Security takes a pragmatic turn

 

Connecting state and local government leaders

Technology for homeland security will be as progressive as biometric identification, data mining and pattern matching. It also will be as prosaic as making the nation's health databases talk to each other to pinpoint instances of bioterrorism.

Technology for homeland security will be as progressive as biometric identification, data mining and pattern matching. It also will be as prosaic as making the nation's health databases talk to each other to pinpoint instances of bioterrorism.Agencies are asking for technologies that weren't in demand before Sept. 11, said Jim Geiger, senior vice president for federal civilian agencies at KPMG Consulting Inc. of McLean, Va. But few of the concepts have been sorted out or funded.In the meantime, Geiger said, agencies have to decide how to better use what they already have.On the evening of Sept. 11, while fires still raged in New York and Washington, Attorney General John Ashcroft announced that the Web site of the Internet Fraud Complaint Center, at , had become the central point for submitting online tips about terrorist activity.'The next morning we were taken to our knees by the volume,' said Bruce J. Brotman, CIO of the National White Collar Crime Center. 'We didn't have the bandwidth to support it.'The center and the FBI set up the site at a Fairmont, W.Va., data center two years ago to receive complaints about financial crime. Since Sept. 11, it has received more than 150,000 tips and tens of millions of hits. Lacking a budget to beef up its infrastructure to handle the traffic, the center asked Akamai Technologies Inc. of Cambridge, Mass., for managed-content delivery.Akamai activated its EdgeSuite service Sept. 12, and the site has not been down since, Brotman said.The White House Web site began using EdgeSuite in July following Code Red worm attacks there. The FBI began using it on Sept. 11, and the Centers for Disease Control and Prevention followed suit after the anthrax attacks the next month.They are what Christopher S. Carlston, Akamai federal sales manager, called the 'Oh, crap!' customers'reacting to a sudden emergency.'Some agency sites saw traffic increases of 2,000 percent' in the wake of Sept. 11, Carlston said. Lacking money and time for capital improvement to their infrastructures, they worked to maximize the performance of existing technology.The emphasis on functionality characterizes post-Sept. 11 federal IT, several industry analysts said.'Before that, even with the burst of the dot-com bubble, the focus had been on pushing 'the next new thing,' ' said Laurie McCabe, vice president of Summit Strategies Inc. of Boston. 'Sept. 11 changed that for good. I think we are looking at a very pragmatic decision-making period.'To mitigate risk, agencies look for proven technologies with a minimum of up-front cost, McCabe said.Such challenges are nothing new in the federal government. 'History did not start on Sept. 11,' said Mike McConnell, former director of the National Security Agency and now a vice president at Booz, Allen & Hamilton Inc. of McLean, Va. Current IT history began with preparations for the year 2000 transition, he said.Crisis management had been a big part of the year 2000 effort, but 'when that came and went, people shelved their plans,' said Bob Fortna, vice president of government solutions for Avaya Inc. of Basking Ridge, N.J. 'People felt safe, and it wasn't until Sept. 11 that they realized crisis management had to remain part of their plans.'Nevertheless, agencies are better off than before, Fortna said, because the transition forced managers to develop more sustainable systems.One problem often cited since Sept. 11 is the inability of agencies to share information outside their tightly defined mission areas. Data integration ideas have been sprouting up rapidly.Tom Conaway, managing director for federal services at KPMG Consulting, cited Pennsylvania's statewide Justice Network as an example of pulling together existing systems. JNet links legacy databases with a combination of middleware and public-key security, he said.Another way of making sense of information is to combine databases in a single data warehouse, KPMG's Geiger said.'What's out there now is all the data you can possibly imagine,' Geiger said. Agencies need tools to make sense of it and turn it into action, he said.But the required data mining capabilities are far beyond the reach of today's applications. Agencies 'need something that doesn't exist right now,' said Lawrence E. Brandt, manager of the Digital Government Research Program at the National Science Foundation.The challenge in data mining is to convert unstructured data'audio, video and document image files that are not in row-and-column format'into structured data, said Jeff Babcock, vice president of public-sector marketing at SAS Institute Inc. of Cary, N.C.Still under development are technologies for transferring video files into binary formats and then searching for desired patterns based on mathematical algorithms, Babcock said. Once intelligence officials have the patterns in hand, they can start figuring out the significance.That's sort of the reverse of steganography, a method of hiding messages in other messages or image files. For example, two images can look the same on screen and contain the same amount of data, but one can hold a hidden message, Georgetown University security expert Dorothy E. Denning explained.Americans haven't yet seriously debated the degree of freedom they are willing to give up to improve homeland security, said Louis H. Ray, president and chief executive officer of Materials, Communications and Computers Inc., an IT engineering company in Alexandria, Va.Should the government require a national passport for domestic travel? Should immigration officials track the movements of aliens to make sure they leave the country on schedule? Both policies would require sophisticated IT systems to carry them out, Ray said.A national identity card or passport probably would have to be a smart card with some biometric data about its bearer, such as thumbprints or iris scans.Ray said it's possible to equip public places with cameras and other noninvasive tracking systems to identify suspected terrorists by their facial characteristics. But it would require good-quality facial scans loaded into systems with broadband access, massive processing power and many terabytes of storage, Ray said.Conaway said state attorneys general have been asking him how to improve communications tools for front-line public safety workers.Even before Sept. 11, public safety officials were calling for more rugged handheld computers that can withstand wear and tear at disaster scenes. Eventually, the devices will become rugged enough, Conaway said.Officials at Avaya, a communications company, are seeing increased interest in backup systems, wireless networks and multiple lines of communication for government.At Entrust Inc. of Dallas, questions about virtual private networks have increased greatly, chief technology officer Brian O'Higgins said.Proposals abound for applications to help first responders locate and communicate with each other at disaster scenes. Spurred by the twin disasters of Sept. 11 and a tornado on campus two weeks later, University of Maryland researchers demonstrated that an incident-response kit could be put together quickly from off-the-shelf handheld computers, wireless links and solar panels.Governments have not been shy about asking for homeland security help from the private sector. In early November, the Defense Department solicited ideas to combat terrorism, which were due Dec. 23.'I suspect you will be able to fill a room with the paper responses that DOD will get from across the country,' Geiger said before the deadline. 'Probably not a small room.'For example, KPMG Consulting submitted a proposal for a national version of Pennsylvania's JNet, Geiger said.When presidential cybersecurity adviser Richard Clarke proposed GovNet, a secure, air-gapped private federal network, 167 companies responded to the General Services Administration's request for information. GSA expects to recommend steps to the White House by February.As for cyberterrorism, experts are divided on the real risks from unlawful destruction or disruption of digital property.'You can take out large portions of the IP infrastructure very simply,' said David von Vistauxx, chief technical officer of Trelex Ltd. of Falls Church, Va. 'We have never seen a really concerted effort to do that.'Not even the widespread Melissa virus of 1999 was that concerted an effort, von Vistauxx said. Melissa was a noncontinuous attack, whereas an intensive attack using multiple tactics could take down large parts of networks for several days to a week, he said.Although Sept. 11 was a wake-up call, the security lesson will have to be continually taught and learned, said Larry Wolfe, CIO at the National Institute of Allergy and Infectious Diseases.'As terrible as Sept. 11 was, I don't think it's going to solve the security awareness problem for all time,' Wolfe said.

Technologies agencies are asking for:

  • Security for communications, information and people.

  • Seamless voice, video and data communications to support remote employees.

  • Hot-swappable backup systems at a separate location in case of disaster.

  • Multiple customer support centers.

  • Emergency communication including voice messaging during disasters.

  • Video and audioconferencing as an alternative to travel.

  • Year 2000 transition-type planning made an ongoing part of the business process.

  • One-number access, so key individuals can be reached at a single number regardless of their location.

  • On-site technicians and remote diagnostics to monitor and maintain networks.

    Source: Avaya Inc.

  • IT priorities after Sept. 11: security, detection, recovery

  • National Infrastructure Simulation and Analysis Center's research on interdependency of networks.

  • Cyber Warning Information Network early warning system.

  • Priority Wireless Service, similar to priority services for landline telecommunications during emergencies.

  • GovNet secure government intranet.

  • Ability to share classified information between agencies, with state and local government and with the private sector.

  • Web portals for crisis response and disaster recovery.

  • Improved security on government systems.

    Source: Marjorie Gilbert, director of the President's Critical Infrastructure Protection Board







  • A hot site hotline

    www.ifccfbi.gov









    Putting out fires











    Y2K lessons





















    Invisible ink









    Biometrics demands













    Packed with paperwork

















    NEXT STORY: Voices: the impact of Sept. 11

    X
    This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
    Accept Cookies
    X
    Cookie Preferences Cookie List

    Do Not Sell My Personal Information

    When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

    Allow All Cookies

    Manage Consent Preferences

    Strictly Necessary Cookies - Always Active

    We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

    Sale of Personal Data, Targeting & Social Media Cookies

    Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

    If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

    Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

    Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

    If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

    Save Settings
    Cookie Preferences Cookie List

    Cookie List

    A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

    Strictly Necessary Cookies

    We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

    Functional Cookies

    We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

    Performance Cookies

    We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

    Sale of Personal Data

    We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

    Social Media Cookies

    We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

    Targeting Cookies

    We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.