public sector

National Security Depends on the Utilization of the MGT Act

by James Scott, Sr. Fellow, ICIT Nearly three-quarters of the $80 billion annually spent on federal IT systems is allocated towards the upkeep and maintenance of outdated and vulnerable legacy systems. The majority of these systems predate the Internet, many were “Frankensteined “together ad hoc from technologies that are now older than those tasked with .. read more

ICIT Analysis: The CLOUD Act – Immediate Passage of the CLOUD Act Ensures Unambiguous Protection of Privacy and National Security

The CLOUD Act is meaningful bipartisan legislation that will empower U.S. law enforcement and authorities in countries that enter into agreements with the government to quickly access essential evidence stored in servers owned by companies that are based in the United States, provided that there is probable cause and warrant to access that information. With .. read more

ICIT Analysis: The Graham-Klobuchar Amendment Can Secure Election Infrastructure

Election integrity is a non-partisan issue that merits significant bipartisan support. Multiple players are capable of exploiting the vulnerabilities present in the often insecure, black-box proprietary code and unsecurable, antiquated legacy technology upon which U.S. election tabulation infrastructure relies. The Graham-Klobuchar Amendment aims at achieving Secure State Election Infrastructure through a Federal-State collaborative commission of .. read more

ICIT Analysis: The Cyber Shield Act

Industry experts and federal agencies such as NSA, NASA and NIST have repeatedly pushed for the implementation and standardization of the bare essentials of Information Security, such as security-by-design, cyber-hygiene training, and layered defenses, to be recognized as crucial topics on the Hill.  The Cyber Shield Act is an excellent idea for improving informed consumer .. read more

ICIT Analysis – S.J. Res. 34 – Introduction of Privatized Censorship

With S.J.Res.34, every citizen will have massive amounts of their data exposed when their ISP or a nebulous third-party intentionally or inadvertently fails to adequately secure the information. By drastically expanding that collection, storage, and exchange of data with a few short lines of legislation, Congress has jeopardized the security and privacy of every citizen, every .. read more

ICIT Report: Utilizing the NSA’s CSfC Process- Protecting National Security Systems with Commercial Layered Solutions

The acceleration of State Sponsored and Mercenary APT cyber-attacks, each of which possess new and more innovative layering of stealth and sophistication, has triggered a much needed response by the National Security Agency’s (NSA) Information Assurance Directorate (IAD). A more expedient path to technology approval has been introduced for qualified organizations. As a result, the .. read more

ICIT Talking Points: “Is the OPM Data Breach the Tip of the Iceberg?” – for the House Committee on Science, Space and Technology

Throughout June 2015, the United States Office of Personnel Management failed to adequately answer inquiries from the American people, Congress, and Federal agencies, concerning the two breaches of its systems that have left the granular personal information of 22.1 million United States Citizens in the hands of an unidentified adversary.  After review of the July .. read more

Legislative Brief “Moving Forward: How Victims Can Regain Control & Mitigate Threats in the Wake of the OPM Breach”

In June 2015, the Nation learned that the personnel records of 21.5 million United States citizens had been exfiltrated by an unknown adversary from the Office of Personnel Management, one of the largest known breaches in the history of the U.S. Government.  The immediate public outcry included congressional hearings attributing the breach to OPM administrators and .. read more

Preparing the Battlefield: The Coming Espionage Culture Post OPM Breach

As part of its continued analysis of the OPM breach, ICIT’s most recent brief entitled “Preparing the Battlefield: The Coming Espionage Culture Post OPM Breach” discusses the significant impact the breach will have on America’s national security.  The large number of victims, many of whom hold security clearances, combined with the personal nature of the information stolen gives .. read more

ICIT Brief: OPM Demonstrates that Antiquated Security Practices Harm National Security

The Institute for Critical Infrastructure Technology has published its official analysis of the Office of Personnel Management breach, Handing Over the Keys to the Castle: OPM Demonstrates that Antiquated Security Practices Harm National Security.  This research brief provides insights on several of the most important aspects of the breach, some of which are not being .. read more