recommended reading

Why Does the Air Force Spend Twice as Much to Hack than to Deflect Threats?

Personnel of the 624th Operations Center, located at Joint Base San Antonio - Lackland, conduct cyber operations.

Personnel of the 624th Operations Center, located at Joint Base San Antonio - Lackland, conduct cyber operations. // United States Air Force file photo

The House on Thursday approved legislation that breaks out $13.4 million for Air Force cyberattack operations and $5.6 million for efforts to defend the service's networks.

But those numbers likely underrepresent cyber offense and especially cyber defense spending, some military budget analysts say. The problem with cyber funding -- governmentwide -- is that it's hard to define what cyber is, they note. 

"What they are splitting out here is really just a portion of what they are doing for cyber offense and defense," said Todd Harrison, director of defense budget studies at the Center for Strategic and Budgetary Assessments. "I think it's the part that's more focused on specific adversaries around the world."

The House’s version of the 2015 National Defense Authorization Act would spend a total of $67 million on Cyber Command offensive and defensive activities. The command oversees all Defense Department cyber operations. 

"I expect that if you did a true accounting of what DOD is spending on cyber, it would be in the billions" of dollars, Harrison said. 

The $5.6 million Air Force cyber defense number likely lowballs funding because the service, like nearly every Defense component, struggles to categorize cyber programs in that area, he said. Defensive operations include protecting military pay, accounting, and logistics systems, as well as websites and other servers and networks.

As for reserving $13.4 million for Air Force cyber strike activities alone, Harrison said, just a little tongue-in-cheek, "DOD can't do anything for less than $10 million.”

Armed Services Committee’s members applauded the Air Force for submitting a funding request that differentiated budget lines for offensive and defensive operations. 

"The committee is aware that this was done to consolidate the funding activities in these areas into single program lines to allow for rapid technology development and deployment for offensive and defensive tools," they said. "The committee commends the Air Force for being proactive in consolidating its activities, providing transparency in oversight for Congress while also allowing for rapid acquisition on the part of the Air Force."

The Air Force's budgeting approach "is a model for program management and oversight” that should be “emulated by the other services and Defense agencies,” as much as possible, the lawmakers said. 

Threatwatch Alert

Accidentally leaked credentials / Misplaced data

Boeing Employee Emails 36,000 Coworkers’ Personal Info to Spouse

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download

When you download a report, your information may be shared with the underwriters of that document.