Home > Cybersecurity News > White House ‘Debating Vigorously’ When to Respond to Cyber Attacks

White House ‘Debating Vigorously’ When to Respond to Cyber Attacks

Tuesday, March 5, 2013 | 8:01 AM Leave a comment Go to comments

With cyber threats on U.S. networks continuing to rise, the White House is in talks to determine when a cyber incident warrants a federal response.

Taking retributive action against individual and nation-state-sponsored hackers comes with risk, advised White House Cybersecurity Coordinator Michael Daniel during a speech Thursday at the RSA Conference in San Francisco.

“It’s really a question that we’re still debating and debating vigorously,” said Daniel. “The risk of misattribution, miscalculation and escalation in cyberspace are very real. As a government, any action we take in cyberspace must be considered against possible foreign policy implications and our desire to establish international norms of acceptable behavior in cyberspace.”

“We don’t want to create a truly unstable new normal that would tell other countries that it’s okay to intervene on U.S. networks, something that advocates of hacking don’t often stop to think of,” he added.

Yet, while the White House continues to the debate the issue, the heads of key U.S. security agencies have already stepped up to chart out their own roles in securing the nation’s networks from attacks.

According to Federal Bureau of Investigation Director Robert Mueller, he recently participated in a series of meetings with Department of Homeland Security Secretary Janet Napolitano and National Security Agency Director Gen. Keith Alexander to clear up any “confusion” on the roles of the three agencies.

“The FBI’s role, operating domestically, is to anticipate, investigate, attribute and disrupt cyber intrusions affecting the United States,” explained Mueller in a keynote at the RSA Conference. “NSA’s role is to gather intelligence on foreign cyber threats and to protect national security systems. DHS’s role is to protect our critical infrastructure and our networks, to coordinate mitigation and recovery from major cyber intrusions, and to disseminate threat information across various sectors.”

“Our agencies operate under separate authorities and have different roles to play,” Mueller added. “Yet we also understand that we must work together on every substantial intrusion and share information among the three of us.”

Mueller went on to describe the private sector as an “essential partner” in securing U.S. networks and encouraged increased partnerships to boost cyber threat awareness and information sharing.

____

Following are some additional cyber headlines you may have missed:

FEDERAL NEWS:

NIST seeks cybersecurity guidance (FCW)

Congress vulnerable to cyber attacks (The Hill)

GAO: Government’s cyber efforts not enough (FCW)

White House will soon revive cybersecurity legislation push (Reuters)

Homeland Security launches cybersecurity education website (Examiner)

US officials say report of Chinese hacking proves need for cybersecurity bill (The Hill)

Rockefeller, lead Senate player on cyber, seeks to win over business (National Journal)

INDUSTRY OVERVIEW:

Microsoft victimized by cyber attack (Technorati)

BAE, Vodafone join in cybersecurity partnership (Defense News)

Mandiant’s cybersecurity reputation grows (San Francisco Chronicle)

Zendesk security breach affects Twitter, Tumblr and Pinterest (Wired)

Kaspersky Lab CEO: Obama cybersecurity order ‘step in right direction’ (Forbes)

Utilities race to protect electric grid before ‘disaster strikes’ (Wall Street Journal)

INTERNATIONAL  OUTLOOK:

UK, India sign cybersecurity pact (InformationWeek)

Next NATO meeting to focus on cybersecurity (Associated Press)

US ready to strike back against China cyber attacks (Associated Press)

Chinese army likely behind cyber attacks, U.S. security firm says (Los Angeles Times)

HACKING HIGHLIGHTS:

Video tracks a real Chinese hacker in action (Washington Post)

Hacker sends tweets from Burger King’s account (Associated Press)

Mac hacker attack reminds us why Steve Jobs hated Java (Fortune)

Hacker says security flaw let him access any Facebook profile (CNET)

CYBER INSIGHTS:

Op-Ed: Uniting for cyberdefense (New York Times)

Analysis: The near impossible battle against hackers everywhere (Reuters)

Former CIA director: Cyber attack game-changers comparable to Hiroshima (US News)

____

This report is also available on ClearanceJobs.com at: http://www.clearancejobs.com/defense-news/1157/cybersecurity-news-round-up-white-house

 

 

Advertisements
  1. Thursday, June 27, 2013 | 4:50 PM at 4:50 PM

    I truly love your site.. Excellent colors & theme.
    Did you make this amazing site yourself? Please reply back as I’m looking to create my own blog and would love to find out where you got this from or what the theme is named. Cheers!

  2. Thursday, June 4, 2015 | 1:22 AM at 1:22 AM

    If you are going for best contents like myself, only visit this web site
    daily as it offers quality contents, thanks

  1. Tuesday, February 3, 2015 | 4:01 PM at 4:01 PM
  2. Wednesday, March 4, 2015 | 3:44 AM at 3:44 AM

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: