Your support helps us to tell the story
From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.
At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.
The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.
Your support makes all the difference.The Obama administration is moving cautiously on a new pilot programme that would both detect and stop cyber attacks against government computers, while trying to ensure citizen privacy protections.
The pilot programme, known as Einstein 3, was supposed to have launched in February, but the Department of Homeland Security still is pulling the plan together, according to senior administration officials.
Einstein 3 has triggered debate and privacy concerns because the program will use National Security Agency technology, which is already being employed on military networks.
Any involvement of the NSA, the agency that oversees electronic intelligence-gathering, in protecting domestic computer networks worries privacy and civil liberties groups who oppose giving such control to US spy agencies.
Officials, who spoke on condition of anonymity because the programme is still being completed, said that while the technology will come from the NSA, the program will be managed and run by the Department of Homeland Security.
The monitoring would be limited to government systems and any internet traffic moving in and out of them.
"The NSA will provide technical assistance," Homeland Security Secretary Janet Napolitano told reporters. "We absolutely intend to use the technical resources, the substantial ones that NSA has."
Einstein 1, which currently is in use by DHS, is an automated program designed to detect intrusions into government networks; Einstein 2, which is now being put in place, is a more advanced system for detection. It is being used now by about five of the higher-risk government agencies, one senior official said.
Einstein 3 would be designed not only to detect intrusions, but to stop them and prevent malicious computer codes from getting into government networks and to stop data theft from those systems.
The key, said officials, is that the focus of the monitoring and prevention program is not the content of emails, but any codes attached to emails that could infect the system or steal information.
Ari Schwartz, a vice president of the Centre for Democracy and Technology, said that privacy advocates want to ensure that as the government begins to protect its computer systems more aggressively, it follows the law and does not reach into private systems.
"There are a number of concerns that come with this process, the main one being how do you go about protecting the system in a way that insures you're not monitoring private systems," said Schwartz. "I don't have a full answer to that question, but the president made that pledge. That makes me more comfortable that it won't happen."
The planned deployment of the new Einstein 3 program was noted in the administration's recently released cyber security review. The 60-day review said the government would continue to consult with privacy and civil liberties groups as the program moves forward.
Obama released the review saying that cyber threats are one of the most serious economic and national security challenges faced by the nation. And he said he will name a new cyber coordinator for the federal government.
Join our commenting forum
Join thought-provoking conversations, follow other Independent readers and see their replies
Comments