Cyber is the defense community’s new buzzword. It’s one of the few growing areas of the nation’s defense budget at a time when most line items are shrinking. Since 2011, former defense secretary and CIA director Leon Panetta has been warning of a possible âcyber Pearl Harbor.â More recently, former Joint Chiefs of Staff Chairman Adm. Mike Mullen said that cybersecurity is one thing that keeps him up at night.
So what’s all the fuss about? To break it all down, the Washington Examiner recently spoke with Peter W. Singer, a Brookings Institution scholar and co-author (with Allan Friedman) of the book Cybersecurity and Cyberwar: What Everyone Needs to Know. The excerpts below suggest that to defend itself in cyberspace, the United States must demystify the threat so that civilians, corporations and the military can take common-sense steps to foil an attack.
Singer draws a parallel between effective cybersecurity and good hygiene. âWe teach our kids, âCover your mouth when you cough,â not just to protect yourself but because you bear a responsibility for all the people youâre going to connect with,â he said. âWe need that same kind of responsibility in our online life.â
Examiner: Why should the average American care about cybersecurity?
Singer: No issue has become more important more rapidly â and is less understood â than cybersecurity. It connects everything from the security of your bank account and your personal privacy, all the way to the future of world politics, such as that first example of the [Edward] Snowden NSA disclosures, which took a national political thing and made it global.
As long as youâre on the Internet, you ought to care about it. And yet, cybersecurity has been largely treated as an issue for the IT crowd, or as a White House official put it, âA domain only for the nerds.â
Cybersecurity is caught in this mix of ignorance and fear â and thatâs a really bad place for something so important to be stuck. The only way weâre ever going to get anything effective done is if we demystify it.
Examiner: Thereâs an intersection between the cybersecurity of personal information and national security, isnât there?
Singer: Oh, absolutely. First, because weâre all on the same networks, weâre in the same domain. So, 98 percent of U.S. military communications move across the same civilian-owned and -operated Internet that the rest of us use. We are in a world where an email from a general moves the same way that a cool cat video does.
Examiner: Citing the recent Target hack, Adm. Mullen said cybersecurity keeps him up at night. Why would a senior defense official be so worried about something like that?
Singer: Thatâs a really good question because he shouldnât be. Thatâs not the militaryâs responsibility â thatâs Targetâs responsibility. Similarly, the Army recently said it needed to add spending in cybersecurity because it needed to protect energy companies.
I do believe there are growing threats, and I do believe thereâs a need for more military spending. But the way we often justify it â by pointing to these non-military, non-national security-related areas â is not only a distortion of threats, but also a distortion of responsibilities and responses. If this is framed as an area that requires a man on cyberforce to come save you, it makes you think that itâs not your job. That may be good for a certain agencyâs budget, but it may not be good for national security in the broader term.
General [Keith] Alexander, whoâs head of both the NSA and Cyber Command, testified to Congress that, âEvery day, Americaâs armed forces face millions of cyber attacks.â Thatâs his quote, not mine. But to get to that number, millions, heâs combining everything from address scans and probes â some that are malicious, a lot that are just automated â attempts at pranks, attempts at political protest, and attempts at diplomatic, economic and national security espionage. Yet none of these millions of attacks are what people think heâs talking about. They are thinking of the so-called cyber Pearl Harbor, cyber 9/11, thatâs been cited in the media and in government speeches a half-million times. Weâve got to get beyond that.

Iâm not saying there are not threats here. Iâm just saying the way we talk about them is caught between this mix of ignorance and hype and fear, or what some people call the FUD factor â fear, uncertainty and doubt. You canât mix those together and think you can operate effectively on it.
You constantly hear people say, âThis is just like the Cold War.â No, itâs not. If thereâs any Cold War parallel, itâs to the early stages when we neither understood the technology nor the political dynamics driving it. I think 10 years from now, weâll go, âOh, my gosh, why were we even listening to that?â
Examiner: Does the perception that the military should care about hacks against banks or retailers impede the civilian, corporate and military responsibility to deal effectively with cyberattack?
Singer: Yes, on a number of levels, because it distorts the sense of responsibility. Thereâs roughly a 12:1 ratio of spending between military cybersecurity and cybersecurity spending by other government agencies. Iâm not saying the military shouldnât be spendingâIâm just saying thatâs a weird balance.
And then thereâs the effect that it actually might have on the military. This is an absolutely crucial area, part and parcel â not just the future, but the present of warfare. If you distort your approach to responsibility, you may not achieve some of the doctrine or capabilities needed on a future battlefield.
Itâs a mix of both recognizing the threat, seeing that threat out there, and wanting to do something about it â but also that itâs a way to get funding. You can see this in the defense budget. A couple of years ago, the word âcyberâ was mentioned four times. In this yearâs budget, itâs mentioned 147 times. Itâs one of the few parts of the budget thatâs growing, so everybody wants cyber mentioned in what they do.
Examiner: Considering this idea of millions of attacks, if weâre comparing little things with big things and treating them equally, weâre not applying the resources correctly, right?
Singer: Youâre not applying them right, and it also creates this mentality that, âItâs so overwhelming, what can I do? Oh, I need the man on cyber horseback to come and save me.â No.
Whether youâre running a bakery or a defense contractor, you have responsibilities and things that you can do. Because weâve mystified cybersecurity, weâve ignore the fact that a series of fairly simple but very effective measures would go an incredibly long way.
One study found that the top control measures are basically common practices â things like donât accept outside hardware into your system, and look for anomalies in traffic. These are things that anyone should be doing, whether theyâre the NSA or a bakery. The study found that these steps would stop as much as 94 percent of all attacks.
Examiner: It seems that every defense contractor is jumping into cyber and offering some solution, and the military is looking at tons of these. How would you assess how the Department of Defense is working in the cyber arena right now?
Singer: The Department of Defense is the best government agency working at it right now, and thatâs because of the larger budget and because it has the proper incentives to do well. The Department of Defense recognizes the threats, and these threats are meaningful to it in terms of national security consequences. Defense can affect change on its own organization because its ability to cajole people into doing what needs to be done is far more effective than, say, Health and Human Services or Commerce.

However, there are a couple of problems. One is the bringing together of NSA and Cyber Command, which I think weâll look back on as an oddity. Second is that we have to figure out the responsibilities in this space, particularly in warfare.
The third issue is the balance between cyber offense and cyber defense. The assumption has taken hold that cyber offense is dominant over defense, and as one U.S. military report put it, âwill be so forth in the foreseeable future.â So not just now, but forever and ever, cyber offense will be dominant. Thatâs led us to spend, depending on your measure, two-and-a-half to four times as much on cyber offense research and development than on cyber defense.
Actually, cyber offense isnât as easy as itâs often portrayed, and cyber defense isnât as weak as itâs often portrayed. You hear people say things like a couple of teenagers sipping Red Bull in their parentsâ basement could carry out a weapons-of-mass-destruction-style attack. Stuxnet illustrates the power of cyber weapons, but itâs not something a couple of teenagers could pull together. It wouldâve involved everything from intelligence analysis collection, some of the top cyber talent in the world, nuclear physicists and engineering experts. Stuxnet showed you the power, but also that itâs not so easy.
The U.S., and particularly the U.S. military, is incredibly dependent on networks, and this is not a binary situation where you just face one threat and you can create some kind of deterrence framework. Hereâs the parallel: If youâre standing inside a glass house â and youâre worried about everything from militaries to terrorists to criminal gangs to teenagers roaming in your neighborhood â you donât say, âThe one thing I really need to do is buy a stone-sharpening kit.â
Examiner: Several Department of Defense officials have raised some interesting points about the difficulty of adopting technology through the normal procurement system before it becomes obsolete, including the problem of personal communications on the battlefield and getting peopleâs smartphones integrated into a secure military system.
Singer: If you have a government acquisition system thatâs set up to buy widgets when itâs actually buying a mix of software and services, youâve got a disconnect. Previously, with the new generation of technology, the government had been in the driverâs seat of investing in the R&D of something new and buying it. Somewhere along the line, it might spin out into the civilian sector. Instead, today itâs Silicon Valley, and your challenge is how do you spin it in?
Whereâs the hub of the innovation happening? Is it the Beltway, or is it Silicon Valley? Who does government contracting better: the Beltway or Silicon Valley? Youâve got the efficiency and effectiveness versus the threat side. So on one hand, yes, youâve got an insurgent whoâs able to call in and target mortar strikes on a smartphone that he bought at a bazaar versus our folks who are using communications gear that my dad would recognize from Vietnam.
Examiner: Service members have told me that for the past 10 years on the battlefield, soldiers are bringing their personal communicators. iPhones and BlackBerrys are on the battlefield. The only problem is that the iPhone that the soldier bought at the PX before he deployed is running off the local network.
Singer: Yes, you hit it. You have frustration with the old technology that the acquisition system is giving them, and so theyâre saying, âLook, I can get this myself, and itâll work better for meâ â but that comes with vulnerabilities.
Letâs use a non-U.S. example. In the recent Lebanon war with Israel, Hezbollah exploited that really well. They were able to do a lot of signals intelligence against the Israelis, and they werenât just going after their military communications â they were going after cell phones so that they could figure things out, tap conversations, etc., in a way that caught the Israelis completely off guard. And thatâs a non-state actor, a really effective non-state actor.
Examiner: How can the military protect against those kinds of attacks?
Singer: Itâs actually the same as in any business organization. There are certain things you can and canât bring into certain areas. I may be okay with you having a cell phone in this space, but not when you move to the other. So first is to catch up your own acquisition so that theyâre not bringing in the outside gear. The problem is thatâs a slog for people right now.
Itâs getting better. For example, a couple of years ago, the idea of an app was, âHuh?â Now youâve got the development of app marketplaces where itâs literally apps that soldiers have written that other soldiers can pull from. There are apps for everything from exercise programs to bomb-targeting programs. Each year, it gets better.
Charles Hoskinson is deputy opinion editor for the Washington Examiner.