Computer Crime Research Center


US Fights Cybercrime From Suburban Office Parks

Date: November 26, 2014
By: MARTHA MENDOZA AP National Writer

Ground zero in the nation’s fight against cybercrime hides in plain sight, in a nondescript suburban office building with no government seals or signs.

Only after passing a low-key receptionist stationed on the seventh floor does one see the metal detectors, personal cellphone lockers and a series of heavy doors marked “classified” — all leading to the auditorium-sized National Cybersecurity and Communications Integration Center.

Inside, around-the-clock, close to 100 specialists monitor floor-to-ceiling maps of the U.S. and world, along with streams of data and breaking news. States are color-coded from green to red, for a low threat of attack to severe.

“This is where we put out the fires,” says Phyllis Schneck, chief cybersecurity official for the Department of Homeland Security, nodding at an image of a rotating globe on a monitor the size of a movie screen.

This fall, The Associated Press paid rare visits to two key civilian and military cybersecurity centers, a secret lab and a 24/7 incident-response venue where the government’s computer scientists work to combat an increasing bombardment by thieves, hostile states and hacktivists.

Cyberattack now eclipses terrorism as the biggest threat to national security, according to U.S. intelligence chiefs. And an AP report published this week found the $10 billion-a-year federal effort to protect the nation online is failing to keep up with attackers who tap into .gov and .mil networks from coffee shops down the street or military bases on the other side of the world.

The hubs for the nation’s online defense are tucked away in office parks mostly in Washington’s sprawling suburbs. There are no external signs these are classified facilities. The AP was granted access only after agreeing to not disclose street addresses, or record equipment serial numbers or employee badges. Some images on desktop monitors were also off-limits. Cellphones were barred, background checks required.

Inside the DHS cybersecurity center in Arlington, Virginia, rows of industry, military and intelligence analysts watch three large monitors on each of their desks; they’re detecting, preventing, responding to and mitigating cyberattacks.

Some scan through columns of numbers, monitoring live data fed through the federal “Einstein” program, a software system that searches government networks for malware, viruses and hacks. Others spot defaced websites and data leaks. Frequently, teams travel directly to infected computers to get them off the network.

Department of Homeland Security spokesman Sy Lee declined to comment on whether the center was involved in stopping a recently reported cyberattack on White House networks, but he said DHS generally leads such response efforts.

Infected military computers are taken to a similarly discreet building in Linthicum, Maryland.

The Defense Cyber Crime Center has an ordinary entrance where a receptionist checks in visitors before they pass through locked doors. Then there’s a second entrance, a wood-paneled wall with military seals and potted plants. Down a maze of hallways, cybercrime soldiers and defense contractors extract information from devices seized from battlefields, military crime scenes and federal employees whose computers may have been hacked.

Add comment  Email to a Friend

Copyright © 2001-2013 Computer Crime Research Center
CCRC logo