The building where the Department of Homeland Security tracks every cyber attack against the US is surprisingly bland. With its neutral exterior and circular drive, I wasn’t even sure we were at the right place until I saw our press liaison standing in the lobby. There are no signs to distinguish it from the generic office park that surrounds it, and the doorman wouldn’t even confirm if DHS had an office inside.
The National Cybersecurity and Communications Integration Center, better known by the abbreviated NCCIC, opened in 2009 to serve as a place where DHS could monitor cyber threats across government agencies and critical infrastructure, such as power grids and dams. If an attacker ends up on the Department of Agriculture’s network or a government employee surfs to a malicious website, for example, the NCCIC is supposed to detect it. Until recently, the government has relied on its own information gathering, as well as partnerships with outside companies, to monitor its network and stay ahead of digital threats. But now, DHS is restructuring its work because of a law passed this past December as part of a huge omnibus bill: the Cyber Information Sharing Act, or CISA. The legislation focuses the agency on an effort to build out a more comprehensive cyber threat detection system, one that’s fed by information shared with the government by various companies.
After the lobby and a short elevator ride, a bare, fluorescently lit hall led to an office door with a sign advertising weekly office doughnuts. Phyllis Schneck, the deputy under secretary for cybersecurity and communications at DHS, greeted us and took us through to the main NCCIC floor.
The NCCIC looks similar to what you see depicted in movies as NASA mission control — long tables with computers and screens. Employees include ex-military personnel and IT professionals. They speak to each other as they work, just like normal coworkers, except they’re coordinating the nation’s cybersecurity defenses. The workstations face four massive screens that have mini displays within them. They show different measurements, like the number of unsecured critical infrastructure hubs that are being launched and the network status of every agency. If suspicious traffic shows up on one of the four big screens, a person responds and loops in others, Schneck explained. The alert is noted through a change in the screen’s color — green signaling that everything is all clear and red meaning things aren’t looking so good. When we arrived, the entire center was powered down into "declassified mode," so we didn’t observe any real-time cyber threats.
In addition to government agencies, DHS also assists in investigations abroad. Following the hacking of a power grid in Ukraine, for example, DHS sent employees to the country to investigate. The agency later issued a report on the incident.
DHS doesn’t just watch for human threats. It also monitors natural phenomena, like sunspots, fires, floods, and typhoons. The agency tracks the sun, because as Schneck explained, a catastrophic situation could affect satellite communications, given that computers are just big magnets that respond to radiation.
As CISA gets going, the agency will start integrating private companies’ cyber experiences into its malware prevention system. Though DHS says this will better protect the US government and its entities from attacks, not everyone agrees. Privacy advocates worry about companies sharing personal data with the government, while others have concerns about disrupting corporate workflows. Consumers also might not feel comfortable with the idea that their data could be given to DHS without their permission.
Schneck says information sharing could greatly increase America’s cybersecurity defenses if done correctly. For instance, if a company realizes its employees are being spammed with malicious phishing emails, it could send information about the sender and the email’s contents to DHS, which will alert cybersecurity bureaus around the world to the threat’s existence, and, hopefully, thwart the attackers. Jeh Johnson, the secretary of homeland security, has equated information sharing to the "see something, say something of cybersecurity."
The government pointed to its biggest cybersecurity failure as the primary evidence of CISA’s merits: the data breaches at the Office of Personnel Management. Investigators discovered that the same group who hacked into Anthem healthcare last year and stole information on millions of Americans also compromised OPM. If Anthem had shared information about the attacks with the government, like IP addresses and the attackers’ malicious links, OPM officials could have monitored their own network for those same things, potentially protecting OPM from attacks, or at least detecting them sooner. (Attackers were in OPM’s network for months.) Essentially, this is where CISA would have been put into action, government officials said. In the weeks and months following the OPM disaster, lawmakers began strongly pushing for cyber information sharing.
DHS heralded CISA as the legislative solution the country needed. The bill encouraged companies to voluntarily share information about malicious cyber encounters by offering them immunity from related lawsuits, so they they could share users’ data without worrying about getting sued for privacy infringements.
But while this might entice companies to participate, privacy advocates say it leaves consumers in the dark. Only a small amount of data is needed to thwart an attack, Mark Jaycox, civil liberties legislative lead for the Electronic Frontier Foundation, said in an interview with The Verge. Oversharing could easily happen and remain undisclosed to the public. Beyond that, the list of companies sharing information is secret, too.
"We don’t know what companies have joined or asked to join [the information sharing]," Jaycox said. "We’re now approaching another side of this bill and why it was terrible — the transparency aspects."No consumers would feel comfortable using a service if they know their information, including personal details, is going directly into DHS’ threat intelligence arsenal, Katie Moussouris, former chief policy officer at HackerOne, said in an interview. Just look at what happened to trust in technology companies after Edward Snowden’s leaks. A Pew Research Center study from 2014 found that 91 percent of US adults thought they had lost control of their personal data to companies.
Despite privacy concerns, the bill passed and is now law. Only six companies have signed up to fully participate, The Associated Press reported in March.
Following our tour of the NCCIC, Schneck took us to her office. She insists privacy was and continues to be a major consideration, and that the agency asks for only the essential technical details when incident information is shared.
"We brief privacy folks all the time," she said. "Look, it’s not worth protecting something if we’re giving up our rights as Americans."
So what information goes into the NCCIC? The agency published guidelines in February to clarify. Companies should share anything that helps investigate an incident or vulnerability. Information isn't directly related to a cyberthreat if "it is not necessary to assist others [to] detect, prevent, or mitigate" the threat. So, for example, with a phishing email, a company should send DHS the sender of the email, the malicious URL, any malicious files attached, the contents of the email, and any additional information that could help thwart future attacks. The name and email address of the email's targets should not be shared, the agency says. Whether companies will follow these guidelines remains to be seen, though the system’s guaranteed secrecy makes it difficult for the public to check.
Sharing this information will go a long way to keeping US entities and interests secure, Schneck said. She thinks of malware and threats in terms of virtual viruses, and just like a flu vaccine helps the body protect against the influenza virus, putting indicators of compromise into DHS’ cyber center will act as a vaccine of sorts — the NCCIC will be able to more quickly detect malware and other cyber threats across the country’s networks.
But while that might be the case, companies aren’t liable if they overshare users’ data, and consumers won’t readily know if that’s even happening. Some companies also say they’ve already created a system around warrant requests and will share user information if legally obliged. They don’t really need voluntary information sharing, Moussouris said.
Schneck remains idealistic, however. She hopes that greater information sharing will eventually allow the agency to detect and thwart an attack without a human ever getting involved, especially when it comes to state-sponsored attacks, she said.
Her vision is probably even more ambitious than it sounds. DHS needs to get more companies to share data, to improve its technology to be better able to detect changing threats, and humans may still be needed to determine when data is sensitive. The future of a fully autonomous threat detection system remains a long way off. Maybe that’s a good thing, though, as we grapple with the current system and the questions it introduces.
Loading...
About Me
Blog Archive
-
▼
2016
(151)
-
▼
May
(151)
- Tokyo Thrift: Infobar is the most beautiful series...
- The Indistinguishable X-Men: the narrowing range o...
- Facebook and Microsoft team up to lay a massive in...
- Mars is emerging from an ice age that ended about ...
- Google’s Project Ara is about more than just modul...
- Who comes up with a $700 Wi-Fi-connected juicer?
- The foggy numbers of Obama’s wars and non-wars
- Brady’s deadline to appeal suspension is about to ...
- UK's National Obesity Forum slams 'disastrous' low...
- Contactless payments tripled in popularity in the ...
- Why a glowing button might be more important than ...
- Civil War's Arrested Development Easter egg shows ...
- AudioQuest's NightHawk headphones sound as beautif...
- Will virtual reality kill the YouTube comment?
- Google built a tiny radar system into a smartwatch...
- How Frank Underwood helped Monument Valley find a ...
- Apple just revealed the future of its retail stores
- The Sex Factor is a porn reality show straight out...
- The TSA will ruin your summer vacation and no one ...
- Why Google's Allo messaging app is a big step back...
- Robin Wright used Claire Underwood's popularity to...
- Google Home: a speaker to finally take on the Amaz...
- Daydream will be the reason you'll want a 4K phone
- A first look at Android Wear 2.0
- How many Apple engineers does it take to fix iTunes?
- Google I/O 2016: Android N, Chrome OS, virtual rea...
- You can now put a sunroof in your private jet
- Microsoft is selling its feature phone business to...
- Vatican Cardinal to Americans: ‘In Your Nation, Go...
- After bombings in Baghdad kill 77, Sadr's forces d...
- Justice Department Opens Investigation Into Russia...
- Millions more Americans to be eligible for overtim...
- Clinton, Sanders in tight Ky. race; Sanders, Trump...
- Iran cracks down on female models posing without h...
- Hiker found dead in New Mexico, end of monthslong...
- Obama says Transgender bathroom rule a matter of d...
- Google's latest app, Spaces, aims to simplify grou...
- On Coloring Book, Chance the Rapper wades joyfully...
- Confessions of a Red Guard, 50 years after China's...
- Trump: London mayor made 'very rude statements' ab...
- Guess what? Your password can be hacked in millise...
- Democrats: Benghazi chairman ignores statement by ...
- Faraday Future says its electric car could be more...
- Samsung Notebook 9 review: redefining the thin-and...
- Grace and Frankie is the secret weapon in Netflix'...
- Google plans to start blocking Flash in Chrome thi...
- A long talk with Facebook about its role in journa...
- Facebook CEO wants to meet with conservatives amid...
- Trump and GOP leaders bury hatchet on bizarre day
- Apple invests in Chinese Uber rival Didi Chuxing
- Letter from Africa: Kenyans beg for mercy
- Cupertino's mayor says Apple is 'not willing to pa...
- A look inside the Department of Homeland Security'...
- 'We need fundamental changes': US doctors call for...
- North Korea puts on once-in-a-generation political...
- Sandy Hook victims’ families get access to gun man...
- Canadian wildfire edges south, leaves thousands st...
- US names prominent Panama family big money launderers
- Town increases security with escaped inmate on the...
- North Korea congress starts; foreign media kept ou...
- Top reason Americans will vote for Trump: "To stop...
- How virtual reality can change the way we see gend...
- Lawsuit challenging Facebook’s facial recognition ...
- Israel discovers cross-border tunnel from Gaza
- See the Religious Text the U.S. Government Printed...
- George Bell: The battle for a bishop's reputation
- A robot surgeon has passed a major milestone — sew...
- Company behind Kickstarter's thinnest ever watch d...
- This Is Fine creator explains the timelessness of ...
- A BITTER PILL
- Uncharted 4 is one big action movie cliche — and i...
- MacBook 2016 review: all of the possibilities, all...
- The Giant Al Qaeda Defeat That No One’s Talking Ab...
- Islam Under Fire in Europe’s Two Biggest Nations
- The spark of life: Science and the Bible meet again
- Pope condemns pedophilia as details of girl's deat...
- With five-year delay, CIA 'live-tweets' bin Laden ...
- Aretha Franklin Covers “Purple Rain” At White Hous...
- First US-to-Cuba cruise ship in decades sets sail
- Why So Many Chinese Students Come to the U.S.
- Would Trump be least ‘presidential’ president ever?
- Elephants perform for final time at Ringling Bros.
- How lives of Osama Bin Laden's neighbours changed ...
- Australia will use the herpes virus to eradicate i...
- Stanford team made a humanoid robot that can stand...
- Anything is a bath bomb if you throw it in a bath
- Apple's great taste doesn't extend to grammar
- Volvo autonomous car engineer calls Tesla’s Autopi...
- If Tribeca 2016 had a theme, it might be 'adulting...
- SpaceX plans to send a spacecraft to Mars as early...
- Doctors: Give E-Cigarettes To Smokers
- An Alabama city now says people who violate its ba...
- Third Of Brits Think Sexting Is Not Cheating
- PM Joins Former Union Boss In 'Brexit' Warning
- Identity 2016: 'Global citizenship' rising, poll s...
- Syria conflict: UN envoy calls on US and Russia to...
- Afghan heroin addicts seek recovery in a former NA...
- Donald Trump's foreign policy: 'America first'
- PRINCE " NO WILL TO MAKE A WILL Finances in Chaos"
- Larry Page's dream of building a 'Google Island' c...
-
▼
May
(151)
Powered by Blogger.
Post a Comment