[Senate Hearing 112-219]
[From the U.S. Government Printing Office]
S. Hrg. 112-219
INFORMATION SHARING IN THE ERA
OF WIKILEAKS: BALANCING SECURITY
AND COLLABORATION
=======================================================================
HEARING
before the
COMMITTEE ON
HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS
UNITED STATES SENATE
of the
ONE HUNDRED TWELFTH CONGRESS
FIRST SESSION
__________
MARCH 10, 2011
__________
Available via the World Wide Web: http://www.fdsys.gov/
Printed for the use of the
Committee on Homeland Security and Governmental Affairs
U.S. GOVERNMENT PRINTING OFFICE
66-677 WASHINGTON : 2012
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing
Office, http://bookstore.gpo.gov. For more information, contact the
GPO Customer Contact Center, U.S. Government Printing Office.
Phone 202-512-1800, or 866-512-1800 (toll-free). E-mail, gpo@custhelp.com.
COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS
JOSEPH I. LIEBERMAN, Connecticut, Chairman
CARL LEVIN, Michigan SUSAN M. COLLINS, Maine
DANIEL K. AKAKA, Hawaii TOM COBURN, Oklahoma
THOMAS R. CARPER, Delaware SCOTT P. BROWN, Massachusetts
MARK L. PRYOR, Arkansas JOHN McCAIN, Arizona
MARY L. LANDRIEU, Louisiana RON JOHNSON, Wisconsin
CLAIRE McCASKILL, Missouri JOHN ENSIGN, Nevada
JON TESTER, Montana ROB PORTMAN, Ohio
MARK BEGICH, Alaska RAND PAUL, Kentucky
Michael L. Alexander, Staff Director
Christian J. Beckner, Associate Staff Director for Homeland Security
Prevention and Protection
Jeffrey E. Greene, Senior Counsel
Nicholas A. Rossi, Minority Staff Director
Brendan P. Shields, Minority Director of Homeland Security Policy
Luke P. Bellocchi, Minority Counsel
Trina Driessnack Tyrer, Chief Clerk
Patricia R. Hogan, Publications Clerk and GPO Detailee
Laura W. Kilbride, Hearing Clerk
C O N T E N T S
------
Opening statements:
Page
Senator Lieberman............................................ 1
Senator Collins.............................................. 3
Senator Brown................................................ 14
Prepared statements:
Senator Lieberman............................................ 29
Senator Collins.............................................. 31
WITNESSES
Thursday, March 10, 2011
Hon. Patrick F. Kennedy, Under Secretary for Management, U.S.
Department of State............................................ 4
Teresa M. Takai, Chief Information Officer and Acting Assistant
Secretary for Networks and Information Integration, U.S.
Department of Defense, and Thomas A. Ferguson, Principal Deputy
Under Secretary for Intelligence, U.S. Department of Defense... 7
Corin R. Stone, Intelligence Community Information Sharing
Executive, Office of the Director of National Intelligence..... 9
Kshemendra Paul, Program Manager, Information Sharing
Environment, Office of the Director of National Intelligence... 11
Alphabetical List of Witnesses
Ferguson, Thomas A.:
Testimony.................................................... 7
Joint prepared statement with Teresa Takai................... 44
Kennedy, Hon. Patrick F.:
Testimony.................................................... 4
Prepared statement........................................... 33
Paul, Kshemendra:
Testimony.................................................... 11
Prepared statement........................................... 59
Stone, Corin R.:
Testimony.................................................... 9
Prepared statement........................................... 52
Takai, Teresa M.:
Testimony.................................................... 7
Joint prepared statement with Thomas Ferguson................ 44
APPENDIX
Thomas E. McNamara, Former Program Manager of the Information
Sharing Environment at the Office of the Director of National
Intelligence, prepared statement............................... 68
Markle Task Force on National Security in the Information Age,
prepared statement............................................. 72
Responses to post-hearing questions for the Record from:
Mr. Kennedy.................................................. 81
Ms. Takai and Mr. Ferguson................................... 86
Ms. Stone.................................................... 102
Mr. Paul..................................................... 105
INFORMATION SHARING IN THE ERA
OF WIKILEAKS: BALANCING SECURITY
AND COLLABORATION
----------
THURSDAY, MARCH 10, 2011
U.S. Senate,
Committee on Homeland Security and
Governmental Affairs,
Washington, DC.
The Committee met, pursuant to notice, at 3:06 p.m., in
room SD-342, Dirksen Senate Office Building, Hon. Joseph I.
Lieberman, Chairman of the Committee, presiding.
Present: Senators Lieberman, Collins, and Brown.
OPENING STATEMENT OF CHAIRMAN LIEBERMAN
Chairman Lieberman. The hearing will come to order. Good
afternoon and thanks for your patience. We just were able to,
Senator Collins and I, vote early. And I want to apologize in
advance. I am going to have to step out for about 15 minutes in
about a half-hour, but I shall return.
In just 6 months and a day, we will mark the 10th
anniversary of the attacks of September 11, 2001, and we will
honor the memory of the nearly 3,000 people who were murdered
that day in America.
Our mourning over their deaths has always been compounded
by the knowledge that those attacks might have been prevented--
certainly that was the implication of the 9/11 Commission
Report--had our intelligence and law enforcement agencies
shared the disparate facts they had gathered, enabling us to
connect the dots.
To prevent this from happening again, Congress passed
several laws intended to strengthen information sharing among
critical Federal agencies. Those acts included the Homeland
Security Act, the Intelligence Reform and Terrorism Prevention
Act (IRTPA), and the USA PATRIOT Act.
Since then, the Executive Branch, I think, has made
significant improvements in its information-sharing systems,
and there is no question that far more information is now
available to partners in other agencies who have a legitimate
need for it.
All this intelligence is further brought together at key
nodes, such as the National Counterterrorism Center (NCTC),
where it can be examined by intelligence specialists from a
variety of agencies working together under one roof. And as a
result, we have seen a number of successes in recent domestic
and military counterterrorism operations that I think were
thanks to that kind of information sharing, and I am going to
cite some examples in a moment.
But this Committee's recent report on the Fort Hood attack
shows that information sharing within and across agencies is
nonetheless still not all it should be, and that allowed in
that case a ``ticking time bomb,'' namely Major Nidal Hasan,
now accused of killing 13 and wounding 32 others at Fort Hood,
to radicalize right under the noses of the Department of
Defense (DOD) and the Federal Bureau of Investigation (FBI). So
we need to continue improving our information-sharing
strategies.
Now I fear the WikiLeaks case has become a rallying cry for
an overreaction for those who would take us back to the days
before September 11, 2001, when information was considered the
property of the agency that developed it and was not to be
shared.
The bulk of the information illegally taken and given to
WikiLeaks would not have been available had that information
not been on a shared system, so the critics of information
sharing argue.
But to me this is putting an axe to a problem that requires
a scalpel and misunderstands what happened in the WikiLeaks
case and I think misstates the solution to the problem. We can
and must prevent another WikiLeaks without also enabling
Federal agencies, in fact, perhaps compelling Federal agencies
to reverse course and return to the pre-September 11, 2001,
culture of hoarding information.
We need to be smarter about how information is shared and
appropriately balance security concerns with the legitimate
needs of the users of different types of information. Methods
and technologies for doing so already exist. Some of them I
gather have been put into place since the WikiLeaks case, and
we need to make sure that we utilize them as fully as possible
across our government.
The bottom line is we cannot walk away from the progress we
have made that has saved lives. I will give you a couple of
quick examples.
U.S. Special Forces and elements of the intelligence
community have shared information and worked exceptionally well
together in war zones to combat and disrupt terrorist groups
such as al-Qaeda in Iraq and the Taliban in Afghanistan. And
that would not happen without information sharing.
Here at home, we have used information sharing to enhance
the role of State, local, tribal, and private sector entities
in our fight against terrorists. And those efforts have paid
off--most recently in the case of a chemical supply company in
North Carolina that alerted the FBI to suspicious purchases by
a Saudi Arabian student in Texas who turned out to be building
improvised explosive devices.
So we need to fix what is broken without going backwards.
Today I look forward to hearing from each of our witnesses
about what they are planning to do to improve the security of
classified networks and information, while still ensuring that
information is shared effectively in the interest of our
Nation's security.
I would also like to hear how Congress can work with you on
these efforts either with legislation or through more targeted
funding. Efficiently sharing classified information while
effectively securing that information is critical to our
Nation's security and our national values. We can and must have
both.
Senator Collins.
OPENING STATEMENT OF SENATOR COLLINS
Senator Collins. Thank you, Mr. Chairman.
Effective information sharing among Federal law enforcement
and civilian and military intelligence agencies is critical to
our security. The 9/11 Commission found that the failure to
share information across the government crippled efforts to
detect and potentially prevent the attacks on September 11,
2001. Improving this communication was a critical part of the
Intelligence Reform and Terrorism Prevention Act that Senator
Lieberman and I authored in 2004.
The WikiLeaks breach should not prompt a knee-jerk reaction
on the sharing of vital information and its use by those
analysts who need it to do their jobs. We must not let the
astonishing lack of management and technical controls that
allowed a private in the army to allegedly steal some 260,000
classified State Department cables and some 90,000 intelligence
reports to send us back to the days before September 11, 2001.
Unfortunately, we continue to see agency cultures that
resist sharing information and coordination with their law
enforcement and the intelligence counterparts. Almost 10 years
after September 11, 2001, we still witness mistakes and
intelligence oversights reminiscent of criticisms predating our
reforms of the intelligence community. Among those cases where
the dots were not connected and information was not effectively
shared are Abdulmutallab, the so-called Christmas Day bomber,
and Nidal Hasan, the Fort Hood shooter.
At the same time, as the Chairman has pointed out, there
have been several cases that underscore the incredible value
and benefit of information sharing, and an example is, as the
Chairman has noted, the case of Mr. Zazi, whose plans to bomb
the New York City subway system were thwarted.
As such successes remind us, we must not allow the
WikiLeaks damage to be magnified twofold. Already the content
of the cables may have compromised our national security. There
have been news reports describing the disclosure of these
communications as having a chilling effect on our relationships
with some of our closest allies. More important, however, they
likely have put at risk some of the lives of citizens,
soldiers, and partners.
Longer lasting damage could occur if we allow a culture to
re-emerge in which each intelligence entity views itself as a
separate enterprise within the U.S. counterterrorism structure,
with each attempting to protect what it considers to be its own
intellectual property by not sharing it with other
counterterrorism agencies. If those stovepipes reappear or
worsen, we will certainly be in more danger.
Such a step backward would run counter to the policy goals
embodied in the 2004 Intelligence Reform Act, articulated by
law enforcement and the intelligence community leadership, and
underscored in multiple hearings before this Committee; and,
that is, to effectively detect and thwart terrorists, the
``need to share'' must replace the ``need to know.''
I would also like to hear today about the possible
technological solutions to the problems that allowed for the
disclosures to WikiLeaks. For example, my credit card company
can detect out-of-the-ordinary charges on my account almost
instantaneously. Yet the military and intelligence communities
were apparently unable to detect more than a quarter million
document downloads in less than 2 months. Surely, the
government can make better use of the technology currently
employed by the financial services industry.
It is also notable that the intelligence community was
already required to install some audit capabilities in its
systems by the 2007 homeland security law, which we authored,
that could well have included alerts to supervisors of
suspicious download activity. Had this kind of security measure
been in place, security officers might have detected these
massive downloads before they were passed on to WikiLeaks.
Technology and innovation ultimately should help protect
information from unauthorized disclosure, while facilitating
the appropriate sharing of vital data.
I would also like to explore today the implementation of
role-based access to secure classified information. Instead of
making all information available to anyone who has access to a
classified system, under this model, information is made
available in a targeted manner based on individuals' positions
and the topics for which they are responsible. Access to
information not directly relevant to an individual's position
or responsibilities would require the approval of a supervisor.
We must craft security solutions for the 21st Century and
beyond. We live in a world of Twitter and instantly viral
videos on YouTube. We must strive to strike the appropriate
balance that protects classified and sensitive information
while ensuring the effective sharing of vital data. We can use
the most cutting edge technology to protect the traditional
tools of statecraft and intelligence--those tools of
relationships and information.
Thank you, Mr. Chairman.
Chairman Lieberman. Thank you, Senator Collins, for that
thoughtful opening statement.
I want to thank the witnesses who are before us for coming,
also for the thoughtful written testimony you have submitted to
the Committee, which will, without objection, be included as
part of the record.
Now we will begin with Patrick Kennedy, who is Under
Secretary for Management at the Department of State. Welcome,
Mr. Kennedy.
TESTIMONY OF HON. PATRICK F. KENNEDY,\1\ UNDER SECRETARY FOR
MANAGEMENT, U.S. DEPARTMENT OF STATE
Mr. Kennedy. Thank you very much. Chairman Lieberman,
Ranking Member Collins, and Senator Brown, thank you for this
opportunity to address information sharing after WikiLeaks and
to discuss Executive Branch efforts to ensure that information
is shared effectively yet securely and in a manner that
continues to advance our national security. The State
Department and our interagency partners have long been working
to obtain both appropriate information sharing and protection,
and after WikiLeaks, we have focused renewed attention on
achieving these dual objectives.
---------------------------------------------------------------------------
\1\ The prepared statement of Mr. Kennedy appears in the Appendix
on page 33.
---------------------------------------------------------------------------
From my perspective, serving over 30 years with the State
Department, both overseas and in Washington, and also serving
as the first Deputy Director of National Intelligence for
Management, I especially appreciate your efforts to address
with us the challenges of information sharing and security. I
can assure you that we at the State Department remain committed
to fully sharing our diplomatic reporting within the
interagency with safeguards that are reasonable, pragmatic,and
responsible.
For diplomatic reporting, the State Department has
historically communicated between Washington and overseas posts
through messages which convey internal deliberations relating
to our foreign relations and candid assessments of overseas
conditions. This reporting provides the State Department and
other U.S. Government agencies crucial information essential to
advancing our national interests, and we continue to this day
to share this reporting through automatic dissemination to over
65 U.S. Government agencies.
In late November 2010, when the press and WikiLeaks
announced the release of purported State Department cables, we
immediately established a 24/7 WikiLeaks Working Group of
senior State Department employees; we did suspend the Secret
Internet Protocol Router Network (SIPRNet) to Net Centric
Diplomacy, the database of State Department cables, while
retaining all of our other distribution systems to other
agencies. We also created a mitigation team to address policy,
legal, and counterintelligence issues.
For continued mitigation efforts, both within the State
Department and interagency, we continue to deploy an automated
tool that monitors State's classified network to detect
anomalies not otherwise apparent, backed up by a staff who
analyze these anomalies. Cable distribution has been limited to
the Joint Worldwide Intelligence Communications System and our
traditional system that reaches out, as I said, to 65 agencies.
We are now evaluating other systems for distribution, such as a
searchable database that relies on metadata.
The State Department has continued to work with information
management issues interagency through the Interagency Policy
Committee (IPC), chaired by the White House's Special Adviser
for Information Access and Security, as well as through
existing IPCs.
The challenges of grappling with the complexities are
threefold.
The first is ensuring information-sharing policies are
consistently directing the use of technology to solve problems,
not the other way around. Post-September 11, 2001, the focus
was on providing technical solutions to information sharing. As
a result, technical experts were asked to develop solutions to
the barriers. The post-WikiLeaks environment reminds us that
technology is a tool to execute solutions but it is not in
itself the answer. Simply put, we must more consistently sort
out what we need to share before determining how to share it.
Connecting systems and networks may provide the means to share
information, but we must still manage and share this content in
an effective and efficient way, as both of you mentioned in
your opening statements.
The national security community must do a better job of
articulating what information is appropriate to share with the
widest appropriate distribution and what is more appropriately
confined to a narrower audience across the community in order
to ensure adequate safeguards. The State Department believes
that the way in which we share messages through our traditional
means of dissemination and the steps we have taken since
November are leading us firmly in that direction.
The second main challenge involves each agency's rigorous
adherence to existing and improved information security
policies, as both of you have noted. This includes improved
training in the use of labels to indicate appropriate breadth
of dissemination. The Executive Order on classified information
establishes the basic levels of classification. From that
foundation, individual agencies may still have their own
captions that denote how information should be disseminated
because obviously not every person with a security clearance
needs every piece of worldwide information. Agencies that
receive information need to understand how to handle that
captioned information so that it is not inappropriately made
available to too wide an audience.
The Office of Management and Budget (OMB) has directed
agencies to address security, counterintelligence, and
information issues through special teams. We believe that our
Mitigation Team serves as a model for broad, cross-discipline
coordination, or governance because it brings together the
various subject matter experts. Many information-sharing and
security issues can be resolved at the agency level as long as
there are standards in place for agencies to execute. For the
most part, standards have been created by existing interagency
bodies, but there are some areas where further coordination is
needed.
The third main challenge involves the coordination, or
governance, of information management. Numerous interagency
groups are wrestling with the issues related to technological
aspects of information sharing, such as those dealing with
standards, data standards, systems, and networks. Others are
wrestling with the policy decisions of who should have access
to what information. New interagency governance structures to
coordinate information sharing have been developed, including
those focused, as you rightly note, on sharing with State,
local, and tribal governments, as well as with foreign
partners. In keeping with the first challenge, these new
structures should maintain or increase focus on defining the
content to be shared and protected as well as on the technology
which is to be shared and used. Each agency must be confident
that security processes and procedures are applied in a uniform
and consistent manner in other organizations. And, in addition,
it must be understood that material originating in one agency
will be treated by other agencies in accordance with mutually
understood handling instructions.
The State Department shares information with the intent of
providing the right people with the right information at the
right time. We will continue to share our diplomatic reporting
in order to advance our national security information. We
recognize the imperative to make diplomatic reporting and
analysis available throughout the entire interagency community.
The State Department will continue to do this in order to
fulfill our mission.
We remain committed to both appropriately sharing and
protecting critical national security information, but this
commitment requires, as you have noted, addressing multiple,
complex issues. We must find the right policies; we must find
the right technologies; and we must continue to share.
Thank you for this opportunity to appear before you today.
I look forward to working with you on the challenges and would
be pleased at the right time to respond to any questions you
might have. Thank you.
Chairman Lieberman. Thanks very much, Secretary Kennedy.
Now we are going to hear from Teresa Takai, Acting
Assistant Secretary for Networks and Information Integration,
Chief Information Officer, U.S. Department of Defense. Welcome.
TESTIMONY OF TERESA M. TAKAI,\1\ CHIEF INFORMATION OFFICER AND
ACTING ASSISTANT SECRETARY FOR NETWORKS AND INFORMATION
INTEGRATION, U.S. DEPARTMENT OF DEFENSE, AND THOMAS A.
FERGUSON, PRINCIPAL DEPUTY UNDER SECRETARY FOR INTELLIGENCE,
U.S. DEPARTMENT OF DEFENSE
Ms. Takai. Thank you, sir. Thank you for that introduction.
Chairman Lieberman, Ranking Member Collins, and Senator Brown,
thank you for the invitation to provide testimony on what the
Department of Defense is doing to improve the security of its
classified networks while ensuring that information is shared
effectively.
---------------------------------------------------------------------------
\1\ The joint prepared statement of Ms. Takai and Mr. Ferguson
appears in the Appendix on page 44.
---------------------------------------------------------------------------
As noted, I am Teri Takai, and I serve as the principal
adviser to the Secretary of Defense for Information Management,
Information Technology, and Information Assurance, and as such
am responsible for the security of the Department's networks
and then coordinating the Department's mitigation efforts in
response to the WikiLeaks incident.
With me is Tom Ferguson, Principal Deputy Under Secretary
for Intelligence. He serves as the principal staff adviser to
the Under Secretary of Defense for Intelligence and is
responsible for policy and strategic oversight of all DOD
intelligence, counterintelligence, and security policy, plans,
and programs, as delegated by the Under Secretary for
Intelligence. In this capacity, Mr. Ferguson oversees the
development and implementation of the Department's information-
sharing policies.
Mr. Ferguson and I have submitted a detailed statement for
the record, but I would like to briefly highlight a few of the
Department's efforts to better protect its sensitive and
classified networks and information while ensuring its ability
to share critical information with other partners and agencies
is continued.
Immediately following the first release of documents on the
WikiLeaks Web site, the Secretary of Defense commissioned two
internal DOD studies. The first study directed a review of DOD
information security policy. The second study focused on
procedures for handling classified information in forward-
deployed areas. Results of the two studies revealed a number of
findings, notably that: Forward-deployed units maintained an
overreliance on removable electronic storage media; second,
roles and responsibilities for detecting and dealing with an
insider threat needed to be better defined; and, finally,
limited capability existed to detect and monitor anomalous
behavior on classified computer networks.
The Department immediately began working to address the
findings and improve its overall security posture to mitigate
the possibility of another similar type of disclosure. The most
expedient remedy for the vulnerability that led to WikiLeaks
was to prevent the ability to remove large amounts of data from
the Department's secret classified network using removable
media, such as discs, while allowing a small number of
computers to retain, under strict controls, the ability to
write removable media for operational reasons. The Department
has completed disabling the write capability on all of its
SIPRNet machines except for approximately 12 percent that
maintain that capability for operational reasons, largely in
deployed areas of operation. The machines that maintain write
capability are enabled under strict controls, such as using
designated kiosks with two-person controls.
We are also working actively with National
Counterintelligence Executive on its efforts to establish an
information technology insider detection capability and an
Insider Threat program. Mr. Ferguson's organization is leading
that effort for the Department of Defense, and they have been
developing comprehensive policy for a DOD Counterintelligence
Insider Threat Program.
In addition, DOD is developing Web-enabled information
security training that will complement DOD's mandatory annual
information assurance training, and the Joint Staff is
establishing an oversight program that will include inspection
of forward-deployed areas.
As DOD continues efforts to improve our information-sharing
capabilities, we will strive to implement the mechanisms
necessary to protect the intelligence information without
reverting back to pre-September 11, 2001, stovepipes. DOD is
working closely with its interagency partners, several of whom
join me here today, to improve intelligence information sharing
across the government while ensuring the appropriate protection
and safeguards are in place.
I would like to conclude by emphasizing that the Department
continues to work towards a resilient information-sharing
environment that is secure through both technological solutions
and comprehensive policies. Mr. Ferguson and I thank the
Committee for the opportunity to appear before you today, and
we look forward to answering your questions.
Senator Collins [presiding]. Thank you.
Mr. Ferguson, I am told that you do not have a prepared
statement. Is that correct?
Mr. Ferguson. That is correct. Ms. Takai has a nicer voice
than I do and has given our joint statement.
Senator Collins. Thank you.
Before I turn to our next witness, we have been joined by
Senator Brown, and I just wanted to give him an opportunity for
an opening statement if you would like to have one.
Senator Brown. Thank you. I am actually eager to hear from
the witnesses and ask questions, but thank you for the offer.
Senator Collins. Thank you. Then we will proceed.
Our next witness is Corin Stone, who is the Intelligence
Community Information Sharing Executive from the Office of the
Director of National Intelligence (ODNI). We welcome you.
Please proceed with your testimony.
TESTIMONY OF CORIN R. STONE,\1\ INTELLIGENCE COMMUNITY
INFORMATION SHARING EXECUTIVE, OFFICE OF THE DIRECTOR OF
NATIONAL INTELLIGENCE
Ms. Stone. Thank you, ma'am. Chairman Lieberman, Ranking
Member Collins, and Senator Brown, thank you for inviting me to
appear before you today to discuss the intelligence community's
progress and challenges in information sharing. I want to first
recognize the Committee's leadership on these important issues
and thank you for your continued support as we address the many
questions associated with the need to share information and the
need to protect it. Your leadership and oversight of
information sharing, especially as we come up to the 10-year
anniversary of September 11, 2001, has been invaluable. I look
forward to our continued participation and partnership on this
complex and vitally important issue.
---------------------------------------------------------------------------
\1\ The prepared statement of Ms. Stone appears in the Appendix on
page 52.
---------------------------------------------------------------------------
As the Intelligence Community Information Sharing
Executive, I am the Director's focal point for all intelligence
community information-sharing matters, providing guidance,
oversight, and direction on information-sharing priorities and
initiatives across the community. In that capacity, I work in
coordination with my colleagues at the table and across the
community on comprehensive and strategic management information
sharing, both internally and with all of our mission partners.
My main focus today concerns information that is derived
from intelligence sources and methods or information that is
reflected in the analytic judgments and assessments that the
intelligence community produces. I want to be clear, though,
that our concern for the protection of information is not only
narrowly focused on sources and methods.
As we have seen recently through WikiLeaks, the
unauthorized disclosure of classified information has serious
implications for the policy and operational aspects of national
security. We all have networks that must be secured, and as
technology continues to advance, my colleagues and I remain
deeply committed to keeping up with the ongoing challenges we
face.
I am acutely aware that our major task is to find what the
Director of National Intelligence (DNI) has termed ``the sweet
spot'' between the two critical imperatives of sharing and
protecting information. Every day our officers work tirelessly
to tackle challenges of increasing complexity in a world that
is interconnected, fast-paced, and ever changing, sharing vital
information with each other, customers and partners, leading to
better prepared senior policymakers across the Executive Branch
and Congress.
It is important to note that the community's work on these
complicated questions predates the recent unauthorized
disclosures by WikiLeaks. As you know, the challenges
associated with both sharing and protecting intelligence are
not new and have been the subject of major effort in the
intelligence community for years. However, these latest
unauthorized disclosures underscore the importance of our
ongoing and comprehensive efforts to address these evolving
challenges.
Working with the whole of government to address these
issues, the intelligence community's strategy involves three
interlocking elements.
The first is access, ensuring that the right people can
discover and have access to the networks and information they
need to perform their duties, but not to information that they
do not need.
The second element is technical protection, technically
limiting the ability to misappropriate, manipulate, or transfer
data, especially in large quantities.
And the third area is auditing and monitoring, taking
actions to give the intelligence community day-to-day
confidence that the information access granted to our personnel
is being properly used.
As we work to both share and protect networks and
information, we must never lose sight of the sweet spot. As we
continue to increase how much information is shared, we must
also increase the protections in place to ensure information is
being properly used and safeguarded. This is the only way to
create the necessary trust and confidence in our systems that
will foster appropriate information sharing. It is a matter of
managing risk, and people, policies, processes, and technology
all play important interconnected roles in managing that risk.
However, it is also important to note that while all of our
capabilities can reduce the likelihood and impact of
unauthorized disclosures, in the final analysis our system is
based on trust--trust in the individuals who have access to
classified information and trust that they will be responsible
stewards of this Nation's most sensitive information.
Whether classified information is acquired by a computer
system, a classified document, or simply heard in a briefing or
a meeting, we have had bad apples who have misused this
information before, and we will, unfortunately, have them
again. This reality does not mean we should err on the side of
not sharing; rather, we must put all proper safeguards in
place, continue to be forward leaning to find a threat before
disclosures occur, be mindful of the risks, and manage those
risks with the utmost diligence.
Thank you for the Committee's time, and I welcome your
questions.
Senator Collins. Thank you.
Our final witness on the panel this afternoon is Kshemendra
Paul, who is the Program Manager for Information Sharing
Environment of the Office of the Director of National
Intelligence. Welcome, Mr. Paul.
TESTIMONY OF KSHEMENDRA PAUL,\1\ PROGRAM MANAGER, INFORMATION
SHARING ENVIRONMENT, OFFICE OF THE DIRECTOR OF NATIONAL
INTELLIGENCE
Mr. Paul. Thank you, Chairman Lieberman, Ranking Member
Collins, and Senator Brown. Thank you for the opportunity to
speak about our efforts to effectively share and protect
information at every level of government. Thank you for your
attention to information-sharing reform efforts and your
support of my office's mission. I also want to recognize my
fellow panelists, key partners in government-wide efforts to
further strengthen information sharing and protection.
---------------------------------------------------------------------------
\1\ The prepared statement of Mr. Paul appears in the Appendix on
page 59.
---------------------------------------------------------------------------
As the WikiLeaks story emerged, concerns were voiced that
the information-sharing efforts would suffer a setback. This
Administration is committed to strengthening both information
sharing and information protection. While complex and
challenging, we do not see these goals as conflicting. Guidance
throughout the Executive Branch has been consistent. We need to
accelerate information sharing in a responsible and secure way.
The WikiLeaks breach is not principally about information-
sharing challenges. A bad actor allegedly violated the trust
placed in him. While we cannot always stop bad actors, we can
and must take this opportunity to reassess our posture, our
progress, and our focus related to improving and strengthening
information sharing and protection.
The challenges highlighted by the WikiLeaks breach are
complex and go to deeply rooted issues: First, the perpetuation
of agency-based, bilateral, and fragmented solutions versus
common and comprehensive approaches to information sharing and
protection; second, the need to improve our counterintelligence
posture and some of the other technical considerations that my
fellow panelists have talked to; and, finally, while the breach
involves classified information, we need to be mindful that the
root cause issues and the sensitivities extend to sensitive but
unclassified information also. It is a whole-of-government
problem, not just a classified national security problem.
I would like to clarify the information-sharing environment
and my role. The purpose of the information-sharing environment
is to improve the sharing of terrorism-, homeland security-,
and weapons of mass destruction-related information across
Federal, State, local, and tribal agencies and with our
partners in the private sector and internationally.
The information-sharing environment spans five communities:
Defense, intelligence, homeland security, law enforcement, and
foreign affairs. It is defined as a cross-cutting, horizontal,
data-centric, trusted information-sharing and protection
capability. My role is to plan for and oversee the agency-based
buildout, and manage the information-sharing environment. But
my office is not operational. Agencies own the mission,
agencies set policies and procedures, and agencies make the
investments that interconnect our networks, databases,
applications, and business processes. These agency-based
contributions together form the information-sharing
environment.
The law grants the program manager's role governmentwide
authority. This authority is exercised primarily two ways:
First, I am the co-chair of the White House's Information
Sharing and Access Interagency Policy Committee; through that
role, we work through policy and oversight issues; and, second,
through my partnership with the Office of Management and
Budget.
We are being deliberate and collaborative in our approach
to further strengthening information sharing and protection. We
have put an emphasis on governance and outreach. My office,
together with my mission partners, is leading the refresh of
the 2007 National Strategy for Information Sharing. We are
using this opportunity to leverage common mission equities to
drive common policies and capabilities. And we are
orchestrating specific agency-led sharing and protection
initiatives with our partners.
We believe this work provides a framework for strengthening
efforts to address the root cause issues associated with the
WikiLeaks breach. These capabilities will result in further
assuring the proper sharing and protection of information.
Our work across mission partners is profiled in our annual
report to the Congress delivered every summer. I also encourage
those interested in following or influencing our efforts to
visit our Web site and to participate in upcoming online
dialogues aimed at shaping our future direction.
In closing, our efforts have been and continue to be
focused on accelerating information sharing in a secure and
responsible way. Effective information sharing and
collaboration are absolutely essential to keeping the American
people safe.
Thank you for the opportunity to participate in this
hearing. I also would appreciate any comments, directions,
support, or feedback that you can provide to me in my office.
My fellow panelists and I look forward to your questions.
Senator Collins. Thank you very much for your testimony,
and I thank all of the witnesses.
I want to express my personal frustration with this issue.
Our Committee has held hearings on the lack of information
sharing in the case of Abdulmutallab, where credible
information was given to our embassy in Africa but did not make
its way in a timely fashion to the National Counterterrorism
Center and, thus, Abdulmutallab was not listed on the No Fly
List. So there is an example of credible information that
should have been shared across government but was not.
Similarly, in our investigation into the Fort Hood attacks,
we found that credible information about Major Hasan's
communications with a known terrorist suspect was not shared by
the Joint Terrorism Task Force with the Army--another terrible
failure in information sharing.
Now, there have been successes as well. But I mention those
two failures to contrast and raise such questions with how an
Army private allegedly was able to download hundreds of
thousands of classified documents, cables, and intelligence
reports without being detected, and that baffles me. It also
frustrates me because in 2007, Senator Lieberman and I authored
homeland security legislation that included a requirement that
military and intelligence agencies install audit capabilities
with robust access controls on classified systems. And those
technologies that would enable us to audit information
transmission and authenticate identities for access control are
not new. They are widely used. And the serious cyber risks
associated with the use of removable media devices, such as
thumb drives, have been known for many years.
How did this happen? How could it be that a low-level
member of the military could download such a volume of
documents without it being detected for so long? That truly
baffles me. I do not know who to start with. Mr. Ferguson, do
you want to take a crack at that?
Mr. Ferguson. I will be the first in the pond. Let me take
it in a couple steps. Your question has a lot of parts to it.
The rank of Private Bradley Manning is really not so much
the issue. It was what his responsibilities were. He was there
to provide intelligence support for military operations. So we
do not base it necessarily on a rank structure. We base it on
what is his mission responsibilities to support the military.
To get to your question about how was he able to access so
much data, and then I will get to the part about what have we
done and why didn't we do what we could have done. The
situation in the theater is such that--or was. It has changed
now. But we took a risk, essentially is what it is. We took a
risk that by putting the information out there, share
information, provide agility, flexibility of the military
forces, they would be able to reach into any of the databases
on SIPRNet. They would be able to download that information,
and they would be able to move the information using removable
media across various domains, whether it is across security
domains or from U.S. systems to coalition systems. And we did
that so they could do this very rapidly.
Here in the Continental United States (CONUS) many of the
things you have talked about, about closing off open media
ports and so forth, actually have been in place for a decade or
more. If you go to many of the agencies, they actually are not
able to access those open ports. But the focus in the theater
was speed and agility, so we took that risk to allow not just
Private Manning but many people who are serving there to move
at that pace.
You asked about why we did not put in place capabilities
that were in your bill. In fact, as early as 2008, we started
to deploy what is called the Host Based Security System (HBSS),
as early as 2008. And at the time of Private Manning's alleged
activities, about 40 percent of the systems in CONUS actually
had that system in place. The systems were not--that was not
available in the theater.
Senator Collins. And why wasn't it?
Mr. Ferguson. Mainly because of a lot of the systems there
are, for lack of a technical term, cobbled together, and
placing those kinds of systems--they are not all equal. It is
sort of a family of systems there, and it is not just like
working for Bank of America where they have one homogeneous
system and they can insert things and take things out as it
works. You have multiple systems and putting in new intrusion
software or monitoring tools and so forth, you have to approach
each system differently. And that is part of the problem.
So basically to get away from that and not hold up the
ability to move information, they took on the risk by saying,
look, these people are cleared. They go through background
investigations, and, frankly, most of our focus was right about
outside intruder threat, not inside threat.
So in the end, to answer your questions--we had ourselves a
situation where we had information sharing at this level, and
we took the risk of having monitoring tools and guards and
passwords and so forth, as well as people did not fully
implement policies, they did not follow security rules down at
this level. So the problem is that is where we made our
mistake. We allowed this to occur when we were sharing
information at this level. So what we are trying to fix today
is not take this level of information sharing and moving it
down here, which you have referred to in your opening
statement, but take this and move it up here. And that is what
we are trying to do as rapidly as we can.
Senator Collins. Thank you.
Mr. Kennedy, Mr. Ferguson basically explained that DOD, in
the interest of making sure that the information was out there
in theater, took a risk, but that does not explain to me how
the private would have access to State Department classified
cables that had nothing to do with the country for which the
private was involved in intelligence activities. So how did it
happen that he had access to classified State Department
cables, involving countries that had nothing to do with his
intelligence responsibilities?
Mr. Kennedy. That is a very good question, Senator. Several
years ago, the Department of Defense and the intelligence
community came to the State Department and said, we need the
State Department--and actually they paid for it--to push out
reporting to SIPRNet, which is the Department of Defense
worldwide system, and to load a number of our cables onto a
Defense Department database that would be accessible to Defense
Department people. So in response to their request, we took a
selected element of our cables and pushed those out to the
Department of Defense's database.
To be blunt, we believe in the interest of information
sharing that it would be a grave mistake and a danger to the
national security for the State Department to try to define in
each and every one of the 65 agencies that we share our
diplomatic reporting analysis with to say that Private Smith
should get this cable, Lieutenant Jones should get that cable,
Commander X should get that cable. The policies that have been
in place between the State Department and other agencies is we
provide this information to the other agency. The other agency
then takes on the responsibility of controlling access by their
people to the material that we provide to them.
Senator Collins. I will come back to that issue, but I want
to first give an opportunity for my colleague, Senator Brown,
to ask his questions.
OPENING STATEMENT OF SENATOR BROWN
Senator Brown. Thank you. You are on a roll, though.
I have served in the National Guard for 31 years. I am a
Lieutenant Colonel. I am on the computers regularly, all that
good stuff, and I have to tell you, sometimes it is like brain
surgery getting on the computer, even for somebody like me who
is part of the senior staff, and had been a trial defense
attorney, just to log on, get access, go where I need to go,
and I still have not really gotten a satisfactory answer as to
how this private had complete and total access to the documents
he had. In my wildest dreams, I could not do what he did.
And then I see, he works 14 hours a day, no one cares.
Well, the average workload in that region is that and more for
many people.
My understanding, in doing my own due diligence, is that
there was a complete breakdown of command authority when it
came to instructing that soldier and people within that command
as to the do's and do not's with regard to information and
information sharing. There was no check or balance, and that
the amount of people that have access to that information has
grown by tens of thousands. Hundreds of thousands of people
have access to that information on any given day.
Is that accurate, that that many people have access to that
information? Whoever feels qualified to answer it, probably the
DOD folks.
Mr. Ferguson. Let me put it this way: The SIPRNet is a
command and control network, just like the Internet.
Senator Brown. I know what that is, I am in the military.
Can you explain to the listeners what that is?
Mr. Ferguson. What is the SIPRNet?
Senator Brown. Yes.
Mr. Ferguson. The SIPRNet is a command and control network
that maintains Department of Defense classified secret level
information that covers a whole portfolio of issues. It is not
just intelligence information, for one. It is operations data.
It is financial programmatic data, personnel data. It covers a
very large----
Senator Brown. It is everything.
Mr. Ferguson. It is everything. All that information is not
available to everyone who is on SIPRNet. A lot of that
information, in fact, is password protected. But there are
sites, just like going on the Internet, that if you click on
there, if you put in the search for that information and it is
not password protected, it is available to whoever is on the
SIPRNet.
Senator Brown. All right. So let me just take what you are
saying here--and that was not the case with this young soldier.
We are not just talking about that stuff where you just get
online and take that stuff. We are talking about that the young
person who had the ability to not only get that but all the
classified documentation as well. Correct?
Mr. Ferguson. He was able to get the classified information
that was not password protected. That is correct.
Senator Brown. Right. And is it true that there are
hundreds of thousands of people that have access to that
information still?
Mr. Ferguson. That is true.
Senator Brown. Once again, I am not a brain surgeon, but I
am an officer in the U.S. military, and I have difficulty
getting that stuff. Why haven't we locked down and basically
weeded through the people that have access, to make sure they
are all our friends? Where is the command and control in these
types of things?
Mr. Ferguson. The command and control, since the SIPRNet is
really a family of networks, the site owners decide, just like
on the Internet, who gets access to their particular site.
Senator Brown. Right. That is for the open stuff, but I am
not talking about that.
Mr. Ferguson. No. That is for secured information as well.
Senator Brown. All right.
Mr. Ferguson. So in the case, of course, of the State
Department information, that has now been removed from SIPRNet,
so that is not available for everybody to take a look at.
Senator Brown. I was kind of surprised they were even on
there.
Mr. Ferguson. Well, that was a request of the Department of
Defense and the DNI to put that information on or to make it
more accessible to people in the intelligence community.
Senator Brown. Is the reason why because--listen, I
understand the moving nature of the battlefield. I believe that
a lot of the command and control went away because of the
changing nature of the battlefield. They needed the information
very quickly. Is that a fair assessment?
Mr. Ferguson. That is a fair assessment.
Senator Brown. So knowing that, what checks and balances
have been put in place, notwithstanding that fact, what are we
doing?
Mr. Ferguson. What they have done--and Ms. Takai can talk
about the technology behind this. They have closed down all the
ports. They cannot remove the data. But they also are starting
to chart and narrow the data access based on mission
responsibility, for one. It is not going to be as simple as
just going in, turning off stuff, and just doing a big survey
of the SIPRNet, although that will probably occur. And then, of
course, the moving of the data, which was the big concern, is
now a two-man rule. As Ms. Takai pointed out, 12 percent of the
systems now have the ability to remove data and shift it to
another domain. The other 88 percent are shut down.
Senator Brown. Well, he used a thumb drive, right?
Mr. Ferguson. He used a compact disc (CD), actually. Oddly
enough, the thumb drives have been shut off for some time.
Senator Brown. That is what I thought. So it was a CD,
right?
Mr. Ferguson. It was CDs, that is right. He was downloading
the CDs. So we have a two-man rule.
Another key piece of this is--I do not know the word to
use--a failure on the part to monitor and follow security
regulations. It is as simple as that.
Senator Brown. Listen, I agree with you. I know there is a
protocol in place. I am still flabbergasted. I mean, here we
are, we have one of the biggest leaks in my lifetime or my
memory, at least, in the military, and we have a private who is
in trouble. I am a little curious. There seems to have been a
breakdown completely on that chain of command.
Mr. Ferguson. It did not work as well as we had hoped.
Senator Brown. And that being said, it has not worked as
well as you had hoped, is there anything like a red team or an
unannounced inspection? Or have you changed the protocol?
Mr. Ferguson. Actually there have been investigations
looking at the entire process for the entire theater. And a lot
of the changes have occurred in terms of the two-man rule,
shutting down of the ports, and other security training and so
forth has all occurred in the last 3 or 4 months. So, yes, they
have taken some pretty significant actions already.
If I may, I would like to pass it to Ms. Takai because she
can speak to some of the technology that is in place.
Senator Brown. And with that, I will take that testimony in
a second. But that being said, I know all the agencies are
actually awash with new guidelines and directives. Is there a
coordinated effort of some kind being made so that policy and
oversight are staying consistent, that agencies are not left to
guess who to listen to? Is there someone in charge that
basically is dictating what we are doing, why we are doing it,
how we are doing it, and then following up to say, yes, we are,
in fact, doing it? Is there anything like that going on?
Mr. Ferguson. Yes, I will give you a good example. Their
policies for security and use of material was spread across a
number of policy documents, so if you were sitting in a field
or you are in the United States and you wanted to find where
that policy was, you had to go search for it. In hindsight,
that was not a good way of approaching it. It worked that way
for years, decades.
One of the things we have done is we have updated those
policies, and we combined and consolidated them into a single
product. So there is only one place--it is a one-stop shop to
go get that. That came out of the Under Secretary of Defense
for Intelligence's office. So he sets the guidelines for that
information protection assurance and security parts.
In terms of setting rules for information sharing itself,
that is being done as a community-wide activity, not just with
the Department of Defense but with the DNI--this is an approach
with all the other agencies. So there is one initiative right
now underway, and, of course, each department is also looking
at it individually.
Mr. Paul. Can I amplify that?
Senator Brown. Yes, please, and then I just have one final
question, but sure, yes, absolutely.
Mr. Paul. So there is an ongoing White House-led process
right now looking at the WikiLeaks incident and potential
structural reforms. That has three main tracks that are going
on, and my panelists and I and others are involved in that
process.
The first part of it is looking at how to better balance
things like identity management and tagging of information more
consistently so you can do better kinds of access controls like
what were talked about in the opening statements.
The second is looking at the insider threat passbacks and
some of the technical considerations that we have talked about.
And the third is looking at how we strengthen governance
across the spectrum--so the hope is that in the coming weeks
and months we can come back and talk about the results of that
process.
Ms. Takai. Before I speak to the technology, just to follow
on to the governance issue, there is participation by all of
the organizations in a White House working group that reports
to the deputy's committee around the various activities to make
sure that we are well coordinated and that we are working
together.
Inside the Department of Defense, this is an item that is
high on the Secretary's list, and we provide ongoing reports to
him from the standpoint of the technology mitigation efforts
both to him and the Chairman of the Joint Chiefs of Staff
regarding our progress. So there is significant oversight.
There is significant guidance in terms of making sure that we
are taking care of this and we are following on to the
commitments that we have made both from a technology
perspective and working with Mr. Ferguson's area in terms of
making sure that the policies are updated. So I wanted to make
sure that I added that in response to the question.
Moving on to the technology, I think we have talked about
the Host Based Security System and the progress that we have
made thus far in terms of having that installed and making sure
that we can detect anomalous behavior in terms of individuals
who might get on to the network and download information, and
we are doing that in three ways. One is from a device
perspective. The Host Based Security System detects if, in
fact, a computer does have a device where information can be
downloaded so that we can validate that and ensure that it is a
part of the 12 percent of those computers that we believe need
that information in the field.
The second thing that we are doing is to look at what we
call an audit extraction module to follow on to Senator
Collins' question around how do we have the information and the
analytics to see anomalous behavior and we can catch it at the
time that it occurs. We are currently in testing. That software
is integrated with HBSS, and we will then be moving ahead to
roll that out across DOD.
The third thing that we are moving forward on, as you
mentioned, Senator Collins, is around really a role-based
process. We are going to be implementing a public key
infrastructure (PKI) identification similar to our current
Common Access Cards (CACs) that we have on our non-classified
network to all of the DOD users, and what that will do is give
us an opportunity over time to refine what information
individuals have access to. So sheer access to SIPRNet, for
instance, in this case, we will be able to, by looking at each
individual database, take it down to what information that
individual needed as opposed to having the network completely
open.
Senator Brown. I appreciate that, and just in closing, it
was not only dangerous, it is embarrassing what happened. You
know, it is embarrassing for our country some of the things
that were actually out there. And so there are a lot of lessons
there, but I appreciate the opportunity.
Thank you for having this hearing and participating and
allowing me to participate in it.
Senator Collins. Thank you.
Chairman Lieberman [presiding]. Senator Collins, thanks
very much for assuming the Chair. I apologize to the witnesses.
I appreciate the testimony. Let me ask a few questions, if
I might. In a speech that DNI General Clapper gave last fall,
he predicted that WikiLeaks was going to have a ``very chilling
effect on the need to share.'' After WikiLeaks began to release
State Department cables in late November, news headlines
forecasted a clampdown on information sharing, and this is what
we have been dealing with and you deal with in your testimony
as submitted.
I wanted to ask you if there are specific areas--and I
guess I would start with Ms. Stone and then any others. Are
there specific areas where you think the WikiLeaks case has had
a direct impact on information sharing other than the examples
cited in the prepared testimony by Mr. Kennedy of the State
Department removing its diplomatic cables from SIPRNet?
Ms. Stone. Thank you for that question, sir. My reaction is
that the most direct impact has been in the area of culture and
those people who are concerned about sharing information,
rightly so, and our ability to protect it. And, therefore, our
reaction to WikiLeaks must be to increase protection as well as
sharing. As we increase the protection, we also increase the
trust and confidence that people have that when they share
their information appropriately, it will be protected; we will
know where the information is; we will be able to pull that
information if it is inappropriately accessed; and we will be
able to follow up with appropriate repercussions if and when it
is misused.
So I think the most direct impact I have seen is not in a
specific tangible action, but more so that it has resulted in a
very clear need for us to increase the protections, to increase
trust and confidence to share more broadly; because--while
Director Clapper was very concerned--as we all were, that this
would have a chilling effect, we have all worked very hard,
both within the ODNI, within the intelligence community, and
across the government, to ensure that it does not have a
chilling effect; but that, in fact, as Mr. Ferguson said, as we
increase sharing, we also increase protection to develop that
trust and confidence.
Chairman Lieberman. That is good. Mr. Kennedy.
Mr. Kennedy. If I could, Mr. Chairman. I think there have
been two kinds of chilling effects. One, I think there has been
a chilling effect on the part of some foreign governments being
willing to share information with us, and that is obviously of
great concern to the State Department. We build our diplomatic
reporting analysis on the basis of trust; that when individuals
tell us things in confidence, we will share them in confidence
within the U.S. Government, that it will not go broader than
that. So that has been one chilling effect.
I think the State Department, though, has avoided the
chilling effect that you were directly addressing. For example,
if I might, during the period of time, we have posted, as you
all mentioned, some 250,000 cables to this database posted to
the DOD SIPRNet. During that same period of time, we
disseminated 2.4 million cables, 10 times as many, through
other systems to the 65 other U.S. Government agencies. And so,
therefore, while we stopped disseminating on SIPRNet for the
reasons that my DOD colleagues have outlined, we have continued
to disseminate to the intelligence community system, the Joint
Worldwide Intelligence Communications System (JWICS), and we
have continued to disseminate the same volume of material to
the same other agencies based upon their need for that
information. We do not hold anything back. This unfortunate
event has not caused us to hold anything back. We continue to
share at the same rate as we were sharing before because we
know that our information is essentially the gold standard.
There are more reporting and analysis officers and sources
and information from 265 State Department diplomatic and
consular posts around the world than any other agency, so it is
our intent to uphold our piece of national security and
obviously to be responsive to the very forceful and correct
legislation that you saw past, which is to share. We are
continuing to share using two other means.
Chairman Lieberman. Do any of the other three witnesses
want to comment, either in terms of specific areas of the
effect of WikiLeaks on information sharing or perhaps some more
indirect impact with people becoming more hesitant to work
across agency boundaries or even marking intelligence products
more restrictively? Mr. Paul.
Mr. Paul. Yes, in my role I have the opportunity to work
closely with our State, local, and tribal partners, and I just
want to report that the concerns about a chilling effect, they
share that. They share the concern, and we remain vigilant and
work with them to try to identify any challenges of that sort.
But so far with our partners, primarily FBI and DHS, there is a
lot of good sharing. Our different sharing initiatives continue
to move forward, things like the Nationwide Suspicious Activity
Reporting Initiative, the Nationwide Network of Fusion Centers,
and different initiatives of those ilk.
Chairman Lieberman. Good. Thanks for your answers to that.
Incidentally, one of the things I have found that I am sure
other Members of Congress have found in foreign travel that we
have done since the WikiLeaks leaks is that, somewhat in jest
but not really, often leaders of foreign countries that we are
meeting with will say, ``I hope this is not going to appear on
WikiLeaks.'' So they are hoping that there is a certain
confidence and trust in the exchange of information. And, of
course, we say, ``Oh, no.'' And then the person from the
embassy usually says, ``No, we have taken care of that
problem.'' But it did affect the trust of allies around the
world.
One of the things that Congress called for in the
Intelligence Reform and Terrorism Prevention Act was the use of
technologies that would allow ``role-based access'' to
information in government systems--in other words, that people
would have access to information necessary for their work, but
would not have overly broad access to information that they did
not need.
One of the key lessons, obviously, from WikiLeaks is that
we have not yet made enough progress toward that goal as we
need to, and if such capabilities had been in place on SIPRNet,
I presume Private Manning would never have had access to that
much information, if any at all.
Ms. Takai, maybe we will start with you. What are the key
challenges associated with implementing role-based access as I
have defined it across our classified and sensitive information
systems?
Ms. Takai. Thank you, Mr. Chairman. I would like to start
first by just giving you an update on where we stand at DOD in
terms of rolling out a PKI-based CAC card for SIPRNet.
Chairman Lieberman. Good.
Ms. Takai. We are in the process and, in fact, they are in
production, if you will, through our trusted foundry on those
cards. We are anticipating the completion of the rollout by the
end of 2012 so that all the individuals who today need SIPRNet
and use SIPRNet will have PKI identification.
Chairman Lieberman. Have you defined those terms while I
was away? Or would you want to do so now, PKI and the CAC card,
for the record?
Ms. Takai. Effectively the common access card is a card
that you actually utilize with your computer that actually
identifies you when you log on to the computer. So it is a much
more sophisticated password, if you will. It gives you a user
name and password, but it more clearly identifies you, and then
from that more clearly can identify the role that you play in
the organization and then through that the information to which
you should have access.
Chairman Lieberman. So that would all limit access based on
what the position of the card holder was and the presumed needs
to know of the card holder.
Ms. Takai. That is correct, sir. But to the second part of
your question in terms of our rollout plan and the steps that
we need to go through, the cards are actually rolled out to
each individual who has a computer, so our deployment plan is
to actually get the physical cards and the physical readers
installed on all of the computers for those individuals that
require access to SIPRNet.
The second thing is that through the trusted foundry we
have a manufacturing process for those cards, and they have a
capacity for a certain number of cards, so that also is a
factor.
So, again, in order for us to really complete 100 percent,
we have to take into account those two factors, and also the
fact that many of the computers where this is needed are, as
you could well imagine, in many locations around the globe. And
that is not only, of course, certainly on the ground, but on
ships and so on. So it will take us a while, by the end of
2012, to have that deployment complete.
But I think it is important to note, in addition to just
the physical deployment of the cards and on the various
computers, that it will then take us additional time to make
sure that we get the roles associated with the information
connected. So the cards give us the capability to do that, and
then we will continue the deployment to link the information to
that.
Chairman Lieberman. That is encouraging. Thanks. Senator
Collins.
Senator Collins. Thank you, Mr. Chairman. Just a couple
more questions.
Mr. Ferguson, when I think about the WikiLeaks incident, I
think not only of the failures of technology but also a failure
to focus on certain red flag behavior that was exhibited by the
suspect. And it reminds me very much of what our investigation
found when we looked into Major Hasan's behavior prior to the
massacre at Fort Hood.
If the media reports are correct, Private Manning exhibited
problems such as mental health issues, an assault on
colleagues, and the fact that supervisors had recommended that
he not be sent to the front lines.
These are all pretty big red flags, and I am wondering why
they did not lead to a restriction in his access to classified
information. I do not know whether you are the right person for
me to ask that question to, but my point is there is more than
just technology at stake here. If we have a high-ranking
official and we use the user role approach but that individual
becomes unstable or embraces Islamist radicalism or there is
some other reason that would cause the individual to pose an
insider threat, do we have the systems in place to catch that
individual?
Mr. Ferguson. Senator, I probably cannot really speak to
the specifics of Private Manning. It is an ongoing
investigation. However, your point, though, about a process to
identify behaviors that we should be concerned about, we have
taken a look at that, and the training that we had in place--
whether it was Hasan or this case--was not sufficient to give
his supervisors the pieces of data they would need to put
together and say this person is a problem, or in some cases to
take action when they did suspect something was wrong.
So what we have done in the Department is begin to shape
with new policy and direction how to better train supervisors
in how to best identify behaviors that would be of concern.
That is one piece, but they also have to be willing to take
action, and that is part of the other problem. It is not that
somebody might say that this behavior is irregular. It is also
in some cases a fear to take action, or it may reflect on them
as a failure or it may reflect on them in some other way. And
so there are two hurdles here. It is teaching people how to
identify the characteristics, but it is also teaching people
that the right thing to do is to take action.
Senator Collins. I am concerned because we have seen two
recent cases where tremendous damage was done, despite the fact
that there was ample evidence, it appears--I am less familiar
with the case we are discussing today--that something was
dramatically wrong. That is an issue that I am eager to pursue,
and I think your point about training is a very good one.
Mr. Paul, just for my last question, you mentioned in your
testimony that there is a fragmented approach to computer
security across the Federal Government, and I think I can speak
for the Chairman when I say that we could not agree with you
more, and that is one reason we have introduced our
cybersecurity bill which will apply to the civilian agencies
and also try to work with the private sector to develop best
practices. But our bill does not deal with the intelligence
community or the military computer systems.
You also in your testimony pointed out that you are not an
operational office at DNI and that you are heading a task force
on this issue. What are you telling us? Are you telling us that
the DNI needs more authority to prevent this fragmented
approach where one intelligence agency may have a totally
different approach to security, classification, and access than
the Department of Defense?
Mr. Paul. So when I was using the description of
``fragmentation,'' what I was referring to was that agencies
put in place specific agency-based solutions. Those solutions
serve for specific needs. But then when you look at more broad
information sharing and protection with other agencies, the
solutions tend to not work as well. An example of this is, as
we look at things like identity management frameworks--some of
my panelists have talked about identity management. That is
foundational to being able to do information sharing and
information protection. We have several different identity
management frameworks across the scope of the Federal
Government, our State and local partners, and so forth. Those
frameworks are mostly aligned, but we need to make sure that as
they get implemented, they are implemented in a way that is
consistent across all the different partners. If that does not
happen, then you run into challenges when information moves
across organizational boundaries.
The second part of your question was about my role in co-
chairing the Information Sharing and Access Interagency Policy
Committee. A key thing that we are trying to do in that group
is to harmonize policy frameworks across the different agencies
to make sure that on one hand, we have the consistent
framework, but on the other hand, we are not slowing down
operational considerations in those agencies so that the
variations that occur are truly because of mission requirements
and not because we are not effectively working together.
Senator Collins. Ms. Stone.
Ms. Stone. Thank you. If I could just add to that, across
the intelligence community we are working very hard to have
comprehensive guidelines and processes that are consistent and
interoperable. We are working on leveraging public key
infrastructure and attribute-based access control to have a
more comprehensive identity and access management. We are
standardizing data protection models to have several levels of
security, and we are working on an enterprise audit framework.
So within the intelligence community, while we may have
different systems, we are working very hard from the Office of
the Director of National Intelligence to more standardize and
ensure consistency across those networks. The way we then plug
in with the rest of the government--and, indeed, we must be
interoperable with the rest of the government, of course--is
through this interagency group that we are working on together
with everyone at the table and others to ensure that we can, in
fact, be coordinating and consistent with the other offices.
And we are still working through exactly what that looks like,
but that is certainly a concern that we are all very well aware
of.
Senator Collins. Thank you. Just two final concluding
comments. I would note that the Government Accountability
Office (GAO) continues to list information sharing,
particularly with regard to terrorism-related information, as a
high-risk activity, and it is on the high-risk list again this
year.
And, finally, as we look at the user role approach, which I
brought up in my opening statement and which we have commented
on today, we do have to be careful that does not translate back
to the bad old days where no one shared anything and where we
had stovepipes because we are defining who has access so
narrowly that we deny access to analysts who really need that
information.
So it is a very difficult task that you are all embarking
on, but in this day and age, that an individual could be able,
undetected for so long, to download and illegally distribute
hundreds of thousands of important cables, reports, and
documents is just inconceivable to me. So, clearly, we have a
long way to go to strike the right balance.
Thank you, Mr. Chairman.
Chairman Lieberman. Thank you, Senator Collins, very much.
Thanks again for taking the chair while I had to leave.
Just a few more questions, and I want to follow up first
with one to you, Mr. Paul, following up on the question I asked
Ms. Takai before about role-based access. In your testimony,
you note the fact that there are at least five distinct
identity credential and access management frameworks in use by
Federal agencies, and, of course, that makes me wonder whether
that limits the ability to implementation the kind of role-
based access capabilities that the IRTPA required in systems in
a cost-effective way. I wonder if you could talk about what you
are doing, hopefully in cooperation, perhaps, with the other
witnesses here today, to harmonize those different access
frameworks.
Mr. Paul. Sure. Thank you for the question. There are these
five different frameworks, but they are really not that
different. They are different enough, though, that it requires
the attention of my office and other bodies--the Federal Chief
Information Officer Council, for example, and my colleagues
here--to make sure that as the frameworks get implemented in
the different agencies and with our State, local, and tribal
partners, that we do not allow for variations or that
variations are controlled and reflect mission requirements and
the like. So a focus of my office is to work with the
interagency, bringing together groups to make sure that as
these frameworks get implemented, they are implemented in a
consistent way.
Building on top of that, it is critical, as we look at
role- and attribute-based access controls that you both have
highlighted, that the framework for doing those, how we define
roles, how we, to use a colloquialism, tag data, how we tag
people, and that tagging occurs in different places. A person
may be tagged in one agency, data may be tagged in another, and
we want to be able to have that data move in an appropriate way
with policy enforcement. That means there needs to be a
consistent framework for how that happens, and coordination,
and this goes to some of what you have heard from me and others
about the importance of governance of the standards and
architecture approach. So those are contributions that are
catalyzed through the efforts of my office in close cooperation
with my mission partners.
Chairman Lieberman. Good. I urge you on in that.
Mr. Ferguson, I mentioned in my opening statement the great
successes that we have had in the past few years in Iraq and
Afghanistan in disrupting terrorist networks in those countries
with our military and intelligence agencies working very
closely together and doing so in a remarkably rapid way,
sometimes exploiting information from one raid or one source
and using it within an hour elsewhere, or quicker.
As you make changes to improve the security of classified
networks at DOD and in the intelligence community, are you
taking steps to ensure that those efforts will not diminish or
slow down our ability to carry out the kinds of operations I
have just described?
Mr. Ferguson. Yes, sir, absolutely. Even though the process
was to allow personnel working in a secured facility to access
the SIPRNet and pull down data and copy it through open media.
Chairman Lieberman. Right.
Mr. Ferguson. For example, so we could have more agility
and flexibility. We have gone back and taken a look at how that
process worked, and we have found that by creating just a kiosk
process and a two-man rule, we can still move at the same speed
and have the same agility without giving everybody the same
availability to the information and being able to pull the data
down and copy it. So it is very much in mind to make sure that
we do not hinder our ability to carry out the operations.
Chairman Lieberman. Good. Do you want to add anything, Ms.
Takai?
Ms. Takai. Yes, I would. I think one of the things that is
very important is that we continue to see the dramatic need for
information and information sharing by the warfighter and so,
if anything, the demand for that information continues to grow.
And so as we are looking at the technology, just to relate back
to what Mr. Paul said, part of our efforts are to ensure within
DOD we are eliminating our fragmented environment, which has
grown up over time, through our legacy base of the way that our
networks and our databases have grown up. And so I wanted to
make sure that I added that there was a relationship between
the work that Mr. Paul is doing and the work that we are doing
internal to DOD, and I am sure my partners here are all
undergoing the same thing. I think that is really what Ms.
Stone was talking about. And those things in combination with
being able to apply cybersecurity enhancements are really going
to give us an opportunity to get that information out there as
quickly as today and in some cases even faster than today, but
to do it in a secure way.
Chairman Lieberman. That is excellent. Let me ask a final
question. Based on the testimony you have provided, really in
what you are doing to respond to the challenges that were
illuminated by the WikiLeaks case, but also to protect the
information-sharing environment, one, have you seen any areas
where you think you would benefit from statutory changes? And,
two--and this is a question that I ask in a limited way in this
fiscal environment--are there any funds we should be targeting
to particular uses that we are not now doing to assist you in
responding to this crisis? Maybe we will start with Mr. Kennedy
and go down the table, if anybody has anything to say.
Mr. Kennedy. Thank you very much, Mr. Chairman. I cannot
think of any additional legislative authority. I think you have
done two things. You have given us the intent, and then you
have given us the command. And I think we know from what you
have said and what we know internally which way we should go.
On the funding, I can always say that an institution as
small as the State Department can always use additional funding
given the range of demands upon us. But I believe that we have
a role-based access system in place that we use to distribute
material within the State Department. If you are on the French
desk, you get one set of materials. If you are on the Japan
desk, you get another. As I mentioned earlier, we will continue
to push State Department reporting to the other agencies, but
it does, I will admit, put a burden on them to then take our
material which we have provided to Secretary of Defense, so to
speak, to DOD, and then to distribute that to their people
according to the roles that only they are capable of defining,
because I think it would be wrong for me to say which
individuals within an entity as large as the Defense Department
or as large as the DNI or the intelligence community which
analyst needs what. So we send it to them, and I think they may
be the ones who have to answer that second question about how
they are going to distribute it efficiently and effectively as
both you and Senator Collins have talked about.
Chairman Lieberman. Thanks. Ms. Takai, any legislative
recommendations or budget targeting?
Ms. Takai. In terms of the legislative question, I agree
with Mr. Kennedy. At this time we do not see any additional
legislation that we need. We are going through a review to
answer exactly that same question for the Secretary in terms of
is there any need for any change, not only additional funding
but a change in the cadence of the funding. And so once we have
that pulled together, we would be happy to share it with you.
Chairman Lieberman. I appreciate it. Mr. Ferguson.
Mr. Ferguson. I would have to agree on the legislative
side, and certainly as Ms. Takai has pointed out, as we go
through this process of putting in these capabilities, what
kind of funding needs I guess we have to identify what those
real costs are and come back.
Chairman Lieberman. Ms. Stone.
Ms. Stone. Similarly, on the legislative question, I think
we have what we need for now, although I would reserve the
right to come back if we discover we need something else.
And on the funding piece, again, we do have an interagency
process ongoing looking at exactly what we might do with
different options, so we would have to see where that comes
out. But I do believe there is at least something in the fiscal
year 2012 proposal submitted by the President to work on some
of these issues.
Chairman Lieberman. Good. Mr. Paul.
Mr. Paul. Just to echo Ambassador Kennedy, the laws and the
statutes that this Committee has championed provide an adequate
basis, a fine basis. I know in the context of the information-
sharing environment that it is my responsibility, there is
enough authority. It is an issue for me now of execution and
leadership.
Chairman Lieberman. Good. Thank you all. Senator Collins.
Senator Collins. Thank you.
Chairman Lieberman. Well, thanks very much, again, for your
prepared testimony and the oral testimony, and I emerge
encouraged that you are certainly dealing with the specific
series of vulnerabilities that the WikiLeaks/Manning case
revealed, and I presume in the nature of the modern world with
technology, innovation, and exploitation what it is, you will
also be thinking about the next way in which somebody might try
to take advantage of our information-sharing environment. But I
think that we have raised our guard in a sensible way and also
continue to share information, which we need to do, is what I
take away from this hearing, and I appreciate that very much.
The record will remain open for 15 days for any additional
questions or statements. With that, the hearing is adjourned.
[Whereupon, at 4:36 p.m., the Committee was adjourned.]
A P P E N D I X
----------
[GRAPHIC] [TIFF OMITTED] T6677.001
[GRAPHIC] [TIFF OMITTED] T6677.002
[GRAPHIC] [TIFF OMITTED] T6677.003
[GRAPHIC] [TIFF OMITTED] T6677.004
[GRAPHIC] [TIFF OMITTED] T6677.005
[GRAPHIC] [TIFF OMITTED] T6677.006
[GRAPHIC] [TIFF OMITTED] T6677.007
[GRAPHIC] [TIFF OMITTED] T6677.008
[GRAPHIC] [TIFF OMITTED] T6677.009
[GRAPHIC] [TIFF OMITTED] T6677.010
[GRAPHIC] [TIFF OMITTED] T6677.011
[GRAPHIC] [TIFF OMITTED] T6677.012
[GRAPHIC] [TIFF OMITTED] T6677.013
[GRAPHIC] [TIFF OMITTED] T6677.014
[GRAPHIC] [TIFF OMITTED] T6677.015
[GRAPHIC] [TIFF OMITTED] T6677.016
[GRAPHIC] [TIFF OMITTED] T6677.017
[GRAPHIC] [TIFF OMITTED] T6677.018
[GRAPHIC] [TIFF OMITTED] T6677.019
[GRAPHIC] [TIFF OMITTED] T6677.020
[GRAPHIC] [TIFF OMITTED] T6677.021
[GRAPHIC] [TIFF OMITTED] T6677.022
[GRAPHIC] [TIFF OMITTED] T6677.023
[GRAPHIC] [TIFF OMITTED] T6677.024
[GRAPHIC] [TIFF OMITTED] T6677.025
[GRAPHIC] [TIFF OMITTED] T6677.026
[GRAPHIC] [TIFF OMITTED] T6677.027
[GRAPHIC] [TIFF OMITTED] T6677.028
[GRAPHIC] [TIFF OMITTED] T6677.029
[GRAPHIC] [TIFF OMITTED] T6677.030
[GRAPHIC] [TIFF OMITTED] T6677.031
[GRAPHIC] [TIFF OMITTED] T6677.032
[GRAPHIC] [TIFF OMITTED] T6677.033
[GRAPHIC] [TIFF OMITTED] T6677.034
[GRAPHIC] [TIFF OMITTED] T6677.035
[GRAPHIC] [TIFF OMITTED] T6677.036
[GRAPHIC] [TIFF OMITTED] T6677.037
[GRAPHIC] [TIFF OMITTED] T6677.038
[GRAPHIC] [TIFF OMITTED] T6677.039
[GRAPHIC] [TIFF OMITTED] T6677.040
[GRAPHIC] [TIFF OMITTED] T6677.041
[GRAPHIC] [TIFF OMITTED] T6677.042
[GRAPHIC] [TIFF OMITTED] T6677.043
[GRAPHIC] [TIFF OMITTED] T6677.044
[GRAPHIC] [TIFF OMITTED] T6677.045
[GRAPHIC] [TIFF OMITTED] T6677.046
[GRAPHIC] [TIFF OMITTED] T6677.047
[GRAPHIC] [TIFF OMITTED] T6677.048
[GRAPHIC] [TIFF OMITTED] T6677.049
[GRAPHIC] [TIFF OMITTED] T6677.050
[GRAPHIC] [TIFF OMITTED] T6677.051
[GRAPHIC] [TIFF OMITTED] T6677.052
[GRAPHIC] [TIFF OMITTED] T6677.053
[GRAPHIC] [TIFF OMITTED] T6677.054
[GRAPHIC] [TIFF OMITTED] T6677.055
[GRAPHIC] [TIFF OMITTED] T6677.056
[GRAPHIC] [TIFF OMITTED] T6677.057
[GRAPHIC] [TIFF OMITTED] T6677.058
[GRAPHIC] [TIFF OMITTED] T6677.059
[GRAPHIC] [TIFF OMITTED] T6677.060
[GRAPHIC] [TIFF OMITTED] T6677.061
[GRAPHIC] [TIFF OMITTED] T6677.062
[GRAPHIC] [TIFF OMITTED] T6677.063
[GRAPHIC] [TIFF OMITTED] T6677.064
[GRAPHIC] [TIFF OMITTED] T6677.065
[GRAPHIC] [TIFF OMITTED] T6677.066
[GRAPHIC] [TIFF OMITTED] T6677.067
[GRAPHIC] [TIFF OMITTED] T6677.068
[GRAPHIC] [TIFF OMITTED] T6677.069
[GRAPHIC] [TIFF OMITTED] T6677.070
[GRAPHIC] [TIFF OMITTED] T6677.071
[GRAPHIC] [TIFF OMITTED] T6677.072
[GRAPHIC] [TIFF OMITTED] T6677.073
[GRAPHIC] [TIFF OMITTED] T6677.074
[GRAPHIC] [TIFF OMITTED] T6677.075
[GRAPHIC] [TIFF OMITTED] T6677.076
[GRAPHIC] [TIFF OMITTED] T6677.077
[GRAPHIC] [TIFF OMITTED] T6677.078
[GRAPHIC] [TIFF OMITTED] T6677.079
NEWSLETTER
|
Join the GlobalSecurity.org mailing list
|
|