Amid congressional concern that the cyber security of the nation’s war fighting systems aren’t getting the attention they deserve, the Defense Department is moving forward at various levels to mitigate cyber vulnerabilities to its weapon and mission systems with plans to further these efforts.
In a report in June, the House Appropriations Committee says it is concerned about potential cyber vulnerabilities in systems under development and with legacy weapon systems in use before cyber threats may have been a consideration. The House and Senate Armed Services Committees this year have expressed similar concerns.
The House panels want DoD and the military services to work together to assess the these potential vulnerabilities in legacy systems and develop a standardized report of these potential cyber vulnerabilities and mitigation efforts to be part of acquisition program baselines of current and future major acquisition programs.
Yet DoD isn’t standing still in this area.
The Marine Corps has been doing vulnerability assessments for years on anything that has a “chip in it,” Col. Gregory Breazile, director of Marine Corps C2/Cyber and Electronic Warfare Division, tells Defense Daily. But those assessments, which are funded within every program, can take months, he says.
In March the service stood up a cyber range that is now being used to “rapidly assess all of our IT assets and weapon systems” to determine the “criticality of vulnerabilities,” Breazile says. For example, the Marines’ aviation command and control system was assessed in two days in the range, he says.
In April Defense Secretary Ash Carter released a new DoD Cyber Security Strategy that recognizes that a “cyber attack on critical infrastructure and key resources on which DoD relies for its operations could impact the U.S. military’s ability to operate in a contingency.” The same month the Pentagon’s acquisition office issued its latest iteration better buying practices.
Better Buying Power 3.0 points out that the department has taken steps to improve the cyber security of military systems but says there is more to do, and directs that DoD acquisition instructions address “all aspects of the program manager’s and other’s responsibilities for cybersecurity through the product lifecycle” and for the services to recommend ways to “improve cybersecurity of system designs.”
The latest policies are built in part on existing guidance and strategy.
In 2012 DoD released a Mission Assurance Strategy, which included a look at all potential hazards, such as cyber vulnerabilities, and mitigation opportunities throughout a mission chain, Paul Stockton, a former assistant Secretary of Defense for Homeland Defense and the strategy’s author, tells Defense Daily.
In March and May 2014 the department updated two of its instruction manuals, DoDI 8500.01 and 8510.01 to establish a risk management framework for its IT systems, including platform IT (PIT), which covers weapon systems, and a cyber security program to protect and defend its information and IT, including PIT.
But more than just policy changes are needed, says one industry official. A step up in strategic investments and shifting the operating concepts around cyber defenses of systems and networks are critical to giving the U.S. military the edge to remain dominant in future conflicts, says Vern Boyle, director of technology for the Cyber Division in Northrop Grumman’s [NOC] Information Systems sector.
Boyle says the U.S. military needs to start taking advantage of new tools such as software defined networking and network function virtualization to achieve what he calls Continuous Trust Restoration, which is “designed to proactively disrupt an attacker’s kill chain,” he writes in a whitepaper, Speed Wins: The Next Strategic Technology Advancement for Continued US Military Dominance issued by Northrop Grumman in June.
That speed is obtained through the automation enabled by tools like software defined networking, which allows for networks to be configured rapidly, dynamically and cost-effectively, making it difficult for cyber attacks to begin to access, map and persist on a network.
Another “key point that we’re trying to bring out is that the restoration model doesn’t have to wait for a response or detection, which I think is one of the foundational challenges with the concept of operations (CONOPS) that’s in place today,” Boyle tells Defense Daily. “So you don’t need to wait until a breach has occurred or a compromise has occurred. You can use these Continuous Trust Restoration techniques in advance and actively restore to known levels of trust using a variety of techniques so you can break the adversary’s kill chain before they actually have had a chance to do anything.”
Boyle wants the DoD to lead in using these tools to establish more cyber resilient infrastructure.
The “next generation of conflict will be won or lost on a digital battlefield, possibly before the first shot is ever fired,” Boyle says in the whitepaper. “Kinetic technology and weaponry will have a limited role in this type of fight. In fact, some of these weapon systems could be rendered useless by disabling the information or compute platforms on which they have come to rely.”
The DoD is making some basic investments in new tools that could mitigate cyber vulnerabilities of its physical systems, including mission and weapon systems. For example, the Office of Naval Research (ONR) and the Assistant Secretary of Defense for Research and Engineering this year awarded Georgia Tech $2 million for cyber security basic research.
In the work for ONR, there is an assumption that computer and software systems will be compromised, Dr. Wenke Lee, director of the Georgia Tech Information Security Center, tells Defense Daily. He says a potential defense entails multiple applications that are designed to do the same thing, such as steering an aircraft, with each application configured differently so that not all of them can be successfully disrupted by a cyber attack, allowing the “physical system to function.”
Boyle says this work fits within the Continuous Trust Restoration model. The next step with that research is to be able to constantly shift which applications are being used to steer the aircraft, he says.
This article contains features that are not compatible with your web browser.
Please upgrade your browser to improve your experience.