Search
CRA TumbleLog
Archives
October 2009
September 2009 August 2009 July 2009 June 2009 May 2009 April 2009 March 2009 February 2009 January 2009 December 2008 November 2008 October 2008 September 2008 August 2008 July 2008 June 2008 May 2008 April 2008 March 2008 February 2008 January 2008 December 2007 November 2007 October 2007 September 2007 August 2007 July 2007 June 2007 May 2007 April 2007 March 2007 February 2007 January 2007 December 2006 November 2006 October 2006 September 2006 August 2006 July 2006 June 2006 May 2006 April 2006 March 2006 February 2006 January 2006 December 2005 November 2005 October 2005 September 2005 August 2005 July 2005 June 2005 May 2005 April 2005 March 2005 February 2005 January 2005 December 2004 November 2004 October 2004 September 2004 August 2004 July 2004 June 2004 May 2004 April 2004 March 2004 February 2004 January 2004
Archives by Category
Action Alerts (2)
American Competitiveness Initiative (96) CRA (61) Computing Community Consortium (CCC) (22) Computing Education (6) Diversity in Computing (26) Economic Stimulus and Recovery (13) Events (34) FY06 Appropriations (13) FY07 Appropriations (32) FY08 Appropriations (37) FY09 Appropriations (28) FY10 Appropriations (1) Funding (204) Misc. (49) People (106) Policy (249) R&D in the Press (90) Research (85) Security (30)
Recent Entries
National CS Education Week
Prizes and Computing Research House S&T Committee Considers Cyber Security R&D President Obama Touts Role of Basic Research in Innovation Business Week on Research in Industry A Systems Approach to Improving K-12 STEM Education Healthcare Robotics Briefing CCC Announces New Networking Research Agenda NSF Shows Off Cyber-Physical Systems on the Hill New DARPA Director Announced
CRA Links
Computing Research News
CRA-Bulletin Computing Data and Resources CRA in the News Computing Research in the FY05 Budget
What We're Reading
Computational Complexity
CNSR Online Danger Room Defense Tech Freedom to Tinker InsideHPC Lessig Blog Nothing is as simple... Reed's Ruminations Schneier on Security Techdirt UMBC eBiquity Blog USACM Tech Policy Blog
Advocacy Materials
IT R&D One-pager (pdf)
DARPA and University Research One-pager (pdf) Cyber Security R&D One-pager (pdf) Current and Requested IT R&D Funding Charts (pdf)
Recent Testimony
|
July 27, 2005Industry Group Calls for Increased Cyber Security R&D; Congress Hears Message from Former PITAC MembersIn a report released this week, the Cyber Security Industry Alliance -- a group consisting of information security software, hardware and service vendors -- called on Congress and the Administration to ramp up support for fundamental research in cyber security R&D and increase the prominence of cyber security at key federal agencies. CSIA's report, Federal Funding for Cyber Security R&D (pdf) reiterates the findings of the most recent Presidential IT Advisory Committee (PITAC) report (pdf) on the state of federal cyber security research, concluding that the overall investment in cyber security research is inadequate and too focused on the short-term. The CSIA report agrees with the PITAC report's recommendation to increase funding for long-term research in cyber security, noting a number of key security technologies -- firewalls, intrustion detection systems, fault tolerant networks, operating systems, cryptography and advanced authentication -- that bear the stamp of federally-sponsored, long-term research. The report differs from the PITAC report slightly in that it calls for the creation of a "designated entity" within DHS to coordinate the federal government's cyber security R&D effort; whereas, PITAC recommended that function remain within the interagency working group activity of the Networking and IT R&D program. CSIA rightly points out that the IWG of NITRD has very little actual influence on priority-setting at the agencies. Instead, they recommend that the new Assistant Secretary for Cyber Security at DHS serve as "the logical choice to drive the prioritization of requirements for research and development." My only concern with that recommendation is that DHS hasn't yet bought into the idea that long-term research efforts should be a priority. DHS's own budget for cyber security R&D remains a paltry $18 million for FY 05, out of an overall science and technology budget of just over a billion dollars. And of that $18 million, barely $2 million could realistically be described as "long-term" research efforts. (DHS's lack of priority for cyber security R&D has been a frequent topic here). Otherwise, the CSIA report marches in lockstep with the PITAC report on cyber security R&D (pdf) issued back in March. We strongly endorsed that report and I'm pretty thrilled with the industry report issued this week. Coincidentally, two former PITAC members (former because PITAC has been "disbanded" since June 1, 2005...) were on the Hill yesterday to participate in a briefing on cyber security R&D hosted by the Congressional Research and Development Caucus and put together by IEEE and IEEE-CS. Former PITAC Subcommittee on Cyber Security R&D Chair Tom Leighton (Chief Scientist and Co-Founder of Akamai) and former PITAC member Gene Spafford "Spaf" (Professor and Director of CERIAS at Purdue University) told the assembled congressional staffers, science community folks and assorted press about the problems we face in the cyber security arena and what PITAC recommended. The briefing was the latest in a series of briefings on the PITAC report and follows a number of hearings on the scope of the cyber security challenge. In April, for example, Spaf and Leighton, along with former PITAC co-Chair Ed Lazowska, participated in a number of focused briefings for Hill staff on the PITAC report. The House Science Committee, as well as the House Homeland Security committee have both held numerous hearings on the subject over the last several years. Yet the extent of the problems we face -- the risk posed by cyber attacks on critical infrastructure, the exposure internet users have to fraud and abuse because of security vulnerabilities, the cost to industry due to cyber extortion and malicious acts -- still appears to shock to congressional staff. I'm not sure they really believe that companies have paid "protection" money to criminals who threatened to take down their web presence with massive distributed denial of service attacks. I'm not sure they really believe that "phishing" and "pharming" attacks are real threats to individual internet users. I'm not sure they understand that IT systems are in the control loop of just about every piece of critical infrastructure in the nation and are vulnerable. I think many believe that the impact of a concerted cyber attack would be limited to something like Amazon being unavailable for the day. So despite the reports and briefings and hearings, we in the community haven't done a great job breaking through the noise around homeland security and conveying the importance of cyber security, or by extension cyber security R&D. In part, I think this is because the homeland security debate is really dominated by the specter of a nuclear, biological or chemical (NBC) attack (perhaps rightly so). The idea that a cyber attack could exist on the same scale as any one of the big three isn't so easily embraced by staff. Yet in terms of cost to industry and cost to government, the daily onslaught of cyber attacks must add up to dollar losses that exceed even some of the more dramatic NBC scenarios. But the investment in research to mitigate those losses, or prevent them entirely, pales in comparison to the investments in NBC research at DHS. In any case, the continued efforts of folks like Spaf and Leighton, and industry partners like the members of CSIA and ITAA, are helping to educate members of Congress and their staff to the challenges in the area. And, for better or worse, the growing frequency of breeches of customer data held by credit card companies, banks, universities and others is forcing Congress to climb the learning curve.... Posted by PeterHarsha at July 27, 2005 11:57 PM | TrackBackPosted to Funding | Policy | Security |