Feds take 'cyber Pearl Harbor' seriously

Federal agencies are bracing for a cyberattack of historic proportions — what some observers call a cyber Pearl Harbor. Although the government said it does not know of any threats of such an attack, officials say a recent denial-of-service attack by Russian nationalists against Estonia’s government is a wake-up call.

“If Estonia is vulnerable, are we?” asked Michael Castagna, the Commerce Department’s chief information security officer. “Estonia was able to weather the huge attack, but could the United States or the world afford to be cut off from the Web? This is a good example of why we need a culture of security.”

Bush administration officials have been preparing in a variety of ways to harden the government’s cyberdefenses against a massive cyberattack, which could disable large portions of the Internet on which government operations depend. One recent step was an Office of Management and Budget memo requiring agencies to use standard Microsoft Windows desktop and laptop PC configurations. That policy will make it easier for federal agencies to automatically apply software security patches.

Other recent administration actions include issuing a memo that asks agencies to protect personal information on government computers by requiring two-factor authentication for access to those computers. With those and other measures, the federal government will improve IT security, experts say.

White House officials also are working on a Homeland Security Presidential Directive that would provide guidelines for agencies to respond to a cyberattack. Sources confirmed that administration officials, the National Security Council and others have discussed the new directive.

“Just what is the order of battle and rules of engagement?” asked a former federal official with knowledge of the directive. “Do we get congressional resolution or public debate? Will launching a counter-counterattack mean I’m violating the Computer Fraud and Abuse Act? The most defenseless common Joe will take the brunt of any counterattack.”

White House spokesman Scott Stanzel said in an e-mail message that the administration has made no announcements about a new directive. 

In an unusual action, the CIO Council met May 16 at a secure location in Washington to discuss cybersecurity and nation-state attacks, two federal information technology leaders said. One of them, Ed Meagher, the Interior Department’s deputy chief information officer, would not offer any details because the information was classified, but he said the meeting was about IT security.

Classified briefings for CIOs are extremely rare, said Glenn Schlarman, former chief of OMB’s Information Policy and Technology Branch, referring to the classified meeting of the CIO Council.

An OMB spokeswoman said “the briefing was intended to ensure all CIOs are aware of the current state of play in the cyberworld and that they are working to take proper steps to secure their government assets accordingly.”

Government sources said the meeting was not called in response to the Estonia attack, but they said it was addressed at the meeting.

The Estonia attack highlights how cyberattacks are becoming another factor in international politics, Meagher said. “The FBI believes that the next terrorist attack will coincide with a cyberattack,” he said.
DHS offers Internet traffic analysis to EstoniaWhen Russian nationalists upset about Estonia’s decision to move a World War II monument launched a massive denial-of-service attack on the country’s critical infrastructure network, several countries provided technical assistance.

The United States’ Homeland Security Department analyzed traffic to figure out if the attack could be tied to Russia’s government, said Johannes Ullrich, the chief technology officer at the SANS Institute’s Internet Storm Center.

“DHS has not found anything that ties the attack back to the Russian government, but the source of the attack was in Russia,” Ullrich said.

After the cyberattack, Estonia decided to allow access to its network by non-Estonia Internet traffic only through a mirrored site. Visitors now see Estonian information through servers run by Akamai Technologies, Ullrich said.

— Jason Miller

FCW in Print

In the latest issue: Looking back on three decades of big stories in federal IT.

Featured

  • FCW @ 30 GPS

    FCW @ 30

    Since 1987, FCW has covered it all -- the major contracts, the disruptive technologies, the picayune scandals and the many, many people who make federal IT function. Here's a look back at six of the most significant stories.

  • Shutterstock image.

    A 'minibus' appropriations package could be in the cards

    A short-term funding bill is expected by Sept. 30 to keep the federal government operating through early December, but after that the options get more complicated.

  • Defense Secretary Ash Carter speaks at the TechCrunch Disrupt conference in San Francisco

    DOD launches new tech hub in Austin

    The DOD is opening a new Defense Innovation Unit Experimental office in Austin, Texas, while Congress debates legislation that could defund DIUx.

  • Shutterstock image.

    Merged IT modernization bill punts on funding

    A House panel approved a new IT modernization bill that appears poised to pass, but key funding questions are left for appropriators.

  • General Frost

    Army wants cyber capability everywhere

    The Army's cyber director said cyber, electronic warfare and information operations must be integrated into warfighters' doctrine and training.

  • Rising Star 2013

    Meet the 2016 Rising Stars

    FCW honors 30 early-career leaders in federal IT.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group