Is the US Ready For Cyberwar?

Richard Stiennon

A highly-regarded cybersecurity analyst has recently published a book which makes a convincing case that not only is cyberwar between major world powers inevitable, but that the US has allowed itself to fall dangerously behind in preparing for it.

Richard Stiennon, who was previously an executive with Fortinent and Gartner, offers his analysis in There Will Be Cyberwar, published by IT-Harvest Press. In an interview for this column, Stiennon described how the motivation for his book came from an analysis of the U.S. military’s move into networking or, as he characterizes it, how they “jumped onto the Internet.”

Earlier this month, reports came out that of the $3 billion allocated by the Air Force Space Command on cybersecurity, not a single cent was spent on defending software vulnerabilities in weapons systems. This funding gap led Stiennon to believe that the U.S. military “was completely unprepared to fight a cyberwar.”

The problem is that in today’s technology age, weapons platforms, which include radar, targeting and missile systems, all contain tons of software. For example, Stiennon estimates that there are 9 million lines of code in one F-35 fighter jet and another 15 million lines in support systems. And, as we all know, software can be hacked.

At current government contracting rates, the cost to fix security flaws in all of the weapons platform code could be very high. Stiennon is critical of what he terms “the archaic contract selection system,” and faults the military for being unwilling to change.
“Think about how deep you would have to go in a military organization to change their thinking,” says Stiennon.

Looming over the cyberwar preparedness debate is the dark cloud of increased nation state hacking. The Wall Street Journal published a story two days ago that Iranian hackers were able to gain control of a dam in New York State back in 2013. And, according to Stiennon, there is evidence that China has stolen data on missile systems.

During a joint appearance at the White House with President Obama in September, China’s President Xi Jinping pledged that his country would not conduct economic spying in cyberspace. When asked if he believed that China had lived up to its promise, Stiennon was quick to reply, “No, not for a minute.”

Another ominous development concerns recent reports, which indicate that malware authors are getting more sophisticated in devising new techniques to evade detection. Intel Security, the company’s MacAfee Labs division reported an unprecedented increase in new macro malware that includes fileless attacks which leave no trace on disk, making detection much more difficult.

In a separate interview for this column with Vincent Weafer, vice president of Intel Security’s McAfee Labs, he confirmed that the tools outlined in his firm’s most recent report were being adopted by nation states. “Actors are trying to find ways to get their malware on the box without leaving any footprint,” says Weaver.

According to the Intel report, the use of malware attacks on companies and the US government are becoming more successful in part because of social networking. Malware developers can find out if a particular individual recently attended an industry conference or ordered a holiday gift through FedEx simply be accessing often publicly-available information posted to sites like Facebook or Twitter. They can then craft an innocuous-looking email referencing the conference or shipment, inject the malware once opened, and then reap the cyber-spy benefits.

In a separate development, the news broke late last week that Juniper Networks found unauthorized code had been inserted into its ScreenOS software that can decrypt devices without leaving a trace of who did it. The company makes communications equipment for large enterprises, including the US government. The FBI is investigating whether foreign governments were involved.

What is not clear at this point is when and how the first cyberwar conflict will play out. Stiennon believes that the first occurrence will be in less than five years and will most likely include an engagement between world powers, such as China and Taiwan.

He also points out that the military has acknowledged the funding gaps in defending software vulnerabilities and are beginning to take steps to address them. In the meantime, the clock is ticking and recent developments just this month alone highlight the urgency of the task.

Examiner: http://exm.nr/1Jx8s47

« Islamic State Is An Existential Threat
Bitcoin Developer Says Cryptocurrency Has Failed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Backup Technology

Backup Technology

Backup Technology is a world leader in the Online Cloud Backup, Disaster Recovery and Business Continuity market.

Lloyd's

Lloyd's

As an insurance market, Lloyd’s can provide access to more than 65 expert cyber risk insurers in one place.

Cyber 360

Cyber 360

Cyber 360 is a Cybersecurity contract and fulltime placement firm dedicated to identifying and hiring Cybersecurity professionals.

French Expert Center Against Cybercrime (CECyF)

French Expert Center Against Cybercrime (CECyF)

CECyF is a centre of excellence for countering cybercrime in France.

BioCatch

BioCatch

BioCatch uses behavioral biometrics for fraud prevention and detection. Continuous authentication for web and mobile applications to prevent new account fraud.

Egis Technology

Egis Technology

Egis specializes in the IC design, research and development, and the testing and sales of capacitive fingerprint sensor.

IGX Global

IGX Global

IGX Global is a provider of information network and security integration services and products.

Perception Point

Perception Point

Perception Point is a Prevention-as-a-Service company, built to enable digital transformation. Our platform offers 360-degree protection against any type of content-based attack.

Physec

Physec

Physec offers innovative security products and solutions for the Internet of Things ecosystem.

Trapmine

Trapmine

TRAPMINE is an innovative cybersecurity products company mainly focusing on protecting organizations from Advanced Persistent Threat & Zero-Day attacks.

Beyond Identity

Beyond Identity

Beyond Identity employs an elegantly simple concept, the personal certificate authority and self signed certificates, to replace passwords.

Ultra Electronics

Ultra Electronics

Ultra specialises in providing application-engineered bespoke solutions. We focus on mission critical and intelligent systems in the defence, security, critical detection & control markets.

FYEO

FYEO

FYEO is a threat monitoring and identity access management platform for consumers, enterprises and SMBs.

Enea

Enea

Enea is one of the world’s leading specialists in software for telecommunications and cybersecurity. Our products are used to enable services for mobile subscribers, enterprise customers and IoT.

APCERT

APCERT

APCERT cooperates with CERTs and CSIRTs to ensure internet security in the Asia Pacific region, based around genuine information sharing, trust and cooperation.

CyberSecAsia

CyberSecAsia

CyberSecAsia series conference is the one and only decision-makers gathering for CISO and info security experts in Asia.