Risk
6/23/2009
08:33 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Defense Secretary Orders Cyberspace Command

Initiative aims to unify offense and defense in cyberspace under U.S. military command and enable responses "in Internet time rather than bureaucratic time."

Defense Secretary Robert Gates on Tuesday issued an order establishing the U.S. Cyber Command to oversee military cyberspace operations.

"Cyberspace and its associated technologies offer unprecedented opportunities to the United States and are vital to our nation's security and, by extension, to all aspects of military operations," the memo says. "Yet our increasing dependency on cyberspace, alongside a growing array of cyberthreats and vulnerabilities, adds a new element of risk to our national security."

To address that risk, the memo continues, the Department of Defense must have a command focused on cyberspace that can coordinate online military operations around the globe while also supporting civil authorities and international partners.

Gates' order wasn't unexpected. Unconfirmed reports two months ago indicated that the Department of Defense was planning to set up a cyberspace command.

Gates' memo states that he intends to recommend that the director of the National Security Agency -- a position currently held by Lt. Gen. Keith B. Alexander -- should be granted the command in addition to his current responsibilities.

The memo states that the preferred location for the headquarters for the new command is Fort Meade, Md., but it acknowledges that laws and regulations may dictate otherwise.

Alan Paller, director of research for the SANS Institute, calls the plan a good idea. He expects the new command will unify offense and defense in cyberspace, improve interoperability and information sharing among military services so they can respond "in Internet time rather than bureaucratic time," and improve career paths for cyberwarriors.

"The only downside is the possibility that they will so militarize the Information Assurance Division of NSA that they stop it from fully realizing the promise of S-CAP and the other public-private partnership initiatives that will be critical for turning the tide against the attackers," he said in an e-mail.


InformationWeek and DarkReading.com have published a report on data-centric protection. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.