[Infowarrior] - In a major cyber hack, who do you call? The White House spells it out.
Richard Forno
rforno at infowarrior.org
Tue Jul 26 07:20:39 CDT 2016
In a major cyber hack, who do you call? The White House spells it out.
By Ellen Nakashima July 26 at 6:00 AM
https://www.washingtonpost.com/world/national-security/in-a-major-cyber-hack-who-do-you-call-the-white-house-spells-it-out/2016/07/26/08b3287e-52db-11e6-bbf5-957ad17b4385_story.html
NEW YORK — President Obama has approved a new directive that spells out for the first time in writing how the government handles significant cyber incidents.
The directive, to be announced Tuesday, lets the public know which agency handles what, answering an oft-heard question after a breach: Who do I call for help?
The administration also for the first time reveals how it grades the severity of an event — and how it determines what is significant.
The directive comes as the administration is grappling with its latest major cyber incident — the Russian hack of the Democratic National Committee’s computers and the suspected release by the Russians of the embarrassing DNC emails that appeared Friday on the anti-secrecy site WikiLeaks, days before the Democratic National Convention was to begin in Philadelphia.
This incident will certainly test the new directive, as officials are still weighing how severe the breach is. To be considered significant, an incident must be likely to result in at least a “demonstrable impact” to public health or safety, national security, economic security, foreign relations, civil liberties or public confidence.
The implications of the hack — and the administration has not publicly blamed it on Moscow — are still unfolding. Officials have not yet determined, for instance, if Russia is truly behind the WikiLeaks release. Democratic officials have accused Moscow of trying to influence the outcome of the U.S. election.
Such an operation would represent a novel threat for Washington. But White House officials have noted the evolving challenge of cyberthreats, be they from foreign governments, hacktivists, criminals or terrorists.
“We are in the midst of a revolution of the cyberthreat — one that is growing more persistent, more diverse, more frequent and more dangerous every day,” said Lisa Monaco, Obama’s adviser for homeland security, in remarks she is expected to deliver Tuesday at a conference at Fordham University here.
In announcing the directive, Monaco will also say that the scale of the government’s response will be based on an assessment of the risks posed by an incident. “How might it affect our national security or economy? Does it threaten the life or liberties of American people?”
The directive has been in the works for at least two years, but reflects the experience of almost eight years of dealing with increasingly complex and challenging cyber incidents. The last four have been particularly trying.
Last year, officials discovered that the Chinese had breached computers at the Office of Personnel Management, exposing the data of 22 million current and former federal employees and their families. The year before that, North Korean hackers disrupted the network of Sony Pictures Entertainment, deleting files and disabling computers, uploading unreleased films to the Internet and leaking embarrassing emails. It was all an apparent effort to dissuade the studio from releasing a satirical film depicting the assassination of the country’s supreme leader, Kim Jong Un.
These two incidents certainly would be considered significant, though OPM “moved up the scale” when, as a result of the breach, it became difficult to process employees’ security clearances, said a senior administration official, who spoke under ground rules of anonymity.
The White House has come up with a severity scheme ranging from Level 0 for an inconsequential event to Level 5 for an emergency — or an attack that poses an “imminent threat” to critical systems such as the power grid, federal government stability or people’s lives. Level 2 is reserved for an incident that may affect public safety or national security. Level 3 moves into the realm of significant, for high severity events that are likely to have a “demonstrable” impact on public safety or national security.
There has been no known incident that would be considered a 5, senior officials said. The suspected Russian cyberattack on Ukraine’s electric grid in December that caused widespread power outages probably would have been a Level 4 — a “severe” event that likely would result in “significant” harm to public safety or national security — if it had happened in the United States, the official said.
An example of an incident that was high-profile but probably would not have risen to significant was the 2013 breach of Target, which affected the debit and credit card data of 40 million customers, officials said.
“If you’re the Target CEO, that was probably very high on your scale,” the senior official said. “But from a national security perspective, we did not need to spin up a huge amount of government machinery to handle that incident.”
The directive does not discuss how the government should respond to a significant event — whether it should impose sanctions, pursue indictments or even just publicly blame another country, for instance. Each case is fact-specific and responses depend on a range of factors, including geopolitics. But having the scheme helps them “calibrate” whether they are giving an incident due attention, the official said.
For businesses, government agencies and other governments that are often unsure of whom to call in a cyber incident, the White House also has simplified the organization chart. The FBI is the lead federal agency for investigating criminal and national security hacks. The Department of Homeland Security has the baton in helping breached organizations reduce the impact of an event and prevent its spread. The Cyber Threat Intelligence Integration Center, or CTIIC, pools intelligence to help identify who directed an intrusion or attack.
The Defense Department is not mentioned in the PPD as it does not play a primary role in domestic cybersecurity.
--
It's better to burn out than fade away.
More information about the Infowarrior
mailing list