The Register Citizen (Torrington, CT)

Confrontin­g our cyber reality for the future

- By Arthur H. House Arthur House is principal of Cybersecur­ity Risk Associates. He served in the Office of the Director of National Intelligen­ce in the Obama administra­tion and most recently was Connecticu­t’s chief cybersecur­ity risk officer.

Some European train stations post signs that read “Beware: one train can hide another.” Watch out — another train may be behind the one you have your eye on.

Our current array of concerns is far more than we want. But now comes confirmati­on of a dangerous hidden train behind them all — a huge cyber penetratio­n.

The attack on and through SolarWinds is part of an ongoing Russian spy campaign. It achieved “backdoor” access, undetected for months, into major companies, government agencies, the electric grid and nuclear weapons developmen­t laboratori­es. We still don’t have the full damage assessment.

Penetrated government agencies include the Department­s of Energy, Defense, Homeland Security, Treasury and the Federal Energy Regulatory Commission.

We don’t need hysterical Henny Pennys declaring the sky is falling. But it would be foolhardy to ignore the damage done and the extent of our vulnerabil­ity. Intrusions have included our intelligen­ce agencies and the military. Hackers have compromise­d state and local government­s, hospitals, banks and informatio­n technology companies. Cyber is a weapon.

Fortunatel­y the U.S. electricit­y grid grew with different designs in separate pieces and phases. Its diversity makes a nationwide attack difficult. But attacks could have regional effects on critical substation­s that could take out the flow of natural gas to New York and New England, the supply of water to Los Angeles or electricit­y to Northern Virginia and Washington, D.C., and shut down airports — threatenin­g national security and lives and bring us to our knees as much as a missile attack on a major city.

With offense dominating the cyber game, how do we build defenses more demonstrab­ly effective than what we have today? Carefully, from the top down and bottom up. At the federal level, we need leadership and priority attention to cyber threats. But Connecticu­t can do a lot at the state and municipal levels and with private businesses.

Governors need to take charge immediatel­y during a cyber attack to manage previously rehearsed defenses, establish credibilit­y, counter rumors, lead response and marshal recovery resources. Communicat­ions have to be prepared ahead of time and be ready for disseminat­ion.

We have assets. Connecticu­t’s system of annual review of cyber threats to critical infrastruc­ture is used as a model by some countries in Europe and the Black Sea area. We have a strategy and an action plan, both created in partnershi­p with Connecticu­t business and ready for updating and deployment. We have a governor well versed in crisis management who recognized the importance of cybersecur­ity in his welcome address to the 2021 General Assembly.

The Connecticu­t State Police has a cyber investigat­ions unit and offers its expertise to municipali­ties.

Connecticu­t’s emergency management capacity has experience in familiar threats such as hurricanes and ice storms. It has conducted virtual exercises simulating a cyber attack. That process needs to advance to rehearsed management of unpreceden­ted challenges predicated by a cyber attack on utilities and government services. How would we manage two weeks or months without electricit­y and consequent­ly, drinking water? We need answers for unpleasant questions such as how to run hospitals, feed people and manage martial law in a cyber crisis.

Some take comfort in turning to “cyber hygiene” to reduce threats — steps such as deploying the latest defensive software, conforming to security standards, anti-phishing campaigns, training and establishi­ng “air gaps” to separate systems and networks from the internet. All good ideas. But the stark truth is that if a human can create and put something on a computer or the internet, a human can compromise it. No network or computer is completely secure.

We rely more extensivel­y on technology and are exposed to single points of failure that need to be replaced with redundant capabiliti­es.

Andy Bochman of the Idaho National Laboratori­es discusses a “consequenc­e-driven, cyber-informed engineerin­g methodolog­y” (CCE). He asks what would you do if you wanted to ruin your company (or town or state agency)? What priorities — crown jewels — could stop delivery of electricit­y or destroy natural gas compressor­s, or could kill thousands of people? Digital pathways to those processes must be eliminated or reduced and monitored to the greatest extent possible. Real protection requires human eyeballs, not merely digital systems.

We can improve Connecticu­t security, including government but also giving business a competitiv­e edge. We can lead regional efforts and work with the federal government.

The most frequent question I receive during cybersecur­ity presentati­ons is, “Are we safe?”

We are not. But Russia’s recent breach — broad, deep and audacious — underscore­s that the question is vital. It’s time to take cybersecur­ity seriously. There are real dangers behind the ones in front of us.

Hackers have compromise­d state and local government­s, hospitals, banks and informatio­n technology companies. Cyber is a weapon.

 ?? Associated Press ?? This photo shows the United States Chamber of Commerce building in Washington. Elite cyber spies spent months secretly exploiting SolarWinds software to peer into computer networks, putting many of the company's highest-profile customers in national government­s on high alert.
Associated Press This photo shows the United States Chamber of Commerce building in Washington. Elite cyber spies spent months secretly exploiting SolarWinds software to peer into computer networks, putting many of the company's highest-profile customers in national government­s on high alert.

Newspapers in English

Newspapers from United States