grid Attack IRussia (Sandworm)225,000 customers without power
2016Ukraine Grid Attack IIRussia (Sandworm)Kyiv transmission system disrupted
2017NotPetyaRussia (GRU)$10B+ global damages
2020SolarWindsRussia (SVR)18,000 organizations compromised
2021Colonial PipelineDarkSide (criminal)5,500 mi pipeline shut down; $4.4M ransom
2023–24Volt TyphoonChina (PLA)U.S. critical infrastructure pre-positioning

Table 5: Major OT Cyber Operations Timeline

4.1 Stuxnet: The Weapon That Changed Everything

Stuxnet, jointly developed by the United States and Israel, was the first cyber weapon to cause physical destruction of industrial equipment. Targeting Iran’s Natanz uranium enrichment facility, the malware manipulated Siemens S7-300 PLCs controlling centrifuge motor speeds while feeding normal telemetry to operators—the digital equivalent of hijacking a plane while showing the pilot a false horizon. The weapon destroyed approximately 1,000 centrifuges, setting back Iran’s nuclear program by an estimated 1–2 years.

Stuxnet crossed what was presumed to be an air gap, delivered via USB drive through contractor networks. It demonstrated that physical isolation is not a defense when the human supply chain can be exploited. Every OT-targeted operation since has built upon the conceptual framework Stuxnet established: target the physical process, not the data.

4.2 Colonial Pipeline: Critical Infrastructure Fragility

The May 2021 Colonial Pipeline attack demonstrated how a single cybersecurity incident could paralyze critical infrastructure serving 5,500 miles of pipeline carrying 45% of the U.S. East Coast’s fuel supply. The DarkSide ransomware group’s $4.4 million ransom demand was paid, but the operational impact—fuel shortages, panic buying, military logistics disruption—far exceeded the monetary cost. Notably, the ransomware affected IT systems, not OT directly. Colonial Pipeline shut down OT operations voluntarily because it lacked visibility into whether the attack had spread—a decision that revealed the absence of IT/OT segmentation as clearly as any penetration test.

4.3 SolarWinds: Supply Chain as Attack Surface

The SolarWinds compromise, attributed to Russia’s SVR intelligence service, demonstrated supply chain attacks at unprecedented scale. By inserting malicious code into the Orion platform’s update mechanism, attackers gained access to approximately 18,000 organizations including the U.S. Treasury, Commerce Department, Department of Homeland Security, and portions of the Pentagon. The operation persisted undetected for approximately nine months, demonstrating that even the most security-conscious organizations can be compromised through trusted third-party software.

05

The Convergence Threat

The accelerating convergence of IT and OT environments represents the most significant structural shift in military infrastructure vulnerability. Driven by legitimate operational requirements—remote monitoring, predictive maintenance, data analytics—this convergence is systematically eliminating the security boundaries that once provided passive defense. The result is an attack surface that is expanding faster than defensive capabilities can adapt.

5.1 IT/OT Convergence

Industrial Internet of Things (IIoT) devices are proliferating across military-adjacent infrastructure, connecting previously isolated control systems to enterprise networks and, frequently, to the internet. Each connected sensor, actuator, or controller represents a potential pivot point from the IT domain—where adversaries are comfortable operating—to the OT domain where physical processes can be manipulated. The connectivity that enables operational efficiency simultaneously enables adversary access.

5.2 Supply Chain Complexity

The global manufacturing ecosystem for industrial control system components creates extensive foreign sourcing that national security considerations must address. China represents a particular concentration of concern, with foreign-manufactured components discovered in critical military energy systems. The SolarWinds and Volt Typhoon campaigns demonstrate that supply chain compromise is not a theoretical risk but an operational reality that adversaries are already exploiting at scale.

5.3 Regulatory Fragmentation

The cybersecurity governance landscape for critical infrastructure serving military installations is characterized by substantial fragmentation. Jurisdiction is distributed across multiple federal agencies (FERC, NERC, EPA, TSA, FCC), state governments, and local authorities in patterns that create significant coverage gaps. Water and wastewater systems represent perhaps the most acute regulatory gap following the EPA’s 2023 regulatory withdrawal, leaving municipal water systems serving military installations with effectively no federal cybersecurity requirements.

The Water Sector Gap

Following the EPA’s 2023 withdrawal of cybersecurity requirements for water systems, municipal water and wastewater utilities serving military installations operate with effectively zero federal cybersecurity mandates. This means the water consumed by military personnel, used for fire protection, and required for industrial processes on base depends on OT systems that may have no cybersecurity standards, no monitoring, and no incident response capability.

06

Testing Methodologies and Frameworks

6.1 Five-Phase Vulnerability Management

Effective vulnerability management for military OT systems requires a systematic five-phase approach that accommodates the unique constraints of operational technology environments. Unlike IT vulnerability management, OT assessment must explicitly account for safety-critical operations, availability requirements measured at 99.999%, and systems that cannot be taken offline for testing.

PhaseActivityOT-Specific Considerations
1. FramingScope definition & risk contextInside/outside fence delineation; safety boundaries
2. IdentificationAsset discovery & inventoryPassive monitoring required; active scanning risks
3. AssessmentRisk scoring & prioritizationCVSS alone inadequate; operational context essential
4. RemediationMitigation implementationDirect patching often infeasible; compensating controls
5. VerificationControl effectiveness validationOperational validation; safety regression testing

Table 6: Five-Phase OT Vulnerability Management Framework

6.2 Three-Tiered Military Approach

The military approach to OT security operates across three tiers. The strategic level encompasses policy development, standard establishment, resource allocation, and interagency coordination. The operational level includes campaign planning, contractor oversight, information sharing, and exercise coordination. The tactical level covers asset management, monitoring and detection, incident response, and operational integration.

6.3 OT-Specific Testing Techniques

Testing OT environments requires fundamentally different approaches than IT penetration testing. Passive network monitoring provides asset discovery and vulnerability assessment without scan-induced instability risks. Controlled fuzzing of OT protocols enables discovery of implementation vulnerabilities with appropriate safety constraints. Hardware-in-the-loop testing integrates actual control system hardware with simulated physical processes. Red team exercises in OT environments must incorporate physical process safety constraints that have no parallel in IT testing.

6.4 Open-Source Intelligence Assessment

The research methodology successfully employed open-source intelligence (OSINT) for military infrastructure dependency mapping, demonstrating that adversary-accessible reconnaissance capabilities can identify critical dependencies through government databases, corporate disclosure filings, technical documentation, and internet-connected device searches (Shodan, Censys). If researchers using publicly available tools can map these dependencies, nation-state intelligence services certainly already have.

07

Defense and Mitigation Strategies

7.1 Immediate Tactical Controls

The most urgent defensive priority is comprehensive asset inventory—you cannot protect what you cannot see. Implementation priorities include passive network monitoring deployment, physical inspection programs, documentation integration, and continuous discovery processes. Network segmentation must be layered across enterprise-OT boundaries, OT zone boundaries, system-level segments, and microsegmentation for legacy system accommodation.

The First Rule of OT Security

“It should begin, as all cybersecurity should begin, with an inventory of assets, inside and outside the fence.” Without knowing what OT devices exist, what protocols they use, and what connections they maintain, all subsequent security measures are built on assumption rather than evidence.

7.2 Procurement and Contract Reform

The research identifies procurement reform as the most flexible and most impactful leverage point for OT security improvement. Specific reforms include OT-specific cybersecurity clauses in all infrastructure contracts, adoption of ISA/IEC 62443 standards for industrial automation security, integration of NSA OT security control guidance, and supplier certification requirements spanning product, system, organizational, and continuous monitoring dimensions.

7.3 Architectural Resilience

Resilience architecture must address generation diversity (multiple fuel types), distribution redundancy (segregated circuits), islanding capability (ability to disconnect from compromised grids and operate independently), and diverse supply chains (multiple qualified vendors across geographic regions). Zero trust architecture principles must be adapted for OT environments: never trust, always verify; assume breach; and verify explicitly with device attestation.

7.4 Monitoring Solutions

Purpose-built OT monitoring platforms—Nozomi Networks, Claroty, Dragos—provide protocol-aware visibility that general IT security tools cannot deliver. These solutions understand ICS-specific protocols (Modbus, DNP3, OPC UA, EtherNet/IP) and can detect anomalous behavior patterns that indicate adversary presence without generating false positives from normal OT operations.

08

Implementation Roadmap and Strategic Recommendations

TimelinePriority ActionsSuccess Metrics
Near-Term
(0–12 months)
• Installation-level asset inventory completion
• Critical contractor cybersecurity assessment
• OT compromise emergency response plans
100% critical asset visibility; contractor risk baseline established
Medium-Term
(1–3 years)
• Department-wide OT security standard publication
• CMMC-OT program design and pilot
• Red team exercise expansion to OT systems
Standards adopted; pilot results validated; OT red team cadence established
Long-Term
(3–5 years)
• Resilient energy architecture deployment
• Domestic critical manufacturing capability
• Integrated IT-OT security operations center maturation
Energy independence for critical installations; supply chain risk reduced

Table 7: Implementation Roadmap with Success Metrics

8.1 Senior Leadership Decision Framework

Senior leaders must make explicit risk acceptance decisions across four dimensions: mission-criticality assessment (how dependent is force projection on each infrastructure element?), cost-benefit analysis (what is the investment required relative to risk reduction achieved?), risk transfer mechanisms (can insurance or contractual structures shift residual risk?), and explicit risk acceptance (what vulnerabilities are acknowledged and accepted with contingency preparation?).

8.2 Governance and Accountability

Clear accountability chains must be established from Service Secretary policy implementation through Service Chief operational implementation to Component Commander tactical execution. Installation Commanders require defined operational control scope, security enforcement capabilities, and incident response authority. Contractor performance must be measured through security compliance metrics, operational performance tracking, and continuous improvement evaluation with enforcement mechanisms.

8.3 Congressional and Private Sector Engagement

Legislative engagement objectives include regulatory gap awareness, resource requirement articulation, and development of legislative authorization for a CMMC-OT program that extends contractor cybersecurity maturity requirements to operational technology environments. Private sector partnership must encompass infrastructure provider collaboration, technology vendor engagement, and security service provider integration with clearly defined value propositions and information sharing frameworks that serve both national security and commercial interests.

The Procurement Lever

Of all available policy interventions, procurement reform offers the most immediate impact. Every contract for infrastructure services supporting military installations is an opportunity to impose OT-specific cybersecurity requirements—asset inventory obligations, network monitoring mandates, incident reporting timelines, and supply chain security provisions. This requires no new legislation, no new agencies, and no new budgets. It requires only the will to include these clauses in contracts that are being written and renewed continuously.

Conclusion

The operational technology cybersecurity landscape facing U.S. military critical infrastructure represents a strategic vulnerability of the first order. The Department of Defense’s near-universal dependence on civilian-owned infrastructure creates an attack surface that adversaries—particularly China’s Volt Typhoon campaign—have already penetrated for pre-positioned disruption capability. The air gap is a myth. The regulatory framework is fragmented. The procurement system does not require OT cybersecurity from the contractors upon whom military readiness depends.

Yet the analysis also reveals that the most impactful interventions are among the most achievable. Procurement reform requires no new legislation. Asset inventory is a matter of organizational will, not technological breakthrough. Network segmentation and monitoring solutions exist commercially and are proven in industrial environments worldwide. The gap is not between what is needed and what is possible—the gap is between what is known and what is acted upon.

“The gap is not between what is needed and what is possible. The gap is between what is known and what is acted upon.”

The adversary is already inside. The question is not whether military-critical infrastructure will be targeted in a future conflict—it is whether the systems and processes will be in place to detect, contain, and recover from attacks that are being prepared today. Every month of inaction is a month of adversary preparation. The clock is not running down to zero. It may already be past midnight.

Document ID

JPANDA-2026-OTSEC-001

Version

1.0

Publication Date

2026-02-03

Classification

UNCLASSIFIED // FOR OFFICIAL USE ONLY

Review Date

2027-02-03

Point of Contact

JPanda Papers Editorial Board