Home > Cybersecurity News > Pentagon Unprepared to Defend Against Cyber Attacks

Pentagon Unprepared to Defend Against Cyber Attacks

Monday, March 11, 2013 | 8:20 AM Leave a comment Go to comments

The Pentagon is not prepared to take on certain adversaries in cyber space and must adopt a new strategy to mitigate looming threats, according to a new report.

The 138-page report, “Resilient Military Systems and the Advanced Cyber Threat,” was compiled by a task force of public and private sector industry experts under the Defense Science Board.

The task force advised that the Department of Defense (DoD) does not have the capabilities to prevent highly sophisticated cyber attacks from penetrating networks that control critical infrastructure and carry out essential military missions.

“DoD’s networks are built on inherently insecure architectures that are composed of, and increasingly using, foreign parts,” James Gosler and Lewis Von Thaer, co-chairs of the task force, wrote in the report. “While DoD takes great care to secure the use and operation of the ‘hardware’ of its weapon systems, the same level of resource and attention is not spent on the complex network of information technology (IT) systems that are used to support and operate those weapons or critical IT capabilities embedded within them.”

The task force noted that two countries in particular, China and Russia, both have the capabilities and resources needed to create vulnerabilities within U.S. networks for the purpose of exploitation.

In one of the task force’s tests, researchers were able to gain access to military networks using only a small team, under a short amount of time. The task force said that an adversary could carry out a similar action and could “significantly disrupt” the military’s networks.

Advising DoD to increase its cyber capabilities, the task force offered up a list of recommendations aiming to reduce the risk of vulnerabilities and threats to U.S. networks.

Recommendations listed by the task force included:

  • Determining the mix of cyber, protected-conventional and nuclear capabilities necessary for assured operation in the face of a full-spectrum adversary
  • Refocusing intelligence collection and analysis to understand adversarial cyber capabilities, plans and intentions, and to enable counterstrategies
  • Creating a counterintelligence capability to directly address the most sophisticated threats using tools and techniques derived from both defensive and offensive U.S. cyber programs
  • Developing a capability to model a war game to train for full scale peer-on-peer cyber warfare
  • Establishing a policy framework for offensive cyber actions to include who has what authority (for specific actions), under what circumstances, under what controls
  • Increasing the number of qualified cyber warriors and enlarging the cyber infrastructure to commensurate with the size of the threat
  • Leveraging commercial technologies to automate portions of network maintenance and “real-time” mitigation of detected malware
  • Establishing a formal career path for DoD civilian and military personnel engaged in cyber defense

“It will take years for the Department to build an effective response to the cyber threat to include elements of deterrence, mission assurance and offensive cyber capabilities,” advised the task force, adding, “We must start now.”


Following are some additional cyber headlines you may have missed:


DHS Sec. Napolitano: Immigration priority tops cyber (Politico)

White House, lawmakers resume cybersecurity bill talks (Reuters)

Cybersecurity should top China trade talks, lawmaker says (Bloomberg)

White House gives agencies low marks for cybersecurity (Federal Times)

FBI looks for partnerships to counter cyber threat (Government Security News)

House Intelligence chairman aims for cybersecurity bill markup in April (The Hill)

DARPA pulls plug on hacker-friendly Cyber Fast Track program (Infosecurity Magazine)

Rep. Smith says he’ll fast track McCaul cybersecurity bill out of committee (FierceGovIT)


More companies reporting cyber incidents (Washington Post)

Goldman joins Citigroup in expanding cyber threat lists (Bloomberg)

Unisys Corporation says cyber executive order is not enough (Wired)

CrowdStrike says it freed thousands of infected PCs from botnet (Reuters)

Video: McAfee co-president talks latest trends in cybersecurity (Fox News)

Lockheed Martin named commercial cybersecurity provider by DHS (Press Release)


China doubts US cyber narrative (UPI)

Czech news websites hit by hackers (Reuters)

EU, US go separate ways on cybersecurity (EurActiv)

Romania believes rival nation behind “MiniDuke” cyber attack (Reuters)

Spain to welcome the new Industrial Cybersecurity Center (Infosecurity Magazine)

Norway security officials warn of dramatic cyber espionage increase (The Foreigner)


Jailed hacker allowed into IT class, hacks prison computers (CNET)

Evernote note-sharing service says hackers stole some user data (Reuters)

‘Anonymous’ hacker explains why he fled the US (San Francisco Chronicle)

Hacker steals $12,000 worth of Bitcoins in brazen DNS-based attack (TechCrunch)

Foreign hackers steal more than a terabyte of data per day, report finds (The Verge)


Survey: Investors crave more cybersecurity transparency (Fox News)

Return of CISPA: Cybersecurity boon or privacy threat? (Computerworld)

ACLU to Congress: Keep cybersecurity information sharing out of military hands (ACLU Blog)


This report is also available on ClearanceJobs.com at: http://www.clearancejobs.com/defense-news/1166/cybersecurity-news-round-up-pentagon-unprepared-to-defend-against-cyber-attacks

  1. Friday, May 24, 2013 | 11:16 AM at 11:16 AM

    Wicked article which was soundly wrote plus an enjoyable read.
    I have to say that the majority of which you were
    saying was fact. If possible, would it be ever too cheeky to promote our own blog to
    your mass of avid subscribers? We are a student lettings company situated in Liverpool and would like to offer all of your readers a great
    deal if they come through your site to our ours. We will send you guys a commission.

    If this is ok please leave the comment however should you need
    to contact us please do so at info@lsl.co.uk.

  2. Friday, June 21, 2013 | 3:17 PM at 3:17 PM

    Good day! I just want to give an enormous thumbs up for the nice
    information you could have right here on this post.
    I might be coming back to your weblog for extra soon.

  3. Monday, June 24, 2013 | 7:38 AM at 7:38 AM

    However practice shows that the power is concentrated in hands of a single group of politicians, often with a charismatic leader, who is the head of the state, or its actual leader (prime minister) poduszkowce. In those systems the authority of the charismatic leader and its group is a primary way of legitimizing the decision-making process, elections are the secondary one.

  4. Wednesday, May 7, 2014 | 8:58 PM at 8:58 PM

    A fabulous feature for the kitchen is a wall oven, and ought
    to be considered by every homeowner. Further, these ovens are designed
    in all sizes and forms to suit the set up of modern kitchens.
    If it is not, remove the large flat stone and build up your oven walls
    some more and try again.

  5. Saturday, October 4, 2014 | 7:15 PM at 7:15 PM

    This is partly due to Microsoft’s lack of UEFI support.
    This is a useful option if you are troubleshooting an issue
    with your video card or monitor driver. About now you are going to be
    saying “This guy is completely MAD.

  6. Wednesday, March 25, 2015 | 3:36 PM at 3:36 PM

    Coca-Cola, Proctor & Gamble and GM have the billion dollar marketing budgets to pull this off.
    There are plenty of reasons why you should make use of this application. This is meant to improve the security, performance
    and speed of your Windows computer.

  7. Monday, June 15, 2015 | 4:40 AM at 4:40 AM

    Hello, for all time i used to check website posts here early in the break of day, because i love to find out more and more.

  1. Wednesday, April 9, 2014 | 9:44 PM at 9:44 PM
  2. Saturday, August 15, 2015 | 12:20 AM at 12:20 AM

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: