Forum Views ()
Forum Replies ()
Read more with google mobile :
Special report: Government in cyber fight but can't keep up
|
Edition:
U.S.
Article
Comments (0)
Slideshow
Video
Editor's Choice
Old worm won't die after 2008 attack on military
Cancer death rates continue drop: report
Mercury's origins may differ from sister planets
Facebook may be good for friendships, politics
U.N. climate talks make scant progress to save Kyoto
Teens, young adults may drive flu epidemics: study
Japan plant starts clean-up of radioactive water
Comment: Amid global cybercrime, accidental hacks risk jail
Video: Zoo seeks girlfriend for endangered parrot
Slideshow: Chile volcano erupts
Follow Reuters
Facebook
Twitter
RSS
YouTube
Read
IMF cuts U.S. growth forecast, warns of crisis
10:41am EDT
Quick Guide to the Greek crisis
9:21am EDT
Special report: Government in cyber fight but can't keep up
|
16 Jun 2011
Wall Street rises on hint of Greece plan, data
10:34am EDT
Analysis: Source of Greek crisis? A nation in denial
16 Jun 2011
Discussed
112
Obama weighs new steps to boost jobs
71
Republicans to debate, with Romney the frontrunner
60
Delaware police interview teen about Congressman Weiner
Watched
Airbus' view of flying in the future
Mon, Jun 13 2011
Hefner, fiancee split; Schwarzenegger mistress talks
Wed, Jun 15 2011
Gloom deepens for Research in Motion
3:26am EDT
Special report: Government in cyber fight but can't keep up
Tweet
Share this
Email
Print
Related News
Pentagon's advanced research arm tackles cyberspace
Thu, Jun 16 2011
Read about hacks? Think you're immune? Think again
Thu, Jun 16 2011
Analysis & Opinion
Amid global cybercrime, accidental hacks risk jail
Do you want the NSA to be the cyber-police?
Related Topics
Technology »
Media »
Related Video
Cyber threats to spur defense innovation: Huntsman
Wed, Jun 15 2011
1 / 4
Department of Homeland Security researchers using advanced modeling and simulation equipment as they work on the DHS Control Systems Security Program, at the Idaho National Laboratory in Idaho Falls, April 28, 2010.
Credit: Reuters/Chris Morgan/Idaho National Laboratory
By Phil Stewart, Diane Bartz, Jim Wolf and Jeff Mason
WASHINGTON |
Fri Jun 17, 2011 9:21am EDT
WASHINGTON (Reuters) - The Pentagon is about to roll out an expanded effort to safeguard its contractors from hackers and is building a virtual firing range in cyberspace to test new technologies, according to officials familiar with the plans, as a recent wave of cyber attacks boosts concerns about U.S. vulnerability to digital warfare.
The twin efforts show how President Barack Obama's administration is racing on multiple fronts to plug the holes in U.S. cyber defenses.
Notwithstanding the military's efforts, however, the overall gap appears to be widening, as adversaries and criminals move faster than government and corporations, and technologies such as mobile applications for smart phones proliferate more rapidly than policymakers can respond, officials and analysts said.
A Reuters examination of American cyber readiness produced the following findings:
* Spin-offs of the malicious code dubbed "agent.btz" used to attack the military's U.S. Central Command in 2008 are still roiling U.S. networks today. People inside and outside the U.S. government strongly suspect Russia was behind the attack, which was the most significant known breach of military networks.
* There are serious questions about the security of "cloud computing," even as the U.S. government prepares to embrace that technology in a big way for its cost savings.
* The U.S. electrical grid and other critical nodes are still vulnerable to cyber attack, 13 years after then-President Bill Clinton declared that protecting critical infrastructure was a national priority.
* While some progress has been made in coordinating among government agencies with different missions, and across the public-private sector gap, much remains to be done.
* Government officials say one of the things they fear most is a so-called "zero-day attack," exploiting a vulnerability unknown to the software developer until the strike hits.
That's the technique that was used by the Stuxnet worm that snarled Iran's enriched uranium-producing centrifuges last summer, and which many experts say may have been created by the United States or Israel. A mere 12 months later, would-be hackers can readily find digital tool kits for building Stuxnet-like weapons on the Internet, according to a private-sector expert who requested anonymity.
"We're much better off (technologically) than we were a few years ago, but we have not kept pace with opponents," said Jim Lewis, a cyber expert with the Center for Strategic and International Studies think tank. "The network is so deeply flawed that it can't be secured."
"IT'S LIKE AN INSECT INFESTATION"
In recent months hackers have broken into the SecurID tokens used by millions of people, targeting data from defense contractors Lockheed Martin, L3 and almost certainly others; launched a sophisticated strike on the International Monetary Fund; and breached digital barriers to grab account information from Sony, Google, Citigroup and a long list of others.
The latest high-profile victims were the public websites of the CIA and the U.S. Senate - whose committees are drafting legislation to improve coordination of cyber defenses.
Terabytes of data are flying out the door, and billions of dollars are lost in remediation costs and reputational harm, government and private security experts said in interviews. The head of the U.S. military's Cyber Command, General Keith Alexander, has estimated that Pentagon computer systems are probed by would-be assailants 250,000 times each hour.
Cyber intrusions are now a fact of life, and a widely accepted cost of doing business.
"We don't treat it as if it's here today, gone tomorrow," said Jay Opperman, Comcast Corp.'s senior director of security and privacy. "It's like an insect infestation. Once you've got it, you never get rid of it."
The private-sector expert who requested anonymity said a top official at a major Internet service provider told him that he knew his network had been infiltrated by elite hackers. He could digitally kick them out - but that would risk provoking a debilitating counter-attack.
"THE THING ... THAT KEEPS ME UP AT NIGHT"
The idea behind the soon-to-be-announced Pentagon program for defense contractors is to boost information-sharing with the Defense Department on cyber threats. It also aims to speed reporting of attacks on firms that make up what the Pentagon calls the Defense Industrial Base.
The DIB, as it is sometimes known, provides the Defense Department some $400 billion a year in arms, supplies and other services. The new program is voluntary and builds on a smaller pilot, reflecting the persistent challenge of regulating private firms that traditionally shield proprietary data and often downplay cyber setbacks.
Ultimately, the new program may lead to agreement to put at least some Pentagon contractors behind military-grade network perimeter defenses, such as those that protect the Pentagon's own classified networks.
On another front, the Pentagon's far-out research arm, the Defense Advanced Research Projects Agency, is expected to launch by mid-2012 the National Cyber Range, a kind of replica of the Internet costing an estimated $130 million that would be used to test cutting-edge cyber defense technologies and help train cyber warriors.
The Obama administration has made cyber security a national priority, and tried to fashion an "all-government response" that imposes order on the competing domains and priorities of the Pentagon, FBI, Department of Homeland Security, the super-secret National Security Agency and the private sector.
"We're far better prepared than we've ever been before," said White House cybersecurity coordinator Howard Schmidt.
"Notwithstanding all the threats that we see out there, the things that are making news on a regular basis about a company that's been intruded upon ... (look at) how much the system still runs," Schmidt told Reuters in an interview.
The key, Schmidt said, is resiliency, "to make sure that we're better prepared, to make sure that the disruptions when they do occur are minimum - we're able to recover from them."
Still, he said major worries remain. "The thing that I worry about that keeps me up at night is the unknown vulnerability that may exist out there."
Some officials are even less sanguine.
The Pentagon's computer systems are widely considered to be better protected than other U.S. government agencies', and far safer than the private sector's. Still, a U.S. defense official told Reuters he would give the Pentagon just a "C+" grade overall for its cyber defenses. "We're not impervious to attack by any stretch, but nor are we 'open kimono'," the official said. He added: "And we're getting better."
WHAT IS 'CYBER'?
Experts say that one of the toughest challenges of cyber defense is, oddly, definitions. What constitutes "cyber"? Computers and digital networks, certainly. But how about digitized pictures or video streams from a pilotless Predator drone flying over Pakistan?
Who is responsible for protecting what? Where does national security begin and privacy end?
"The other big problem is lack of policy," said one former U.S. official. "(We) lack policy because we lack consensus. We lack consensus because we haven't had an informed debate. We lack an informed debate because we don't have a common pool of data. And we don't have a common pool of data because we don't share it."
Nowhere is the problem more acute than in thinking about cyber warfare. What constitutes an act of war in cyberspace? And how do you determine who it was that fired the shot?
U.S. military officials, eager to talk about how the Pentagon has boosted computer defenses, clam up when the topic turns to offensive capabilities.
The Pentagon has put together a classified list of its cyber capabilities so policymakers know their options - just as it does for more conventional weapons.
Offensive actions against foreign systems would require White House authorization. But the Pentagon does not need special approval to do the kind of cyber surveillance work that can identify vulnerabilities in foreign networks, a U.S. official told Reuters, speaking on condition of anonymity.
That includes leaving hidden digital "beacons" inside adversaries' networks that could be used to pinpoint future targets. The beacons can phone home to tell U.S. military computers that they are still operational, the official said.
While the United States is trying to apply conventional military logic to the cyber realm, there is no global consensus about the rules of cyber war. A Pentagon report due out toward the end of the month is not expected to articulate case-by-case possibilities of when a cyber war could turn into a real one.
INTO THE CLOUD
Even as such policy debates rage, the technological landscape is being remade, seemingly by the month, posing new challenges - and opportunities. Tens of thousands of mobile applications for smartphones and tablet computers represent new vectors for hacks and attacks.
"The quick answer is we haven't been doing enough and we're semi-late to the game" on protecting mobile applications, said Rear Admiral Mike Brown, a senior Department of Homeland Security cyber security official.
U.S. government agencies are working with major commercial vendors "to start looking together at how to address the issues of mobile vulnerabilities," Brown said at a symposium sponsored by Symantec Corp.
Meanwhile, the U.S. federal government is planning to move in a big way into "cloud computing," in which off-site providers offer network and storage resources accessible remotely from a variety of computing platforms.
Potential cost savings are significant. Handled correctly, computing clouds could offer added security, specialists say. But there are also risks.
A study released in April by CA Technologies and the Michigan-based Ponemon Institute contained alarming findings. Based on a survey of 103 U.S. and 24 European cloud computing providers, it found that a majority did not view security of their services as a competitive advantage, and believed that security was their customers' responsibility, not theirs.
Most did not have dedicated security personnel on staff.
Deputy Defense Secretary William Lynn met Google executives in California in mid-February to discuss cloud computing. On May 19, Lynn instructed the Pentagon's Defense Science Board to study the benefits and risks of cloud computing, "paying particular attention to attacks on communications that would destroy or delay delivery of services and information for time-critical uses."
Lynn told Reuters that "cloud computing has the potential to offer greater capability at equal or lesser costs." He added: "I want to make sure we are taking full advantage of these advanced technologies."
The Pentagon is preparing a cloud computing strategy, which it expects to complete by the end of the summer, a U.S. defense official told Reuters.
"We're trying to get to the place where warfighters or any of us can get to our information from anywhere on the planet, with any device," the official said.
Schmidt, the White House coordinator, said as many as 170 security controls are being built into government cloud computing projects from the start. "It's not deploying something and securing it later. We're setting the requirements at the outset."
"I'M NOT CONFIDENT THAT WE WOULD KNOW..."
So how safe are the computer networks of the United States, which perhaps more than any nation relies on them for banking, electric power and other basics of modern civilization?
In May 1998, then-President Clinton signed Presidential Decision Directive 63, calling for a "reliable, interconnected, and secure" network by 2003, and establishing a national coordinator for protecting critical infrastructure.
The Department of Homeland Security now has lead responsibility for protecting the power grid. Yet, as with almost everything involving cyber, it's not quite that simple.
If there were a cyber attack on the power grid today, "I'm not confident that we would know what parts of the government should respond," said one former U.S. official, who asked not to be identified. "Who jumps in there? DHS, DoD, Cyber Command, NSA, the intelligence community?"
"So nothing's really happened." said former Pentagon general counsel Judith Miller, talking about grid vulnerability at a cyber event in Washington this month.
"This is a discussion we had in the 1990s. We're having it right now. Nothing really has changed, although perhaps the ability of attackers, whether they're nation states or just kids, has grown apace," she said.
A central conundrum is that the Pentagon's National Security Agency, which specializes in electronic eavesdropping, has personnel with the best cyber skills, but has been until recently mostly shut out of protecting domestic networks. That's due to the highly classified nature of the NSA's work, and fears that it will stray into domestic spying.
Another complicating factor: the 1878 Posse Comitatus Act, which generally bars federal military personnel from acting in a law-enforcement capacity within the United States, except where expressly authorized by Congress.
"NSA has a long history in cyber security, on both the offensive and the defensive sides. It has great resources and expertise. But it makes privacy advocates nervous," said Stewart Baker, a former DHS official now at the law firm Steptoe and Johnson LLP.
Last October, the Defense Department and Homeland Security - responsible for protecting civilian U.S. government networks - signed a memorandum to cooperate, with the NSA sharing technology and the agencies swapping personnel.
The effort has gotten mixed reviews. Schmidt said that early reports of inter-agency tension have dissipated, and Representative James Langevin, a member of the House intelligence committee, said DHS is improving. "I don't think that they're there yet but we're moving in the right direction," he said.
However other experts, who would not be quoted for the record, said the gap between the two agencies remains wide.
Even if the NSA, DHS and other agencies worked together seamlessly, the problem remains of coaxing industries in critical infrastructure to accept more government regulation.
"There's absolutely no question that the power companies and indeed state regulators have been unenthusiastic about a federal role," Baker said. He added this warning: "The regulation that would pass after a disaster is a lot worse than they would get right now."
And then there's the Stuxnet-like "zero day" attack, exploiting a flaw no one knew existed, perhaps tucked into some off-the-shelf software like that purchased daily by federal agencies.
"Our largest fear ... is the zero day attack," said Sherrill Nicely, the CIA's deputy chief information officer. "It's very, very, very difficult to protect oneself from an attack that you did not know was coming or the vulnerability that you did not know existed."
(Additional reporting by Jeremy Pelofsky and Warren Strobel; Writing by Warren Strobel; Editing by Kristin Roberts and Claudia Parsons)
Technology
Media
Related Quotes and News
Company
Price
Related News
Tweet this
Link this
Share this
Digg this
Email
Reprints
We welcome comments that advance the story through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can flag it to our editors by using the report abuse links. Views expressed in the comments do not represent those of Reuters. For more information on our comment policy, see http://blogs.reuters.com/fulldisclosure/2010/09/27/toward-a-more-thoughtful-conversation-on-stories/
Comments (0)
Be the first to comment on reuters.com.
Add yours using the box above.
Social Stream (What's this?)
© Copyright 2011 Thomson Reuters
Editorial Editions:
Africa
Arabic
Argentina
Brazil
Canada
China
France
Germany
India
Italy
Japan
Latin America
Mexico
Russia
Spain
United Kingdom
United States
Reuters
Contact Us
Advertise With Us
Help
Journalism Handbook
Archive
Site Index
Video Index
Reader Feedback
Mobile
Newsletters
RSS
Podcasts
Widgets
Your View
Analyst Research
Thomson Reuters
Copyright
Disclaimer
Privacy
Professional Products
Professional Products Support
Financial Products
About Thomson Reuters
Careers
Online Products
Acquisitions Monthly
Buyouts
Venture Capital Journal
International Financing Review
Project Finance International
PEhub.com
PE Week
FindLaw
Super Lawyers Attorney Rating Service
Reuters on Facebook
Thomson Reuters is the world's largest international multimedia news agency, providing investing news, world news, business news, technology news, headline news, small business news, news alerts, personal finance, stock market, and mutual funds information available on Reuters.com, video, mobile, and interactive television platforms. Thomson Reuters journalists are subject to an Editorial Handbook which requires fair presentation and disclosure of relevant interests.
NYSE and AMEX quotes delayed by at least 20 minutes. Nasdaq delayed by at least 15 minutes. For a complete list of exchanges and delays, please click here.
Other News on Friday, 17 June 2011 Sudan border state foes agree to talks: Mbeki
|
Israel to stop Gaza flotilla regardless of cargo
|
Police blame Islamist sect for deadly Nigeria blast
|
Zvonareva, Venus dismissed in Eastbourne; Vinci tops Wickmayer in Holland
Diving scientist takes to Arctic in attempt to tame Beluga whales
IEA says increased global demand for oil will outstrip increased supplies
Analysis: In India, hotel operators invest and educate
|
Giants defensive end Osi Umenyiora unhappy with pact
Peralta, Raburn homers lift Tigers to 6-2 lead over Tribe in battle for first
Mexican police arrest drug boss El Brad Pitt
|
Number of hacked Citi credit card accounts rises to 360,000
'Lemonade Mouth' sequel, 'Shake It Up' Disney Channel movie in development
'Game of Thrones' star Sean Bean attacked outside London pub
Mexico suffers bad publicity from war with drug cartels
Oregon defensive back Cliff Harris to miss opener vs. LSU; indefinite suspension
RIM slashes forecast again, shares tumble
|
Oracle seeks billions in lawsuit against Google
|
Special report: Government in cyber fight but can't keep up
|
Spam clogging Amazon's Kindle self-publishing
|
Facebook may be good for friendships, politics
|
Microsoft releases Kinect software for developers
|
Niche chipmaker eyes M&A to gain analog talent
|
NY police to investigate Tupac robbery confession
|
Woes of famous, powerful shine light on sex addiction
|
R&B singer Ledisi gets introspective on new album
|
Crusading poet embodies Mexico's drug war pain
|
Rebels dismiss election offer, NATO pounds Tripoli
|
Assad's tycoon cousin, target of protesters, quits
|
Greek PM jettisons finance minister in crisis reshuffle
|
Secretary Gates thanks Pentagon journalists for critical coverage
Dallas delights in Dirk Nowitzki, champion Mavs
China to boost coastal forces amid sea tensions
|
Robert Rock's 70 might be best first day effort at U.S. Open, considering...
Cuba, others cause trouble in U.N. re-election: envoys
|
U.S. Open nightmare for Phil Mickelson: "I played horrific!"
China raises flood alert to top level, 555,000 evacuated
|
Fan-tastic pitching: Gio Gonzalez' 10 K's power A's past Royals
Sony hacker claims responsibility for CIA website shutdown
Capitol Roar: McIlroy wows 'em with first round 65, leads at U.S. Open
Exiled Thaksin seeks December return to Thailand
|
Al-Qaeda appoints Zawahiri as Osamas successor
Nortel resets bidding date for patent portfolio as Google joins bidder list
Fukudome four RBI help Cubs outslug Brew Crew
Somali pirates free German ship after ransom paid
|
BlackBerry maker slashes forecast, shares tumble
|
Samsung Electronics, Hynix tumble on Q2 earnings worries
|
Exclusive: China software bug makes infrastructure vulnerable
|
Hacktivists make noise on government websites
|
Google-backed Xunlei postpones Nasdaq IPO: IFR
|
Green Lantern emerges from obscurity; critics pounce
|
U2 guitarist the Edge loses bid for Malibu mansion
|
From bomb silo to big screen, an anti-nuclear quest
|
Shelling erupts in Sudan's Abyei, official says
|
Rebecca Black pulls 'Friday' video off YouTube
Yemeni government says Saleh to return from Saudi in days
|
The Big O: Miguel Olivo delivers key hits for Mariners in bid for AL West crown
Recently displaced Filipino armers hit by flooding
Analysis: Medvedev promotes himself as candidate for change
|
Gaddafi government talking to rebels: Russian envoy
|
Food prices mean trouble for poor and politicians
|
Buzz Aldrin files for divorce from third wife
Health care by hovercraft
Libyan prisoners stuck in limbo as war drags on
|
Angola's `sans papiers' violently deported in new wave of expulsions
DEVELOPING: Pentagon investigation continues as FBI on scene
Retailer Carrefour, smartphone maker Research In Motion lower expectations
Justin Uptons homer in 10th lifts D-Backs over Giants in series finale
ILO milestone for domestic workers
Analysis: Cyber raids fuel calls for training, monitoring
|
Businesses seen as target for easier phone hacking
|
Special report: Government in cyber fight but can't keep up
|
Susan Boyle story to be turned into musical
|
Basel art fair suggests boom times are back
|
Danish Ballet, revamped, takes fresh U.S. tour
|
Greece at new risk of being pushed off euro
Bodies of missing Tenn. mom, Jo Ann Bain, and daughter found
Female Breasts Are Bigger Than Ever
AMD Trinity Accelerated Processing Units Now in Volume Production
The Avengers (2012 film), made the second biggest opening- and single-day gross of all-time
AMD to Start Production of piledriver
Ivy Bridge Quad-Core, Four-Thread Desktop CPUs
Islamists Protest Lady Gaga's Concert in Indonesia
Japan Successfully Broadcasts an 8K Signal Over the Air
ECB boosts loans to 1 trillion Euro to stop credit crunch
Egypt : Mohammed Morsi won with 52 percent
What do you call 100,000 Frenchmen with their hands up
AMD Launches AMD Embedded R-Series APU Platform
Fed Should not Ignore Emerging Market Crisis
Fed casts shadow over India, emerging markets
Why are Chinese tourists so rude? A few insights