• News
  • SAN DIEGO
  • Defense

Navy cybersecurity working toward standardization

WEST 2014 Expo

Think you have a tough job? Consider that of Navy cybersecurity professionals, tasked with keeping an ever-growing yet increasingly ambiguous enemy at bay, all with diminishing budgets and the constraints of a decentralized, largely maritime environment.

“Imagine, if you will, a strike group commander going into a battle with a force that is not well defined, that he has to defend with capabilities that he doesn’t well understand. To some extent, that’s the way we fight our networks every day,” Rear Adm. Jan Tighe, deputy commander of U.S. Fleet Cyber Command and U.S. 10th Fleet, said Wednesday at the WEST 2014 Expo at the Convention Center.

Laying out the general state of the cybersecurity world, SPAWAR’s Executive Director Patrick Sullivan cited the most recent data in the Internet Security Tracking Report, which details a 42 percent increase in targeted attacks in 2012 over 2011, with an average of 600,000 identities exposed per breach.

Roughly 247,000 attacks are blocked daily, and, unsurprisingly, research and development sites are the most targeted, making Navy networks a bull’s-eye, he said.

The overwhelming need expressed by the panel to better accomplish this monumental task is to standardize the department’s tools, platforms and networks.

“We’ve got this tremendous diversity that are out there in the fleet with regard to network systems and applications, and the reality is that infrastructure is almost impossible to defend the way it exists today,” said Rear Adm. James Rodman, chief engineer at SPAWAR, or the Space and Naval Warfare Systems Command.

“So what we’re really about is trying to take a look now at how do we best try to do what I’ll call, for lack of a better term, the ruthless standardization of what the Navy’s got today,” he said. “The Navy is going to build a unified network afloat, ashore and aloft that is centrally managed and decentrally executed, and the methodology for getting there is by standardizing those networks.”

This standardization will allow for continuous monitoring, another piece of the puzzle that’s vitally important but currently missing. Continuous monitoring will allow Navy personnel to monitor threats and attacks in real time and defend against them immediately.

“It’s not sufficient any longer to do what we do today, which is basically forensic analysis -- we wait until the attack happens, and then afterward we go in and we collect all the boxes and all the software, and then we try to figure out what happened,” Rodman said.

Standardization also will allow for humans to be taken out of the equation a bit through automation, which will be particularly helpful in patching, as well as easily knowing what has and has not been patched and where vulnerabilities exist.

Along with the obvious security benefits that reduced variants and modern, automatic feedback bring, Ruth Youngs Lew, executive director of the Program Executive Office for Command, Control, Communications, Computers and Intelligence, said there are additional positives as well.

“The big benefits there are your sustainment costs then are reduced, you’ve got a fully integrated, fully tested capability that you’re putting out there, and it’s also that much easier to train,” she said.

In terms of integration, she said it takes time -- often lots of it -- to schedule installations onboard ships. Automatic updates applicable across the board would significantly reduce the time spent, and the time and amount of training needed for sailors to master one platform, as opposed to having to retrain them on multiple systems and iterations.

From an industry perspective, the panelists agreed that the Department of Defense’s technology acquisition process can be cumbersome and arduous, particularly given the speed of change in the cyberworld.

“The reality is it takes us anywhere from six months to a year to actually do an acquisition, when a cyberthreat could be as transient as one second,” Rodman said, adding that standardized networks would aid in this respect as well, allowing the industry to have one set of guidelines to work from and build toward.

Though changes are needed and coming, Tighe said she’s still confident in the Navy’s work in the cyber-realm.

“I believe that Navy networks are probably the best defended networks that exist at the scale of what we have in the Navy, largely because they are part and parcel of the DoD networks that we have,” she said. “And the protection and defense and depth that is executed on behalf of those Navy networks and our war-fighting platform is unmatched by any other nation state in the world, largely because we leverage intelligence capabilities to defend those and help us learn through intelligence to defend our networks.”

Leave Your Comment

Comments are moderated by SDDT, in accordance with the SDDT Comment Policy, and may not appear on this commentary until they have been reviewed and deemed appropriate for posting. Also, due to the volume of comments we receive, not all comments will be posted.

SDDT Comment Policy: SDDT encourages you to add a comment to this discussion. You may not post any unlawful, threatening, defamatory, obscene, pornographic or other material that would violate the law. All comments should be relevant to the topic and remain respectful of other authors and commenters. You are solely responsible for your own comments, the consequences of posting those comments, and the consequences of any reliance by you on the comments of others. By submitting your comment, you hereby give SDDT the right, but not the obligation, to post, air, edit, exhibit, telecast, cablecast, webcast, re-use, publish, reproduce, use, license, print, distribute or otherwise use your comment(s) and accompanying personal identifying and other information you provide via all forms of media now known or hereafter devised, worldwide, in perpetuity. SDDT Privacy Statement.

User Response
0 UserComments

Leave Your Comment

Comments are moderated by SDDT, in accordance with the SDDT Comment Policy, and may not appear on this commentary until they have been reviewed and deemed appropriate for posting. Also, due to the volume of comments we receive, not all comments will be posted.

SDDT Comment Policy: SDDT encourages you to add a comment to this discussion. You may not post any unlawful, threatening, defamatory, obscene, pornographic or other material that would violate the law. All comments should be relevant to the topic and remain respectful of other authors and commenters. You are solely responsible for your own comments, the consequences of posting those comments, and the consequences of any reliance by you on the comments of others. By submitting your comment, you hereby give SDDT the right, but not the obligation, to post, air, edit, exhibit, telecast, cablecast, webcast, re-use, publish, reproduce, use, license, print, distribute or otherwise use your comment(s) and accompanying personal identifying and other information you provide via all forms of media now known or hereafter devised, worldwide, in perpetuity. SDDT Privacy Statement.

Space and Naval Warfare Systems Center Pacific (SPAWAR)

Company Website

53560 Hull St.
San Diego, CA 92152

Space and Naval Warfare Systems Center Pacific (SPAWAR) Executive(s):

Mark Kohlheim

  • Commanding Officer

Faye Esaias

  • Director, Small Business Program

Gary Wang

  • Chief Information Officer

Patrick Brady

  • Commander

Patrick Sullivan

  • Executive Director