Obama administration partially lifts secrecy on classified cybersecurity project
Move part of bid to be more transparent, White House cybersecurity advisor says at RSA
Computerworld - SAN FRANCISCO -- President Barack Obama's administration has declassified portions of the highly secret multibillion-dollar Comprehensive National Cybersecurity Initiative (CNCI), which was launched by the Bush administration as part of an effort to defend American interests in cyberspace.
As of noon Pacific time today, a document (PDF) providing high-level details of the initiative was posted on the WhiteHouse.gov Web site. Some of the information provided in the five-page document was already known, but there is also fresh material.
For instance, the document shows that the government is working on developing a next-generation intrusion-prevention system called Einstein 3, for civilian departments and agencies of the federal executive branch. Similarly, it shows that the government is developing a cyber-counterintelligence strategy specifically to mitigate threats from overseas adversaries.
The administration's decision to declassify portions of the 12-point program was announced today at the RSA Security Conference by Howard Schmidt, who was recently appointed as White House cybersecurity adviser.
In a keynote address, Schmidt said the government had decided to lift the veil of secrecy that has shrouded the CNCI for the past two years, as part of its commitment to open government and transparency.
Such a move is important for fostering the closer partnership between the private sector and the government that is needed to fight cyberthreats, he said. "Transparency and partnership are concepts that go hand in hand," Schmidt said at the conference.
The government's decision is likely to be welcomed by security experts. Even though the document posted today offered few specific details, it at least provides some insight into where the government will be pouring hundreds of millions of cybersecurity dollars over the next few years.
As previously understood, under the CNCI all civilian federal agencies are consolidating external access points, including those to the Internet, as part of an effort to reduce their exposure to Internet-borne threats. More than 4,300 external connections are being consolidated to about 100. The network will then be monitored by an upgraded version of a federal network intrusion-detection technology called Einstein.
The new version of Einstein, called Einstein 2, will use signature-based sensors to inspect all Internet traffic entering federal systems for malicious content.
The document released today reveals that in addition to Einstein 2, the government is also developing Einstein 3, a network intrusion-prevention system based on technology developed at the National Security Agency. The Department of Homeland Security is currently piloting the technology, which will be used by the U.S. Computer Emergency Response Team (US-CERT) to respond to network intrusions.
Under CNCI, the federal government is also working on developing a strategy for deterring "interference and attack" on U.S. cyberassets. The goal of the effort is to enhance advance-warning capabilities and to develop an effective deterrent response to attacks against federal and critical infrastructure targets.
- Security execs express surprise over CISO's firing following RSA talk
- Security industry faces attacks it cannot stop
- Pennsylvania fires CISO over RSA talk
- Google attacks, Web 2.0 fuel FUD at RSA
- Analysis: Does the storm over cloud security mean opportunity?
- Microsoft's tax-for-hacks 'horrible' idea, say security experts
- FBI Director: Hackers have corrupted valuable data
- CISOs rain on cloud-computing parade at RSA
- FBI embeds cyber-investigators in Ukraine, Estonia
- Tweet this: Social network security is risky business
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- Accelerating Network Convergence in Virtualized and Cloud Data Centers Adopting a converged networking strategy enables organizations to traffic server and storage I/O workloads on consolidated data throughput channels. Intelligent software helps optimize...
- Omnichannel: From Buzzword to Strategy Customers demand a seamless experience across channels, especially mobile. Read this whitepaper for a research-based framework for using omnichannel for higher customer engagement.
- How 10GbE Network is the Backbone of the Virtual Data Center The shift to a virtual data center has put tremendous strain on legacy networks; driving the need for more speed, lower latency, more...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Cybercrime and Hacking White Papers | Webcasts