recommended reading

DHS Secretary OKs Bill to Monitor Federal Networks

Homeland Security Secretary Jeh Johnson speaks in Washington, Monday, March 16, 2015, during a ceremony to sign a preclearance agreement as part of the Beyond the Border Initiative. (AP Photo/ Evan Vucci)

Homeland Security Secretary Jeh Johnson speaks in Washington, Monday, March 16, 2015, during a ceremony to sign a preclearance agreement as part of the Beyond the Border Initiative. (AP Photo/ Evan Vucci)

An Obama administration top official has endorsed bipartisan legislation that would allow the Department of Homeland Security to surveil public Internet traffic on government networks.

The Senate Homeland Security and Governmental Affairs Committee approved the measure Wednesday, on the heels of devastating agency hacks. It now heads to the full floor for a vote.

"I urge the Senate to move quickly and pass this bill," DHS Secretary Jeh Johnson said in a statement Thursday night. The legislation would tighten security "by ensuring agencies understand they are legally permitted to disclose network traffic to DHS for narrowly tailored purposes."

The Federal Cybersecurity Enhancement Act of 2015 was conceived to stifle intrusions before hackers compromise agency operations or valuable information. The Office of Personnel Management lacked an intrusion detection system, as well as other agency-level real-time controls and login locks, which could have caught attackers before they ran off with 21.5 million people's information. The panel's proposal would mandate all those missing safeguards. 

"This bill will strengthen our cyber defenses by requiring all federal agencies to implement stronger protections and state-of-the-art technologies to defend against cyberattacks," Johnson continued. 

Within a year, DHS would have to roll out the intruder-blocking technology, dubbed EINSTEIN, per the legislation.

The measure "would accelerate deployment of a federal intrusion detection and prevention system across the federal government, increasing our visibility as a government into adversary activity," he said. 

EINSTEIN scans bulk traffic for the tell-tale signs of specific attacks -- sometimes called "signatures" or "indicators." Because it also collects innocuous data, such as personal correspondences and Web-surfing habits, the tool has raised questions about the possibility of government surveillance.

The Senate committee's bill requires multiple privacy protections to address such concerns, including reports on instances where personal information unrelated to a threat is captured.

In April, before the OPM attacks were made public, DHS Cybersecurity and Communications Assistant Secretary Andy Ozment told congressional purse-string holders that agencies have resisted EINSTEIN scans in the past. 

"Some agencies, in some cases, have questioned how deployment of EINSTEIN under DHS authority interplays with their existing statutory restrictions on the use and disclosure of agency data,” he said. “As a result of this uncertainty, DHS has not been able to achieve 100 percent commitment from agencies to enter into authorizing the deployment of EINSTEIN capabilities to protect their systems." 

Johnson said the legislation's civil liberties protections align with the department's existing privacy controls. 

The House already green-lighted similar legislation tucked inside the Cybersecurity Information Sharing Act, CISA, a lightning rod of a bill that would share threat indicators -- including, sometimes, personal data – between government and industry. Senate aides have said the committee's new bill could reach the floor as an add-on to the Senate version of CISA. 

Rep. Mike McCaul, R-Texas, chairman of the homeland security committee, on Wednesday introduced separate legislation, the 2015 Cyber Defense of Federal Networks Act, which also is comparable to the Senate committee's bill.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.