http://tinyurl.com/4y9aqco

 


May 24, 2011


Pentagon, Homeland Security Collaborate on Cybersecurity


By Lisa Daniel 
American Forces Press Service

WASHINGTON, May 23, 2011 - In line with an agreement between the department
secretaries last fall and a recently released White House proposal, the
Defense Department is sharing cybersecurity information, capabilities and
expertise with the Homeland Security Department, a Pentagon official said
today.

Robert J. Butler, deputy assistant secretary of defense for cyber policy,
was among four senior officials who testified before the Senate Committee on
Homeland Security and Governmental Affairs today about the Obama
administration's legislative proposal to protect the nation's computer
networks.

Under the plan, 

Homeland Security would lead the effort to protect Americans, the nation's
critical infrastructure and the federal government's computer networks. The
Defense Department would retain protections over its "dot-mil" domain, but
would work in close collaboration DHS and the departments of Justice and
Commerce to better safeguard cyberspace. 

"Just as our reliance on critical infrastructure has grown, so have the
threats," Butler told the committee, adding that the military is "critically
dependent" on the civilian power generation grid, telecommunications,
transportation and other sectors run on computer networks.

Cyber attacks have become so pervasive as to create "a real possibility of a
large-scale attack on any of our nation's critical infrastructure," Butler
said.

"The status quo [in cybersecurity] is no longer acceptable -- not when there
is so much at stake," he said. "We can, and we will, do better."

Committee members and government witnesses described cybersecurity as a Wild
West of uncoordinated efforts struggling to stay ahead of rapidly growing
and increasingly sophisticated threats to the nation's security and economy.
The administration's proposal -- requested by Congress members faced with
dozens of pieces of cybersecurity legislative proposals -- would give legal
authority to the appropriate agencies to better coordinate cybersecurity.

Some 2 billion people worldwide use the Internet, and an estimated $1
trillion is lost annually to cyber crimes, committee members said. Congress
and U.S. executive departments, they added, are the target of about 1.8
billion cyber attacks per month.

Protecting computer networks requires a "whole of government" approach,
Butler said, and the Defense and Homeland Security departments already are
doing that. Defense Secretary Robert M. Gates and Homeland Security
Secretary Janet Napolitano laid the foundation for the collaboration in
October with their agreement to share operational planning and technical
development, he said.

Since then, Butler said, the collaboration has grown into joint coordination
at U.S. Cyber Command and the National Security Agency at Fort Meade, Md.,
and the sharing of information, capabilities, and employees.

Philip Reitinger, undersecretary of homeland defense for national protection
and programs, said Homeland Security, Defense Department and National
Security Agency officials meet regularly and have weekly teleconferences to
coordinate cybersecurity.

"We each bring unique things to the table," he said. "DOD has unparalleled
technical expertise and cyber expertise. In DHS, we've built up our own
expertise, working broadly across agencies."

Homeland Security will stay "operationally synched" with the Defense
Department, and both departments and NSA will deploy cyber experts to work
at each others' sites, Reitinger said.

To ensure a steady supply of cyber experts in the future, Butler said, the
Defense Department supports various high school and college competitions
such as the CyberPatriot, which the Air Force Association began as an annual
competition in 2009, as well as coaching and mentoring programs in
cybersecurity.

"This is not only about today, it's also about tomorrow," he said.
"Secretary Gates has made this a big priority."

  

 Biographies: 
Robert J. Butler
<http://www.defense.gov/bios/biographydetail.aspx?biographyid=240> 

Related Sites: 
Special Report: Cybersecurity
<http://www.defense.gov/home/features/2010/0410_cybersec/> 

 



[Non-text portions of this message have been removed]



------------------------------------

--------------------------
Want to discuss this topic?  Head on over to our discussion list, 
[email protected].
--------------------------
Brooks Isoldi, editor
[email protected]

http://www.intellnet.org

  Post message: [email protected]
  Subscribe:    [email protected]
  Unsubscribe:  [email protected]


*** FAIR USE NOTICE. This message contains copyrighted material whose use has 
not been specifically authorized by the copyright owner. OSINT, as a part of 
The Intelligence Network, is making it available without profit to OSINT 
YahooGroups members who have expressed a prior interest in receiving the 
included information in their efforts to advance the understanding of 
intelligence and law enforcement organizations, their activities, methods, 
techniques, human rights, civil liberties, social justice and other 
intelligence related issues, for non-profit research and educational purposes 
only. We believe that this constitutes a 'fair use' of the copyrighted material 
as provided for in section 107 of the U.S. Copyright Law. If you wish to use 
this copyrighted material for purposes of your own that go beyond 'fair use,' 
you must obtain permission from the copyright owner.
For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtmlYahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/osint/

<*> Your email settings:
    Individual Email | Traditional

<*> To change settings online go to:
    http://groups.yahoo.com/group/osint/join
    (Yahoo! ID required)

<*> To change settings via email:
    [email protected] 
    [email protected]

<*> To unsubscribe from this group, send an email to:
    [email protected]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/

Reply via email to