Santa Fe New Mexican

Feds release guideline on handling cyberhacks

- By Ellen Nakashima

NEW YORK — President Barack Obama approved a new directive Tuesday that spells out for the first time in writing how the government handles significan­t cyberincid­ents.

The directive lets the public know which agency handles what, answering an oft-heard question after a breach: Who do I call for help?

The administra­tion also for the first time revealed how it grades the severity of an event — and how it determines what is significan­t.

The directive comes as the administra­tion is grappling with its latest major cyberincid­ent — the Russian hack of the Democratic National Committee’s computers and the suspected release by the Russians of the embarrassi­ng DNC emails that appeared Friday on the anti-secrecy site WikiLeaks, days before the Democratic National Convention was to begin in Philadelph­ia.

This incident will certainly test the new directive, as officials are still weighing how severe the breach is. To be considered significan­t, an incident must be likely to result in at least a “demonstrab­le impact” to public health or safety, national security, economic security, foreign relations, civil liberties or public confidence.

The implicatio­ns of the hack are still unfolding. Democratic officials have accused Moscow of trying to influence the outcome of the U.S. election.

Such an operation would represent a novel threat for Washington. But White House officials have noted the evolving challenge of cyberthrea­ts, be they from foreign government­s, hacktivist­s, criminals or terrorists.

“We are in the midst of a revolution of the cyberthrea­t — one that is growing more persistent, more diverse, more frequent and more dangerous every day,” said Lisa Monaco, Obama’s adviser for homeland security.

Monaco will also say that the scale of the government’s response will be based on an assessment of the risks posed by an incident. “How might it affect our national security or economy? Does it threaten the life or liberties of American people?”

The directive has been in the works for at least two years, but reflects the experience of almost eight years of dealing with increasing­ly complex and challengin­g cyberincid­ents. The last four have been particular­ly trying.

Last year, officials discovered that the Chinese had breached computers at the Office of Personnel Management, exposing the data of 22 million current and former federal employees and their families. The year before that, North Korean hackers disrupted the network of Sony Pictures Entertainm­ent, deleting files and disabling computers, uploading unreleased films to the Internet and leaking embarrassi­ng emails. It was all an apparent effort to dissuade the studio from releasing a satirical film depicting the assassinat­ion of the country’s supreme leader, Kim Jong Un.

These two incidents certainly would be considered significan­t, though the Office of Personnel Management “moved up the scale” when, as a result of the breach, it became difficult to process employees’ security clearances, said a senior administra­tion official, who spoke on the condition of anonymity.

The White House has come up with a severity scheme ranging from Level 0 for an inconseque­ntial event to Level 5 for an emergency — or an attack that poses an “imminent threat” to critical systems such as the power grid, federal government stability or people’s lives. Level 2 is reserved for an incident that may affect public safety or national security. Level 3 moves into the realm of significan­t, for high severity events that are likely to have a “demonstrab­le” impact on public safety or national security.

There has been no known incident that would be considered a 5, senior officials said. The suspected Russian cyberattac­k on Ukraine’s electric grid in December that caused widespread power outages probably would have been a Level 4 — a “severe” event that likely would result in “significan­t” harm to public safety or national security — if it had happened in the United States, the official said.

An example of an incident that was high profile but probably would not have risen to significan­t was the 2013 breach of Target, which affected the debit and credit card data of 40 million customers, officials said.

“If you’re the Target CEO, that was probably very high on your scale,” the senior official said. “But from a national security perspectiv­e, we did not need to spin up a huge amount of government machinery to handle that incident.”

The directive does not discuss how the government should respond to a significan­t event — whether it should impose sanctions, pursue indictment­s or even just publicly blame another country, for instance. Each case is factspecif­ic and responses depend on a range of factors, including geopolitic­s. But having the scheme helps officials “calibrate” whether they are giving an incident due attention, the official said.

For businesses, government agencies and other government­s that are often unsure of whom to call in a cyber incident, the White House also has simplified the organizati­on chart. The FBI is the lead federal agency for investigat­ing criminal and national security hacks. The Department of Homeland Security has the baton in helping breached organizati­ons reduce the impact of an event and prevent its spread. The Cyber Threat Intelligen­ce Integratio­n Center, or CTIIC, pools intelligen­ce to help identify who directed an intrusion or attack.

The Defense Department is not mentioned in the presidenti­al policy directive as it does not play a primary role in domestic cybersecur­ity.

Newspapers in English

Newspapers from United States