May 20, 2024


The Internet Generation

The Pentagon Hasn’t Fixed Basic Cybersecurity Blind Spots

The United States federal government isn’t known for robust cybersecurity. Even the Department of Defense has its share of known vulnerabilities. Now a new report from the Government Accountability Office is highlighting systemic shortcomings in the Pentagon’s efforts to prioritize cybersecurity at every level and making seven recommendations for shoring up DoD’s digital defenses.

The report isn’t a checklist of what DoD should be doing to improve cybersecurity awareness in the abstract. Instead, GAO looked at three DoD-designed initiatives to see whether the Pentagon is following through on its own goals. In a majority of cases, DoD has not completed the cybersecurity training and awareness tasks it set out to. The status of various efforts is simply unknown because no one has tracked their progress. While an assessment of “cybersecurity hygiene” like this doesn’t directly analyze a network’s hardware and software vulnerabilities, it does underscore the need for people who use digital systems to interact with them in secure ways. Especially when those people work on national defense.

“It’s everyone’s responsibility to understand their part in cybersecurity, but how do you convince everyone to follow the rules they’re supposed to follow and do it consistently enough?” says Joseph Kirschbaum, a director in GAO’s defense capabilities and management team who oversaw the report. “You’re never going to be able to eliminate all the threats, but you can manage them sufficiently, and a lot of DoD’s strategies and plans are good. Our concern is whether they’re doggedly pursuing it enough so they’re able to do the risk management.”

The report focuses on three ongoing DoD cybersecurity hygiene initiatives. The 2015 Cybersecurity Culture and Compliance Initiative outlined 11 education-related goals for 2016; the GAO found that the Pentagon completed only four of them. Similarly, the 2015 Cyber Discipline plan outlined 17 goals related to detecting and eliminating preventable vulnerabilities from DoD’s networks by the end of 2018. GAO found that DoD has met only six of those. Four are still pending, and the status of the seven others is unknown, because no one at DoD has kept track of the progress.

GAO repeatedly identified lack of status updates and accountability as core issues within DoD’s cybersecurity awareness and education efforts. It was unclear in many cases who had completed which training modules. There were even DoD departments lacking information on which users should have their network access revoked for failure to complete trainings.

“That DoD is not doing what it needs to on cybersecurity is not surprising,” says Peter Singer, a cybersecurity-focused strategist at the New America Foundation. “If you can’t track it, you can’t measure it. If you can’t measure it, you can’t manage it. And if you can’t manage it you’re not going to succeed.”

In a response to the report’s seven recommendations—which all relate to completing DoD’s existing initiatives and establishing stronger oversight and leadership to do it—the Department of Defense fully agreed with one, partly with four, and disagreed with two. The Pentagon argues that some of the goals and programs that date back to 2015 are now outdated and therefore irrelevant to current defense.

“To require that all of this new strategic direction and prioritization be overridden to monitor compliance with lower risk areas that the DoD identified almost five years ago will frustrate the Department’s efforts to keep pace with the changing tactics, techniques, and procedures of our adversaries and the evolving changes in technology,” DoD said in its response.

GAO stands by all of its recommendations, maintaining that while those goals were set five years ago they relate to foundational skills and concepts rather than specific software or devices. If anything, the backlog becomes all the more urgent to address as more time passes.

“DoD knows how to identify problems, they know how to attack them. It’s the follow through we’re looking at,” says the GAO’s Kirschbaum. “They’re absolutely correct that things have changed, the threat vectors have changed, technology has changed, but most of the things they pinpointed in terms of what the department needs to do culturally are enduring things, they’re basic cybersecurity practices.”