51福利 (51福利) faculty and students researching the cutting-edge of how the U.S. can gain an advantage in cyberspace shared their game-changing research during the latest Big Ideas Exchange (BIX), Nov. 30.
鈥淲e become academics because we believe ideas matter,鈥 said Dr. John Arquilla, chair of 51福利鈥 Department of Defense Analysis, and one of the organizers of the BIX series along with Dr. Peter Denning of Department of Computer Science. 鈥淚 hope you will agree that, in the cyber arena, we have come up with fresh perspectives that have the potential not only to improve our competition for cyber advantage, but to reduce the terrible disadvantages under which we鈥檝e been laboring for so long.鈥
Citing how the Wright Brothers, two bicycle mechanics, mastered powered flight, Arquilla opened the event by explaining what makes an idea big and why big ideas matter.
鈥51福利 is an institution based on the notion of the power of ideas,鈥 he said. 鈥淲e all believe Victor Hugo鈥檚 statement that there is no army more powerful than an idea whose time has come. We don鈥檛 always have to change the whole world, but there are parts of it that require changing. Certainly, cyber security is one of those parts.鈥
Lt. Cmdr. Nate Richardson, an 51福利 student in computer science, talked about a WWII practice where U.S. radio operators identified operators of adversary nations based on patterns in their transmission styles, or their 鈥渇ist.鈥
Richardson鈥檚 research examines a modern approach to the same end, using network traffic analysis and behavioral biometrics to create a 鈥渄igital fist鈥 that can be used to identify anonymous persons threatening cyber security.
鈥淧osing as a vulnerable user in hopes of interacting with a threat, we鈥檒l extract his digital signature without his knowledge,鈥 said Richardson. 鈥淚t will create a database of attacker fists that can be shared across defensive platforms so they can be recognized and stopped.鈥
Dr. Britta Hale talked about how advanced cryptography is used throughout our daily lives, especially with the rampant expansion of the Internet of Things. She advocates for a set of cryptographic standards that will provide a baseline of security.
鈥淚f people actually understood what they were putting together, cyber security at the most fundamental level, then maybe their work won鈥檛 be the weak point,鈥 said Hale. 鈥淭hat means embedding cryptographic training at every level 鈥 from the developer so he will know which part to choose and how to piece them together for the system, to the manager who is making the decision about the system and needs to know how to make it run the way it鈥檚 intended.鈥
Switching from the technical side to the intellectual side of the struggle for cyber advantage, Dr. Bret Michael highlighted the importance of international law, and clear rational thinking, in the cyber realm.
鈥淲e have a choice now,鈥 said Michael. 鈥淲e can either repeat history, which we often do intentionally or by accident, or we can move forward. A lot of what we see today in warfighting is fearmongering鈥 We tend to get caught up in this self-feeding frenzy to carry out an arms race. I鈥檇 like to see that we don鈥檛 carry this over to the cyber realm.鈥
Michael said that by sticking to the facts and not having a kneejerk reaction to every unverified editorial, resources can be used more efficiently allocated to maintain a cyber advantage.
鈥淚nstead of thinking more about competing with one another,鈥 continued Michael, 鈥渢ry to cooperate and build trust in each other so we can share this wonderful environment that we call the Internet.鈥
Referencing the big ideas brought up from the previous speakers, Denning talked about how recognizing digital fists, using the right cryptography, and clear thinking, could be woven together in an effective mechanism to provide the U.S. with a definitive advantage in cyber.
鈥淲e鈥檙e often talking in security about guarding against vulnerabilities, which are weak points in the system that can be attacked 鈥 such as software, bad configurations, anonymous requestors, and human frailties,鈥 he said.
Just as a strong rope is woven from many weak strands, Denning added, combining several simple practices such as two-step verification and trusted enclave networks using the right crypto can yield a strong security system.
鈥淭he rope will be stronger than its individual threads,鈥 he noted, adding half a dozen straight-forward security practices that, if implemented together, would strengthen most systems against most attacks.
The event closed with an opportunity for the audience to query the speakers on their individual topics. It also provided an opportunity for the founders of the program to offer some perspective on how the event relates to overall student experience at 51福利.
鈥淲e feel that the Big Ideas Exchange is an opportunity for officers during their time at 51福利, to engage in deep introspection about major problems that they won鈥檛 get anywhere else in their military careers,鈥 Arquilla said. 鈥淲e want to make that as worthwhile as we possibly can. That鈥檚 why we go after big ideas. We鈥檙e big game hunters, and we do it with big ideas.鈥