Official Site of the U.S. Air Force   Right Corner Banner
Join the Air Force

News > Sharing intelligence helps contractors strengthen cyber defenses
 
Photos 
Strengthening cyber defenses
Deputy Defense Secretary William J. Lynn III addresses about 2,700 participants at the Defense Information Systems Agency's Customer and Industry Forum at the Baltimore Convention Center in Baltimore Aug. 16, 2011. Lynn discussed the threats of cyber warfare in the digital age. (Defense Department photo/R.D. Ward)
Download HiRes
 
Related Links
 William J. Lynn III
Sharing intelligence helps contractors strengthen cyber defenses

Posted 8/16/2011 Email story   Print story

    


by Donna Miles
American Forces Press Service


8/16/2011 - BALTIMORE (AFNS) -- A new pilot program in which Defense Department officials share classified threat intelligence with defense contractors or their commercial Internet service providers is showing promise in increasing their cyber defenses and preventing enemy intrusions into sensitive government networks, Deputy Defense Secretary William J. Lynn III said Aug. 16.

Lynn shared initial findings of the Defense Industrial Base Cyber Pilot with attendees here at the Defense Information Systems Agency's Customer and Industry Forum.

About midway through the 90-day pilot, launched in partnership with the Homeland Security Department, Lynn said the pilot is bearing fruit among about 20 participating companies that operate DOD networks.

"Already, the pilot has shown us hundreds of signatures we wouldn't previously have seen" and stopped hundreds of attempted intrusions, Lynn reported. He noted that loading these signatures onto existing systems dramatically increases cybersecurity.

"So in the coming months, we are looking at the possibility of deepening the defense industry involvement in this pilot (and) bringing more and more companies" into the program, he said.

Lynn called intelligence the "special sauce" that enables participating companies to improve their cyber defenses. DOD officials share threat intelligence provided by representatives of U.S. Cyber Command and the National Security Agency, along with expertise so they can employ it for network defense.

The companies, in turn, use the intelligence and expertise to protect networks they operate for DOD.

"We rely on private-sector networks and services to operate nearly every facet of the department," Lynn told the gathering. "And the fact is that the private firms we depend on are susceptible to the same cyber threats we seek to protect dot-mil networks from."

Over the past decade, "we have lost terabytes of data" through intrusions and attacks on defense companies' corporate networks, Lynn said. Some of the stolen data was relatively mundane, involving specifications for small parts of tanks, airplanes and submarines.

"But a great deal of it concerns our most sensitive systems," Lynn said, including aircraft avionics, surveillance technologies, satellite communications systems and network security protocols.

"We realize that we must help our partners protect their networks," he said.

Meanwhile, DOD officials are looking toward other government agencies to see if this same concept can be applied to protect other sectors, including power, transportation and energy sectors. DIB Cyber Pilot "is intended to demonstrate that we can utilize this public-private partnership to protect critical infrastructure networks, starting with the defense sector," Lynn said.

Lynn called on DISA and DOD's industry partners to help make the new concept work.

"This is not a type of problem like air defense where the military can take the mission largely on its own. Nor is it an area in which the private sector can do everything they need to do on their own," he said. "It has to be a partnership between the types of capabilities and intelligence the government can bring, and the types of capabilities and technology the private sector can bring. And those two need to be combined to protect our vital infrastructure."

This cooperation is critical to the success of the new DOD strategy for operating in cyberspace, which recognizes the importance of cyber defenses to prevent enemies from exploiting, disrupting or destroying critical networks.

"In the face of this threat, we have a window of opportunity to develop much more substantial defenses, not only on our military and government networks, but also the networks that support our critical infrastructure," Lynn said.

"We must have the capability to defend against the full range of cyber threats," he said. "That is indeed the goal of the department's cyber strategy, and it is why we are pursuing the strategy with such urgency."



tabComments
8/17/2011 2:53:33 PM ET
While it sounds good in principle, this is just another example of DoD and industry snuggling even closer in that bed they've made together. Isn't there already an expectation and inherent built-in cost within contracts we let with industry that said contractors will protect DoD as well as their own proprietary information from unauthorized release industrial espionage etc. to include cyber security? Do we now get a sharing discount since contractors benefit from our data? Defense contractors also prostitute themselves to multiple nations who buy their wares, some friendly and some not. Who's to say they won't share sensitive DoD cyber data with other customers who will in turn use it against us. Buyer beware.
Skeptical Taxpayer, Saddle Rock CO
 
Add a comment

 Inside AF.mil

ima cornerSearch

tabSubscribe AF.MIL
tabMore HeadlinesRSS feed 
Deployed service members observe Sexual Assault Awareness Month

Official discusses Transition Assistance Program at House hearing

SecAF: Hanscom enabling linked AF future

SecAF announces departure  2  |  VIDEO

Congress reviews Air Force's readiness at House hearing

Timbouktu and back: ANG med unit conducts 'irregular' operations

Through Airmen's Eyes: Thunderbirds crew chief takes to new heights  3

Academy cadets win NSA 'cyber defense' 2nd straight year

Air Force Week in Photos

Senior leaders testify on health of personnel programs  1

Through Airmen's Eyes: The walk toward flight  3

Affordability priority for F-35 program  4

Reservists ready for wildland fire season  1

Indonesian, U.S. forces practice humanitarian evacuation

tabCommentaryRSS feed 
Challenging the status quo: Leadership in today's resource-constrained Air Force  1

Leadership not defined by shapes, sizes  9


Site Map      Contact Us     Questions     USA.gov     Security & Policy     No Fear Act     E-publishing