Cybersecurity & Tech Executive Branch

Lawfare Daily: Grading the Trump Administration's Cybersecurity Efforts, with Rear Admiral (Ret.) Mark Montgomery

Jonathan G. Cedarbaum, Mark Montgomery, Jen Patja
Monday, December 1, 2025, 7:00 AM
How has the federal government strengthened the United States' cybersecurity posture?

Rear Admiral (Ret.) Mark Montgomery is the Senior Director of the Center on Cyber and Technology Innovation at the Foundation for Defense of Democracies. He spent 32 years in the Navy as a nuclear-trained surface warfare officer, retiring as a rear admiral in 2017. After leaving the Navy, Admiral Montgomery worked as policy director for the Senate Armed Services Committee during Senator John McCain's chairmanship, and as Executive Director of the Cyberspace Solarium Commission, a congressionally created commission directed to “develop a consensus on a strategic approach to defending the United States in cyberspace against cyber attacks of significant consequences.” 

In this episode, Lawfare Book Review Editor Jonathan Cedarbaum sits down with Admiral Montgomery to discuss the fifth annual implementation report prepared by the Cyberspace Solarium Commission 2.0, which assesses how the federal government has done over the last year in implementing the Solarium Commission's recommendations for strengthening the United States' cybersecurity posture. The report, whose lead author was Admiral Montgomery, concludes that "[o]ur nation’s ability to protect itself and its allies from cyber threats is stalling and, in several areas, slipping." 

They discuss the scope and impacts of the Trump administration funding and staffing cuts in leading agencies responsible for cybersecurity; the weakening of public-private collaboration, including the closing of the Critical Infrastructure Partnership Advisory Council; and the weakening of recruitment efforts to build the cyber workforce the country needs.

To receive ad-free podcasts, become a Lawfare Material Supporter at www.patreon.com/lawfare. You can also support Lawfare by making a one-time donation at https://givebutter.com/lawfare-institute.

Click the button below to view a transcript of this podcast. Please note that the transcript was auto-generated and may contain errors.

 

Transcript

[Intro]

Mark Montgomery: Particularly in the workforce, or needs a workforce to execute it, that's where you saw the degradation, the slippage, where we changed our assessment of where the government stood.

Jonathan Cedarbaum: It's the Lawfare Podcast. I'm Jonathan Cedarbaum, Lawfare’s book review editor, with Ret. Rear Admiral Mark Montgomery, who is senior director of the Center on Cyber and Technology Innovation at the Foundation for Defense of Democracies.

Mark Montgomery: From my point of view, these things are small but important, and they add up to a very important element of U.S. foreign policy that is kind of in tatters right now. No one nominated to lead anything, people leaving left and right because there's no––you don't know what the final organization's going to be like.

You know, this was an absolute own goal.

[Main episode]

Jonathan Cedarbaum: Today we're talking about the 2025 Annual Report on Implementation produced by the Cyberspace Solarium Commission 2.0.

Before we get into your recent annual implementation report, I wondered if you could just remind our listeners about the work of the Solarium Commission in its original form and some of its overarching or key conclusions.

Mark Montgomery: Yeah, thanks.

So the Solarium Commission was set up in 2018 in the National Offense Authorization Act that then allowed us to start the commission in March of 2019.

There was going to be a three-year commission, about $4 million, I'll say, right up front. We finished on time and under budget. You don't hear that every day in the government. But mostly because we had Senator Angus King as our chairman and Representative Mike Gallagher as our chairman from the House. So you had one Democrat––or one independent with the Democrats––one Republican.

We also had a really important member named Jim Langevin from the House, who, if you study cyber and legislation at all, you know that over the last 25 years, he's responsible for probably 50% of the legislation that's gotten done. He's now retired. He was from Rhode Island as a Democrat.

Anyway, so with that group and with legislators, U.S. government members like deputy secretary of defense, deputy secretary of homeland security, director of FBI––by the way, potentially not a completely legal commission, and we can talk about that some other time––and then some private sector personnel as well. Former government, private sector, including the CEO of Southern Company, Tom Fanning. So good mix.

We went out there. We spent one sharp year studying the problem. And the problem was, as Senator McCain kind of articulated it when he signed off on the commission, was, we need to come up with a strategy to ensure that America's critical infrastructure stays secure in cyberspace, with the implication being that it wasn't at that time.

And Senator McCain was correct. Whether you're looking at criminal actors or nation state actors, we were not secure in 2018. I would say we are not secure today. But his idea was, Hey, go come with a strategic approach so we can at least start getting the government aligned.

And he had a suspicion that the government didn't have a proper quarterback, a few other––that, you know, to use his terminology, we weren't properly organized to lead and win. And, you know, over one year we studied this issue, came up with some significant findings that they'll basically, you know, number one was the government wasn't properly organized.

Number two was, the private sector was responsible for a whole lot of secure––you know, the cyberspace, this is different than say undersea warfare, where Russian submarines––the problem of Russian submarines was not a problem for Southern Company, you know, a power company. It was a problem for the U.S. Navy. It was a problem for the government, and so it was fundamentally different than in cyberspace.

Cyberspace was a different mission area where the battle space, so to speak, was 85% owned and operated by the private sector or state and local governments, not the Department of Defense.

And the third probably that we had not developed the public-private collaboration to work through that problem of a tough threat problem not owned by the government owned by the private sector that wasn't investing enough, and then a government that wasn't helping enough.

So that's the point. That was kind of our conclusions, from which we drove a whole lot of legislative and executive branch recommendations.

Jonathan Cedarbaum: Excellent. Thank you for that overview. I remember that one of the central themes of the commission's report was that we needed, in the United States, a strategy of, quote, “layered cyber deterrence.” What did that notion mean, “layered cyber deterrence,” that we had been missing?

Mark Montgomery: You know, that's a great, yeah, it's a good terminology. It's––and we had a two really smart cyber strategists, Dr. Erica Lonergan who's at Columbia now, but at the time was at West Point and was seconded over to the Commissioner of Work, and a second was, we hired Dr. Ben Jensen, who is the lead professor at Marine Corps University on cyber and cognitive warfare kind of issues. And, in addition, a colonel in the U.S. Army Irregular Warfare program.

So, you know, we had two very strong thinkers. They've both written extensively, published extensively on the issue and we collectively came up with the idea of layered cyber deterrence.

I have to say Senator King, he wouldn't like me calling him this, but he was kind of like a broken record, in the sense that he's like, we are not deterring in cyberspace. In fact, if you go to a hearing today, five years later, he would invariably say––as I've said for the last five years since I was on the Cyberspace, Cyber Commission––we are not equipped to deter the adversary in cyberspace. We are not preventing them from taking the actions they want to take, beneath a certain level of warfare.

So, the idea of layered cyber deterrence was that you actually had, and Joe Nye wrote on this––and Joe Nye, a pretty famous soft power strategist at Harvard and in the Department of Defense who coined the term soft power. Recently passed away, but he wrote some op-eds on cyber, in fact, that were very consistent with our definition of layered cyber deterrence.

And what it really means is that if you're going to deter someone in cyberspace, you have to use all the elements of national power. You have to engage them in all the different types of deterrence. So deterrence by entanglement, that's where you try to use law enforcement sanctions, legal regimes, international negotiations, deterrence by denial, which is kind of the one we most think about, which is––I'll defend myself to such a degree.

It's not, it's too expensive or not that, you know, not effective for you to strike me. Or, the third one, deterrence by cost and position. Sometimes it's called punishment. But in either case, it's the idea that I'm going to punch you back in the nose so hard that you determine this is not a habit you want to continue. And so––or an attribute you want to continue.

So layered cyber deterrence says you have to work across all three of these in order to build the public-private collaboration that's necessary to deter an adversary in cyberspace.

Jonathan Cedarbaum: Very good.

So with that background on the commission's initial work, let's turn to your most recent implementation report released just a few weeks ago, which I gather was the fifth in a series of these annual reports.

For this most recent one, what would you identify as your most important, you know, two or three findings?

Mark Montgomery: Well, I think the first and foremost finding is that—and I just read it to make sure I get it exactly right—we said right up front, our nation's ability to protect itself and its allies from cyber threats is stalling, and in some cases even slipping.

That's a tough thing to say, because for the last four years we've been saying things are getting better.

Now, I will say, I would always caveat that in an administration change, particularly when you change parties, there's always a three- to five-month perturbation in policy development.

It's unavoidable. I get it. Cabinet member––like the secdef or secretary of state, they're confirmed in the first week of administration.

But you know, there's a lot of ligature, there's a lot of assistant secretaries and undersecretaries and such that don't get, deputy secretaries that don't get confirmed for months or even a year.

And this is party-agnostic: no matter who's the presidency, who's got the Senate, there's delays. And sometimes the underlings to that––the deputy assistant secretary in the GS-15, the Schedule C, which is political appointee, GS-15s underneath that are sometimes delayed while we, quote, wait for the guy to make his––or the man or woman to make their––choice.

You know, frustrating. So I understand there's three or four months.

But we are writing this eight months into it. They're publishing it in, you know, in late September, you know, writing it basically in August, the final parts of it. And I, and our final assessments are around––I think our cutoff time was August 31st.

I'll just say this was beyond the normal. Three or four months perturbation. There was slippage and there was obvious reasons for the slippage.

Jonathan Cedarbaum: Let's take those up a little bit, one by one. So what are some of the important respects in which you and your colleagues concluded that there has been this stalling and slippage?

Mark Montgomery: You know, I think the first one was cyber workforce.

I mean, I'll take one agency, the cybersecurity, infrastructure security agency, our civilian cyber defense agency. Developed, you know, before the commission, put into law in like 2016, 2017 at the beginning of the first Trump administration––and Chris Krebs was the first director, and then Jen Easterly was the director for four years of the Biden administration––but heavily supported by our report. Our report gave 10 different areas to support it with authorities changes and appropriations changes, and eight of those 10 were done.

I mean, we did significant assistance, created organizations within it, put lots of it in law that just wasn't in law before. It was just in practice. And that's always dangerous to not be in law.

And then the appropriations were then raised between 2019 and 2024, from $1.3 billion to almost $3 billion.

And by the way, John Katko, Republican from New York, was on record of saying it's probably a $5 billion organization when done right. And that's in 2022 numbers.

So, it still hadn't fully grown into itself. This administration came right in and cut that. And so, to me, manpower was one of the most important issues.

And then the authorities to operate and exchange information, I––this was not on my bingo card of stuff they might accidentally remove. I'm still of the opinion that was an accident.

And most administrations have trouble admitting a mistake. I, I get it. This administration, you know, has a PhD in that characteristic. And so as a result they're like ‘no, this was all on purpose, we have a master plan and you know, we're eight months into the master plan.’ And I don't see it.

So I saw things like that. So in my mind there was––look, there were some good things as well, but some bad things.

But if I could, I'd just start by saying those were our general findings, was that particularly in the workforce, or needs a workforce to execute it, that's where you saw the degradation, the slippage, where we changed our assessment of where the government stood.

Jonathan Cedarbaum: Were there examples of that outside of CISA?

Mark Montgomery: Yeah, so for––I gotta say one thing about CISA.

It shocks me. There's a temporary leader, says––look, the Senate owes the government, the executive branch, the confirmation of Sean Plankey, the CISA director. He's being held up over the provision of a report from the last administration, demanded by, mostly by Democratic senators, and I, and my––I'm just like, come on guys, just let it go.

I mean, let the guy get a––I want to criticize him for not doing the right thing. It's hard to criticize them when they're kind of rudderless without a leader.

But the acting leader said something along the lines of this, like, we've lost––we've gone from 3,300 to 2,200, no appreciable change in our ability to our job.

And I'll just say, gently, that in 35 years of leading a whole lot of military organizations, many of which were bigger than CISA, no leader ever came up to me and said, sir, the key to my success is cutting one third of my workforce, you know, randomly.

You know, come on. And especially the way they did it, they took away the probationary employees, the seed corn of your future, develop-, you know, leadership.

And they took away, they accelerated the departure of senior leaders through early retirements and fork in the road. Boy, talk about how I would not remove one third of my personnel. That's the opposite of the right––I mean, I wouldn't really just take it off in the middle, but I take most of it from the middle part of the workforce.

Instead, they went to the top and bottom of it. Really poorly done.

So I say, I just need to say that––and look, there's other examples. NIST, which is a National Institute of Standards and Technology at the Department of Commerce, we assessed it in 2020 as about $120 million organization in terms of, of workload with an $80 million budget.

And neither the Trump 45 nor Biden truly corrected the budget, but they did get it up to about 100 to 110 million on cybersecurity. This is just the cybersecurity part.

Unfortunately, every executive order put out at the end of Trump 45, or all of the Biden administration would say, ‘and NIST, go do this.’

And let me tell you how much money is attached to an executive order: zero.

So the reality is, they'd become like $160 million worth of assignments, and had about a hundred million dollars. So the Trump 47 rolls in on this already stressed and strained organization. One that, by the way, had stuck it to the Biden administration in early 2024 by stopping funding some national vulnerability database work to say, ‘this is how bad our funding is. We will make it something that's public and embarrassing.’

Which I thought was a pretty, you know, ballsy move by NIST. And they got their money from Biden's OMB to fix that. So they're under stress, under duress. And then comes DOGE and you know, the Department of Commerce. And they just start cutting within that.

And, you know, both in the budget appropriations and the personnel, this is––so, taking an organization that's critical to cybersecurity standards, regulate, you know, not just really regulation, but cybersecurity standards, education, understanding in the government and in the private sector, and kicking it in the backside a few extra times is, was not a good move.

So that's a second one. I'm––there's more, but I think that gets the point across.

Jonathan Cedarbaum: Very good. Okay. So as you say, I gather, one of the central concerns in this most recent report is budget cuts and staffing cuts at a number of the departments or agencies that play an important role in U.S. cybersecurity policy and U.S. cybersecurity defense and resilience.

Were there other major concerns beyond the staffing and budget cuts?

Mark Montgomery: So, in State Department we had set up something called the cybersecurity and the––

Jonathan Cedarbaum: The ambassador-at-large ambassador for cyberspace and digital diplomacy, I believe.

Mark Montgomery: Yeah, cyberspace and digital diplomacy. It was a bureau there, to work, and it was underneath the deputy.

Every time you do legislation, you have the perfect legislation and you have the legislation you get. And there's a series of compromises you have to do to get things through.

And one of the compromises was, and this was a problem we had with the Biden team, they wanted––they didn't like putting it under the deputy.

I felt it needed to hang for some period of time, five or seven years outside of the normal hierarchy. I would say State Department––you know, I've lived in Department of Defense, which has some parochialism to it, but––

Jonathan Cedarbaum: So I've heard.

Mark Montgomery: The State Department is Olympic gold medal-winning, you know, world record-setting parochial, you know, siloed bureaus.

And so I was afraid to get and this administration came in. And here's the killer: as they're breaking it, reorganizing the State Department––because it obviously couldn't be right, because it was done by Biden––you know, they're breaking up the State Department. The guys come into the––I know for a fact that came into the cyber digital policy office and started to show what they're going to do.

And the per––one of the people they're interviewing said, you know, there's a law about this called the Cyber Diplomacy Act. And the person was unaware of it.

You know, so they're reorganizing it without even reading basic law. And they reorganized it in violation of the law. By the way, a law that Senator Rubio aggressively supported before he became Secretary of State.

And so his own guys came in, unaware of the law––and they weren't his guys, in my opinion, they were probably White House guys. But, you know, in State Department and they did this.

And so it's, I mean, it's mildly––I'm not insulted by this easily, or I'd be insulted all the time, but it's kind of insulting that you reorganize something without reading the law.

We are a nation of laws. I mean, I believe we're a nation of laws. And you probably, and you literally––this wasn't a law, like, you know, that reorganization from 1862 is a little old. This was a reorganization from 2023.

I mean, come on. You took the maximum time to implement it. So it was really, fully––I mean, the law was 2021, to be implemented by 2023.

You know, it had been in effect for two years. Have a little bit of due diligence and, you know, find that out. But okay, they didn't. And then Senator Rubio, when confronted by Senator King who talked to him and said, what's up? You know, basically was, you know, mildly denied.

You know, he was aware that he had been part of the law.

You know, I mean, this is not helpful. It's not how you run government. And now we're in a position where the administra-, you know, Republicans in the House are trying to, you know, clean up the spill on aisle three, you know, by writing legislation that kind of supports what the administration's doing.

And you know, the rest of us are like, well, I would like it to work. But on the other hand, I'd like you to just follow the damn law. Which you just passed, and you guys supported, the Secretary of State supported, before he didn't support it.

So I'm a little frustrated. That one's bad. Now here's why that's bad: it's not just, like, someone to talk to for our partners and allies. That's important. But we do need some cyber capacity building. Like when our forces move with and through a country, we want the cyber to be secure for our military forces.

So that matters. Cyber capacity-building and very specific––even in a Make America Great thought process, you want our forces to do well. There's standards-setting, like the State Department kind of leads our participation in international standards-setting of things like the International Telecommunication Union and the World Intellectual Property Organization.

You know, we don't get the right––if China's working very aggressive those places to get a China-centric solution in place, one that doesn't believe in personal rights and responsibilities and privacy, one that's focused purely on sovereignty––which is, you know, coded language for authoritarian control.

So from my point of view, these things are small but important. And they add up to a very important element of U.S. foreign policy that is kind of in tatters right now. No one nominated to lead anything, people leaving left and right because there's no––you don't know what the final organization's going to be like.

You know, this was an absolute own goal.

Jonathan Cedarbaum: We've talked about a number of the critical elements in the report––that is, ways in which the report has been critical of the Trump administration's early moves. Does the report identify any initiatives by the new administration that it considers beneficial?

Perhaps some, in some cases, carrying forward efforts that had already been underway before it came in?

Mark Montgomery: Yeah. This is a tough yes.

So there's a little bit in there. So look, I like the idea––in their first executive order, they emphasized the importance of state and local governments. Look, I've lost my confidence in top-down, regulation-driven solutions for some industries.

Look, Americans like regulation on nuclear power. They prefer something not go really wrong in 'em. They're pretty cool on regulation, on flight safety. They don't want to fall out the sky. They're pretty cool about regulation about their money, so that it stays in their bank account.

After that, the list gets tougher. So trying to force in like water regulation at the top that comes down––especially, you know the difference between New York City water, L.A. water, and like, Fauquier County Rural Collective Number 7’s water utility. There are big differences there.

So I get that water probably has to be the bottom-up or ground-up, no pun intended. And to do that you really need state and local empowered to do that. You know, understand––provide 'em with standards, and then incentivize through grant program support.

Now, look, I'm not talking about a grant program for a Fortune 50 company. I'm talking about a grant program for rural collective number seven, you know, in Fauquier County, right? Which is, you know, doesn't have two root wood nickels to rub together for this threat.

So if we could help them out with a grant program where they meet, they assess themselves to a government standard, show the gaps, and then use an approved solution that we help fund.

To me, that's how you get at this. And it should make Republicans happy. Democrats should be happy with the end result. You know, I think ev-, it's a winner-winner. So he says that, and you're like, ah, good. I like this.

Of course, the next thing that happens is the administration does nothing to prevent the state and local cybersecurity grant program from expiring. Now, in the CR, the House Republicans––and the Senate Republicans did add it in, it's reauthorized through like January of 2026.

But long-term, you're going to have to reauthorize and appropriate to that. In other words, the next step is to have grant programs that incentivize this.

Believe it or not, the energy, rural energy does have some grant programs. There's some areas where you see congressional committees have shown an interest, or maybe the federal agency showed an interest, and we're doing all right.

In general, I would tell you there's three sectors that I don't lose sleep over at night: financial services, energy, and the defense-industrial base. There's 17 or 18––depending on, you count 'em, 17, 18, 19 sectors.

So that does leave a lot of F's, you know, in the programmatics, water being one of them.

And so I like the fact that the Trump administration recognized, hey, this is a state and local solution. I also like that they have kind of put the NSC and the N––the National Security Council Cybersecurity Directorate, focused on offensive operations, on international partnership, and I like that.

And then told the National Cyber Director, you're really responsible. You're the lead for the National Cyber Defense, which makes sense from the name of your office. And, you know, that was our intent.

We'll see how that plays out over the next 40 months. But I will tell you, good intent there. So there's two pretty big areas I would say the administration's done, you know, stepped off on the right foot.

The problem is, when you're assessing them, they haven't produced yet. What I'd say is they've drawn a line in the right direction. We'll have to see if they resource and move along that track. And then next year, they'll be good grades.

And I would say right now it's equally likely that they have good grades, as bad grades next year, because this perturbation is over. I think the personnel perturbation is over.

I, you know, there's something involved with the coming out of the standdown, and the people that were supposedly RIFed during the standdown, coming back, that would be good.

But they've got to get in––they're gonna get appropriations that well exceed their current manpower, right.

CISA will get, you know, probably $2.7 billion. They'll have more than enough money for the people they have and money to hire more. And hopefully a new director will come in and do that.

So there's hope, there's potential. But those are two areas where they, I can actually see them pointing themselves in the right direction.

Jonathan Cedarbaum: Excellent. So we've been talking about findings in your, you know, most recent report, both critical and potentially positive. I wondered if we might step away from this kind of report card, which, as the report itself notes is necessarily a backward-looking assessment. You know, it takes a look back over the prior year and tries to assess what was good and what was bad.

Step back and look forward, because as the report notes, of course, cybersecurity risks are ever-evolving. And to shape cybersecurity policy, one can't only look back to a set of recommendations from the commission from several years ago. However, you know, prescient the commission was.

So we've had the benefit of more years of experience now, and of course, you and others are looking forward.

As you look out, say, you know, ahead, the next two or three years, are there one or two important trends or developments that you think the United States has to focus on as it tries to improve its cybersecurity posture?

Mark Montgomery: Yeah, there are. There's a few things, and I'll bid them into, in the kind of––one of them is a technology thing, one of them is a people thing and one of them is a kind of a policy process thing.

So on the policy process side is, can we get everyone to understand what Volt Typhoon and similar activities that are operational preparation of the battlefield are really doing.

In other words, make it so people understand: this is China preparing for a future crisis with us, or conflict, and putting in either malware or like an access so at a later time they can rapidly conduct a destructive or disruptive attack on that critical infrastructure.

You would say Mark, well, of course everyone's worried about that.

They're not, right? So, so the FBI director does this, announces this last January.

Director Wray says, ‘Hey, opera—you know, Volt Typhoon did this. Thousands of penetrations into dozens of infrastructures. You know, they went right at our military mobility, rail, aviation ports. Right at our economic productivity, financial services, energy. Right at our public health and safety, healthcare, water. All the different attack vectors.’

And I'd say people like me are still spun up about it. 99.9% of America came outta warble a day later, right? And they're fine with it.

Now, let me give you another version of this. Director Wray comes out and says, Hey, there's a thousand attacks, 16 sectors. And what the Chinese did was put a backpack with Semtex in it on this infrastructure, so that at a later date they could, you know, initiate it and disrupt or destroy the infrastructure.

We would still be talking about that. You know, we might have had a war in between. I mean, a war might be too far, but we'd have certainly had a collapse in U.S.-Chinese relations.

This operational preparation of the battlefield has gone unremarked. And so the first development's got to be the next two or three years, we have to understand the adversary. We're learning the criminal adversary because of ransomware.

It's made people understand, this is significant, it's real, and I better invest in it. Now, I still think the vast majority of companies that kind of come to Jesus, so to speak, are the ones who just kind of attacked. But still, if your neighbor just got attacked, you're like, yeah, I'm going to come to Jesus.

But the others, the, to me, the, you know, this nation-state operational preparation of the battlefield––which is a relatively new phenomenon, this needs to be understood, that's number one.

Number two is a technology one. We've got to figure out how to have better recovery tools. Here's the bottom-line lesson learned from the last five years, is: you're going to get hit. If you get hit, you probably can only mitigate it slightly. And the real value is speed of recovery. How fast can you be up and running again?

Is it through redundancy, through resilience, through training? But how fast can you get back up off the canvas?

And the most important companies on this are the small-, medium-sized businesses that have four or six weeks float––that is, excess cash. Because the normal ransomware is one to two weeks till you get the key or go without the key. Three to four weeks to get your system fully aligned and integrated.

That's five or six weeks. Around that same period, you're laying people off, selling assets, declaring bankruptcy. Kind of, weeks four, five, six.

So the question is, are we going to get technology that helps that recovery faster? To me, that would be if I was making, if I wanted to––as a venture capitalist, that's the tools I'd be looking for.

And the third one I'll make quick is on personnel. It's on the offensive side. We're not currently generating enough forces, properly trained and ready forces. We have different––every service, the Army, Navy, Air Force, Marines, Space Force, all build cyber people, and then send 'em over to Cyber Command.

Cyber Command is the force employer. They're doing okay, given the quality we're giving them. We're giving them substandard quality.

But the force generation, I think requires a single service doing it, that focuses on cyber. When we're recruiting kids outta high school, the people I need to be a Ranger don't look like the people I need to be cyber.

There can be one or two that look the same, but the vast majority––I'm okay with overweight, face tattoo, a little bit of extra weed usage. That's okay. But the Rangers are not.

So we need to get cyber––so that's the first thing you recruit. Then you specifically train them for this mission, at a certain high level. And then you pay them properly.

And there might be a split there of uniform versus non-uniform that's much different than the Army and Navy and Air Force. And then you'll end up retaining them properly.

So we need to do a big thing in this. And just to show you the math on it, our cyber operating forces have gone––we were about 6500, 6400 was our target goal in 2012. 6700 is our target goal now. So about a 3% increase.

In that same timeframe, our estimate is China may have gone from 6,000 to 60,000. I'll just say, their 1000% may not be right, but our 3% is definitely wrong.

And so to me, those things––you know, understanding OP, operational preparation, battlefield technology through recovery, and then cyberforce––those are three things I'd be working.

Jonathan Cedarbaum: Excellent suggestions.

Let me ask you one final question, which every cybersecurity analyst is at least speculating about because it's early days, and that is the implications of the development of ever more sophisticated artificial intelligence systems on cybersecurity offense and defense.

There's more and more writing trying to gauge, you know, who in the offense defense balance will get greater benefit from artificial intelligence systems in what ways, how quickly.

Do you have any initial views about that? And if so, what evidence do you think is the most helpful evidence for those of us interested in trying to assess the impact of AI on cybersecurity should be looking to?

Mark Montgomery: I'm not the right person to decide which one will go better. Here's what I do know, though. I do understand well enough that both will benefit from it.

And here's the challenge. The challenge is, I do think the criminals, people who are exploiting AI, will invest enough to have a tool that works.

Cybercrime has been a––I mean, it's not a unicorn, but it's a pretty good startup, right? They've done pretty well.

And the criminal conviction rate on cybercrimes is, you know, avert-your-eyes bad, you know. It's in the 1% or 2%, if that. And usually that's one guy, 40 crimes, not 40 crimes, 40 guys. And it is mostly guys.

So, they're going to invest what they need. The question is, are we going to invest what we need defensively? So far is, I'm just going to––the answer's been no. The problem with AI is it will exponentially grow the risk of your “no.”

If you don't invest properly in cybersecurity––and whether the tools are traditional or AI-based tools––you're exposing yourself to greater and greater risk, I think, over time, in this environment.

So that'd be number one. Number two is, there's an element to AI that really worries me, and it has to do with influence operations. We study that here at FDD. We look for AI misuse, and then AI––you know, we look for influence operations being conducted by China, Russia, and Iran, particularly.

North Korea does a lot of bad stuff in cyber, but not these––they're not doing influence operations to try to change how Americans feel about the state of democracy or things like that.

But I think these AI tools are going to make influence operations look more and more like a text or an email from your spouse or your daughter or your child, you know, and have a much higher likelihood of success.

So, these influence operations are going to be more effective over time. And we already are a fragile society. We can see that in a lot of ways. And this will amplify––I think AI has the risk of amplifying that greatly, if we don't figure how to take any of this––

And one last thing, I'll say, another reason they got a bad grade, the Trump administration has kind of consistently, across all our government, removed the disinformation efforts, whether it's at Justice, FBI, State, Department of Homeland Security.

It was under the guise of, they somehow were involved in election security and suppressing conservative thought, which I just don't think they were. I, you know, maybe I'm blind, but I didn't see that.

What I saw was a lot of bad––what we saw at FDD and studying this election cycle, and we've written three reports on it, was a lot of bad Russian behavior trying to help Trump. Some bad Iranian behavior trying to help Harris.

And then a lot of Chinese behavior, not caring who they helped. All they cared about was undermining Americans’ faith and belief in the credible execution of democracy. That worries me the most.

So I guess that's a bad pessimistic line to end on, Jonathan, but that's where I sit.

Jonathan Cedarbaum: Okay. But we will have to end it there.

Admiral Montgomery, thank you so much for taking the time to talk with us today.

Mark Montgomery: Thank you for having me.

Jonathan Cedarbaum: The Lawfare Podcast is produced in cooperation with the Brookings Institution. You can get ad-free versions of this and other Lawfare podcasts by becoming a Lawfare material supporter through our website, lawfaremedia.org/support. You'll also get access to special events and other content available only to our supporters.

Please rate and review us wherever you get your podcasts. Look out for our other podcasts as well, including Rational Security, Allies, The Aftermath, and Escalation, our latest Lawfare Presents podcast series about the war in Ukraine. Check out our written work at lawfaremedia.org.

The podcast is edited by Jen Patja and our audio engineer this episode was Hazel Hoffman of Goat Rodeo. Our theme song is from ALIBI Music. As always, thank you for listening.


Jonathan G. Cedarbaum is a professor of practice at George Washington University Law School, affiliated with the program in national security, cybersecurity, and foreign relations law. During the first year of the Biden Administration he served as Deputy Counsel to the President and National Security Council Legal Advisor.
RADM (ret) Mark Montgomery serves as senior director of the Center on Cyber and Technology Innovation at the Foundation for Defense of Democracies and an FDD senior fellow. He also directs CSC 2.0, an initiative that works to implement the recommendations of the congressionally mandated Cyberspace Solarium Commission, where he served as executive director and as senior advisor to the co-chairs. Previously, he served as Policy Director for the Senate Armed Services Committee under the leadership of Senator John S. McCain. Mark served for 32 years in the U.S. Navy as a nuclear trained surface warfare officer, retiring as a Rear Admiral in 2017. He was selected as a White House Fellow and assigned to the National Security Council, serving as Director for Transnational Threats from 1998-2000. Mark graduated from the University of Pennsylvania with bachelor’s and master’s degrees in history. He subsequently earned a master’s degree in history from Oxford University and completed the U.S. Navy’s nuclear power training program.
Jen Patja is the editor of the Lawfare Podcast and Rational Security, and serves as Lawfare’s Director of Audience Engagement. Previously, she was Co-Executive Director of Virginia Civics and Deputy Director of the Center for the Constitution at James Madison's Montpelier, where she worked to deepen public understanding of constitutional democracy and inspire meaningful civic participation.
}

Subscribe to Lawfare