Sponsor

2013/11/18

| 11.18.13 | Government adjusts to pace of cyber attacks

If you are unable to see the message below, click here to view.

November 18, 2013
Sign up for free:
Subscribe | Web | Mobile
Refer FierceHomelandSecurity to a Colleague

Today's Top Stories

  1. Government adjusts to pace of cyber attacks
  2. DHS financial management modernization on 'aggressive' schedule, says Fulgham
  3. Officials defending TSA behavior detection: Israel, Australia do it too
  4. Higher issuance of border crossing cards due to more travel, cyclical issuance period
  5. Government requests for Google user data keep rising


Also Noted: Innovative Solutions Consortium
Spotlight On... Bipartisan bill would reform Border Patrol pay
Scores of tornados slam Midwest states; Zuckerberg-backed group makes new immigration push; and much more...


Timeline: The evolution of domestic terrorism

The FBI has summarized domestic terrorism as "Americans attacking Americans based on U.S.-based extremist ideologies." From eco-terrorism to al Qaeda sympathizers, the face of domestic terror has changed greatly in recent decades. The timeline begins in 1970, with members of the Weather Underground, including Bernadine Dohrn (shown at left), and a bomb plot gone awry. Go to the timeline...

More News From the FierceGovernment Network:
1. House Homeland Security Committee asks wrong department about healthcare.gov security
2. DoD finalizes unclassified information protection rule for contractors
3. Performance management pilot program not ready for governmentwide roll out, GAO says


This week's sponsor is SolarWinds®

Powerful & Affordable IT Management & Monitoring Solutions for Government
Network * Application & Server * Storage * Virtualization * Log & Security * Help Desk * Secure File Transfer

Learn more and get a free trial now



Sponsor: Accunet

FierceLive! Webinars

> Webinar: Federal security concerns and the cloud - Now Available On-Demand

Marketplace

> Whitepaper: Compliance Strategy for Microsoft SharePoint
> NEVER MISS AN IMPORTANT GOVERNMENT EVENT AGAIN!
> Whitepaper: Customer Experience for Service

* Post a classified ad: Click here.
* General ad info: Click here

Today's Top News

1. Government adjusts to pace of cyber attacks


The pace at which cyber attacks transpire has posed a challenge to efforts to combat them, top Obama administration officials said during a Senate hearing Nov. 14.

For cyber threats that demand a response from more than one agency, too much time spent coordinating can be a liability.

"When you're doing a La Cosa Nostra investigation, you can de-conflict by calling each other or setting up a meeting for next Wednesday," FBI Director James Comey said before the Senate Homeland Security and Governmental Affairs Committee. "When the threat is moving at 186,000 miles per second, as a photon does on the Internet, there's no time to make that phone call."

The National Cyber Investigative Joint Task Force, which includes representatives from 19 agencies, has helped speed up coordination, Comey said. "The advantage of this, the genius of this, is the FBI and a DHS person are sitting next to each other."

The bureau has also embedded its agents within police departments in the Netherlands, Ukraine, Romania, Estonia and elsewhere to improve coordination.

Acting Homeland Security Secretary Rand Beers, who also appeared at the hearing, said the pace of cyber attacks was a key reason for Congress to pass legislation to encourage the private sector to share information on cyber threats.

Companies can be slow to share information about intrusions or vulnerabilities out of concerns that doing so will create liabilities or damage their reputation.

Beers said legislation could create an environment where companies "are more willing to share that information instead of having a long conversation between lawyers."

For more:
- go to the hearing webpage (webcast and prepared testimonies available)

Related Articles:
DHS cybersecurity organizations lack resources for staffing, training
House Homeland Security approves two cybersecurity bills
House Intelligence chairman voices frustrations on CISPA

Read more about: cybersecurity, FBI
back to top


This week's sponsor is Accunet.

Building a Scalable Big Data Infrastructure

Download this complimentary whitepaper
about how the Accunet Solutions team architected a new infrastructure for the National Cancer Institute's Frederick National Laboratory.



2. DHS financial management modernization on 'aggressive' schedule, says Fulgham


A Homeland Security Department plan to complete an incremental, component-by-component modernization of financial management systems by fiscal 2018 is under a tight schedule, said Chip Fulgham, the department's acting chief financial officer.

"I'll be the first to admit that the schedule is aggressive," said Fulgham, while testifying Nov. 15 before the House Homeland Security subcommittee on oversight and management efficiency.

He said his greatest concern is funding for the effort. In the fiscal 2014 budget proposal, components collectively asked for nearly $30 million for financial system modernization, Fulgham said, adding that while appropriations committees have been supportive, uncertainty about fiscal 2014 funding casts doubt on whether DHS will receive the money.

The department adopted a decentralized approach toward financial system modernization following the May 2011 cancelation of an attempt to implement a centralized system, the second time that DHS found failure in a financial systems project, having previously canceled a predecessor effort in 2006.

The new approach is at the early planning stage, says the Government Accountability Office in a September report released publicly days before the hearing. DHS is following some project management best practices, auditors say, but are lacking in others--such as transition planning and in describing in detail how the component financial systems will operate in the future.

Financial reporting at DHS still requires substantial manual intervention, the GAO says in the report, and in the most recently completed audit, auditing firm KPMG found five material weaknesses.

Nonetheless the fiscal 2012 audit was the first in which DHS was able to obtain a qualified opinion on its financial statements, Fulgham noted. That year, "approximately 90 percent of DHS' $87.2 billion in assets and liabilities were auditable, which is an increase from 63 percent in 2009," he said.

Departmental officials hope to achieve an unqualified opinion on the fiscal 2013 financial statements, and are working toward a goal of achieving full assurance over the effectiveness of internal controls by fiscal 2016, he added.

Along the way, new weaknesses in internal controls could be uncovered, since the current lack of assurance over internal controls means that future audits could find previously unknown flaws, warned Asif Kahn, director of financial management and assurance at the GAO.

For more:
- go to the hearing webpage (prepared testimony and archived webcast available)
- download the GAO report, GAO-13-561 (.pdf)

Related Articles:
Configuration management still challenges Coast Guard financial systems management
FEMA first DHS component to undergo post-TASC financial modernization
OMB aims to cut complexity of financial systems

Read more about: House Homeland Security, GAO report
back to top



3. Officials defending TSA behavior detection: Israel, Australia do it too


In the wake of a report calling the Transportation Security Administration's behavior detection program unscientific, defenders of the program pointed to similar efforts in other countries as confirmation of its value.

"It is worth noting that a number of other governments...have developed and deployed behavior detection screening protocols. I have personally toured the facilities and received briefings on the use of behavior detection in Australia and Israel," said Daniel Gerstein, the acting head of the Homeland Security Department's Science and Technology Directorate. S&T has supported TSA's behavior detection program, called Screening of Passengers by Observation Techniques.

Canada, the United Kingdom, France and Switzerland also use behavior detection for airport screening, Gerstein said during a Nov. 14 hearing held by a House Homeland Security subcommittee.

Rep. Michael McCaul (R-Texas), chairman of the full committee, called himself "a fan" of behavior detection and also cited Israel's use the practice.

A recent report from the Government Accountability Office concluded that SPOT has no proven basis in science. Behavior detection techniques are, at best, little better than chance at actually detecting malicious intent, auditors found.

Other countries' use of behavior detection did not appear to persuade Stephen Lord, GAO's director for homeland security and justice issues. At the hearing, Lord said that one foreign country that uses behavior detection found it to be ineffective, though he could not name the country for security reasons.

As for Israel's behavior detection program, "there's as many dissimilarities as similarities in their system" in comparison to TSA's, Lord said. Israeli personnel are allowed to racially profile, for example.

Israel's air travel system is also much smaller in scale, with only one major international airport and far fewer passengers overall than in the United States. That allows airport security to interview every passenger.

If TSA tried to replicate that, "the entire system would come screeching to a halt," Lord said.

Lord also criticized TSA for deploying the SPOT program at the same time that it was evaluating its effectiveness. That evaluation is still ongoing today, even as the program has cost $900 million since it began in fiscal 2007.

"Typically, you validate a concept first, then deploy," he said. "TSA chose--which, they're free to choose--a strategy which I deem higher risk."

For more:
- go to the hearing webpage (webcast and prepared testimonies available)

Related Articles:
TSA behavior detection may be useless
TSA greeters in Boston draw Thompson's ire
Questions remain about reliability of behavioral detection techniques for airport security

Read more about: House Homeland Security, TSA
back to top



4. Higher issuance of border crossing cards due to more travel, cyclical issuance period


The State Department issued significantly more border crossing cards in the last few years due to the recovery of travel to U.S. that had dropped after the Sept. 11 attacks and a cyclical issuance period that recently ended, Edward Ramotowski State Department Deputy Assistant Secretary for Visa Services told the House Oversight and Government Reform Committee subcommittee on national security Nov. 14.

Border crossing cards are being issued at a rate of 300,000 more per year under President Obama than they were under President Bush, with the State Department issued 1.3 million border crossing cards in fiscal year 2013.

The cards, which remain valid for 10 years, allow Mexicans limited entry into the United States for visits to border areas for a set amount of time. Applicants for border crossing cards must demonstrate that they have ties to Mexico to compel them to return after a temporary stay in the United States, Ramotowski said at the hearing.

The demand for the border crossing cards tend to be cyclical, Ramotowski said, responding to questions by Rep. Jason Chaffetz (R-Utah) about the rise in cards issued under Obama.

"When you come to the end of a 10 year period, a larger group of applicants are renewing their cards," Ramotowski said.

Tourism has rebounded as well, which accounts for more border crossing cards being issued, he said.

"Travel demand to the United States has been increasing," Ramotowski said. "Demand dropped drastically after the 9/11 attacks, and it's now recovering."

Both Democrats and Republicans chided the Homeland Security Department for delaying release of statistics on overstay rates for border crossing card holders.

Woods said DHS will publish the 2012 overstay rates at the end of the year and that the 2013 statistics will follow or be published in conjunction with the 2012 report. Woods also said the delay in answers was due to a lengthy clearance process.

For more:
- go to the hearing page (webcast and prepared testimony available)

Related Articles:
DHS proposes deepening border zone in New Mexico
CBP approves unmanned pedestrian border crossing in Texas
Drug smugglers continued to have FAST border-crossing permits

Read more about: DHS, Mexico
back to top



5. Government requests for Google user data keep rising


American government requests for user data from Google rose 29 percent in the first half of this year compared to the second half of 2012.

Google's latest transparency report says that the federal and other U.S. governments requested data 10,918 times in the first half of 2013. That figure has increased for every six month reporting period since Google began releasing the statistics. In the second half of 2009, there were only 3,580 requests.

But the percentage of requests for which Google has produced data has declined just as consistently. The company first reported that figure for the second half of 2010, when it produced data for 94 percent of requests. In the first half of 2013, it was down to 83 percent.

Twitter has reported similar patterns, though its reports only date back to the first half of 2012, when it fully or partially fulfilled 75 percent of the 679 requests it received. The number of requests rose to 815 in the second half of 2012, then to 902 in the first half of 2013. The fulfillment rate dropped to 69 percent and then 67 percent in those periods.

Facebook has released one report on government data requests, covering the first half of 2013. It says the U.S. government requested data between 11,000 and 12,000 times, with Facebook providing data for 79 percent of requests.

According to a Harris Interactive survey of adults in the United States published Nov. 13, 64 percent say that individuals are responsible for their own privacy and security online.

Seventeen percent said Internet service providers were the most responsible, followed by 12 percent who chose social media services. Only 3 percent chose regulators.

For more:
- go to Google's transparency report for the United States

Related Articles:
Twitter reports rise in government requests for user information
United States leads Facebook data requests
Google, Microsoft pursue transparency lawsuit against government

Read more about: privacy, Facebook
back to top



Also Noted

This week's sponsor is ISC.


SPOTLIGHT ON... Bipartisan bill would reform Border Patrol pay

Members of the House and Senate from both parties introduced legislation Nov. 13 to reform the pay system for Border Patrol agents. The bills (S. 1691, H.R. 3463) would allow agents to be paid according to one of three schedules: 100 hours (including 20 hours of overtime) per two week pay period, 90 hours (10 hours of overtime), or 80 hours (no overtime).

In a press release, the bill's sponsors in the Senate, Jon Tester (D-Mont.) and John McCain (R-Ariz.), said the reform would provide a more stable and reliable pay system. The effort follows revelations of abuse of the overtime pay system at Customs and Border Protection.

> Scores of tornados slam Midwest states. Article (NYT)
> Data shows more wireless 911 calls arrived with no location information. Article (HS Today)
> Zuckerberg-backed group makes new immigration push. Article (CNN)
> Homeland Security must disclose 'Internet kill switch', court rules. Article (Naked Security)
> Israel holds al Qaeda suspect without charge. Article (Al Jazeera)

And Finally... Maven spacecraft launches to Mars. Article (NASA)


Webinars


* Post listing: Click here.
* General ad info: Click here.

> Webinar: Federal security concerns and the cloud - Now Available On-Demand

Watch this interactive FierceGovernmentIT webinar that explores the extent to which data security concerns act as a cloud computing adoption obstacle, the extent to which the can be mitigated, and the resulting impacts those mitigations may have on use cases and deployment. Watch Today.



Marketplace


* Post listing: Click here.
* General ad info: Click here.

> Whitepaper: Compliance Strategy for Microsoft SharePoint

This document is intended to aid IT administrators and other stakeholders responsible for managing Microsoft SharePoint deployments, in planning and implementing a comprehensive, reliable and efficient compliance strategy appropriate to their organizational needs. Download Whitepaper Now.

> NEVER MISS AN IMPORTANT GOVERNMENT EVENT AGAIN!

GovEvents.com is your one-stop-stop for all government- & military-related events worldwide. A membership-based complimentary service, GovEvents provides one location to find expos, seminars, training events & more. Join more than 25,000 of your colleagues & become a member of GovEvents today!

> Whitepaper: Customer Experience for Service

This Executive Brief explores the role of service and support in creating great customer experiences, the service goals market leaders use related to customer experience and the Oracle approach for empowering new service experiences. Download today!

No comments:

Post a Comment

Keep a civil tongue.

Label Cloud

Technology (1464) News (793) Military (646) Microsoft (542) Business (487) Software (394) Developer (382) Music (360) Books (357) Audio (316) Government (308) Security (300) Love (262) Apple (242) Storage (236) Dungeons and Dragons (228) Funny (209) Google (194) Cooking (187) Yahoo (186) Mobile (179) Adobe (177) Wishlist (159) AMD (155) Education (151) Drugs (145) Astrology (139) Local (137) Art (134) Investing (127) Shopping (124) Hardware (120) Movies (119) Sports (109) Neatorama (94) Blogger (93) Christian (67) Mozilla (61) Dictionary (59) Science (59) Entertainment (50) Jewelry (50) Pharmacy (50) Weather (48) Video Games (44) Television (36) VoIP (25) meta (23) Holidays (14)

Popular Posts