Despite progress, DOD systems still vulnerable to hacking

Photo credit: Sean Lyngaas

Rep. Mac Thornberry (R-Texas), chairman of the House Armed Services Committee, said his committee would make bolstering U.S. cybersecurity personnel a priority this year.

Despite some key improvements from the previous fiscal year, Defense Department missions and systems remain vulnerable to hacking, according to an annual report from the Pentagon's weapons tester.

Cyber testing teams deployed on DOD networks were "frequently in a position to deliver cyber effects that could degrade the performance of operational missions," the fiscal 2015 report from the Office of the Director of Operational Test and Evaluation (DOT&E) states.

The report also notes that in the past year, the Pentagon has made important strides in cyber defense, including enhanced protection of some network elements and greater awareness from leaders of the potential impact of a hack on critical missions. But DOD network operators still face a daunting task in securing their networks.

The report also reveals that for months DOD personnel have been unable to access maintenance information on the F-35 stored in a Lockheed Martin database because it does not comply with information assurance policies implemented by U.S. Cyber Command in August 2015.

"Because of this non-compliance, government personnel have not been able to access the database via government networks, preventing the [evaluation team] from holding the planned reviews of maintenance records," the report states.

In the past couple of years, DOD officials have put greater emphasis on shoring up the cybersecurity of weapons systems. Frank Kendall, the Pentagon's top acquisition official, has made the issue a key piece of his latest round of acquisition guidance to the DOD workforce. Nonetheless, he has conceded that developing cybersecurity metrics for acquisition programs is a difficult task.

Officials have sought to chip away at the challenge. Curt Dukes, director of the National Security Agency's Information Assurance Directorate, said IAD will only be able to review a handful of weapons systems for vulnerabilities this fiscal year out of the "incredibly long list" IAD has been assigned.

Despite keen interest from military leaders in building the cyber mission force, there is still not enough expertise to go around, according to DOT&E's report. Some members of DOD's cyber protection teams lack the proper training, background or motivation to be effective, the report states.

Talented "red team" members who simulate cyberattacks are leaving for the private sector at a time when those teams are in particularly high demand, according to the report. "This trend must be reversed if the DOD is to retain the ability to effectively train and assess DOD systems and service members against realistic cyberthreats," the report states.

Cyber specialists who have not left for the private sector are not keeping pace with sophisticated adversaries, according to a Pentagon memo obtained by the Daily Beast.

Rep. Mac Thornberry (R-Texas), chairman of the House Armed Services Committee, has said his committee would make bolstering U.S. cybersecurity personnel a priority this year.

Speaking to reporters Feb. 1, Thornberry offered a two-pronged approach for his committee to tackle the cyber vulnerabilities in DOD weapons systems. One method is to go system by system, with the relevant subcommittees handling systems under their purview.

"But then you also have to look across because we are a networked enterprise increasingly, and that gives you great opportunities but also some vulnerabilities," Thornberry said, calling weapons cybersecurity a "huge issue."

About the Author

Sean Lyngaas is an FCW staff writer covering defense, cybersecurity and intelligence issues. Prior to joining FCW, he was a reporter and editor at Smart Grid Today, where he covered everything from cyber vulnerabilities in the U.S. electric grid to the national energy policies of Britain and Mexico. His reporting on a range of global issues has appeared in publications such as The Atlantic, The Economist, The Washington Diplomat and The Washington Post.

Lyngaas is an active member of the National Press Club, where he served as chairman of the Young Members Committee. He earned his M.A. in international affairs from The Fletcher School of Law and Diplomacy at Tufts University, and his B.A. in public policy from Duke University.

Click here for previous articles by Lyngaas, or connect with him on Twitter: @snlyngaas.


  • FCW Perspectives
    human machine interface

    Your agency isn’t ready for AI

    To truly take advantage, government must retool both its data and its infrastructure.

  • Cybersecurity
    secure network (bluebay/

    Federal CISO floats potential for new supply chain regs

    The federal government's top IT security chief and canvassed industry for feedback on how to shape new rules of the road for federal acquisition and procurement.

  • People
    DHS Secretary Kirstjen Nielsen, shown here at her Nov. 8, 2017, confirmation hearing. DHS Photo by Jetta Disco

    DHS chief Nielsen resigns

    Kirstjen Nielsen, the first Homeland Security secretary with a background in cybersecurity, is being replaced on an acting basis by the Customs and Border Protection chief. Her last day is April 10.

Stay Connected


Sign up for our newsletter.

I agree to this site's Privacy Policy.