Sp Server Startup

Government Seeks Cybersecurity, Superiority in Mostly Lawless Domain

The typical IT department must concern itself with all sorts of threats: Spyware and cookies that hop on users’ computers after a seemingly harmless click on a banner ad; malware that unwitting e-mailers save to their hard drives in pursuit of a fun e-card from a friend; and malicious codes that save themselves to your hard drive after inserting a flash drive. All of these things could cripple the enterprise’s network infrastructure, making it quite difficult to continue with business as usual.

But what about when that business is the U.S. government? Not only is its network more critical, but it’s also sustains a great many more threats: Last year, Defense Department systems alone sustained about six million assaults a day. And government networks run everything from the nation’s power grids to software on fighter jets, meaning a successful attack could have far-reaching, devastating consequences.

“Our government needs to be aware of what’s happening out there, how are these attacks occurring, whether our entire financial critical infrastructure [could be] at risk,” said Ed Jaehne, chief strategy officer at cybersecurity firm KEYW.

That pro-active approach is part of the government, Defense Department and intelligence services’ goal to bolster not just their cybersecurity but also their cyber superiority, the ability not only to defend critical assets but also to extract key information – about foreign companies, intelligence services or defense operations, for example – from cyberspace. Cyber superiority also focuses on using such information-gathering tactics to create a “decision advantage” for the country’s leadership. “We need to be ready to shift into an attack mode if that is authorized and required. Importantly, need to understand how attacks against us can be conducted,” Jaehne said.

In a recently released paper, Rice University’s IT policy fellow Chris Bronk argues that the United States employs a double standard when it seeks to use cyber tools to affect other nations – swiping intellectual property or messing with critical infrastructure, for example – but raises a cry when other entities reach into U.S. networks

“I hear a lot in the United States about how bad it is for other countries to try to steal intellectual property and other stuff from us and from other countries. I think it’s a form of hypocrisy for the U.S. to say that, because that’s what we’re doing,” Bronk said in an interview.

At the same time, he said, that doesn’t mean that the federal government shouldn’t simply ignore the Internet’s ability to bolster the nation’s security.

“I’m not saying that we shouldn’t use information technology to spy on Iran’s nuclear program or to keep tabs on Hezbollah; both of those seem like a great idea,” Bronk said. “But we can’t then go and point our finger at other world powers and say, ‘You’re spying on our companies. That’s bad.’”

But what exactly the government is saying about its cybersecurity policy is a bit unclear. It has no publicized policy on securing cyberspace, and both Bronk and Jaehne said it has quite a bit of work to do to be able to secure all its assets.

“The state of policy is substantially behind the threat,” Jaehne said. “It is something that has a lot of attention, but there’s a lot more attention and a lot more in the way of meetings than there is in the way of action on the policy level.”

Bronk said that he would like to see the United States develop a cybersecurity policy that seeks to “play by the rules” – but that a major issue internationally is the dearth of agreements governing the domain. Though much of the world follows the European Union’s Convention on Cybercrime, those regulations address only criminal behavior – identity theft, stealing, money laundering – and fail to prescribe anything for those that carry out cyber attacks.

“There’s all this other nastiness going on,” Bronk said. “Why isn’t there an international agreement on banning denial of service attacks?”

Featured

  • 12 Commercial Crime Sites to Do Your Research

    12 Commercial Crime Sites to Do Your Research

    Understanding crime statistics in your industry and area is crucial for making important decisions about your security budget. With so much information out there, how can you know which statistics to trust? Read Now

  • Boosting Safety and Efficiency

    Boosting Safety and Efficiency

    In alignment with the state of Mississippi’s mission of “Empowering Mississippi citizens to stay connected and engaged with their government,” Salient's CompleteView VMS is being installed throughout more than 150 state boards, commissions and agencies in order to ensure safety for thousands of constituents who access state services daily. Read Now

  • Live From GSX: Post-Show Review

    Live From GSX: Post-Show Review

    This year’s Live From GSX program was a rousing success! Again, we’d like to thank our partners, and IPVideo, for working with us and letting us broadcast their solutions to the industry. You can follow our Live From GSX 2023 page to keep up with post-show developments and announcements. And if you’re interested in working with us in 2024, please don’t hesitate to ask about our Live From programs for ISC West in March or next year’s GSX. Read Now

    • Industry Events
    • GSX
  • People Say the Funniest Things

    People Say the Funniest Things

    By all accounts, GSX version 2023 was completely successful. Apparently, there were plenty of mix-ups with the airlines and getting aircraft from the East Coast into Big D. I am all ears when I am in a gathering of people. You never know when a nugget of information might flip out. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity

Webinars

New Products

  • XS4 Original+

    XS4 Original+

    The SALTO XS4 Original+ design is based on the same proven housing and mechanical mechanisms of the XS4 Original. The XS4 Original+, however, is embedded with SALTO’s BLUEnet real-time functionality and SVN-Flex capability that enables SALTO stand-alone smart XS4 Original+ locks to update user credentials directly at the door. Compatible with the array of SALTO platform solutions including SALTO Space data-on-card, SALTO KS Keys as a Service cloud-based access solution, and SALTO’s JustIn Mobile technology for digital keys. The XS4 Original+ also includes RFID Mifare DESFire, Bluetooth LE and NFC technology functionality. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3