Cyber-Fu Panda
Posted by Bill Sweetman at 7/15/2011 6:52 AM CDT        
                                                        
http://www.aviationweek.com/aw/blogs/defense/index.jsp?plckController=Blog&plckScript=blogScript&plckElementId=blogDest&plckBlogPage=BlogViewPost&plckPostId=Blog%3A27ec4a53-dcc8-42d0-bd3a-01329aef79a7Post%3A23107949-f170-4435-a09c-2b919a890b61
                
Only five or six years (but who's counting) after the Advanced Persistent 
Threat was first detected, jimmying away at every portal in the US defense and 
defense-industry database, the Pentagon has a cyber-strategy, unveiled on 
Thursday. 

It's focused on defense and is crafted to sound inoffensive - in part to allay 
fears that the US wants to militarize cyberspace. The strategy's "overriding 
emphasis is on denying the benefits of an attack", says deputy defense 
secretary William Lynn, spokesman for the new approach. 

That's a great idea, in theory. It's rather like using civil defense as a major 
element of nuclear deterrence. As Lynn and I are both old enough to remember, 
that was a much ridiculed approach back in the 1980s. And, as of now, it 
doesn't seem to be working at all. 

Back in March, Lynn says, a foreign intelligence agency hit a major defense 
contractor and exfiltrated 24,000 files concerning a developmental system. The 
Pentagon is still reviewing whether the system (which Lynn did not identify) 
will need to be redesigned, and to what extent.

That can be necessary if the compromised information would not only help the 
intruder to develop similar systems, but to develop methods of attack and 
defense against US systems. Classic example: the CIA's infiltration of Russia's 
Phasotron radar development bureau. After it was discovered (courtesy of the 
turncoat Edward Howard) the Soviet Union was forced to redesign the radar 
systems of the MiG-29 and MiG-31 fighters.

Big difference: The CIA's agent, Adolf Tolkachev, was arrested and 
unfortunately expired while assisting the KGB with their enquiries. The US is 
not even publicly identifying the nation involved in the March exploit (and 
terabytes of others) but here is a clue:

(insert pic of cute panda munching on bamboo shoot  --rick)

As Lynn says, "we have complex economic and military ties" to many nations. 
However, it's possible that the policy of refusing to identify "the panda in 
the living room" could lead to the implementation of blanket security policies 
designed to protect everything against everybody, where more targeted measures 
might be more effective.

Something of the sort may be under way under the Defense Industrial Base Cyber 
Pilot program, which was first unveiled in June. Under that program, classified 
threat intelligence is shared with defense companies and their internet service 
providers to allow them to strengthen their defenses.

But DIB Cyber Pilot is just beginning to address the problem, with fewer than a 
couple of dozen major contractors involved. Decisions as to whether it could be 
expanded vertically (into the supply chain) or horizontally (into non-defense 
infrastructure) remain to be taken. It's also a temporary, 90-day effort, 
partly because nobody has quite decided who will pay for upgraded security. For 
90 days, Lynn says "people are willing to hold their breath and wait to know 
who pays for it." 

Two more observations. One is from yesterday's roll-out of the new policy at 
the National Defense University:  How is the Pentagon/DC culture of suits, ties 
and white-haired Kennedy bouffants, where everyone stands as the bosses enter 
the room, and 20-year R&D programs are called successful, going to keep pace 
with hackers, who - according to their attack fingerprints - are often 
criminals under contract to governments?

The other question:  Which program was compromised in March? All I can say is 
that if I was a curious panda, my first targets would not be MRAPs or GCVs - I 
would be looking at missile defense, or JSF. And which of those just had its 
Defense Acquisition Board review delayed at the last minute?
_______________________________________________
Infowarrior mailing list
[email protected]
https://attrition.org/mailman/listinfo/infowarrior

Reply via email to