Right Strategy, Wrong Century

Right Strategy, Wrong Century

Facing a New World with Cyber Weapons

As a baby boomer who grew up during the Cold War, I can still remember getting under my desk in elementary school as we tried to protect ourselves from a nuclear attack. Yes, we actually did that. For the past 244 years, the United States military has defended our country with great valor and distinction on the battlefield. The American homeland and its citizenry have been protected by two great oceans and more recently, a strategic doctrine known as “Mutual Assured Destruction.” For decades, the Soviet Union and the United States, both superpowers with nuclear capability, were in a virtual stand off because each country understood the destructive power of those weapons and did not want use them. But with the “information age” in the 21st century and the total integration of computers into physical systems (i.e., cyber-physical convergence), that situation has changed significantly.

The Visible Versus the Invisible

No alt text provided for this image

Kinetic warfare is all about tanks, bombers, and missiles with all of the destructive power that can be observed when it is unleashed. Cyber warfare is different. It can be silent, stealthy, and deadly—like cancer cells attacking vital human organs while you are still feeling healthy. Well placed malicious code can disable weapons systems, bring down aircraft, turn off the lights in large cities and small towns across America, disrupt transportation systems, cause satellites to be inoperative, and corrupt manufacturing processes. A never ending stream of new and innovative technologies, our near complete dependence on those technologies, and a fully interconnected world have brought the front lines of cyber warfare to “main street” and into our businesses and homes. The speed of “cyber” and modern technologies are literally game changers. Defending the nation in the 21st century can no longer be the sole responsibility of the United States military. The ubiquitous use of computers has blurred the traditional lines between national and economic security. Commercial technologies—including the products, systems, and services produced in complex multitiered supply chains—are now used in everything we care about throughout society. And that is changing the balance of power and how we protect ourselves and the nation.

New Centers of Gravity

In the 21st century, our adversaries are employing new strategies and tactics to attack the United States. The term “Center of Gravity” is used by the military (originally defined by the 19th century military strategist Carl Von Clausewitz) to describe the source of power that provides moral or physical strength, freedom of action, or the will to act. The Center of Gravity is usually seen as the “source of strength.” The United States military considers a friendly Center of Gravity as that element—a characteristic, capability, or locality—that enables its own forces to accomplish their objectives. Conversely, an adversary’s Center of Gravity is that element that prevents our military forces from accomplishing their objectives.

No alt text provided for this image

Given that historical context, one could argue that the new friendly Center of Gravity for the United States is our technological superiority. From the adversary’s perspective, the Center of Gravity for the United States might be viewed as our technological dependency—that is, our complete reliance on technology—including computing technology—for everything we do. This would include every sector in the United States critical infrastructure and how the complex systems—made up of trillions of lines of code, millions of applications, and billions of devices—are at the very epicenter of an extensive national capability. Without appropriate defenses, the vulnerabilities in these complex systems can be exploited, sometimes rather easily, by determined adversaries.

It is also important to consider that our adversaries don’t see any delineation between traditional espionage targets and commercial targets. Compromising a government agency is no different than going after a company building wind turbines. The adversary may desire to establish a foothold or “presence” inside an organization developing a particular technology in order to potentially take down critical infrastructure in the future or steal the technology for its own use. To further confuse the situation, some nation-state adversaries may be moonlighting and sharing their capabilities with more financially motivated attackers. This means that the lines are not clear between organizations that may have been obvious targets in the past, and those organizations not typically targeted by nation-states. Every public or private sector organization, large or small, is a potential target and may become a gateway to another organization.

Good Offense or Good Defense

In a recent article in the New York Times, Paul R. Kolbe described the playing field of modern cyber warfare. There is a comprehensive discussion of both offensive and defensive cyber operations. We are all familiar with the old adage “The best defense is a good offense.” It has been applied to many fields of endeavor, including warfare. In fact, it is one of the basic principles of war. However, with the recent “arms race” of offensive cyber weaponry, much of it now in the hands of non nation-state actors, can we still rely on that foundational principle applied in kinetic warfare? While this principle has held up favorably for centuries in the context of kinetic warfare, I believe that principle fails miserably in the age of modern cyber warfare. Why is that? There is actually a very simple explanation.

No alt text provided for this image

The age of modern cyber warfare is enabled by advanced technology—mostly commercial products that are part of the extensive infrastructure of complex systems that form the “nerve centers” of governments, businesses, and industries around the world. Those complex systems are, in many cases, extremely vulnerable to cyber-attacks which helps ensure the ongoing success of offensive cyber operations [1]. To use a football analogy, if a football team focuses the majority of its time and resources building a “world class” offense at the expense of developing a credible defense, they will likely win games, sometimes by big margins. But that “soft” defense must also go up against the offenses of opposing teams and at some point during the season, the opposing offenses may begin to surpass your “stellar” offense. And that’s when you start to lose games. In the world of advanced technology and cyber warfare, the old adage “The best defense is a good offense” no longer applies when it comes to systems security. Simply put, weak or nonexistent defenses in our systems can lead to severe or catastrophic consequences from well-orchestrated cyber-attacks—potentially rendering all elements of national power ineffective. The only way to ensure success and to win is to have a strong offense and a strong defense—this applies to football and warfare, and is especially important in the world of cybersecurity.

Solid Foundation or House of Cards

If we don’t rapidly strengthen the foundations of our systems to include a renewed emphasis on security architectures and security design concepts brought about by “engineering-based” systems development processes, we will continue to be susceptible to the ongoing cyber threats and subversion that are commonplace in modern cyber warfare. Consider how much we learned during World War I and World War II. Imagine if the strengths and weaknesses of the allied opponents’ capabilities weren’t taken into consideration as new tanks, ships, submarines, and aircraft were being designed and mass produced by the allies. That critical information was brought into the systems design process to ensure we had a good chance of targeting their weaknesses and “strengthening” our defenses.

We have become so enthralled with today’s technology (some may say addicted), that we have let down our guard in a fundamental and dangerous way. Cyber-attacks can be detectable or undetectable (i.e., stealthy). Installing malicious code in a system or in the commercial products developed in the supply chain that will be incorporated into that system, has the potential to neutralize a critical capability, facilitate the theft of information including intellectual property, cause inadvertent operator actions and system failures, and establish a local foothold in order to trigger future hostile actions at a time of the adversary’s choosing. The absence of a secure foundation for our systems means the dedicated security professionals who are asked to help defend those systems may be working with a “house of cards” that will inevitably be compromised [2].

Give Up the Ship or Grab the Life Preserver?

No alt text provided for this image

It is important to learn from our past mistakes. There are several things that we can and must do if we are to put the nation on the right course again—and, as you might expect, they involve "the essential partnership"—that is, a collaboration among government, industry, and academia.

  • Make security, like safety, a “priority” in commercial products that provide the foundational components for systems 
  • Educate the next generation of “security engineers” so they can serve on development teams as part of a secure-by-design, engineering approach to system protection [3]
  • Move rapidly to “technology refreshes” built on a new foundation of security architectures tightly coupled to enterprise architectures
  • Engineer systems for “assurance” and “resilience” to perform and protect despite unknown future capabilities of adversaries [4]
  • Engineer systems for “agility” and “disposal” to facilitate timely transitions before adversaries may be reasonably expected to compromise those systems
  • Favor and reward developers who make “security” a priority in their products, systems, and services
  • Change the way we measure the “security state” of our systems to align with the state-of-the-art practices in systems security engineering

How Difficult Can This Really Be?

The short answer is pretty darn difficult, but not impossible. Why? Because in our country, the free market determines the best solutions, typically by maximizing profits, and many times at the expense of whatever stands in the way. Too often, it seems what is standing in the way is “doing what is right.” As with most difficult problems, there are no easy solutions. Ironically, doing what is right with regard to security, in the long run, will be less expensive and provide better protection for organizations and the nation. Continuing to hemorrhage intellectual property and operate critical systems with the uncertainty that comes with a growing number of unknown or “zero-day” vulnerabilities does not inspire confidence or trust in the technologies we purchase and use. It also continues to put the nation at great risk. Now is not the time to practice “duck and cover.” We need to invest in deliberate, active, and effective defenses. Great football teams have great defenses. Ask any die-hard Bears, Steelers, Dolphins, Ravens, or Packers fan.

[1] R. Ross, “The Adversaries Live in the Cracks

[2] R. Ross, “Cybersecurity Professionals—'In the Arena'"

[3] R. Ross, “The Mysterious Disappearance of Systems Security Engineering

[4] R. Ross, “Rethinking Our View of System Security

A special note of thanks to Mark Winstead, Keyaan Williams, Greg Touhill, Tony Cole, and Malcolm Harkins, long-time SSE and cybersecurity colleagues, who graciously reviewed and provided sage advice for this article.

Joseph Burkard

SECURITY & RISK EXECUTIVE

4y

Excellent article, and timely given the recent cyber attack attributed to Russia. We must act now to fortify critical systems and prioritize security in development, testing, etc. Thanks for sharing, I agree.

Like
Reply
Jeff Price

Experienced Technical Leader ITIL v3, PMP, AWS Solutions Architect - Associate

4y

When you get outside the national security space. Risk management is about dollars, not security per se. A large bank losing a few million is pocket change, and if the same poorly engineered system helped them earn billions, it will not generate horror at the executive level. So when we demand to be heard by the C suite, first we must we must understand the basis for their decisions and speak in language they understand, and then recognize our arguments will not being persuasive if you cannot answer any so-what questions. Too often I hear cyber folks saying managers don't do "real" risk management. This statement usually means, management didn't do what I told them to do... That betrays a lack of understanding of business and programmatic risk management that has a lot more factors than cyber security. Cyber isn't always the biggest or most important risk facing the decision maker. If execs aren't understanding cyber, perhaps we aren't explaining it very well.

Malcolm Harkins

Chief Security & Trust Officer, HiddenLayer

4y

great perspectives Ron Ross

Like
Reply
Patrick Simon

President and Manager at Beehive Technology Solutions LLC Service-Disabled Veteran Owned Business (SDVOB) Federal and State Small Certified Business; Microsoft Partner Risk Digital Services

4y

Defective decision-making as the outcome of groupthink can take several forms. Our adversaries will now launch their Phase III.  A prior MIT MBSE Architecture in Systems Engineering Program Course highlights how systems engineering, both behavior and systems, are modeled and executed.  Model-Driven Design data modeled requirements “real-time” dynamic.  We were required to understand Genevieve Flannigan’s Thesis and develop our paper as an assignment. The CAIB board and others seemed to agree it was a systems failure; however, I found this paper by Robert Gregory and his Navy Post Grad Team who had a different opinion: Symptom:  Manifestation Illusion of Invulnerability Members ignore obvious danger, take extreme risk, and are overly optimistic Unquestioned Belief in the Groups Inherent Morality Manifestation: Members ignore obvious danger, take extreme risk, and are overly optimistic Unquestioned Belief in the Groups Inherent Morality Members believe their decisions are morally correct, ignoring the ethical consequences of their decisions. Robert Gregory and the Navy Post Grad team highlighted human flaws from the beginning Challenger-CAIB Paper 2006. We have " Groupthink Systems Foundation" problem as the initial issue-denial.

Like
Reply
Andrew Chrostowski

Board Member; Speaker; NACD Directorship Certified & DDN QTE

4y

Outstanding article, Ron Ross !

Like
Reply

To view or add a comment, sign in

More articles by Ron Ross

  • Systems Security Engineering Framework

    Systems Security Engineering Framework

    An Engineering-Based Approach to Protecting Cyber-Physical Systems Security, like safety, reliability and resilience…

    3 Comments
  • Secure-by-Design Is More Than Just a Cybersecurity Risk Problem

    Secure-by-Design Is More Than Just a Cybersecurity Risk Problem

    Building trustworthy secure systems has a great deal in common with building a house. It starts with a good…

    14 Comments
  • Making Zero Trust “Trustworthy”

    Making Zero Trust “Trustworthy”

    A little over a year ago, I wrote an article about assurance that attempted to make a convincing argument as to why…

    14 Comments
  • New Year’s Resolution: More Assurance, Less Seat of the Pants

    New Year’s Resolution: More Assurance, Less Seat of the Pants

    Using Assurance Cases to Demonstrate Systems Are Trustworthy Secure With today’s cutting-edge computing technologies…

    24 Comments
  • Yet Another Wake Up Call

    Yet Another Wake Up Call

    A Time for Reflection and Change in Our Cyber Protection Strategy We are once again confronted with another serious…

    22 Comments
  • Diving Below the Cyber Waterline

    Diving Below the Cyber Waterline

    The Danger of Existential Cyber-Attacks on Critical Systems and Assets In a previous article entitled “The…

    15 Comments
  • The Cybersecurity "Glass Ceiling"

    The Cybersecurity "Glass Ceiling"

    Adopting a Secure By Design Approach to Protect Critical Systems and Assets There is an emerging and troubling reality…

    11 Comments
  • Engineering Can Make Your Systems More Secure and "Stealthy"

    Engineering Can Make Your Systems More Secure and "Stealthy"

    In Bruce Schneier's recent blog post entitled "The Proliferation of Zero-days," he references the MIT Technology Review…

    9 Comments
  • A Bridge Too Far?

    A Bridge Too Far?

    The Power of Science and Engineering When we drive across a bridge, we have a reasonable expectation that the bridge we…

    13 Comments
  • Security Is Everyone’s Responsibility

    Security Is Everyone’s Responsibility

    Time for Stepping Up to the Plate and Requiring Accountability As the NIST team is entrenched in the 2021 update of SP…

    16 Comments

Insights from the community

Others also viewed

Explore topics