Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    New U.S. Cyber-Defense Strategy a Two-Edged Sword

    Written by

    Mike Elgan
    Published May 16, 2015
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The U.S. military says it’s using a nuclear doctrine from the Cold War to prevent the next Sony Pictures Entertainment-style hack.

      U.S. Defense Secretary Ash Carter trotted out the Pentagon’s new Cyber Strategy in Silicon Valley last month. It replaces the previous strategy rolled out four years ago. The new strategy contains three very new and very surprising components, which will directly affect every company in the U.S.—doubly so for technology-oriented companies.

      Here’s what you need to know.

      1. The U.S. military says it will protect your company.

      In the past, the Pentagon’s cyber strategy was all about protecting the U.S. military from attack, as well as government agencies. Now Carter explicitly said that the department will also protect American “interests,” which includes U.S.-based corporations.

      The November attack on Sony Pictures Entertainment, which the government blames on the North Korean government, appears to have greatly influenced this policy shift to protect U.S. businesses.

      2. The new policy is deterrence through hack-attack retaliation.

      Instead of playing defense, which was the old strategy, the Pentagon says it intends to develop tools that enable it to “disrupt” the attackers’ networks, among other things. The paper singles out Russia, China, Iran and North Korea as major state-sponsored cyber-threats.

      Specifically, the military sees Russian government hackers as very good at covering their tracks, but they aren’t really sure what they’re after. Both Iran and North Korea are less skillful at hacking, but are super hostile toward U.S. interests. And, of course, China is great at hacking and it uses its skills mainly to steal everything and anything it can.

      The idea is that if foreign national governments know they’ll be attacked if caught, they’ll be less likely to engage in the espionage—corporate, industrial and military—that’s now becoming somewhat routine.

      This mirror’s America’s strategy during the Cold War. In fact, the era was called “the Cold War” because it was considered an ongoing war in which active hostilities were avoided because it could lead to nuclear annihilation. In effect, the “war” was conducted through proxies, economic isolation, sanctions and other means that avoided direct military engagement between the United States and the Soviet Union.

      The new cyber-strategy essentially escalates U.S. tensions with Russia, China, Iran and North Korea from non-war to Cold War, where U.S. policy is to engage the enemy with hostility hopefully without triggering a real war.

      It’s also similar organizationally to the War on Terror, where non-military organizations within the government are granted permission to conduct ongoing offensive operations against America’s perceived enemies. For example, the Central Intelligence Agency has since 911 been conducting drone strikes, assassinations and other wartime operations not only without war but without the Pentagon.

      In this case, the Cyber Mission Force is actually part of the Pentagon. But instead of simply supporting military operations, the group can now conduct operations on its own, including offensive operations, similar to what the CIA now does, but over the Internet.

      New U.S. Cyber-Defense Strategy a Two-Edged Sword

      3. The Pentagon wants to enlist private companies into the cause.

      Interestingly, though not surprisingly, a big part of the new strategy is to help the “private sector” do a better job securing its own company networks.

      Carter also proposed “private-sector exchange programs” to attract security talent into the military and to increase security research. The Pentagon plans to open a new office at Silicon Valley’s Moffett Field (managed by Google as part of a 60-year lease deal with NASA), which will not only enable the military to be closer to commercial technology, but also function as a venture arm to direct money to startups creating technology of use to the cyber-security effort.

      The military will use a venture capital firm called In-Q-Tel, which was set up by U.S. intelligence agencies 16 years ago to support new cyber-technology development.

      It’s clear that this new office will serve as a headquarters where the Pentagon will try to build bridges to the major Silicon Valley companies.

      In the wake of the Edward Snowden revelations, mistrust is at an all-time high between the government and the nation’s high-tech community. The government in general and the Pentagon in particular see this mistrust as part of the threat to national security. Part of the new mission seems to be to rebuild trust and foster cooperation.

      The most interesting goal of the new office, however, is that the military hopes Silicon Valley’s culture of turning failure into an advantage will rub off on Pentagon technologists. While government projects in general are focused on avoiding failure, Silicon Valley succeeds by accepting failure as part of the learning process. The goal is to fail as fast as you can so you can learn and move forward.

      There’s good news and bad news for IT professionals or someone who works in the private-sector technology community.

      The good news is that the Pentagon plans to do something about the ongoing state-sponsored hack attacks that just keep getting worse. Moreover, the government’s deep pockets will step up investment in security-related technology that will probably benefit companies and enterprises.

      That bad news is that state-sponsored cyber-war is here to stay. The nature of hacking-related hostilities is such that government hackers can usually cover their tracks and will never run out of targets.

      If they can’t hit the military, they hit the government. If they can’t hit the government, they go after the economy by attacking and making demands of private companies by spreading malware, stealing trade secrets and forcing them to spend huge amounts of money in a mostly futile effort to block the attacks.

      There’s simply no alternative than to invest in strong security and button up your company’s policies.

      Welcome to the new Cold War. Let’s just hope it stays cold.

      Mike Elgan
      Mike Elgan

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.