Home / The Blog @ Homeland Security / Main Homeland Security Site

Leadership Journal

Thursday, June 18, 2009

A Focused Effort on Cybersecurity

Image of computer board.Yesterday I had the opportunity to speak at the World Affairs Council Global Education Dinner about our Department’s increasing focus on the issue of cybersecurity.

Of all the threats America faces, the integrity of our cyber infrastructure demands special attention. These are no longer emerging threats. They are with us now, and are happening every day. Over the past two years, for example, cyber crime has cost Americans more than $8 billion.

Any victim of identity theft understands the damage and permanent harm that this can cause to personal finances, credit, and reputation. Cyber threats also pose clear national security risks to major public and government networks and systems – from banking and energy to communications and transportation.

For this reason, President Obama has made cybersecurity the object of one of his first executive actions, declaring our nation’s cyber infrastructure as a strategic national asset and outlining a comprehensive plan for how our nation will prepare for and respond to cyber threats.

Our Department is playing a key role in this effort. For example, we are taking the lead in defending federal executive branch networks and systems – the “dot-gov” domain – as well as coordination with the private sector to protect the nation’s critical infrastructure and key resources.

What the Department is Doing

This is a top priority for us. Accordingly, I have centralized all of the Department’s cybersecurity functions under a new deputy undersecretary for the National Protection and Programs Directorate, Philip Reitinger. This individual will coordinate cyber security across the Department, including our U.S. Computer Emergency Readiness Team (US-CERT) and our National Cyber Security Center.

We’re also in the process of recruiting some of the best and brightest to lend their talents to our Department. We recently asked a well-known former computer hacker to join the Homeland Security Advisory Council to help us better understand the kind of threats that can come from hackers seeking to do harm.

Because cyber threats are not limited by international boundaries, we are also working with our overseas partners. For example, we are part of a coalition called the “International Watch and Warning Network” where 15 countries collaborate on policy issues, and response to cyber attacks.

Of course, the government can’t do this work alone. Everyone has a role to play in making cybersecurity a regular habit. For more information on that front, I encourage you to visit the U.S. CERT website to learn about how you can help.

By taking prudent, common-sense measures, we can reduce our individual and collective vulnerability to cyber threats and increase our resiliency as a nation. Because cybersecurity is not an end point, but rather an ongoing set of efforts, this will continue to be a major priority for our Department in the weeks and months ahead.

Janet Napolitano

Labels: ,

1 Comments:

  • • To ALL Respective members of DHS,FBI, USCIS, CBP, and ICE.

    I would respectfully like to submit my findings and thoughts with regards to the efforts to secure the Homeland. I am a research analyst for Bio-authentication, Enrollment, Authentication and Verification. I have become entrenched in legislature and CONOPS that pertain to the "Transformation Program"
    With the pandemic of identity theft it leaves ALL borders vulnerable to attacks, not to mention resulted in over 1 Trillion globally.
    So my first of four questions to answer are
    1.How do we secure the borders, when we don't know where and who the enemy is?
    2.What are the enemies doing within the borders?
    3.How are they using the economy to benefit in the black market trade and spend the USD with the vehicle being ID.THEFT.
    How do you get them out?


    Secure Boarder Initiative, WHTI, US-VISIT, NEXUS, FAST,REAL ID, SENTRI, IDENT and IAFIS have all in some part failed and now there is the USCIS backlog of over 1.5 million and counting are waiting for FBI background checks and various other naturalization and immigration manual paper based channels and biometric enrollment make the wait times ridiculous and unacceptable.

    A solution as the USCIS Ombudsman stated is to build a Remote Virtual Up-front processing IVR Kiosk system that is language independent and can enroll, authenticate and verify who someone is. If you apply the CONOPS of the Information sharing environment (ISE) to USCIS the KEY is unification of information into the Biometric Storage System and Global On-line Enrolment System. The greatest fault within the 2.0 Billion US-VISIT program is that the system does not have data mining built into the system and unfortunately DHS and CBP, FBI and ICE do not know if someone EXITED the US or if they are still lingering within the borders. The last question is;


    Under Section 326 of the Patriot Act
    (Verification of Identification) along with the IRTPA SEC. 7208. The solution was biometrics. The GOALS simply have not been met and they are as follows; .

    BIOMETRIC ENTRY AND EXIT DATA SYSTEM. ENTRY-EXIT SYSTEM GOALS. —The Department of Homeland Security shall operate the biometric entry and exit system so that it—
    (1) serves as a vital counterterrorism tool;
    (2) screens travelers efficiently and in a welcoming manner;
    (3) provides inspectors and related personnel with adequate real-time information;
    (4) ensures flexibility of training and security protocols to most effectively comply with security mandates;
    (5) integrates relevant databases and plans for database modifications to address volume increase and database usage; .
    (6) improves database search capacities by utilizing language algorithms to detect alternate names.


    We must all collaborate and solve this conundrum together so that we may locate the True Enemies and Terrorists and know their true name with their own ONEVOICE. If we can't touch or feel them, perhaps we can hear them better.

    Be well & live well, Zeliha Artan.

    By Anonymous Zeliha Artan, At June 24, 2009 12:54 PM  

Post a Comment

Thank you for leaving a comment at the Department of Homeland Security Leadership Journal. Comments submitted to the Department of Homeland Security Leadership Journal will be reviewed before posting.



Create a Link

<< Home