“Einstein 3 is designed to quarantine emails and block malicious Web domains that ‘spoof’ legitimate sites, according to CenturyLink. The service defends the perimeter of federal civilian networks. It senses aberrant activity using threat ‘signatures,’ or tell-tale signs of a hacker derived from U.S. intelligence and private research. These indicators can include certain email headers or IP addresses... DHS ultimately expects to deploy phase 3 across all federal agencies. The new system consists of commercial technologies and government-developed software.” – Sternstein, 2014
The FY 2016 budget request would set aside $587.5 million for DHS cyber operations, including the integration of EINSTEN across federal civilian agencies.
US Cyber Command is has met only half of its staffing requirements for its original goal of maintaining 6,000 personnel by 2016. A total of 780 personnel would be tasked with defending vital industries under the National Mission Teams, 2,700 would be responsible for defending military domain systems, and 1,620 will support combat operations (Sternstein, 2015). Despite its difficulty to fully meet its 6,000 personnel requirement, US Cyber Command has grown rapidly from deploying two cyber mission units to twenty five over the course of 2014. Lt. Gen. Edward Cardon, Commander of US Army Cyber Command, recently indicated the need for more integration between DoD agencies with Cyber Command, as well as for increased collaboration with the private sector (Golden, 2015). Both Executive Order 13691 and CTIIC will foster deeper cooperation between the federal government and the private sector with respect to cyber security issues.
On February 13th 2015, the President issued Executive Order 13691 with the intent of fostering information sharing through Information Sharing and Analysis Organizations (ISAOs) created by the DHS.
“…the development of information sharing organizations that may include industry-specific ISACs but also broaden further to create organizations that may share information in geographical regions or even in response to a particular threat. It also directs the U.S. Department of Homeland Security to work with participants to identify baseline standards and practices to guide information sharing.” – King, 2015
The Office of the Director of National Intelligence’s CTIIC was created with objective of promoting intelligence sharing and coordination between federal agencies on cyber security threats. Under the current system, the DHS, National Security Agency, and US Cyber Command have had somewhat conflicting roles with respect to defending against cyber-attacks (Sanger, 2015). CTIIC will receive a small initial budget of $35 million and is expected to be staffed by roughly 50 personnel from several federal agencies. Overall, the Obama Administration is undertaking a series of robust cyber security measures over the next two years which will significantly mitigate the damage of future cyber-attacks.
- US Cyber Command Has Just Half the Staff It Needs, Aliya Sternstein , 2015. http://www.defenseone.com/threats/2015/02/us-cyber-command-has-just-half-staff-it-needs/104847/?oref=d-channelriver
- Is Obama’s $14 Billion Cybersecurity Request Enough? , Aliya Sternstein , 2015. http://www.defenseone.com/technology/2015/02/obamas-14-billion-cybersecurity-request-enough/104421/?oref=d-channelriver
- What a New $35 Million Agency Is Expected To Do for US Cyber Defense, Dustin Volz, 2015.
- Obama Administration Plans to Open Center to Fight Cyberattacks, David E. Sanger, 2015.
- Cyber Teamwork Between Federal Agencies Still Too Hard, Says Army Cyber Commander, Hallie Golden, 2015.
- Obama asks for $14 billion to step up cybersecurity, Dara Kerr, 2015.
- Obama seeks $14 billion to boost U.S. cybersecurity defenses, Andrea Shalal and Alina Selyukh, 2015.
- President budgets $14 billion for cybersecurity, Aaron Boyd, 2015.
- FACT SHEET: Cyber Threat Intelligence Integration Center, Office of the Press Secretary, 2015. http://www.whitehouse.gov/the-press-office/2015/02/25/fact-sheet-cyber-threat-intelligence-integration-center
- Continuous Diagnostics and Mitigation (CDM), DHS, 2014.
- Obama Signs Info Sharing Executive Order, But Concerns Remain, Rachel King, 2015. http://blogs.wsj.com/cio/2015/02/13/obama-signs-info-sharing-executive-order-but-concerns-remain/
- Obama to sign executive order on cybersecurity info sharing, Jon Skillings, 2015. http://www.cnet.com/news/obama-to-sign-executive-order-on-cybersecurity-info-sharing/