http://www.nextgov.com/nextgov/ng_20101207_9128.php?oref=topnews
DHS official: Cyber attacks against infrastructure on the rise By Chris Strohm, <http://www.nationaljournal.com/> National Journal 12/07/2010 The U.S. government is seeing a rise in cyber attacks aimed at taking over control systems that operate critical infrastructure, such as industrial facilities and pipelines, a senior Homeland Security Department official said Tuesday. "It's certainly a trend," Greg Schaffer, assistant secretary for the DHS Office of Cybersecurity and Communications, told reporters. Schaffer said the government is tracking more and more cyber attacks that have a greater level of sophistication and are tailored to target specific types of industrial infrastructure, such as power grids. "These are the kinds of things that do give us pause," he said during an event hosted by the Defense Writers Group. "It is widely recognized that the cyber ecosystem we have today favors the offense and not the defense," Schaffer added. "It is simply too hard to secure the systems." The so-called Stuxnet worm, which affects Windows-operating systems responsible for running supervisory control and data acquisition systems, is one such example, he said. There is no indication that the threat from Stuxnet has subsided, and the potential remains for some U.S. infrastructure to be attacked by it, he said. But Schaffer declined to comment on the origin of the worm - a question that has stirred considerable speculation but no answers. He also dodged several other hot-button issues, including what the government is doing in response to the disclosure by WikiLeaks of confidential U.S. diplomatic cables. U.S. officials suspect <http://nationaljournal.com/whitehouse/wikileaks-one-analyst-so-many-documen ts-20101129> an Army intelligence analyst stole the documents using the Pentagon's Internet for secret information, commonly referred to as SIPRNet. Schaffer noted that the Pentagon is responsible for the protection of its networks. But he added that defending information technology networks requires a balance between having protective measures but not impeding the ability of government workers to carry out their duties. "Security is an exercise in risk management," he said. The Homeland Security Department and National Security Agency recently signed a memorandum of agreement to cooperate on cybersecurity efforts and share personnel. "This structure is designed to put the full weight of our combined capabilities and expertise behind every action taken to protect our vital cyber networks, without altering the authorities or oversight of our separate but complementary missions," Homeland Security Secretary Janet Napolitano and Defense Secretary Robert Gates said in a joint statement on Oct. 13. Schaffer described the agreement as solidifying a relationship in which DHS and NSA work together on daily issues. He said there has not been a significant cyber event since the agreement was signed [Non-text portions of this message have been removed] ------------------------------------ -------------------------- Want to discuss this topic? Head on over to our discussion list, [email protected]. -------------------------- Brooks Isoldi, editor [email protected] http://www.intellnet.org Post message: [email protected] Subscribe: [email protected] Unsubscribe: [email protected] *** FAIR USE NOTICE. This message contains copyrighted material whose use has not been specifically authorized by the copyright owner. OSINT, as a part of The Intelligence Network, is making it available without profit to OSINT YahooGroups members who have expressed a prior interest in receiving the included information in their efforts to advance the understanding of intelligence and law enforcement organizations, their activities, methods, techniques, human rights, civil liberties, social justice and other intelligence related issues, for non-profit research and educational purposes only. We believe that this constitutes a 'fair use' of the copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtmlYahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/osint/ <*> Your email settings: Individual Email | Traditional <*> To change settings online go to: http://groups.yahoo.com/group/osint/join (Yahoo! ID required) <*> To change settings via email: [email protected] [email protected] <*> To unsubscribe from this group, send an email to: [email protected] <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/
