The departments of Homeland Security and Defense, including the National Security Agency, have no way of sharing current alerts about computer breaches with each other or industry, an inspector general memorandum reveals.
The problem is not an inability to document incidents, but, rather, an inability to alert potential victims as the situation unfolds and to provide instructions.
There is one system for circulating event reports, a separate one for circulating directions on how to respond, and no real-time system for joining the two, according to an Oct. 24 DHS IG report released this week.
The missing technology should be housed at the 24-hour National Cybersecurity and Communications Integration Center, a DHS organization that distributes information among civilian agencies, the intelligence community, Defense components and critical infrastructure sectors, such as the power industry.
The report suggests the chasm between NCCIC and various agency operations centers might open the door to incoming threats, such as malicious code targeting military systems or oil and gas companies.
“According to the NCCIC director, there is no national system or common cyber tool currently in place for the federal cyber centers to share information,” the report found.
Officials at NCCIC, pronounced “N-kick,” acknowledged that a common cyber system could allow the separate centers to exchange “actionable information,” electronically and on a real time basis, with key industries to minimize damage.
Right now, NCCIC has a ticketing system that documents incident details, such as the time of the abnormal event, date it was reported, and phone conversations about the situation.
Meanwhile, NCCIC and the FBI have a system that disseminates bulletins to companies and agencies with instructions on preventing destructive attacks and protecting sensitive data.
But the two systems are not connected.
“This ticketing system does not link situational awareness products (i.e., alerts and bulletins) that have been issued and are associated with a specific cyber incident, threat or vulnerability,” the memo states.
Another disconnect: “Federal cyber operations centers often share their information with one another. However, no single entity combines all information available from these centers and other sources to provide a continuously updated, comprehensive picture of cyber threat and network status to provide indications and warning of imminent incidents, and to support a coordinated incident response.”
NCCIC does not possess the technology necessary to broadcast ongoing updates and avoid duplicate communications, the inspector general reported.
As remedies, IG officials suggested a knowledge management database, automatic calling trees and a communications-tracking system.
These technologies will require additional funding, Homeland Security officials told inspectors. Officials plan to improve existing information sharing tools and bring new capabilities online during the next four years, they said.
“Technologies and processes to improve discoverability and availability of data between and among the cyber operations centers serve as a foundation to the information sharing capability sets. These capabilities, coupled with automated machine-to-machine data transfer, will greatly improve the ability to link data sets and improve situational awareness,” Suzanne Spaulding, acting undersecretary of the DHS National Protection and Programs Directorate, wrote in a Sept. 5 written response to a draft report.
More from NextGov:
What We're Following See More »
"American spies collected information last summer revealing that senior Russian intelligence and political officials were discussing how to exert influence over Donald J. Trump through his advisers." The conversations centered around Paul Manafort, who was campaign chairman at the time, and Michael Flynn, former national security adviser and then a close campaign surrogate. Both men have been tied heavily with Russia and Flynn is currently at the center of the FBI investigation into possible collusion between the Trump campaign and Russia.
"Former FBI Director Robert Mueller has been cleared by U.S. Department of Justice ethics experts to oversee an investigation into possible collusion between then-candidate Donald Trump's 2016 election campaign and Russia." Some had speculated that the White House would use "an ethics rule limiting government attorneys from investigating people their former law firm represented" to trip up Mueller's appointment. Jared Kushner is a client of Mueller's firm, WilmerHale. "Although Mueller has now been cleared by the Justice Department, the White House may still use his former law firm's connection to Manafort and Kushner to undermine the findings of his investigation, according to two sources close to the White House."
Senate Intelligence Committee chairman Richard Burr (R-NC) and ranking member Mark Warner (D-VA) will subpoena two businesses owned by former National Security Advisor Michael Flynn. Burr said, "We would like to hear from General Flynn. We'd like to see his documents. We'd like him to tell his story because he publicly said he had a story to tell."