Éditoriaux Défense Sécurité Terrorisme Zones de conflits Logistique Livres de référence Liens
Terre Air Mer Gendarmerie Renseignement Infoguerre Cyber Recherche

DARPA Director Discusses Cyber Security Challenges

DARPA Director Discusses Cyber Security Challenges

By Jim Garamone, DoD News, Defense Media Activity.

Fort Meade, Maryland –  (DoD News) – October 1, 2014 – The Defense Advanced Research Projects Agency is working on new ways to protect information and systems that use the Internet, said Arati Prabhakar, the agency’s director.

The current mode of protection – “patch and pray” – really doesn’t work anymore, Prabhakar told the Washington Post’s Cybersecurity Summit today.

DARPA is working to improve cyber security, and Prabhakar discussed the historical background as National Cyber Security Awareness Month kicked off.

The Agency’s early days

The agency formed after the Soviet Union shocked the world with the launch of the world’s first satellite in 1957. Many Americans believed the United States had lost the space race and Soviet domination of space threatened the existence of the free world.

President Dwight D. Eisenhower created DARPA in response to this threat. The agency mission was not to develop the next technology, but to leap ahead to a whole new generation of technology.

And the agency has been successful. DARPA developed what became the Internet and the first information began flowing on it in 1969. The Pentagon agency has been working on cyber security ever since.

Current projects

One of the agency’s projects is to build software that is not hackable. “What that means is there is a mathematical proof that this particular function can’t be hacked from a pathway that wasn’t intended,” Prabhakar said in response to a reporter’s question. “That won’t solve the entire problem, but it might make it more manageable.”

The idea, she said, is to reduce the attack surface hackers can approach.

DARPA is also plumbing the dark depths of the Internet to find those who want to do harm. “You start by creating a different way to look at this vast information environment,” she said. A current project was based on the thesis that law enforcement might find a way to detect hidden networks that relate with hidden trafficking.

“We worked with law enforcement and found that the way they looked at the information space was the same way you or I would look at it,” she said. “You know: a Google search, a single-threaded walk through this environment.”

Finding patterns

DARPA tools dig deep holes through the Web to find patterns and linkages among sites.

“We were able to find a set of phone numbers that were very heavily linked to each other in back page ads where the sex trade is advertised,” she said. The agency gave 600 phone numbers to law enforcement, and they found “466 numbers that tied to criminal violations and they also found numbers that tied to fund transfers in the region around North Korea and they are working to find a human trafficking network.”

New moon shot

One of the hardest challenges for cyber is maintaining web security while the information explosion continues. There are 3 billion people already on the Internet, and that will only increase, Prabhakar said. She feels the same pressure for solutions as the DARPA director who helped with the moon shot in the 1960s.

“The moon shot for cyber security, in my view, is to find techniques that scale faster than the explosion in information,” she said.

It will not be a silver bullet, she said, but a combination of advancements where the cyber security problem will be manageable.

Incredible challenges

This movement is already underway, Prabhakar said. “The most critical systems get the most critical focused attention, whether in DoD or throughout our economy. It is incredibly challenging technically and very challenging from a practical and policy perspective.”

Prabhakar noted security would be absolute if the Internet was sealed off and only select people could use it.

“The power of information technology, and the reason we put up with all these problems, is that it is phenomenally capable for all the things that change how we live and how we work and how create national security,” she said. “You don’t want to cut out any of that capability off in the process of building cyber security.”

Contact Author

Arati Prabhakar

Related Sites:
The Defense Department on Facebook
The Defense Department on Twitter
DoD News on Facebook
DoD News on Twitter
DoDLive Blog
DoD Video News

Derniers articles

Verdun 2016 : La légende de la « tranchée des baïonnettes »
Eyes in the Dark: Navy Dive Helmet Display Emerges as Game-Changer
OIR Official: Captured Info Describes ISIL Operations in Manbij
Cyber, Space, Middle East Join Nuclear Triad Topics at Deterrence Meeting
Carter Opens Second DoD Innovation Hub in Boston
Triomphe de St-Cyr : le Vietnam sur les rangs
Dwight D. Eisenhower Conducts First OIR Missions from Arabian Gulf
L’amiral Prazuck prend la manœuvre de la Marine
Airmen Practice Rescuing Downed Pilots in Pacific Thunder 16-2
On ne lutte pas contre les moustiques avec une Kalachnikov...
Enemy Mine: Underwater Drones Hunt Buried Targets, Save Lives
Daesh Publications Are Translated Into Eleven Languages
Opération Chammal : 10 000 heures de vol en opération pour les Mirage 2000 basés en Jordanie
Le Drian : Daech : une réponse à plusieurs niveaux
Carter: Defense Ministers Agree on Next Steps in Counter-ISIL Fight
Carter Convenes Counter-ISIL Coalition Meeting at Andrews
Carter Welcomes France’s Increased Counter-ISIL Support
100-Plus Aircraft Fly in for Exercise Red Flag 16-3
Growlers Soar With B-1s Around Ellsworth AFB
A-10s Deploy to Slovakia for Cross-Border Training
We Don’t Fight Against Mosquitoes With a Kalashnikov
Bug-Hunting Computers to Compete in DARPA Cyber Grand Challenge
Chiefs of US and Chinese Navies Agree on Need for Cooperation
DoD Cyber Strategy Defines How Officials Discern Cyber Incidents from Armed Attacks
Vice Adm. Tighe Takes Charge of Information Warfare, Naval Intelligence
Truman Strike Group Completes Eight-Month Deployment
KC-46 Completes Milestone by Refueling Fighter Jet, Cargo Plane
Air Dominance and the Critical Role of Fifth Generation Fighters
Une nation est une âme
The Challenges of Ungoverned Spaces
Carter Salutes Iraqi Forces, Announces 560 U.S. Troops to Deploy to Iraq
Obama: U.S. Commitment to European Security is Unwavering in Pivotal Time for NATO
International Court to Decide Sovereignty Issue in South China Sea
La SPA 75 est centenaire !
U.S. to Deploy THAAD Missile Battery to South Korea
Maintien en condition des matériels : reprendre l’initiative
La veste « léopard », premier uniforme militaire de camouflage
Océan Indien 2016 : Opérations & Coopération
Truman Transits Strait of Gibraltar
Navy Unveils National Museum of the American Sailor
New Navy, Old Tar
Marcel Dassault parrain de la nouvelle promotion d’officiers de l’École de l’Air
RIMPAC 2016 : Ravitaillement à la mer pour le Prairial avant l’arrivée à Hawaii
Bataille de la Somme, l’oubliée
U.S., Iceland Sign Security Cooperation Agreement
Cléopatra : la frégate Jean Bart entre dans l’histoire du BPC Gamal Abdel Nasser
Surveiller l’espace maritime français aussi par satellite
America's Navy-Marine Corps Team Fuse for RIMPAC 2016
Stratégie France : Plaidoyer pour une véritable coopération franco-allemande
La lumière du Droit rayonne au bout du chemin

Directeur de la publication : Joël-François Dumont
Comité de rédaction : Jacques de Lestapis, Hugues Dumont, François de Vries (Bruxelles), Hans-Ulrich Helfer (Suisse), Michael Hellerforth (Allemagne).
Comité militaire : VAE Guy Labouérie (†), GAA François Mermet (2S), CF Patrice Théry (Asie).