CybersecurityDHS slowly moving government's Internet traffic to secure networks

Published 6 December 2010

It will take several more years for the U.S. government fully to install high-tech systems to block computer intrusions, a drawn-out timeline that enables criminals to become more adept at stealing sensitive data, experts say; DHS is responsible for securing government systems other than military sites, and the department is slowly moving all the government’s Internet and e-mail traffic into secure networks — known as Einstein 2 and Einstein 3 — which eventually will be guarded by intrusion detection and prevention programs

It will take several more years for the U.S. government fully to install high-tech systems to block computer intrusions, a drawn-out timeline that enables criminals to become more adept at stealing sensitive data, experts say.

As DHS moves methodically to pare down and secure the approximately 2,400 network connections used every day by millions of federal workers around the world, experts suggest that technology already may be passing them by.

AP reports that the department that is responsible for securing government systems other than military sites is slowly moving all the government’s Internet and e-mail traffic into secure networks that eventually will be guarded by intrusion detection and prevention programs. The networks are known as Einstein 2 and Einstein 3.

Progress has been slow, however. Officials are trying to complete complex contracts with network vendors, work out technology issues and address privacy concerns involving how the monitoring will affect employees and public citizens.

The WikiLeaks release of more than a quarter-million sensitive diplomatic documents underscores the massive challenge ahead, as DHS labors to build protections for all of the other, potentially more vulnerable U.S. agencies.

This is a continuing arms race and we’re still way behind,” said Stewart Baker, former DHS undersecretary for policy.

The WikiLeaks breach affected the government’s classified military network and was as much a personnel gap as a technological failure. Officials believe the sensitive documents were stolen from secure Pentagon computer networks by an Army intelligence analyst who downloaded them onto a CD.

The changes sought by DHS on the government’s nonmilitary computers would be wider and more systemic than the immediate improvements ordered recently by the Departments of Defense and State as a result of the WikiLeaks releases. Those changes included improving the monitoring of computer usage and making it harder to move material onto a portable computer flash drive or CD.

There are very few private sector actors who depend on information security who think that installing intrusion prevention systems is sufficient protection against the kinds of attacks that we’re seeing,” Baker said.

Navy Rear Adm. Michael Brown, DHS’s director for cybersecurity coordination, said that slightly more than half of the government’s 2,400 network connections are already protected by Einstein 2 - the automated system that monitors federal Internet and e-mail traffic for malicious activity.

Those, however, cover fewer than twenty of the 110 federal agencies.

Einstein 2 is installed and working at thirteen of the nineteen agencies that plan to police their own networks,