Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Home » U.S. Green Berets Hack Wi-Fi, Disable Security Systems, Then Vanish in Mock Raid During Exercise

U.S. Green Berets Hack Wi-Fi, Disable Security Systems, Then Vanish in Mock Raid During Exercise

During a recent exercise, elite special-operations soldiers demonstrated how cyber intrusion can pave the way for undetected physical raids.

by TeamDefenseWatch
11 comments 4 minutes read
Green Berets

During Swift Response 2024 (May 2024) near Skillingaryd, Sweden, two teams from 10th Special Forces Group (Airborne) of the U.S. Army — commonly known as “Green Berets” — carried out a realistic cyber-enabled mock raid. In the first phase, one Operational Detachment Alpha (ODA) remotely infiltrated the target facility’s Wi-Fi network, disabled its electronic security systems, and enabled a second ODA to physically breach the building. After placing jamming gear to erase digital traces of the operation, the team exited undetected. The event was disclosed publicly by the Army in a news release.

Background: Cyber + Kinetic — The New Special Ops Paradigm

The demonstration underscores a growing trend within U.S. special operations: the blending of traditional direct-action capabilities with cyber warfare and electronic warfare (EW). Historically, special forces focused on human intelligence, direct raids, hostage rescue, and counterterrorism. But as modern warfare becomes increasingly networked — with security cameras, door locks, alarms, and building automation often connected to Wi-Fi or digital systems — the potential to exploit those networks becomes a valuable tactical lever.

By integrating cyber and EW tools with parachute insertion and ground maneuvers, forces like the 10th SFG(A) broaden the toolkit for future conflicts, especially against near-peer adversaries where stealth, speed, and information dominance will matter.

Details of the Mock Raid

  • Cyber Infiltration: The first ODA used a remote access device (RAD) to detect Wi-Fi networks emanating from the target building. They cracked the Wi-Fi password, enumerated connected devices, and exploited a target computer within the facility. Through this access they manipulated security cameras, door locks, and other electronic security systems — effectively rendering the building defenseless from a physical intrusion.
  • Kinetic Infiltration: With the facility’s electronic defenses neutralized, the second ODA team conducted a military free-fall (MFF) parachute jump, then marched approximately seven miles to reach the target. The weakened security posture allowed them easy access to the building.
  • Electronic Cover-Up: Once inside, the team deployed signal-jamming equipment to erase or block any trace of the cyber intrusion or physical presence. According to the Army, the clean withdrawal left no evidence that the building had been breached.
  • A Digital “Prank”? A photograph released by the Army shows a laptop inside the building playing (or displaying still from) the 1987 music video Never Gonna Give You Up by Rick Astley — a well-known meme characterizing online pranking (“Rickrolling”). It is unclear whether this was an intentional part of the operation or merely a troop joke.

As one of the ODA commanders (anonymous) asserted: successful covert cyber disruption “allows us to glean critical information in a way that’s undetectable if we do our jobs right.

Strategic Significance: Special Ops for Great Power Competition

The exercise reflects a strategic shift in U.S. special operations posture: moving beyond the counterterrorism focus of the last two decades toward preparing for high-end, multi-domain conflicts. Experts view blending cyber and kinetic capabilities as an enabler for missions such as intelligence collection, sabotage, hostage rescue, or seizure of high-value targets — especially when stealth and surprise matter more than brute force.

As one analyst noted, the use of cyber-physical vulnerabilities — Wi-Fi networks, CCTV, access control systems — combined with conventional Special Forces tradecraft, represents a powerful new “attack surface.”

During a recent panel at the annual SOF-Week convention, Dagvin R.M. Anderson, Director for Joint Force Development at the Pentagon, described such cyber-enabled special operations as part of how elite forces can “create strategic effects” in future conflicts — beyond traditional counterterror operations.

Implications and What’s Next

The successful mock raid during Swift Response 2024 highlights how cyber infiltration might become a core capability within special operations — especially in urban or hardened environments where digital systems control access and security.

However, this evolution also raises questions: in a real-world peer-conflict scenario, would adversaries rely on unsecured Wi-Fi networks and consumer-grade automation sensitive to exploitation? Some cybersecurity analysts argue that such networks are more likely in commercial or non-state facilities than in hardened military infrastructures — potentially limiting the real-world applicability of the tactic.

Still, the exercise demonstrates intent and capability. As adversaries — state and non-state alike — continue to digitize infrastructure, the precedent set by this mock raid suggests that cyber-physical infiltration may play a growing role in future operations, especially those requiring stealth, intelligence gathering, or seizure of critical assets.

For policy makers and defense planners, the take-away may be clear: maintaining rigid cyber hygiene, minimizing reliance on commercial wireless networks for sensitive security systems, and ensuring defensive cyber-electronic warfare readiness must remain priorities.

Get real time update about this post category directly on your device, subscribe now.

You may also like

11 comments

Hegseth Defends U.S. Strikes on Alleged Cartel Boats as Legitimate Use of Force | TheDefenseWatch.com December 7, 2025 - 4:27 am

[…] two survivors clinging to the wreckage, after which a follow-up strike — allegedly carried out by special operations forces — reportedly killed […]

Reply
U.S. Picks SOLGW MK1 as Next‑Generation 5.56mm Assault Rifle for Special Forces December 11, 2025 - 11:31 am

[…] key area of evaluation focused on performance under suppression, which is essential for many special operations scenarios. The MK1 showed minimal zero shift, reduced gas blowback, and stable recoil when fired […]

Reply
Germany Boosts Fleet With 20 New Airbus H145M Helicopters for Special Ops and Light Attack Roles December 16, 2025 - 6:29 am

[…] a suite of mission modules that let operators shift rapidly between roles such as reconnaissance, special operations support, and armed light […]

Reply
Saab Accelerates Submarine Production to Hit 2026 Targets | TheDefenseWatch.com January 12, 2026 - 11:47 pm

[…] Baltic Sea and beyond. The boats are expected to provide improved stealth, sensor integration, and special operations support compared to earlier Swedish […]

Reply
US Air Force awards Advanced Concepts Enterprises 31.4 million dollar mission readiness contract | TheDefenseWatch.com January 20, 2026 - 10:04 pm

[…] at Hurlburt Field. Work is expected to continue through Feb. 28, 2031, reinforcing long term operational support at one of the service most active special operations […]

Reply
Space Force FY27 Budget Increase: Personnel Expansion and Modernization Plans Revealed | TheDefenseWatch.com January 25, 2026 - 10:41 am

[…] by several hundred positions in FY27, with particular emphasis on cyber operations specialists, space systems operators, and intelligence analysts. This growth would support expanded operations at key installations […]

Reply
EA-18G Growler Deployment to Jordan Showcases ALQ-99 and ALQ-249 Electronic Warfare Pods | TheDefenseWatch.com February 1, 2026 - 10:11 am

[…] Operating both systems side by side allows aircrews and planners to maintain full-spectrum electronic attack coverage while the newer pod continues its operational rollout. […]

Reply
UK Takes Lead of NATO Special Operations Reaction Force| TheDefenseWatch.com February 2, 2026 - 10:25 pm

[…] role places the UK-led Special Operations Component Command (SOCC) at the centre of NATO’s high-readiness special operations posture. The […]

Reply
Israel Ministry of Defense $130M Elbit Deal for CH-53K Helicopter Integration | TheDefenseWatch.com February 5, 2026 - 9:28 am

[…] fleet is expected to play a key role in a wide range of missions, including long-range transport, special operations, combat search and rescue, and logistical support under […]

Reply
UK Cyber Alert Russian Hacktivists Target Online Services, NCSC Sees Rising Threat | TheDefenseWatch.com February 5, 2026 - 11:42 pm

[…] against critical infrastructure and local services. Some of the named groups include NoName057(16), Cyber Army of Russia Reborn, Z-Pentest and Sector16, with attacks ranging from temporary website outages to […]

Reply
U.S Army Black Hawk Night Air Assault Drills With South Korea Forces | TheDefenseWatch.com February 6, 2026 - 11:08 am

[…] Battalion, 2nd Aviation Regiment, carried out combined air assault training with Republic of Korea Army units and special operations partners at Sungnam (Seoul Air Base). The training focused on rapid force movement into confined […]

Reply

Leave a Comment

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More

Privacy & Cookies Policy