Cybersecurity

Sending cyber sense down the Navy chain of command

Jan E. Tighe, U.S. Navy Fleet Cyber Command

Vice Adm. Jan E. Tighe, commander of U.S. Fleet Cyber Command, says the Navy brass has a good handle on the need for cyber defense, but the lower ranks need to be brought up to speed.

The U.S. Navy is undergoing a “cultural shift” toward seeing computer networks for the battlefields they are, but some of that education has yet to trickle down to the rank and file, its top cyber commander said May 6.

The Navy has in recent years moved away from its IT procurement approach of a decade ago, which did not recognize IT systems as potential weapons platforms, said Vice Adm. Jan Tighe, commander of the U.S. Fleet Cyber Command and the Navy’s 10th Fleet. She was speaking at a conference hosted by C4ISR & Networks in Arlington, Va.   

“So we have to shift the way we program for, procure, support and maintain, and the way that our war-fighting commanders, commanding officers at sea, view this network,” she said.

The Navy’s top brass is attuned to this new cyber-defensive paradigm, but “as you get lower down the food chain, it gets a lot more spotty – there are pockets of understanding, there are pockets of non-understanding,” said Tighe, the first woman to command a numbered Naval fleet.

The Navy does its own cybersecurity audits, in addition to those of U.S. Cyber Command, to scour the service’s networks for vulnerabilities. Though they occur only once every three years, those inspections cover more platforms and commands than is mandated by U.S. Cyber Command, she said.

The inspections offer a “snapshot in time” of a Navy ship or other asset’s vulnerabilities. Commanders are graded on the security of their unclassified and classified systems, and those receiving poor grades have to draw up a plan for improving. Something as seemingly benign as a smartphone plugged in to charge could threaten a Navy network if it is unsecured.

Tighe said she is keen to use those inspections, along with compliance requirements for outsiders to use Navy networks, as a means of making the service more cyber-secure. “Tightening the screws on those as we move forward … raises the standard by which we’re operating as a Navy,” she added.

The collaboration across military services and U.S. Cyber Command needed for DOD-wide cyber-defense is improving, she said, citing her time working at U.S. Cyber Command at its inception. Commanders were then narrowly focused on defending their individual networks, but that is changing to a more holistic approach.

“Yes, we have different types of networks. Yes, we have different ways that we deliver those networks to our services,” she said of the military services. “But there is commonality in terms of how we approach the fight; there is commonality in how we talk to our service leaders about these problems.”

About the Author

Sean Lyngaas is an FCW staff writer covering defense, cybersecurity and intelligence issues. Prior to joining FCW, he was a reporter and editor at Smart Grid Today, where he covered everything from cyber vulnerabilities in the U.S. electric grid to the national energy policies of Britain and Mexico. His reporting on a range of global issues has appeared in publications such as The Atlantic, The Economist, The Washington Diplomat and The Washington Post.

Lyngaas is an active member of the National Press Club, where he served as chairman of the Young Members Committee. He earned his M.A. in international affairs from The Fletcher School of Law and Diplomacy at Tufts University, and his B.A. in public policy from Duke University.

Click here for previous articles by Lyngaas, or connect with him on Twitter: @snlyngaas.


FCW in Print

In the latest issue: Looking back on three decades of big stories in federal IT.

Featured

  • FCW @ 30 GPS

    FCW @ 30

    Since 1986, FCW has covered it all -- the major contracts, the disruptive technologies, the picayune scandals and the many, many people who make federal IT function. Here's a look back at six of the most significant stories.

  • Shutterstock image.

    A 'minibus' appropriations package could be in the cards

    A short-term funding bill is expected by Sept. 30 to keep the federal government operating through early December, but after that the options get more complicated.

  • Defense Secretary Ash Carter speaks at the TechCrunch Disrupt conference in San Francisco

    DOD launches new tech hub in Austin

    The DOD is opening a new Defense Innovation Unit Experimental office in Austin, Texas, while Congress debates legislation that could defund DIUx.

  • Shutterstock image.

    Merged IT modernization bill punts on funding

    A House panel approved a new IT modernization bill that appears poised to pass, but key funding questions are left for appropriators.

  • General Frost

    Army wants cyber capability everywhere

    The Army's cyber director said cyber, electronic warfare and information operations must be integrated into warfighters' doctrine and training.

  • Rising Star 2013

    Meet the 2016 Rising Stars

    FCW honors 30 early-career leaders in federal IT.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group