DHS plans to beef up cybersecurity

The Homeland Security Department has drafted a set of key scenarios for possible cyberattacks against the Internet and critical IT systems and is seeking comments from the private sector on how to best prepare and respond to such attacks, according to Andy Purdy, acting director of DHS' National Cyber Security Division.

DHS officials and the White House also are putting the finishing touches on a new national cybersecurity research and development plan, Purdy said earlier this week at a seminar on Capitol Hill. The event was sponsored by Nortel Networks Corp., a global telecommunications equipment manufacturer based in Brampton, Ontario.

'At DHS, we recognize the importance of cybersecurity risks and we are energized by that risk,' Purdy said.

Homeland Security secretary Michael Chertoff also is preparing to name an assistant secretary for cybersecurity and telecommunications, he said.

Purdy outlined several initiatives undertaken by his division to bolster cybersecurity and to prepare for a national cyberattack exercise known as Cyber Storm in November.

As part of their planning for disaster recovery for IT systems, DHS officials are looking at key dependency elements, such as maintaining adequate electrical power supplies, as critical parts of the recovery, Purdy said.

The department is working with advisers to prepare plans for maintaining Internet operation following a catastrophe, and also focusing on Internet-based control and process systems, which are IT systems that control the daily operations and interrelations of many plants and utilities.

Also at the event, Nortel CEO Bill Owens warned that a catastrophic cyberattack against the Internet could create a 'virtual [Hurricane] Katrina' that would reverberate throughout the U.S. economy.

Owens said the growing threat over the next two or three years is coming from new viruses that may attack wireless devices and mobile phones, which can then infect broadband networks, government computers and mission-critical IT systems. He added that China, India and South Korea seem to take the risks more seriously than the United States.

Alice Lipowicz is a staff writer for Government Computer News' sister publication, Washington Technology.

About the Author

Alice Lipowicz is a staff writer covering government 2.0, homeland security and other IT policies for Federal Computer Week.


  • Russia prying into state, local networks

    A Russian state-sponsored advanced persistent threat actor targeting state, local, territorial and tribal government networks exfiltrated data from at least two victims.

  • Marines on patrol (US Marines)

    Using AVs to tell friend from foe

    The Defense Advanced Research Projects Agency is looking for ways autonomous vehicles can make it easier for commanders to detect and track threats among civilians in complex urban environments without escalating tensions.

Stay Connected