Risk
7/14/2011
02:40 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

U.S. Military Outlines Cyber Security Strategy

The strategy focuses on bolstering the military's cyber defenses with new technology, new organizations, and new partnerships with the private sector and foreign allies.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
The U.S. military could respond to serious cyber attacks, even on private infrastructure, with "a proportional and justified military response," deputy secretary of defense William Lynn said Thursday during the announcement of the Department of Defense's Strategy for Operating in Cyberspace, the U.S. military's first comprehensive blueprint for cybersecurity and cyberwarfare.

In releasing the strategy, officials pointed to a continuing increase in the number and severity of cyber threats. For example, Lynn detailed a March attack in which 24,000 files related to a weapons system being developed for the DOD were stolen from a defense contractor in an attack that the department suspects was the act of a foreign intelligence service. Lynn said that the attack removed sensitive design files, and that the DOD is currently assessing whether it needs to redesign any part of the system as a result of the attack.

"The centrality of information technology to our military operations and our society virtually guarantees that future adversaries will target our dependence on it," Lynn said. "Our assessment is that cyber attacks will be a significant component of any future conflict."

In response, Lynn said, a strategy to prepare for and defend against cyber hostilities is key to the DOD's mission. The DOD's strategy is founded on five pillars: treating cyberspace as an operational domain like land or sea, introducing improved defenses and new operating concepts for DOD networks, working with DHS and the private sector to secure critical infrastructure, working with the international community, and building a stronger cyber workforce and investing in cybersecurity research and development.

The cyber strategy is but one piece of a larger push by the Department of Defense to address cybersecurity, and the key pieces of DOD's strategy can be seen in some of the military's recent actions on cyber as well as its plans for the future.

Last year, for example, DOD created U.S. Cyber Command, a new military unit dedicated to protecting military networks from attack, and the DOD is now working to integrate cyber scenarios into its exercises and training, including the use of cyber red teams during war games. It also deepened its cooperation with the Department of Homeland Security, which protects the federal government's civilian networks from attacks.

The international arena is another important part of the DOD's strategy, as the military has ramped up cooperation with key allies like Australia, Canada, the United Kingdom, and Japan. Lynn called international law in cyberspace "one of the great challenges" of cybersecurity, and said that the United States would pursue international forums to "set up international norms," possibly including treaties.

Lynn highlighted the Defense Industrial Base Cyber Pilot, a voluntary effort in which the DOD is working with a handful of defense contractors and Internet service providers to identify and stop attacks on their networks. While the pilot has only been up and running for a few months, Lynn said that it has already begun stopping intrusions for some of those companies involved. The pilot is scheduled to end later this summer, and DOD will then determine whether and how to expand the program.

In addition, Lynn said, DOD has committed about $500 million to cybersecurity R&D. Among the research Lynn highlighted are efforts to have computers automatically adapt to new threats, and to "keep data encrypted as we perform regular computer operations."

The aim of the strategy, according to Lynn, is not only to prepare the military for emerging cyber threats, but also a bit of a public relations exercise, an effort to address "concerns that cyberspace is at risk of being militarized" and "fundamentally altered by the military's efforts to defend it." That view, Lynn implied, is inaccurate, and he affirmed the military's commitment to an open Internet. "The strategy we are announcing today provides a framework for us to promote our nation's values in this vital civilian space while carrying out our duty to protect the nation," Lynn said.

The DOD strategy took shape over the last several months under the leadership of a number of top DOD and White House officials. In addition to Lynn and Gen. James Cartwright, other key officials Lynn cited in his speech included White House cybersecurity coordinator Howard Schmidt, DOD CIO Teri Takai, DOD cyber policy lead Bob Butler, U.S. Cybercom commander Gen. Keith Alexander, and DOD principal deputy undersecretary for policy Jim Miller.

What industry can teach government about IT innovation and efficiency. Also in the new, all-digital issue of InformationWeek Government: Federal agencies have to shift from annual IT security assessments to continuous monitoring of their risks. Download it now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5208
Published: 2014-12-22
BKBCopyD.exe in the Batch Management Packages in Yokogawa CENTUM CS 3000 through R3.09.50 and CENTUM VP through R4.03.00 and R5.x through R5.04.00, and Exaopc through R3.72.10, does not require authentication, which allows remote attackers to read arbitrary files via a RETR operation, write to arbit...

CVE-2014-7286
Published: 2014-12-22
Buffer overflow in AClient in Symantec Deployment Solution 6.9 and earlier on Windows XP and Server 2003 allows local users to gain privileges via unspecified vectors.

CVE-2014-8015
Published: 2014-12-22
The Sponsor Portal in Cisco Identity Services Engine (ISE) allows remote authenticated users to obtain access to an arbitrary sponsor's guest account via a modified HTTP request, aka Bug ID CSCur64400.

CVE-2014-8017
Published: 2014-12-22
The periodic-backup feature in Cisco Identity Services Engine (ISE) allows remote attackers to discover backup-encryption passwords via a crafted request that triggers inclusion of a password in a reply, aka Bug ID CSCur41673.

CVE-2014-8018
Published: 2014-12-22
Multiple cross-site scripting (XSS) vulnerabilities in Business Voice Services Manager (BVSM) pages in the Application Software in Cisco Unified Communications Domain Manager 8 allow remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug IDs CSCur19651, CSCur18555, CSCur1...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.