Blog

FY 2016 Budget Request Part II – Cyber Security Developments and Budget

The President’s FY 2016 budget includes $14 billion for cyber security funding across all federal agencies, including $5.5 billion for the Department of Defense (DoD).  The proposed budget would increase cyber defense spending by ten percent over the enacted FY 2015 budget levels, which is higher than the overall proposed DoD budget increase of seven percent. The increased cyber defense funding within the FY 2016 budget is part of a larger effort by the Federal Government to bolster the nation’s cyber defenses. Other steps taken toward this goal include: the development and integration of new software and systems, increasing the staff of US Cyber Command, Executive Order 13691, and the establishment of the Office of the Director of National Intelligence's new Cyber Threat Intelligence Integration Center (CTIIC). 

3025180

 

The FY 2016 budget request would allocate $582 million towards the integration of the Continuous Diagnostics and Mitigation (CDM) program across federal agencies. CDM stores and catalogues information related to individuals who have network access, and enables network managers to diagnose potential cyber vulnerabilities (Boyd, 2015). Another program to strengthen the cyber defenses of federal agencies is the DHS’s EINSTEIN internet monitoring intrusion prevention program. The increased pace of cyber-attacks has accelerated the deployment of the EINSTEIN Phase 3: the original goal was to implement the program in 2018, but it has now been pushed to a 2015 deployment.

“Einstein 3 is designed to quarantine emails and block malicious Web domains that ‘spoof’ legitimate sites, according to CenturyLink. The service defends the perimeter of federal civilian networks. It senses aberrant activity using threat ‘signatures,’ or tell-tale signs of a hacker derived from U.S. intelligence and private research. These indicators can include certain email headers or IP addresses... DHS ultimately expects to deploy phase 3 across all federal agencies. The new system consists of commercial technologies and government-developed software.” – Sternstein, 2014

The FY 2016 budget request would set aside $587.5 million for DHS cyber operations, including the integration of EINSTEN across federal civilian agencies.

US Cyber Command is has met only half of its staffing requirements for its original goal of maintaining 6,000 personnel by 2016. A total of 780 personnel would be tasked with defending vital industries under the National Mission Teams, 2,700 would be responsible for defending military domain systems, and 1,620 will support combat operations (Sternstein, 2015).  Despite its difficulty to fully meet its 6,000 personnel requirement, US Cyber Command has grown rapidly from deploying two cyber mission units to twenty five over the course of 2014. Lt. Gen. Edward Cardon, Commander of US Army Cyber Command, recently indicated the need for more integration between DoD agencies with Cyber Command, as well as for increased collaboration with the private sector (Golden, 2015). Both Executive Order 13691 and CTIIC will foster deeper cooperation between the federal government and the private sector with respect to cyber security issues.

On February 13th 2015, the President issued Executive Order 13691 with the intent of fostering information sharing through Information Sharing and Analysis Organizations (ISAOs) created by the DHS.

“…the development of information sharing organizations that may include industry-specific ISACs but also broaden further to create organizations that may share information in geographical regions or even in response to a particular threat. It also directs the U.S. Department of Homeland Security to work with participants to identify baseline standards and practices to guide information sharing.” – King, 2015

The Office of the Director of National Intelligence’s CTIIC was created with objective of promoting intelligence sharing and coordination between federal agencies on cyber security threats. Under the current system, the DHS, National Security Agency, and US Cyber Command have had somewhat conflicting roles with respect to defending against cyber-attacks (Sanger, 2015). CTIIC will receive a small initial budget of $35 million and is expected to be staffed by roughly 50 personnel from several federal agencies. Overall, the Obama Administration is undertaking a series of robust cyber security measures over the next two years which will significantly mitigate the damage of future cyber-attacks. 


Sources

  1. US Cyber Command Has Just Half the Staff It Needs, Aliya Sternstein , 2015.
    http://www.defenseone.com/threats/2015/02/us-cyber-command-has-just-half-staff-it-needs/104847/?oref=d-channelriver
  2. Is Obama’s $14 Billion Cybersecurity Request Enough? , Aliya Sternstein , 2015.
    http://www.defenseone.com/technology/2015/02/obamas-14-billion-cybersecurity-request-enough/104421/?oref=d-channelriver
  3. What a New $35 Million Agency Is Expected To Do for US Cyber Defense, Dustin Volz, 2015.
    http://www.defenseone.com/technology/2015/02/what-new-35-million-agency-expected-do-us-cyber-defense/105048/?oref=d-channelriver
  4. Obama Administration Plans to Open Center to Fight Cyberattacks, David E. Sanger, 2015. 
    http://www.nytimes.com/2015/02/11/us/politics/obama-administration-plans-to-open-center-to-fight-cyberattacks.html?partner=rss&emc=rss&_r=2 
  5. Cyber Teamwork Between Federal Agencies Still Too Hard, Says Army Cyber Commander, Hallie Golden, 2015. 
    http://www.defenseone.com/technology/2015/02/cyber-teamwork-between-federal-agencies-still-too-hard-says-army-cyber-commander/106179/?oref=d-river
  6. Obama asks for $14 billion to step up cybersecurity, Dara Kerr, 2015. 
    http://www.cnet.com/news/obama-adds-14b-to-budget-for-stepped-up-cybersecurity/
  7. Obama seeks $14 billion to boost U.S. cybersecurity defenses, Andrea Shalal and Alina Selyukh, 2015.
    http://www.reuters.com/article/2015/02/02/us-usa-budget-cybersecurity-idUSKBN0L61WQ20150202
  8. President budgets $14 billion for cybersecurity, Aaron Boyd, 2015.
    http://www.federaltimes.com/story/government/cybersecurity/2015/02/02/president-budgets-14-billion-cybersecurity/22751149/
  9. FACT SHEET: Cyber Threat Intelligence Integration Center, Office of the Press Secretary, 2015.
    http://www.whitehouse.gov/the-press-office/2015/02/25/fact-sheet-cyber-threat-intelligence-integration-center 
  10. Continuous Diagnostics and Mitigation (CDM), DHS, 2014. 
    http://www.dhs.gov/cdm 
  11. Obama Signs Info Sharing Executive Order, But Concerns Remain, Rachel King, 2015.
    http://blogs.wsj.com/cio/2015/02/13/obama-signs-info-sharing-executive-order-but-concerns-remain/
  12. Obama to sign executive order on cybersecurity info sharing, Jon Skillings, 2015.
    http://www.cnet.com/news/obama-to-sign-executive-order-on-cybersecurity-info-sharing/

 

Upcoming UAS Regulations
FY 2016 Budgetary Analysis – Part I

LocationLocation :
1950 Old Gallows Road, Ste 250, Tysons, VA 22182

General Info

General Info :
1.703.556.0111

email icon

Email Address :
This email address is being protected from spambots. You need JavaScript enabled to view it.