recommended reading

Pentagon to bolster networks and cyberattack capabilities with ‘Plan X’

An aerial view of t, ... ]

An aerial view of t, ... ] // Defense Department file photo

The Pentagon is seeking technology to coordinate and bolster cyberattack capabilities through a funding experiment called “Plan X,” contract documents indicate.

The Defense Advanced Research Projects Agency envisions new tools that will lay the foundation for launching malware and other computer espionage tools against foreign networks. “The objective of the Plan X program is to create revolutionary technologies for understanding, planning, and managing cyberwarfare in real-time, large-scale, and dynamic network environments,” reads a special notice posted August. 20.

The technology DARPA seeks is part of a larger shift at the Pentagon towards openly supporting the infrastructure for offensive strategies.

As part of Plan X, DARPA is looking to fund research to develop tools to scan and analyze the flow of information in networks to give military planners greater visibility and situational awareness for planning “cyber operations” against enemy systems, according to the notice. The agency also wants to build agile architecture that monitors damage in “dynamic, contested, and hostile network environments” and can adaptively defend against attacks and perform “weapon deployment.”

While this program is explicitly not funding vulnerability analysis or “cyberweapon generation” -- the creation of malware -- the technology developed under Plan X plausibly supports their deployment. DARPA wants technology that allows operations to be orchestrated in the same way as “the auto-pilot function in modern aircraft.” If a system can be programed to automatically repeat a certain offensive or defensive maneuver, this functionality could scale security efforts.

DARPA will seek out a team that can integrate these functions into a system and buy the infrastructure and hardware for it. “A system architecture team is also sought to lead the end-to-end Plan X system development,” the document said.

Agency officials will brief contractors on the program in separate sessions -- one open and one classified Secret -- in Arlington, Va., on September 27. A formal request for proposals will be released at the end of September.

DARPA sought $208 million in cyber spending in fiscal 2012, up from $120 million the previous year. The military’s venture capital wing plans to devote more resources to cyber research in the future. In a 2011 address Regina Dugan, then director of DARPA, said, “we will focus an increasing portion of our cyber research on the investigation of offensive capabilities to address military-specific needs.”

A new generation of government-funded malware and the infrastructure for their deployment is raising legal and ethical questions. The Pentagon, under the orders of the White House, was reported to be involved in malware attacks against Iran’s nuclear enrichment facilities as far back as the Bush administration. Stuxnet, the computer worm reported to have been developed by Israel and United States and used to target centrifuges in Iran, bears similar features to Flame and Duqu, viruses also thought to have originated from state-sponsored campaigns.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download

When you download a report, your information may be shared with the underwriters of that document.