Feeds

Elite DARPA cyber heroes will protect interwebs

'We invented it, we'll save it'

The essential guide to IT transformation

DARPA is upping its cyber game in order to protect the internet it came up with, increasing its research budget from $120m (£74.6m) to $188m (£117m) for the fiscal year 2012.

“DARPA’s role in the creation of the internet means we were party to the intense opportunities it created and share in the intense responsibility of protecting it. Our responsibility is to acknowledge and prepare to protect the Nation in this new environment,” Regina E Dugan, DARPA director, said in a canned statement.

“We need more and better options. We will not prevail by throwing bodies or buildings at the challenges of cyberspace. Our assessment argues that we are capability limited, both offensively and defensively. We need to fix that.”

Dugan was speaking at DARPA's Colloquium on Future Directions in Cyber Security, where the agency also announced an elite cyber team of experts to combat online threats. The cyber-defence crack team come from the white hat hacker community, academia, labs and non-profits, major companies, and of course, the defence and intelligence communities.

“I should emphasise that national policymakers, not DARPA, will determine how cyber capabilities will be employed to protect and defend the national security interests of the United States," Dugan said. "But the Agency has a special responsibility to explore the outer bounds of such capabilities so that our Nation is well prepared for future challenges.”

According to DARPA's Cyber Analytic Framework – a detailed investigation into the current state of US cybersecurity – the current strategy isn't going to work out in the long term.

Over the last 20 years, information security software packages have grown from thousands of lines of code to nearly 10 million lines, while malicious software tends to be around 125 lines. This strategy needs to continue for the moment because it gives the country "tactical breathing space".

"But if we continue only down the current path, we will not converge with the threat," Dugan said. ®

Next gen security for virtualised datacentres

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
KER-CHING! CryptoWall ransomware scam rakes in $1 MEEELLION
Anatomy of the net's most destructive ransomware threat
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?