Connect with us

Published

on

Crypto hunters track down digital assets in divorce cases

A few months into her divorce proceedings, Sarita thought it was suspicious that her spouse, who earned $3 million annually, didn’t have many assets. After spending half a year on discovery and enlisting the help of a forensic accountant, the New York housewife eventually tracked down 12 bitcoins — then worth half a million dollars — in a previously undisclosed crypto wallet.

Sarita, who was married for a decade and asked to use a pseudonym to protect herself from retaliation, said she felt blindsided by her husband’s cryptocurrency investment.

“I know of bitcoin and things like that. I just didn’t know much about it,” Sarita said. “It was never even a thought in my mind, because it’s not like we were discussing it or making investments together. … It was definitely a shock.”

The world of financial infidelity has become increasingly sophisticated, as investors “hop” coins across blockchains and sink their cash into metaverse properties. An NBC News poll found that 1 in 5 Americans have invested in, traded or used cryptocurrency, with men between the ages of 18 and 49 accounting for the highest share of all demographic groups.

CNBC spoke with divorce attorneys from Florida, New York, Texas and California, blockchain forensic investigators, financial advisors, as well as spouses who were either hunting down virtual coins or the crypto holders themselves. Most agree that the law can’t keep up with all the new ways that people earn and safeguard digital assets that largely exist outside the reach of centralized intermediaries such as banks.

Family and marital law attorney Kim Nutter said she first dove into the crypto vernacular in 2015 but that the state of Florida, where her practice is based, only recently inserted “cryptocurrency” into the standard request for production of documents — a key part of establishing the couple’s marital property during the discovery process.

“I really still think the law is trying to catch up with this novel form of currency, even though it’s been around for quite a while,” Nutter said.

“What I find in litigation is because this is so new to all of us, even the most seasoned attorneys — unless you’re really going out of your way to study this — educating the court, knowing what to ask for, and finding the right experts, it’s much more of a scramble to me than other areas of law which had been around much longer,” she said.

MicroStrategy Chairman Michael Saylor says bitcoin has bottomed: 'We're on a bull run'

How crypto hunters track down coins

Hunting hidden crypto stashes in divorce has created an entirely new job category of forensic investigators. CNBC spoke with several of these crypto hunters, and they say that while the blockchain is a public ledger, some spouses have become very good at covering their financial tracks.

“If you have a spouse that’s very tech savvy, and one that isn’t, it can be somewhat easy to hide those assets,” divorce attorney Kelly Burris told CNBC.

“The thing with cryptocurrency is it’s not regulated by any kind of centralized bank, so usually you can’t subpoena somebody and get documents and information related to somebody’s cryptocurrency holdings,” Burris said. She said she sees explicit cryptocurrency requests in discovery in 40% to 50% of her cases.

The Austin, Texas-based attorney told CNBC that the ideal way to get information on a spouse’s crypto holdings is to subpoena that information from a centralized crypto exchange. Otherwise, the process often involves a forensic analysis of their computer or phone to identify a wallet address and then a subsequent blockchain analysis.

“Crypto asset forensics, cryptocurrency forensics, and blockchain forensics have become a significant part of our practice and by far, the fastest growing part of our practice,” said Nick Himonidis, a New York-based forensic investigator.

Himonidis, who is also a licensed private investigator and a computer forensic expert, estimates that 25% of his divorce-related cases involve some elements of cryptocurrency. Some of those cases, he said, are simple and straightforward — situations where, for example, a cryptocurrency such as bitcoin is a custodial asset held in a brokerage account or on a trading platform such as Coinbase.

“These companies keep records just like your broker at Morgan Stanley would keep records of your trades,” he said.

Other cases are what Himonidis describes as the “whole enchilada.”

“They’re calling us because they want to get us appointed as the neutral forensic cryptocurrency expert to marshal and account for the party’s crypto assets and track down any undisclosed crypto assets that one party may have,” he said.

When Himonidis first got into hunting crypto, it was all about bitcoin, ether and a handful of other coins. CoinMarketCap now lists more than 24,000 cryptocurrencies, with a collective market cap of $1.1 trillion.

“There’s not just a couple of blockchains to worry about anymore. There’s hundreds and hundreds of coins out there on their own little independent blockchains,” he said.

One of the core tenets of bitcoin is that its public ledger, which stores all token transactions in its history, is visible to everyone. But there is a subset of cryptocurrencies known as privacy tokens, which have anonymity features built into them. Coins such as monero, dash and zcash, which operate on their own blockchains, disguise practically all transaction details, including the identity of the sender and recipient, as well as the transaction amount. Himonidis said it is “virtually impossible” to trace and de-anonymize transactions in monero.

In one case, Himonidis found around $700,000 worth of monero on a MacBook that turned up in discovery.

“We found something called a command line wallet for monero,” Himonidis said, describing it as a kind of software wallet. “You can’t find it with the Finder on the Mac. You need to go into a command line prompt to access this wallet — a Bash shell command on a Mac environment.”

Multiple investigators and attorneys told CNBC that they are always on the lookout for any type of crypto — but particularly privacy tokens. There is also special attention paid to any kind of hardware wallet or computing device, which can double as a form of “cold storage” for cryptocurrencies.

People who hold their own cryptocurrency can store it “hot,” “cold” or some combination of the two. A hot wallet is connected to the internet and allows owners relatively easy access to their coins so they can spend their crypto. The trade-off for convenience is potential exposure to bad actors and forensic investigators working for divorce attorneys.

A person holds a cryptocurrency hardware wallet.

Geoffroy Van Der Hasselt | AFP | Getty Images

With cold storage, the private keys — or the passwords that enable the crypto to be moved out of the wallet — are stored on devices, such as computers, that are not connected to the internet. Thumb drive-size devices, such as a Trezor or Ledger, offer another way to secure crypto tokens cold by safeguarding both the crypto itself and the keys to access it.

Mark DiMichael, who has been in the forensic accounting field for more than 14 years and is a certified cryptocurrency forensic investigator, described one case to CNBC in which a divorcing couple had a stand-off over a password-protected Ledger device.

In the case, DiMichael said, the husband had a Ledger and then the wife found the device in the house and took it. “So the wife had the Ledger, but she didn’t know the pin number, or password. And the husband — he knew the pin number, but he didn’t have the Ledger.”

Neither could access the funds without the cooperation of the other.

DiMichael, who said he has tracked down millions of dollars worth of cryptocurrency since he began tracing digital assets in 2018, explained that when crypto is stored cold, it may be more difficult to seize but it is still traceable.

“If they’re doing on-chain transactions and they move something to cold storage, it’s still visible on the blockchain,” he said.

DiMichael told CNBC that in a divorce case if you can at least prove that the crypto is there — or that it hasn’t been sold — that’s usually sufficient for a judge. If a spouse bought 100 bitcoins on Coinbase, for example, and later transferred the currency off an exchange to a wallet, it’s still sitting there and fully visible on the blockchain. A court can then order other remedies to retrieve those funds, according to DiMichael.

New York divorce attorney Sandra Radna told CNBC that right at the beginning of a case, when she serves the summons and complaint for a divorce, she also asks for a preservation of assets — known as the “automatic orders” in New York. At this point, Radna said, she singles out computer hard drives in her request, to ensure that nothing will be destroyed. This is key since these devices are what the forensic investigator uses to determine where the assets — both crypto and otherwise — went.

“They go through the hard drive of the computer to look for ticker symbols within emails, which is how they can see what purchases were made,” Radna said.

Radna said she also asks for information such as a spouse’s “public keys,” which she described as being almost like an account number on the blockchain.

Currently, much of the world runs on something called asymmetric cryptography, in which individuals use a private and public key pair to access things such as email and crypto wallets. A private key is a secure code that grants the owner access to their crypto holdings — whereas the public key is a unique wallet address. With the public key, it is possible to find a full history of every transaction made into or out of that wallet.

“If you have that information, you will be able to see every transaction that they did, and it’s something that the attorneys are able to get as part of discovery because it’s not giving a private number, a private key,” Radna said.

Bill Callahan of the Blockchain Intelligence Group said that with that wallet address, crypto hunters are able to tell the attorney or the attorney’s investigator that they should go to a specific exchange to request more information.

“One of the things we’re looking for are the on- and off-ramps. We’re looking to see how the money came on to the blockchain, where it may be, and then where it’s off to,” Callahan said. He said the flow of funds can also show whether something was purposely hidden through an obfuscation technique such as using a crypto asset mixer.

These so-called mixers are designed to obscure trails of funds by blending someone’s tokens with a pool of other individuals’ assets on the platform. They go beyond traditional crypto platforms in further concealing the identity of the people involved in transactions.

“We can kind of track and trace the flow after the proceedings are over to see if something was purposely hidden,” Callahan said. “The blockchain never forgets.”

In one case, Himonidis said, he had to track around $2.3 million that was emptied out of a Coinbase account within a few months of divorce proceedings commencing. The crypto coins hadn’t been cashed out to fiat but instead moved as crypto to addresses outside Coinbase in a series of approximately 14 outbound transfers.

“All of it wound up in two or three different wallets on a foreign exchange — a place like Coinbase, but in a foreign country that does not operate in the U.S. and is not subject to the laws and jurisdiction in the United States,” Himonidis told CNBC.

DiMichael said he has run into similar issues with cases where funds were transferred to a global Binance account, and he was, therefore, unable to subpoena records since the funds were in an untouchable jurisdiction.

Tracking assets gets especially complicated when investors begin to move their tokens across blockchains.

DiMichael said “chain hopping” — a person switching from one blockchain to another very quickly — is an increasingly common technique used to throw off investigators.

Blockchains have their own native tokens. With ethereum, for example, the token is ether. Developers have built cross-chain bridges to let users send tokens from one chain to another. Transfers of digital assets between chains has helped to expand the crypto market by giving people more ways to pay and transact. Cross-chain bridges are vital to the development of the decentralized finance, or DeFi, space, which is crypto’s alternative to the banking system.

But in a divorce case these bridges make it difficult for investigators to follow the trail of tokens.

Take the crypto token polka dot, which is trading at around $5.40 and has a market valuation of over $6.3 billion. Because the virtual coin is on its own blockchain, when someone wants to trade it they need to “wrap it” in order to buy and sell it on the ethereum blockchain, Himonidis told CNBC. Wrapped tokens are pegged to the value of the original coin but are interoperable with other blockchains.

“If we need to start tracing stuff like that, it gets very complicated,” said Himonidis. “When they do coin swaps, now we’re jumping — literally jumping — blockchains, trying to trace the funds. It was complicated enough before, and now, it’s gotten exponentially more complicated in just the last year or two.”

Himonidis said he and his firm are able to follow funds across blockchains using a tool previously only available to law enforcement, the Internal Revenue Service, and financial institutions that need it for their know-your-customer and anti-money-laundering functions.

But even with new search tools, Himonidis described his work as a literal race to try to keep up with the latest in rapidly evolving crypto tech.

“It lends itself very well to people who have figured out how it works and understand what’s going on there,” said Himonidis. “It’s this constant arms race.”

DiMichael agrees, telling CNBC it was “inevitable” that these kinds of obfuscation techniques would crop up given the amount of money in the crypto ecosystem now, even in the midst of a down market.

“But it is still coming as a total shock to the so-called non-monied spouses,” DiMichael said.

Many centralized exchanges such as Gemini offer customers the option to stake their tokens in order to earn yield on their digital assets that would otherwise sit idle on the platform. With crypto staking, investors typically vault their crypto assets with a blockchain validator, which verifies the accuracy of transactions on the blockchain. Investors can receive additional crypto tokens as a reward for locking away those assets.

In one of his divorce cases, DiMichael said, the husband disclosed the cryptocurrencies he owned, but he didn’t disclose the tokens that were staked.

“The ones that he staked, he wasn’t really counting those in his numbers, so I uncovered that through the investigative process,” DiMichael said. “Even though this cryptocurrency wasn’t in his wallet anymore, he still had rights to it.”

Bitcoin Miami 2023 underway after lengthy 'crypto winter' cuts prices in half

Valuing crypto property in divorce court

Even when both parties in a divorce are totally above board on discovery, volatility in the crypto market can prove to be a major issue when attorneys try to value a marital estate.

NodeBaron, a 36-year-old vascular surgical engineer and veteran who asked to be identified by his Twitter username, said he liquidated his stake in dogecoin for around $5,000 during his divorce. Six months later, his holdings would have been worth close to $1 million.

“The cost to get a divorce was almost like a million-dollar decision,” he said.

Divorce attorney Alexandra Mussallem said that because California, where her practice is based, is a community-property state, she often advises her clients on whether to stay in a particular asset — that is, to take half of a community asset in kind versus seeking a liquidated value.

“With volatile investments, the right strategy for a spouse trying to build a stable asset base will be to seek a cash buyout at market value on crypto holdings,” said Mussallem, adding that it is a question of managing risk.

The spouse with higher risk tolerance may be eager to cash out their partner and retain the crypto asset, given the heavy fluctuations in the crypto market, she said.

Burris, the Texas-based attorney, said that in her first crypto case, around five years ago, the husband wanted to buy the wife out of his crypto holdings — which ultimately proved to be a good decision for him, given the rapid price appreciation in the crypto market since 2020.

New York is an equitable distribution state, meaning that a spouse gets 50% of the marital assets accumulated during the marriage.

Radna, the New York divorce attorney, told CNBC that digital assets can be taken in two ways.

“One way is to say, what is the value of that digital asset today, and we divide that up,” she said, calling the process analogous to stocks. “You can either take the shares of stock, or you can take the value of that.”

In an up market, Radna said, spouses typically opt for taking the value of the crypto holdings.

Here's what it's like to get scanned into the metaverse

Valuing and dividing a marital estate can become especially problematic when spouses diversify their crypto portfolio into metaverse properties and non-fungible tokens, or NFTs. Despite the NFT market collectively losing nearly $2 trillion since its peak in 2021, blue-chip series such as Bored Ape Yacht Club still have a floor price of more than $80,000.

“You have digital land as NFTs, you have digital artwork as NFTs, you have digital metaverse clothing in NFTs,” said DiMichael, adding that one of his clients had sold $80 million worth of NFTs.

DiMichael, who first spoke with CNBC in 2022, said that if a spouse has a couple of NFTs from a collection like the Bored Ape Yacht Club or Crypto Punks, it could add a couple hundred thousand dollars to the marital estate.

“NFTs are really driving me nuts. How do I find the real expert to value the NFT, which is my obligation for a court of law?” said Nutter, the Florida divorce attorney, referring to the Daubert standard, a rule that governs the admissibility of expert witness testimony in court. “It requires more peer reviews, articles, a lot more science and community acceptance, which is challenging when you have something particularly like an NFT.”

“NFTs are kind of new, and people know what they are, but to find somebody who has the level of expertise that could satisfy a court Daubert challenge and questioning I think is problematic for pretty much everybody,” she said. “Doesn’t matter what side of the coin you’re on.”

Radna, who mostly handles litigated divorces and has been practicing for 30 years, said she specifically looks for digital real estate assets in the metaverse when she requests discovery.

“You think it’s not real, but they make real income from it,” said Radna. “They can get paid for someone to rent that digital real estate where they can have advertising and a billboard, but it would be in the metaverse.”

If a spouse owns digital real estate and they’re getting rent for it, that would be income and counted in the divorce, according to Radna, who said 20% of her caseload has involved crypto in the last few years.

“It’s a whole new world, and people should be aware of it,” she added.

Certified financial planner and analyst Davon Barrett told CNBC that with a traditional asset class, he can just give a divorce agreement to Fidelity, for example, and the company will take care of the split on its own.

“But with cryptocurrency, it’s a newer space,” said Barrett, the lead advisor at Francis Financial in New York. “It’s harder to get customer service on the phone at times, so splitting it becomes a little bit more difficult.”

The tax implications are another major consideration when choosing how to divide crypto assets.

The IRS treats cryptocurrencies like property, meaning that each time you spend, exchange or sell your tokens, you’re logging a taxable event. There’s always a difference between how much you paid for your crypto, which is the cost basis, and the market value at the time you spend it. That difference can trigger capital gains taxes.

“There are people who bought bitcoin years ago, so their cost basis was $10,000,” Barrett said.

He gave a hypothetical where a client would potentially be smarter to keep $500,000 in cash, versus bitcoin, so that their spouse is the one stuck with the gains.

“The government, they may not have gotten it in the past, but Uncle Sam is really good about getting his money,” Barrett said.

“I think that you have your head in the sand if you don’t think that this is something that’s here to stay, even if during a down market,” Radna said.

“Like any other asset, just like the stock market, there’s going to be ups and downs. I think the people that are interested in digital assets are going to continue to be interested in digital assets,” she said. “When it’s a down market, that’s when you go shopping.”

Crypto leaders consider moving business outside of the U.S. regulatory space

Continue Reading

Technology

How Elon Musk’s plan to slash government agencies and regulation may benefit his empire

Published

on

By

How Elon Musk’s plan to slash government agencies and regulation may benefit his empire

Elon Musk’s business empire is sprawling. It includes electric vehicle maker Tesla, social media company X, artificial intelligence startup xAI, computer interface company Neuralink, tunneling venture Boring Company and aerospace firm SpaceX. 

Some of his ventures already benefit tremendously from federal contracts. SpaceX has received more than $19 billion from contracts with the federal government, according to research from FedScout. Under a second Trump presidency, more lucrative contracts could come its way. SpaceX is on track to take in billions of dollars annually from prime contracts with the federal government for years to come, according to FedScout CEO Geoff Orazem.

Musk, who has frequently blamed the government for stifling innovation, could also push for less regulation of his businesses. Earlier this month, Musk and former Republican presidential candidate Vivek Ramaswamy were tapped by Trump to lead a government efficiency group called the Department of Government Efficiency, or DOGE.

In a recent commentary piece in the Wall Street Journal, Musk and Ramaswamy wrote that DOGE will “pursue three major kinds of reform: regulatory rescissions, administrative reductions and cost savings.” They went on to say that many existing federal regulations were never passed by Congress and should therefore be nullified, which President-elect Trump could accomplish through executive action. Musk and Ramaswamy also championed the large-scale auditing of agencies, calling out the Pentagon for failing its seventh consecutive audit. 

“The number one way Elon Musk and his companies would benefit from a Trump administration is through deregulation and defanging, you know, giving fewer resources to federal agencies tasked with oversight of him and his businesses,” says CNBC technology reporter Lora Kolodny.

To learn how else Elon Musk and his companies may benefit from having the ear of the president-elect watch the video.

Continue Reading

Technology

Why X’s new terms of service are driving some users to leave Elon Musk’s platform

Published

on

By

Why X's new terms of service are driving some users to leave Elon Musk's platform

Elon Musk attends the America First Policy Institute gala at Mar-A-Lago in Palm Beach, Florida, Nov. 14, 2024.

Carlos Barria | Reuters

X’s new terms of service, which took effect Nov. 15, are driving some users off Elon Musk’s microblogging platform. 

The new terms include expansive permissions requiring users to allow the company to use their data to train X’s artificial intelligence models while also making users liable for as much as $15,000 in damages if they use the platform too much. 

The terms are prompting some longtime users of the service, both celebrities and everyday people, to post that they are taking their content to other platforms. 

“With the recent and upcoming changes to the terms of service — and the return of volatile figures — I find myself at a crossroads, facing a direction I can no longer fully support,” actress Gabrielle Union posted on X the same day the new terms took effect, while announcing she would be leaving the platform.

“I’m going to start winding down my Twitter account,” a user with the handle @mplsFietser said in a post. “The changes to the terms of service are the final nail in the coffin for me.”

It’s unclear just how many users have left X due specifically to the company’s new terms of service, but since the start of November, many social media users have flocked to Bluesky, a microblogging startup whose origins stem from Twitter, the former name for X. Some users with new Bluesky accounts have posted that they moved to the service due to Musk and his support for President-elect Donald Trump.

Bluesky’s U.S. mobile app downloads have skyrocketed 651% since the start of November, according to estimates from Sensor Tower. In the same period, X and Meta’s Threads are up 20% and 42%, respectively. 

X and Threads have much larger monthly user bases. Although Musk said in May that X has 600 million monthly users, market intelligence firm Sensor Tower estimates X had 318 million monthly users as of October. That same month, Meta said Threads had nearly 275 million monthly users. Bluesky told CNBC on Thursday it had reached 21 million total users this week.

Here are some of the noteworthy changes in X’s new service terms and how they compare with those of rivals Bluesky and Threads.

Artificial intelligence training

X has come under heightened scrutiny because of its new terms, which say that any content on the service can be used royalty-free to train the company’s artificial intelligence large language models, including its Grok chatbot.

“You agree that this license includes the right for us to (i) provide, promote, and improve the Services, including, for example, for use with and training of our machine learning and artificial intelligence models, whether generative or another type,” X’s terms say.

Additionally, any “user interactions, inputs and results” shared with Grok can be used for what it calls “training and fine-tuning purposes,” according to the Grok section of the X app and website. This specific function, though, can be turned off manually. 

X’s terms do not specify whether users’ private messages can be used to train its AI models, and the company did not respond to a request for comment.

“You should only provide Content that you are comfortable sharing with others,” read a portion of X’s terms of service agreement.

Though X’s new terms may be expansive, Meta’s policies aren’t that different. 

The maker of Threads uses “information shared on Meta’s Products and services” to get its training data, according to the company’s Privacy Center. This includes “posts or photos and their captions.” There is also no direct way for users outside of the European Union to opt out of Meta’s AI training. Meta keeps training data “for as long as we need it on a case-by-case basis to ensure an AI model is operating appropriately, safely and efficiently,” according to its Privacy Center. 

Under Meta’s policy, private messages with friends or family aren’t used to train AI unless one of the users in a chat chooses to share it with the models, which can include Meta AI and AI Studio.

Bluesky, which has seen a user growth surge since Election Day, doesn’t do any generative AI training. 

“We do not use any of your content to train generative AI, and have no intention of doing so,” Bluesky said in a post on its platform Friday, confirming the same to CNBC as well.

Liquidated damages

Bluesky CEO: Our platform is 'radically different' from anything else in social media

Continue Reading

Technology

The Pentagon’s battle inside the U.S. for control of a new Cyber Force

Published

on

By

The Pentagon's battle inside the U.S. for control of a new Cyber Force

A recent Chinese cyber-espionage attack inside the nation’s major telecom networks that may have reached as high as the communications of President-elect Donald Trump and Vice President-elect J.D. Vance was designated this week by one U.S. senator as “far and away the most serious telecom hack in our history.”

The U.S. has yet to figure out the full scope of what China accomplished, and whether or not its spies are still inside U.S. communication networks.

“The barn door is still wide open, or mostly open,” Senator Mark Warner of Virginia and chairman of the Senate Intelligence Committee told the New York Times on Thursday.

The revelations highlight the rising cyberthreats tied to geopolitics and nation-state actor rivals of the U.S., but inside the federal government, there’s disagreement on how to fight back, with some advocates calling for the creation of an independent federal U.S. Cyber Force. In September, the Department of Defense formally appealed to Congress, urging lawmakers to reject that approach.

Among one of the most prominent voices advocating for the new branch is the Foundation for Defense of Democracies, a national security think tank, but the issue extends far beyond any single group. In June, defense committees in both the House and Senate approved measures calling for independent evaluations of the feasibility to create a separate cyber branch, as part of the annual defense policy deliberations.

Drawing on insights from more than 75 active-duty and retired military officers experienced in cyber operations, the FDD’s 40-page report highlights what it says are chronic structural issues within the U.S. Cyber Command (CYBERCOM), including fragmented recruitment and training practices across the Army, Navy, Air Force, and Marines.

“America’s cyber force generation system is clearly broken,” the FDD wrote, citing comments made in 2023 by then-leader of U.S. Cyber Command, Army General Paul Nakasone, who took over the role in 2018 and described current U.S. military cyber organization as unsustainable: “All options are on the table, except the status quo,” Nakasone had said.

Concern with Congress and a changing White House

The FDD analysis points to “deep concerns” that have existed within Congress for a decade — among members of both parties — about the military being able to staff up to successfully defend cyberspace. Talent shortages, inconsistent training, and misaligned missions, are undermining CYBERCOM’s capacity to respond effectively to complex cyber threats, it says. Creating a dedicated branch, proponents argue, would better position the U.S. in cyberspace. The Pentagon, however, warns that such a move could disrupt coordination, increase fragmentation, and ultimately weaken U.S. cyber readiness.

As the Pentagon doubles down on its resistance to establishment of a separate U.S. Cyber Force, the incoming Trump administration could play a significant role in shaping whether America leans toward a centralized cyber strategy or reinforces the current integrated framework that emphasizes cross-branch coordination.

Known for his assertive national security measures, Trump’s 2018 National Cyber Strategy emphasized embedding cyber capabilities across all elements of national power and focusing on cross-departmental coordination and public-private partnerships rather than creating a standalone cyber entity. At that time, the Trump’s administration emphasized centralizing civilian cybersecurity efforts under the Department of Homeland Security while tasking the Department of Defense with addressing more complex, defense-specific cyber threats. Trump’s pick for Secretary of Homeland Security, South Dakota Governor Kristi Noem, has talked up her, and her state’s, focus on cybersecurity.

Former Trump officials believe that a second Trump administration will take an aggressive stance on national security, fill gaps at the Energy Department, and reduce regulatory burdens on the private sector. They anticipate a stronger focus on offensive cyber operations, tailored threat vulnerability protection, and greater coordination between state and local governments. Changes will be coming at the top of the Cybersecurity and Infrastructure Security Agency, which was created during Trump’s first term and where current director Jen Easterly has announced she will leave once Trump is inaugurated.

Cyber Command 2.0 and the U.S. military

John Cohen, executive director of the Program for Countering Hybrid Threats at the Center for Internet Security, is among those who share the Pentagon’s concerns. “We can no longer afford to operate in stovepipes,” Cohen said, warning that a separate cyber branch could worsen existing silos and further isolate cyber operations from other critical military efforts.

Cohen emphasized that adversaries like China and Russia employ cyber tactics as part of broader, integrated strategies that include economic, physical, and psychological components. To counter such threats, he argued, the U.S. needs a cohesive approach across its military branches. “Confronting that requires our military to adapt to the changing battlespace in a consistent way,” he said.

In 2018, CYBERCOM certified its Cyber Mission Force teams as fully staffed, but concerns have been expressed by the FDD and others that personnel were shifted between teams to meet staffing goals — a move they say masked deeper structural problems. Nakasone has called for a CYBERCOM 2.0, saying in comments early this year “How do we think about training differently? How do we think about personnel differently?” and adding that a major issue has been the approach to military staffing within the command.

Austin Berglas, a former head of the FBI’s cyber program in New York who worked on consolidation efforts inside the Bureau, believes a separate cyber force could enhance U.S. capabilities by centralizing resources and priorities. “When I first took over the [FBI] cyber program … the assets were scattered,” said Berglas, who is now the global head of professional services at supply chain cyber defense company BlueVoyant. Centralization brought focus and efficiency to the FBI’s cyber efforts, he said, and it’s a model he believes would benefit the military’s cyber efforts as well. “Cyber is a different beast,” Berglas said, emphasizing the need for specialized training, advancement, and resource allocation that isn’t diluted by competing military priorities.

Berglas also pointed to the ongoing “cyber arms race” with adversaries like China, Russia, Iran, and North Korea. He warned that without a dedicated force, the U.S. risks falling behind as these nations expand their offensive cyber capabilities and exploit vulnerabilities across critical infrastructure.

Nakasone said in his comments earlier this year that a lot has changed since 2013 when U.S. Cyber Command began building out its Cyber Mission Force to combat issues like counterterrorism and financial cybercrime coming from Iran. “Completely different world in which we live in today,” he said, citing the threats from China and Russia.

Brandon Wales, a former executive director of the CISA, said there is the need to bolster U.S. cyber capabilities, but he cautions against major structural changes during a period of heightened global threats.

“A reorganization of this scale is obviously going to be disruptive and will take time,” said Wales, who is now vice president of cybersecurity strategy at SentinelOne.

He cited China’s preparations for a potential conflict over Taiwan as a reason the U.S. military needs to maintain readiness. Rather than creating a new branch, Wales supports initiatives like Cyber Command 2.0 and its aim to enhance coordination and capabilities within the existing structure. “Large reorganizations should always be the last resort because of how disruptive they are,” he said.

Wales says it’s important to ensure any structural changes do not undermine integration across military branches and recognize that coordination across existing branches is critical to addressing the complex, multidomain threats posed by U.S. adversaries. “You should not always assume that centralization solves all of your problems,” he said. “We need to enhance our capabilities, both defensively and offensively. This isn’t about one solution; it’s about ensuring we can quickly see, stop, disrupt, and prevent threats from hitting our critical infrastructure and systems,” he added.

Continue Reading

Trending