Skip to Content
Computing

The government shutdown has severely weakened cybersecurity in the US

January 8, 2019

In a stalemate over how best to secure America’s southern border, the Trump administration has endangered the integrity of one of the country’s even more important frontiers.

17 days and counting: Nearly 45% of employees at the newly established Cybersecurity and Infrastructure Security Agency within the Department of Homeland Security, as well as 85% of staff at the National Institute of Standards and Technology (NIST), have been furloughed in the government shutdown, according to a report from Duo Security.

Playing with fire: There are still a lot of federal cybersecurity workers at their posts carrying out what have been deemed “essential” operations, like defending government networks from attacks and keeping confidential documents from being compromised. But experts warn that trying to thwart bad actors at less than full strength is risky. “Cyber threats don’t operate on Washington’s political timetable, and they don’t stop because of a shutdown,” Lisa Monaco, former assistant to the president for homeland security and counterterrorism, told Axios.

The long haul: The damage could last much longer than the shutdown itself. Workers won’t quickly forget that their jobs are subject to fickle political winds, and the best and brightest in cybersecurity positions could seek the comparative stability (and often higher pay) of a corporate gig. A similar thing happened after the 2013 shutdown, and the drain on talent was felt for years. Today was also supposed to kick off the DHS’s annual Cybersecurity and Innovation Showcase, a staple event for helping the government explore research and development of critical next-generation cybersecurity technologies. The event has now been put off indefinitely.

The list goes on: There are many more ripple effects, too, including those that reach beyond government. Many corporate teams, for example, rely on NIST’s standards and guidelines to set baselines for their security programs. With the majority of its staff gone, the agency is likely to miss its deadline for updating those standards. Several other programs and services meant to monitor and test for vulnerabilities have also been suspended or are operating at reduced capacity, according to the Duo report.

Deep Dive

Computing

Erik Prince wants to sell you a “secure” smartphone that’s too good to be true

MIT Technology Review obtained Prince’s investor presentation for the “RedPill Phone,” which promises more than it could possibly deliver.

Corruption is sending shock waves through China’s chipmaking industry

The arrests of several top semiconductor fund executives could force the government to rethink how it invests in the sector.

Inside the software that will become the next battle front in US-China chip war

The US has moved to restrict export of EDA software. What is it, and how will the move affect China?

Hackers linked to China have been targeting human rights groups for years

In a new report shared exclusively with MIT Technology Review, researchers expose a cyber-espionage campaign on “a tight budget” that proves simple can still be effective.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.