Has President Trump Lost The Cyber Plot?

In March, a report to the Secretary of the Navy warned that the service is preparing for the wrong war, one fought not with bombs and artillery but with terabytes and artificial intelligence. “We find the Department of the Navy preparing to win some future kinetic battle, while it is losing the current global, counter-force, counter-value, cyber war,” the report says.

President Donald Trump, however, recently ordered the Navy to continue preparing for the last war, surprising Acting Secretary of Defense Patrick Shanahan, Navy Secretary Richard Spencer and Chief of Naval Operations, Adm. John Richardson, reversed his February decision to retire the 21-year-old nuclear-powered aircraft carrier USS Harry S. Truman.

According to a report in TIME Magazine, Trump’s decision will cost the Navy more than $20 billion over the next two decades, much of which the service had planned to spend on new unmanned vessels and other advanced technologies. It also ignores the advice of the March report.

“In prior eras, for good or ill, navies shifted their definition from wood to steel to wing, or from sail to steam and beyond,” the report to Navy Secretary Spencer says.

“This time technology, not the naval service, or its opponents, have imposed a definition of what navies will be for the rest of the 21st Century,” it says. “Navies must become information enterprises who happen to operate on, over, under, and from the sea; a vast difference from a 355 ship mindset.”

Trump’s abrupt April 30 decision to change a section of the Navy budget he had approved earlier this year will please many bipartisan members of Congress, some of whom had vowed to keep the Truman, and a 355-vessel fleet with 12 aircraft carriers, afloat if Trump didn’t.

The decision also is consistent with the President’s aversion to discussing cybersecurity, such as protecting the 2020 elections from hackers. Physical structures have been the foundation of his business career, and building walls and ships employs more and different workers than writing algorithms does. The President’s decision, however, was made without consulting Shanahan, Spencer or Richardson, according to two Administration officials who said they, too, were “ambushed,” as one put it.

“This is not the first time we’ve seen the President make a decision or countermand an order, and it won’t be the last,” said one of the officials, who helps oversee the Defense Department budget and spoke only on the condition of anonymity.

“What’s really troubling though, is that decisions like this don’t go through any kind of policy process, there’s no deliberation, no meetings, no opportunity for input from anybody who knows what they’re talking about.”

According to a report in Breaking Defense, Shanahan was told of Trump’s decision only about two hours before Vice President Mike Pence announced it in remarks made aboard the Truman, and Richardson had prepared testimony defending the move to retire the carrier for a Senate Defense Appropriations subcommittee on Wednesday morning.

The Navy publicly supported the decision. “The Navy looks forward to working with the White House and Office of the Secretary of Defense in support of the President’s budget,” Capt. Greg Hicks, the Navy’s acting Chief of Information, said in a statement. But the decision to remain on course may prove costly, as the 73-page readiness report warns.

“America once won wars with overwhelming manpower, then later won with superior industrial might, and with the Cold War, won with better technology,” it says.” The cyber war has been ongoing for some time. The threat is long past the emergent or developing stage. While its ‘guns’ go unheard, it is real, and with as or more devastating consequences.”

While the US remains “relatively flat-footed,” it continues, “both Russia and China are executing well developed cyber-enabled regional and global ‘grey zone’ unconventional strategies against the US and its allies”.

Already, the report says, those strategies threaten to cripple the Navy’s ability to fight, no matter how many aircraft carriers it has.

“The systems the US relies upon to mobilise, deploy, and sustain forces have been extensively targeted by potential adversaries, and compromised to such as extent that their reliability is questionable,” it says. In layman’s terms, that means the US Navy, as well as the Army, Air Force, and Marine Corps, may find they can’t count on all the satellites and other technology they use to navigate, communicate, locate targets and hit them.

Time

You Might Also Read: 

The US Navy Is Leaking Secrets:

 

 

« US Electric Grid Suffers Unexplained DDoS Attack
High-Tech Enhanced Military Vision »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Baker McKenzie

Baker McKenzie

Baker & McKenzie is an international law firm. Practice areas include Data & Technology.

Beyond Security

Beyond Security

Beyond Security is a leader in automated vulnerability assessment and compliance solutions - enabling customers to accurately assess and manage security weaknesses in their networks and applications.

Redicom

Redicom

Redicom is an independent consulting agency focusing on identity management, strong authentication and single-sign-on.

Niagara Networks

Niagara Networks

Niagara Networks is a Network Visibility industry leader, with emphasis in 1/10/40/100 Gigabit systems and mission-critical IT and security appliances.

HYPR

HYPR

HYPR Decentralized Authentication minimizes the risk of enterprise data breaches while providing an enhanced user experience for your customers and employees.

TitanHQ

TitanHQ

TitanHQ offers ultimate protection from internet based threats and powerful Web filtering functionalities to SMBs, Service Providers and Education sectors around the World.

Greenwave Systems

Greenwave Systems

Greenwave's AXON Platform enables IoT and M2M network service providers to address security, interoperability, flexibility and scalability from a single IoT platform.

RIGCERT

RIGCERT

RIGCERT provides training, audit and certification services for multiple fields including Information Security.

TechBeacon

TechBeacon

TechBeacon.com is a digital hub by and for software engineering, IT and security professionals sharing practical and passionate guidance to real-world challenges.

In-Sec-M

In-Sec-M

In-Sec-M is a non-profit organization that brings together companies, learning and research institutions, and government actors to increase competitiveness of the Canadian cybersecurity industry.

BIND 4.0

BIND 4.0

Bind 4.0 is an acceleration program geared toward tech startups with solutions applied to Advanced Manufacturing, Smart Energy, Health Tech or Food Tech fields.

Bitcrack

Bitcrack

Bitcrack Cyber Security helps your company understand and defend your threat landscape using our key experience and skills in cybersecurity, threat mitigation and risk.

Terralogic

Terralogic

Terralogic is a software and IT services company, an expert in IoT, Cloud, DevOps, App development and Cybersecurity.

Have I Been Pwned (HIBP)

Have I Been Pwned (HIBP)

Have I Been Pwned is a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach.

Imageware

Imageware

Imageware is a leader in biometric cybersecurity. Protect against costly, damaging ransomware hacks by employing biometric cybersecurity solutions.

CYTUR

CYTUR

CYTUR provide trusted and secured maritime cybersecurity solutions to keep ships safe, protecting them, their crews, cargo and all stakeholders from maritime cyber threats.