Government Agencies Have No Way of Warning Each Other About a Cyber Attack, IG Says

The Pentagon, Homeland Security and NSA have no way of sharing warnings of cyber attacks with each other or with industry, a DHS inspector general report finds. By Aliya Sternstein

The departments of Homeland Security and Defense, including the National Security Agency, have no way of sharing current alerts about computer breaches with each other or industry, an inspector general memorandum reveals.

The problem is not an inability to document incidents, but, rather, an inability to alert potential victims as the situation unfolds and to provide instructions.

There is one system for circulating event reports, a separate one for circulating directions on how to respond, and no real-time system for joining the two, according to an Oct. 24 DHS IG report released this week. 

The missing technology should be housed at the 24-hour National Cybersecurity and Communications Integration Center, a DHS organization that distributes information among civilian agencies, the intelligence community, Defense components and critical infrastructure sectors, such as the power industry. 

The report suggests the chasm between NCCIC and various agency operations centers might open the door to incoming threats, such as malicious code targeting military systems or oil and gas companies.

According to the NCCIC director, there is no national system or common cyber tool currently in place for the federal cyber centers to share information,” the report found. 

Officials at NCCIC, pronounced “N-kick,” acknowledged that a common cyber system could allow the separate centers to exchange “actionable information,” electronically and on a real time basis, with key industries to minimize damage. 

[Read More: When Would Cyber War Lead to Real War?]

Right now, NCCIC has a ticketing system that documents incident details, such as the time of the abnormal event, date it was reported, and phone conversations about the situation. 

Meanwhile, NCCIC and the FBI have a system that disseminates bulletins to companies and agencies with instructions on preventing destructive attacks and protecting sensitive data.

But the two systems are not connected. 

This ticketing system does not link situational awareness products (i.e., alerts and bulletins) that have been issued and are associated with a specific cyber incident, threat or vulnerability,” the memo states. 

Another disconnect: “Federal cyber operations centers often share their information with one another. However, no single entity combines all information available from these centers and other sources to provide a continuously updated, comprehensive picture of cyber threat and network status to provide indications and warning of imminent incidents, and to support a coordinated incident response.”

NCCIC does not possess the technology necessary to broadcast ongoing updates and avoid duplicate communications, the inspector general reported.

As remedies, IG officials suggested a knowledge management database, automatic calling trees and a communications-tracking system.

These technologies will require additional funding, Homeland Security officials told inspectors. Officials plan to improve existing information sharing tools and bring new capabilities online during the next four years, they said.

Technologies and processes to improve discoverability and availability of data between and among the cyber operations centers serve as a foundation to the information sharing capability sets. These capabilities, coupled with automated machine-to-machine data transfer, will greatly improve the ability to link data sets and improve situational awareness,” Suzanne Spaulding, acting undersecretary of the DHS National Protection and Programs Directorate, wrote in a Sept. 5 written response to a draft report. 

Close [ x ] More from DefenseOne

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • Military Readiness: Ensuring Readiness with Analytic Insight

    To determine military readiness, decision makers in defense organizations must develop an understanding of complex inter-relationships among readiness variables. For example, how will an anticipated change in a readiness input really impact readiness at the unit level and, equally important, how will it impact readiness outside of the unit? Learn how to form a more sophisticated and accurate understanding of readiness and make decisions in a timely and cost-effective manner.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.


When you download a report, your information may be shared with the underwriters of that document.