
The Lawfare Podcast Lawfare Daily: The Military’s Operational Technology Cyber Vulnerabilities
4 snips
Jan 27, 2026 Jim Dempsey, a cybersecurity policy adviser and lecturer, and Andy Grotto, an operational technology and infrastructure expert, discuss U.S. military vulnerabilities in operational technology. They cover mapping installations' critical dependencies. They examine common OT flaws, why air gaps are often illusory, and how procurement, standards, and energy resilience efforts shape exposure.
AI Snips
Chapters
Transcript
Episode notes
OT Is Not Just IT
- Operational technology (OT) security differs fundamentally from IT security and cannot be solved by directly applying IT approaches.
- Andy Grotto explains OT controls physical processes, requiring different risk management and technical fixes.
Open-Source Dossiers Reveal Big Gaps
- A grad student used only open-source data to map two Army installations' critical infrastructure dependencies in 20–30 hours each.
- Jim Dempsey and Andy Grotto note a well-resourced adversary could do far more with additional intelligence.
Bases Depend On Civilian Providers
- U.S. military installations overwhelmingly rely on civilian critical infrastructure and contractors for essential services.
- Jim Dempsey warns that contractors' business incentives may not meet national defense resilience needs.
