[Infowarrior] - Cybersecurity at midpoint of federal review

Richard Forno rforno at infowarrior.org
Tue Mar 17 14:42:31 UTC 2009


http://arstechnica.com/tech-policy/news/2009/03/all-eyes-on-cybersecurity-at-midpoint-of-federal-review.ars

All eyes on cybersecurity at midpoint of federal review

With a comprehensive 60-day review of the US cybersecurity situation  
half completed, an array of public and private sector experts weigh in  
with advice for the new administration.

By Julian Sanchez | Last updated March 16, 2009 9:20 PM CT

Last week was a busy one for cybersecurity mavens as the 60-day review  
ordered by President Obama reached its halfway point. The House  
Committee on Homeland Security held hearings on the state of efforts  
to protect the nation's data infrastructure, even as the Congressional  
Research Service released a report highlighting the shaky legal  
foundations of the Comprehensive National Cybersecurity Initiative.  
The Department of Homeland Security, which came in from many House  
witnesses, appointed a former Microsoft executive to lead the charge  
on cybersecurity. And at the annual FOSE conference, former FBI head  
Louis Freeh weighed in with a contrarian warning that centralization  
provided an "illusory" solution to the problem.

The trouble with DHS

The Department of Homeland Security, home to the National Cyber  
Security Center, proved a popular punching bag at last Tuesday's  
hearing before the House of Representatives. David Powner of the  
Government Accountability Office was relatively restrained, noting  
that the department "has not met expectations and has not provided the  
high-level leadership needed to raise cybersecurity to a national  
focus." Amit Yoran of security vendor NetWitness was more blunt,  
blasting DHS' "inefficiency," and its "consistent track record for  
tolerating political infighting, individual egos and shenanigans over  
prioritizing and executing its cyber responsibilities in a mature  
fashion."

Yet few faulted NCSC head Rod Beckstrom, who resigned last week,  
complaining of inadequate support and funding within DHS, and meddling  
from without by the National Security Agency. (On Wednesday, DHS  
Secretary Janet Napolitano named former Microsoft executive Phil  
Reitinger as the new head of the National Protection and Programs  
Directorate, which houses the NCSC.) Rep. Bennie Thompson (D-MS)  
argued that the previous administration had placed Beckstrom in a "no  
win situation" without "clear authority or budget."

The neglected private sector

A report released last week by the Congressional Research Service,  
however, suggests that the solution to those problems may lie with  
Congress rather than the White House. Their review of the legal basis  
for the (still largely secret) Comprehensive National Cybersecurity  
Initiative found only patchy statutory authority for the CNCI—little  
surprise, given that Congress itself had been largely left in the dark  
about the initiative. CRS concluded that President Bush had relied  
largely on his inherent Article II powers in launching the initiative,  
but questioned whether these provided an adequate basis for an  
ambitious project requiring intimate collaboration with the private  
sector.

Several witnesses at Tuesday's hearing echoed James Lewis of the  
Center for Strategic and International Studies, who argued that the  
"greatest failing" of the CNCI was that the initiative "despite its  
name, was not comprehensive." In part because it was launched under a  
veil of secrecy and without statutory support, the CNCI focused  
primarily on securing the dot-gov domain. But as a report sent to  
Congress last month by the Institute for Information Infrastructure  
Protection stressed, 85 percent of the nation's critical  
infrastructure is privately owned and operated. That report stressed  
the special security problems posed by the process control systems  
that manage vital flows of oil, gas, and electricity—systems often  
comprising a patchwork accretion of legacy components, which are  
particularly difficult to secure because they must operate  
continuously and respond extremely rapidly, with little leeway for any  
processing overhead that add-on security measures might add. Lewis  
suggested that the recent stimulus package had actually compounded  
this problem by providing billions for high-tech infrastructure  
upgrades, such as "smart" power grids, without a clear security plan  
in place.

Microsoft executive Scott Charney zeroed in on insular advisory  
committees as another lost opportunity for greater interaction with  
the private sector. He singled out the Joint Telecommunications  
Resources Board and the National Cyber Response Coordination Group,  
which are charged with coordinating responses to "cyber-based" crises,  
but which serve as forums for government agencies to talk to each  
other, rather than to the operators of the networks that would  
actually be targeted in any such crisis.

Charney and Lewis also made the case that regulation, as well as  
collaboration, was needed to fill "market gaps" in cybersecurity—among  
these the need for stronger authentication systems and "harmonized"  
security requirements across sectors. Charney stressed, however, that  
regulation should also be narrowly tailored and technology-neutral to  
the extent possible. Among the concerns about cybersecurity regulation  
advanced in last month's I3P report was that rules focused on process  
rather than outcome tended to cultivate "checkbox mentality" rather  
than encouraging innovation. The model for security regulation, that  
report suggested, should be the clean-air rules that place limits on  
emissions without specifying the technological means by which industry  
should meet those limits.

Learning to share

The secrecy surrounding the CNCI, most agreed, has seriously hampered  
cooperation with private network owners—who are themselves loath to  
reveal security breaches. Even within the federal government itself,  
the refrain of many witnesses at the House hearing—seconded by former  
FBI Director Louis Freeh in his remarks at the annual FOSE conference  
Friday—was that cybersecurity strategy had become "stovepiped" or  
"siloed," with coordination across agencies haphazard at best. One  
consequence of this, emphasized by Charney and Yoran, has been a  
disconnect between the approach of system designers, who tend to see  
cybersecurity through the lens of defense and prevention, and that of  
intelligence and law enforcement, which place a high premium on  
attribution of attacks.

The Markle Foundation's Task Force on National Security in the  
Information Age provided one model for improved information sharing in  
a report released last week. At the core of the proposal is an  
"authorized use" standard, implementable using commercial off-the- 
shelf technology, designed to "break down agency stovepipes" by  
enabling "discovery without disclosure." On this model, data would be  
relatively easy to locate across agencies in anonymized indices, but  
access would be strictly limited and monitored based on each  
individual's specific purpose and clearance level—ideally encouraging  
agencies to loosen their piranha-grip on information somewhat.

Who's in charge?

That still, of course, leaves the question of where primary  
responsibility for cybersecurity should be located. The witnesses at  
Tuesday's hearing, along with former FBI director Freeh, may have been  
critical of DHS to varying extents, but all rejected Director of  
National Intelligence Dennis Blair's suggestion that the NSA—whose  
track record on that all-important public-private collaboration might  
kindly be described as spotty—should take the lead. While some saw a  
continuing operational role for DHS—which also plays host to the US  
Computer Emergency Readiness Team (US-CERT)—most argued that a  
dedicated executive branch agency within the White House would be  
needed to handle macro-level policy making and intra-agency  
coordination. That was among the more prominent recommendations of a  
cybersecurity report issued late last year by the Center for Strategic  
and International Studies, to which many of Tuesday's witnesses  
contributed

The idea is not without its critics, however. In his Friday remarks,  
former FBI head Freeh argued that the problem of cybersecurity "is too  
large and too complicated to relegate it into a typical bureaucratic  
or statutory pigeonhole." Calling the idea of an independent agency  
dedicated to cybersecurity "illusory," Freeh suggested that protecting  
critical information infrastructure was like "trying to deal with  
weather: where in the United States should we put the responsibility  
to anticipate and control weather? It can't be done." The solution, he  
argued, was to break down agency "silos" so that expertise dispersed  
throughout the government could be brought to bear without excessive  
centralization.

Probably the most important determinant of the approach the  
administration ultimately adopts will be the findings of Melissa  
Hathaway, who is slated to complete her comprehensive review in just  
under a month. Should that review conclude that a more centralized,  
White House-led approach is the way to go, Hathaway herself is widely  
seen as the most likely candidate to head the effort.



More information about the Infowarrior mailing list