Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

7/14/2011
02:40 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

U.S. Military Outlines Cyber Security Strategy

The strategy focuses on bolstering the military's cyber defenses with new technology, new organizations, and new partnerships with the private sector and foreign allies.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
The U.S. military could respond to serious cyber attacks, even on private infrastructure, with "a proportional and justified military response," deputy secretary of defense William Lynn said Thursday during the announcement of the Department of Defense's Strategy for Operating in Cyberspace, the U.S. military's first comprehensive blueprint for cybersecurity and cyberwarfare.

In releasing the strategy, officials pointed to a continuing increase in the number and severity of cyber threats. For example, Lynn detailed a March attack in which 24,000 files related to a weapons system being developed for the DOD were stolen from a defense contractor in an attack that the department suspects was the act of a foreign intelligence service. Lynn said that the attack removed sensitive design files, and that the DOD is currently assessing whether it needs to redesign any part of the system as a result of the attack.

"The centrality of information technology to our military operations and our society virtually guarantees that future adversaries will target our dependence on it," Lynn said. "Our assessment is that cyber attacks will be a significant component of any future conflict."

In response, Lynn said, a strategy to prepare for and defend against cyber hostilities is key to the DOD's mission. The DOD's strategy is founded on five pillars: treating cyberspace as an operational domain like land or sea, introducing improved defenses and new operating concepts for DOD networks, working with DHS and the private sector to secure critical infrastructure, working with the international community, and building a stronger cyber workforce and investing in cybersecurity research and development.

The cyber strategy is but one piece of a larger push by the Department of Defense to address cybersecurity, and the key pieces of DOD's strategy can be seen in some of the military's recent actions on cyber as well as its plans for the future.

Last year, for example, DOD created U.S. Cyber Command, a new military unit dedicated to protecting military networks from attack, and the DOD is now working to integrate cyber scenarios into its exercises and training, including the use of cyber red teams during war games. It also deepened its cooperation with the Department of Homeland Security, which protects the federal government's civilian networks from attacks.

The international arena is another important part of the DOD's strategy, as the military has ramped up cooperation with key allies like Australia, Canada, the United Kingdom, and Japan. Lynn called international law in cyberspace "one of the great challenges" of cybersecurity, and said that the United States would pursue international forums to "set up international norms," possibly including treaties.

Lynn highlighted the Defense Industrial Base Cyber Pilot, a voluntary effort in which the DOD is working with a handful of defense contractors and Internet service providers to identify and stop attacks on their networks. While the pilot has only been up and running for a few months, Lynn said that it has already begun stopping intrusions for some of those companies involved. The pilot is scheduled to end later this summer, and DOD will then determine whether and how to expand the program.

In addition, Lynn said, DOD has committed about $500 million to cybersecurity R&D. Among the research Lynn highlighted are efforts to have computers automatically adapt to new threats, and to "keep data encrypted as we perform regular computer operations."

The aim of the strategy, according to Lynn, is not only to prepare the military for emerging cyber threats, but also a bit of a public relations exercise, an effort to address "concerns that cyberspace is at risk of being militarized" and "fundamentally altered by the military's efforts to defend it." That view, Lynn implied, is inaccurate, and he affirmed the military's commitment to an open Internet. "The strategy we are announcing today provides a framework for us to promote our nation's values in this vital civilian space while carrying out our duty to protect the nation," Lynn said.

The DOD strategy took shape over the last several months under the leadership of a number of top DOD and White House officials. In addition to Lynn and Gen. James Cartwright, other key officials Lynn cited in his speech included White House cybersecurity coordinator Howard Schmidt, DOD CIO Teri Takai, DOD cyber policy lead Bob Butler, U.S. Cybercom commander Gen. Keith Alexander, and DOD principal deputy undersecretary for policy Jim Miller.

What industry can teach government about IT innovation and efficiency. Also in the new, all-digital issue of InformationWeek Government: Federal agencies have to shift from annual IT security assessments to continuous monitoring of their risks. Download it now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5252
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
CVE-2019-5235
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
CVE-2019-5264
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
CVE-2019-5277
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
CVE-2019-5254
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...