Federal Agencies Agree to Work Harmoniously for Cyber Security
September 1, 2011 4:44 PM
comment(s) - last by
Confusion over who to call during a cyber attack remains a frustration for federal bureaucracies
The Department of Defense (DOD), the National Security Agency (NSA), the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) all compete for cyber security primacy
Cyber security has become an increasingly important issue in recent years due to the number of attacks launched against corporations and governments around the world. For instance, hacker groups
as well as others have broken into several corporate websites/records such as
, Fox and
. Government websites such as those for the
and top U.S. government information technology services provider
were hacked as well.
Dealing with cyber attacks is difficult for government security agencies because it's hard to tell if it's an act of war or just smaller-scale criminal acts. An even larger problem in dealing with cyber attacks is determining who to call when one occurs. For instance, a cyber attack on a Department of Defense network might seem like an obvious job for the military, but if the attack occurred within the U.S., it would be categorized in criminal statutes.
The September 11 terrorist attacks shed some light on the fact that federal agencies don't always work well with one another (and haven't for decades), and that some fight over who should be called first in the case of such an attack. For instance, during the September 11 terrorist attacks, the CIA, FBI and law enforcement officers were criticized for not working with one another when the CIA knew the approximate location of the attackers but did not tell the FBI.
There are four different federal agencies that deal with cyber security, including the Department of Defense (DOD), the National Security Agency (NSA), the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI).
The NSA and DHS are
competitive over primacy
in cyber security, where the NSA has asked for the lead role in this particular area in the past. But the NSA has a bit of a shady past with issues like its warrantless wiretapping program that was discovered in 2005. There are debates as to whether the NSA should play a lead role in certain situations, but the Obama administration noted that it recognizes DHS as the leader in cyber security.
Despite who the leader in
is, these federal agencies are supposed to coordinate their efforts through Howard Schmidt, the president's cyber security coordinator since 2009. While Schmidt doesn't have the budget or staff he would like, his role in keeping the agencies on the same page helps keep some order. He also recognizes (and helped the agencies recognize) that each agency has its own area of expertise, and would know who to call in certain situations.
There are some circumstances, however, where disorganization is preferred. According to Travis Sharp, a fellow at the Center for a New American Security in Washington D.C., an "overarching" agency could be troublesome in some cases. But overall, a cyber security coordinator acting as a "clearinghouse" for these agencies is the better approach.
While feuds and debates have caused tension within the federal bureaucracies for years, James Lewis, a director and senior fellow at the Center for Strategic and International Studies in Washington, noted that the different agencies have become much better at coordinating and sharing information with one another over the last three years. NSA Director Gen. Keith Alexander agreed.
This article is over a month old, voting and posting comments is disabled
9/1/2011 7:26:43 PM
i believe this is true.
at the time, the CIA was primarily concerned with external threats, and the FBI with internal threats.
the intelligence failures are actually well-documented with regards to 9-11. simple heuristics could have provided the names of 3/4ths of the hijackers; just by cross-checking the names of 1 known suspect against:
it's even more telling that none of the hijackers were using aliases (or if they were, those alieses were not unknown to US intelligence).
9/2/2011 4:30:00 AM
You know, most agencies at Federal, State and city levels can't even communicate with each other via radio. PD and FD use completely different spectrum and the radios are not compatible with one another.
Communication from top-to-bottom in this country is ancient. Even with new equipment, all the red tape prohibits compatibility because of different unions, vendors, political reasons, privacy laws, etc.
In the end, all it really does is make it less safe for the general public.
9/2/2011 1:41:55 PM
I agree but when the NSA asks for those phone bills/records, people start crying about illegal wire tapping despite those phone records being available to numerous other sources (think third party) that the phone companies sell our information to.... I wish people would get their priorities straight - I don't care if gov't agencies have access to my bills, I DO care if DoubleClick (and others) has access.
"Vista runs on Atom ... It's just no one uses it". -- Intel CEO Paul Otellini
Global Cyber Security Push is Underway
July 6, 2011, 7:28 AM
LulzSec Downs CIA's Public Site, Appears to be Subject of Framing Attempt
June 15, 2011, 7:20 PM
Gmail Accounts Hacked; Google Suspects Chinese Involvement
June 2, 2011, 11:04 AM
Reports: Hackers Use Stolen RSA Information to Hack Lockheed Martin
May 30, 2011, 10:14 AM
SETI Suspends Allen Telescope Array Operations
April 27, 2011, 12:07 PM
Google Knocked by Analysts, But Shows Strokes of Brilliance in Q1 2014
April 18, 2014, 2:33 PM
Google Street View and reCAPTCHA Get Smarter with New Algorithm
April 17, 2014, 9:02 AM
Mt. Gox CEO Refuses to Come to the U.S. in Financial Crimes Probe
April 16, 2014, 3:50 PM
Mark Zuckerberg: Facebook Home Reception Slower than Expected, Social Graph Will Pick Up
April 16, 2014, 2:00 PM
FBI's Facial Recognition Database to Have 52 Million Criminal, Non-Criminal Photos by 2015
April 15, 2014, 2:56 PM
Microsoft's Anti-Google "Scroogled" Campaign May Have Ended
April 15, 2014, 2:44 PM
Most Popular Articles
Cities to Carpoolers: Sharing Your Car is Illegal, We Will Seize Your Cars
April 4, 2014, 9:17 PM
iPad Exploiter is Freed by Federal Appeals Court
April 11, 2014, 7:40 PM
A-10 Warthog May Live to Fight Another Day with Support from Lawmakers
April 14, 2014, 9:41 AM
Taiwan's AOU Claims to Have World's Highest-Res. OLED Smartphone Display
April 11, 2014, 1:44 PM
EFF: NSA May Have Used IRC Botnets to Exploit Heartbleed for Last Two Years
April 14, 2014, 4:43 PM
Latest Blog Posts
Facebook Aims to Provide Internet to "Every Person in the World" with Drones, Satellites
Apr 1, 2014, 10:20 AM
Retail Mobile Sites Experience Outages in Light of Simplexity's Bankruptcy
Mar 14, 2014, 8:48 AM
Tesla vs. BMW: Who Has the Safer EV?
Feb 1, 2014, 2:56 PM
Justice Leaks Details of Next HTC One Two Flagship Phone
Dec 5, 2013, 4:04 PM
Global Cyber Espionage Concerns Reveal Growing Cyber Armies
Nov 29, 2013, 11:04 AM
More Blog Posts
Copyright 2014 DailyTech LLC. -
Terms, Conditions & Privacy Information