recommended reading

DHS official: Cyber attacks against infrastructure on the rise

The U.S. government is seeing a rise in cyber attacks aimed at taking over control systems that operate critical infrastructure, such as industrial facilities and pipelines, a senior Homeland Security Department official said Tuesday.

"It's certainly a trend," Greg Schaffer, assistant secretary for the DHS Office of Cybersecurity and Communications, told reporters.

Schaffer said the government is tracking more and more cyber attacks that have a greater level of sophistication and are tailored to target specific types of industrial infrastructure, such as power grids.

"These are the kinds of things that do give us pause," he said during an event hosted by the Defense Writers Group.

"It is widely recognized that the cyber ecosystem we have today favors the offense and not the defense," Schaffer added. "It is simply too hard to secure the systems."

The so-called Stuxnet worm, which affects Windows-operating systems responsible for running supervisory control and data acquisition systems, is one such example, he said.

There is no indication that the threat from Stuxnet has subsided, and the potential remains for some U.S. infrastructure to be attacked by it, he said.

But Schaffer declined to comment on the origin of the worm - a question that has stirred considerable speculation but no answers. He also dodged several other hot-button issues, including what the government is doing in response to the disclosure by WikiLeaks of confidential U.S. diplomatic cables.

U.S. officials suspect an Army intelligence analyst stole the documents using the Pentagon's Internet for secret information, commonly referred to as SIPRNet. Schaffer noted that the Pentagon is responsible for the protection of its networks.

But he added that defending information technology networks requires a balance between having protective measures but not impeding the ability of government workers to carry out their duties. "Security is an exercise in risk management," he said.

The Homeland Security Department and National Security Agency recently signed a memorandum of agreement to cooperate on cybersecurity efforts and share personnel.

"This structure is designed to put the full weight of our combined capabilities and expertise behind every action taken to protect our vital cyber networks, without altering the authorities or oversight of our separate but complementary missions," Homeland Security Secretary Janet Napolitano and Defense Secretary Robert Gates said in a joint statement on Oct. 13.

Schaffer described the agreement as solidifying a relationship in which DHS and NSA work together on daily issues.

He said there has not been a significant cyber event since the agreement was signed.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.