Feeds

Securing cyberspace against war, terror and red tape

DHS's Greg Garcia in the hot seat

The Power of One Infographic

Is there anything that you were hoping you would have accomplished by now that has not happened?

I think this is an evolutionary process. My only regret is that this administration is coming to a close and that the national strategy that we need to pursue is one that's going to take years to really to mature to where it needs to be and as I'm a political I don't expect I'm going to be around much into the next administration. But I'm looking to our private sector partners and career civil servants across the government and in DHS to keep that going.

There is growing evidence that [China is] actively engaged not only in attacking infrastructure belonging to private companies but also infrastructure that belongs to the federal government. I believe that Oak Ridge [National] Labs is one possibility. Do you believe that there are attacks coming from China that are state sponsored?

There are attacks coming from everywhere as you know, and there are botnet attacks that you can see coming from a country but that doesn't mean that's where the actual attacker is seated and that botnet computer could be hijacked from a completely different country.

That said, there are some things we don't talk about in this forum about nation states or otherwise, but from a DHS perspective what we're particularly interested in is how do we protect our systems from those attacks no matter where they're coming from. Because yes, they could come from nation states, they could come from hacker groups, they could come from hacktivists with political motives, they could come from organized cyber crime groups from different countries. So my objective is to ensure we've got the protective systems in place and the technology in place and the coordinated response to attacks.

If DHS were to learn that a particular attack was state-sponsored by the Chinese government, you knew for certain, would it be considered an act of war and responded to accordingly?

That's a good question and we are now in a cyber age where our traditional thinking about acts of war are changed. This is something that we are thinking about across the federal government in terms of more strategic thinking about how to deal with that question, because it's a very complex one and it's one that engages numerous players from the State Department to the Defense Department to many others across the federal government. This is part of our national strategy how we deal with that question.

The Power of One Brief: Top reasons to choose HP BladeSystem

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
LightSquared backer sues FCC over spectrum shindy
Why, we might as well have been buying AIR
'Two-speed internet' storm turns FCC.gov into zero-speed website
Deadline for comments on net neutrality shake-up extended to Friday
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.