Former Director Of NSA And CIA Says US Cybersecurity Policy MIA

  /     /     /  
Publicated : 22/11/2024   Category : security


Former Director Of NSA And CIA Says US Cybersecurity Policy MIA


Gen. Michael Hayden says US government doesnt have the framework to handle attacks by nation-states, others against the power grid, data.



MIAMI, FL -- S4 2016 -- Gen. Michael Hayden called for private industry, not the US government, to take the lead in protecting data and the power grid from attacks by nation-states or terror groups.
People ask how come government isnt doing something about it … Government will be permanently late to the need in providing cybersecurity, said Hayden, who delivered the keynote address and later spoke with reporters here at the S4x16 ICS/SCADA conference.
Technology moves much faster than government and politics, he said. We have not decided what we would allow government to do to keep us safe. Weve not even laid the groundwork for defending against such attacks, he said.
We lack a legal policy framework, said Hayden, principal with The Chertoff Group and former director of the CIA and NSA.
As for the encryption debate, Hayden once again publicly said he disagrees with FBI director James Comeys stance on end-to-end encryption. Comey has been pushing the industry for a backdoor into encrypted devices as well as anti-encryption legislation so law enforcement isnt shut out of accessing bad guys encrypted communications.
If I were in Jim Comeys job, I would have Jim Comeys view. Its more a law enforcement problem than an intelligence problem, he said. Intel [agencies have] … the tools to mitigate and minimize impact of attackers using encryption, he said.
The long shadow of Stuxnet and concerns over a recent blackout in Ukraine that some experts have pinned on a cyberattack have raised concerns over just how vulnerable the US power grid or other critical infrastructure would be to such attacks by nation-states or terror groups.
Hayden says reconnaissance of a target takes the most time in such attacks. Youve got to know the target, he said.
In cyberspace … recon is more difficult and takes a long time, but given that attackers already have been spotted inside some US critical infrastructure networks, its only a matter of time before they cause damage, he said.
There wont be any digital Pearl Harbor via a nation-state, however, he said. If the Chinese are turning out the lights on the Eastern Seaboard, Im predicting thats not the first item the President is going to get briefed on. That is going to be a subset of a really ugly global scenario, Hayden said. Im not quite concerned about a catastrophic attack by a nation-state.
The bigger threat, he said, is the isolated renegade with nothing to lose if it shuts out lights in the US. Thats a permanent definition of North Korea, and in certain instances, a permanent definition of Iran, he said. Hayden said he could also imagine such a scenario out of Russia, were sanctions and other pressures on the government there overwhelmed.
Hacktivists in Iran and Syria, such as the Syrian Electronic Army, are increasingly hacking more in the service of their nation-states, he said.
Meantime, Hayden echoed his previous public comments that the National Security Agency (NSA) hacks only for intel-gathering, not commercial gain. He reiterated that the NSA is charged with and actively grabbing information via cyber espionage -- but all in the name of intelligence-gathering for defense of the nation. Do we steal economic information? Of course we do but not for commercial advantage, he said. He says if as NSA director he could have gained access to Chinas equivalent of the US Office of Personnel Management (OPM)s database, the NSA would have been on it like flies on honey.
The OPM breach was the failure of the feds to protect the data of so many millions of Americans, he said. This is not shame on China. This is shame on us.
The feds need to be more forthcoming when it comes to attacker attribution, though, he said.
Hayden also touched on the Sony attack, which was found to be the handiwork of North Korea. The guys at NSA were very confident they knew who did it. I think their degree of confidence suggests they were not doing forensics: they were behind the screen.
Hayden said his team at The Chertoff Group spoke with Sony about the attack. They stole and destroyed data, networks and it was damn close to physical harm. People at Sony were getting threats, I know, up to and including I know what high school your daughter goes to, he said.
He said the challenge of this particular breach was just how to characterize it, and US government officials indeed struggled with that. What do you call this? So you have a helluva time figuring out what to do with it if you cant figure out what to call it.
Digital Bond CEO Dale Peterson, whose firm hosts S4, urged attendees to commit to fixing ICS/SCADA security issues in the next one- to three years. Weve made some progress, and maybe some small areas where we made significant progress, Peterson said. But our lack of faith in solving this problem is almost a self-fulfilling prophecy.
Its the technology driving policy and political change, not the other way around, Chertoff Groups Hayden said.

Last News

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Former Director Of NSA And CIA Says US Cybersecurity Policy MIA