Defense Department Officials Bemoan Increasingly Sophisticated Cyberattacks
WASHINGTON — Defense Department officials described a bleak outlook for cybersecurity to a Senate panel Tuesday as a report of another huge Internet scam emerged from a new government report.
However, they also said they are becoming increasingly sophisticated in stopping the scammers.
“Neither the [Defense] Department nor the [defense industrial base] will ever be able to secure industry’s networks and control unclassified information completely but our goal over the short, medium, and long terms is to complicate and frustrate adversary planning and operations so that our adversaries cannot act with impunity or at scale,” Rear Admiral William Chase told the Senate Armed Services subcommittee on cybersecurity.
Chase is the director of the Defense Department’s Protecting Critical Technology Task Force.
He spoke to the Senate subcommittee one day after the Federal Trade Commission reported that nearly 7,000 cryptocurrency purchasers lost more than $80 million to scammers from October through March. The victims were duped into believing they were investing their money through reputable organizations after being contacted through social media.
Also discussed during the hearing was the 2020 SolarWinds cyberattack, in which Russian government agencies penetrated deep into the computer files of several U.S. agencies and contractors.
Meanwhile, Eastern states continue to recover from the Colonial Pipeline ransomware attack that shut down the largest U.S. pipeline until a $5 million ransom was paid last week to the cybercriminals, believed to be based in Russia. Gas prices shot up in 11 states amid reports of widespread fuel shortages.
President Joe Biden is proposing increasing his 2022 federal budget request for cybersecurity to $2.1 billion with early indications it will win approval in Congress.
Chase acknowledged similar cyberattacks against the Defense Department but gave few details of what kind of information was stolen.
He said that beginning in 2006, the Defense Department began a large-scale effort to halt computer-based incursions into its network.
Despite initial success, “that threat continued to grow, and, in 2018, the Department of Defense faced a threat to its military advantage by determined adversaries and their intent to steal plans, documentation, designs and intellectual property for key weapon systems,” Chase said in his testimony.
The Defense Department has identified Russia, China, Iran, North Korea and Syria as the adversaries who persistently seek to break into its classified files.
Chase said the Defense Department computers are generally secure but not the networks of “small- and medium-sized subcontractors, where much of the same valuable data resides.”
Recent Defense Department cybersecurity has focused increasingly on government contractors, he said.
The efforts use “close coordination, cyber-conscious program management and the establishment of appropriate incentives,” he said.
Jesse Salazar, the Defense Department’s deputy assistant secretary for industrial policy, acknowledged to the Senate that protecting the information of all Defense Department contractors will be “challenging.”
“The average American aerospace company today has about 200 tier 1 suppliers,” Salazar said in his testimony. “The second and third tiers of the supply chain may be comprised of more than 12,000 companies, offering numerous pathways for adversaries to access sensitive private and public sector information.”
About 74% of what he called the “defense industrial base” consists of small businesses.
He described a three-party strategy the Defense Department is using to improve contractors’ cybersecurity.
It includes new contract language requiring the companies to meet Defense Department standards, external reviews of compliance with the standards and providing contractors with the resources and training they need for their cybersecurity obligations.
He would not give the Senate guarantees of success, only a summary of the challenge facing the Defense Department.
“Increasingly sophisticated, well-resourced, and pervasive cyberattacks, including state-sponsored espionage, are threatening the United States and the rules-based order on which the global economy relies,” Salazar said.
In The News
WASHINGTON — The Department of Commerce’s Bureau of Industry and Security announced on Wednesday it would institute new export controls... Read More
WASHINGTON — The Department of Commerce’s Bureau of Industry and Security announced on Wednesday it would institute new export controls over cybersecurity items such as cyber intrusion software that can be used maliciously. The department’s new policy also creates a new license exception for authorized cybersecurity... Read More
WASHINGTON -- If everyone were to employ proper cyber hygiene like multi-factor authentication or not clicking on links in phishing... Read More
WASHINGTON -- If everyone were to employ proper cyber hygiene like multi-factor authentication or not clicking on links in phishing emails, more than 85% of cyberattacks would be prevented, said Sen. Angus King, I-Maine, Thursday. “The best hack is the one that doesn’t happen,” King said... Read More
North American governments should come together to create a trilateral strategy to assess and address threats in a holistic risk-based... Read More
North American governments should come together to create a trilateral strategy to assess and address threats in a holistic risk-based approach to cybersecurity that includes a minimum set of standards, said three experts yesterday. As much as the pandemic has accelerated the rate in which governments... Read More
WASHINGTON -- The Cybersecurity Infrastructure and Security Agency has met President Biden’s cybersecurity executive order’s “highly aggressive deadlines so far,”... Read More
WASHINGTON -- The Cybersecurity Infrastructure and Security Agency has met President Biden’s cybersecurity executive order’s “highly aggressive deadlines so far,” but there is “still a lot of work to do,” said CISA Director Jen Easterly Wednesday. Kicking off the 6th annual Aspen Cyber Summit, Exploring Collective... Read More
WASHINGTON -- Identity authentication is taking a front-and-center role in the administration's approach to ensuring robust cybersecurity across the U.S.... Read More
WASHINGTON -- Identity authentication is taking a front-and-center role in the administration's approach to ensuring robust cybersecurity across the U.S. government, according to Carole House, director of cybersecurity and secure digital Innovation at the White House National Security Council. It “sits at the heart of zero... Read More
WASHINGTON -- A cybersecurity expert told a congressional panel Wednesday that private industry alone cannot be expected to effectively confront... Read More
WASHINGTON -- A cybersecurity expert told a congressional panel Wednesday that private industry alone cannot be expected to effectively confront the kinds of cyberattacks that have wreaked havoc on U.S. computer networks in recent years. He testified to a House Homeland Security subcommittee as it considers... Read More