Risk

12/8/2008
02:44 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

U.S. Losing Cyberspace Security Battle

The incoming Obama administration has more than two dozen recommendations to about how to more effectively defend cyberspace, as part of a CSIS commission report.

A new cybersecurity report released on Monday by the Center for Strategic & International Studies Commission on Cybersecurity for the 44th Presidency warns that America is losing the battle to protect cyberspace.

The CSIS report, "Securing Cyberspace for the 44th Presidency," states that cybersecurity "is a strategic issue on par with weapons of mass destruction and global jihad" and that it "can no longer be relegated to information technology offices and chief information officers."

Identifying cybersecurity as one of the major national security issues facing the country, the commission's report calls for a comprehensive national security strategy that also respects American values related to privacy and civil liberties.

"[G]reater security must reinforce citizens' rights, not come at their expense," the report states.

The report suggests that America's strategic situation today is analogous to Germany's during World War II, when German military leaders overestimated the strength of their cryptographic codes.

"The United States is in a similar position today, but we are not playing the role of the British [who cracked Germany's Enigma codes]," the report says. "Foreign opponents, through a combination of skill, luck, and perseverance, have been able to penetrate poorly protected U.S. computer networks and collect immense quantities of valuable information."

America, in other words, has been hacked.

Marcus Sachs, executive director of government affairs and national security policy at Verizon and a member of the CSIS commission, thinks the analogy is a fair one. "Unfortunately, that's what we're facing at the moment," he said in a phone interview.

He argues that cybersecurity must become a national priority. "The essence of cyberspace is now the soul of our country," he said. "This is what we are. A hundred years ago, you'd have said heavy industry is our soul. Now it's cyberspace."

"The reality is that the secret briefings given to the president, the National Security Council, and others show MUCH greater losses than have been publicly acknowledged," said Alan Paller, director of research for the SANS Institute, in an e-mail. "The proof, if you need confirmation, comes from President Bush's approval of the 11 digit (tens of billions of dollars) price tag for the new Cyber Initiative that the commission report says should be built upon. That's a huge price tag and you can guess what was disclosed to him to get that level of spending."

The report makes more than two dozen recommendations to the incoming Obama administration about how to more effectively defend cyberspace. These include a declaration of commitment to protecting cyberspace, increased organizational efforts to coordinate such protection, rebuilding public-private partnerships toward that end, regulations for securing critical cybe infrastructure, and stronger identity management capabilities, among others.

Many of the recommendations are similar to policy initiatives promised by President-elect Obama on Change.gov. Sachs said that's not coincidental, noting that many of those contributing to the report are part of the Obama administration's transition team. And that's a good thing, as he sees it, because neither the Clinton administration nor the Bush administration had similar advice months before taking office.

The report acknowledges that different constituencies -- privacy, law enforcement, business, technology, and national security -- may have differing or discordant views on the subject of cybersecurity. It argues that this diversity of viewpoints can become our strength "if we make the broad national interest the lodestar for our decisions."

InformationWeek has done its own independent assessment of cybersecurity. Download the 2008 report here (registration required).

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark Reading,  5/24/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11505
PUBLISHED: 2018-05-26
The Werewolf Online application 0.8.8 for Android allows attackers to discover the Firebase token by reading logcat output.
CVE-2018-6409
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. The module in charge of serving stored files gets the path from the database. Modifying the name of the file to serve on the corresponding ap_form table leads to a path traversal vulnerability via the download.php q parameter.
CVE-2018-6410
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. There is a download.php SQL injection via the q parameter.
CVE-2018-6411
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. When the form is set to filter a blacklist, it automatically adds dangerous extensions to the filters. If the filter is set to a whitelist, the dangerous extensions can be bypassed through ap_form_elements SQL Injection.
CVE-2018-11500
PUBLISHED: 2018-05-26
An issue was discovered in PublicCMS V4.0.20180210. There is a CSRF vulnerability in "admin/sysUser/save.do?callbackType=closeCurrent&navTabId=sysUser/list" that can add an admin account.