CIA official warns Congress of cyberattack danger

Lawrence Gershwin, national intelligence officer at the CIA, said US companies face a range of threats posed by the growing use of foreign contractors, increased reliance on commercial software with known vulnerabilities in critical networks and sophisticated, state-sponsored cyberattack programs.

Defenders in government and business "will be at some disadvantage until more fundamental changes are made to computer and network architectures -- changes for which improved security has equal billing with increased functionality," said Gershwin before the Joint Economic Committee.

Gershwin's testimony broke no new ground in categorising the threats and risks that exist to US businesses. Intelligence and information security experts have echoed similar concerns for some time. But this hearing, organised by US Sen. Robert Bennett, was intended to underscore the need for legislative remedies.

Bennett soon plans to introduce legislation exempting cybersecurity data from Freedom of Information Act (FOIA) disclosure requirements. Private-sector trade groups argue that the FOIA exemption will allow companies to share data with government agencies without risk of public disclosure.

"There are significant real and perceived barriers to information sharing and vulnerability assessments," said Peggy Lipps, the security director at the Banking Industry Technology Secretariat (BITS) in Washington.

Duane Andrews, a former assistant secretary of defense during the previous Bush administration and an executive vice president at Science Applications International, pointedly told the committee that the US is losing ground in protecting its systems. "The rate of progress has been slower than the growth of the potential threat," he said, blaming that disparity on a "failure to act."

"For a decade, we have had study after study and report after report pointing out that our economy and national security É is at risk," said Andrews. But companies and government agencies aren't taking precautionary steps for a number of reasons, including the following:

- Policy makers don't understand the threats.

- Investments in cybersecurity measures interfere with business function.

- No oversight agency holds government and critical business functions accountable.

- The issue is treated as a tactical problem, not a strategic one.

The threats vary, Gershwin said. Terrorist groups pose only a limited cyberthreat because they believe that "bombs still work better than bytes." But that attitude is expected to change as younger, computer-savvy budding terrorists rise in organisational ranks, he said.

The use of subcontractors hired by foreign partners creates "virtual" insiders whose identity and nationality are often unknown to US firms, he said. "As part of an unprecedented churning of the global information technology workforce, US firms are drawing on pools of computer expertise that reside in a number of potential threat countries," Gershwin said.

Although hackers lack the "requisite tradecraft" to threaten critical networks, the large worldwide population of hackers "poses a relatively high threat of an isolated or brief disruption causing serious damage," he added.

The greatest threat comes from other governments. "For the next five to 10 years or so, only nation states appear to have the discipline, commitment and resources to fully develop capabilities to attack critical infrastructures," said Gershwin.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?