Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Money alone won’t protect federal networks, experts say

Delivered every Monday by 10 a.m., Weekly Cybersecurity examines the latest news in cybersecurity policy and politics.
Oct 23, 2023 View in browser
 

By Joseph Gedeon

Driving the day

— A new CSIS report finds that the U.S. government is vulnerable to cyberattacks, and it’s only going to get worse with the evolution of AI.

HAPPY MONDAY, and welcome to MORNING CYBERSECURITY! My flag football season came to a crashing halt in the playoffs this weekend. It’s a devastating loss that I’m hoping to redeem in 2028, when flag football will be introduced as an Olympic sport at the Summer Games in Los Angeles with future possible teammate Tyreek Hill. When are tryouts, again?

Have any tips or secrets to share with MC? Or thoughts on what we should be covering? Email me at [email protected]. You can also follow @POLITICOPro and @MorningCybersec on X. Full team contact info is below. Let’s dive in.

Want to receive this newsletter every weekday? Subscribe to POLITICO Pro. You’ll also receive daily policy news and other intelligence you need to act on the day’s biggest stories.

 

GO INSIDE THE CAPITOL DOME: From the outset, POLITICO has been your eyes and ears on Capitol Hill, providing the most thorough Congress coverage — from political characters and emerging leaders to leadership squabbles and policy nuggets during committee markups and hearings. We're stepping up our game to ensure you’re fully informed on every key detail inside the Capitol Dome, all day, every day. Start your day with Playbook AM, refuel at midday with our Playbook PM halftime report and enrich your evening discussions with Huddle. Plus, stay updated with real-time buzz all day through our brand new Inside Congress Live feature. Learn more and subscribe here.

 
Today's Agenda

CISA’s executive assistant director for cybersecurity Eric Goldstein and others are joining the Center for Strategic and International Studies’ launch party for a new report on the agency’s evolving mission focusing on federal executive agency networks. 10 a.m.

At the Agencies

PROGRESS LOADING — Despite decades of efforts to bolster its cyber defenses, the U.S. government is vulnerable to crippling attacks that could disrupt essential services and undermine national security no matter how much money you throw at it, according to a new report by the Center for Strategic and International Studies.

The 97-page report was six months in the making — compiled by a task force of former senior government officials, cyber experts and private sector executives. It finds that while the U.S. has made progress in securing its networks, it’s still not enough to keep up with the evolving threat landscape. Here’s what stands out to us from the analysis.

— Get money, still problems: The report’s big takeaway is that throwing money at CISA isn’t going to be good enough to crush growing sentiment that state and other cyber bad guys see opportunities to hold the U.S. hostage online. Sure, CISA is the central agency for all the federal government’s cyber needs — but there are more than a hundred FCEB agencies to contend with, all who have their own cyber-specific dreams and nightmares. That could lead to serious issues for effective communication and coordination.

According to researchers, one way in could be for Congress to take next steps in establishing and funding the Joint Collaborative Environment, a CISA-led secure info-sharing forum where cyber data can be studied and standardized between government, industry and academia.

But it’s a thorny issue for the intelligence community, which feels the platform would force sharing of information it wants to hold tight, with the NSA specifically lobbying against the idea to Congress. Lawmakers ultimately vetoed its authorization, which triggered CISA to move forward with its own version of the JCE — but without appropriate backing from Congress.

— Future threats: Experts are also on alert for incoming threats and challenges CISA will need to face in the coming years. They include the increasing use of malware-as-a-service, the use of AI to evolve the threat landscape, and the need for CISA to develop and acquire its own tools to automate defenses for vulnerability detection.

To solve those problems, experts recommend investing in data and service integration, developing sustainable cyber budgets and (again) improving communication and engagement with federal agencies.

The report also calls on Congress, CISA, the Office of the National Cyber Director, and the Office of Management and Budget to work together to develop a strategy for locking in baseline prices for computing and storage for analytics, AI, and related processing sold to federal agencies.

10 EYES FROM FIVE GUYS — In a stark warning, leaders of the Five Eyes intelligence alliance declared that the People's Republic of China represents the "defining threat of this generation,” and called its efforts to steal intellectual property “unprecedented in human history.”

Also unprecedented in human history was the Sunday night conversation on “60 Minutes” — it was the first time the alliance, made up of intel agency heads from the U.S., United Kingdom, Canada, Australia and New Zealand, ever sat together for a joint interview.

FBI Director Christopher Wray and others pointed to the Chinese government’s gargantuan efforts to steal IP, trade secrets and personal data from American companies and universities, adding that the FBI has “somewhere in the order of 2,000 active investigations” into Chinese espionage.

"We're talking everything from Fortune 100 companies, all to smaller startups," Wray said. "We're talking about agriculture, biotech, health care, robotics, aviation, academic research."

— “But all countries spy”: Conceded Australia intel chief Mike Burgess, saying that “all countries seek strategic advantage,” but Chinese theft goes “well beyond” traditional espionage.

— How does Wray describe China?: “East Germany combined with the cutting edge technology of Silicon Valley,” he said. “And the combination represents a daunting, first-of-its-kind threat for the United States and for our allies."

“If they want to be a great nation, it’s time for them to start acting like one,” Wray added.

Industry Intel

HOSTAGE RESCUES — The Israeli government is tapping local cyber companies to play a key role in its national security plans: locating and rescuing hostages taken into Gaza by Hamas.

Cyberint, one of the firm’s involved that specializes in collecting threat intelligence, tells MC it’s providing support to government agencies by gathering data from a variety of channels — such as the Dark Web and Telegram. This information is then fed into a larger database that is used in an attempt to track the movements of hostages and kidnappers.

In addition to its work on hostage rescue efforts, Cyberint is also helping to monitor potential cyber threats on the horizon.

"Everyone is focused on enabling what they have on their hands in order to alleviate some of the pain," Danny Miller, Cyberint’s chief marketing officer, told MC. "I think the message is that even though there are a lot of efforts around kidnapped people and everything else, we are still keeping business as usual.”

— Methodology: According to Miller, the firm’s platform utilizes a combination of rule-based and machine-learning algorithms training on over a decade of intel analysis, which allows the group to continuously update its list of monitored channels and automatically adapt to threat activities.

— Give-and-take: Collecting data for Israel does, however, play into ethical and risk-based cyber concerns. While the data could be used to identify potential threats to hostages or to track down perpetrators, there’s an argument that gathering location data for the government from the Dark Web could be seen as a form of state-backed surveillance.

Not only that, but the Dark Web is also a breeding ground for disinformation — and acting on false tips could put hostages at risk.

It’s a give-and-take the Israeli government is weighing in its decision to leverage its tech superiority. Last week, Haaretz reported that Israel has been ramping up its GPS jamming to disrupt and disable drone navigation systems deployed by Hezbollah and Hamas — but that risks also messing with the army’s rocket warning system.

On the Hill

GOP TARGETS CISA — Even though CISA was born out of the Trump administration, the agency has been facing intense scrutiny from hard-right Republicans who allege it’s overstepped its bounds and is infringing on free speech rights.

The accusations stem from CISA’s efforts to combat disinformation during the 2020 presidential election, with conservatives arguing that the agency’s work singles out conservative voices, and that pressure from the CISA led Social Media Platforms to limit the spread of information seen as damaging to President Joe Biden’s campaign.

The building anger toward CISA reverbated into a failed push from 108 Republicans last month looking to cut the agency’s $3 billion budget by 25 percent.

CISA, for its part, vehemently denies the allegations against it — contending that it only acted as an intermediary and never pressured social media companies to censor posts.

The fight over CISA is likely to continue in the lead-up to the 2024 election and could have implications for the future of online speech regulation in the United States. If lawmakers are successful in reining in CISA, it could embolden social media platforms to take a more hands-off approach to moderating content — which may lead to a flood of disinformation fueled by the advent of AI.

Get the full scoop from John.

Tweet of the Day

"With great power comes great responsibility ... to patch your web servers." – Uncle Ben (?)

Quick Bytes

SCHOOL’S OUT — A cyberattack on the Clark County School District disrupted school operations, forcing teachers to resort to pen and paper assignments and limiting staff access to emails and files while off campus, reports The Nevada Independent’s Rocio Hernandez.

SHADOWBANNED — Palestinian refugees in Gaza are facing a humanitarian crisis as the Israel-Hamas war intensifies without basic necessities such as food, water and electricity. Social media is a lifeline to stay informed, but information blackouts are making it difficult to get information in and out, Lila Hassan reports for Wired.

DOD’S CYBER HIRE — The RAND Corporation has submitted its research on the creation of a position for an assistant secretary of defense for cyber policy, but it will be months until anyone is formally nominated, the Dark Reading staff write.

Chat soon. 

Stay in touch with the whole team: Joseph Gedeon ([email protected]); John Sakellariadis ([email protected]; Maggie Miller ([email protected]); and Heidi Vogt ([email protected]).

 

Follow us on Twitter

Heidi Vogt @HeidiVogt

Maggie Miller @magmill95

John Sakellariadis @johnnysaks130

Joseph Gedeon @JGedeon1

 

Follow us

 

To change your alert settings, please log in at https://www.politico.com/_login?base=https%3A%2F%2Fwww.politico.com/settings

This email was sent to [email protected] by: POLITICO, LLC 1000 Wilson Blvd. Arlington, VA, 22209, USA

Please click here and follow the steps to unsubscribe.



This post first appeared on Test Sandbox Updates, please read the originial post: here

Share the post

Money alone won’t protect federal networks, experts say

×

Subscribe to Test Sandbox Updates

Get updates delivered right to your inbox!

Thank you for your subscription

×