Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
DoD lacks enough information to stop cyber attacks
Wednesday - 3/28/2012, 5:49am EDT
The Pentagon sees its job as defending the nation from foreign threats, a view that's probably not too controversial. But in the 21st century, that means not just incoming missiles, but incoming data packets. DoD's Cyber Command needs real-time information on attacks so it can stop them before they succeed, said Army Gen. Keith Alexander, who leads both the National Security Agency and U.S. Cyber Command.
Gen. Keith Alexander, director, NSA
"If we can't see the attack, we can't stop it," Alexander told the Senate Armed Services Committee Tuesday. "We're not talking about putting the military or the NSA into private networks to see the attack. We don't want to do that. But we have to have the ability to work with industry so that when they see an attack, they can share that with us immediately."
Information sharing is weak
Current methods of information sharing between government and industry are weak, military and congressional officials said, especially when stacked against the rate at which both state and non-state cyber opponents are developing new capabilities to exploit networks.
Sen. Joseph Lieberman (I-Conn.)
Alexander's testimony comes at a time when the Senate is debating two cybersecurity proposals that have one major point of departure: Lieberman and Sen. Susan Collins' (R-Maine) bill would tell the Department of Homeland Security to set minimum cybersecurity standards for the nation's most critical infrastructure. A competing proposal advanced by Sen. John McCain (R-Ariz.) and others would take a hands-off approach from the government's perspective, but would allow for some legal liability protections in order to encourage industry to voluntarily share information with the government.
Such a system is unworkable, said Rep. James Langevin (D-R.I.), who has introduced legislation that also would require critical infrastructure operators to adhere to a set of minimum cybersecurity standards.
"We do not accept voluntary safety standards for our airlines or in our food system, and we should not accept them when it comes to the utilities and infrastructure upon which we most rely," he said in a statement Tuesday.
"This is the hard part," Alexander said. "We don't want to burden industry, but their networks need to be as defensible as possible. "We have to set up some standards. It needs to be like the system we have for roads and cars."
Legislation meets DoD's needs
Alexander was careful not to explicitly endorse any particular legislative proposal. He said his main concern was information sharing, and that concern he said was acknowledged by both major pieces of cyber legislation.
Sen. John McCain (R-Ariz.)
"Anyone who's been through an airport has no confidence in the technological abilities of the Department of Homeland Security," McCain said. "Most of our cyber threats come from overseas. What would be the logic in putting our cyber defenses in the Department of Homeland Security?"
Alexander said DHS, DoD and the FBI need to work in concert. DHS, he said, should be the primary interface between the government and critical infrastructure operators; the FBI should be the main investigative agency for cyber attacks; DoD should be able to respond to foreign attacks, either through cyber means or with bombs and bullets, under rules of engagement the Pentagon is still finalizing.