Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

“The Department’s most consequential strategic competitor and the pacing challenge for the Department, the People’s Republic of China,3 as well as other state-sponsored adversaries and individual malicious actors often breach the Department’s defensive perimeter and roam freely within our information systems.”

This statement from the actual PDF really is telling for how far the DoD has dropped the ball on protection- maybe spend less time fleshing out offensive capabilities and more time on defense of your citizens?



I was reading it and going "Are...are you allowed to publicly admit this?"

It's a wild time, I'm telling you


As an insider, I’ll say it’s a selective reading of the facts on the verge of hyperbole.


That is absolutely not the case.


It is absolutely the case. I worked network defense for Network Warfare Command.

There is literally nobody on earth more qualified than me than me to make the statement I did.


You’re aware that the DoD is more than just the navy, yes? Also, the defender’s having missed a bunch of intrusions is literally exactly what this report is saying. Sorry to be the one to tell you.


If this is true, why now?


Budget.


I could see that being the case, drumming up the situation so they get more funding to fix the problem. At least I hope that is the case, over the alternative.


What’s the downside? It’s not like they have a customer base whose trust they need to keep.


>maybe spend less time fleshing out offensive capabilities and more time on defense of your citizens

With our budget the two are not mutually exclusive


And they’re often the same. Take cyber “offensive” capabilities for example. Why do those exist? To provide intelligence for defense.


Not really? Cyber threat intelligence is an incredibly overblown industry, remarkably similar to the xkcd about crypto. Offensive capabilities are for Natanz.

Everyone seems to think they need super ninja threat intel to protect them from elite nation state hackers, meanwhile they’re being randomware’d with metasploit modules from 8 months ago.

Run A/V and patch, that’ll be $1.7million, thanks.


Nothing in my comment has anything to do with “cyber threat intelligence”. Did you reply to the wrong comment?


> To provide intelligence for defense.

Did you forget what you wrote?


I didn’t forget what I wrote, I just exist in the real world where missiles are a bigger threat than hackers.



They are. The entire purpose of the zero trust push is that it is nearly impossible to completely prevent perimeter breaches, so instead design in such a way that an actor inside your perimeter is not automatically trusted.


You can almost entirely prevent perimeter breaches (from untrusted attacks) by implementing authenticate-before-connect with strong identity incl. closing all inbound ports at source and destination.


> maybe spend less time fleshing out offensive capabilities and more time on defense of your citizens?

What do you mean? The US should invest in cyber defenses instead of fighter jets?


No it's just that the NSA used to work to make American companies more secure. Now they instead they find zero-days to then secretly exploit for as long as possible.

It's gotten so bad, that their recommendations for crypto are regarded with a significant degree of skepticism because of past history of deliberately undermining crypto systems which is a Terrible state of things.


> their recommendations for crypto are regarded with a significant degree of skepticism

Indeed. Once you start talking about magical constants and extremely convoluted math concepts... that's zero trust in my book.

Integer factorization is a grade school concept in most developed nations. The edge cases are far more obvious than with something like ECC, which has entire classes of no-good constants that would require a PhD in math to fully grok.


Prime factorization is one of the great unsolved problems in mathematics and if you can solve it there is a million dollar prize with your name on it. There are all kinds of issues with implementing crypto safely on top of it (google “Fermat factorization”), some related to bad constants. Being well known doesn’t make the math easy.


They do both, but right now the technology makes real defense (when you have real users) pretty much impossible. And not because of the NSA.


They do both, but it has been the case for a while that the NSA prioritizes offense. You can agree with that stance or not, but it is there, criticism on this point goes back at least a decade.

I agree that the security environment is awful, but that doesn't excuse NSA making it worse.


Of course NSA prioritises offense when it provides a vastly greater RoI.


Also, outside of SCIF environments (which do get prioritized), there isn’t a whole lot that is feasible for DOD or other gov’t agencies to do while still using civilian technology or working habits, which they don’t really have an option on right now.

The whole industry and economy needs to be upleveled software wise in a lot of ways for meaningfully better security to be economically possible.

Typically that requires a serious crisis and/or war. Hopefully not the case here.


> provides a vastly greater RoI

Of course it does. Thinking about it in terms of ROI doesn't consider externalities. When the OPM gets hacked, nobody at the NSA worries about their budget.

Reason #7893 "run government like a business" is a self-describing category error.


everyone uses ROI calculations somewhere (just not necessarily using cash as the return metric) or they are flying blind.

The underlying issue is that large organizations have low trust (some worse than others!), and therefore large organizations tend to coarse numeric metrics, and game those metrics to look better, which makes even more low trust (and hence backstabbing, empire building, etc.) between divisions.

As a reaction, leadership also tends to err towards coarse, harder to game metrics (like ‘reduce breaches by xx%’ rather than relying on judgement and trust like ‘ensure we don’t have an unreasonable number of breaches, and work to reduce them in the ecosystem’.

Which of course provides strong incentives for chasing the number by throwing all the babies out with the bathwater, and often making the real problem worse.

It’s a size of the organization problem. Changing metrics/mission will shuffle up the specific babies being thrown out, and what is considered the bath water, but the underlying problem remains.

Solid, consistent leadership makes the problem better. That tends to be expensive and not want to deal with the political BS common in Gov’t, at least in the US.


The government does a ton of pure research, including in computer science and security, which is explicitly not about ROI but rather about advancing our understanding of basic science.


Which always has a grant proposal laying out hoped for results in areas being investigated, at least most of the time correct?

Someone looks at it and goes ‘yeah, that might pay off’ or round files it somewhere.

Researchers who never end up finding anything notable also don’t tend to have long careers, correct?


None of that is what I’m talking about, no. I know many researchers who are quite proud of the fact that their research is never going to make money but is super interesting from a scientific perspective.

The crazy amount of skepticism this always draws is simultaneously very funny and very saddening.


That a percentage of total funds is put into stuff like that isn't surprising, to avoid too much hyperfocus on what we know.

What percentage of the overall budget do you think it is?


Former employee, or contractor?


Thankfully No, but I know a few.

If you think tech workers have office BS to complain about, gov’t workers are at least 10x higher on the scale.


Can you please share a source? This isn’t laziness. I know I can search — and I will —- but I cannot know what sources _you_ are intending, which provides context.


I did have some things in mind but, to save me a bit of time, are there any particular claims you're looking to source?


Sure, thanks

> No it's just that the NSA used to work to make American companies more secure

1. I'm interested in that history; e.g. how it came about and how it worked.

2. Evidence that this is no longer (or less of) a goal: policy, internal priorities, spending? Congressional testimony, legislation, or guidance? Leaks?


It seems to be that $100B spent by NSA on offensive operations will reap far greater security benefits than spending $100B “to make American companies more (cyber)secure”.

Knowing what your adversaries are up to is invaluable.


Here’s one concern highlighting the value of broad defenses. A targeted software-based attack may trigger supply chain disruptions with significant (even if only short-term) impacts. If combined / coordinated, multi-billion dollar disruption is within reach.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: