Maj. Gen. Lord is a groundbreaker

As cyberattacks escalate, Lord has a new role as the Air Force’s chief cyberwarrior

The WILLIAM LORD File

Position: Director of cyberspace transformation and strategy on the Air Force staff at the Pentagon. Lord will assume command of the Air Force’s provisional Cyber Command Oct. 30.

Career highlights: From April 2004 to November 2005, Lord was commander of the 81st Training Wing at Keesler Air Force Base, Miss. He was commander of the audio-visual unit and operations officer at the White House Communications Agency from February 1989 to August 1993.

Education highlights: Lord earned a bachelor’s degree in biological and life sciences from the Air Force Academy, a master’s degree in business administration from Chapman University, and a master’s degree in national resource strategy and telecommunications from the National Defense University.

Honors: Lord’s major awards and decorations include the Defense Superior Service Medal, the Legion of Merit with three oak leaf clusters and the Humanitarian Service Medal.

Other policy power players

Rep. Bennie Thompson — The chairman of the Homeland Security Committee has been more than a thorn in the side of the Bush administration. The Mississippi Democrat has actively pushed for better information sharing, cybersecurity and Homeland Security Department management.

Dale Meyerrose and John Grimes — Myerrose, chief information officer of the Office of the Director of National Intelligence, and Grimes, the Defense Department’s CIO, have revamped the certification and accreditation process for both communities. The two also have focused on improving the information sharing between the communities and the security clearance process.

Mary Mitchell — The General Services Administration’s deputy associate administrator of electronic commerce, program manager of the Financial Management Line of Business and executive director at GSA’s Financial Systems Integration Office may seem like an unusual choice. However, Mitchell’s impact on the federal financial management community cannot be overlooked.

When Air Force Maj. Gen. William Lord leaves the Air Staff at the Pentagon later this month for his new assignment at Barksdale Air Force Base in Shreveport, La., he will venture into new territory. As the new commander of the service’s provisional Cyber Command, Lord will be a central figure in preparing the Air Force — and to a degree, the entire military — for a type of warfare some experts say could redefine the nature of armed conflict.

The Air Force always has been at the forefront of network operations and electronic warfare, but combat in cyberspace as a core mission for the service is relatively new. Service leaders first included fighting in the virtual domain in the Air Force’s mission statement in late 2005. A year later, Air Force Secretary Michael Wynne announced plans to create Cyber Command.

Lord has a sense of breaking new ground. “I feel a little bit like Christopher Columbus,” he said in an interview last week.

Prominent network attacks in recent months have helped focus public attention on cyberwarfare. In June, intruders broke into the unclassified network of the Office of the Secretary of Defense, prompting officials to disconnect the affected servers.

“Traditional military targets have been exactly that — military targets.” Maj. Gen. William Lord
Air Force

Experts say similar attacks from individuals and countries targeting economic, political and military organizations will increase.
To Lord, those attacks illustrate the fundamental difference between traditional warfare and battles in cyberspace.

“Traditional military targets have been exactly that — military targets,” he said.

But in the age of cyberwarfare, the line between civilians as actors on the virtual battlefield and those in uniform gets blurry, he said.
Lord said a different kind of blurriness could work in the military’s favor during offensive operations in the virtual domain: the anonymity of cyberspace.

Experts say identifying the origin of a cyberattack remains difficult. Attackers frequently use several intermediary servers worldwide to disguise their identity. After an incident, “the hard part is attribution,” said Linton Wells, a former official at the Defense Department’s Office of the Chief Information Officer who now teaches at the National Defense University.

But as much as officials are often in the dark about who attacked them, U.S. cyberwarriors could use the cover of anonymity to orchestrate large-scale offensives, Lord said. “I could argue this could be a deterrent effect.”

In a speech last month, Lord cited some examples of the types of mayhem the U.S. military could one day inflict on adversaries in an attempt to avert a traditional, bloody confrontation. He said the military could use cyberoperations to confuse enemies by opening floodgates, controlling traffic lights or scrambling the banking systems in their countries.

Still, although the thinking about defending against cyberattacks is relatively mature, U.S. doctrine for an all-out cyberwar is still in its infancy and many questions remain unanswered.

For example, the rules for information operations and military deception still are unclear in a virtual world the military shares with civilian society. “If you…send an e-mail to cognitively change some thinking on the part of an enemy, how do you send that?” Lord asked. “If you use the Internet to deliver something, does that mean the Internet is now a legal target? That’s a box we may not wish to open.”

During the next year, Lord will help find answers to these questions. His Cyber Command is slated to become a regular Air Force organization in October 2008.

The 2015 Federal 100

Meet 100 women and men who are doing great things in federal IT.

Featured

  • Shutterstock image (by venimo): e-learning concept image, digital content and online webinar icons.

    Can MOOCs make the grade for federal training?

    Massive open online courses can offer specialized IT instruction on a flexible schedule and on the cheap. That may not always mesh with government's preference for structure and certification, however.

  • Shutterstock image (by edel): graduation cap and diploma.

    Cybersecurity: 6 schools with the right stuff

    The federal government craves more cybersecurity professionals. These six schools are helping meet that demand.

  • Rick Holgate

    Holgate to depart ATF

    Former ACT president will take a job with Gartner, follow his spouse to Vienna, Austria.

  • Are VA techies slacking off on Yammer?

    A new IG report cites security and productivity concerns associated with employees' use of the popular online collaboration tool.

  • Shutterstock image: digital fingerprint, cyber crime.

    Exclusive: The OPM breach details you haven't seen

    An official timeline of the Office of Personnel Management breach obtained by FCW pinpoints the hackers’ calibrated extraction of data, and the government's step-by-step response.

  • Stephen Warren

    Deputy CIO Warren exits VA

    The onetime acting CIO at Veterans Affairs will be taking over CIO duties at the Office of the Comptroller of the Currency.

  • Shutterstock image: monitoring factors of healthcare.

    DOD awards massive health records contract

    Leidos, Accenture and Cerner pull off an unexpected win of the multi-billion-dollar Defense Healthcare Management System Modernization contract, beating out the presumptive health-records leader.

  • Sweating the OPM data breach -- Illustration by Dragutin Cvijanovic

    Sweating the stolen data

    Millions of background-check records were compromised, OPM now says. Here's the jaw-dropping range of personal data that was exposed.

  • FCW magazine

    Let's talk about Alliant 2

    The General Services Administration is going to great lengths to gather feedback on its IT services GWAC. Will it make for a better acquisition vehicle?

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above