Has President Trump Lost The Cyber Plot?

In March, a report to the Secretary of the Navy warned that the service is preparing for the wrong war, one fought not with bombs and artillery but with terabytes and artificial intelligence. “We find the Department of the Navy preparing to win some future kinetic battle, while it is losing the current global, counter-force, counter-value, cyber war,” the report says.

President Donald Trump, however, recently ordered the Navy to continue preparing for the last war, surprising Acting Secretary of Defense Patrick Shanahan, Navy Secretary Richard Spencer and Chief of Naval Operations, Adm. John Richardson, reversed his February decision to retire the 21-year-old nuclear-powered aircraft carrier USS Harry S. Truman.

According to a report in TIME Magazine, Trump’s decision will cost the Navy more than $20 billion over the next two decades, much of which the service had planned to spend on new unmanned vessels and other advanced technologies. It also ignores the advice of the March report.

“In prior eras, for good or ill, navies shifted their definition from wood to steel to wing, or from sail to steam and beyond,” the report to Navy Secretary Spencer says.

“This time technology, not the naval service, or its opponents, have imposed a definition of what navies will be for the rest of the 21st Century,” it says. “Navies must become information enterprises who happen to operate on, over, under, and from the sea; a vast difference from a 355 ship mindset.”

Trump’s abrupt April 30 decision to change a section of the Navy budget he had approved earlier this year will please many bipartisan members of Congress, some of whom had vowed to keep the Truman, and a 355-vessel fleet with 12 aircraft carriers, afloat if Trump didn’t.

The decision also is consistent with the President’s aversion to discussing cybersecurity, such as protecting the 2020 elections from hackers. Physical structures have been the foundation of his business career, and building walls and ships employs more and different workers than writing algorithms does. The President’s decision, however, was made without consulting Shanahan, Spencer or Richardson, according to two Administration officials who said they, too, were “ambushed,” as one put it.

“This is not the first time we’ve seen the President make a decision or countermand an order, and it won’t be the last,” said one of the officials, who helps oversee the Defense Department budget and spoke only on the condition of anonymity.

“What’s really troubling though, is that decisions like this don’t go through any kind of policy process, there’s no deliberation, no meetings, no opportunity for input from anybody who knows what they’re talking about.”

According to a report in Breaking Defense, Shanahan was told of Trump’s decision only about two hours before Vice President Mike Pence announced it in remarks made aboard the Truman, and Richardson had prepared testimony defending the move to retire the carrier for a Senate Defense Appropriations subcommittee on Wednesday morning.

The Navy publicly supported the decision. “The Navy looks forward to working with the White House and Office of the Secretary of Defense in support of the President’s budget,” Capt. Greg Hicks, the Navy’s acting Chief of Information, said in a statement. But the decision to remain on course may prove costly, as the 73-page readiness report warns.

“America once won wars with overwhelming manpower, then later won with superior industrial might, and with the Cold War, won with better technology,” it says.” The cyber war has been ongoing for some time. The threat is long past the emergent or developing stage. While its ‘guns’ go unheard, it is real, and with as or more devastating consequences.”

While the US remains “relatively flat-footed,” it continues, “both Russia and China are executing well developed cyber-enabled regional and global ‘grey zone’ unconventional strategies against the US and its allies”.

Already, the report says, those strategies threaten to cripple the Navy’s ability to fight, no matter how many aircraft carriers it has.

“The systems the US relies upon to mobilise, deploy, and sustain forces have been extensively targeted by potential adversaries, and compromised to such as extent that their reliability is questionable,” it says. In layman’s terms, that means the US Navy, as well as the Army, Air Force, and Marine Corps, may find they can’t count on all the satellites and other technology they use to navigate, communicate, locate targets and hit them.

Time

You Might Also Read: 

The US Navy Is Leaking Secrets:

 

 

« US Electric Grid Suffers Unexplained DDoS Attack
High-Tech Enhanced Military Vision »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Hack in the Box Security Conference (HitBSecConf)

Hack in the Box Security Conference (HitBSecConf)

HITBSecConf is a platform for the discussion and dissemination of next generation computer security issues. Our events feature two days of training and a two-day multi-track conference

LogicManager

LogicManager

LogicManager offer a complete set of IT governance, risk and compliance software solutions and advisory services.

IS Decisions

IS Decisions

IS Decisions builds affordable and easy-to-use Access Management software solutions, allowing IT teams to effectively secure access to Active Directory infrastructures, SaaS apps and data within.

Galois

Galois

Galois specializes in the research and development of new technologies that solve the most difficult problems in computer science.

Celestya

Celestya

Celestya is dedicated to providing the most advanced and cost effective systems for human behavior education on cybersecurity awareness training.

SlashNext

SlashNext

The SlashNext Internet Access Protection System (IAPS) provides Zero-Day protection against all internet access threats including Social Engineering & Phishing, Malware, Exploits and Callback Attacks.

Wolfpack Information Risk

Wolfpack Information Risk

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities.

Neupart

Neupart

Neupart provides Information Security Management System, Secure ISMS, allowing organisations to automate IT Governance, Risk and Compliance management.

Cyber Security Malta

Cyber Security Malta

Cyber Security Malta is part of Malta's National Cyber Security Strategy which aims to combat cybercrime, strengthen national cyber defence and provide cyber security awareness and education.

Invensity

Invensity

INVENSITY is an interdisciplinary technology and innovation consulting company. Centres of excellence include Cyber Security and Data Privacy.

Savanti Consulting

Savanti Consulting

Savanti provides practitioner-led cyber security services tailored to meet each organisation’s unique requirements.

CyberNews

CyberNews

Cybernews.com is a research-based online publication that helps people navigate a safe path through their increasingly complex digital lives.

Opora

Opora

Opora is the leading cybersecurity provider of adversary behavior analytics “ABA” and preemptive security solutions.

IDECSI

IDECSI

IDECSI delivers cutting-edge technology and engages all employees in the security system for effective and cost-efficient data protection.

Karate Labs

Karate Labs

Karate is an open-source unified test automation platform combining API testing, API performance testing, API mocks & UI testing.

Cyderes

Cyderes

Cyderes (Cyber Defense and Response) is a global, pure-play, full life-cycle cyber security services provider formed from the merger of Herjavec Group and Fishtech Group in 2022.