Modern field guide to security and privacy

DARPA offers rare glimpse at program to visualize cyberdefenses

The Pentagon's advanced research arm revealed its latest version of Plan X, an in-progress system designed for the military to visualize defending against cyberattacks, at a Passcode event on the future of cybersecurity innovation.

Michael Bonfigli/The Christian Science Monitor
Frank Pound, program director for DARPA's Plan X initiative, demonstrated the cybersecurity visualization project Thursday morning at a Passcode event in Washington. of Cybersecurity Innovation . Speakers and panel at St. Regis Hotel in Washington DC, February 26, 2015. (Photo by Michael Bonfigli /The Christian Science Monitor Future of Cybersecurity Innovation

For the first time in public, the Pentagon's advanced research wing offered a glimpse into its latest version of a project designed to give the military visual tools to combat cyberattacks.

The $125 million Plan X project aims to immediately notify warfighters when adversaries penetrate their networks, and give them the tools to quickly select the best applications to defend against incursions from a shared database inspired by Apple's App Store. 

"You can get really technical, but you are getting technical from a visual standpoint," said Frank Pound, the Plan X program director for the Defense Advanced Research Projects Agency. 

Mr. Pound demonstrated the latest iteration of Plan X to an audience in Washington on Thursday at a Passcode event on cybersecurity innovation. The demonstration followed an exclusive first look into the still-developing project from Passcode deputy editor Sara Sorcher. 

In addition to exploring Plan X, the event examined the future of cybersecurity innovation with William Hill, chief information security official at the MITRE Corp.; Dan Kaufman, director of the Information Innovation Office at DARPA; and Chuck Romine, director of the Information Technology Lab at the National Institute of Standards and Technology. 

The full video of the event available here. These are some key takeaways:

Pound: Visualizing cyberthreats takes designing a program so anything abnormal 'catches the eye' (+VIDEO)

In building a visual platform, DARPA realizes an effective cyberdefense means that nontechnical people will need to be actively involved in that fight, said Mr. Pound, especially as the US military is working to beef up its cybersecurity personnel.

To achieve that, DARPA is using a system that's not so different from using a touchscreen tablet to drag and drop. "Not everyone is a computer scientist; not everyone is a developer," he said.

Pound: Plan X offers a bird's eye view of the entire network (+VIDEO)

That way, said Pound, the platform allows users to "get really technical but you are getting technical from a visual standpoint." Therefore, he said, it allows the specialist using the system to see where the intrusion is taking place.

Pound: Seeing the full network improves "situational awareness" (+VIDEO)

"What we are trying to do is provide situational awareness about your networks," he said. "Let's admit it, we are going to encounter the adversary in the future on our networks."

Kaufman: 'It's the closest thing you'll see to cyberwarfare' (+VIDEO)

The director of DARPA's Information Innovation Office is not talking about Plan X. Dan Kaufman said one way the agency is trying to encourage more innovation is through its Cyber Grand Challenge. The idea is to see if DARPA can build a computer that can outwit the smartest hackers. The Grand Challenge will pit computers against computers at the 2016 Def Con hacking conference, but Kaufman's ambition is to eventually pit the agency's computers against human hackers in the actual Def Con conference at some point in the future.  "If we finish not last, I'm going to do a victory lap," said Kaufman. 

Romine: Let's kill the password once and for all (+VIDEO)

Romine said one of the biggest challenges – and drivers for innovative thinking – is for cybersecurity pros is to find a suitable replacement for the password. Whether it's through biometrics or something else, he said, a more secure verification system is desperately needed, and for the industry to finally "put a stake in the heart of the password once and for all."


This story was updated to clarify how DARPA will operate its Cyber Grand Challenge at Def Con.

You've read  of  free articles. Subscribe to continue.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to