DARPA Sets Cyber Foundations with ‘Plan X’

Cyber Command officials define unit's scopeDefense Advanced Research Project Agency leaders told lawmakers the agency is making progress with an ongoing cyber security project known as Plan X to increase cyber visibility and provide a new foundation for the fast-developing world of cyber warfare moving into the future.

“Plan X is a foundational cyber warfare program that we are building to allow us to have the visibility and the understanding of cyberspace so that we could start to deal with how cyber warfare is happening today and where it will be in the future,” DARPA director Arati Prabhaker told members of the Senate Appropriations Committee’s Defense Subcommittee May 14.  “We think it will be integral to the kinetic warfighting of the future.”

Prabhakar emphasized that cyber security needs to not only look at computers and networks but also address embedded systems.

“One of our researchers a couple of years ago showed they could hack the speedometer on a car. All of our embedded military systems are also vulnerable. Everything has a computer in it today,” she said.

Sen. Richard Shelby, R-Ala., praised DARPA for its involvement in the development of the internet and asked about progress with Plan X.

“It is my understanding that DARPA is currently working to develop a cyber-warfare program which would allow DoD to create platforms to plan for and counter cyber warfare just as it would for kinetic threats. How important is sustained funding for DARPAs cyber security efforts?” Shelby asked.

Prabhakar told lawmakers Plan X was among DARPA’s highest priorities.  In February, DARPA awarded Raytheon a $9.8 million deal to work on Plan X.

Finding priorities is increasingly important for science and technology efforts because the $11.5 billion S&T budget request for 2015 is about a 5 percent drop from 2014, said Mr. Alan Shaffer, Acting Assistant Secretary of Defense, Research and Engineering.

“I think we’re all familiar with the challenges our businesses and our national security enterprise face because of cyber attacks that are happening on a constant basis. We want to give our senior decision makers the ability to see what’s happening in cyber space,” she said.

The concerns with cyber threats are not restricted to nation-states and organizations but rather extend to individuals as well, Prabhakar said.

“So many individuals have at their fingertips now the ability to participate in this domain, for better or worse. We think conflicts in the cyber environment will continue to escalate,’’ she added.

Some of the language written into DARPA’s Plan X Broad Agency Announcement when launching the effort toward the end of 2012 indicates a desire to strengthen understanding of cyberspace through additional research.

“The military is seeking to measure, quantify, and understand cyberspace. The military’s current

understanding and awareness in the cyber domain produces integration challenges with existing military capabilities in other domains. While existing technology can infer network  topologies — how computers are connected to one another — using trace route, packet analysis, and other techniques, the current research is just beginning to try to answer specific questions about the cyber domain, ” the BAA states.

About the Author

Kris Osborn
Kris Osborn is the managing editor of Scout Warrior.
  • stephen russell

    Hire ex IT types & Heavy Net users for tasks for cyberwar alone
    Be awesome
    Nationwide & Cybertypes can report to nearest Mil base
    (for me Id be Plant 42 IF have to do F2F)
    about 2 hour drive No.
    Must do
    Hire, Hire, subcontract, contract out for Services
    Hire vets

  • hibeam

    Plan X. That name came from the Pentagons Department in charge of cool names. Department Y.

  • Peter

    This has to be done. Just look at where most of the current malware comes from. Russia and China. Who might be future enemies? Why, Russia and China!

  • voodkokk

    Are you sure those guys are not drone pilots? Cyber personnel should be sitting around in shorts eating pizza.

  • Cataldo

    Full spectrum dominance doctrine generates an infinite series of oxymorons
    “”Prabhakar emphasized that cyber security needs to not only look at computers and networks but also address embedded systems.””
    Almost all things :) This kind of vision is told to be Olistic
    Is difficult to achieve result if used in (from) a branch of a system, whatever it is.

  • http://www.replyx.com www.replyx.com

    It’s really very complicated in this active
    life to listen news on TV, thus I only use world wide web for that
    purpose, and take the hottest information.

  • http://iarn.byus.net/blog Binäre Optionen Deutsch

    Spot on with this write-up, I really believe that this web site needs a great deal more attention. I’ll probably be
    returning to see more, thanks for the information!

  • http://www.ask.com wordpress marketing strategy

    Do you have a spam issue on this website; I also am a blogger, and I was wondering your situation; we have developed some nice methods and we are looking
    to trade solutions with other folks, why not shoot me an e-mail if interested.

  • http://www.dailymotion.com/video/x10qtb4_article-builder-what-is-it_tech the best spinner cracked

    Today, I went to the beach with my kids. I found a
    sea shell and gave it to my 4 year old daughter and said “You can hear the ocean if you put this to your ear.” She put the shell to her ear and screamed.
    There was a hermit crab inside and it pinched her ear. She never wants to go back!
    LoL I know this is completely off topic but I had to tell someone!