Security expert: US would lose cyberwar

The U.S. government will have to take a more active role in regulating cybersecurity, a former intelligence official says

The U.S. government, if confronted in a cyberwar today, would not come out on top, a former U.S. director of national intelligence said Tuesday.

"If the nation went to war today, in a cyberwar, we would lose," Mike McConnell told a U.S. Senate committee. "We're the most vulnerable. We're the most connected. We have the most to lose."

McConnell, director of national intelligence from 2007 to 2009, predicted that the U.S. government would eventually get heavily involved in protecting cybersecurity and in regulating private approaches to cybersecurity. Testifying before the Senate Commerce, Science and Transportation Committee, McConnell also predicted that the U.S. would make little improvements in its cybersecurity before a "catastrophic" attack will cause the government to get involved.

"We will not mitigate this risk," said McConnell, now executive vice president for the national security business at Booz Allen Hamilton. "We will talk about it, we will wave our hands, we'll have a bill, but we will not mitigate this risk."

After a major attack, the government will step in to secure the Internet, McConnell predicted. "We're going to morph the Internet from something that's referred to generally as dot-com to something that we call dot-secure," he said. "When [online] transactions move billions of dollars, or when transactions route trains up and down the East Coast or control electric power ... the basic attributes of security must be endorsed."

Government intervention is needed, added James Lewis, director of the Technology and Public Policy Program at the Center for Strategic and International Studies, a Washington, D.C., think tank. Private-sector fixes to the nation's cybersecurity problems haven't been effective, he said.

The Internet was designed as a global commons that polices itself, but that model has failed, Lewis added. "Instead, we've got the Wild West," he said. "Many will say we should let the market fix cybersecurity. I'm familiar with this one, because I, myself, wrote it in 1996, and I'm still waiting. Government needs to give the market a kick."

Early last year, Senators Jay Rockefeller, a West Virginia Democrat, and Olympia Snowe, a Maine Republican, introduced a bill that would create new cybersecurity regulations for private companies designated as critical infrastructure. The senators have rewritten the Cybersecurity Act several times after complaints from the private sector, but the bill would also require a national licensing and certification program for cybersecurity professionals. Under the bill, it would be illegal to provide some cybersecurity services without being licensed and certified.

Some versions of the bill would have also allowed the U.S. president to order that parts of the Internet under attack be shut down.

Lewis praised the bill, saying it provides a "broad rethinking" of the nation's approach to cybersecurity.

Rockefeller, the committee chairman, said cyberattacks are happening too often and are "sucking the blood" out of the U.S. economy. The U.S. government needs "strong top-level coordination" to protect cybersecurity, he said.

"Too much is at stake for us to pretend that today's outdated cybersecurity policies are up to the task of protecting our nation and economic infrastructure," he said. "We have heard the reassurances and seen the best efforts of many in the private sector working to secure their networks. But it is clear that even the largest, most sophisticated companies are not immune from attack."

While new regulations might help in some areas, U.S. technology users and policymakers need to stop tying more and more systems to the Internet, said Mary Ann Davidson, chief security officer at Oracle.

"In the many discussions on what the government can do to fix cybersecurity ... it is worth noting that no single proposal will save us, and certainly not any time soon," she said. "There is, however, one thing we can do today: Stop making cybersecurity worse by rushing to use technology in ways we know very well we cannot secure."

Davidson said she worries about when the U.S. electrical system is fully controlled through the Internet and when people working with SCADA (supervisory control and data acquisition) systems fully embrace their ability to turn the systems on and off through a smartphone.

"We know that people have built personal digital assistants that 'talk SCADA' because 'it's so expensive to send a technician to the plant,'" she said. "It won't be long before we hear: 'Move the control rods in and out of the reactor? There's an app for that!'

"Some day we may have a power plant meltdown when all someone was trying to do is answer the phone," she added.

Join the CSO newsletter!

Error: Please check your email address.

Tags USA governmentsecuritycyberwar

More about f2OracleStrategy&TransportationWest

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Grant Gross

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts