Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

7/14/2011
02:40 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

U.S. Military Outlines Cyber Security Strategy

The strategy focuses on bolstering the military's cyber defenses with new technology, new organizations, and new partnerships with the private sector and foreign allies.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
The U.S. military could respond to serious cyber attacks, even on private infrastructure, with "a proportional and justified military response," deputy secretary of defense William Lynn said Thursday during the announcement of the Department of Defense's Strategy for Operating in Cyberspace, the U.S. military's first comprehensive blueprint for cybersecurity and cyberwarfare.

In releasing the strategy, officials pointed to a continuing increase in the number and severity of cyber threats. For example, Lynn detailed a March attack in which 24,000 files related to a weapons system being developed for the DOD were stolen from a defense contractor in an attack that the department suspects was the act of a foreign intelligence service. Lynn said that the attack removed sensitive design files, and that the DOD is currently assessing whether it needs to redesign any part of the system as a result of the attack.

"The centrality of information technology to our military operations and our society virtually guarantees that future adversaries will target our dependence on it," Lynn said. "Our assessment is that cyber attacks will be a significant component of any future conflict."

In response, Lynn said, a strategy to prepare for and defend against cyber hostilities is key to the DOD's mission. The DOD's strategy is founded on five pillars: treating cyberspace as an operational domain like land or sea, introducing improved defenses and new operating concepts for DOD networks, working with DHS and the private sector to secure critical infrastructure, working with the international community, and building a stronger cyber workforce and investing in cybersecurity research and development.

The cyber strategy is but one piece of a larger push by the Department of Defense to address cybersecurity, and the key pieces of DOD's strategy can be seen in some of the military's recent actions on cyber as well as its plans for the future.

Last year, for example, DOD created U.S. Cyber Command, a new military unit dedicated to protecting military networks from attack, and the DOD is now working to integrate cyber scenarios into its exercises and training, including the use of cyber red teams during war games. It also deepened its cooperation with the Department of Homeland Security, which protects the federal government's civilian networks from attacks.

The international arena is another important part of the DOD's strategy, as the military has ramped up cooperation with key allies like Australia, Canada, the United Kingdom, and Japan. Lynn called international law in cyberspace "one of the great challenges" of cybersecurity, and said that the United States would pursue international forums to "set up international norms," possibly including treaties.

Lynn highlighted the Defense Industrial Base Cyber Pilot, a voluntary effort in which the DOD is working with a handful of defense contractors and Internet service providers to identify and stop attacks on their networks. While the pilot has only been up and running for a few months, Lynn said that it has already begun stopping intrusions for some of those companies involved. The pilot is scheduled to end later this summer, and DOD will then determine whether and how to expand the program.

In addition, Lynn said, DOD has committed about $500 million to cybersecurity R&D. Among the research Lynn highlighted are efforts to have computers automatically adapt to new threats, and to "keep data encrypted as we perform regular computer operations."

The aim of the strategy, according to Lynn, is not only to prepare the military for emerging cyber threats, but also a bit of a public relations exercise, an effort to address "concerns that cyberspace is at risk of being militarized" and "fundamentally altered by the military's efforts to defend it." That view, Lynn implied, is inaccurate, and he affirmed the military's commitment to an open Internet. "The strategy we are announcing today provides a framework for us to promote our nation's values in this vital civilian space while carrying out our duty to protect the nation," Lynn said.

The DOD strategy took shape over the last several months under the leadership of a number of top DOD and White House officials. In addition to Lynn and Gen. James Cartwright, other key officials Lynn cited in his speech included White House cybersecurity coordinator Howard Schmidt, DOD CIO Teri Takai, DOD cyber policy lead Bob Butler, U.S. Cybercom commander Gen. Keith Alexander, and DOD principal deputy undersecretary for policy Jim Miller.

What industry can teach government about IT innovation and efficiency. Also in the new, all-digital issue of InformationWeek Government: Federal agencies have to shift from annual IT security assessments to continuous monitoring of their risks. Download it now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
SOC 2s & Third-Party Assessments: How to Prevent Them from Being Used in a Data Breach Lawsuit
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC,  12/5/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-4095
PUBLISHED: 2019-12-10
IBM Cloud Pak System 2.3 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 158015.
CVE-2019-4244
PUBLISHED: 2019-12-10
IBM SmartCloud Analytics 1.3.1 through 1.3.5 could allow a remote attacker to gain unauthorized information and unrestricted control over Zookeeper installations due to missing authentication. IBM X-Force ID: 159518.
CVE-2019-4521
PUBLISHED: 2019-12-10
Platform System Manager in IBM Cloud Pak System 2.3 is potentially vulnerable to CVS Injection. A remote attacker could execute arbitrary commands on the system, caused by improper validation of csv file contents. IBM X-Force ID: 165179.
CVE-2019-4663
PUBLISHED: 2019-12-10
IBM WebSphere Application Server - Liberty is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 171245...
CVE-2019-19251
PUBLISHED: 2019-12-10
The Last.fm desktop app (Last.fm Scrobbler) through 2.1.39 on macOS makes HTTP requests that include an API key without the use of SSL/TLS. Although there is an Enable SSL option, it is disabled by default, and cleartext requests are made as soon as the app starts.