Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

11/7/2011
01:29 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

DARPA Boosts Cybersecurity Research Spending 50%

Defense research agency calls boosting the nation's cyber offense, as well as defensive capabilities, crucial to combating modern threats.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
The Defense Advanced Projects Research Agency, birthplace of the Internet, plans to increase its spending on cyber research 50% over the next five years, and will increasingly focus on offensive cyber capabilities as well as defensive capabilities, agency director Regina Dugan said Monday.

"Modern warfare will demand the effective use of cyber, kinetic, and combined cyber and kinetic means," Dugan said, speaking before the DARPA Cyber Colloquium, a gathering of cyber professionals. "We need more options, we need more speed, and we need more scale. We must both protect its peaceful shared use as well as prepare for hostile cyber acts that threaten our military capabilities." DARPA sought $208 million in cyber spending in fiscal 2012, up from $120 million the year before, and that's just the start of the jump in spending.

Monday's speech was the first time that Dugan has publicly discussed DARPA's offensive cyber research, according to a DARPA spokesman. While she didn't go into deep details, other military speakers also mentioned offensive capabilities in more coded terms. For example, Army Cyber Command director Lt. Gen. Rhett Hernandez called for "cyber warriors" who could "operationalize cyberspace" with a "full range of cyber capabilities," including offensive capabilities.

Dugan repeated an oft repeated line that while military and critical infrastructure networks have grown more secure in recent years, they remain easily penetrated. She called the ability to grapple with security at Internet speed and scale "one of the most intense challenges of our time," and said that DARPA and others must come up with creative solutions to the challenge.

[The U.S. is already working with its allies to boost our cyber defense skills. Read U.S., Europe Do First Joint Exercise On Cybersecurity.]

In a speech after Dugan's, U.S. Cyber Command commander Gen. Keith Alexander outlined, by way of example, the scope of the challenge, noting recent well-publicized attacks on Nasdaq, RSA, Sony, Google, and Booz Allen Hamilton. "These organizations are supposed to be the best in the market, and in my opinion, they are," he said. "But they're the ones that recognized they were attacked. Most don't."

Dugan and other speakers echoed the idea that the current approach of layering security technology upon security technology will not resolve the problem, but will only result in more complexity.

"We are losing ground because we are inherently divergent from the threat," she said, noting that while the size of viruses has remained small over the years, the defensive security apparatus continues to grow. "Such divergences are the seeds of surprise, and this [size disparity] is a striking example of why it's currently easier to play offense rather than defense in cyber. This is not to suggest that we stop doing what we are doing in cybersecurity. But if we continue only down the current path, we will not converge with the threat."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Henry Hertz Hobbit
50%
50%
Henry Hertz Hobbit,
User Rank: Apprentice
11/15/2011 | 12:10:04 PM
re: DARPA Boosts Cybersecurity Research Spending 50%
At this point the problem is so huge no team of security analysts stands a fighting chance of even knowing where to begin. The military needs a standardized Linux distro that is infintely more stable than what is available now. Either that or create their own OS that has file ownership and usage permissions. Once they have that standardized platform and get Windows out of the mix then they will have a fighting chance of hammering the other stuff down. The way it is now, it takes just one slip and a whole building full of Windows machines can be infected. VM doesn't help you either. Even though the infection may go away when you shut your machine down it can come right back via your neighbor's infected machine when you boot back up. Usually it only takes a few hours for the third party to siphon off all the information they want anyway. I strongly recommend that DARPA shifts the vast majority of their desktop platforms first. Then they can start to work on the other problems.
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16246
PUBLISHED: 2019-12-12
Intesync Solismed 3.3sp1 allows Local File Inclusion (LFI), a different vulnerability than CVE-2019-15931. This leads to unauthenticated code execution.
CVE-2019-17358
PUBLISHED: 2019-12-12
Cacti through 1.2.7 is affected by multiple instances of lib/functions.php unsafe deserialization of user-controlled data to populate arrays. An authenticated attacker could use this to influence object data values and control actions taken by Cacti or potentially cause memory corruption in the PHP ...
CVE-2019-17428
PUBLISHED: 2019-12-12
An issue was discovered in Intesync Solismed 3.3sp1. An flaw in the encryption implementation exists, allowing for all encrypted data stored within the database to be decrypted.
CVE-2019-18345
PUBLISHED: 2019-12-12
A reflected XSS issue was discovered in DAViCal through 1.1.8. It echoes the action parameter without encoding. If a user visits an attacker-supplied link, the attacker can view all data the attacked user can view, as well as perform all actions in the name of the user. If the user is an administrat...
CVE-2019-19198
PUBLISHED: 2019-12-12
The Scoutnet Kalender plugin 1.1.0 for WordPress allows XSS.