Jump to search Jump to main navigation Jump to main content Jump to footer navigation

Global Security Newswire

Daily News on Nuclear, Biological & Chemical Weapons, Terrorism and Related Issues

Produced by
NationalJournal logo

IG: Government Has No Digital Cyber Warning System

By Aliya Sternstein


The departments of Homeland Security and Defense, including the National Security Agency, have no way of sharing current alerts about computer breaches with each other or industry, an inspector general memorandum reveals.

The problem is not an inability to document incidents, but, rather, an inability to alert potential victims as the situation unfolds and to provide instructions.

There is one system for circulating event reports, a separate one for circulating directions on how to respond, and no real-time system for joining the two, according to an Oct. 24 DHS IG report released this week. 

The missing technology should be housed at the 24-hour National Cybersecurity and Communications Integration Center, a DHS organization that distributes information among civilian agencies, the intelligence community, Defense components and critical infrastructure sectors, such as the power industry. 

The report suggests the chasm between NCCIC and various agency operations centers might open the door to incoming threats, such as malicious code targeting military systems or oil and gas companies.

"According to the NCCIC director, there is no national system or common cyber tool currently in place for the federal cyber centers to share information," the report found. 

Officials at NCCIC, pronounced "N-kick," acknowledged that a common cyber system could allow the separate centers to exchange "actionable information," electronically and on a real time basis, with key industries to minimize damage. 

Right now, NCCIC has a ticketing system that documents incident details, such as the time of the abnormal event, date it was reported, and phone conversations about the situation. 

Meanwhile, NCCIC and the FBI have a system that disseminates bulletins to companies and agencies with instructions on preventing destructive attacks and protecting sensitive data.

But the two systems are not connected. 

"This ticketing system does not link situational awareness products (i.e., alerts and bulletins) that have been issued and are associated with a specific cyber incident, threat or vulnerability," the memo states. 

Another disconnect: "Federal cyber operations centers often share their information with one another. However, no single entity combines all information available from these centers and other sources to provide a continuously updated, comprehensive picture of cyber threat and network status to provide indications and warning of imminent incidents, and to support a coordinated incident response."

NCCIC does not possess the technology necessary to broadcast ongoing updates and avoid duplicate communications, the inspector general reported.

As remedies, IG officials suggested a knowledge management database, automatic calling trees and a communications-tracking system.

These technologies will require additional funding, Homeland Security officials told inspectors. Officials plan to improve existing information sharing tools and bring new capabilities online during the next four years, they said.

"Technologies and processes to improve discoverability and availability of data between and among the cyber operations centers serve as a foundation to the information sharing capability sets. These capabilities, coupled with automated machine-to-machine data transfer, will greatly improve the ability to link data sets and improve situational awareness," Suzanne Spaulding, acting undersecretary of the DHS National Protection and Programs Directorate, wrote in a Sept. 5 written response to a draft report.

Reprinted with permission from Nextgov.com. The original story can be found here.

Note to our Readers

GSN ceased publication on July 31, 2014. Its articles and daily issues will remain archived and available on NTI’s website.

NTI Analysis

  • Sub-Saharan Africa 1540 Reporting

    Oct. 20, 2015

    The UNSCR 1540 implementation process in sub-Saharan Africa has been slow. As of October 2011, 26 of the 48 states in the region have submitted 1540 national reports.

  • Latin America and the Caribbean 1540 Reporting

    Oct. 16, 2015

    This report is part of a collection examining implementation of United Nations Security Council Resolution 1540, which requires all states to implement measures aimed at preventing non-state actors from acquiring NBC weapons, related materials, and their means of delivery. It details implementation efforts in Central America, South America and the Caribbean to-date.