Has President Trump Lost The Cyber Plot?

In March, a report to the Secretary of the Navy warned that the service is preparing for the wrong war, one fought not with bombs and artillery but with terabytes and artificial intelligence. “We find the Department of the Navy preparing to win some future kinetic battle, while it is losing the current global, counter-force, counter-value, cyber war,” the report says.

President Donald Trump, however, recently ordered the Navy to continue preparing for the last war, surprising Acting Secretary of Defense Patrick Shanahan, Navy Secretary Richard Spencer and Chief of Naval Operations, Adm. John Richardson, reversed his February decision to retire the 21-year-old nuclear-powered aircraft carrier USS Harry S. Truman.

According to a report in TIME Magazine, Trump’s decision will cost the Navy more than $20 billion over the next two decades, much of which the service had planned to spend on new unmanned vessels and other advanced technologies. It also ignores the advice of the March report.

“In prior eras, for good or ill, navies shifted their definition from wood to steel to wing, or from sail to steam and beyond,” the report to Navy Secretary Spencer says.

“This time technology, not the naval service, or its opponents, have imposed a definition of what navies will be for the rest of the 21st Century,” it says. “Navies must become information enterprises who happen to operate on, over, under, and from the sea; a vast difference from a 355 ship mindset.”

Trump’s abrupt April 30 decision to change a section of the Navy budget he had approved earlier this year will please many bipartisan members of Congress, some of whom had vowed to keep the Truman, and a 355-vessel fleet with 12 aircraft carriers, afloat if Trump didn’t.

The decision also is consistent with the President’s aversion to discussing cybersecurity, such as protecting the 2020 elections from hackers. Physical structures have been the foundation of his business career, and building walls and ships employs more and different workers than writing algorithms does. The President’s decision, however, was made without consulting Shanahan, Spencer or Richardson, according to two Administration officials who said they, too, were “ambushed,” as one put it.

“This is not the first time we’ve seen the President make a decision or countermand an order, and it won’t be the last,” said one of the officials, who helps oversee the Defense Department budget and spoke only on the condition of anonymity.

“What’s really troubling though, is that decisions like this don’t go through any kind of policy process, there’s no deliberation, no meetings, no opportunity for input from anybody who knows what they’re talking about.”

According to a report in Breaking Defense, Shanahan was told of Trump’s decision only about two hours before Vice President Mike Pence announced it in remarks made aboard the Truman, and Richardson had prepared testimony defending the move to retire the carrier for a Senate Defense Appropriations subcommittee on Wednesday morning.

The Navy publicly supported the decision. “The Navy looks forward to working with the White House and Office of the Secretary of Defense in support of the President’s budget,” Capt. Greg Hicks, the Navy’s acting Chief of Information, said in a statement. But the decision to remain on course may prove costly, as the 73-page readiness report warns.

“America once won wars with overwhelming manpower, then later won with superior industrial might, and with the Cold War, won with better technology,” it says.” The cyber war has been ongoing for some time. The threat is long past the emergent or developing stage. While its ‘guns’ go unheard, it is real, and with as or more devastating consequences.”

While the US remains “relatively flat-footed,” it continues, “both Russia and China are executing well developed cyber-enabled regional and global ‘grey zone’ unconventional strategies against the US and its allies”.

Already, the report says, those strategies threaten to cripple the Navy’s ability to fight, no matter how many aircraft carriers it has.

“The systems the US relies upon to mobilise, deploy, and sustain forces have been extensively targeted by potential adversaries, and compromised to such as extent that their reliability is questionable,” it says. In layman’s terms, that means the US Navy, as well as the Army, Air Force, and Marine Corps, may find they can’t count on all the satellites and other technology they use to navigate, communicate, locate targets and hit them.

Time

You Might Also Read: 

The US Navy Is Leaking Secrets:

 

 

« US Electric Grid Suffers Unexplained DDoS Attack
High-Tech Enhanced Military Vision »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Trust Guard

Trust Guard

Trust Guard services provide complete security for your website.

Wallix

Wallix

Wallix is a software company offering privileged access management solutions for enterprises, public organizations and cloud service providers

Hivint

Hivint

Hivint is a new kind of Information Security professional services company enabling collaboration between our clients to reduce unnecessary security spend.

ThirdWatch

ThirdWatch

ThirdWatch is a Data Science company with real-time automated fraud prevention solutions.

Hellenic Accreditation System (ESYD)

Hellenic Accreditation System (ESYD)

ESYD is the national accreditation body for Greece. The directory of members provides details of organisations offering certification services for ISO 27001.

Identity Defined Security Alliance (IDSA)

Identity Defined Security Alliance (IDSA)

IDSA is a group of identity and security vendors, solution providers and practitioners that acts as an independent source of education and information on identity-centric security strategies.

Trust Stamp

Trust Stamp

Trust Stamp provide Identity and Trust as a Service to answer two fundamental questions: “Who are you?” and “Do I trust you?"

Mphasis

Mphasis

Mphasis is a leading applied technology services company applying next-generation technology to help enterprises transform businesses globally.

Marlabs

Marlabs

Marlabs is a Digital Technology Solutions company that helps companies adopt digital transformation using a comprehensive framework including Digital Automation, Enterprise Analytics and Security.

Cyber Security Forum Initiative (CSFI)

Cyber Security Forum Initiative (CSFI)

CSFI is a non-profit organization with a mission to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training.

CWSI

CWSI

CWSI provide a full suite of enterprise mobility, security and productivity solutions to many of Ireland and the UK’s most respected organisations across a wide range of industry and public sectors.

Noblis

Noblis

Noblis is a dynamic science, technology, and strategy organization dedicated to creating forward-thinking technical and advisory solutions in the public interest.

Astrix Security

Astrix Security

Astrix enables security teams to instantly see through the fog of connects and detect redundant, misconfigured and malicious third-party exposure to their critical systems.

SideChannel

SideChannel

At SideChannel, we match companies with an expert virtual CISO (vCISO), so your organization can assess cyber risk and ensure cybersecurity compliance.

PixelQA

PixelQA

Are you looking for a security testing company to cross-check whether your software or mobile app has a possible security threat or not?

Security Compliance Associates (SCA)

Security Compliance Associates (SCA)

The sole focus of SCA is safeguarding critical information and complying with information security regulations.