recommended reading

Commentary: Defense cyber strategy avoids tackling the most critical issues

Summer in Washington is not usually the time when major news breaks. This year is proving the exception as lawmakers and the White House struggle with the debt ceiling. Amid this economic activity, the Defense Department on July 14 issued its Strategy for Operating in Cyberspace. Given the volume and nature of nefarious cyber activity seen recently, a bold and innovative plan could have been expected. Those hoping for such would have been disappointed, however, at least by the unclassified version of the document made publicly available. With so much at stake, either in the cyber domain or dependent on it, a clear-eyed assessment of the strategy -- its strengths, weaknesses and gaps -- is in order. Indeed, the future shape of both conflict and warfare likely will include a cyber component.

In the last five years alone, there have been more than six dozen significant cyber incidents, according to a running compilation by the Center for Strategic and International Studies. Targets have included Defense, the State and Commerce departments, and major defense contractors. Classified defense networks have been hacked. The asymmetry is striking: consider unmanned aerial vehicle operations in Iraq breached by insurgents on laptops with cheap file-sharing software. Online crime and fraud have generated millions, if not billions, of dollars in ill-gotten gains. Worse yet, the most sophisticated actors and incidents go undetected, as foreign intelligence services engage in cyber espionage, often combining technical and human intelligence in their exploits. With everything from critical infrastructure to intellectual property potentially at risk, the need for a correspondingly robust yet sophisticated counterposture is clear. So what did the Defense Department deliver?

The department's strategy is predicated upon five strategic initiatives. The first identifies cyberspace as "an operational domain" like any other (land, sea, air, space) with concomitant consequences for organizing, training and equipping. The second calls for the use of new "operating concepts" to protect Defense networks and systems. The third specifies a "whole-of-government" approach to cybersecurity based on partnerships both within government and with the private sector. The fourth cites relationship-building with international allies and partners to increase "collective cybersecurity." The fifth signals intent to leverage American "ingenuity" through its cyber workforce and fast-paced technological innovation.

All five planks are logical and laudable in principle. But none of them are new or novel. To the contrary, many of these elements have been discussed as desiderata for years. That the strategic conversation and planning environment should still be so stunted is disappointing if not also disturbing. Criticism based on missing pieces of the strategy also has come from within, notably from Gen. James Cartwright, vice chairman of the Joint Chiefs of Staff. Speaking to reporters just before the official release of the document, Cartwright lamented the defensive character of the plan, which highlights the use of sensors and other means to support "active defenses" intended to detect and disrupt cyberattacks: "If . . . I'm not going to do anything other than improve my defenses every time you attack me, it's difficult to stop that cycle." He then suggested a recalibration of Pentagon cybersecurity efforts so that half (rather than 10 percent, as at present) would be dedicated to offense.

The omission of cyber weapons from the strategy, in terms of a treatment of their development and use, is the unacknowledged gorilla in the room. Ignoring this challenging area of doctrine and policy will not make it go away. Heated debates about these issues continue to rage among analysts and commentators. To be fair, the difficulties associated with deterrence and retaliation in this context are substantial. For starters, the threat spectrum is wide and varied and includes other countries, nonstate actors, terrorists, organized crime syndicates, corporate insiders and teenage hackers. Actors without addresses can attack in relative anonymity, and smoking keyboards are hard to find. Cartwright himself has referenced legal issues that complicate and slow progress on the development of offensive strategy, such as delineation of jurisdiction between Defense and domestic agencies. Congressional patience is wearing thin, however. Just the other day, Sens. John McCain, R-Ariz., and Carl Levin, D-Mich., wrote to Defense Secretary Leon Panetta, requesting answers to a series of questions about U.S. policy on cyberwarfare and associated legal matters. The letter emphasized the urgency of resolving significant issues, such as "the relationship between military operations in cyberspace and kinetic operations," and "the definition of what would constitute an act of war in cyberspace." Details aside, the importance of maintaining a U.S. edge in cyberspace, on offense as well as defense, should be a conceptual given.

As officials continue to work their way through all these complexities, including attribution, one powerful dimension of the nation's deterrent may be the ability to quickly reconstitute damaged systems, regardless of the perpetrator. For now, though, strategic ambiguity remains: the United States will respond to grave attack (cyberspace being a "domain" akin to the others), but the instruments it would invoke are unspecified. Ambiguity may in fact be advantageous, permitting consideration of a range of response options and tools -- as long as there are markers in the sand concerning perpetrators, intentions and circumstances. Moving forward, other important open questions include the place and parameters, if any, of information operations in the form of "digital disinformation" that could be invoked to influence outcomes and behavior.

While bits and bytes may never completely replace bullets and bombs, cyber tools can serve either as a force multiplier or as a separate channel of attack. Until policy and doctrine here catch up with technology and people, our cyber posture will remain more reactive and ad hoc, and therefore potentially less effective, than it should or could be. Some have even argued that it is too late for redress, and that we should instead start anew by building "a more hardened enterprise structure for some activities." Regardless of one's view on that matter, it highlights the overlap between critical services and national defense. As the strategy makes clear, Defense will help protect privately held critical infrastructure that supports military functions.

The more charitable evaluations of the strategy conclude it is "a reasonable first step." Let's hope the optimists are rewarded with additional action in the weeks and months ahead, in the form of further planning and strategy that tackles the hard issues currently left unaddressed. Unless and until that happens, bits may come back to bite us.

Frank J. Cilluffo is director of The George Washington University Homeland Security Policy Institute. Sharon L. Cardash is associate director of HSPI.

Threatwatch Alert

Network intrusion / Software vulnerability

Hundreds of Thousands of Job Seekers' Information May Have Been Compromised by Hackers

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.