Lawmakers to DHS: Have your networks been breached?

Letter to DHS CIO Scott Charbo about network security

Related Links

The House Homeland Security Committee wants to know whether the Homeland Security Department’s networks have been hacked.

In a letter to Scott Charbo, DHS' chief information officer, three chairmen and three ranking members asked DHS to answer 13 questions about the security of the department's information technology systems.

The letter follows a hearing by the committee's Emerging Threats, Cybersecurity and Science and Technology Subcommittee about hacks into Commerce and State department computers in July 2006. The committee is expanding its review of federal IT systems, starting with DHS.

“We are concerned that similar incidents may be occurring within the networks of the Department of Homeland Security,” the lawmakers wrote.

Lawmakers asked Charbo to respond by May 21. 

“DHS takes the security and protection of its information and networks very seriously,” Larry Orluskie, a DHS spokesman, told “We’ve taken many significant steps to ensure the integrity of our information systems."

 Lawmakers asked DHS detailed questions:  

• What responsibility does the CIO have over DHS’ networks? What is the CIO’s relationship with the chief information security officer and with the CIOs and CISOs of DHS' component agencies?

• What are DHS’ information security policies and incident response plans?

• How many and what types of incidents has DHS reported to the U.S. Computer Emergency Response Team, including those occurring between 2004 and 2007.

• Has DHS taken an inventory of each connection to the network both inside and outside the departmental firewall? Does a complete network topology diagram exist?

• Has DHS conducted internal and external penetration tests on its systems and made copies of all reports describing the vulnerabilities?

• Has DHS has implemented a secure coding initiative and tested the security configuration for its software and Web applications?

. What has the CISO’s annual budget been since 2003?

• What are DHS’ top three initiatives for securing the agency’s networks and how is the department measuring those?

A number of oversight organizations, including Congress, have rated DHS’ IT security as weak. Rep. Tom Davis (R-Va.) gave DHS a D for information security when he issued the 2006 Federal Information Security Management Act (FISMA) report card last month.

OMB said in its 2006 FISMA report to Congress that DHS had certified and accredited 85 percent of its systems, tested security controls on 89 percent of its systems and tested contingency plans on 60 percent of its systems.

“We made significant progress in overall FISMA compliance,” Orluskie said. “In fact, we have enhanced the percentage of IT systems that are fully accredited from 22 percent in 2005, to 95 percent in 2006. We also increased DHS system security controls testing from 54 percent at the end of 2005, to 87 percent by the end of 2006."

DHS reported 326 incidents to U.S. CERT last year, OMB said.

The inspector general reported recently that DHS has made progress, but it has a long way to go. For instance, auditor said 27 of 35 sensitive but unclassified systems have incomplete accreditation packages. Some critical information is missing from security documents, and several DHS agencies did not meet baseline security configuration requirements, the IG said. 


  • Comment
    Diverse Workforce (Image: Shutterstock)

    Who cares if you wear a hoodie or a suit? It’s the mission that matters most

    Responding to Steve Kelman's recent blog post, Alan Thomas shares the inside story on 18F's evolution.

  • Cybersecurity
    enterprise security (Omelchenko/

    Does Einstein need a post-SolarWinds makeover?

    A marquee program designed to protect the government against cybersecurity threats is facing new scrutiny in the wake of Solar Winds Orion breach, but analysts say the program was unlikely to have ever stopped the hacking campaign.

Stay Connected