Risk
12/8/2008
02:44 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

U.S. Losing Cyberspace Security Battle

The incoming Obama administration has more than two dozen recommendations to about how to more effectively defend cyberspace, as part of a CSIS commission report.

A new cybersecurity report released on Monday by the Center for Strategic & International Studies Commission on Cybersecurity for the 44th Presidency warns that America is losing the battle to protect cyberspace.

The CSIS report, "Securing Cyberspace for the 44th Presidency," states that cybersecurity "is a strategic issue on par with weapons of mass destruction and global jihad" and that it "can no longer be relegated to information technology offices and chief information officers."

Identifying cybersecurity as one of the major national security issues facing the country, the commission's report calls for a comprehensive national security strategy that also respects American values related to privacy and civil liberties.

"[G]reater security must reinforce citizens' rights, not come at their expense," the report states.

The report suggests that America's strategic situation today is analogous to Germany's during World War II, when German military leaders overestimated the strength of their cryptographic codes.

"The United States is in a similar position today, but we are not playing the role of the British [who cracked Germany's Enigma codes]," the report says. "Foreign opponents, through a combination of skill, luck, and perseverance, have been able to penetrate poorly protected U.S. computer networks and collect immense quantities of valuable information."

America, in other words, has been hacked.

Marcus Sachs, executive director of government affairs and national security policy at Verizon and a member of the CSIS commission, thinks the analogy is a fair one. "Unfortunately, that's what we're facing at the moment," he said in a phone interview.

He argues that cybersecurity must become a national priority. "The essence of cyberspace is now the soul of our country," he said. "This is what we are. A hundred years ago, you'd have said heavy industry is our soul. Now it's cyberspace."

"The reality is that the secret briefings given to the president, the National Security Council, and others show MUCH greater losses than have been publicly acknowledged," said Alan Paller, director of research for the SANS Institute, in an e-mail. "The proof, if you need confirmation, comes from President Bush's approval of the 11 digit (tens of billions of dollars) price tag for the new Cyber Initiative that the commission report says should be built upon. That's a huge price tag and you can guess what was disclosed to him to get that level of spending."

The report makes more than two dozen recommendations to the incoming Obama administration about how to more effectively defend cyberspace. These include a declaration of commitment to protecting cyberspace, increased organizational efforts to coordinate such protection, rebuilding public-private partnerships toward that end, regulations for securing critical cybe infrastructure, and stronger identity management capabilities, among others.

Many of the recommendations are similar to policy initiatives promised by President-elect Obama on Change.gov. Sachs said that's not coincidental, noting that many of those contributing to the report are part of the Obama administration's transition team. And that's a good thing, as he sees it, because neither the Clinton administration nor the Bush administration had similar advice months before taking office.

The report acknowledges that different constituencies -- privacy, law enforcement, business, technology, and national security -- may have differing or discordant views on the subject of cybersecurity. It argues that this diversity of viewpoints can become our strength "if we make the broad national interest the lodestar for our decisions."

InformationWeek has done its own independent assessment of cybersecurity. Download the 2008 report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3341
Published: 2014-08-19
The SNMP module in Cisco NX-OS 7.0(3)N1(1) and earlier on Nexus 5000 and 6000 devices provides different error messages for invalid requests depending on whether the VLAN ID exists, which allows remote attackers to enumerate VLANs via a series of requests, aka Bug ID CSCup85616.

CVE-2014-3464
Published: 2014-08-19
The EJB invocation handler implementation in Red Hat JBossWS, as used in JBoss Enterprise Application Platform (EAP) 6.2.0 and 6.3.0, does not properly enforce the method level restrictions for outbound messages, which allows remote authenticated users to access otherwise restricted JAX-WS handlers ...

CVE-2014-3472
Published: 2014-08-19
The isCallerInRole function in SimpleSecurityManager in JBoss Application Server (AS) 7, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 6.3.0, does not properly check caller roles, which allows remote authenticated users to bypass access restrictions via unspecified vectors.

CVE-2014-3490
Published: 2014-08-19
RESTEasy 2.3.1 before 2.3.8.SP2 and 3.x before 3.0.9, as used in Red Hat JBoss Enterprise Application Platform (EAP) 6.3.0, does not disable external entities when the resteasy.document.expand.entity.references parameter is set to false, which allows remote attackers to read arbitrary files and have...

CVE-2014-3504
Published: 2014-08-19
The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Dark Reading continuing coverage of the Black Hat 2014 conference brings interviews and commentary to Dark Reading listeners.