Defense Science Board warns of cyber problems

The U.S. military’s dependence on sophisticated network-centric information technology has become its “Achilles heel,” according to a new report from the Defense Science Board.

Although cyber threats have grown, there has been limited progress on cybersecurity for national defense and the incoming Obama administration should place the “highest priority” on accelerating and strengthening cybersecurity efforts, said the report, titled “Defense Imperatives for the New Administration,” which was published on the Web on Nov. 4.

The 72-page report provides an overview of urgent goals that include the need to maintain capabilities for nuclear power and deterrence, project conventional forces around the world, fight terrorism, and provide support for domestic response and recovery, among others.

The study also recommended an immediate overhaul of the Defense Department’s acquisition and business practices to enforce budget discipline and strengthen supply chain security. This includes reforming DOD's acquisition governance.

Although there has been a growing recognition of cyber vulnerabilities, and perimeter system and network defenses have been established, there is “scant real progress” in addressing the scope of the cyber threat, the report said.

Among the immediate actions recommended for improving DOD's  cyber posture:



  • More aggressive auditing of military information networks.





  • Veiled acquisition terms for critical military software to avoid giving information to cyber adversaries.





  • More frequent upgrades of military software and hardware elements of critical systems;





  • More effective surveillance of military networks to identity data exfiltrations,





  • Detailed back-up plans for managing joint forces operations following data or system failures or corruptions;





  • Detailed plans for reconstituting networks using an alternative system, following a network failure.





  • Encrypting all data stored on mobile devices.





  • Minimizing the time to introduce new software and hardware, so cyber adversaries will be less prepared to make successful attacks. 





  • Removing unnecessary functionality from systems and networks,





  • Using government-produced elements in every critical system to complicate attack planning by cyber adversaries.



About the Author

Alice Lipowicz is a staff writer covering government 2.0, homeland security and other IT policies for Federal Computer Week.

Featured

  • Telecommunications
    Stock photo ID: 658810513 By asharkyu

    GSA extends EIS deadline to 2023

    Agencies are getting up to three more years on existing telecom contracts before having to shift to the $50 billion Enterprise Infrastructure Solutions vehicle.

  • Workforce
    Shutterstock image ID: 569172169 By Zenzen

    OMB looks to retrain feds to fill cyber needs

    The federal government is taking steps to fill high-demand, skills-gap positions in tech by retraining employees already working within agencies without a cyber or IT background.

  • Acquisition
    GSA Headquarters (Photo by Rena Schild/Shutterstock)

    GSA to consolidate multiple award schedules

    The General Services Administration plans to consolidate dozens of its buying schedules across product areas including IT and services to reduce duplication.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.