- How to watch HLN online for free 5 Years Ago
- The top 12 LGBTQ superheroes in DC and Marvel comics 5 Years Ago
- Woman with Tumblr page devoted to Dylann Roof arrested for plotting terrorism Today 2:32 AM
- How much money do you need to book Beyoncé for your wedding? Monday 8:00 PM
- Twitter is stoked about Netflix’s Fyre Fest documentary Monday 7:37 PM
- Jacquees launches Twitter debate after calling himself ‘King of R&B’ Monday 6:52 PM
- Watch a British politician steal a ceremonial mace to halt Brexit proceedings Monday 6:07 PM
- Dog waits for weeks by his family’s burned house after California wildfire Monday 5:45 PM
- Proud Boys founder Gavin McInnes suspended from YouTube Monday 3:46 PM
- The best sex toys for couples to heat up the holidays Monday 3:35 PM
- Chrissy Teigen shares tattoo her dad got of her face for her birthday Monday 3:31 PM
- Kavanaugh votes against hearing Planned Parenthood defunding case Monday 3:14 PM
- YouTube’s 2018 Rewind video is one of the most-hated videos of all time Monday 12:37 PM
- Roger the buff kangaroo has died at the age of 12 Monday 12:34 PM
- Elon Musk says no one is censoring his tweets Monday 12:22 PM
Budget cuts leave U.S. government vulnerable to weekend cyberattacks
If you want to hack a top secret government system, do it on a weekend.
If you want to infiltrate top secret government computer systems, don’t do it during working hours.
That’s the takeaway from a new study released by the Department of Homeland Security’s Office of the Inspector General, which revealed that budget cuts have caused the arm of the department tasked with investigating cyberattacks, to cut back to 12 hours a day, Monday through Friday.
The report, which looked at efforts to coordinate cyberdefense throughout the government, charged, ‟[the agency] needs to have sufficient staffing to perform intelligence analysis functions and respond to industrial control systems incidents after work hours and on weekends. Since cyber attacks can happen at any time, it is imperative…to have sufficient resources to respond to and mitigate potential threats.”
This situation leaves 108 hours each week when the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) is unable to provide its technical analysis and forensic investigation—not only to other government agencies, but also to private government contractors whom it is also tasked with assisting.
According to the report, which was released late last month, agency managers had requested the ability to hire more staff but were told they lacked the funding to do so. Unsurprisingly, the report recommended allowing the agency to bring in more people.
The report also found that many agency staffers lacked the specialized training required to effectively respond to cyberattacks. In the wake of the federal sequester, which cut five percent of the budget from all sectors of the government, the agency has since suspended all employee trainings until further notice.
The report noted that staffers have compensated by attending training sessions offered by other arms of the government; however, these classes, “[do] not provide incident responders with the specialized training needed to perform their assigned functions.”
While the U.S. government has proved adept at breaking other organizations’ security, Uncle Sam may need all the help he can get when it comes to protecting his own systems. In a recent authorized penetration test, a team of hackers were able to gain access to the network of a top government agency that specialized in ‟offensive cybersecurity and protecting secrets,” with little more than a fake Facebook profile using the photo of a Hooters waitress.
Aaron Sankin is a former Senior Staff Writer at the Daily Dot who covered the intersection of politics, technology, online privacy, Twitter bots, and the role of dank memes in popular culture. He lives in Seattle, Washington. He joined the Center for Investigative Reporting in 2016.