Obama’s Cyber Legacy

The Obama administration made an unprecedented all-fronts effort to secure cyberspace. For eight years, cyberspace proved the Obama administration’s most unpredictable adversary, always twisting in new directions and delivering body blows where least expected.

The administration took the cyber threat seriously from day one, launching reviews, promulgating policy, raising defenses and punishing cyberspace’s most dangerous actors. That included imposing sanctions against Russia and North Korea and indicting government-linked hackers from China and Iran.

But, in the end, cyberspace won.

President Barack Obama will leave office following an election in which digital breaches ordered by Russian President Vladimir Putin helped undermine the losing candidate Hillary Clinton, sowed doubts about the winner Donald Trump’s legitimacy and damaged faith in the nation’s democratic institutions.

When the history of the Obama administration’s cyber policy is written, that fact will likely loom larger than anything else, numerous cyber experts and former officials told Nextgov, overshadowing years of hard work to prepare the government and the nation for an age of digital insecurity. It will also likely overshadow the dozens of instances in which Obama officials got the big cyber questions, more or less, right.

“He set himself up with all the tools, but he blew this,” said Paul Rosenzweig, a deputy assistant secretary at the Department of Homeland Security during the Bush administration.

This assessment is unnerving for many top cyber watchers who credit the Obama administration with making substantial progress preparing the government, military, law enforcement and the private sector to operate in an emerging and incredibly complex domain.

“The Obama administration has done a good job laying out the traditional government markers of thoughtful policy consideration … the fundamental building blocks of what makes the traditional American policy apparatus function,” Rosenzweig said. “They’ve invested intellectual capital and a lot of effort and time in them. On the negative side, despite these efforts, we aren’t actually any better off in terms of cybersecurity.”

Are we better off than we were eight years ago?

That question, are we better off in cyberspace now than we were eight years ago, was a particularly troubling one for cyber experts. Their answer, by and large, was a qualified no.

“We’re better off in terms of policies and institutions to deal with cybersecurity, but worse off with regard to the threat landscape and the actual security environment,” said Tim Maurer, co-lead of the Cyber Policy Initiative at the Carnegie Endowment for International Peace.

“There’ve been improvements on protecting us from attacks on critical infrastructure,” said Adam Segal, director of the Digital and Cyberspace Policy Program at the Council on Foreign Relations. “I think those are much less likely than before. But, overall, the progress has not kept up with the pace of the threat.”

The Good

There’s a lot to place on the positive side of the Obama administration’s cybersecurity ledger.

On the top of most former officials’ lists is a September 2015 agreement between Obama and Chinese President Xi Jinping to halt purely commercial hacking.

Prior to that agreement, former National Security Agency Director Gen. Keith Alexander described Chinese cyber theft of US companies’ trade secrets and intellectual property as “the greatest transfer of wealth in history.” FBI Director James Comey declared there are “two kinds of big companies in the United States … those who’ve been hacked by the Chinese and those who don’t know they’ve been hacked by the Chinese.” 

Within months after the agreement, Chinese corporate hacking dropped precipitously, according to US intelligence agencies and private-sector cybersecurity firms.  That’s just the top of a long list of accomplishments.

DHS built and continually upgraded its Einstein cyber threat detection and prevention system, which now protects more than 90 percent of federal agencies. The White House issued directives establishing internal government cybersecurity policies and procedures for responding to cyber incidents and attacks.

The National Institute of Standards and Technology established a cybersecurity best practices framework widely adopted by the private sector.

The Defense Department stood up an independent US Cyber Command, with offensive and defensive capabilities, which reached its initial operating stage in October staffed with more than 6,000 cyber warriors. The State Department worked with dozens of other nations to establish peacetime norms in cyberspace and to work out how international law applies there. And the Treasury Department developed a set of cyber-specific sanctions the White House used to punish Russian hackers in December.  

The Bad and the Ugly

There were also bad moments, however, that went beyond Putin’s election meddling.

There were breaches of email systems at the White House, State Department and Joint Chiefs of Staff, reportedly committed by Russian government-linked hackers. Hackers reportedly linked to the Chinese government stole sensitive security clearance documents on more than 20 million current and former federal employees and their families from the Office of Personnel Management.

There were also private-sector breaches, led by North Korea’s destructive cyberattack against Sony Pictures Entertainment, but also including major data breaches at Target, J.P. Morgan, Yahoo and the denial-of-service attack against the internet optimization firm Dyn, which knocked websites including Netflix and The New York Times offline for hours.

Disclosures by NSA leaker Edward Snowden fundamentally damaged attempts to cooperate with Silicon Valley on cybersecurity. It also pushed adversaries and some allies toward a narrow and insular view of managing the internet that has made cooperation on cybersecurity significantly more complicated.

Cyber-crime against consumers and the private sector did not significantly ebb during the past eight years. Despite a “cyber sprint” to shore up federal networks in the wake of the OPM breach, the government still relies inordinately on outdated technology. And decades-old inefficiencies in government technology acquisition and hiring have not been substantially repaired.

Most importantly, cyber watchers, say the government never successfully managed to establish a broad policy to deter cyber-attackers. If anything, as the Russian election meddling suggests, attackers only grew bolder.

A Complicated Landscape

The Obama administration’s cybersecurity efforts were hampered by a few fundamental facts.

To begin with, unlike combat in air or at sea, the Internet as a domain of conflict is controlled largely by the private sector. The government’s ability to enforce security measures is limited, especially outside industries such as energy, electricity and transportation DHS has labeled critical infrastructure.

Cyberspace is also best viewed as a domain of conflict rather than an issue unto itself like health care or homelessness. As a result, experts say, it makes more sense to view the administration’s failure to halt or counteract Russia’s election meddling as part of a broader failure to contain Russian aggression in Crimea and elsewhere rather than as a purely cyber failure.

The greatest fear during the first part of the Obama administration, expressed by intelligence officials and congressional leaders, was a destructive cyberattack against critical infrastructure that caused major loss of life and destruction of property. That never happened and, if it had, the breaches and influence operations that did occur might pale by comparison.

If there is one fundamental reason for the Obama administration’s inability to claim victory over cybersecurity, it is this: The threat grew and mutated faster than the administration’s ability to deal with it.

DefenseOne:             Obama Advises Trump To Train 100,000 Hackers:    We Are In A New Era Of Espionage:
 

« One Million Say Pardon Snowden & Russia Says He Can Stay Two More Years
Russia, Trump & Flawed Intelligence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Leonardo

Leonardo

Leonardo (formerly Finmeccanica) is a global high-tech company in Aerospace, Defence, Security & Information Systems including Cybersecurity & ICT solutions.

Blueliv

Blueliv

Blueliv is a leading provider of targeted cyber threat information and intelligence. We deliver automated and actionable threat intelligence to protect the enterprise and manage your digital risk.

Black Hat Briefings

Black Hat Briefings

The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world.

Cloud53

Cloud53

Cloud53 specialise in improving operational IT through strategic use of Cloud technologies and services.

Allegro Software

Allegro Software

Allegro provide secure software for the Internet of Things.

TeleTrusT

TeleTrusT

TeleTrust is an IT Security association and network for IT security comprising members from industry, administration, consultancy and research.

Applied Security (APSEC)

Applied Security (APSEC)

APSEC provides products and services in the areas of encryption, digital signature, authentication and data loss prevention.

Cybertron

Cybertron

Cybertron services include real-time monitoring and incident response and a cyber range for competency development.

Network Integrated Business Solutions (NIBS)

Network Integrated Business Solutions (NIBS)

NIBS is an IT services provider offering a range of services with the aim of simplifying and securing technology.

The ai Corporation

The ai Corporation

The ai Enterprise Fraud Solution is an on-prem or cloud-based self-service, machine learning fraud detection and prevention tool set.

ThreadStone Cyber Security

ThreadStone Cyber Security

ThreadStone Cyber Security offer reliable, practical and affordable cyber security solutions for both large and smaller organizations that we develop and deliver ourselves from Europe.

Heidrick & Struggles International

Heidrick & Struggles International

Heidrick & Struggles is a premier provider of leadership consulting and senior-level executive search services for roles including Information & Technology Officers and Cybersecurity.

NodeSource

NodeSource

NodeSource helps organizations run production-ready Node.js applications with greater visibility into resource usage and enhanced awareness around application performance and security.

Datrix

Datrix

Datrix is a leading Smart Infrastructure and Cyber Security solutions provider. We deliver critical networking, communications and cyber security solutions to public and private sector organisations.

doIT Solutions

doIT Solutions

doIT solutions specialize in IT security and infrastructure, security automation, data center, and cybersecurity.

The IoT Academy

The IoT Academy

The IoT Academy is a reputed Ed-Tech Institute that provides training in emerging technologies such as embedded systems, the Internet of Things (IoT), Data Science and many more.