Risk
7/10/2012
10:51 AM
Connect Directly
RSS
E-Mail
50%
50%

Pentagon's Electronic Warfare Strategy Incomplete, GAO Says

Government Accountability Office report finds DOD has not established clear lines of responsibility in electronic warfare and cyberspace operations.

Defense Tech: 20 War-Fighting Innovations
Military Transformers: 20 Innovative Defense Technologies
(click image for larger view and for slideshow)
The Department of Defense's readiness for electronic warfare still needs improvement, according to a new report from the Government Accountability Office.

Citing an "increasing quality and availability of electronic warfare capabilities" by other governments and "non-state actors," the GAO recommended a series of steps to be taken by the Pentagon, including more clearly defining roles and responsibilities for electronic warfare management.

The GAO defines electronic warfare as "any military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy." The electromagnetic spectrum includes radio, microwave, infrared, visible, ultraviolet, X-rays, and gamma rays. The DOD has invested billions of dollars in weapons and communications systems that rely on access to the electromagnetic spectrum.

[ Read about the DOD's mobile device strategy. See Pentagon Outlines Mobile Device Plan. ]

The GAO report follows the November 2011 release of DOD's annual report to Congress on its electronic warfare strategy. Last December, the DOD made the Joint Electromagnetic Spectrum Control Center (JEMSCC), which operates under the umbrella of U.S. Strategic Command, its focal point for electronic warfare operations. But GAO determined that there is no comprehensive implementation plan to define the center's objectives and major tasks.

"DOD has taken some steps to address a critical leadership gap identified in 2009, but it has not established a department-wide governance framework for planning, directing, and controlling electronic warfare activities," said the GAO.

The Air Force, Army, Marines, and Navy each acquire their own airborne electronic attack systems, and GAO observed that opportunities may exist to consolidate some of those acquisition efforts. "With the prospect of slowly-growing or flat defense budgets for years to come, the department must get better returns on its weapon system investments and find ways to deliver more capability to the warfighter for less than it has in the past," the report said.

GAO called attention to the relationship between electronic warfare and cyberspace operations, including the use of cyberspace capabilities to achieve military objectives, such as attacking or exploiting enemy computer networks. Because cyberspace capabilities require ways to communicate with networks, they must be able to make use of the electromagnetic spectrum. "Electronic warfare and cyberspace operations are complementary and have potentially synergistic effects," the report stated.

GAO made recommendations for improving DOD's management of electronic warfare operations and capabilities. They include directing the Under Secretary for Acquisition, Technology, and Logistics (AT&L) and other officials to publish performance measures to help guide strategy implementation, to identify required resources, and to articulate the roles and responsibilities of the people involved. The GAO also recommended that the objectives and major tasks of the JEMSCC be better-defined.

The Office of Management and Budget demands that federal agencies tap into a more efficient IT delivery model. The new Shared Services Mandate issue of InformationWeek Government explains how they're doing it. Also in this issue: Uncle Sam should develop an IT savings dashboard that shows the returns on its multibillion-dollar IT investment. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
PJS880
50%
50%
PJS880,
User Rank: Ninja
7/10/2012 | 3:41:36 PM
re: Pentagon's Electronic Warfare Strategy Incomplete, GAO Says
If the Accountability office is telling you that you have gaps in your security measures I would listen. If the DOD does not currently test performance, I am curious how they know how to mark progress or if the changes they make are beneficial. It also seems that the DOD needs to establish a center wide protocol for dealing with electronic warfare. The increase in technological advances and the budget not increasing to meet those needs will create another weakness with their security. Unfortunately to keep up with the bad guys it costs a lot of money!
Paul Sprague
InformationWeek Contributor
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4448
Published: 2014-10-22
House Arrest in Apple iOS before 8.1 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information from a Documents directory by obtaining this UID.

CVE-2014-4449
Published: 2014-10-22
iCloud Data Access in Apple iOS before 8.1 does not verify X.509 certificates from TLS servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-4450
Published: 2014-10-22
The QuickType feature in the Keyboards subsystem in Apple iOS before 8.1 collects typing-prediction data from fields with an off autocomplete attribute, which makes it easier for attackers to discover credentials by reading credential values within unintended DOM input elements.

CVE-2012-5242
Published: 2014-10-21
Directory traversal vulnerability in functions/suggest.php in Banana Dance B.2.6 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the name parameter in a get_template action.

CVE-2012-5243
Published: 2014-10-21
functions/suggest.php in Banana Dance B.2.6 and earlier allows remote attackers to read arbitrary database information via a crafted request.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.