Shutdown Is Doing Lasting Damage To US National Security

As the longest government shutdown in American history continues and we are beginning to see indicators of short-term national, and homeland-security vulnerabilities. 

The US government’s newest cybersecurity unit had barely launched before half its staff were furloughed. FBI agents are also on furlough and airports are short of screeners. Each of these lapses may cause specific problems: Dangerous weapons may slip through security, endangering the flying public; investigative leads may suffer from inattention, causing investigations of federal crimes to be delayed or go unfinished; and recent efforts to improve federal cybersecurity may be stopped before they ever really started. 

Moreover, given the importance this administration purports to place on immigration enforcement and border security, the irony of the Department of Homeland Security’s border agents and immigration officials not being compensated to perform their important work is hard to miss.

DHS, the agency charged with key civilian cybersecurity coordination and liaison work with state and local law-enforcement agencies, has been hit hard by the shutdown. Both the executive and legislative branches recognise cybersecurity threats as a top national-security priority. 

Halting cybersecurity work makes it easier for hostile nation-states to steal Americans’ personal information and corporate intellectual property, among other targets. 

DHS is responsible for thwarting those efforts, by sharing cybersecurity information with the private sector as well as with state and local governments. Moreover, DHS provides services to state and local governments that are working to improve their election security. 

But the longer-term costs to national security of this shutdown may be even greater than the short-term risks. One is the cost to the federal workforce itself. Experienced staff, such as foreign service officers are leaving. The government is losing talent that took years to recruit and train, and will take years to replace. 

Agencies are accustomed to training their workforces to competency and then having their best-trained and highest-performing employees take on management and leadership roles. Instead, they may now find their most competent and able agents, investigators, and analysts leaving for the private sector.

Federal employees in the national- and homeland-security fields, like their counterparts in the private sector or non-national-security government roles, have family responsibilities and financial commitments, such as mortgages and car payments. 

Public service is a calling, but the financial stress of an uncertain paycheck can cause mid-career national-security professionals to leave the federal workforce just when they are reaching the point where they have attained expert-level knowledge and substantial experience.

Second is the backlog of work that simply doesn’t get done. The law says government employees can work only on imminent threats to life or property during a shutdown. But mid- to long-term intelligence analysis and policy-option preparation is vital to protecting national security. 

Third, as national-security lawyers, we also know that a national-security workforce facing financial struggles creates a heightened counterintelligence risk. Debt and financial solvency have long been indicators in security background checks to determine whether an individual could be subject to blackmail or influence from a foreign power. 

We have no doubt that, as this shutdown continues, foreign-intelligence services are considering how they can exploit members of America’s national-security workforce who may be approaching severe financial strain.

The fourth and final concern may be the most worrisome of all: The United States is showing the world how utterly polarised, even paralysed, we’ve become. This plays directly into Moscow’s strategy to weaken us at home and abroad. The Kremlin seems to have wanted Donald Trump in the White House, but even in the campaign’s waning weeks, it didn’t expect him to win, hence Russia’s continued messaging that the election was “rigged,” a meme that disappeared after Trump’s surprising victory. 

More than Trump’s election, the Kremlin wanted the US to tear itself apart, leaving it unable to oppose Russian foreign policy or to push for democratic reforms. The first two years of this administration, with Trump at the helm, have weakened our ties to our global allies in favor of foreign policies more sympathetic to Russian strategic interests. Now, at home, this government shutdown further weakens our defenses with every passing day.

The president says our security requires the shutdown. But actually, the shutdown is the real national-security threat, and its damage will prove lasting.

DefenseOne

You Might Also Read:

Russians Are Confident Their Homeland Is Secure:

 

 

 

« Zimbabwe Orders Internet Disconnected
World Economic Forum Cyber Risks Report »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

HANDD Business Solutions

HANDD Business Solutions

HANDD are independent specialists in data protection with expertise at every stage of the Protect, Detect and Respond cycle, from consultancy and design, right through to installation.

Thycotic

Thycotic

Thycotic prevents cyber attacks by securing passwords, protecting endpoints and controlling application access.

MD5

MD5

MD5 is a leading UK provider of Digital Forensic & eDiscovery services to large multi-national corporate businesses, Law Enforcement & Government Agencies, high profile legal firms.

DNV

DNV

DNV are the independent expert in assurance and risk management. We deliver world-renowned testing, certification and technical advisory services.

ThreatBook

ThreatBook

ThreatBook is dedicated to providing real-time, accurate and actionable threat intelligence to block, detect and prevent attacks.

ThreatQuotient

ThreatQuotient

ThreatQuotient delivers an open and extensible threat intelligence platform to provide defenders the context, customization and collaboration needed for increased security effectiveness.

Onfido

Onfido

Onfido is building the new identity standard for the internet. We digitally prove people’s real identities using a photo ID and facial biometrics.

SecSign Technologies

SecSign Technologies

SecSign Technologies delivers user authentication, messaging, file sharing, and file storage with next generation security for company networks, websites, platforms, and devices.

Cyber Security Forum Initiative (CSFI)

Cyber Security Forum Initiative (CSFI)

CSFI is a non-profit organization with a mission to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training.

RocketCyber

RocketCyber

RocketCyber is a Managed SOC platform empowering Managed Service Providers (MSPs) to deliver security services to small and medium businesses.

Archon Secure

Archon Secure

Archon GoSilent Cube delivers a CSfC-certified, plug-and-play security solution for classified and unclassified communication when using the public Internet.

KCS Group Europe

KCS Group Europe

KCS Group helps its clients to identify and deal with any risks, weaknesses and threats which could impact on the business financially or reputationally.

Protecto

Protecto

Make privacy and governance effortless. Brakes allow you to drive faster. Stronger data privacy and security enable companies to unlock the full potential of the data.

SalvageData Recovery Services

SalvageData Recovery Services

Since 2003, SalvageData has been providing high-quality data recovery with the certifications needed to work with any storage media manufacturer.

Aura Information Security

Aura Information Security

Aura Information Security consists of a team of highly-skilled and renowned information security professionals spanning Australia and New Zealand.

Foghorn Consulting

Foghorn Consulting

Foghorn can analyze your cloud to enhance performance and security, while reducing costs. Based on AWS’ 6 Pillars, our AWS WAFR Certified Engineers Will Identify Areas of Improvement.