[Infowarrior] - U.S. struggles to recruit computer security experts
Richard Forno
rforno at infowarrior.org
Wed Dec 23 04:34:36 UTC 2009
As attacks increase, U.S. struggles to recruit computer security experts
By Ellen Nakashima and Brian Krebs
Washington Post Staff Writer
Wednesday, December 23, 2009; A01
http://www.washingtonpost.com/wp-dyn/content/article/2009/12/22/AR2009122203789_pf.html
The federal government is struggling to fill a growing demand for
skilled computer-security workers, from technicians to policymakers,
at a time when network attacks are rising in frequency and
sophistication.
Demand is so intense that it has sparked a bidding war among agencies
and contractors for a small pool of special talent: skilled
technicians with security clearances. Their scarcity is driving up
salaries, depriving agencies of skills, and in some cases affecting
project quality, industry officials said.
The crunch hits as the Pentagon is attempting to staff a new Cyber
Command to fuse offensive and defensive computer-security missions and
the Department of Homeland Security plans to expand its own "cyber"
force by up to 1,000 people in the next three years. Even President
Obama struggled to fill one critical position: Seven months after
Obama pledged to name a national cyber-adviser, the White House
announced Tuesday that Howard Schmidt, a former Bush administration
official and Microsoft chief security officer, will lead the nation's
efforts to better protect its critical computer networks.
The lack of trained defenders for these networks is leading to serious
gaps in protection and significant losses of intelligence, national
security experts said. The Government Accountability Office told a
Senate panel in November that the number of scans, probes and attacks
reported to the Department of Homeland Security's U.S. Computer
Emergency Readiness Team has more than tripled, from 5,500 in 2006 to
16,840 in 2008.
"We know how we can be penetrated," said Sen. Benjamin L. Cardin (D-
Md.), chairman of the Judiciary subcommittee on terrorism and homeland
security. "We don't know how to prevent it effectively."
Indeed, the protection of critical computer systems and sensitive
data, said former National Security Agency director William Studeman,
may be the "biggest single problem" facing the national security
establishment.
Agencies under attack
One evening in May 2006, a U.S. embassy employee in East Asia clicked
on an innocent-looking e-mail attachment that opened the door to the
most significant cyberattack the State Department has yet faced,
allowing attackers operating through computers in China to send
malicious computer code into the department's networks in the region.
State's cyber-emergency response team immediately went into action,
working round-the-clock for two weeks to isolate the harmful code and
craft a temporary patch that officials said prevented a massive data
theft.
The department's response to the attack highlights how skills matter,
experts said. In 2000, State had hired technicians -- the vast
majority contractors -- who custom-built an intrusion detection system
and trained people to identify malicious software and reverse-engineer
it to determine an attack's goals and methods. As a result, department
technicians in 2006 were able to contain the attack quickly, said Alan
Paller of the SANS Institute, who has analyzed the case for the Center
for Strategic and International Studies.
Unlike State, most government agencies and private companies lack the
skills and resources to muster a robust containment effort.
Two months after the East Asia intrusion, the Commerce Department
detected a similar attack -- but only after a deputy undersecretary
was unable to log on to his computer. Contractor technicians were
never able to identify the initial date of penetration into the
computers of the Bureau of Industry and Security, which controls
sensitive exports of technology that has both commercial and military
uses.
It took eight days once the attack was discovered for technicians to
install a filter to prevent leaks, and then they installed the wrong
kind of filter, said Paller, sharing previously undisclosed findings
about the incident, first reported in The Washington Post in October
2006.
Because of "operational security concerns," the Commerce Department
declined to comment for this article. But a senior Commerce official
told a House Homeland Security panel in 2007 that the agency had no
evidence that data were compromised. Still, the department replaced
hundreds of workstations and blocked employees from regular Internet
use for more than a month.
Commerce is trying to improve, but it can take years to put the
people, processes and technology in place to wage an effective
defense, said Mischel Kwon, former director of the Department of
Homeland Security's readiness team. For years, she said, most civilian
agencies were forced by federal law to spend their cyber-funds on
security audits as opposed to crafting a strong security program.
And most federal information technology managers do not know what
advanced skills are needed to combat cyberattacks, said Karen Evans,
information technology administrator in the Bush administration.
"Skills," Paller said, "are much more important than hardware."
The federal pay gap
A pillar of the federal government's effort to develop talent is the
National Science Foundation's Scholarship for Service program, which
pays for up to two years of college in exchange for an equal number of
years of federal service. However, the program has placed fewer than
1,000 students since its inception in 2001.
The career of a 30-year-old computer scientist named Brian Denny shows
how the government is often outbid by the private sector in recruiting
cyber-warriors.
Denny earned a computer science masters degree in 2004 from Purdue
University on an NSF scholarship. In return, he spent two years at the
National Security Agency, identifying novel security flaws in computer
systems and software. Then Booz Allen Hamilton, a major intelligence
contractor, hired him at a 45 percent pay raise.
Today, Denny works for a small employee-owned firm that has federal
government and private-sector contracts, and his pay is higher still.
"You can still do a lot of cool national-security-related work as a
contractor," said Denny, chief security architect for Ponte
Technologies in Ellicott City, Md., near the NSA. "The pay difference
is so dramatic now," he said, "you can't ignore it."
Recently, a military officer with 20 years' cybersecurity experience
and a coveted security clearance sauntered out of a job interview with
Northrop Grumman, a major defense contractor that is making an
aggressive play for potentially billions of dollars in government
cyber-business.
"It's mind-roasting," said the officer, who is about to retire. "I've
had people call my house, recruiters for defense contractors . . .
probably 20 calls."
The labor shortage is torquing up salaries, a cost that often gets
passed on to the government. Some young people with three years'
experience and a clearance are commanding salaries above $100,000.
"Companies are paying people to jump from one company to another,"
said Ed Giorgio, a former NSA official and Ponte Technologies co-
founder. The job-hopping can undermine the firm's performance on a
contract, he said.
Philip Reitinger, deputy undersecretary of Homeland Security's
National Protection and Programs Directorate, conceded that the
government generally cannot match industry pay scales. "But in
government, one can have a bigger ability to effect change at an
earlier place in your career than anywhere else," he said. "And --
your country needs you."
Homeland Security officials acknowledged that hiring 1,000 people will
be difficult, so they are also looking at training people already in
the federal government.
Cybersecurity lawyers, researchers and policymakers are also in short
supply. The Pentagon, for instance, lacks a career path to develop
"expert decision-making in the cyber field," said Robert D. Gourley, a
former Defense Intelligence Agency chief technology officer. "The
great cyber-generals are few and far between."
More information about the Infowarrior
mailing list