Pentagon Cyber-Command In the Works 90
An anonymous reader sends word of a new cybersecurity project to defend US networks from attacks and strengthen the government's "offensive capabilities in cyberwarfare." Right now, the most likely candidate to lead the project is the Director of the NSA, Keith Alexander, who was quick to assert that the NSA itself wouldn't try to run the whole show (something they've been criticized for in the past). Quoting the Wall Street Journal:
"Cyber defense is the Department of Homeland Security's responsibility, so the command would be charged with assisting that department's defense efforts. The relationship would be similar to the way Northern Command supports Homeland Security with rescue capabilities in natural disasters. The NSA, where much of the government's cybersecurity expertise is housed, established a similar relationship with Homeland Security through a cybersecurity initiative that the Bush administration began in its final year."
Re: (Score:3, Interesting)
You know it's a bad article when the first comment is a troll and all the others whine about the overuse of a word.
Re: (Score:1)
Sounds like someone is jealous.
Re: (Score:2)
Re:Cyber Security is a job for the Airforce (Score:5, Funny)
Because we don't have a Tube Force?
Re: (Score:1)
OK, while I agree that cyber- anything has been over used, the Air Force has already stepped forward ahead of the other services to stand up a "Cyber Command". However, USSRATCOM has Cyber warfare and defense in its mission statement. A joint task force is the most likely form of any cyber-related activity, either offensive or defensive. The big problem is, how can you defend against something when it's already inside your walls? The Pentagon's networks have been infiltrated more times than I can count with
Re: (Score:2, Insightful)
Because the Air Force decided to add "cyberspace" into their mission statement to justify asking more money from Congress.
http://www.af.mil/news/story.asp?storyID=123013440 [af.mil]
Being in the military, its very frustrating knowing a plethora of ways to make your job more secure but lacking the ability to change anything. Most of the branches, instead of pushing the envelope of computing like in the 30s, 40s, and 50s, have removed themselves from the business and contract it out (its not sexy enough and doesn't en
Re: (Score:1)
Re: (Score:2)
He was trying to troll, but... (Score:2)
Umm, why is it a job for the Air Force, as opposed to the Navy, Army or some other Governmental agency? Offensive cyber-warfare may be a role for the air force, as in blowing up the computers of our adversaries by dropping bombs on them.....
The parent was trying to troll, but the Air Force DID try to hog the "cyber warfare" mission [wired.com], and SecDef Gates slapped them down for it. The Army and Navy protested, and they had a valid point: since all the services rely on computer networks, why should one service have a monopoly on "computer warfare"?
Re: (Score:1)
Whether the Air Force, NSA, FBI, or whatever agency gains the specific monopoly of offensive cyber warfare in the US is irrelevant. The real question is why the US wants it and the US government wants offensive cyber capabilities for one reason and one reason alone...
China got there first.
Oh, and to 'protect American interests at home and abroad'. Maybe two reasons...
1995 called... (Score:5, Funny)
Re:1995 called... (Score:4, Funny)
Re: (Score:3, Insightful)
Our government is slow and inefficient. In takes it 14-15 years to move from buzzword initiation to actual planning.
That is not a bug, BTW. It's a design feature. The constitution was written by a bunch of rebels who fought with the previous government and won. They were not inclined to want to fight again.
Re: (Score:2, Funny)
It wants its buzzword back. Please stop using "Cyber-". Thank you.
Would you prefer iCommand?
Re: (Score:3, Funny)
Would you prefer iCommand?
That's soooo 2000. Nowadays, it would be YouCommand.
Re: (Score:3, Funny)
Nah. Already outdated. Now it's "YouTweet"
Re: (Score:2)
Would it not be 'TweetCommand'?
On second thought, I am not sure how safe I'd feel being defended by 'TweetCommand'.
Re: (Score:2)
Nope. What happens when a bird gives his team of birds a command?
Exactly. ^^
Re: (Score:2, Insightful)
Cyber? (Score:1)
Re: (Score:3, Interesting)
So, you'd rather have the jargon-of-the-month than to settle upon a standard term?
Seriously? You'll get over it, bub. In the meantime, I'm very thankful that they're not making up new buzzwords every 6 months.
Re: (Score:1)
But they do seem to make up new buzzwords every 6 months.
I'm not sure exactly who 'they' are, but buzzwords must be coming from somewhere.
Re: (Score:3, Insightful)
Well, in this case, we're talking about the government. But I think most buzzwords come from marketing people. These are people who are *paid* to come up with buzzwords... and if someone else comes up with a good one, they all jump to use it.
Heaven forbid a company is seen to be behind-the-curve because they use outdated verbiage... surely that means they use outdated tech, right?
Anyway, thinking by typing here... I bet the
Re: (Score:1, Insightful)
"Network Operations" is actually used a lot at the actual operational level. It's just the Administrative policy making level (run mostly by people a decade or more 'over the hill')that gets wrapped up in buzzwords. ... NetOpsSecCom maybe?
Also: 'Cybercommand' will probably get more attention than 'Network Operations and Security Command'
Re: (Score:1, Funny)
"Network Operations" is actually used a lot at the actual operational level. It's just the Administrative policy making level (run mostly by people a decade or more 'over the hill')that gets wrapped up in buzzwords. Also: 'Cybercommand' will probably get more attention than 'Network Operations and Security Command' ... NetOpsSecCom maybe?
I'm rather surprised they haven't called it GloryHole. I mean between the bullshit with Senators in bathrooms, and this brouhaha of TeaBagging Obama, why not just simply call it what it is for Congressman to readily understand and be done with it.
Although personally I think the Pentagon's CloudCommand seems to be a fairly good choice as well, given when their not wearing ass-hats, they're certainly having them up in the clouds.
Re: (Score:1)
Military in charge of cyber security? (Score:1)
Call it whatever you want (Score:4, Interesting)
Re: (Score:1, Funny)
Movies don't think.
Re:Call it whatever you want (Score:4, Insightful)
I'm just glad they're finally taking this sort of shit seriously.
Very humorously ironic post.
The whole cyber command thing bugs me because its so expensive but does so little. I'm sure they'll have a huge command of generals and various other officers giving each other endless powerpoints about "synergisticly proactively defending the cyber battlefield". Trust me, no patches are going to get applied. Mostly a bunch of resume stuffing for the post-military career. Probably a lot of puzzling over how it could be that the more managers they put on the job, the slower the work gets done. Probably a lot of really pompous posing going on too, I'm leet, so leet, its classified and I can't tell you how leet I am, but trust me I'm just the most leet ever. And a lot of "I'm working so hard that you wouldn't believe it, but its all classified so I can't actually tell you what I'm working on" as he returns to his minesweeper game. I guarantee they'll have a vaguely NORAD like NOC 24x7 with dim lights and big screen TVs, with very expensive software to monitor ... their departmental intranet, and maybe they'll have isc.sans.org on refresh every 30 seconds to see whats going on, maybe, but that would probably be too clueful.
All they need to do, is get more admins, more equipment, and tell them to keep up with the times, read slashdot, whatever. The last thing they need is infinitely more commanders and procedures to gum up the works even worse.
Re:Call it whatever you want (Score:4, Funny)
They're going to have to classify your post. It's way too accurate.
Re: (Score:2)
I think a quote from my favourite mini-tv-series "Generation Kill" works well in almost any discussion about "why army X does thing Y like Z when it would be the best to do it like A":
That'll sum it up.
Re: (Score:1)
I'm just glad they're finally taking this sort of shit seriously.
Very humorously ironic post.
The whole cyber command thing bugs me because its so expensive but does so little. I'm sure they'll have a huge command of generals and various other officers giving each other endless powerpoints about "synergisticly proactively defending the cyber battlefield". Trust me, no patches are going to get applied. Mostly a bunch of resume stuffing for the post-military career. Probably a lot of puzzling over how it could be that the more managers they put on the job, the slower the work gets done. Probably a lot of really pompous posing going on too, I'm leet, so leet, its classified and I can't tell you how leet I am, but trust me I'm just the most leet ever. And a lot of "I'm working so hard that you wouldn't believe it, but its all classified so I can't actually tell you what I'm working on" as he returns to his minesweeper game. I guarantee they'll have a vaguely NORAD like NOC 24x7 with dim lights and big screen TVs, with very expensive software to monitor ... their departmental intranet, and maybe they'll have isc.sans.org on refresh every 30 seconds to see whats going on, maybe, but that would probably be too clueful.
All they need to do, is get more admins, more equipment, and tell them to keep up with the times, read slashdot, whatever. The last thing they need is infinitely more commanders and procedures to gum up the works even worse.
I thought we are already doing that now? Fact is, it's the enlisted who look at the officers like the morons they really are when it comes to executing and implementing any IT system. More often than not, the mantra is, "You want me to do what sir? Okay, if you say so..." Of course our enlistment contracts end and we get out into the real world.
NSA has an inherent conflict of interest. (Score:5, Interesting)
When a group that exploits a communication network system for information is also in charge of its security, what happens when a weakness is found? Do you:
A) Keep the weakness secret so you can exploit it.
B) Publish the fix so your networks are fixed, but also allowing those you may be monitoring to fix as well, and cut off an information source.
Bruce Schneier has a great commentary on this at his blog. [schneier.com]
What ever happened to Trusted PLatform computing? (Score:2)
You might as well say the Army has a conflict of interest since if they have a new weapon they could take over the country.
It's both true and not true. in some countries the army does indeed take over when it wants to. In others it tries to protect it's citizens. Why should the NSA not be expected to do this as well? What is needed is proper oversight.
Now as for How to approach this. I'm utterly puzzled why trusted platform computing (e.g. Palladium) has not take off for government and embedded computin
Re: (Score:2)
What is needed is proper oversight
That's the whole problem. The NSA is already in charge of the entire nation's cyber-security. They just don't want anyone to know about it.
Re: (Score:1, Redundant)
What is needed is proper oversight.
That's the whole problem. The NSA has been in charge of cyber-security for the entire nation for years. They junt don't want anyone to know about it.
Re: (Score:2)
The analogy is flawed.
Taking over the country with a weapon requires a violent coup, drawing the opposition of the government and other branches of the military.
Spying on the country without authorization is, by definition, covert, and can be denied or declared a matter of national security.
No it doesn't (Score:2)
The NSA already has full privs on DoD systems.
Re:No it doesn't (Score:4, Interesting)
Oh sure, just make stuff up. If it sounds paranoid enough, maybe some will mod you up. I've been an admin on two different DOD networks now, and in both cases I knew exactly who had full privileged access. In neither case was I even expected to provide our privileged passwords to higher headquarters, much less the NSA. could the NSA have GOTTEN the passwords to our systems? I'm sure, if they went through the proper channels and proved "need to know", but that's hardly the same thing thing as having "full privs on all DOD systems".
Good point (Score:1)
Ontop of that, this is just another example of US aggression. First we militerized space, now we are militerizing the internet. Disgusting, this is an example of Bush era policy that simply must be ended if we are going to run a country which reflects our supposed "ideals."
Especially, if we are going to complain when Chinese hackers invade our power grid. We've got no right to complain if we ourselves are developing the same capability. More Bush-era hyporcrasy.
Let's form a committee and ... (Score:1, Funny)
Let's form a committee and draw up a plan. Budget meeting tomorrow!
Other bids (Score:4, Funny)
Re: (Score:1)
Homeland Security??? (Score:3, Informative)
The only thing DHS is good at defending is its budget. Their own systems and networks are notoriously mismanaged and vulnerable. You have to go to the Bureau of Indian Affairs to find anything more inept.
The technical talent at NSA is the best in the world. It's their administrative and political leadership that could stand some fumigation.
Comment removed (Score:5, Insightful)
Re: (Score:2, Funny)
I don't see us getting too much useful info from hacking into China/Russia.
We can go in there and get our information back!
Eagleeye? (Score:2)
Yes, Please (Score:3, Insightful)
Re: (Score:2)
I like your thinking! In fact, let's develop a brand new bureaucracy that duplicates the efforts of one we already have.
http://www.afcyber.af.mil/
Re: (Score:2)
Tom Clancy? (Score:1)
Re: (Score:2)
As Great as This Is... (Score:1)
If the Federal Government can issue itself a secret warrant to search my house, you think they're going to give a
Re: (Score:3, Interesting)
Personally I'd rather see the Pentagon running this than one of the three letter agencies. I don't exactly TRUST the Pentagon (giving one's trust to anything with that many moving parts isn't smart), but I've been around the military long enough in various capacities to feel that IN GENERAL, most military people are legitimately focused on external threats. Not to say that there aren't bad apples everywhere, and certainly the military is as capable of colossal screw-ups as anyone, but at least there is no
Oh good, they're working on SkyNet... (Score:1)
Re: (Score:2)
Hey. Wait a minute.
You just described my project.
Convenient Timing (Score:1)
It seems to me that the average layman probably hear
See the big picture through the FUD (Score:1)
There is bureaucratic fight between the NSA and the White House (DHS is a cabinet position) over who gets unfettered access to ALL government networks in the guise of security.
The stories of power grid and SCADA control breaches, the F-35 leaks and nameless Chinese hackers are FUD originating from the NSA to scare other government entities into surrendering full control of their networks to the NSA.
The first place to start reading up on this fight over network control should be the National Cybersecurity Ce [wikipedia.org]
Time to leave (Score:1)
After all how dare they even think of questioning his most holy and his minions in D.C., that's just plain un-Amerikan
Group that specializes in cyber terrorists (Score:1)
What one moment, according to the Army they already have one and are using it to recruit people.
What oh my goodness was that a misleading advertisement by the Army? No they wouldn't lie to possible recruits would they???
YES......