How It Works

How US-CERT gets the word out

Shutterstock image (by Pavel Ignatov): Alert icon.

(Pavel Ignatov / Shutterstock)

When a major vulnerability hits the Web, it is the U.S. Computer Emergency Readiness Team’s job to sound the alarm as quickly and effectively as possible. And given Heartbleed, Shellshock and other menacing revelations, US-CERT has had plenty of clamoring to do in the past year or so.

Internet users can subscribe to four separate US-CERT mailing lists, with “alerts” being the most urgent. Those alerts often include descriptions that are not overly technical so that a non-geek can understand them and take remedial security steps.

For instance, the alert for Heartbleed, the OpenSSL flaw discovered in April 2014, states: “This flaw allows a remote attacker to retrieve private memory of an application that uses the vulnerable OpenSSL library in chunks of 64K at a time.”

More from FCW

FCW Magazine (June 30, 2015)

To view the print version of this article, and the rest of FCW's "How it Works" package, please see our digital edition.

Users can rate the helpfulness of the alert as “yes,” “no” or “somewhat” at the bottom of each update. That feedback is presumably factored into how future alerts are crafted.

Although US-CERT is one of the main disseminators of threat information, it does not work alone. As part of the Department of Homeland Security’s National Cybersecurity and Communications Integration Center, the team has tapped the FBI, the Financial Services Information Sharing and Analysis Center, trusted private firms and a Canadian cyber response center for help in preparing alerts.

Like other federal offices that handle cybersecurity, US-CERT’s effectiveness rests on breaking down bureaucratic barriers so that it can act more quickly on threats, which can spread like wildfire.

US-CERT Director Ann Barron-DiCamillo said in a recent interview that industry is always interested in getting information more quickly and with greater context. Therefore, her team is working with intelligence agencies to strip relevant data from classified reports, she added.

Top-secret intelligence reports on cyberthreats contain technical data that is not classified, and separating that information “has been a huge focus, and it’s really helping with the timeliness as well as richer content associated with what we’re sharing,” she said.

About the Author

Sean Lyngaas is a former FCW staff writer.

Featured

  • Defense
    Ryan D. McCarthy being sworn in as Army Secretary Oct. 10, 2019. (Photo credit: Sgt. Dana Clarke/U.S. Army)

    Army wants to spend nearly $1B on cloud, data by 2025

    Army Secretary Ryan McCarthy said lack of funding or a potential delay in the JEDI cloud bid "strikes to the heart of our concern."

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.