Back to news

December 26, 2018 | International, C4ISR

How the new acting Pentagon chief views cybersecurity

By:

President Donald Trump announced in a Dec. 23 tweet that Patrick Shanahan will become acting secretary of defense Jan. 1, replacing outgoing Pentagon chief Jim Mattis two months early. While it is not clear how long Shanahan will remain in the job, he is on the short list of officials who could become the full-time Pentagon chief.

Regardless of the length of his tenure, Shanahan, the Pentagon deputy since 2017, has been one of the Pentagon's top advocates for stronger contractor cybersecurity and IT acquisition and will lead the department months after it was given expansive and loosely defined authorities to conduct offensive cyber operations.

How Shanahan will handle these greater cyber authorities, even on a temporary basis, remains an open question that will be tested immediately amid evolving challenges, such as an alleged hacking campaign from China.

Unclear views on cyber operations

In August, the secretary of defense was given the ability to conduct offensive cyber operations without informing the president as long as it does not interfere with the “national interest” of the United States, four current and former White House and intelligence officials have told Fifth Domain.

A Pentagon official told Fifth Domain that while there is a general outline of what specific operations may affect the American “national interest,” some details are not explicitly defined.

And a review of his public remarks show that Shanahan has not made significant comments about how America should conduct offensive cyber operations. He has shiedaway from giving detailed responses about U.S. Cyber Command.

“There are two new war-fighting domains, cyber and space, for which we are developing doctrine and capabilities,” Shanahan said Sept. 19.

A spokesperson for Shanahan did not respond to questions from Fifth Domain.

Focus on defense contractors

As deputy, Shanahan has focused on “re-wiring” the Pentagon. He has called good cybersecurity “foundational” to working with the department.

“Cybersecurity is, you know, probably going to be what we call the ‘fourth critical measurement.' We've got quality, cost, schedule, but security is one of those measures that we need to hold people accountable for,” Shanahan said Sept. 19 during an Air Force Association conference.

Shanahan's focus on contractor cybersecurity comes as China is believed to be targeting defense contractors, particularly those on the lower end of the supply chain, in an attempt to steal sensitive American secrets, according to intelligence officials and industry executives.

Shanahan, however, has placed responsibility among the top defense firms.

“I'm a real strong believer that the Tier 1 and Tier 2 leadership has a responsibility to manage the supply chain,” Shanahan said in the Sept. 19 speech.

In October, Shanahan was put in charge of a new Pentagon task force to combat data exfiltration that focuses in part on these defense firms.

“Together with our partners in industry, we will use every tool at our disposal to end the loss of intellectual property, technology and data critical to our national security,” Shanahan told Fifth Domain in October.

A specific area of focus inside the department is finding out which companies are in the Pentagon's supply chain, according to officials involved in the process, but it is not clear if it is specifically part of Shanahan's task force.

Inside the Pentagon, Shanahan has also emphasized the need for smarter IT acquisition.

In an October. interview with Fifth Domain, Shanahan expressed frustration with the Pentagon's procurement process, but said to expect “a number of things that are foundational to being able to achieve enterprise solutions.”

He hinted that those changes are focused on the “right platforms and the right level of integration” that can support high-end computing and artificial intelligence.

“I'm super frustrated that we can't go faster on like basic things like the cloud,” Shanahan said. “Most of everything we do is software-driven.”

Aaron Mehta contributed to this report.

https://www.fifthdomain.com/dod/2018/12/24/how-the-new-acting-pentagon-chief-views-cybersecurity

On the same subject

  • Navy Looking for Better Ways to Share Data

    June 21, 2019 | International, Naval

    Navy Looking for Better Ways to Share Data

    By: Ben Werner WASHINGTON, D.C. – The Navy is grappling with how to securely share the vast amounts of data ship designers, operators and sustainers collect, a panel of engineers said Wednesday. Shipyards have the design systems they use to transmit plans from engineers to the shipbuilders. Once delivered, modern ships, submarines and even aircraft generate tremendous amounts of data gauging their performance. The Navy has more data than it knows what to do with, but Rear Adm. Lorin Selby wants to change this. “The problem we have is we don't do a great job of linking those together,” Selby said of the various data points. “That's what I'm driving for trying to link those together.” Selby, the chief engineer and deputy commander for ship design, integration and naval engineer at the Naval Sea Systems Command, was speaking as part of a panel discussing how the Navy and shipbuilding industry can use digital plans at the American Society of Naval Engineering's annual Technology, Systems & Ship symposium. Selby was joined by Rear Adm. Eric Ver Hage, the commander of the Naval Surface Warfare Center and Naval Undersea Warfare Center, and Zac Staples, a retired commander and current chief executive of Austin, Texas,-based maritime analytics firm FATHOM5. Staples' final tour in the Navy was the director of the Center for Cyber Warfare at the Naval Postgraduate School. “Today, we know the liability of many of our systems. We know the ship loadout. We know the type of baseline the ships have. We know the performance of tactical action officers and other key watchstanders when they're in the basic training cycle. We know the proficiency of the strike group when they go to sea,” Ver Hage said. “You have all this data; the problem is, we put missiles on ships, but the combat systems can't unlock all the capability that missile has in some instances,” he said, referring the possibility communications between ships and missiles could improve targeting. When quantum computing is developed, the ability to process this massive amount of data will become much easier, Selby said. Quantum computing is still being researched, with several nations trying to develop a way to tackle large data sets quickly, Selby explained. Within a year or two of mastering quantum computing, he predicts everyone will be able to use quantum computing. For the U.S. to have a decisive quantum computing edge, Selby said requires being ready now. “The key to being the one who can actually lever that technology and really take a huge leap forward in this century is going to be the nation that lays the foundation to be able to lever the capabilities of quantum with a software delivery mechanism,” Selby said. However, as the ability to analyze data speeds up, the importance of protecting this data also grows. “If we're going to build capabilities in the era of great power competition, we have to assume our adversaries are trying to steal them – because they're trying to steal them,” Staples said. “The exact copy Chinese joint strike fighter is a good indication that whatever our shipboard capabilities might go for will be equally targeted.” The current secure method of transferring data classified up to the secret level is over the Secret Internet Protocol Router Network (SIPRNet). However, SIPRNet has limitations, such as the expense of operating the network and creating secure terminals so everyone has access to a SIPRNet terminal to send and receive classified secret information. A cloud-based data vault could prove to be a good solution. Under such a program, access can be restricted, Staples said. Vault monitors will also know which adversaries are denied access to the valuable data being stored. “When you think about encrypting data, there's probably a more efficient way to do that than on SIPRNet,” Staples said. https://news.usni.org/2019/06/20/navy-looking-for-better-ways-to-share-data

  • Thales fournira 55 sonars à l’US Navy

    May 6, 2021 | International, Naval

    Thales fournira 55 sonars à l’US Navy

    Les sonars « Airborne Low Frequency Sonar » (ALFS) de Thales, conçus pour la lutte anti sous-marine, équiperont les hélicoptères MH-60R (Sikorsky) de l'US Navy. 42 seront livrés durant les cinq prochaines années et une option quant à la livraison de 13 systèmes supplémentaires au cours de la sixième année serait prévue. Thales est un partenaire important de l'US Navy puisque 300 sonars ALFS ont déjà été exportés aux Etats-Unis. Ces sonars équipent aussi les MH-60R destinés à l'export. Air & Cosmos, 5 mai

  • Collins Aerospace wins T-X subsystem contracts

    February 6, 2019 | International, Aerospace

    Collins Aerospace wins T-X subsystem contracts

    Beth Stevenson, London - Jane's Defence Weekly Boeing has contracted Collins Aerospace to provide the Aces 5 ejection seat and an integrated landing gear system for the T-X trainer aircraft. Aces 5 provides passive head and neck protection, arm and leg flail prevention, and a load-compensating catapult rocket that varies its thrust based on the weight of the user, Collins says. The landing gear includes structure, actuation, dressings, hydraulics, and wheels and brakes, and is designed to lower maintenance costs while improving operational performance. “Collins Aerospace is honoured to be a supplier for Boeing in support of the US Air Force's next-generation trainer programme and proud to provide a host of integral content, including our Aces 5 ejection seat and fully integrated landing gear system,” John Fyfe, air force programmes director for Collins Aerospace, said. https://www.janes.com/article/86144/collins-aerospace-wins-t-x-subsystem-contracts

All news