Federal Agencies Agree to Work Harmoniously for Cyber Security
September 1, 2011 4:44 PM
comment(s) - last by
Confusion over who to call during a cyber attack remains a frustration for federal bureaucracies
The Department of Defense (DOD), the National Security Agency (NSA), the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) all compete for cyber security primacy
Cyber security has become an increasingly important issue in recent years due to the number of attacks launched against corporations and governments around the world. For instance, hacker groups
as well as others have broken into several corporate websites/records such as
, Fox and
. Government websites such as those for the
and top U.S. government information technology services provider
were hacked as well.
Dealing with cyber attacks is difficult for government security agencies because it's hard to tell if it's an act of war or just smaller-scale criminal acts. An even larger problem in dealing with cyber attacks is determining who to call when one occurs. For instance, a cyber attack on a Department of Defense network might seem like an obvious job for the military, but if the attack occurred within the U.S., it would be categorized in criminal statutes.
The September 11 terrorist attacks shed some light on the fact that federal agencies don't always work well with one another (and haven't for decades), and that some fight over who should be called first in the case of such an attack. For instance, during the September 11 terrorist attacks, the CIA, FBI and law enforcement officers were criticized for not working with one another when the CIA knew the approximate location of the attackers but did not tell the FBI.
There are four different federal agencies that deal with cyber security, including the Department of Defense (DOD), the National Security Agency (NSA), the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI).
The NSA and DHS are
competitive over primacy
in cyber security, where the NSA has asked for the lead role in this particular area in the past. But the NSA has a bit of a shady past with issues like its warrantless wiretapping program that was discovered in 2005. There are debates as to whether the NSA should play a lead role in certain situations, but the Obama administration noted that it recognizes DHS as the leader in cyber security.
Despite who the leader in
is, these federal agencies are supposed to coordinate their efforts through Howard Schmidt, the president's cyber security coordinator since 2009. While Schmidt doesn't have the budget or staff he would like, his role in keeping the agencies on the same page helps keep some order. He also recognizes (and helped the agencies recognize) that each agency has its own area of expertise, and would know who to call in certain situations.
There are some circumstances, however, where disorganization is preferred. According to Travis Sharp, a fellow at the Center for a New American Security in Washington D.C., an "overarching" agency could be troublesome in some cases. But overall, a cyber security coordinator acting as a "clearinghouse" for these agencies is the better approach.
While feuds and debates have caused tension within the federal bureaucracies for years, James Lewis, a director and senior fellow at the Center for Strategic and International Studies in Washington, noted that the different agencies have become much better at coordinating and sharing information with one another over the last three years. NSA Director Gen. Keith Alexander agreed.
This article is over a month old, voting and posting comments is disabled
9/2/2011 1:41:55 PM
I agree but when the NSA asks for those phone bills/records, people start crying about illegal wire tapping despite those phone records being available to numerous other sources (think third party) that the phone companies sell our information to.... I wish people would get their priorities straight - I don't care if gov't agencies have access to my bills, I DO care if DoubleClick (and others) has access.
"You can bet that Sony built a long-term business plan about being successful in Japan and that business plan is crumbling." -- Peter Moore, 24 hours before his Microsoft resignation
Global Cyber Security Push is Underway
July 6, 2011, 7:28 AM
LulzSec Downs CIA's Public Site, Appears to be Subject of Framing Attempt
June 15, 2011, 7:20 PM
Gmail Accounts Hacked; Google Suspects Chinese Involvement
June 2, 2011, 11:04 AM
Reports: Hackers Use Stolen RSA Information to Hack Lockheed Martin
May 30, 2011, 10:14 AM
Sony to PS3, PSP Owners: Your Credit Card Info May Have Been Stolen, Good Luck!
April 26, 2011, 4:55 PM
Google plans ultra-fast wireless Internet for Research Triangle Park, N.C.
August 12, 2016, 6:30 AM
Twitter Senior VP: "Diversity is Important, But We Can’t Lower the Bar"
November 9, 2015, 9:59 AM
CNN Resorts to Internet Censorship to Promote Clinton Over Senator Sanders
October 15, 2015, 2:47 PM
Breaking Bad: How to Crash Google's Chrome Browser With Just 8 Characters
September 23, 2015, 11:08 AM
Quick Note: Amazon UK Offers £10 Back on Any Order £50 or Over
August 3, 2015, 12:05 PM
Editorial: Reddit Allows Itself to be Hijacked as a Hate Platform For Racist Bigots
July 21, 2015, 6:32 PM
Most Popular Articles
Are you ready for this ? HyperDrive Aircraft
September 24, 2016, 9:29 AM
Leaked – Samsung S8 is a Dream and a Dream 2
September 25, 2016, 8:00 AM
Yahoo Hacked - Change Your Passwords and Security Info ASAP!
September 23, 2016, 5:45 AM
A is for Apples
September 23, 2016, 5:32 AM
Walmart may get "Robot Shopping Carts?"
September 17, 2016, 6:01 AM
Latest Blog Posts
Burlington Gun Attack
Sep 27, 2016, 5:00 AM
Who is in Risk of Getting Oral Cancer?
Sep 23, 2016, 6:02 AM
France Bans Plastic Eating Utensils in Restaurants
Sep 18, 2016, 10:49 AM
Progress Against Acute Myeloid Leukemia
Sep 17, 2016, 5:30 AM
Apple Watch Series 2 - Number 1 in the Customer Satisfaction.
Sep 7, 2016, 6:19 PM
More Blog Posts
Copyright 2016 DailyTech LLC. -
Terms, Conditions & Privacy Information