How It Works

How US-CERT gets the word out

Shutterstock image (by Pavel Ignatov): Alert icon.

(Pavel Ignatov / Shutterstock)

When a major vulnerability hits the Web, it is the U.S. Computer Emergency Readiness Team’s job to sound the alarm as quickly and effectively as possible. And given Heartbleed, Shellshock and other menacing revelations, US-CERT has had plenty of clamoring to do in the past year or so.

Internet users can subscribe to four separate US-CERT mailing lists, with “alerts” being the most urgent. Those alerts often include descriptions that are not overly technical so that a non-geek can understand them and take remedial security steps.

For instance, the alert for Heartbleed, the OpenSSL flaw discovered in April 2014, states: “This flaw allows a remote attacker to retrieve private memory of an application that uses the vulnerable OpenSSL library in chunks of 64K at a time.”

More from FCW

FCW Magazine (June 30, 2015)

To view the print version of this article, and the rest of FCW's "How it Works" package, please see our digital edition.

Users can rate the helpfulness of the alert as “yes,” “no” or “somewhat” at the bottom of each update. That feedback is presumably factored into how future alerts are crafted.

Although US-CERT is one of the main disseminators of threat information, it does not work alone. As part of the Department of Homeland Security’s National Cybersecurity and Communications Integration Center, the team has tapped the FBI, the Financial Services Information Sharing and Analysis Center, trusted private firms and a Canadian cyber response center for help in preparing alerts.

Like other federal offices that handle cybersecurity, US-CERT’s effectiveness rests on breaking down bureaucratic barriers so that it can act more quickly on threats, which can spread like wildfire.

US-CERT Director Ann Barron-DiCamillo said in a recent interview that industry is always interested in getting information more quickly and with greater context. Therefore, her team is working with intelligence agencies to strip relevant data from classified reports, she added.

Top-secret intelligence reports on cyberthreats contain technical data that is not classified, and separating that information “has been a huge focus, and it’s really helping with the timeliness as well as richer content associated with what we’re sharing,” she said.

About the Author

Sean Lyngaas is a former FCW staff writer.

Featured

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.