Federal cuts force many state and local governments out of cyber collaboration group


This audio is auto-generated. Please let us know if you have feedback.

Federal funding for state and local governments’ main cybersecurity resource expired on Wednesday following the Trump administration’s decision to eliminate it, signaling major security risks ahead for tens of thousands of jurisdictions across the United States that will lose the group’s suite of vital cybersecurity services.

The Multi-State Information Sharing and Analysis Center (MS-ISAC), part of the Center for Internet Security (CIS), operated for 21 years under a cooperative agreement with the Department of Homeland Security that effectively subsidized its services for state and local governments, making it an essential resource for localities that couldn’t afford pricey contracts with top-tier cybersecurity vendors.

President Donald Trump’s administration severed that longstanding and widely praised relationship, first by revoking some of its funds earlier this year and then by letting the rest expire with the end of the fiscal year at midnight. The administration called the MS-ISAC’s services redundant, a characterization that the group, its members and independent experts universally reject, with some noting that it accounts for the vast majority of the government’s visibility into threats at the local level.

The MS-ISAC expects to retain enough paying members to continue providing its services, but overall is set to lose two-thirds of states and thousands of local governments — organizations in dire need of help as they confront increasingly aggressive nation-state and criminal hackers.

The security of U.S. critical infrastructure could suffer as the local governments that operate schools, hospitals, electric utilities and water supplies lose access to vital cybersecurity support. State and local governments increasingly have faced cyberattacks from foreign governments and cybercriminals in recent years, with some intrusions disrupting essential services.

“By defunding the MS-ISAC, Trump and Congress have done more to aid our enemies than they could have achieved themselves,” said Paul Rosenzweig, a former DHS official who joined other cyber experts in trying to save the group’s funding. “State and local governments are the front line of cyber defense. Eliminating funding that assists them in fighting against cyber intrusions is a self-inflicted wound.”

Unexpected animus

The midnight expiration of federal support was the culmination of a monthslong saga of woes for the MS-ISAC, which entered the year with no reason to believe that its $48.5 million annual funding agreement with DHS was at risk. In February, the Trump administration withdrew roughly $1 million of that funding to effectively shut down an MS-ISAC subgroup dedicated to election security. In March, the administration revoked an additional $10 million for MS-ISAC work that it said was redundant and “no longer effectuate[d] [DHS] priorities.” And in August, the government barred recipients of funds from the State and Local Cybersecurity Grant Program (SLCGP) from spending the money on MS-ISAC memberships.

The $10 million cut had “a very dramatic impact on what MS-ISAC was able to do,” said Robert Beach, the chief technology officer for the city of Cocoa, Florida, and a member of the MS-ISAC’s executive committee. The cut affected member outreach efforts, the group’s annual meeting and some of its threat intelligence services, he said. The government’s action prompted CIS to step in with $1 million in monthly emergency funding.

DHS’s argument that the MS-ISAC’s services were redundant was “clearly a mistake,” said CIS president and CEO John Gilligan. “There’s no rationale based on facts that supports their conclusion.” The fact that local governments are now trying to spend their own limited dollars on MS-ISAC memberships is “prima-facie evidence that this [organization] is not duplicative,” he added.



Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.