Mike McConnell

What we must do now to prevent a cyber Pearl Harbor

We have the information and ability today to prevent a cyber Pearl Harbor. The question is, will we take steps to avoid it, or will we wait for it to happen?

I had the pleasure of speaking in June at a commemoration in Hawaii of the 70th Anniversary of the allied victory at the Battle of Midway — a critical turning point in the war in the Pacific and one that was largely made possible by the United States’ ability to break Japanese codes, thereby allowing Pacific Commander Adm. Chester Nimitz to know where the enemy was — and where they were headed.

The battle happened a long time ago, but not so long ago that I haven’t had the pleasure of crossing paths with some of its key figures. My role, as a former naval intelligence officer and the nation’s chief code breaker as the director of the National Security Agency in the 1990’s, was to provide context and to introduce a real American hero and one of last surviving members of Admiral Nimitz’s code-breaking team, Rear Adm. Max Showers. As a 22-year-old ensign, Showers was a hands-on participant in the successful code breaking and code group recovery effort that turned the war.

As he spoke with riveting clarity at the Midway commemoration, Showers told listeners he was “absolutely certain, despite all the books and articles that have speculated otherwise, the U.S. did not have the information and could not have prevented the successful Japanese attack on Pearl Harbor.” While Showers has always served as a role model and inspiration for dedicated public service to me, I have to differ with my respected, senior friend – and it’s a disagreement that pertains not just to the past, but, more importantly, to the future.

The United States was successful in breaking the Japanese Imperial Naval code after Pearl Harbor because that is when we were forced to put the needed resources and talent on a problem of national significance. Had we started our code breaking efforts at the same level of commitment and intensity in the late 1930s or even in 1940, we would have been successful in decrypted and translating information to provide Japanese intentions and the disposition of their forces well before Pearl Harbor.

Is Past Prologue?

Today we find the nation in very much the same posture as 1941, albeit pre-December 7, 1941. Former CIA Director and Defense Secretary Leon Panetta’s statement that our next catastrophic event is likely to be a “Cyber Pearl Harbor” is hardly scaremongering. The nation is bombarded daily by nation states with policies of cyber economic espionage that are successful extracting terabits of sensitive, competitive information that drives the U.S. business engine. Our strength has been our ability to invent and innovate and this information is being massively taken on a daily basis. Additionally, nation states are building thousands of cyberattack tools intended for degradation and destruction in war or conflict. Sooner or later, some of these cyberattack tools will get inadvertently released in the cyber global commons, or intentionally sold to some terrorist group hoping to change the current world order to fit their view of the future.

We have the information and ability today to prevent a Cyber Pearl Harbor. The question is, will we take steps to avoid it, or will we wait for it to happen? The U.S. intelligence community (USIC) recovers vast amounts of threat vector information that could be used to screen and protect the nation – in both the public and private sector. However, our current laws and policies do not allow the USIC to share the information in an effective way – their hands are tied, a dynamic that serves only our foes. While there are as many as seven draft bills in Congress to address these issues, forward movement is being stalled by arguments against passage which are framed by concerns for privacy and civil liberties on one side and concerns about regulating industry on the other.

Public-Private Partnership

To protect the nation, we need robust and timely sharing of sensitive information between the government and the private sector in a public-private partnership. This is achievable, and a model already exists.

Of course, nearly any time the prospect of public-private partnerships involving IT security are discussed, the concept is battered, equally, by the two somewhat opposing camps mentioned above — on one side of privacy advocates, and the other side those who oppose any regulation of businesses.

I believe that the privacy concern can be addressed via legislation and regulation that clearly defines what would be illegal practices for the government to do, and the regulation concern could be addressed via a private sector opt-in-only mechanisms that encourage participation via a number of benefits, including liability protections and the benefits of standards.

The more critical point is that there is an excellent model already in place for a public-private partnership, focusing, no less, on information sharing in the IT space, and its roots go back nearly 50 years.

The National Security Telecommunications Advisory Committee (NSTAC) facilitates information sharing between the public and private sectors related to threats to the operations of our national telecommunications infrastructure. Having evolved out of the National Communications System, which began in the John F. Kennedy era, NSTAC works — for the shared benefit of the public — and it works well. It’s one example of a model for cooperation that could be harnessed to address today’s growing cyber threats.

Beyond the example of NSTAC, there’s a more fundamental truth at hand. Good security – whether cybersecurity or any other kind of security — requires communications, namely the controlled sharing of relevant information. If you don’t have that – or deny the common sense that underpins it — you’re only going to have a facsimile of security, not the real thing.

Now is the time for all sides to relax opposition to work together to frame and pass the needed legislation for effective cyber defense. Otherwise, like Pearl Harbor and 9-11, we will strongly react after the fact when damage has been inflicted. What a waste.

Reader Comments

Tue, Jun 26, 2012 Bob Pollock NYC

Admiral. unfortunately you and the Beltway is one big fat club where no real solutions for network security trickle down. As previously stated in my prior communications to you, we already are implementing a solution initially for SDR Radio and Wi-FI based on DOS & NSA standards. Perhaps Defence Systems desires to learn about our licensable products for all US OEMS, Defence Contractors, and larger VARS. RSP continPartners@gmail.com

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Your Name:(optional)
Your Email:(optional)
Your Location:(optional)
Comment:
Please type the letters/numbers you see above