Hacker Attackers

It seems hardly a day goes by in Washington without a conference or seminar on the subject of cybersecurity and what government is doing about it. Likewise, there’s a seemingly endless stream of news headlines, which, taken together, paint a rather ominous picture.
In the space of a couple of weeks in September, Nextgov, the technology-focused online publication of Government Executive, ran the following stories online about federal efforts in the cyber arena:
■ Get Ready for Computers 
Worldwide to Automatically 
Smother Cyber Strikes 
■ Pact Sends Highly Sensitive Spy Agency Data to the Cloud
■ ‘Bring Your Own Device’ Security 
Monitoring Is Not the Norm
■ NATO Seeks Technology to Stem 
Leaks From Secret Afghanistan 
Network
■ Software Alert Claiming to Be 
From Cyber Command Aims to 
Steal Money
Besides being eye-opening and portentous, here’s what else those stories had in common: They all were written by Aliya Sternstein, who covers cyber issues day in and day out for Nextgov. In this edition of the magazine, we decided to give Aliya some room to explore in a broader way the key cyber issues that federal agencies face. She came up with the two pieces that frame the heart of the issue. 
In the first story, Aliya focuses on criminal hackers—the kind of people who are going way beyond mischief to attack networks on a large scale. Traditionally, FBI officials have been tight-lipped about how they deal with such cases, both because they always have to balance the public’s right to know with the interests of the justice system and because of the bureau’s own need to protect its sources of vital information about wrongdoing.
Now, though, the cyber threat is just too big to take that approach. So the FBI is coming out of the shadows and disclosing details about its investigations even before guilty verdicts have been reached. The bureau insists it has no grand plan to be more public in its approach, and notes that one reason it’s issuing more press releases about cyber cases is simply because there are more of them. 
Of course, deep down, the FBI’s leaders surely wish they didn’t have to go public with details of their investigations at all—not necessarily because they want to keep them secret, but because they’d rather the crimes didn’t occur in the first place.
Working toward achieving that goal is the subject of Aliya’s second story on the effort to stop cybercriminals before they start. This is becoming an acute issue for agencies and the organizations supporting them that are in the business of training young cyberwarriors in techniques that could be used for good and for ill. 
Many of the organized cyber efforts, such as the U.S. Cyber Challenge, enlist students to find flaws and vulnerabilities in systems, but they also conduct ethical discussions that show the legal ramifications of illicit cyber activity and encourage participants to use their talents to help secure federal systems. It’s a tricky process, because in many cases the best defenders of networks are those who know how to play offense pretty well, too. 
The stories that are the centerpiece of this issue provide a window into government’s increasingly critical efforts to at least keep pace with cyberattackers. But they are far from the last word on the cyber threat—which is why you can continue to read more about how federal agencies are handling it at Nextgov every day.
Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by Brocade

    Best of 2016 Federal Forum eBook

    Earlier this summer, Federal and tech industry leaders convened to talk security, machine learning, network modernization, DevOps, and much more at the 2016 Federal Forum. This eBook includes a useful summary highlighting the best content shared at the 2016 Federal Forum to help agencies modernize their network infrastructure.

    Download
  • Sponsored by CDW-G

    GBC Flash Poll Series: Merger & Acquisitions

    Download this GBC Flash Poll to learn more about federal perspectives on the impact of industry consolidation.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by Aquilent

    A DevOps Roadmap for the Federal Government

    This GBC Report discusses how DevOps is steadily gaining traction among some of government's leading IT developers and agencies.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download
  • Sponsored by CDW-G

    Joint Enterprise Licensing Agreements

    Read this eBook to learn how defense agencies can achieve savings and efficiencies with an Enterprise Software Agreement.

    Download
  • Sponsored by Cloudera

    Government Forum Content Library

    Get all the essential resources needed for effective technology strategies in the federal landscape.

    Download

When you download a report, your information may be shared with the underwriters of that document.