Home » Cyber » Civilian Apps » Google to Soldiers: Malware is the Enemy

Google to Soldiers: Malware is the Enemy

by Bryant Jordan on October 24, 2013

nsaGetting the military’s cyber forces to focus more on the most serious threats to U.S. national security means getting away from a whack-a-mole-like strategy now used to find and remove malware in the system, officials from Google and Lockheed told a crowd of soldiers Wednesday.

Most of what cyber soldiers deal with is malware living in a system that can be exploited by an enemy, according to Jim Young, U.S. Army Account Executive for Google Enterprise Transformation.

It’s a common problem, but one that should not happen, he said at the last panel session at the Association of the U.S. Army’s annual conference in Washington D.C.

“This notion that persistent malware can stay on your machine should not happen,” he said. “The technology is out there today to erase it, or not make it an attack factor. So I encourage you … to start looking at opportunities that fundamentally change how you probe cyber security. Do not do incremental. It will not get you where you need to be.”

Charles Croom, vice president of Cyber Security Solutions for Lockheed Martin Information Systems & Global Services, called it the “80/20 cyber rule.”

“It’s a rule of thumb that says, ‘hey, if I implemented everything I knew how to do today [to stop the malware] I could take 80 percent of my threats off the table, and then I could focus on this advance persistent threat of 20 percent.”

No one has developed such an all-in-one package yet, but the Defense Advanced Research Projects Agency – DARPA – has issued proposals intended to find solutions, Croom said.

The only way to do it is to automate these solutions, he said, whether they are patching, vulnerability assessment, or remediation. These steps now are all done successfully by individual soldiers, but are done again and again as they keep cropping up, he said.

“The only way we’re going to [fix it] is through automation. We’ve got to get people out of the loop and automate what we know how to do,” he said.

The problem is that it is a multi-platform, multi-device world across “monstrous enterprises that are globally connected,” he said.

“We can’t even get our configuration management down to knowing what’s on the network, who is on the network,” Bryant said.

Networks should be automatically and constantly scanned to identify exactly what and who is on them at any time, and looking for changes to software and hardware; it can be done at the speed of light, Croom said.

And when an unauthorized change is found or weakness or an intrusion is detected, the solution should be instant and automatic, as well.

“When you know there’s an issue on your network you ought to be able to close most of them with machines,” he said. “These are repetitive things that have to be done and most of it can be done by machines. And then you save the manpower for the high-end intellectual issues, the threat you’ve never seen before, that is unique and requires some intelligence.”

Share |

{ 11 comments… read them below or add one }

dan October 24, 2013 at 3:24 am

What would it be like without malware. Couldnt imagine..Thank God for windows.


Bernard October 24, 2013 at 1:02 pm

It would be look like Ubuntu Linux (or Mint if you want a more Windows like look).
I haven't seen malware since I switched back in 2008. :-)


SkyNet October 24, 2013 at 3:24 am
GNC October 24, 2013 at 7:45 am

No answers here, just comments on things we already know.


blight_ October 24, 2013 at 7:48 am

You need products that are constantly supported, with robust red-cell/pen-aid testing plus the devs to patch everything you find. Otherwise you're just waiting for someone to report every bug, or a hacker to post every exploit on the internet and "get in", then fixing the damage when it's done.

Or the NSA buys the exploits off the internet…and doesn't share, in case it needs to backdoor the military.


oblatt1 October 24, 2013 at 9:58 am

The low end are these people who say things like "at the speed of light". Military IQ would go up a good 20 points if the doors were just shut and these guys were gassed.

The high end is the NSA which is basically creating an identity theft goldmine that they plan to exploit but will also attract a huge number of criminals.

The next Snowdon might just quietly leak all the NSA backdoor's to all the major banks in the US and sit back and watch the meltdown.


blight_ October 24, 2013 at 11:11 am

Won't be long before we have a holographic ribbon bumpersticker "We Support The NSA" next to "We Support The Troops".

"Think of the sacrifices the hackers are making…they are burning your privacy on the altar of liberty!"


hibeam October 24, 2013 at 4:31 pm

I'm confused. Why is big gubmit using Google for this? Google has a track record of knowing about stuff.


blight_ October 24, 2013 at 5:08 pm

What google knows, the NSA knows. NSA has google by the youknowwhats.


JCitizen October 27, 2013 at 4:18 am

Gubbamint has Google by the Cojones!

Hmm! That sort of has a ring to it! HA!


Monitoring Service June 29, 2014 at 1:34 am

No one had developed such software but with our technology nowadays it won't be surprising if someone would come up with the idea of doing so.


Leave a Comment

Previous post:

Next post: