Feeds

Congressional study rejects Clinton's IT security Czar, FIDNET

GAO investigator slams intrusion detection

  • alert
  • submit to reddit

Mobile application security vulnerability report

The President's scheme to bolster US government computer security by appointing an information security Czar, and developing an automated monitoring system to expand intrusion detection known as FIDNET, is misguided, General Accounting Office (GAO) Government and Defence Information Systems Director Jack Brock told Congress last week. "The specific criticism we have of the President's plan is that it focuses so much on intrusion detection you begin to get the impression that it was the primary means they have of improving the federal government's computer security programme," Brock said in testimony before the Senate Governmental Affairs Committee. The GAO is an investigative body which reviews and audits the federal bureaucracy on behalf of Congress. It recently looked into computer and information security procedures in numerous government bureaus. The investigation revealed widespread security failures, most of which derive from poor management. One doesn't find an agency with good information management and bad security, just as one never sees an agency with poor management and good security, Brock observed. Allowing the Clinton Administration to address computer security as an individual element of federal information management would be a mistake, he insisted. Intrusion detection alone will do nothing to prevent data security being compromised in the first place. A far more holistic approach is needed, Brock believes. "One agency that we've gone to at [the Environmental Protection Agency] did a pretty good job of reporting and recording intrusions; but they did a very bad job of doing anything to prevent those intrusions, or analyzing those intrusions to take corrective action," Brock recalled. In spite of the GAO's wisdom, the President last week ordered a review of every federal agency to determine their vulnerability to cyber attack, which will be administered by White House Chief of Staff John Podesta. The prevention of distributed denial of service (DDoS) attacks "to make sure that federal computers cannot be used by outsiders to attack others" would be a priority, Clinton said. The Clinton Administration appears to be indulging federal law enforcement agencies which prefer an emphasis on intrusion detection and response, simply because it assures them an increasingly prominent role in national cyber security matters. Obviously, if intrusion prevention were to improve dramatically, the Department of Justice (DoJ), the FBI, and the National Infrastructure Protection Center (NIPC) would have less justification to muck about in cyberspace. This would result in some reduction of bargaining power to attract federal funds for cyber crime initiatives, to obtain expanded powers of surveillance on line, and to reduce opportunities for Netizens to surf the Web in complete anonymity, all of which are among the DoJ's highest priorities right now. The Register foresees little trouble for the DoJ in realising its ambitions, however. Having observed the pace of common-sense innovation among US government bureaus for several years now, we make it a safe bet that a significant erosion of on-line privacy and liberties will have taken place long before Uncle Sam stops making network intrusions a matter of child's play. ®

The Power of One Brief: Top reasons to choose HP BladeSystem

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Stick a 4K in them: Super high-res TVs are DONE
4,000 pixels is niche now... Don't say we didn't warn you
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
Philip K Dick 'Nazi alternate reality' story to be made into TV series
Amazon Studios, Ridley Scott firm to produce The Man in the High Castle
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.