Carter: Joint Chiefs Breach Shows Military Needs Better Cyber Security

Defense Secretary Ash Carter hands the U.S. Transportation Command colors to new Commander Gen. Darren McDew, Aug. 26, 2015 at Scott Air Force Base, Ill.

Photo by Master Sgt. Adrian Cadiz

AA Font size + Print

Defense Secretary Ash Carter hands the U.S. Transportation Command colors to new Commander Gen. Darren McDew, Aug. 26, 2015 at Scott Air Force Base, Ill.

As he travels to Silicon Valley to seek help, Defense Secretary Ash Carter criticizes the military’s network security.

NELLIS AIR FORCE BASE, Nevada – On his way to Silicon Valley, Defense Secretary Ash Carter said a recent intrusion into a Joint Chiefs of Staff computer network shows the military does not have the cyber defenses it needs. Now he wants help.  

“That is evidence that we’re not doing as good as we need to do in job one in cyber, which is defending our own networks,” Carter said of the Joint Chiefs breach after receiving classified briefings during an Air Force exercise in cyber and space defenses. “Our military is empowered by and also dependent upon networks for its effective operations. So, we have to be good, and I would say we have to be better at network defense than we are now.” The compromised Joint Chiefs unclassified email server went back online earlier this month. 

Carter said his desire to increase the military’s computer defenses is one reason he is heading to Silicon Valley on Friday to recruit outside help.

“I’m trying there and elsewhere…to encourage interest in our nation and a back-and-forth of people,” he said, “so that our people have the benefit of getting to know the technology, the culture, and the business practices and so forth of the commercial sector, and we draw the commercial sector into the great mission of helping us protect the nation.” His trip closely follows Deputy Defense Secretary Bob Work’s recent visit to the Pentagon’s new office, called the Defense Innovation Unit-Experimental, or DIUx, at Mountain View, Calif. Work brought along the Pentagon’s top weapons buyer, Under Secretary of Defense Frank Kendall. 

On the way to California, Carter also responded to reports that a military inspector general had informed Congress it was looking into allegations that intelligence officers were softening their assessments of the U.S. success against the Islamic State, or ISIS, due to political pressure. Carter said he could not comment on the specific report, but that he expects full candor from intelligence, military and diplomatic officers.

“I myself have tried to be very candid throughout about my own assessments of the counter-ISIL campaign,” Carter said. “I also expect candor on the part of everybody else. That’s the only way that we can know what we’re doing, how we’re doing, and win.”

“We, starting with the president, but all of us need the most candid information and the most accurate information in order to make the kind of decisions that will lead most rapidly to victory. I expect that of everyone in the department. “

Carter earlier presided over the change of command of U.S. Transportation Command, or TRANSCOM, one of the military’s nine combatant commands, at Scott Air Force Base in Illinois. Air Force Gen. Darren McDew assumed command of the post that runs the military’s global logistical supply lines. He succeeded Gen. Paul Selva, who recently became vice chairman of the Joint Chiefs of Staff.

Carter continued to Nellis Air Force Base on the edge of Las Vegas, where the U.S. Air Force is hosting the year’s fourth Red Flag fighter jet exercise. Involving more than 100 aircraft, Red Flag trains fighter pilots, especially, in simulated air-to-air operations that replicate the first phases of new conflicts against other nation states. The current exercise hosted crews from Israel, Jordan and Singapore. The flight line at Nellis held a healthy mix of F-15E Eagles and F-22 Raptors, which are being sent forward into Europe as Russian President Vladimir Putin continues to aggravate the conflict in the Ukraine, as well as a few F-35s. The F-35s did not participate in Red Flag, according to a base official.

At all of his stops, Carter is using his trip to promote his so-called “Force of the Future” effort to focus military leaders on reshaping the Defense Department to be better positioned for modern threats, especially in cyber security.

After focusing on the Air Force, Carter is scheduled to watch Marines practice amphibious landings Thursday at Camp Pendleton, in California.

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • Military Readiness: Ensuring Readiness with Analytic Insight

    To determine military readiness, decision makers in defense organizations must develop an understanding of complex inter-relationships among readiness variables. For example, how will an anticipated change in a readiness input really impact readiness at the unit level and, equally important, how will it impact readiness outside of the unit? Learn how to form a more sophisticated and accurate understanding of readiness and make decisions in a timely and cost-effective manner.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.