Kevin Coleman

COMMENTARY

US cyber defenses outmatched by hackers

Cyber threat environment exceeds US ability to defend against it

The cyber threat environment is making many people uncomfortable and nervous — and rightfully so. People in the military, the intelligence community, members of Congress and others are concerned about our country’s ability to anticipate cyberattacks, defend against acts of cyber aggression and respond to such acts in a timely manner. Add to those issues the phone hacking scandal that is rocking Britain, which now has the connected user community on edge, and also has increased the overall concern about cybersecurity for mobile devices.

Clearly, this is a huge challenge.

Although no country is isolated from the threat of cyber aggression, the United States is the most heavily dependent on the Internet, computers and a host of other digital devices.


RELATED COVERAGE:

Cyber espionage game has high stakes

More from the Digital Conflict blog


Although some say the threat is way overblown, others continue to sound the alarm. There are still others that are quick to point out that the United States will not do what is necessary to address this risk until we learn our lesson; that is, experience a substantive event. I asked James Howe, vice president of threats, technology and future requirements at Vision Centric for his view, and he said, “Based on my experience and observations, the current cyber threat environment is rapidly advancing and becoming dramatically more dangerous. This is taking place at a rate that far exceeds our current ability to respond.”

James is not the only one with those concerns. During the past few months, I have been collecting some of the biggest concerns about our ability to address cyber threats. Here are some of those concerns.

  • The bureaucracy that is all too common throughout our government will inhibit timely decision-making because of the dynamics of the cyber threat environment.
  • The traditional military mindset and regimented operational model are too rigid and serve to negate the flexibility, creativity and innovation that are fundamental requirements in several areas and critical to addressing the current and future cyber threat environment.
  • The failure to recognize our critical infrastructure providers in the private sector as a primary consumer of our cyber threat intelligence increases the likelihood of a successful attack.
  • Many in the private sector are looking for our government to fund enhanced defenses for our critical infrastructure given it is a national security issue and also an economic threat.
  • Availability of appropriately skilled resources in the quantity necessary and the funding to support these positions in the government, military and private sector critical infrastructure is highly questionable.

I have to say I share these concerns. However, it is worth noting that the Cyber Command and the vast supporting infrastructure, including the cyber defense industry, was established in what many believe to be record time. But is this fast enough?

The blur between criminal acts in cyberspace, cyber terrorism, cyber espionage and acts of cyber aggression by rogue nations has placed U.S. defense forces in a very precarious position. The complexities associated with attribution of acts of cyber aggression to a specific source, coupled with the use of compromised servers and unknowing and unwilling participants in noncooperative countries as intermediaries in the cyberattacks, all combine to make a rapid, accurate attribution of responsibility for attacks with a high degree of confidence highly unlikely.

There is no question that the United States must rapidly fortify its cyber defenses to avoid a threshold-level-incident that would escalate into a full-blown confrontation. Such a confrontation would undoubtedly occur in cyber and physical domains after highly publicized comments from defense officials. I recently was asked an interesting question:  Will there ever be peace in cyberspace? At this point I would have to say that is highly doubtful.

At this point there are more questions than there are answers. Doctrine needs to be written, technology needs to be developed and international standards need to be established. All this must occur in a very short period of time. As history has shown us, governments do not move quickly. Perhaps the most challenging aspect of addressing this threat will be the continual updating of doctrine, technology and standards at a pace equal to that with which the threat evolves. One thing is for sure, we must not fail for the consequences of failure are far too great.

About the Author

Kevin Coleman is a senior fellow with the Technolytics Institute, former chief strategist at Netscape, and an adviser on cyber warfare and security. He is also the author of "Cyber Commander's Handbook." He can be reached by e-mail at: kgcoleman@technolytics.com.

comments powered by Disqus

Defense Systems Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.