Is the US Ready For Cyberwar?

Richard Stiennon

A highly-regarded cybersecurity analyst has recently published a book which makes a convincing case that not only is cyberwar between major world powers inevitable, but that the US has allowed itself to fall dangerously behind in preparing for it.

Richard Stiennon, who was previously an executive with Fortinent and Gartner, offers his analysis in There Will Be Cyberwar, published by IT-Harvest Press. In an interview for this column, Stiennon described how the motivation for his book came from an analysis of the U.S. military’s move into networking or, as he characterizes it, how they “jumped onto the Internet.”

Earlier this month, reports came out that of the $3 billion allocated by the Air Force Space Command on cybersecurity, not a single cent was spent on defending software vulnerabilities in weapons systems. This funding gap led Stiennon to believe that the U.S. military “was completely unprepared to fight a cyberwar.”

The problem is that in today’s technology age, weapons platforms, which include radar, targeting and missile systems, all contain tons of software. For example, Stiennon estimates that there are 9 million lines of code in one F-35 fighter jet and another 15 million lines in support systems. And, as we all know, software can be hacked.

At current government contracting rates, the cost to fix security flaws in all of the weapons platform code could be very high. Stiennon is critical of what he terms “the archaic contract selection system,” and faults the military for being unwilling to change.
“Think about how deep you would have to go in a military organization to change their thinking,” says Stiennon.

Looming over the cyberwar preparedness debate is the dark cloud of increased nation state hacking. The Wall Street Journal published a story two days ago that Iranian hackers were able to gain control of a dam in New York State back in 2013. And, according to Stiennon, there is evidence that China has stolen data on missile systems.

During a joint appearance at the White House with President Obama in September, China’s President Xi Jinping pledged that his country would not conduct economic spying in cyberspace. When asked if he believed that China had lived up to its promise, Stiennon was quick to reply, “No, not for a minute.”

Another ominous development concerns recent reports, which indicate that malware authors are getting more sophisticated in devising new techniques to evade detection. Intel Security, the company’s MacAfee Labs division reported an unprecedented increase in new macro malware that includes fileless attacks which leave no trace on disk, making detection much more difficult.

In a separate interview for this column with Vincent Weafer, vice president of Intel Security’s McAfee Labs, he confirmed that the tools outlined in his firm’s most recent report were being adopted by nation states. “Actors are trying to find ways to get their malware on the box without leaving any footprint,” says Weaver.

According to the Intel report, the use of malware attacks on companies and the US government are becoming more successful in part because of social networking. Malware developers can find out if a particular individual recently attended an industry conference or ordered a holiday gift through FedEx simply be accessing often publicly-available information posted to sites like Facebook or Twitter. They can then craft an innocuous-looking email referencing the conference or shipment, inject the malware once opened, and then reap the cyber-spy benefits.

In a separate development, the news broke late last week that Juniper Networks found unauthorized code had been inserted into its ScreenOS software that can decrypt devices without leaving a trace of who did it. The company makes communications equipment for large enterprises, including the US government. The FBI is investigating whether foreign governments were involved.

What is not clear at this point is when and how the first cyberwar conflict will play out. Stiennon believes that the first occurrence will be in less than five years and will most likely include an engagement between world powers, such as China and Taiwan.

He also points out that the military has acknowledged the funding gaps in defending software vulnerabilities and are beginning to take steps to address them. In the meantime, the clock is ticking and recent developments just this month alone highlight the urgency of the task.

Examiner: http://exm.nr/1Jx8s47

« Islamic State Is An Existential Threat
Bitcoin Developer Says Cryptocurrency Has Failed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Guardtime

Guardtime

Guardtime's Black Lantern platform provides real-time cybersecurity and data-centric asset protection.

Forensic Control

Forensic Control

Forensic Control specialise in providing simple & straightforward Cyber Security to organisations, helping them assess, prevent and respond to cyber threats.

Cybereason

Cybereason

Cybereason provides attack protection with cutting edge EDR and XDR, and industry recognized consulting services to support organizations throughout any stage of the incident lifecycle.

Boldon James

Boldon James

Boldon James are market leaders in data classification and secure messaging software.

Cygilant

Cygilant

Cygilant is a SOC2 certified service provider that combines MSSP and Incident Detection and Response (IDR) capabilities managed by global SOCs staffed with trained security engineers.

IUCC Cyber Unit - Israel

IUCC Cyber Unit - Israel

IUCC Cyber Unit safeguards Israel’s National Research & Education Network (NREN).

CultureAI

CultureAI

CultureAI deliver intelligent cyber security awareness education and tools that build resilient security cultures where employees help defend.

Workz Group

Workz Group

Workz connects and protects mobile subscribers of today and tomorrow by providing secure removable or embedded SIMs and remote provisioning solutions for consumer, M2M and IOT devices.

Pryv

Pryv

Pryv is a Swissmade software for privacy, personal data collection, usage, sharing and storage.

Argo Group

Argo Group

Argo is an international underwriter of specialty insurance. Argo Cyber offers a full spectrum of coverage solutions related to professional and technology services.

Nominet

Nominet

Nominet's cyber division offers network detection and response services to governments and enterprises worldwide.

Axis Security

Axis Security

Axis Security technologies transform open networks and vulnerable applications into fully protected resources that the business can trust.

AnaVation

AnaVation

AnaVation is a trusted partner delivering high-value, cost-effective solutions that solve the most complex technical and analytical problems for our customers.

Sansec

Sansec

Sansec is the global leader in eCommerce malware and vulnerability detection. We help you to stay ahead of hackers!

Data Pie Cybersecurity

Data Pie Cybersecurity

The Data Pie Cybersecurity Consulting offers a 360° around protection for your IT security. Security awareness solutions and consulting.

Chestnut Hill Technologies (CHT)

Chestnut Hill Technologies (CHT)

CHT provide Best Practices IT Cybersecurity and Technology Solutions and Consulting Support to the Mid Cap through Fortune 1000 Nationwide.