DEFENSE IT

Cyber command faces urgent agenda

Military leaders expect new command to articulate its strategy — soon

Military leaders from the Army, Navy, Air Force and Marine Corps expect the Defense Department’s new unified Cyber Command to rationalize military cybersecurity efforts.

However, at the same time, the increasing complexity of cyberspace and ongoing workforce issues remain pressing challenges, adding urgency, they said, for the new command to articulate its strategy soon.

“We made conscious decision a year ago, knowing Cybercomm was coming, to [ensure the Army’s] direction was in sync with expected plans — and wait for the guidance,” said Maj. Gen. Gregory Schumacher, the Army's assistant deputy chief of staff.

“Now that [the Cyber Command] is here, my sense is now is the right time to move forward,” Schumacher added. But he cautioned it will be important to “get guidance from Cyber Command” soon, in terms of “what are the definitions, what are the forces and the structure, and not get ahead of that and create more confusion.”

Schumacher, speaking at a cybersecurity conference held in Washington by the D.C. chapter of the Armed Forces Communications and Electronics Association June 25, noted that cyberspace has become a complex operating environment that requires increasingly sophisticated skills.

He described the environment as one with many layers — beginning at the individual level and moving through the cyber-persona layer, the network layer, a physical layer, and a geographic layer. It’s further complicated by the fact that a single site can be accessed by multiple users; or one individual can have multiple domains.

“We see cyber cuts across geographic domains, and raises the question of what kind of forces do we preset,” he said.

At the same time, it’s important to recognize that changes in the military’s network defenses can give away important operating clues to U.S. adversaries, said Maj. Gen. David Senty, acting vice commander, Air Force Cyberspace Command (Provisional), and commander, Air Force Network Operations, Barksdale Air Force Base.

“Network operations today [need to be] approached differently,” Senty said. “When we make a network change, what are we telling our adversaries? And what might they conclude we’re changing? Everything we do, I want to know what fingerprints we’ve left,” he said.

Sentry, along with U.S. Navy Rear Adm. (Select) Sean Filipowski, raised the need to improve the cyber skills of the military’s workforce.

“We have two skills sets we’re looking for — expeditionary combat skills and cyber skills,” Senty said. “It’s a jump ball whether we combine them, or they will remain separate.”

“We consider every sailor who touches a computer is a cyber-warfare (specialist),” said Filipowski, director, Computer Network Operations of the Naval Network Warfare Command.

“We need to have instantaneous visibility into our networks and a common operational picture,” he added.

“What keeps me up at night,” said Ray Letteer, representing the U.S. Marine Corps, “are poor browser and SQL database configurations.” he said. “My blue teams that do operational tests keep finding issues,” he said, pointing to peer-to-peer operating systems, people failing to follow policies, and the reliance on passwords as some of the many ways systems are easily breached.

“Phishing is becoming more sophisticated,” said Letteer, who heads the Marine Corps’ Information Assurance Division in the Office of the Director, C4/DON Deputy Chief Information Officer.

“But I’m really concerned with this rush to social networking,” he said. “I’m not convinced of it yet. I know how easy it is to gather information. We appreciate its importance for recruiting, but on the operational end, it has many risks,” he warned.

Letteer also argued that the use of advanced auditing tools as a means of defending military networks was little more than “perfume on a pig.”

“The implementation of cyber security is more than tools and boxes. The tools are useless without the people. Try as we might, we are all going to be subject to a user error in judgment,” he said. “That’s were accountability comes in. We have to be more comfortable to apply punishments with recalcitrant individuals who ignore the concerns and become a risk to my network,” he said.

Defining the skills and requirements to combat cyber threats will be an important first step for the new Cybercom, said Schumacher, even before the command tackles how to deal with reported shortages in cyber security experts.

Cyber Command will need to “articulate and define the skill sets--including some joint skill sets,” he said. “But they need to articulate specific mission skill sets as well, before we determine how many of what we need,” he said. What is actually required “is still fuzzy,” he said.

The panel's moderator, Lt. Gen. Harry Raduege (retired), co-chair of the CSIS Commission on Cybersecurity for the 44th Presidency, and chairman, Deloitte Center for Network Innovation, noted that the commission has been asked to prepare a Phase 2 plan for President Barack Obama’s Cyber Security Policy initiative, announced May 29.

Reader Comments

Sun, Jul 5, 2009

--> R Branch
The main problem with sensors is they will only detect what is known to them at that time to be malicious or abnormal packets. I do agree with you that sensors are key, but that alone will not suffice. You must have training profesionals looking at the data gathered from them. One more thing that I will add, and I've said this for years: DOD needs to develop, deploy and maintain it's own unique sensors & security solution, signatures, and technologies to defend against external attacks. Why invest millions of $$$ into the very same technology that is available to the enemy "both foreign and domestic"? If I were to decide to attack the infrastructure of any country and had financial backing from a particular government or country, then I would have a security stack of every IPS, IDS, NAC, AV, & host based security software suite at my desposal to run my attack methodolgy against. If it goes through undetected then guess what's next "an email with my exploit sent to hundreds, maybe thousands". All I need is one. Its not that hard

Wed, Jul 1, 2009 R Branch Ft Wayne, Indiana

I believe by placing sensors (Network Intrusion Detection Devices) that can be monitored on the government and/US most critical network intrastructures are vital to fighting cyber-crimes against our most vital USA resources.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above