[Infowarrior] - DOD cybercommand focus on .mil

Richard Forno rforno at infowarrior.org
Tue Jun 16 11:58:11 UTC 2009


If true, does this not sound like the JTF-CND / JTF-CNO / JTF-GNO on  
steroids, albeit perhaps with a bit more offensive capability to it?   
--rf


New DOD cyber command will focus on the dot-mil domain

     * By William Jackson, Doug Beizer
     * Jun 15, 2009

http://gcn.com/Articles/2009/06/15/Web-DOD-cyber-command.aspx?p=1

Defense Secretary Robert Gates has not yet made a final decision about  
establishing a new major command in charge of cyber defense, Deputy  
Defense Secretary William Lynn said today.

A crowd of several hundred government, industry and academic officials  
gathered today at the Center for Strategic and International Studies  
in Washington hoping to hear an announcement about the new command,  
which will coordinate efforts across the services to defend the newly  
recognized cyber domain.

However, Lynn said that “as of today, Secretary [Robert] Gates has not  
made a decision on this. The secretary is evaluating proposals,” and  
the joint staff is still ironing out details of how the organization  
will work and what the chain of command will be.

The command is a recognition that cyberspace is a new theater of  
operations, in addition to land, sea and air. It has been proposed as  
part of the administration’s reworking of the government’s  
cybersecurity initiatives.

The organization and duties of the new cyber command have not been  
finalized, but Lynn was very clear today about what the command would  
not be.

“Such a command would not represent the militarization of cyberspace,”  
Lynn said.

DOD will continue to focus on its .mil domain, while primary  
responsibility for the civilian .gov domain will remain with the  
Department of Homeland Security, he said. The private sector will be  
responsible for the rest of the country’s Internet infrastructure. He  
said DOD and the National Security Agency (NSA0 would be available to  
lend their expertise in cyber defense “in a way that upholds and  
respects our civil liberties.”

Lynn’s message was the same as that of NSA Director Lt. Gen. Keith  
Alexander at an industry gathering earlier this year, when he assured  
his audience that NSA had no desire to take over the non-national  
security portion of the country’s information infrastructure.

Some observers have expressed skepticism that DOD and NSA, which not  
only have a great depth of expertise in cyber defense but are  
developing offensive capabilities, would take a back seat to DHS and  
industry in protecting the interconnected online world.

Lynn said coordinating the efforts of the different sectors and  
overseeing their cooperation would be the job of the White House cyber  
coordinator, a position President Barack Obama announced last month.

The president is in the process of selecting the person who will fill  
that position, and some observers expect an announcement by the end of  
this month.

The cyber command will be a unified subcommand of the U.S. Strategic  
Command. As such it would not require legislation from Congress, but  
its commander would require Senate approval, Lynn said.

He emphasized the importance of networking to today’s DOD. “There is  
no exaggerating the military’s dependence on our networks,” he said.  
“Our twenty-first century military simply cannot function without them.”

The threat to those networks is not emerging, he said. “It is here  
today. It is here now. Our defense networks are constantly under  
attack.”

More than 100 foreign intelligence operations are trying to breach DOD  
networks, which are scanned millions of times a day. A number of  
countries are developing offensive capabilities, and terrorist and  
criminal organizations are also prying at the interfaces. In one of  
the most serious incidents, thousands of computers were compromised  
last year, and DOD banned the use of many removable memory devices in  
response.

Lynn said no lives have been lost to cyberattacks to date, but the  
cost of defending networks is increasing. DOD spent $100 million in  
six months last year defending .mil networks. Due in part to that  
constant pressure, the military has some of the best defensive  
capabilities on its networks, and each service has its own operational  
organizations.

“The DOD will defend its networks,” Lynn said. “It will protect this  
domain. [But] we need to do better.”

DOD is not producing the trained professionals it needs to defend its  
networks. Only 80 information technology security specialists graduate  
each year from its military academies. The proposed fiscal 2010 budget  
includes funding that would more than triple that number to 250 per  
year, Lynn said.

The military also must do a better job of overall training in  
cybersecurity and end the competition between commands for the limited  
manpower and resources now available in that field, Lynn said.

The new cyber command will coordinate the military services’  
activities and establish the rules of engagement for responding to  
cyberattacks. Creating those rules is complicated by the fact that  
attacks in cyberspace can happen in a matter of milliseconds rather  
than days or even minutes, and responses must occur as close to real  
time as possible.

The effort is further complicated by the difficulty in attributing the  
source and goal of attacks. Although scans, probes and breaches  
sometimes can be tracked to computers in other countries, Lynn said  
officials are not able to attribute those incidents to a particular  
government or party, or say whether the intent was military, political  
or criminal.

Although the cyber command will restrict its activities to the .mil  
domain, Lynn stressed the need for better cooperation among the  
military, civilian agencies, the private sector and other countries.

About the Authors

William Jackson is a senior writer for GCN.

Doug Beizer is a staff writer for Federal Computer Week. 


More information about the Infowarrior mailing list