Department of Internet Defense

ASPEN, Colo. — “Cyber-security” is one of those hot topics that has launched a thousand seminars and strategy papers, without producing much in the way of policy. But that’s beginning to change, in one of 2011’s most important but least noted government moves.

This summer, with little public fanfare, the Obama administration rolled out a strategy for cyber-security that couples the spooky technical wizardry of the National Security Agency with the friendly, cops-and-firefighters ethos of the Department of Homeland Security. This partnership may be the smartest aspect of the policy, which has so far avoided the controversies that usually attach themselves like viruses to anything involving government and the Internet.

The new initiative was explained at a conference here last week sponsored by the Aspen Strategy Group, a forum that has been meeting each summer for the past 30 years to discuss defense issues. Among the participants were the two people who helped frame the plan, William Lynn and Jane Holl Lute, the deputy secretaries of defense and homeland security, respectively.

What’s driving the policy is a growing recognition that the Internet is under attack — right now, every day — by foreign intelligence agencies and malicious hackers alike. Experts cite some frightening examples: A May 2011 attack on Citigroup, in which hackers stole credit-card information on 360,000 clients; a still-mysterious October 2010 assault on the Nasdaq stock exchange; a 2009 breach of the U.S. electrical grid by Russian and Chinese intruders; and a 2009 heist of plans for the F-35 joint strike fighter.

And that’s just what’s public. McAfee, the computer-security firm, registers 60,000 new bits of malicious software every day. But classified estimates are said to be much scarier — with a hundred attacks for every one that’s publicly disclosed. It’s good to be skeptical about such unspecified threats — when officials warn direly, “If only you knew what we know” — but in this case, the danger is obviously real. The question is what to do about it.

The heart of the new cyber-defense strategy is to spread the use of secret tools developed by NSA. For example, the spy agency devised a system known as Tutelage to defend against malicious intrusions of military networks; a DHS version called Einstein 3 is now being used to protect civilian agencies. These systems are known as “active defense” because they use sensors and other techniques to block malicious code before it can affect operations.

This summer’s big innovation was using the government’s expertise to begin shielding the nation’s critical private infrastructure. In late May, the Pentagon and Homeland Security launched what they called the DIB Cyber Pilot (that’s short for “defense industrial base”). To protect about 20 defense companies that volunteered for the experiment, Homeland Security worked with four major Internet service providers, or ISPs, to help them clean malicious software from the Internet feed going to the contractors.

What made this recipe powerful was that the NSA provided what officials like to call its “special sauce,” in the form of electronic signatures of malicious software, which the NSA gathers 24/7 through its intelligence network.

The experiment has been running for 90 days now, and officials say it’s working. The ISPs have blocked hundreds of attempted intrusions before they could get to the defense companies. The lesson for Lynn: “It’s possible for the government to share threat information with private industry,” under existing laws.

The National Security Council soon will be debating whether to extend this pilot program to other sectors of critical infrastructure. Obvious candidates are the big financial institutions supervised by the Treasury Department, and the national laboratories and nuclear-energy facilities overseen by the Energy Department. Two questions down the road are whether to set regulatory standards that mandate all ISPs to provide a clean Internet pipe to key users, and how to extend protection to the huge and nakedly vulnerable world of the dot-coms.

Here’s what I took from five days of discussion: The Internet was deliberately built with an open architecture, which was its greatest strength but is now a vulnerability. Regulatory norms may be useful (just like fire codes and clean-water standards). But real security will come when it’s a moneymaker for private companies who want to satisfy public demand for an Internet that isn’t crawling with bugs.

The NSA can help by sharing its secret tools. But it needs a civilian interface, in Homeland Security, to reassure the public that this is about security, not spying.

David Ignatius is a Washington Post columnist. His email address is davidignatius@washpost.com.

Talk to us

> Give us your news tips.

> Send us a letter to the editor.

> More Herald contact information.

More in Opinion

toon
Editorial cartoons for Friday, Jan. 23

A sketchy look at the news of the day.… Continue reading

People sit on benches in the main hallway of Explorer Middle School’s new athletics building on Oct. 7, 2025 in Everett, Washington. (Olivia Vanni / The Herald)
Editorial: Voters should approve Mukilteo schools levy, bond

The levy provides about 14% of the district’s budget. The bond funds improvements districtwide.

Schwab: It isn’t GOP cowardice but approval that emboldens Trump

In message and manner, an ICE-like cruelty is on proud display. And about last week’s column: “Pysch!”

Everett Schools levy, bond are investments that will pay off

My support for strong public schools is personal, professional and pragmatic. As… Continue reading

Why won’t Republicans stand up to Trump?

Recently: Donald Trump claimed the title of “Acting President of Venezuela.” The… Continue reading

Douthat: What’s left that can restrain Trump’s fevered ambitions?

In his first term, his Cabinet and advisers were the guardrails. Now the checks are less certain.

Stephens: Trump brings spirit of fear — not dialogue — to Davos

A century-old novel set in the Swiss city encapsulates the world mindsets competing for Europe’s future.

toon
Editorial cartoons for Thursday, Jan. 22

A sketchy look at thenews of the day.… Continue reading

The ‘president’ is not a well man

How pathetic! How large must the hole be in one’s soul in… Continue reading

Bouie: What Trump’s text to Norwegian leader revealed to world

The product of a disordered mind, the text shows the wounded ego of an unpredictable, unrestrained leader.

Vote for Lake Stevens’, other school districts’ levy requests

Between now and Tuesday, Feb. 10, residents across the county will have… Continue reading

Comment: Climate crisis is levying stealth taxes on heat, smoke

The U.S. has lost more than $200 billion in gross national income since 2000. And the ‘tax’ rises with the heat.

Support local journalism

If you value local news, make a gift now to support the trusted journalism you get in The Daily Herald. Donations processed in this system are not tax deductible.