The Lawfare Podcast

Lawfare Daily: The Military’s Operational Technology Cyber Vulnerabilities

4 snips
Jan 27, 2026
Jim Dempsey, a cybersecurity policy adviser and lecturer, and Andy Grotto, an operational technology and infrastructure expert, discuss U.S. military vulnerabilities in operational technology. They cover mapping installations' critical dependencies. They examine common OT flaws, why air gaps are often illusory, and how procurement, standards, and energy resilience efforts shape exposure.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

OT Is Not Just IT

  • Operational technology (OT) security differs fundamentally from IT security and cannot be solved by directly applying IT approaches.
  • Andy Grotto explains OT controls physical processes, requiring different risk management and technical fixes.
ANECDOTE

Open-Source Dossiers Reveal Big Gaps

  • A grad student used only open-source data to map two Army installations' critical infrastructure dependencies in 20–30 hours each.
  • Jim Dempsey and Andy Grotto note a well-resourced adversary could do far more with additional intelligence.
INSIGHT

Bases Depend On Civilian Providers

  • U.S. military installations overwhelmingly rely on civilian critical infrastructure and contractors for essential services.
  • Jim Dempsey warns that contractors' business incentives may not meet national defense resilience needs.
Get the Snipd Podcast app to discover more snips from this episode
Get the app