Risk
1/5/2012
01:36 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Defense Bill Approves Offensive Cyber Warfare

Annual defense budget also calls for military to improve defensive cyber capabilities and create a new insider threat program to prevent another WikiLeaks-type breach.

The annual defense budget passed in December affirms that the Department of Defense may carry out offensive cyber attacks to defend U.S. interests and those of its allies. It also requires the military to take certain defensive cyber measures, including the creation of a new insider threat program.

The National Defense Authorization Act doesn't give the military carte blanche to unleash malware across the Web. Rather, according to the act, such attacks must be carried out upon the President's direction, and are subject to both the law of warfare and the War Powers Resolution.

The military has long been interested in developing offensive cyber capabilities, but has rarely been open about it in public. In recent months, however, that's begun to change.

National Security Agency director and Cyber Command commander Gen. Keith Alexander said in October that "the advantage is on the offense" regarding cyber, and that the government should in some cases go after botnets and other malicious actors. Then, in November, the Defense Advanced Research Projects Agency (DARPA) for the first time publicly discussed the fact that it was doing research into offensive cyber capabilities.

[ Learn more about DARPA's study of cyber offense strategies. DARPA Boosts Cybersecurity Research Spending 50%. ]

In addition to affirming the military's right to carry out cyber attacks, the defense budget also sets prescriptions for network defense, sets the stage for an insider threat mitigation program, increases collaboration between the DOD and the Department of Homeland Security, and requires the annual report on the Chinese military to include an analysis of its cyber capabilities.

The act directs the secretary of defense to acquire more advanced cybersecurity capabilities to "discover and isolate" successful attacks for which signatures haven't been developed. The capabilities will need to be "adequate to enable well-trained analysts" to discover advanced persistent threats, and work with endpoints, network gateways, and across global networks. The military will have to report to Congress by April 1 as to how it plans to go about meeting this requirement.

The host-based security will need to be able to block unauthorized software and accept authorized software, constantly monitor system settings, and remediate derivations from baseline settings. At the gateway level, the military must capture and analyze network traffic. Cyber Command will set how much data these systems must capture and store, according to the act.

Included in the act is a push toward standardization across the military's security information and event management systems in an effort to improve Cyber Command's ability to see and correlate data across the military's disparate cybersecurity systems. In another nod toward standardization, rather than the development of government-specific technology, the act builds in a requirement that the military look outside its own borders for this capability, toward commercial sources.

The act also directs the military to increase the "number and skill" of cybersecurity pros. The cyber workforce has become an increasingly critical concern across government, including in the military, and the concern has even led to the creation of an interagency effort, the National Initiative for Cybersecurity Education, to accelerate the education and hiring of cyber pros. In addition to hiring more cyber warriors of our own, the act also authorizes the DOD to assign foreign military forces to DOD to train them in the art of cyber war and defense.

As to insider threats, the act requires the military to set up a program over the next two years to detect unauthorized access, use, or transmission of sensitive information. Insider threats have continued to have a raised profile in government since the WikiLeaks debacle unfolded, and the military, home of accused leaker Bradley Manning, has been at the center of much of the debate.

The new law requires the insider threat program to centralize the monitoring and detection of unauthorized activities by monitoring the use of external ports; disabling removable media ports; reporting unusual user activity; implementing role-based access; and using data-loss prevention and data-rights management technology to prevent leaks.

How 10 federal agencies are tapping the power of cloud computing--without compromising security. Also in the new, all-digital InformationWeek Government supplement: To judge the success of the OMB's IT reform efforts, we need concrete numbers on cost savings and returns. Download our Cloud In Action issue of InformationWeek Government now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Why else would HR ask me if I have a handicap?"
Current Issue
The Changing Face of Identity Management
Mobility and cloud services are altering the concept of user identity. Here are some ways to keep up.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio

The cybersecurity profession struggles to retain women (figures range from 10 to 20 percent). It's particularly worrisome for an industry with a rapidly growing number of vacant positions.

So why does the shortage of women continue to be worse in security than in other IT sectors? How can men in infosec be better allies for women; and how can women be better allies for one another? What is the industry doing to fix the problem -- what's working, and what isn't?

Is this really a problem at all? Are the low numbers simply an indication that women do not want to be in cybersecurity, and is it possible that more women will never want to be in cybersecurity? How many women would we need to see in the industry to declare success?

Join Dark Reading senior editor Sara Peters and guests Angela Knox of Cloudmark, Barrett Sellers of Arbor Networks, Regina Wallace-Jones of Facebook, Steve Christey Coley of MITRE, and Chris Roosenraad of M3AAWG on Wednesday, July 13 at 1 p.m. Eastern Time to discuss all this and more.