Risk
11/7/2011
01:29 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

DARPA Boosts Cybersecurity Research Spending 50%

Defense research agency calls boosting the nation's cyber offense, as well as defensive capabilities, crucial to combating modern threats.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
The Defense Advanced Projects Research Agency, birthplace of the Internet, plans to increase its spending on cyber research 50% over the next five years, and will increasingly focus on offensive cyber capabilities as well as defensive capabilities, agency director Regina Dugan said Monday.

"Modern warfare will demand the effective use of cyber, kinetic, and combined cyber and kinetic means," Dugan said, speaking before the DARPA Cyber Colloquium, a gathering of cyber professionals. "We need more options, we need more speed, and we need more scale. We must both protect its peaceful shared use as well as prepare for hostile cyber acts that threaten our military capabilities." DARPA sought $208 million in cyber spending in fiscal 2012, up from $120 million the year before, and that's just the start of the jump in spending.

Monday's speech was the first time that Dugan has publicly discussed DARPA's offensive cyber research, according to a DARPA spokesman. While she didn't go into deep details, other military speakers also mentioned offensive capabilities in more coded terms. For example, Army Cyber Command director Lt. Gen. Rhett Hernandez called for "cyber warriors" who could "operationalize cyberspace" with a "full range of cyber capabilities," including offensive capabilities.

Dugan repeated an oft repeated line that while military and critical infrastructure networks have grown more secure in recent years, they remain easily penetrated. She called the ability to grapple with security at Internet speed and scale "one of the most intense challenges of our time," and said that DARPA and others must come up with creative solutions to the challenge.

[The U.S. is already working with its allies to boost our cyber defense skills. Read U.S., Europe Do First Joint Exercise On Cybersecurity.]

In a speech after Dugan's, U.S. Cyber Command commander Gen. Keith Alexander outlined, by way of example, the scope of the challenge, noting recent well-publicized attacks on Nasdaq, RSA, Sony, Google, and Booz Allen Hamilton. "These organizations are supposed to be the best in the market, and in my opinion, they are," he said. "But they're the ones that recognized they were attacked. Most don't."

Dugan and other speakers echoed the idea that the current approach of layering security technology upon security technology will not resolve the problem, but will only result in more complexity.

"We are losing ground because we are inherently divergent from the threat," she said, noting that while the size of viruses has remained small over the years, the defensive security apparatus continues to grow. "Such divergences are the seeds of surprise, and this [size disparity] is a striking example of why it's currently easier to play offense rather than defense in cyber. This is not to suggest that we stop doing what we are doing in cybersecurity. But if we continue only down the current path, we will not converge with the threat."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Henry Hertz Hobbit
50%
50%
Henry Hertz Hobbit,
User Rank: Apprentice
11/15/2011 | 12:10:04 PM
re: DARPA Boosts Cybersecurity Research Spending 50%
At this point the problem is so huge no team of security analysts stands a fighting chance of even knowing where to begin. The military needs a standardized Linux distro that is infintely more stable than what is available now. Either that or create their own OS that has file ownership and usage permissions. Once they have that standardized platform and get Windows out of the mix then they will have a fighting chance of hammering the other stuff down. The way it is now, it takes just one slip and a whole building full of Windows machines can be infected. VM doesn't help you either. Even though the infection may go away when you shut your machine down it can come right back via your neighbor's infected machine when you boot back up. Usually it only takes a few hours for the third party to siphon off all the information they want anyway. I strongly recommend that DARPA shifts the vast majority of their desktop platforms first. Then they can start to work on the other problems.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-2595
Published: 2014-08-31
The device-initialization functionality in the MSM camera driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, enables MSM_CAM_IOCTL_SET_MEM_MAP_INFO ioctl calls for an unrestricted mmap interface, which all...

CVE-2013-2597
Published: 2014-08-31
Stack-based buffer overflow in the acdb_ioctl function in audio_acdb.c in the acdb audio driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via an application that lever...

CVE-2013-2598
Published: 2014-08-31
app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to overwrite signature-verification code via crafted boot-image load-destination header values that specify memory ...

CVE-2013-2599
Published: 2014-08-31
A certain Qualcomm Innovation Center (QuIC) patch to the NativeDaemonConnector class in services/java/com/android/server/NativeDaemonConnector.java in Code Aurora Forum (CAF) releases of Android 4.1.x through 4.3.x enables debug logging, which allows attackers to obtain sensitive disk-encryption pas...

CVE-2013-6124
Published: 2014-08-31
The Qualcomm Innovation Center (QuIC) init scripts in Code Aurora Forum (CAF) releases of Android 4.1.x through 4.4.x allow local users to modify file metadata via a symlink attack on a file accessed by a (1) chown or (2) chmod command, as demonstrated by changing the permissions of an arbitrary fil...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.