recommended reading

Pentagon cyber activities could grab $120 billion

An aerial view of t, ... ]

An aerial view of t, ... ] // Defense Department file photo

One of the latest reports analyzing the potential ramifications of a deficit reduction deal predicts tens of billions of dollars in increased spending for military cybersecurity and cyber weaponry.

Under one scenario, cyber funding would grow at the expense of personnel accounts. Savings of $55 billion from Defense Department payrolls would go toward space, cyber and communications activities. Under another scenario, officials would shift funds away from legacy aircraft programs, while devoting more than $121 billion to the cyber category.

The figures are based on the possibility that Congress might allow the Pentagon flexibility to target reductions, rather than mandate across-the-board spending cuts, known as sequestration, prescribed under the 2011 Budget Control Act. Unless lawmakers negotiate a compromise, uniform sequestration decreases will hit all Pentagon and civilian accounts to the tune of $1.2 trillion. 

The scenarios were developed by seven teams of budget and military experts assembled by the nonpartisan Center for Strategic and Budgetary Assessments. Their estimates reflect the Pentagon’s previously-announced strategic shift from funding ground forces in the Middle East to concentrating spending on automated arms and surveillance.

Each group “chose to protect investments in offensive and defensive cyber capabilities to preserve the integrity of U.S. networks and maintain the capability to degrade the battle networks of future adversaries,” the report states. Defense Secretary Leon Panetta as of Oct. 11 was still assuring the public that the military is investing more than $3 billion annually in cybersecurity.

Information security programs have been viewed as a sanctuary away from austerity measures, ever since sequestration threats surfaced in 2011. It is widely believed that agencies governmentwide are rebranding some line items as cybersecurity programs to save them from the knife.

But some former federal officials have pointed out that cyber investments inadvertently could be deleted because they are embedded in initiatives that are slated for the chopping block. In other words, cyber funding that is not listed as a separate account could disappear.

Threatwatch Alert

Network intrusion / Stolen credentials

85M User Accounts Compromised from Video-sharing Site Dailymotion

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.