Pentagon Cybersecurity is Falling Behind

The US military’s cybersecurity capabilities aren’t advancing fast enough to stay ahead of the “onslaught of multipronged” attacks envisioned by adversaries, the Pentagon’s combat testing office is warning.
 
Despite some progress in fending off attacks staged by in-house “Red Teams,” the testing office said “we estimate that the rate of these improvements is not outpacing the growing capabilities of potential adversaries who continue to find new vulnerabilities and techniques to counter fixes.”
 
Automation and artificial intelligence are beginning to “make profound changes to the cyber domain,” a threat that the military hasn’t yet fully grasped how to counter, Robert Behler, the Defense Department’s director of operational test and evaluation, said in his annual assessment of cyber threats, which was obtained by Bloomberg News.
 
The evaluation, part of the testing office’s annual report that may be released as early as this week, comes amid other critical appraisals of the military’s ability to maintain and improves its defense against computer attacks. In an acknowledgment of potential threat from artificial intelligence, the Army is seeking information about “Autonomous Cyber” capabilities that would use AI and machine learning to defend its networks and protect its own intelligent systems against sophisticated cyberattacks. In other words, the Army wants to pit AI against AI in cyberspace, according to Bloomberg Government analyst Chris Cornillie.
 
Last October, the Government Accountability Office issued a withering assessment, saying the US military had failed to make cybersecurity for its multibillion-dollar weapons systems a major focus until recently, despite years of warnings.
 
“We have not reviewed the latest report” from Behler “but DOD faces significant challenges in securing its weapon systems from cyber threats,” Cristina Chaplain, the GAO director who managed the agency’s report, said in an email. She said “DOD testers routinely found mission-critical vulnerabilities in systems under development, and in some cases, repeatedly over the years,” and program officials “tended to discount the scale and severity of the problem.”
 
Expertise Lacking
Behler’s report reinforces those concerns, saying the Pentagon’s cyber testing is “handicapped by lack of expertise” and tools to assess software-intensive weapons systems. Among the test results cited in assessment:
 
• The US Air Force found “suggested areas for needed cybersecurity hardening” when it conducted tests last year of initial capabilities for Raytheon Co.’s ground-control network for new GPS III satellites.
• Cybersecurity testing of Lockheed Martin Corp.’s F-35, a flying computer with eight million lines of code, “showed that some of the vulnerabilities identified during earlier testing periods still had not been remedied.”
• Red Teams recently conducted three successful cyber-attacks on the new Defense Department-Department of Veterans Affairs health care records management system known as Genesis that showed it “is not survivable in a cyber-contested environment.”
 
Improved Detection
Analysing four years of after-action reports on cyber exercises, Behler’s office report found “defenders demonstrated increasing ability to detect Red Team activity.” But it also said “defenders need to improve speed and accuracy for processing reported incidents.”
 
Red Teams operated by the Army’s Threat Systems Management Office conducted more than 200 penetration events in fiscal 2018. While the mock attackers succeeded in many cases, there were “a growing number of instances where Red Teams needed more time” to achieve their objectives partly thanks to “improved network defenses,” the testing office said.
 
Behler also warned of a crisis in recruiting and retaining qualified Red Team commandos, who attempt damaging penetrations of networks and weapons systems using the tactics of adversaries such as Russia, China, North Korea or Iran.
 
Most Pentagon cybersecurity jobs “are not compensated commensurate with the position’s required time and expertise,” increasing the risk of losing trained personnel to higher-paying private work, according to the report. Behler suggested the Pentagon should provide seed funding for a select group of military service academies, private companies, universities and national laboratories “to grow the DoD’s cyber-security testing workforce and capabilities” while developing automated tools because “hiring more cyber experts will not be enough.”
 
Bloomberg
 
You Might Also Read: 
 
Pentagon Weapons Systems Vulnerable To Cyber-Attacks:
 
« Blockchain Improves Multicloud Network Management
Metro Bank Hacked »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IP Performance

IP Performance

IP Performance Limited is a leading supplier of customised network infrastructure and security solutions.

Cigniti Technologies

Cigniti Technologies

Cigniti Technologies provides Independent Software Testing (IST) Services including software security testing.

NetLib Security

NetLib Security

NetLib Security’s powerful, patented data security platform helps companies control data loss prevention (DLP) by managing what data can be transferred outside of their network.

Post-Quantum

Post-Quantum

Post-Quantum offer a unique, patented quantum-resistant encryption algorithm that can be applied to existing products and networks.

Bitbone

Bitbone

Bitbone develop IT infrastructure and IT security solutions that create long-term value.

Argentra

Argentra

Argentra is a specialist engineering company, we have years of experience developing custom security software and providing security risk consulting.

Safe Systems

Safe Systems

Safe Systems provide compliance centric IT services for community banks and credit unions, ensuring that they are kept up to date on current technologies, security risks, and regulatory changes.

Raiven Capital

Raiven Capital

Raiven Capital is a global early-stage technology venture capital fund. We focus on founder-led, driven companies on the leading edge of disruption.

Mitigate Cyber

Mitigate Cyber

Mitigate Cyber (formerly Xyone Cyber Security) offer a range of cyber security solutions, from threat mitigation to penetration testing, training & much more.

Sidcon International Consulting Company

Sidcon International Consulting Company

SIDCON International Consulting Company has been providing consulting services since 2002 for private and public organizations in Ukraine and other countries.

Esprinet

Esprinet

The Esprinet Group is an enabler of the technology ecosystem: a team of people who promote access to technology through an extensive network of professional resellers.

CAT Labs

CAT Labs

CAT Labs is building digital asset recovery and cybersecurity tools to enable governments to fight crypto crime and to protect investors from hacks, fraud and scams.

Corsearch

Corsearch

Combining AI-powered technology and decades of industry expertise, Corsearch is revolutionizing how companies establish and protect their brands.

CyBourn

CyBourn

Cybourn's diverse offerings include engineering, analysis, product development, assessment, and advisory services in the cybersecurity space.

Arsen Cybersecurity

Arsen Cybersecurity

Arsen is a French cybersecurity startup, dedicated to enhancing human behaviors in cybersecurity.

Theori

Theori

Theori tackles the most difficult cybersecurity challenges from an attacker’s perspective and conquers them as the best strategic security experts.