Print
Email
>
>
Why Cyberwar Will Be The Next Big Threat
Recent
Tags
14 Ohio-class SSBNs 2011 budget 2012 Election 450 Minuteman III ICBMs 50/50 737 787 787 Dreamliner A&D A2/AD A320 A330 AA/AD AAV ABL Abram Acquisition Reform Acquisitions ADAS ADS Advanced Distributed Aperture System Advanced Hawkeye AEA Aegis AEHF Aerostat AESA Afghan surge Afghanistan Agility Aging Air Fleet AgustaWestland AH-1Z Air Defense Air Dominance Air Force Air Force Modernization Air France Air Logistics Center Air Logistics Centers Air Mobility Air National Guard Air Power Air Superiority Airborne ISR airborne laser airborne surveillance Airbus Aircraft Carrier Aircraft Carriers Airlift Airpower AirSea Battle Al Qaeda Alliances Alliant Techsystems Allies Alternate Engine Al-Yamamah American Enterprise Institute America's Future Ammunition Industrial Base Amphibious amphibious warfare AMPV AMT Anniston Anti-Access Anti-Access/Area Denial Apache APL ARFORGEN ARG Armored Vehicles Arms Control Arms Sales Arms Transfers Army Arnold Punaro Arrow Ashton Carter Asia Asia- Pacific Asia-Pacfic Pivot Asia-Pacific Asia-Pacific Pivot Asia-Pacific Region Asia-Pacific Strategy Assymetric Warfare AT-6 ATK AUSA Austal Australia AW609 AWACS B-52 Babcock & Wilcox BAE Systems BAE-EADS bail out Bain Capital BAMS Barack Obama Barbero Bath Iron Works BBP BCA Bechtel Beechcraft Benghazi Better Buying Power Bin Laden Bio-Engineering Biofuel Biohacker Biotechnology Black Hawk Blackhawk Bloomberg Bloomberg Business News BMD BMDR Boeing Bombers Boston BRAC Bradley Bradley Fighting Vehicle Britain British Military British Ministry of Defense Brookings Institution Brown budget Budget Control Act Budget Debate Budget Deficit Budget Drills Byron Callan C-130 C-17 C-2 C-5M CAPE Cargo Containers Cargo Screening Carrier Strike Group carriers CENTCOM Central Africa CH-47 Chabraja Chief Executive Officer China Chinook helicopter Chuck Hagel CIRCM climate change closing tank plant Cluster Bombs Cluster Munitions Coast Guard Collaborative Defense Comanche helicopter Commercial Space Common Infrared Countermeasures Common Vertical Lift Support Platform Communications Competitive Engagement Competitiveness Computer Sciences Corporation Concurrency Conflicts of Interest Congress Consolidation Constellation Contingency Support Contractors Continuing Resolution Contract Services Contracting Core Corzine cost Counterinsurgency Counterterrorism CRH Critical Enablers Critical Infrastructure Crowdsourcing Crusader artillery CSAR CTF Customer Pay CVLSP CVN CVN-78 CVN-91 Cyber cyber attack cyber defense cyber offense Cyber Security Cyber Threats Cyber Warfare Cybersecurity Cyberwar Cyberwarfare DARPA DB-110 DCAA DDG 1000 DDG-1000 DDG-51 debt Debt Agreement Defense Acquisistions Defense Acquisition System Defense Acquisitions Defense Budget Defense Business Board Defense Contract Requirements Defense Contractors Defense Contracts Defense Cuts Defense Downturn Defense Drawdown defense funding cut Defense Industrial Base Defense Industry Defense Planning Defense Priorities Defense Procurement Defense Sector Defense Spending Defense Stocks Defense Strategy Defense Weather Satellite System deficit Deficit Debate Deficit Reduction Delta Delta Air LInes Democrats Democrats & Defense Department of Defense Depot Depot Maintenance Depots Deputy Secretary Of Defense deterrence Detroit Arsenal Tank Plant DHS Dick Cheney Diversification DLA DOJ Donald Rumsfeld Dong Feng Dreamliner Drive down cost Drone Drones DRS Technologies DWSS DynCorp E-2 E-2D E-3 EA-18G EADS EASE Economic Growth Economic Recovery Economy Efficiency Drive Efficiency Initiative EFV Egypt EH101 EH-101 Elections Electric Grid Electric Power Grid Electronic Attack Electronic Warfare EMARSS energy security Energy Strategy Environmentalism EOTS EPA EPAA Erin Moseley ERP EU euro crisis Europe European Union eurozone EW Excaliber Exelis Ex-Im Bank Expeditionary Fighting Vehicle Export Controls Export Financing Export-Import Bank F/A-18 F117 F-15 F-16 F-22 F-35 F-35 engine F-35B FAA Fairfax County Fajr 5 rocket FCS Federal Reserve Fighter Sales Fincantieri Finmeccanica Fire Fighting Fire Resistant Environmental Ensemble fiscal cliff FMS FMTV Force Posture Force Protection Force Readiness Force Structure forcible entry Ford class Foreign Arms Sales Foreign Military Sales Forest Service Franco-British security FREE free speech Free Trade Future Combat System Future Combat Systems future warfare Gaddafi Gadhafi GAO Gates Gaza GBI GCV GE GEN III General Dynamics General Electric General Martin Dempsey General Mattis General McChrystal General Odierno General Schwartz GFE GISP Global Hawk Global Influence Global Strike Global Zero GMD GMR Goldman Sachs Gordon England Gorgon Stare Government Accountability Office GPS III Great Britain Greece Greyhound Ground Based Interceptor Ground Combat Vehicle Ground Mobile Radio Gun Control guns versus butter Hagel Hal Rogers Hamas Handheld Manpack Radio Hapag-Looyd HASC Hawker Beechcraft Hawkeye Healthcare Helicopters Heritage Foundation HH-60G High-Speed Rail HMS Homeland Defense Homeland Security Homeland Security Air Fleet Hu Jintao Human Spaceflight Humvee Huntington Ingalls Hybrid Drive Hybrid Strategies Hybrid Threat Hybrid Threats hybrid warfare Hypersonic Hypoxia ICBM IED Immelt Improvised Explosive Devices Incremental Funding India Industrial Base Industrial Policy Inherently Governmental Insitu Insourcing installations abroad Integrator Intellectual Property Intelligence Community IR&D Iran Iran Sanctions Iraq Iron Dome ISR Israel IT Providers ITT ITT Corporation ITT Defense J-20 Jacksonville Jammer Jammers Japan Jay Johnson Jay L. Johnson Jeffrey Immelt Jet Engines JFCOM JIEDDO JLENS JLTV Jobs Bill Joint Chiefs of Staff Joint Forces Command Joint Heavy Lift Joint Operating Environment Joint Stars Joint Strike Fighter Joint Tactical Radio System Jones Act JSTARS JTRS KBR KC-45 KC-46 KC-X Kent Kresa Kiowa Kiowa helicopter Korea L-3 Communications LAAR Lake City Larry Prior LAS LCAAP LCS LEMV Leon Panetta Libya Lieberman Life Cycle Costs Light Air Support Lima Lima Army Tank Plant Linda Gooden Linda Hudson lithium-ion batteries Littoral Combat Ship Lockheed Martin Logistics Long Endurance Multi-Intelligence Vehicle (LEMV) LRS LUH Lynn M1 M-1 Mabus Maersk maintenance MANPAD ManTech manufacturing Marillyn Hewson Marine Corps Marine Highway Initiative Marine One Marines Marinette Maritime Transport Mars Massachusetts M-ATV McNerney MDA MEADS MECV merger MEU MH-60 Michael O'Hanlon Middle East Middle East Unrest Mid-term election Military Military Communications military cuts Military Depots Military Electronics Military Pension Military Preparedness Military Readiness Military Retirement System Military Satellites Military Space Military Spending Military Strategy Military Vote Mine Countermeasures Mine Warfare Missile Defense Missile Defense Agency Missile Security Missile Tracking Satellite Mitt Romney MMPDS Modernization MPC MQ-9 MRAP MRC MRO Multiyear Contract Multiyear Procurement MV-22 NABCO NASA National Defense National Guard National Intelligence Estimate National Military Strategy National Research Council National Security National Security Appropriations Bill National Security Review National Security Strategy National Taxpayer Union NATO Navistar Navy Navy Acquisitions Navy Marine Corps Intranet Navy SEAL Navy SEALS NCADE NDAA Net Assessment NETCENTS Network-Centric Warfare Networks New Mexico New START Next Generation Enterprise Network Next Generation Jammer NGEN Nick Chabraja NIE NIFC-CA Nigeria NII Nimitz class NLOS-LS NLRB NMCI NMD Non-Proliferation Norm Dicks North Korea Northrop Grumman November Election NPR NRO NSA nuclear Nuclear Detection Nuclear Deterrence Nuclear Energy Nuclear Power Nuclear Reduction Nuclear Shipbuilding Nuclear strategy nuclear triad Nuclear Weapons Nunn-McCurdy O&M Obama Obamacare Odierno Office of Air and Marine OH-58 Ohio Ohio Class Ohio Replacement Oil O'Keefe OMB Operations and Maintenance Osama bin Laden Oshkosh Oshkosh Corporation Osprey Outsourcing overheating P.W. Singer P-8 P-8A PAA Pacfic Pacific Pakistan Panetta Partner Capacity Partnering Patriot Pave Hawk PBL Pentagon Pentagon Budget Pentagon Cuts Pentagon Spending PEO Soldier Perchlorate Performance Based Logistics Performance-Based Agreement Performance-Based Logistics Persian Gulf Phalanx Phased Adaptive Approach Phased Adaptive Architecture Pilot Training PLA Navy Poseidon Pratt & Whitney Predator Presidential Helicopter Private Contractors Procurement PSSD PTSS Public Interest Research Group Public Private Partnership Public-Private Partnership Public-Private Partnerships Pyongyang QDR QHSR Raider Rapid Equipping Force Rapid Fielding Initiative Rare Earth Ray Mabus Raytheon Readiness Reaper Rebalancing Reconnaissance Helicopter Reelection REF Regulatory Burden Republicans Reset Restart F- 22 RFI Richard Aboulafia Rifleman RIMPAC Rivet Joint RMD 802 Robert Gates Robert O. Work Robert Stevens Rocket Industry Rocket Motors Rocketdyne Rolls-Royce Romney Ron Epstein RPV RQ-170 RQ-4 RQ-7 Rules of Engagement Russia S-300 S-97 SAIC Samsung satellite Satellites Saxby Chambliss SBINet SBIRS Scan Eagle Seapower Secretary Donley Secretary Gates Section 808 Sentinel Sequestration Shadow ship building Shipbuilding Should Cost Methodology Sierra Nevada Sierra Nevada Corporation Sikorsky Situational Awareness SLAMRAAM SM-3 Smart Defense Smart Defense Initiative SOF Soft Power Solar Electric Propulsion Soldier As A System Soldier Equipment solid rocket motor SOSCOE South Korea Space Space Based Infared System space disaggregation Space Launch Space Shuttle Space Tracking and Surveillance Satellite SpaceX Space-X Special Operations Special Operations Forces SSBN SSBN(X) Standard Missile Standard Missile 3 START START Treaty Stealth Helicopter Steel Strait of Hormuz Strategic Architecture strategic arms control Strategic Arms Treaty Strategic Review Stryker STUAS submarine Submarines Subsidies Super Committee Super Galaxay Super Hornet Supply Chain Supply Chain Management Sustainable Defense Sustainment swing states Switchblade Syria T-38 T-38 Trainer Tactical Communications Taiwan Taliban Tanker Tankers Tea Party Teal Group Technical Data terror terrorism Testing Requirements Textron THAAD The Economist Theater Express Tiltrotor Tilt-rotor TLSP Trade Deficit Trade Policy Trade Subsidies Transformation Trident Trident submarine Troop Reduction Turkey Tysons Corner U.K. U.N. Investigation U.S. Army U.S. embassy in Cairo U.S. Manufacturing U.S. Navy U.S. Strategy U-2 UAS UAV UAVs UCLASS UH-1Y UH-60 UK United Kingdom United Technologies Unmanned Aerial System Unmanned Aerial Systems Unmanned Aerial Vehicles unmanned air systems (UASs) Unmanned Aircraft Urgent Operational Needs US Ports US101 USFS USS Missouri Utah V-22 V-22 Osprey Vertical Lift Virginia Virginia-class submarine WAPS war War On Terror WARN Washington Weapons Programs Weapons Spending Wes Bush WGS White House Transparency Measure Wichita Wideband Global Satcom Wikileaks William Perry WIN-T World Trade Organization WTO Yemen York
<< Previous
Next >>

Why Cyberwar Will Be The Next Big Threat


You don't need to be a cybernaut to see why attacks on America's information networks will be the next big security challenge that policymakers face. You just need to be a student of recent history. Why did Al Qaeda attack the World Trade Center and Pentagon on 9-11? Because its leaders realized we weren't ready to deal with such attacks. Why did insurgents in Iraq make improvised explosive devices their preferred weapon in fighting U.S. troops? Again, because they figured out we weren't prepared. The 9-11 attacks were so traumatic that they changed the course of history; IEDs nearly caused U.S. defeat in Iraq. What made both developments so devastating was that the tactics were asymmetric -- our enemies attacked us where we were weak.

So politicians and policymakers should be paying special attention to areas where the nation is not prepared today. But are they? Consider this passage on "information assurance" from the 2011 annual report of the Pentagon's Director of Operational Test and Evaluation:

With sufficient time, Red Teams routinely managed to penetrate networks and systems. Detection rates of network intrusions remained low, and the ability of network defenders to detect subsequent exploitations of network data was minimal; most assessments witnessed large exfiltrations of operationally significant data...

The assessments showed a decrease in the use of backup files and systems, proper audit logging and reviews, logical access controls, incident planning and vulnerability management. There was an overall increase in high-risk vulnerabilities observed (indicating a decrease in effective patch management), as well as a decrease in effective use of anti-virus tools and software (including failures to routinely update virus signatures).

The report went on to note that although information security systems are being installed on military networks to counter threats, a majority of the systems "were found to be incorrectly or ineffectively configured." Does this sound like a force that is ready to deal with a really effective cyber adversary? Not at all. The Air Force recently disclosed that when an intruder penetrates one of its networks, the service typically takes 45 days to figure out what happened. In wartime, it will be lucky to have 45 seconds.

Not that the joint force is alone in its lack of cyber preparedness. NASA's inspector general told Congress on February 29 that an unencrypted laptop computer recently stolen from one of the space agency's employees contained the control codes for the International Space Station. It turns out that only one-percent of NASA's laptops and other portable computing devices are encrypted -- which may help explain why 13 of the 47 "advanced persistent threats" the agency encountered in cyberspace last year succeeded in compromising its computers. Actually, there may have been more such threats in 2011, because the agency depends on employees to self-report the theft or compromise of their network devices.

That's still better than in the private sector, where the Department of Homeland Security doesn't have the authority to compel such reporting -- even if the network attacked controls vital infrastructure such as power grids. DHS is trying to obtain firmer legal authority for enforcing cybersecurity standards in the private sector, but proponents of small government in Congress are blocking efforts to impose more burdens on business. When you see a political system that obtuse about the looming cyber threat, you know it's just a matter of time before something really bad happens. Like ending up with no ability to process financial transactions or transport water to Manhattan. Unlike 9-11, though, this is one danger all the experts can see coming. We just won't be willing to listen to them until it is too late.

Loren B. Thompson, Ph.D.

Return to Early Warning Blog
<< Previous
Next >>
1600 Wilson Boulevard, Suite 900
Arlington, VA 22209
P: 703-522-5828 | F: 703-522-5837
©2009 Lexington Institute. All Rights Reserved.
Website designed by Borcz:Dixon | Powered by Agency of Record