UNITED24 - Make a charitable donation in support of Ukraine!

Homeland Security

[House Hearing, 111 Congress]
[From the U.S. Government Printing Office]







                         [H.A.S.C. No. 111-51]
 
 CYBERSPACE AS A WARFIGHTING DOMAIN: POLICY, MANAGEMENT AND TECHNICAL 
                    CHALLENGES TO MISSION ASSURANCE

                               __________

                                HEARING

                               BEFORE THE

    TERRORISM, UNCONVENTIONAL THREATS AND CAPABILITIES SUBCOMMITTEE

                                 OF THE

                      COMMITTEE ON ARMED SERVICES

                        HOUSE OF REPRESENTATIVES

                     ONE HUNDRED ELEVENTH CONGRESS

                             FIRST SESSION

                               __________

                              HEARING HELD

                              MAY 5, 2009

                                     
[GRAPHIC] [TIFF OMITTED] TONGRESS.#13

                                     

                  U.S. GOVERNMENT PRINTING OFFICE
57-218                    WASHINGTON : 2010
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing 
Office, http://bookstore.gpo.gov. For more information, contact the 
GPO Customer Contact Center, U.S. Government Printing Office. 
Phone 202-512-1800, or 866-512-1800 (toll-free). E-mail, gpo@custhelp.com.  
                                     
  


    TERRORISM, UNCONVENTIONAL THREATS AND CAPABILITIES SUBCOMMITTEE

                    ADAM SMITH, Washington, Chairman
MIKE McINTYRE, North Carolina        JEFF MILLER, Florida
ROBERT ANDREWS, New Jersey           FRANK A. LoBIONDO, New Jersey
JAMES R. LANGEVIN, Rhode Island      JOHN KLINE, Minnesota
JIM COOPER, Tennessee                BILL SHUSTER, Pennsylvania
JIM MARSHALL, Georgia                K. MICHAEL CONAWAY, Texas
BRAD ELLSWORTH, Indiana              THOMAS J. ROONEY, Florida
PATRICK J. MURPHY, Pennsylvania      MAC THORNBERRY, Texas
BOBBY BRIGHT, Alabama
                 Kevin Gates, Professional Staff Member
               Alex Kugajevsky, Professional Staff Member
                     Andrew Tabler, Staff Assistant


                            C O N T E N T S

                              ----------                              

                     CHRONOLOGICAL LIST OF HEARINGS
                                  2009

                                                                   Page

Hearing:

Tuesday, May 5, 2009, Cyberspace as a Warfighting Domain: Policy, 
  Management and Technical Challenges to Mission Assurance.......     1

Appendix:

Tuesday, May 5, 2009.............................................    27
                              ----------                              

                          TUESDAY, MAY 5, 2009
 CYBERSPACE AS A WARFIGHTING DOMAIN: POLICY, MANAGEMENT AND TECHNICAL 
                    CHALLENGES TO MISSION ASSURANCE
              STATEMENTS PRESENTED BY MEMBERS OF CONGRESS

Miller, Hon. Jeff, a Representative from Florida, Ranking Member, 
  Terrorism, Unconventional Threats and Capabilities Subcommittee     1
Smith, Hon. Adam, a Representative from Washington, Chairman, 
  Terrorism, Unconventional Threats and Capabilities Subcommittee     1

                               WITNESSES

Alexander, Lt. Gen. Keith, USA, Commander, Joint Functional 
  Component Command Network Warfare, Director, National Security 
  Agency, Department of Defense..................................     6
Carey, Robert J., Chief Information Officer (DONCIO), Department 
  of the Navy....................................................     3
Krieger, Mike, Deputy Chief Information Officer/G-6, Department 
  of the Army....................................................     2
Lentz, Robert, Deputy Assistant Secretary of Defense for Cyber, 
  Identity Management, and Information Assurance, and Senior 
  Information Assurance Official, Department of Defense..........     5
Shelton, Lt. Gen. William L., USAF, Chief of Warfighting 
  Integration, Chief Information Officer, Office of the Secretary 
  of the Air Force...............................................     4

                                APPENDIX

Prepared Statements:

    Alexander, Lt. Gen. Keith....................................    94
    Carey, Robert J..............................................    44
    Krieger, Mike................................................    34
    Lentz, Robert................................................    66
    Miller, Hon. Jeff............................................    32
    Shelton, Lt. Gen. William L..................................    54
    Smith, Hon. Adam.............................................    31

Documents Submitted for the Record:

    [There were no Documents submitted.]

Witness Responses to Questions Asked During the Hearing:

    [There were no Questions submitted during the hearing.]

Questions Submitted by Members Post Hearing:

    Mr. Murphy...................................................   121
    Mr. Smith....................................................   101
    Mr. Thornberry...............................................   109

 CYBERSPACE AS A WARFIGHTING DOMAIN: POLICY, MANAGEMENT AND TECHNICAL 
                    CHALLENGES TO MISSION ASSURANCE

                  House of Representatives,
                       Committee on Armed Services,
        Terrorism, Unconventional Threats and Capabilities 
                                              Subcommittee,
                              Washington, DC, Tuesday, May 5, 2009.
    The subcommittee met, pursuant to call, at 3:58 p.m., in 
room 2212, Rayburn House Office Building, Hon. Adam Smith 
(chairman of the subcommittee) presiding.

  OPENING STATEMENT OF HON. ADAM SMITH, A REPRESENTATIVE FROM 
  WASHINGTON, CHAIRMAN, TERRORISM, UNCONVENTIONAL THREATS AND 
                   CAPABILITIES SUBCOMMITTEE

    Mr. Smith. Good afternoon. Call the meeting to order. Sorry 
about the delay. Votes came at a bad time, and then I got 
waylaid by a conversation on my way over here, but I do want to 
thank all of you for being here today. Appreciate your presence 
on this very important topic and look forward to hearing from 
all of you.
    I will keep my opening statement very, very brief except to 
say that cyber security is an incredibly important element of 
our national security with many, many complex pieces to it. 
Obviously it involves a multi-agency process; also it involves 
the private sector and a variety of different challenges that 
are very complicated and complex.
    And our goal in this committee is to help work with the new 
administration and all the appropriate agencies to try to 
develop a comprehensive strategy to approach our network 
security needs and our broader cyber security interests--try to 
get us to the point where we have at least some idea of what 
the plan is and are working closely together on how to 
implement that with all the different pieces of it. And I look 
forward to the testimony. We have a very, very distinguished 
panel that will help shed some light on this issue and help let 
us know what the pathway forward is.
    And with that, I will yield to our ranking member, Mr. 
Miller, for any opening statement that he might have.
    [The prepared statement of Mr. Smith can be found in the 
Appendix on page 31.]

 STATEMENT OF HON. JEFF MILLER, A REPRESENTATIVE FROM FLORIDA, 
     RANKING MEMBER, TERRORISM, UNCONVENTIONAL THREATS AND 
                   CAPABILITIES SUBCOMMITTEE

    Mr. Miller. Thank you very much, Mr. Chairman. I have a 
full statement that I would like submitted into the record.
    [The prepared statement of Mr. Miller can be found in the 
Appendix on page 32.]
    Mr. Miller. I associate myself with your remarks, and as we 
all know, breaches in our security have taken place time and 
time again. The Joint Strike Fighter [JSF] Program highlights 
the vulnerability that currently exists today. Our charge is to 
help you get the job done, and that is what we are here for, so 
thank you.
    Mr. Smith. Thank you.
    Just in connection, I had one further thought. It is not 
just a matter of cyber security preventing attacks. We need to 
look at our entire system's--our entire IT [information 
technology] infrastructure in terms of what we need to get out 
of it and how to best make that system work on a variety of 
different needs including, of course, making sure that it is 
protected from our adversaries or those who wish to do us harm.
    With that I will introduce the panel. I will go--introduce 
all of you, and then we will just start with Mr. Krieger and 
work our way across the panel.
    As you have noticed, there is five of you, and try to keep 
your testimony between five and ten minutes at the most. We 
don't want to go on too long before we get into the 
interaction. I know that is very difficult on a subject this 
complex, but appreciate your cooperation so we can get into the 
questions from the members.
    So I will introduce the panel. First we have Mr. Mike 
Krieger, who is the deputy chief information officer for the 
U.S. Army; Mr. Rob Carey, who is the chief information officer 
for the U.S. Navy; we have Lieutenant General William Shelton, 
United States Air Force, chief of warfighting integration, 
chief information officer, Office of the Secretary of the Air 
Force; we have Mr. Robert Lentz, who is the deputy assistant 
secretary of defense for cyber, identity management, and 
information assurance--that sounds like a complicated job, and 
it is; and lastly, we have Lieutenant General Keith Alexander, 
who is the director of the National Security Agency.
    We appreciate all of you being here. We look forward to 
your testimony and to the Q & A that follows.
    Mr. Krieger.

 STATEMENT OF MIKE KRIEGER, DEPUTY CHIEF INFORMATION OFFICER/G-
                   6, DEPARTMENT OF THE ARMY

    Mr. Krieger. Good afternoon, Chairman Smith, Congressman 
Miller, and distinguished members of the subcommittee. As the 
United States Army's deputy chief information officer and 
deputy G-6, I am pleased to appear before the subcommittee this 
afternoon to discuss the Army's activities to address the 
challenges to enhance mission assurance in cyberspace as a 
warfighting domain.
    The Army believes that our enterprise network, known as 
LandWarNet, must be viewed as a critical enabler for the 
warfighter. This requires a change in our culture for which the 
Army is revising policies, management of people in the network, 
and enhancing technical capabilities to better detect, assess, 
and respond to cyberspace attacks.
    The Army is transitioning to a continental U.S.-based 
expeditionary force. To support this force the Army is adapting 
our institutions and LandWarNet. General Casey recently signed 
a memorandum to transform LandWarNet to a new Global Network 
Enterprise Construct, or GNEC, that is more secure, economical, 
and seamless. General Casey also designated the Network 
Enterprise Technology Command, reporting to the chief 
information officer, as the single command for network 
operations of the Army's generating force networks.
    The Army is implementing many new policies to improve cyber 
security. These policies concentrate on protecting information, 
defending systems, and creating an empowered workforce.
    Addressing the management challenges of training our cyber 
warriors and protecting our network remain top priorities in 
the Army. The Army is reviewing the development and tracking of 
its overall workforce and looking to update the career 
management fields for conducting cyberspace operations.
    Successfully mitigating cyberspace attacks and 
vulnerabilities requires unity of command and effort not only 
between the Army, other services, and the combatant commands, 
but within the Army staff. We have realigned organizations to 
streamline the command and control over the network and are 
creating an Army Cyber Task Force to better define and oversee 
cyberspace operations.
    To meet the many technical challenges the Army faces, we 
have taken many initiatives, which include a data-at-rest 
encryption solution, a secure two-way wireless capability, and 
we are working with the defense industrial base to protect 
technologies used to build our future networks and major 
weapons systems.
    In conclusion, the Army is taking action to mitigate 
persistent cyberspace threats. Using GNEC, the Army is 
addressing the challenge of changing the culture to view the 
network as a critical enabler for the warfighter. The Army's 
commitment to transforming LandWarNet will ensure commanders 
have the ability to control, defend, and fight the network as 
one enterprise.
    I thank the subcommittee for affording me the opportunity 
to share the Army's activities to operate and enhance missions 
assurance in cyberspace as a warfighting domain. This concludes 
my remarks and I look forward to answering your questions.
    [The prepared statement of Mr. Krieger can be found in the 
Appendix on page 34.]
    Mr. Smith. Thank you very much.
    Mr. Carey.

    STATEMENT OF ROBERT J. CAREY, CHIEF INFORMATION OFFICER 
                (DONCIO), DEPARTMENT OF THE NAVY

    Mr. Carey. Thank you, Mr. Chairman.
    Chairman Smith, Congressman Miller, distinguished 
subcommittee members, thank you for the opportunity to appear 
before you today. I provided a written statement and request 
that it be entered into the record.
    I would like to use this time to briefly highlight some of 
our key initiatives that will ensure the Department of Navy's 
success in the cyberspace domain. It is a time of great change, 
and as the Department of the Navy chief information officer, I 
have the honor to work across the entire Navy-Marine Corps 
team, harnessing the power of information technology for our 
sailors, Marines, and civilians.
    Our efforts in the cyberspace domain span our mission sets 
and mandate that we defend the information for the warfighters 
as well as protect the privacy of our naval team. The 
cyberspace domain is one in which we must prevail. The 
department remains on a course for interoperable, net-centric 
operations that will link warriors, sensors, networks, command 
and control platforms, weapons, and commanders, into a 
networked, distributed combat force.
    Key to our success will be the ability to balance the 
polarity between the need to share information and our 
requirement to protect it against cyber threats. We have made 
great strides in the areas of policy, management, and technical 
challenges that are enabling us to achieve this balance.
    Together with our industry partners, we have created an 
enterprise network structure comprised of the Navy/Marine Corps 
Intranet [NMCI], the department's shore-based network; 
Information Technology-21, for our float forces; ONE-NET 
[OCONUS Navy Enterprise Network], for our Navy outside of CONUS 
[continental U.S.] forces; and the Marine Corps Enterprise 
Network; as our contribution to the DOD [Department of Defense] 
vision of a trusted, dependable, ubiquitous network.
    We have seen the power of a singe enterprise network 
improving access, control, interoperability, and information 
security, and as we move toward the Naval Network Environment 
2016, our continued consolidation using the Next Generation 
Enterprise Network and a defense-in-depth and breadth, will 
further enable our ability to serve the warfighters with 
assured information.
    Our computer network defense efforts are comprised of a 
broad array of initiatives to ensure a defense-in-depth, and 
while we are making progress, much work remains. We leverage 
industry best practices and standards, such as public key 
infrastructure encryption, data-at-rest encryption, and host-
based security systems, to strengthen our cyber security.
    Our brave sailors and Marines deployed far from home in 
harm's way are the heart and soul of our organization. What 
they know and how they translate that knowledge through sound 
decisions into action will define how successful we are. And so 
we are committed to providing them the information and tools 
they need to stay current and defend the cyberspace domain in 
an increasingly complex technology-based environment.
    Thank you for your support of our information technology 
initiatives and our efforts to achieve net-centric operations 
and decision superiority. I am happy to answer any questions 
that you may have.
    [The prepared statement of Mr. Carey can be found in the 
Appendix on page 44.]
    Mr. Smith. Thank you very much.
    General Shelton.

   STATEMENT OF LT. GEN. WILLIAM L. SHELTON, USAF, CHIEF OF 
 WARFIGHTING INTEGRATION, CHIEF INFORMATION OFFICER, OFFICE OF 
                 THE SECRETARY OF THE AIR FORCE

    General Shelton. Good afternoon, Chairman Smith, 
Congressman Miller, distinguished members of the subcommittee. 
I am pleased to be here today, along with members of the DOD's 
cyber leadership team, to appear before you and address our 
efforts to meet the challenges in the cyberspace domain.
    Several years ago the U.S. Air Force recognized the growing 
importance of cyberspace. On December 7, 2005, we took the 
unprecedented step of adding cyberspace to our mission 
statement and placed that domain on an equal footing with our 
more traditional operating environments of air and space.
    Since that time, we have been moving forward to organize, 
train, and equip our Air Force for both defensive and offensive 
capabilities in cyberspace or joint operations. As we have 
continued our study of cyberspace, we are finding that the most 
significant challenge we face is the constantly evolving nature 
of the threat in cyberspace. Threats in cyberspace move at the 
speed of light, and we are literally under attack every day as 
our networks are constantly probed and our adversaries seek to 
exploit vulnerabilities in our network enterprise.
    I would like to thank the committee for its support and for 
this opportunity to highlight the outstanding efforts that the 
dedicated men and women of the United States Air Force [USAF] 
to help secure the nation and cyberspace. This domain is both 
highly complex and extremely challenging, but it is one that 
the Air Force is fully embracing.
    Thank you again, and I look forward to your questions.
    [The prepared statement of General Shelton can be found in 
the Appendix on page 54.]
    Mr. Smith. Thank you, General.
    Mr. Lentz.

   STATEMENT OF ROBERT LENTZ, DEPUTY ASSISTANT SECRETARY OF 
    DEFENSE FOR CYBER, IDENTITY MANAGEMENT, AND INFORMATION 
     ASSURANCE, AND SENIOR INFORMATION ASSURANCE OFFICIAL, 
                     DEPARTMENT OF DEFENSE

    Mr. Lentz. Good afternoon, Chairman Smith, Congressman 
Miller, and members of the subcommittee. I am pleased to appear 
before the subcommittee to discuss initiatives to enhance the 
department's and the nation's information assurance cyber 
security posture.
    This is a critical priority in the Department of Defense. 
With information and information technology assets distributed 
over a vast enterprise and with diverse domestic and 
international partners, we know that we can not execute 
operations without the GIG, Global Information Grid, or the DOD 
network.
    The GIG is where business goods and services are 
coordinated, where medical information resides, where 
intelligence data is fused, where weapons platforms are 
designed, built, and maintained, where commanders plan 
operations and control forces, and where training, readiness, 
morale, and welfare are sustained. Maintaining freedom of 
action in cyberspace is critical to the department and to the 
nation.
    Therefore, the department is focused on building and 
operating the GIG as a joint global enterprise. This enterprise 
network approach, coupled with skilled users, defenders, and 
first responders, and in partnership with the intelligence and 
homeland security communities, will allow us to more readily 
identify and respond to cyber attacks.
    The DOD information assurance cyber security program is 
thus aimed at ensuring that DOD missions and operations 
continue under any cyber situation or condition, and the cyber 
components of DOD weapons systems perform as expected. There 
are many examples of current initiatives in my statement for 
the record. I will quickly highlight a few today.
    To protect sensitive data on mobile and portable devices 
like laptops, we help make discounted encryption products 
available to all federal, state, local, and tribal government 
agencies and to NATO [North Atlantic Treaty Organization]. 
Since July of 2007, the resulting U.S. government cost 
avoidance has exceeded $98 million.
    To address cyber security risks to the defense industrial 
base we have put in place a multi-faceted pilot for threat and 
vulnerability sharing, incident reporting, and damage 
assessment. For the global supply chain, the department has 
launched a program to protect mission-critical systems.
    This year we are establishing four centers of excellence to 
support program executive offices and supply chain risk 
mitigation throughout the system lifecycle. Additionally, we 
are executing vulnerability assessments in accordance with the 
2009 National Defense Appropriations Act.
    We continue to rely on the national centers of academic 
excellence and IA [information assurance] education for 
critical cyber security skills. There are currently 94 centers 
in 38 states and the District of Columbia. One of the centers--
the University of Nebraska at Omaha--cosponsored and hosted 
last year's fifth annual International Cyber Defense Workshop.
    In 2008, the department helped bring cyber security to the 
Wounded Warrior Program. Wounded, disabled, and transitioning 
veterans are receiving no-cost vocational training in digital 
forensics, a critical technical shortfall for the nation and 
for the department. The program started at Walter Reed and is 
being expanded to other DOD and VA hospitals.
    In conclusion, the DOD's CIO [Chief Information Officer] is 
working towards a resilient and defendable core network for the 
department and for the nation in the face of the daunting 
security challenges. We are preparing the GIG [Global 
Information Grid] and the GIG-dependent missions to operate 
under duress, and we are doing so under conditions of rising 
hostilities.
    I am happy to take questions. Thank you.
    [The prepared statement of Mr. Lentz can be found in the 
Appendix on page 66.]
    Mr. Smith. Thank you very much.
    General Alexander.

 STATEMENT OF LT. GEN. KEITH ALEXANDER, USA, COMMANDER, JOINT 
    FUNCTIONAL COMPONENT COMMAND NETWORK WARFARE, DIRECTOR, 
        NATIONAL SECURITY AGENCY, DEPARTMENT OF DEFENSE

    General Alexander. Well, that was quick, Mr. Chairman----
    Mr. Smith [continuing]. Astonished. We moved very, very 
quickly through that.
    General Alexander. I won't slow it down.
    Mr. Smith. No----
    General Alexander. Mr. Chairman, Ranking Member----
    Mr. Smith. We are ahead of schedule at this point.
    General Alexander. Well, I don't know enough to fill it up, 
so I will talk briefly here.
    I would like to just give you a little bit of background 
about what NSA, the National Security Agency, but more 
importantly, what the Joint Functional Component Command [JFCC] 
for Network Warfare is doing in network operations--where we 
are, where we are going, and the way ahead, because I think it 
leverages off of what my colleagues have already brought up. It 
has to be a team to work this across the services, within DOD, 
to set up the right apparatus. So I will end on that.
    Let me go back to the beginning, and if I could, just hit 
briefly on World War II, and in World War II, just hitting on 
some of the key things that happened in World War II, 
specifically Enigma and Red and Purple, the Japanese encryption 
systems and the German encryption systems. The reason I bring 
those up, as you may recall, the Germans had Enigma; we broke 
it--actually the Poles and the Brits broke it; and in 1941 
Admiral Donitz understood that it was broken and added a fourth 
rotor to make the decrypting of those communications more 
difficult.
    From January to March of 1942 the United States lost 216 
ships off the cost--off the East Coast, and our efforts in 
Europe were going down rapidly. We were able to break that 
collectively, with industry, Army, Navy, working together with 
our allies, and it changed the balance of that war.
    And if you think about it, we broke their encryption, we 
broke the Japanese encryption, and they didn't break ours. And 
that was huge for warfighting.
    The network that we have today has taken what was an analog 
network to a digital network, and a consequence of that change, 
going from analog to packets, is huge. It allows us to leverage 
things like iPhones, the iTouch--I have 11 grandchildren, and 
they have these little iPod Shuffles; they are hooked to the 
networks. They can do things at seven years old--they are 
googling on the network. They are linked--the same network. One 
network.
    Great things are possible. Our military leverages that 
today for great good--for command and control, for integration 
of our intelligence with operations, with logistics, with 
everything we have on the battlefield. Great opportunities, 
great vulnerabilities.
    And with those vulnerabilities comes the reason we really 
have to focus as a team on cyber security. The way we are 
approaching it today does not work.
    Recently, commander of STRATCOM [Strategic Command] 
delegated to myself under net warfare [JFCC-NW], the 
responsibility for directing the defense and operations of the 
GIG as well as our current role for net warfare, so that we 
have all those missions together so that we could put the 
defense and the offense together for the good of the Defense 
Department.
    As you saw in my written statement for the record, the 
Defense Department is considering an option to stand up a sub-
unified command that would allow us to leverage the defense and 
the offense for the good of our forces around the world to 
ensure that we have the communications availability, the 
integrity of our communications, and the reliability that we 
need to conduct our missions abroad. In order to do that, the 
services and the joint community has to work together to 
support our regional combatant commands.
    So I think what each of the services has said and where we 
are is now we are looking at the steps of what we have to put 
together in the sub-unified command as an option, or in a Joint 
Functional Component Command--how will we put these 
capabilities together to ensure our networks are secure and 
provide us freedom of maneuver in cyberspace?
    So with that, a lot of work to be done is ahead of us. I 
think where the Defense Department is today is in a good place 
and moving up. We understand the problem; it doesn't mean that 
there aren't issues with training, with equipping, and with the 
tactics, techniques, and procedures that we have to do, but I 
do think that we have come up with a way of working together to 
face these and to come up with a good plan for the future.
    So with that, Mr. Chairman, I turn it back over to you.
    [The prepared statement of General Alexander can be found 
in the Appendix on page 94.]
    Mr. Smith. Thank you.
    And we will--in questions we will observe the five-minute 
rule. Hopefully--we got great very brief statements by our 
witnesses--we will have time to go around more than once. But 
just to keep it flowing we will make sure we keep everybody to 
five minutes, including me.
    My first question is just sort of a follow up on that last 
point about how coordinated the effort is in the Joint 
Functional Component Command. So when you look out across DOD, 
and certainly we have many of the key components here--Army, 
Navy, Air Force--and if you are in your position, or STRATCOM's 
position, or even a higher up, and you are going, ``How secure 
is my network?''
    How compartmentalized is that and how coordinated is that? 
You know, how much do you guys get together on a regular basis 
so that you, as the person in charge of that, or the Secretary 
of Defense, or somebody higher up can say with confidence, 
``Our network is secure and we are paying attention to the 
different pieces of it.''
    Or, I guess the better question is, to know the 
vulnerabilities--to know in a coordinated fashion so that it is 
not stovepiped, because as you know, in this situation, in many 
cases, you are only as strong as your weakest link into the 
network. How do you do that coordination within DOD?
    And then I have a follow-on question about how you handle 
the interagency piece. But just starting in DOD, and you 
touched on that a little bit, but if you would get more 
specific about how coordinated that effort is.
    General Alexander. I will hit the first part and then I 
will let Bob and some of the others----
    Mr. Smith. Okay.
    General Alexander [continuing]. Pick up on that. We direct 
the defense of the network to the Joint Task Force-Global 
Network Operations. Lieutenant General Carroll Pollett, from 
the Defense Information Systems Agency [DISA], is the commander 
of the Joint Task Force-Global Network Operations and works for 
me in that regard, and his day-to-day guy is Brigadier General 
John Davis. They put out written guidance of how to defend the 
network--the unclassified and the classified networks.
    I would like to say that our networks are secure, but that 
would not be correct. We do have vulnerabilities.
    And the issue, and one of the things that we have wrestled 
with over the last six months, is a strategy for closing those 
vulnerabilities very quickly. I think we are making good 
progress on that, because the level of problems that we have 
had with things like Conficker and others have been greatly 
diminished because of the great steps that have been taken by 
Global Network Operations but implemented by the services.
    Mr. Smith. And what were some of those steps, if you could 
walk through the specifics here?
    General Alexander. Well, let us see. In an unclassified 
forum that becomes very difficult. It would be the way that you 
use removable media, would be a great case in point--how you 
have to use removable media or not use it in a network, what 
the restraints are, dictating those restraints, how you have 
your Information Assurance Vulnerability Analysis IAVA 
compliance out there, which means, do you have your McAfee or 
Symantec antivirus software up to date? Are you using the 
latest update? Have you scanned your system for these things? 
And ensuring that those kinds of things are done.
    How do we tell that at a global scale? Others' mission is 
to look on the periphery and see if we see problems on the 
network.
    I would like to give you one key element here I think is 
crucial to it. If we try to defend our networks like we do a 
castle--the moat--we will never be successful. We have to 
defend it on the network globally, because that is how it 
exists on the network.
    And so that means we and our allies in industry and 
government have to work together in this enterprise. That is 
going to be key to our success.
    Bob, and----
    Mr. Lentz. I will give you two examples, Mr. Chairman, to 
your question. First of all, one unclassified example of the 
cooperation at a technical level is the Federal Desktop Core 
Configuration.
    The fact that we locked down the computers so tightly at 
our endpoint within the DOD network working with the services--
in fact, the Air Force led that effort--and Microsoft, which is 
our most ubiquitous product throughout the Department of 
Defense, is locked down in terms of the stable configuration, 
and that has allowed us to defend the network much more 
effectively. I think that is a technical example.
    To your first question regarding the cooperation within the 
Department of Defense, one of the things that--we have a DOD 
CIO policy that has been fully implemented is, we align every 
single service and agency within the Department of Defense to 
what we call a computer network defense service provider, or a 
Computer Emergency Response Team [CERT]. So every entity in the 
Department of Defense, from our schools to our main military 
operations, are aligned to certified CND [computer network 
defense] service providers, and those CND service providers 
work together under the leadership of STRATCOM and the JTF-GNO 
[Joint Task Force-Global Network Operations] working in 
partnership with NSA and the law enforcement community part of 
our infrastructure to work on these cyber events. So I think 
that is an example of the cooperation that goes on within the 
DOD.
    Mr. Smith. Okay.
    I will yield back the point and yield to Mr. Miller.
    Mr. Miller. Thank you, Mr. Chairman.
    Could you talk about the role that you think the federal 
government should play in securing the networks of our defense 
industry partners?
    Mr. Lentz.
    Mr. Lentz. Clearly, it is absolutely essential, in terms of 
having a robust capability in the face of the cyber attack, is, 
we need a partnership in every tier, from our international 
partners--we have found on one cyber event after another cyber 
event that they have insights that are very critical for us. 
Plus, just because of the nature of the geography, our 
international partners oftentimes will have an advanced warning 
to give us insight into cyber events.
    At the domestic level, we team with the major centers 
across the cyber landscape, to include the counter-
intelligence, the law enforcement communities, and of course, 
all the CERTs [Computer Emergency Response Teams]. And at the 
industry level, it is absolutely essential we team with the 
ISPs [Internet service providers], we team with Carnegie 
Mellon, we team with all the industry leaders in this area to 
gain insight into cyber events, particularly when it comes to 
vulnerabilities in which we have to have advanced notice in 
today's cyber environment.
    Mr. Miller. General? Would you like to answer?
    General Alexander. So the role that--just to take up where 
Bob left off--so one of the roles that the intelligence 
community and the Defense Department is going to have is, how 
do you make those identifications of the vulnerabilities and 
the signatures and how do we work those with industry and other 
government entities so that they know how to defend their 
system?
    I think if you take the analogy that I was talking about, 
this--we are defending a castle today, but we want to defend 
our network and perhaps our allies' networks, then you are 
going to have to have an early warning capability that exists 
between networks to tip and cue on problems that are coming. I 
think that is going to be key for future problems that we 
face--for example, some of these robot networks, or botnets, 
that are out there, and things like that.
    How do you defend against them? It is going to take our 
country and our allies to work together and tip and cue at 
network speed to defeat them.
    Mr. Miller. How does the DOD ensure that we--you had 
mentioned the word ``robust''--have a robust computer network 
defense and information assurance structure in place but we 
don't replicate across the service lines?
    Mr. Lentz. Well, I think we actually do have a very robust 
capability working with the services. As I mentioned, early the 
CND [Computer Network Defense] service provider program that we 
have--we have 23 different CND service providers across the 
Department of Defense, of which the services make up a good 
share of those. And each one of those CND service providers 
coordinate constantly in real time what is going on in cyber 
events.
    Mr. Smith. Mr. Marshall for five minutes.
    Mr. Marshall. Thank you, Mr. Chairman.
    I wonder what the limits of the effective partnership 
between DOD, or the nation generally, and business might be--
the private sector might be. I was involved in an enterprise at 
one point that decided it was going to acquire a bunch of 
laptops that each individual employee would then use to enter 
data while they were out. We had a range of possible laptops 
that we could pick, and some of the more expensive laptops were 
less vulnerable to damage if they were dropped, if, you know, 
they were exposed to water, to heat, et cetera, and then there 
was the question of weight, and typically the ones that were 
less vulnerable were also heavier, and so we ultimately decided 
we were going to go with the lightweight one because we could, 
in our circumstances, not have to worry too much about things 
being dropped or subjected to water or heat.
    I assume that for some of the applications that we might 
use laptops for where the Army is concerned and the services 
are concerned, going to go with the heavier version that can 
handle them. And I wonder if those--I am sure that those same 
kinds of decision-making differences between the private sector 
and the public sector exist with regard to the issues that you 
all deal with that are way above my pay grade. And I am 
wondering if you can describe where it is that your interests 
diverge or your objectives diverge in ways that will make the 
partnership more difficult.
    General Alexander. I will take a first whack at that, sir. 
Let me just give you my thought, and that is, where they 
converge are where it is in our nation's interest to ensure 
those networks exist and can function and they are reliable--
our power grid, our critical infrastructure at large. We have, 
I think, there a responsibility to partner with industry to 
assure that our nation can operate in a time of crisis, and the 
government has some kind of role there and I think we have got 
to determine--and I think some of the stuff coming out of the 
60-day review and other studies will look at, so how do we 
partner with industry to do that?
    Our partnership might be giving them early warning, sharing 
with them threat data, and helping them secure their networks 
with some of the standards that Bob talked about, in terms of 
how you would set up your desktop configuration to active 
tipping and cuing to defend their networks. One of the key 
things that industry has done on the network is their 
intellectual secrets, their financial--wealth, all that is 
stored on the networks, their personal data. Much of that is an 
industry, I think, responsibility to secure, and government 
would support in some way.
    So I think that is where it starts to diverge, as you get 
industry that is out there on its own--there are some things--
you know, our own personal communications from my wife to 
myself--that doesn't need government, and if that goes down, 
well then I won't buy the milk and bread tonight. I will be 
good.
    But, you know, our personal communications aren't a 
national priority, so I think you are going to have that range 
from those things that are, how do we ensure the security of 
our nation, so that if a network attack blossoms into a warfare 
we know where that line is.
    Mr. Marshall. There is no question a tremendous opportunity 
exists for synergy here and for taking advantage of the private 
sector's obvious interest in protecting data. I mean, literally 
billions or trillions of dollars are at stake, you know, 
besides personal private information.
    And so the private sector is paying top dollar to the best 
possible minds to protect the infrastructure that holds access 
to those kinds of money flows, to that kind of private 
information. I am wondering where it diverges in any 
substantial way.
    General Alexander. Well, I think part of the divergence is 
that, you know, they are going to harden like a shell for 
theirs, but the government is going to operate across a global 
thing with our allies, so we have a global responsibility. You 
can harden a network for an industry within a network and 
almost sever it completely and have that almost ensured 
security.
    Where we have to have an Army in the field, or an Air Force 
in the field, or a Navy out there, they are going to have 
communications that are both wireless and wired, and as a 
consequence they are going to have vulnerabilities that are far 
different than what industry might have. Now, having said that, 
it doesn't necessarily mean that there aren't things that we 
couldn't work together with or should work together with; I 
think there will be.
    So I think you will have all the way from the far you know, 
all the way over here on the far right, those things that we 
are not worried about and even if somebody loses them, to those 
things that we are worried about as the national interest; and 
then take the other axis that you were doing, the economic 
access, from those things you don't worry about somebody 
hitting over here, perhaps, in one level of industry all the 
way over to the banking industry and security of those. And 
both of those at the far end of that--the banking industry and 
our national military command authority--both have to be 
secured with the best that we have. And I think there is great 
synergy here and great divergence at the other end.
    Mr. Smith. Thank you. If you have something quick, I want 
to make sure we keep moving to the other members. Mr. 
Thornberry.
    Mr. Thornberry. Thank you, Mr. Chairman. If we are 
literally under attack every day and are to treat cyber as a 
domain of warfare, like we have treated others, it seems to me 
we have to have the legal, policy, and doctrine discussions as 
well as funding, training, equipping, and all the things that 
go with domains of warfare that we are serious about.
    General Shelton, you mentioned the Air Force has been in 
front on this. Does the Air Force have a specific plan to 
implement what Secretary Gates talked about in quadrupling the 
number of people trained in cyber warfare?
    General Shelton. Yes, sir. We are moving out on adapting 
courses--adopting courses. There are joint courses we are 
pursuing that are already in place. There are new ones that are 
standing up.
    We are changing the way we train at our training centers, 
both officer and enlisted, and also creating training 
opportunities for our civilians. So the answer is, absolutely. 
We are trying to expand our universe in terms of trained people 
in this area.
    Mr. Thornberry. But is that down to the point where there 
is a piece of paper that shows, we are going to ramp up our 
training to meet this specific number that he talked about that 
has been signed off on?
    General Shelton. We aren't there yet, sir, to the actual 
numbers, but we do have a way ahead in terms of concept. But is 
it numerically in place? It is not.
    Mr. Thornberry. I am just trying to understand how far we 
have gotten towards being serious--and I am not picking on you, 
particularly--but just how far we have gone to being serious 
about some of these tough issues.
    General Alexander, to pick on you a little bit--not really 
pick on you, but----
    General Alexander. Thank you.
    Mr. Thornberry [continuing]. But what are the policy and 
legal issues that we need to be thinking about? I mean, a lot 
of this is the stuff that is in you all's bailiwick, and we 
have got to oversee the funding and so forth, but it seems to 
me there are some legal policy issues that are our 
responsibility. What are they?
    General Alexander. I think one of the clear ones--what you 
would expect us to do is to defend our networks, and we have 
the right to defend our networks and to keep adversaries from 
getting into our networks, to secure our classified networks 
and all of that. And I think there is inherent right, and we 
have the legal framework to go ahead and do that.
    Here is where it starts to break down and where I think 
you, with the administration and others--the discussion that we 
are now going to enter into. I think once the 60-day review has 
come up, and so now going back to the earlier question, so what 
is that role and responsibility primarily with DHS [Department 
of Homeland Security], because they will have to lead for the 
rest of the dot-gov networks and for that partnership with 
industry, so what is the legal framework for sharing threat 
signatures with industry that are classified? How do we do it 
at network speed so that it is defensible? And what is that 
legal framework and what is that operational framework?
    And those are areas that technically are easier to do than 
they are to set the legal framework up, because you have 
industries--for example, your antivirus community. If we give 
them a classified signature, how do we ensure it is not given 
out so widely that our adversaries have it when they are a 
global antivirus community? Things like that we are going to 
have do look at. There is a whole series of issues, I think, in 
those realms.
    Mr. Thornberry. Well, for example, when the Constitution 
says Congress has the responsibility to declare war, what does 
that mean when we are under attack every day? How do we deal 
with warfare in cyberspace?
    General Alexander. Well, I think the loose use of the word 
``under attack'' and ``warfare'' is probably more accurately 
described as people probing our network. We call that, I 
think--others loosely call that an attack on your network, but 
it falls short of what I think we would legally look at, and I 
have got the head lawyer back there right behind me, so he will 
raise his hand and make sure I say this right, but----
    Mr. Smith. He was nodding his head. Let the record reflect 
it.
    General Alexander. This way, or this way?
    Mr. Thornberry. Well, was Estonia or Georgia under attack, 
and was their infrastructure under attack in a way that, you 
know, gets closer to that declaration of war?
    General Alexander. No, I think you are starting to--on 
those you are starting to get close to what would be. The 
problem that you have there is who. The attribution. And so I 
think what you have is the inherent right to defend first, and 
attribute, and preferably to do those at network speed. So what 
we just agreed on, I think, if you agree with those two 
statements to do those both at network speed, is the reason 
that we need the defense, the exploit, and the attack to work 
synonymously as a team at network speed to do just that.
    Because if we don't--if we leave the defend, to defend 
itself and they are getting hit over here and somebody says, 
``Hey, did you know they are getting hammered? The Air Force is 
getting hit on the network,'' we would say no, we didn't. It 
has happened to our industry players. And so if you are not 
aware of it you can't help mitigate it, you can't help 
attribute it.
    So that partnership has to come in. I think in the legal 
framework it starts to go up to, when is it going from exploit 
to damage? And in that change is where you go from what I will 
call spying operations into warfare.
    And there is, I think, a more specific set of terms that 
would define those, and--did I get all that right, Bill?
    Mr. Smith. Mr. Langevin.
    Mr. Langevin. Thank you, Mr. Chairman.
    Gentlemen, thank you for your testimony here today.
    To continue on that line, General Alexander, clearly the 
tools available to us in cyberspace are very powerful. I know 
the NSA, in particular, is very good at what we do. How far 
down the road are we in really setting the rules of engagement, 
and who and when do those decisions get made?
    Clearly modern warfare has forever changed; we will never 
have a conflict in the future that doesn't have a cyber 
component to it. And where are we on that stage, you know, in 
terms of where we escalate to the fact--to where we would 
attack and cause great damage in response to an attack on our 
own networks? Where are the rules of engagement at this point, 
and who is going to make those decisions along the way?
    General Alexander. Well, I think if you start out within 
the defense community, those rules for defending, exploiting, 
and attacking on the networks as part of war fall within the 
Defense Department. I think we can easily envision--there was a 
Chinese PLA [People's Liberation Army] statement in 1996 that 
said something to the effect, ``If you want to attack the 
United States, attack its banking system.''
    Now, the issue--this complicates it and it puts us into 
answering your question more accurately. It gives you a 
understanding that it may not be the Defense Department that is 
attacked.
    But if we assume symmetrically that they would attack us, 
the Defense Department, and the Defense Department would 
respond back, you are now into one form. The issue, I think, 
that realistically faces us, though, is that it would be 
asymmetrical. It would go against our industry, and it might be 
our critical infrastructure.
    And then the question of the partnership between the 
Defense Department, Homeland Security, and the intel community 
has to be clear. We have to have laid out those rules and 
walked through that. We are walking our way down that; we are 
not far enough.
    I think within the DOD we have laid out the legal framework 
for what constitutes an attack, how we defend our networks, 
what we do in that--specific to the Defense Department for DOD 
operations, for example, on the war on terror.
    But that is a very limited and a very focused set. I think 
to really get to the heart of your question, you have to have 
that partnership and we have to operate seamlessly across all 
of those if we are going to be successful. And that is going to 
take some work.
    Mr. Langevin. In the CSIS [Center for Strategic and 
International Studies] report, the commission that I co-chaired 
and worked on with a number of others, one of the things--the 
conclusions--that we came up with was that the president should 
make clear that cyberspace and our cyber assets are a national 
asset and that we will use full assets of national power to 
protect it. Do you agree that it is time that we have, perhaps, 
a cyber Monroe document that lays out clearly what our response 
would be in terms of protecting our cyber assets?
    General Alexander. I do.
    Mr. Langevin. Let me add----
    General Alexander. There is four others that--you want to--
I do. I think they do, too, but I don't----
    Mr. Langevin. Anybody else?
    General Alexander. But, I don't want to speak for 
everybody.
    Mr. Smith. I guess the follow up to that, what would be 
involved in making sure that that is clear? Is there an 
executive order that is needed? And following up a little bit 
on what Mr. Thornberry was asking about in terms of your 
authority to act--is that understood, or is there more action 
that is needed to allow you to have that authority?
    General Alexander. Well, I think what the 60-day review is 
looking at is taken right from your study and others and 
saying, ``So how do we start that at the top? What is the White 
House role in doing that?'' And I think they are going to set 
that up and say, ``Here is the White House role,'' and lay that 
out.
    So that is yet to be fully disclosed, and I think they have 
got a couple more steps to complete that. But my gut reaction 
is that they will do essentially where you are, so we have to 
set up a national leadership for it at the White House. Roles 
and responsibility to the Defense Department, DHS, our 
partnership with industry, and our partnership with allies 
needs to be clearly documented. And I think we have to start 
walking down that road.
    The follow-on question is, okay, so you have these--you 
have the legal framework that we talked about, that has got to 
come up. You have to have the operational framework. And I 
would submit that first we have got to lay out operational 
frameworks that will work.
    There are operational frameworks that people can put on the 
table that just don't make technical sense, so that is where 
our partnership with industry really has to come to the 
forefront. What technically can we do to secure those networks 
with the Defense Department, the intelligence community, and 
DHS, and industry, and then how do we take that--what do we 
need legally to make that work? And I think we have yet to walk 
through those, and I think the first step will be when the 
White House puts out that 60-day study.
    Mr. Smith. Ask a little bit about acquisition issues, and 
maybe have the three individual services speak to their ability 
to acquire what they need technologically, because there is the 
challenge in the IT world that basically Moore's Law runs 
headlong into the acquisition process. You know, things update 
very rapidly, and yet it takes a couple of years to go through 
the ability to acquire systems.
    Now, I know reforms have been made to a certain extent 
within IT to give greater flexibility to enable you to purchase 
more equipment more quickly. How well is that working, and what 
more do we need to do to make sure you are able to buy the 
equipment that you need? And just if each one of you could sort 
of give a little vignette from your experiences within your 
individual service.
    General Shelton.
    General Shelton. Glad to start. You are exactly right. We 
have a real challenge of what I would call an industrial age 
acquisition process trying to operate in IT space, which is not 
adequate. We have vehicles that we can use to acquire IT 
solutions, and in many cases those are commercial off-the-shelf 
products or commercial off-the-shelf products that we slightly 
modify and adapt to our purposes. In some cases, the question 
is scalability, but beyond that those solutions are there.
    So I think we are in reasonably good shape from the overall 
capability to acquire. It is that we don't often exercise that 
capability the way we should, so----
    Mr. Smith. Why not?
    General Shelton. We sometimes revert to the way we have 
always acquired. So we are forcing that inside the Air Force. 
We are forcing that toward much different solutions, and we are 
forcing an architecture that will allow much different 
solutions----
    Mr. Smith. Well, Mr. Carey, if you could talk a little bit 
about Navy's experience with the Navy-Marine Corps Intranet, 
which was a big transition system in terms of the software 
being put in place--how difficult was that to acquire? Or just 
more broadly within the same acquisition area, what challenges 
are you facing? What do you think needs to be done to overcome 
them?
    Mr. Carey. NMCI [Navy Marine Corps Intranet], sir, was a 
huge culture change to the department in the IT space. To move 
from a system of lots and lots of networks controlled by 
individual unit commanders or organizational commands through a 
homogeneous, centrally-controlled network apparatus was just a 
huge culture change, so it took some time to get there.
    The acquisition process allowed us to get there----
    Mr. Smith. Okay.
    Mr. Carey [continuing]. In a reasonable amount of time, but 
imagine that it is now the largest intranet in the world, so 
grew from having hundreds of networks--we are not subsumed by 
one--using the process.
    Mr. Smith. Okay.
    Do you have anything you want to add?
    Mr. Krieger. Sir, I think your discussion on the 
acquisition process not being agile is really a cultural issue.
    Mr. Smith. Okay.
    Mr. Krieger. So I think within the acquisition process, 
both legislatively and regulatorily, the agility is there. This 
is a cultural change for the department. Can we deliver spiral 
capabilities--not a full capability--quicker and spiral it out, 
versus the culture has been to deliver a completed product over 
time?
    Mr. Smith. Well, does that also feed into sort of how 
personnel are rewarded and/or punished depending on how they do 
things? That basically there is a culture that says, ``Hey, as 
long as I am following the process, as long as I am going 
through the acquisition process there I am good. If I step 
outside of it I am in real danger''?
    Because it strikes me that it would really take, you know, 
creative personnel who understand IT to say, ``Hey, I need this 
solution now. I am going to go do it, not go through the normal 
process as empowered.''
    And I can see where you might be limited within the 
military concept, people saying, ``Look, if I do this, you 
know, I am not going to be rewarded for it if it goes well and 
I am sure as hell going to be punished for it if it doesn't go 
well.'' Is there a problem with that in terms of changing how 
we promote and reward behavior?
    Mr. Krieger. Sir, I know within the Army in the current 
global war on terrorism, we are at the point in the Army now 
that when we generate a requirement from the field of JUONS 
[joint urgent operational needs statement], and we document it, 
we are delivering capability real quick now. And so I think 
that culture is changing, and we certainly have soldiers, and 
sailors, and airmen in need now, but we are discovering, 
culturally, that it is possible to deliver IT quicker and 
outside--within the system but not the traditional way that we 
build airplanes and ships and things. And certainly there is 
lots of examples in the current war where we have identified a 
problem, we have documented the requirement, and we have 
delivered spiraled-out capability.
    Mr. Smith. Thank you. I very much appreciate it.
    I will go to Mr. Miller and then I will go to Mr. Conaway, 
who walked in right at the end of the questioning there, but we 
don't want to get you out of the loop there, so we will go to 
Miller, Conaway, and then back to the other.
    Mr. Miller. Thank you, Mr. Chairman.
    One brief question to General Alexander, if you would, in 
reference to the new idea of the new sub-unified four-star: 
Will DISA and NSA be rolled into the command and how will the 
relationship between DISA and ODNI [Office of the Director of 
National Intelligence] be affected?
    General Alexander. It is not clear, in my mind, that it 
would--it will not be rolled in, per say. I think that part--it 
will be leveraged in the foundation for it. I think we have to 
have the synergy between what NSA does for the intel community, 
for what NSA does for the cyber community, and those are 
inextricably linked.
    So, specifically today, we have JFCC-NW at NSA, and as a 
consequence of having them there at NSA they can leverage the 
different offices that look globally to do their mission. I see 
that--we growing that connective tissue between what NSA is 
doing and what this command is doing.
    I think there are some things that will be in common that 
we are going to have to put in both in the concept that is 
being looked at, and that is, how do we see cyberspace? An 
integrated cyber operations facility. What is it that you see 
for your defense? How do you see your network boundaries?
    What do you see globally? What do our allies see? What is 
going on on the network? And how do you mitigate and attribute, 
going back to the question?
    Because if you can't see it you are not doing it in real 
time. So how are you doing that in real time? How are you 
bouncing those back and forth?
    So what I imagine will happen is, we will put the pieces 
together at Fort Meade, at least in the recommendations and the 
thing that is under consideration, and then look at how you 
build the command to specifically do cyber operations, 
leveraging what NSA brings in network exploitation. And I think 
that is the key part, is to have them coexist.
    In that respect, the DNI [Director of National 
Intelligence] is comfortable and a proponent for it, because it 
does both. I think it is good for both of us and we can do 
both, in that regard.
    The second question--the logical question that stems out of 
that, and what is your relationship with DHS because they need 
some of the same support? We see that that is a foundation that 
DHS can lean on--a technical foundation--while DHS takes on its 
missions to operate and defend the rest of the dot-gov 
networks.
    Mr. Smith. Thank you. Mr. Conaway.
    Mr. Conaway. Thank you, Mr. Chairman. Since I just got here 
I will not replow----
    Mr. Smith. Thank you. Mr. Marshall.
    Mr. Marshall. Thank you, Mr. Chairman. I would like to 
return to the line of questioning that I had when I was--just a 
minute ago, and it is again, where is it that you perceive the 
private sector's interests, motivation diverging from ours?
    And General Alexander, you described, you know, a private 
sector company that might be able to--that had a similar 
interest because billions of dollars are at stake, or very, 
very sensitive information was at stake so they wanted to 
protect that information. And being able to harden itself, and 
its use probably more so than we could, practically speaking, 
given the cost associated and given the kind of uses that we 
have to make of information technology across the military.
    But can you give other examples that would help me 
understand how they diverge, and would--this is a question to 
all members of the panel, not just General Alexander.
    I know, Mr. Lentz, you were about to say something and I 
had run out of time.
    Mr. Lentz. Well, I can give you a couple examples of that. 
I think the biggest challenge we are going to have--and I think 
the laptop example that you alluded to in the beginning is a 
good example of that--when we did our data-at-rest encryption 
policy, we went out to industry, established a standard, we 
worked with industry to figure out where that bar for security 
needs to be and where they can meet that bar at the cost and 
operational effectiveness that meets both entities' standards, 
for them to make a profit, but also for us to be able to get 
the most secure capability out in the field.
    We did that very quickly over the course of several months. 
We developed the standard, and we have 12 companies that bid 
competitively for that process.
    The cost for a data-at-rest piece of software license would 
normally cost you $200 if you went and got it yourself. Because 
of this competitive standard-based process, we dropped the cost 
to less than $10 per software license. Now, that is an example 
where we had convergence.
    Now, as the bar goes higher in cyberspace because the cyber 
threat is increasing exponentially, we have to work with 
industry to build in much more robust capability. And that is 
not just dealing with encryption, but all the aspects that go 
around hardware and software.
    And that is where industry is going to have a more 
difficult time, because as that bar gets raised, their profits 
start to decrease. And that is where we have to look at the 
government-private sector partnership to figure out how we can 
get that bar raised in a cooperative way, at the same time 
maintain the competitive acquisition process.
    General Alexander. My experience with industry, though, is 
there is more convergence than there is divergence. They see 
the obvious rationale for securing the networks just like we 
do.
    More importantly, they also see that they, in part--many of 
the industry folks that I have talked to said, ``We need 
government support here.'' I don't think they want government 
compelling them to do things on the network, but I think they 
need government support in securing it and developing a 
framework--a technical framework--that is securable.
    That is probably going to be impossible, so how do we get 
as close to that as we can? I think industry is absolutely 
looking for partnership with government and with our allies 
setting up some solution like that.
    So my experience has been almost completely convergent in 
that regard. I have not seen--I asked one industry, I said, 
``Why don't we give you this problem?''
    They said, ``We can't afford to do it without government 
support.'' That was the only divergence.
    We said, ``Well, this would be one that we would throw 
over. Critical infrastructure--that is an industry thing. Why 
don't you take care of it?'' And they said----
    Mr. Marshall. So, industry interest is not broad enough to 
justify the cost, is in essence what you are saying, and so to 
the extent that we have got to have a certain level of security 
or capability, industry is not necessarily going to generate 
for us because either there are too many defeatist characters 
competing with one another with different products, and 
consequently different companies looking at those different 
products, or there are just not enough companies that are that 
interested in that level of security or capability?
    General Alexander. Banking industry clearly has a 
compelling need to create that existing secure infrastructure, 
and they are working hard to do that. There are things that 
government and industry--and that industry--could work together 
to make it even better. Your electrical power grid and some of 
your other ones are low cost when you look at the network.
    So the power companies that are going to have to go out and 
change the configuration of their networks, that is a cost that 
if you take what Bob was saying, one further step, now to 
upgrade their networks to make sure they are secure is a jump 
in cost for them, and now you are going to have to work through 
their committees, through the regulatory committees to get the 
rate increases so that they can actually secure their networks.
    So when you talk to the power industry, as an example, that 
is one where you are not going to look at, so how does 
government--because we are interested in perhaps having 
reliable power--how do we ensure that that happens as a 
critical infrastructure? So DHS and that critical 
infrastructure have to work together to walk through that.
    Mr. Smith. Thank you.
    Mr. Thornberry----
    Mr. Thornberry. Let me give the Army and Navy a chance to 
answer what you all's services are doing to train, equip, 
develop career paths for cyber warfare. Do you have cultural 
difficulties there, too, particularly in whether you see cyber 
as an enabler for the things that you are already doing or a 
domain of warfare on its own.
    Mr. Krieger. Sir, you raised a very good issue, and the 
Army is trying to come to grips with that right now and 
studying it, and we have got a study going on by TRADOC 
[Training and Doctrine Command] to figure out what we want to 
do, both at the officer level and the warrant officer level and 
the soldier and NCO level.
    The question is exactly on target. I don't have an answer 
yet, but that is what we are trying to figure out.
    Mr. Carey. We believe that everyone that engages the 
network becomes a cyber warrior at some point. If you are going 
to touch the network, you are involved in something that is 
greater than you might have actually thought. So changing that 
culture, as my colleagues have said, is something that we are 
working on very diligently right now as we move into our next 
generation network environment, and that we are bringing on 
more people to operate in this domain, both in the uniform side 
and the civilian side, to allow ourselves that span of control 
that we don't have right now inside the department.
    Mr. Smith. Thank you.
    I had one more line of questioning, but Mr. Conaway, go 
ahead.
    Mr. Conaway. Well, thank you, Mr. Chairman.
    A few of us are working on an acquisitions panel issues, 
and I was just wondering, Mr. Lentz, can we use the acquisition 
regulations and practices to incent defense contractors to be--
their cyber warfare posture, to make sure they are compliant or 
that they are protected as they need to be to handle our data 
and handle our work? Is that an appropriate use of those?
    Mr. Lentz. Yes. We are working with AT&L [Acquisition, 
Technology, and Logistics] to look at the----
    Mr. Conaway. AT&L?
    Mr. Lentz. I am sorry. The acquisition organization in DOD.
    Mr. Conaway. Okay.
    Mr. Lentz [continuing]. To look at modifying the defense 
acquisition regs and the federal acquisition regs for including 
stronger language in there regarding meeting certain security 
benchmark standards in terms of protecting information that 
resides on their networks. That is something we are doing right 
now.
    Mr. Conaway. And you think you will get pushback from the 
contractors on this deal?
    Mr. Lentz. No, we are not. In fact, they are asking for 
that language. No problem.
    Mr. Conaway. All right.
    And then, General Shelton, when you guys set up your cyber 
command, can you walk us through the rationale between why that 
was a numbered air force versus a four-star command?
    General Shelton. Sure. As we first started to look into 
this, we said a major command seemed appropriate because that 
is how we organize, train, and equip in the Air Force. But then 
as we thought more about it, we said, we are really about how 
do we operate? And the way we operate in the Air Force and 
present forces in the Air Force is through numbered air forces.
    So if we are really all about trying to provide cyber 
operations for joint employment, it is more appropriate for a 
numbered air force. And then the organize, train, and equip 
aspects can be subsumed by Air Force Space Command. So that was 
the rationale.
    Mr. Conaway. Okay. And you are comfortable with--the Air 
Force is comfortable, so far, that that was the right decision?
    General Shelton. Absolutely. Very comfortable.
    Mr. Conaway. Thank you, Mr. Chairman.
    Mr. Smith. Just quickly--in terms of personnel, we talk in 
this committee each year about the challenges of making sure 
that you have the best and the brightest folks who understand 
the IT infrastructure, because it is a constantly evolving 
thing. Whatever the systems, it really comes down to people and 
their ability to adapt.
    Just, you know, if anyone has initial thoughts. I don't 
know who would be best to comment on this, so I will throw it 
open to all of you. You know, how are you doing in terms of 
recruiting the personnel that you need to do the IT work that 
you need to get done?
    Mr. Lentz. I can start out, and then----
    First of all, and I know, Congressman Thornberry, your 
interest is on target regarding the fact that within the 
Department of Defense we have over 90,000 personnel that we 
have identified working with the services and agencies that are 
deemed to be cyber warrior-type individuals. Now, these are sys 
admin, that manage the system, and network administrators that 
have part-time jobs both to defend the network as well as to 
administer, and you can't separate those functions.
    Ninety thousand. We have a plan that we are 2 years into to 
certify all 90,000, and we right now have a goal by the end of 
this year to be at 45 percent. And so that is a major goal.
    The other thing we are doing is we are adding highly 
specialized skills on top of them, in light of the cyber events 
that we have talked about, and that will add another layer of 
more highly skilled cyber warriors that will go to schools, 
like in Pensacola and Maxwell and Fort Gordon, possibly, to be 
able to get more in-depth training working with the National 
Cryptologic School at NSA and other institutions.
    The fill rate overall--I will let the services comment on 
that--but what we are seeing right now is, the fill rate for 
those cyber warriors is a fairly good rate. We are seeing over 
90 percent, in terms of those positions that we are talking 
about right now, which, by the way, are contractors, civilians, 
and military personnel.
    Mr. Smith. All right.
    I guess just in general, in any----
    Go ahead, General. Sorry.
    General Shelton. Sir, I was just going to say, in terms of 
technical expertise we have, certainly, a concern, along with 
everyone else in the nation, that there is just not that many 
people coming out of our schools that are prepared for the 
technical-type work. They don't have the educational 
background, haven't studied math, engineering science, those 
sorts of things. So we join the course of many--this is a real 
problem for us.
    Mr. Smith. Yes.
    Gentlemen, do you have anything to add to that?
    Mr. Carey. All I would add is that we are all competing for 
that limited resource----
    Mr. Smith. Right.
    Mr. Carey [continuing]. Whether it is industry, Army, Navy, 
Air Force, Marines, we are all competing for that. And so there 
has not been a challenge that we have seen yet, but we will be 
ramping up for the coming months so we will have more 
information somewhere in the fall.
    Mr. Smith. Okay. Thanks.
    And General Alexander, I just want to follow up quickly on 
the interagency aspect of cyber security. And I think from this 
panel we have got a pretty good idea what the DOD is doing. How 
do you interact--you touched on it a little bit--I mean, 
Homeland Security theoretically is the lead agency for the 
interagency piece of cyber security.
    Does DOD sort of, you know, exist in their own world and 
work on their own systems while Homeland Security is dealing 
with the other aspects of it? What is the integration? How is 
that working?
    General Alexander. Well, for offensive operations we have a 
joint task force--joint interagency task force--which brings in 
all the players. We have great partnerships with FBI, CIA, and 
others, DHS. They sit on these panels--State Department--and 
look at the options and where we are, and I think that is well 
run.
    Where I think there is work to be done, the U.S. CERT is 
growing rapidly, which is the DHS element that would actually 
do the computer emergency response team's job for the rest of 
the dot-gov, is taking that on in a way analogous to what the 
Joint Task Force-Global Network Ops and the CERTs under it does 
with the services. So there is some room to grow in the rest of 
the dot-gov to catch up where I think the Defense Department is 
today.
    Within the intel community, I think they have a strong 
network security program so that that is running pretty good. 
What is lacking today is a integrated defense where you can tip 
and cue between the different government entities and agencies 
at network speed to defend elements of it, and that is one of 
the things we are going to have to grow, which I think DHS 
would leverage what the intel community and the DOD has today, 
both technically and the real time alerting and cuing. Think of 
that as a radar system for cyber security.
    Mr. Smith. I had one more question, but I wanted to see if 
any of my colleagues had anything further.
    Mr. Marshall. I do.
    Mr. Smith. Go ahead, Jim.
    Mr. Marshall. Thank you.
    I am continuing the same line. So, different possibilities 
here--we have got a requirement that needs to be met that we 
have identified. Industry has already met that requirement, so 
we go out and we acquire either the software or the hardware 
and that takes care of that.
    We have a requirement that has not been met by industry as 
well, and it is the banking industry. And the banking industry 
recognizes this need to secure billions and billions and 
billions of dollars of exposure that it would otherwise have. 
Or it is the up--you know, hardening the defense of the 
electrical grid, which has all these collateral public and 
private possible consequences if, in fact, there is a failure, 
that an attack is successful.
    Could you describe--is there a difference in the way we go 
about trying to figure out the partnership and who carries what 
load in--here is the banking system. It is going to get there, 
and you know it is going to get there because there is just too 
much at stake. It is the brightest people in the world they are 
able to hire, and they are going to pay them big bucks, and 
they are going to get there.
    But they would love to have us step up to the plate and pay 
for it. You know, that just makes more money for them. So there 
is obviously a give and take as we discuss with the banking 
system or banking industry who is going to do this.
    And then, where the electrical grid is concerned, they kind 
of go, ``Well, you know, we don't need that kind of level of 
security. That requirement is not one that we want to meet. We 
will take a chance on the grid going down and we will just send 
our guys out there and fix it. You know, actually, they might 
make some money. It might be better for us, in a sense, if the 
grid goes down.''
    Could you describe how you deal with those two different 
kinds of circumstances in order to figure out who carries the 
load? Well, at this--where we are talking about electrical 
grid, who winds up paying the freight, okay?
    General Alexander. I think DHS would have the lead in 
orchestrating that with the Critical Infrastructure Protection 
Advisory Committees that they have, the CIPACs, that go across 
each of those. And in the banking industry, it would be a DHS-
Treasury partnership to look at how we do it with other players 
in the community. So I think you have got DHS in the lead.
    The interesting part that you have put on the table is that 
there may be things that the government technically knows that 
would be useful to industry to secure their networks a degree 
beyond where they are today. How do we do that without risking 
some of our nation's crown jewels, but ensuring their 
protection?
    And that is one of the things where I think the partnership 
between DHS and DOD is going to have to be laid out, and I 
think it is being worked. So there is, right now--DHS has set 
up a good framework for critical infrastructure protection, and 
they have a framework for cyber throughout that.
    They work and they actually partner with DOD and the intel 
community in those regards, and I think they would draw on 
that. I don't know that anybody has come down clearly and said 
the different roles--I don't think they are at that point where 
they could define specifically the roles.
    I will pass it over to Bob.
    Mr. Lentz. Well, I think that is exactly the answer. I 
think where DHS has set the framework up under their National 
Infrastructure Protection Plan, and they are working and we are 
supporting, as an example with the financial sector, we work 
through Treasury and we compare technologies and techniques and 
procedures that we are using, and trying to raise that bar.
    And then as you work some of these other sectors, the 
interesting challenge is going to be, like you addressed, is 
going to be at some point they may say, ``That is enough. I 
can't subsidize this level of protection any longer, especially 
against a nation state.''
    And therefore, we have to have a mutual dialogue at the 
highest levels of the government with industry to determine, 
how are we going to get that bar to a level we are all 
comfortable with? And that is going to be the interesting 
discussion in the future.
    Mr. Marshall. Thank you, Mr. Chairman.
    Mr. Smith. Thank you.
    Just one final question. Mr. Thornberry had mentioned the 
attacks on Estonia and Georgia, which really sort of got 
everyone's attention about what can go beyond, you know, some 
of the more basic stuff that we face. And obviously, you know, 
our main concern right now is data-mining--people accessing our 
network and pulling out information out of it as opposed to 
affirmatively attacking the network.
    But in looking at what happened in those two countries, how 
vulnerable are our DOD networks to similar attacks? How 
confident are you that we have the, you know, system set up to 
withstand that type of an attack?
    General Alexander. I think a distributed denial-of-service 
attack from botnets, like you saw in Estonia, if large enough, 
would really hamper any network today, including the defense--
--
    And the issue is, how do we grow a defense in depth to 
ensure that we don't have that? So that is where our allies and 
partnerships with our allies is going to become crucial.
    If you try to defend it at your gateway, you surely will 
lose on that. And so you are going to have to have a defense in 
depth for that type of attack specifically.
    Mr. Smith. Forgive me. Walk me through a defense in depth, 
what that means exactly, in terms of what you try to do to 
prepare.
    General Alexander. So you would have--if you just look 
globally at the global network, instead of trying to stop all 
the stuff here, you might want to shut them down at the point 
of origin or somewhere in between, and that means that your 
offense and your defense are going to have to be partnered 
together to do that.
    Mr. Smith. Okay.
    General Alexander. I think that is the only way you are 
ever going to--I think we are going to be forced into operating 
like that in the future, and the consequences of that jump--the 
intellectual jump--is developing the tactics and techniques and 
procedures that I briefly discussed earlier.
    Mr. Smith. Gentlemen, anybody else want to comment on that, 
in terms of the security of your systems?
    General.
    General Shelton. Yes, sir. Just one comment. What we are 
trying to do is implement some tight security on our networks, 
so when somebody comes onto the network we make them put a card 
in, we make them enter a code, and in the future probably have 
some sort of biometric so we know exactly who that is and we 
know exactly what permissions they have got, what data they 
have got access to, and somebody outside that realm can't have 
that access.
    Mr. Smith. Right.
    General Shelton. So you are defending inside as opposed to 
defending at the wall. That is the architecture----
    Mr. Smith. Right. And how, I mean--that is really hard with 
all the different people on the network. There are so many 
different access points to the network. But I guess that is 
more of a statement than a question, but you are working on it.
    Anybody else?
    Well, thank you very much. That was very, very informative. 
Look forward to working with you on this issue going forward.
    Thank you all for your testimony and for answering our 
questions. Thanks.
    We are adjourned.
    [Whereupon, at 5:12 p.m., the subcommittee was adjourned.]
?

      
=======================================================================




                            A P P E N D I X

                              May 5, 2009

=======================================================================

      
?

      
=======================================================================


              PREPARED STATEMENTS SUBMITTED FOR THE RECORD

                              May 5, 2009

=======================================================================

      
      
    [GRAPHIC] [TIFF OMITTED] T7218.001
    
    [GRAPHIC] [TIFF OMITTED] T7218.002
    
    [GRAPHIC] [TIFF OMITTED] T7218.003
    
    [GRAPHIC] [TIFF OMITTED] T7218.004
    
    [GRAPHIC] [TIFF OMITTED] T7218.005
    
    [GRAPHIC] [TIFF OMITTED] T7218.006
    
    [GRAPHIC] [TIFF OMITTED] T7218.007
    
    [GRAPHIC] [TIFF OMITTED] T7218.008
    
    [GRAPHIC] [TIFF OMITTED] T7218.009
    
    [GRAPHIC] [TIFF OMITTED] T7218.010
    
    [GRAPHIC] [TIFF OMITTED] T7218.011
    
    [GRAPHIC] [TIFF OMITTED] T7218.012
    
    [GRAPHIC] [TIFF OMITTED] T7218.013
    
    [GRAPHIC] [TIFF OMITTED] T7218.014
    
    [GRAPHIC] [TIFF OMITTED] T7218.015
    
    [GRAPHIC] [TIFF OMITTED] T7218.016
    
    [GRAPHIC] [TIFF OMITTED] T7218.017
    
    [GRAPHIC] [TIFF OMITTED] T7218.018
    
    [GRAPHIC] [TIFF OMITTED] T7218.019
    
    [GRAPHIC] [TIFF OMITTED] T7218.020
    
    [GRAPHIC] [TIFF OMITTED] T7218.021
    
    [GRAPHIC] [TIFF OMITTED] T7218.022
    
    [GRAPHIC] [TIFF OMITTED] T7218.023
    
    [GRAPHIC] [TIFF OMITTED] T7218.024
    
    [GRAPHIC] [TIFF OMITTED] T7218.025
    
    [GRAPHIC] [TIFF OMITTED] T7218.026
    
    [GRAPHIC] [TIFF OMITTED] T7218.027
    
    [GRAPHIC] [TIFF OMITTED] T7218.028
    
    [GRAPHIC] [TIFF OMITTED] T7218.029
    
    [GRAPHIC] [TIFF OMITTED] T7218.030
    
    [GRAPHIC] [TIFF OMITTED] T7218.031
    
    [GRAPHIC] [TIFF OMITTED] T7218.032
    
    [GRAPHIC] [TIFF OMITTED] T7218.033
    
    [GRAPHIC] [TIFF OMITTED] T7218.034
    
    [GRAPHIC] [TIFF OMITTED] T7218.035
    
    [GRAPHIC] [TIFF OMITTED] T7218.036
    
    [GRAPHIC] [TIFF OMITTED] T7218.037
    
    [GRAPHIC] [TIFF OMITTED] T7218.038
    
    [GRAPHIC] [TIFF OMITTED] T7218.039
    
    [GRAPHIC] [TIFF OMITTED] T7218.040
    
    [GRAPHIC] [TIFF OMITTED] T7218.041
    
    [GRAPHIC] [TIFF OMITTED] T7218.042
    
    [GRAPHIC] [TIFF OMITTED] T7218.043
    
    [GRAPHIC] [TIFF OMITTED] T7218.044
    
    [GRAPHIC] [TIFF OMITTED] T7218.045
    
    [GRAPHIC] [TIFF OMITTED] T7218.046
    
    [GRAPHIC] [TIFF OMITTED] T7218.047
    
    [GRAPHIC] [TIFF OMITTED] T7218.048
    
    [GRAPHIC] [TIFF OMITTED] T7218.049
    
    [GRAPHIC] [TIFF OMITTED] T7218.050
    
    [GRAPHIC] [TIFF OMITTED] T7218.051
    
    [GRAPHIC] [TIFF OMITTED] T7218.052
    
    [GRAPHIC] [TIFF OMITTED] T7218.053
    
    [GRAPHIC] [TIFF OMITTED] T7218.054
    
    [GRAPHIC] [TIFF OMITTED] T7218.055
    
    [GRAPHIC] [TIFF OMITTED] T7218.056
    
    [GRAPHIC] [TIFF OMITTED] T7218.057
    
    [GRAPHIC] [TIFF OMITTED] T7218.058
    
    [GRAPHIC] [TIFF OMITTED] T7218.059
    
    [GRAPHIC] [TIFF OMITTED] T7218.060
    
    [GRAPHIC] [TIFF OMITTED] T7218.061
    
    [GRAPHIC] [TIFF OMITTED] T7218.062
    
    [GRAPHIC] [TIFF OMITTED] T7218.063
    
    [GRAPHIC] [TIFF OMITTED] T7218.064
    
    [GRAPHIC] [TIFF OMITTED] T7218.065
    
    [GRAPHIC] [TIFF OMITTED] T7218.066
    
    [GRAPHIC] [TIFF OMITTED] T7218.067
    
    [GRAPHIC] [TIFF OMITTED] T7218.068
    
?

      
=======================================================================


              QUESTIONS SUBMITTED BY MEMBERS POST HEARING

                              May 5, 2009

=======================================================================

      
                    QUESTIONS SUBMITTED BY MR. SMITH

    Mr. Smith. Knowing that our IT adversaries are becoming more 
complex, what steps is the Army taking to protect our wireless 
communications?
    Mr. Krieger. The Army places tremendous focus on Transmission 
Security (TRANSEC) in order to protect our wireless communications from 
detection and interception. To mitigate this increasingly adept and 
complex threat we maintain rigorous Certification and Accreditation 
programs for our IP based networks; including routine network scanning 
for unauthorized wireless access points and systems. Technical 
mitigation strategies are used to reduce the probability of detection 
and interception of our FM tactical communications systems. Encryption 
is used on our FM and IP networks using NSA approved type 1 encryption 
while traversing the wireless spectrum. Additionally, the Army is 
leveraging OSD's cooperative program with major defense contractors to 
identify and remediate efforts to exploit wireless communications 
network vulnerabilities.
    Mr. Smith. What is the process for remediating a hardware or 
software vulnerability identified during an information assurance 
vulnerability assessment? Are there institutional processes and funds 
available, or are you forced to ``take this out of hide.''
    Mr. Krieger. The Army participates in the DOD Information Assurance 
Vulnerability Management (IAVM) program which identifies and resolves 
discovered vulnerabilities in systems and platforms. It requires the 
completion of four distinct phases to ensure compliance. These phases 
are: (1) vulnerability identification, dissemination, and 
acknowledgement; (2) application of measures to affected systems to 
make them compliant; (3) compliance reporting; and (4) compliance 
verification. This program includes Information Assurance Vulnerability 
Alerts (IAVAs), Information Assurance Vulnerability Bulletins (IAVBs), 
and technical advisories. The Army Global Network Operations & Security 
Center (A-GNOSC) is the Army's focal point for coordinating the 
mitigation efforts for identified vulnerabilities across the Army. 
While institutional processes are used and some centralized support is 
available, the Army still is required to ``take out of hide'' resources 
in order to mitigate information assurance risks.
    Mr. Smith. What are you doing in the Services and OSD to develop a 
career cyber force?
    Mr. Krieger. The Army is evaluating the current force and comparing 
it to the requirements of the proposed cyber force. Once the analysis 
is completed, the Army will develop a management program to meet the 
requirement.
    Mr. Smith. What incentives are available to recruit and retain the 
types of individuals you would like to attract to the military cyber 
corps? Are there other incentives that you would like to be able to 
offer, but do not currently have the authority to provide?
    Mr. Krieger. The Army continually reviews its incentives for 
recruiting and retaining individuals who have critical skills. The Army 
manages its resources to achieve the best possible outcome. If given 
additional resources the Army could increase its ability to offer more 
incentives to achieve better outcome.
    Mr. Smith. What kinds of leap-ahead technologies do you believe we 
need to be investing in?
    Mr. Krieger. Technologies which can provide the Army with a 
superior advantage to prevent, detect, analyze, and respond to threat 
events at network speed.
    Mr. Smith. The outsourcing of NMCI resulted in an outsourcing of 
much of the brains of the Navy, especially with regards to technical 
and architectural designs and senior-level technology management. What 
is the Navy doing to rectify that situation?
    Mr. Carey. Although NMCI caused a shift in responsibility for core 
network operations to industry, the Navy and Marine Corps retained a 
significant amount of technical, architectural and technology expertise 
supporting other networks, including afloat, overseas, in-garrison, 
medical, educational, and research and development networks. One of the 
principal concepts of the Next Generation Enterprise Network (NGEN) 
program is to restore the decision-making, design control and oversight 
to the DON. A modest recruiting campaign for network talent will 
commence in Fiscal Year 2010, and we have established a comprehensive 
training and education strategy embodied in our IT of the Future 
program. As the DON implements the concepts of the Naval Networks 
Environment 2016, prioritized decision making, design control and 
oversight positions will be filled by members of the government 
workforce.
    The DON will also partner with other organizations, including the 
Defense Information Systems Agency (DISA), the Defense Advance Research 
Projects Agency (DARPA), and other DOD Services and Agencies for 
analysis, best practices and lessons learned. Finally, private sector 
design development and technological expertise will continue to support 
government workforce decision making and oversight.
    Mr. Smith. What is the process for remediating a hardware or 
software vulnerability identified during an information assurance 
vulnerability assessment? Are there institutional processes and funds 
available, or are you forced to ``take this out of hide.''
    Mr. Carey. The DON fully supports the IAVA process and a tool by 
which we can improve our network security posture. Institutional 
processes are in place if vulnerabilities are found during a 
vulnerability assessment. This guidance can be found on the DISA 
Information Assurance Support Environment page located at http://
iase.disa.mil/index2.html. Specific actions are provided in the DISA 
IAVM Handbook. The DON provides additional guidance within our IA 
Policy document and our IA Manual.
    When a vulnerability notice has been issued by the JTF-GNO/
NetDefense, the DOD Vulnerability Management System (VMS) sends email 
notices through command channels to the individuals responsible for the 
affected assets. Notices are also sent to all IA Managers and 
organizational oversight users. The VMS notice directs users to access 
the JTF-GNO/NetDefense Web Page to obtain detailed information on the 
specific vulnerability.
    Funding for routine hardware/software support is part of the annual 
IT support budget for most programs. If an upgrade is required that is 
outside the scope of the support contract, then funding for these 
``previously unknown'' vulnerabilities must be found using the DON 
process for conducting budget trade analyses.
    Mr. Smith. What are you doing in the Services and OSD to develop a 
career cyber force?
    Mr. Carey. DON is working closely with DOD leadership and the other 
Services to determine the scope, missions, functions and tasks relevant 
to the cyber workforce. We are working with operational organizations 
including the National Security Agency (NSA) and the new U.S. Cyber 
Command to determine DON roles and responsibilities and to implement 
the DON command and control necessary to support cyber operations. We 
are also exchanging information on manpower, personnel, training and 
education requirements and solutions development with DOD and the other 
Services to leverage work done by others as we determine the best means 
of meeting DON cyber missions.
    The Secretary of the Navy has issued policy that designates the 
Under Secretary of the Navy as the DON Chief Cyberspace Officer, with 
the DON CIO and the DUSN as his chief advisors for CND/CandA/CNE. The 
document also directs the Chief of Naval Operations and the Commandant 
of the Marine Corps to establish organizational constructs for cyber 
operations and to maximize training and education efficiency in 
cyberspace career fields. Additionally, the policy directs DON CIO to 
work directly with DOD and DON cyberspace leadership to develop 
workforce policy and guidance and to work with the Assistant Secretary 
of the Navy for Manpower and Reserve Affairs to track and measure the 
effectiveness of cyberspace manpower, personnel, training and education 
efforts.
    Both the Navy and Marine Corps headquarters staffs are working to 
document cyber manpower, personnel, and training and education 
requirements. This team includes professionals from each of the 
communities that supports cyber operations and reports to the Chief of 
Naval Operations or the Commandant of the Marine Corps.
    The Navy is the executive agent for the Joint Cyber Analysis Course 
attended by personnel from all Services. Additionally, the DON 
participates in the DOD Information Workforce Improvement Program which 
provides Joint opportunities for Information Assurance training and 
certification.
    Mr. Smith. What incentives are available to recruit and retain the 
types of individuals you would like to attract to the military cyber 
corps? Are there other incentives that you would like to be able to 
offer, but do not currently have the authority to provide?
    Mr. Carey. The Navy has the authorities available to recruit and 
retain cyber professionals. In the execution of attracting and 
retaining cyber professionals we will leverage accession and retention 
incentives where appropriate. Accession bonuses, critical skills 
retention bonuses, scholarship for service, fellowships and post-
graduate education all remain important tools that can be utilized to 
recruit and retain our cyber corps.
    Mr. Smith. What kinds of leap-ahead technologies do you believe we 
need to be investing in?
    Mr. Carey. The DON will seek to invest in and deploy emerging 
technologies that enable collaboration and increase the security of our 
networks. New technologies and capabilities, such as IPv6, self-forming 
wireless mobile networking (for people on-the-move, IP sensor networks, 
etc.), and Web 2.0 tools present opportunities worthy of investigation.
    The DON must also explore the use of virtualization and cloud 
computing. Many organizations both within and outside the DOD are 
examining the use of ``private clouds'' to reduce costs, increase 
security and lessen the environmental impact of IT. Additionally, we 
must focus on Identity Management and Attribute Based Access Control as 
they increase security and enhance information sharing.
    New technologies are becoming available at a rapid pace, and while 
our unique position requires that we be selective in which tools we 
implement, we continuously look for ways to increase security, promote 
collaboration and improve the mission effectiveness of our operating 
forces.
    Mr. Smith. What is the process for remediating a hardware or 
software vulnerability identified during an information assurance 
vulnerability assessment? Are there institutional processes and funds 
available, or are you forced to ``take this out of hide.''
    General Shelton. Remediation of hardware or software 
vulnerabilities is dependent upon type and severity of the 
vulnerability identified. Every organization conducting an information 
assurance vulnerability assessment requires local operating 
instructions governing remediation steps for that particular 
organization and for specific vulnerability levels. Institutional 
processes for remediating discovered vulnerabilities are defined in 
United States Strategic Command's Secure Configuration Compliance 
Validation Initiative and are inherent in the assessment tool used. No 
additional funds are needed because on-site vulnerability assessment 
personnel and system owners work together to remediate identified 
vulnerabilities.
    Mr. Smith. What are you doing in the Services and OSD to develop a 
career cyber force?
    General Shelton. The Air Force is establishing dedicated officer, 
enlisted and civilian cyber operations career fields to meet Joint and 
Service cyber missions. Additionally, we continue to participate in 
robust inter-Service dialogue and OSD efforts to develop DOD-wide cyber 
career force guidance.
    Mr. Smith. What incentives are available to recruit and retain the 
types of individuals you would like to attract to the military cyber 
corps? Are there other incentives that you would like to be able to 
offer, but do not currently have the authority to provide?
    General Shelton. The Air Force has many incentives available to 
support recruiting and retention, to include enlistment and 
reenlistment bonuses, undergraduate and graduate education benefits, 
and education with industry opportunities. At this time, we believe 
existing authorities and incentive programs are flexible enough to 
support cyber recruiting and retention efforts.
    Mr. Smith. What kinds of leap-ahead technologies do you believe we 
need to be investing in?
    General Shelton. Cyber technologies are a pervasive set of 
technologies that cannot be developed in isolation from the entire 
national enterprise. Communication is the foundation of effective 
national governance and current and future warfighting capabilities. As 
a result, cyber leap-ahead technology development is not being done in 
isolation by the Air Force. Future technologies could include self-
generating communication networks that adapt to network attacks, 
advanced computing including quantum computer architectures and optical 
networks for its ability to transmit very large volumes of data over 
long distances. Additionally, information fusion and multi-level 
security could enable early detection of cyber attacks.
    Mr. Smith. In an age of increasing outsourcing and globalization, 
can you describe the threat to the software and hardware supply chain? 
What are we doing to mitigate the risks to the global supply chain?
    Mr. Lentz. While globalization has many economic benefits, it also 
provides increased access and opportunity for malicious actors to 
manipulate information and communications technology (ICT) products and 
services to gain unauthorized access to otherwise closed-off 
technologies and services. The multi-tiered, global nature of our ICT 
supply chain means that the government has suppliers that it may not 
know and may never see. With less insight into their security practices 
and less control over how they conduct their business, the global 
supply chain may make the U.S. Government (USG) more vulnerable to a 
sophisticated adversary who can use security gaps in the global supply 
chain to alter or steal data, disrupt operations, or interrupt 
communications.
    Threats to the ICT supply chain can affect both software and 
hardware products. Software is growing exponentially in size and 
complexity, which creates assurance challenges. In addition, software 
design, development, testing, distribution, and maintenance can also be 
done more inexpensively offshore in easier reach of malicious actors. 
Security of the ICT supply chain can also be compromised by 
untrustworthy or counterfeit microelectronic components. The 
semiconductor industry has increasingly moved toward offshore or 
foreign-owned semiconductor component production. This trend creates an 
increasing threat to the U.S. as the potential for unauthorized design 
inclusions to appear on integrated circuits used in military 
applications increases. Furthermore, counterfeit ICT products have the 
potential to fail unexpectedly and prematurely, which may cause the 
mission critical systems in which they are used to malfunction.
    The national security concern regarding the global marketplace is 
that software or microelectronic circuitry may include deliberately-
inserted malicious logic or ``malware'' that an adversary might slip 
into a computer system to steal or corrupt data or disrupt the system. 
The malware might act immediately, or it may be designed to lie dormant 
until it is activated by a future signal. Buried in the millions of 
lines of code that comprise the modern computer application, such 
malware is difficult to detect with malware protection applications, 
and no one may be aware of its existence until after the damage is 
done.
    DOD approaches supply chain risk management (SCRM) through a 
defense-in-breadth strategy--a multi-faceted risk mitigation strategy 
that seeks to identify, manage, mitigate, and monitor risk at every 
stage of the system or network lifecycle, from product design to system 
retirement. DOD is actively working to ensure that policies and 
processes are put in place to raise awareness of the risk, empower 
acquirers to make informed decisions when they procure and integrate 
ICT products and services, and arm acquirers with practices and tools 
necessary to mitigate risk when ICT products are used across the 
government.
    DOD is incrementally implementing SCRM through pilots in fiscal 
year (FY) 2009 and FY 2010 and will be fully executing SCRM by FY 2016. 
In addition, the Department is analyzing existing regulatory and 
legislative authorities to provide guidance on the use of SCRM in 
procurement planning and decision making, and to recommend proposed 
clarification of DOD authorities to reduce litigation risks associated 
with managing supply chain risk during acquisition. DOD is also 
collaborating with industry to develop standards and best practices 
that recognize security challenges in commercial global sourcing. 
Finally, under the Comprehensive National Cybersecurity Initiative, DOD 
is working with other federal agencies to develop a multi-pronged, USG-
wide approach to global supply chain risk management where best 
practices, risk mitigation techniques, and lessons learned are shared 
and the overall risk posture of the USG is enhanced.
    Mr. Smith. How might we better utilize acquisition regulations and 
contracting clauses to better enforce the cybersecurity posture of our 
defense contractors?
    Mr. Lentz. DOD plans to publish an Advance Notice of Proposed 
Rulemaking (ANPR) in the near future to obtain public input on needed 
changes to the Defense Federal acquisition Regulation Supplement with 
regard to safeguarding and cyber intrusion reporting of unclassified 
DOD information within industry. The establishment of minimum 
safeguarding requirements for unclassified DOD Program Information on 
defense Industrial Base (DIB) partner networks will identify cyber 
security as a standard practice, and address vulnerability to 
compromise, loss, or exfiltration of unclassified DOD Information.
    Mr. Smith. What is the process for remediating a hardware or 
software vulnerability identified during an information assurance 
vulnerability assessment? Are there institutional processes and funds 
available, or are you forced to ``take this out of hide.''
    Mr. Lentz. The Department's Information Assurance Vulnerability 
Management (IAVM) Program is specified in Chairman of the Joint Chiefs 
of Staff Manual (CJCSM) 6510.01 Change 2, dated 26 Jan 2006. This 
policy provides reporting and compliance guidance for publishing 
Information Assurance Vulnerability Alerts (IAVAs) for all Combatant 
Commands, Services, Agencies, and Activities (CC/S/As). IAVAs address 
immediate threats to the Departments Global Information Grid. IA 
vulnerabilities, whether they be in the form of IAVAs or found during 
routine evaluations, are tracked in a Vulnerability Management System 
(VMS) managed by the Defense Information Systems Agency. In support of 
this policy, each CC/S/A must report acknowledgment, mitigation, and 
expected correction date to the VMS database. All systems must either 
be patched or have an approved Plan of Action and milestones (POA&M), 
for mitigations to be implemented. Vulnerability assessments not only 
address cyber vulnerabilities, but also identify out of date software, 
physical security problems, and system configuration issues, etc.
    In addition, DOD Instruction 8510.01, ``DOD Information Assurance 
Certification and Accreditation Process (DIACAP),'' dated 27 November 
2007, identifies detailed life cycle support requirements for 
information systems and addresses high-level procedures related to the 
Protect; Monitor, Analyze, and Detect; and Respond phases of the 
computer network defense lifecycle. In support of this policy, the 
Program Manager or System Manager for DOD information systems is 
responsible to plan and budget for IA controls implementation, 
validation, and sustainment throughout the system life cycle, including 
timely and effective configuration and vulnerability management.
    While there is generally no separate funding set aside for 
vulnerability mitigation and related actions by CC/S/As, system 
mitigation efforts are considered and funded as a normal part of the 
CC/S/A network defense operations resources and budgeting process. 
Ensuring adequate life cycle sustainment resources are available is a 
planning, programming, budgeting, and execution process role of the CC/
S/A as identified in the DIACAP. In order to facilitate standardization 
of vulnerability mitigation capabilities and to leverage the use of 
common tools, DOD currently has an enterprise software license 
providing tools that enable automated vulnerability scanning and 
remediation.
    Mr. Smith. What are you doing in the Services and OSD to develop a 
career cyber force?
    Mr. Lentz. The DOD is currently working with the Services, 
Agencies, Joint Staff, and STRATCOM to develop baseline cyber workforce 
standards. The current model for these standards is the DOD 8570.01-M 
``Information Assurance Workforce Improvement Program''. The basic 
requirements for developing a career cyber force include:

      Defining baseline position descriptions based on functions
      Identifying positions in manpower databases
      Specifying baseline training and or certification 
requirements aligned to the functions performed by the positions
      Continuous education, training, and participation in 
exercises to maintain and expand skills

    Mr. Smith. What incentives are available to recruit and retain the 
types of individuals you would like to attract to the military cyber 
corps? Are there other incentives that you would like to be able to 
offer, but do not currently have the authority to provide?
    Mr. Lentz. Current incentive authorities available to provide cyber 
qualified members:

      Enlistment and reenlistment bonuses
      Accelerated promotion opportunities
      Recognition programs such as special patches or badges 
for Cyber qualified personnel
      Specialized training and education opportunities

    The DOD IA Scholarship Program is a proven retention tool for Cyber 
security military personnel. Since the program's inception in 2001, DOD 
military personnel have pursued master's or PhD degrees in IA related 
disciplines. Graduates are working full time in strategic positions 
across the Department. All of the Services have participated to some 
capacity.
    Other potential incentive authorities for consideration:

      Authorize specialty pay for cybersecurity certified 
personnel
      Authorize specialty pay for cyber warfare qualified 
personnel (once defined)

    Mr. Smith. What kinds of leap-ahead technologies do you believe we 
need to be investing in?
    Mr. Lentz. The philosophy explored by leap-ahead is that, while 
some progress on cybersecurity will be made by researching better 
solutions to today's problems, some of those problems may be too hard 
to solve; we need rather to leap over them by finding a way to make 
them irrelevant. This latter approach we call changing the game, as in 
``if you are playing a game you can't win, change the game!'' Most of 
today's research, development, technology and engineering (RDT&E) 
efforts are focused on ``playing today's game better.'' But, since our 
adversaries have an advantage in today's cyber ``game,'' we advocate 
investment in RDT&E that moves us away from having to play that game, 
in other words, moves us towards a cyber environment where our security 
does not depend on the solution of today's intractable problems. To 
understand this paradigm shift, we can look at three areas which can 
yield game change in a reasonable time frame and which would be very 
useful to the DOD.

    1) Today's game: eliminate vulnerabilities which enable 
penetration;
    Tomorrow's game: reduce consequences of penetration

    Today users and their applications are our front line of defense 
against adversaries. Malware enters our systems through vulnerabilities 
in the applications with which we access the Internet, or is invited in 
by users who unwittingly download malicious attachments onto enterprise 
systems. Though we struggle to keep browsers patched and users aware of 
the latest spear phishing attacks, it is impossible to keep up, so in 
the new game we worry less about eliminating every vulnerability, but 
place an emphasis on technologies which mitigate the effects of the 
attacks which vulnerabilities enable. For example, using the technique 
of virtualization, we can create a temporary or ``non-persistent'' 
computer-within-a-computer for our risky browsing and email sessions. 
User mistakes don't hurt us because attacks which enter through the 
virtual computer never touch our mission network. Other ideas in this 
vein include advanced key management techniques to enable ubiquitous 
encryption of mission data and prevention of exfiltration of 
intellectual property (adversaries may get in, but they can't see 
anything); also a network operating system to instantiate access policy 
at any level of the architecture and prevent adversaries from 
escalating privileges (adversaries may get in, but they can't do 
anything).

    2) Today's game: check for maliciousness;
    Tomorrow's game: know what to trust

    Today we spend a lot of energy testing digital content to determine 
whether it is trustworthy. Virus-checkers and content filters attempt 
to ascertain by inspection whether applications and data are safe to 
place on our systems. Root-kit detection tools try to tell us if our 
computers have themselves been compromised. All of these tools are 
generally only as good as the catalog of attacks they have seen before. 
Again, it is impossible to keep up, so in the new game the emphasis is 
on roots of trust, or what it is that we can know for sure about our IT 
assets. Using new hardware constructs like the Trusted Platform Module 
and techniques of measurement and attestation, we can begin to have a 
means to monitor and restore the integrity of computers throughout 
their deployment life. Other useful avenues along these lines include 
provenance technologies for associating integrity and authenticity 
proofs with all types of digital content and events; also unspoofable 
identity authentication to eliminate masquerades. These approaches 
allow us to trust our assets because we know they are good, rather than 
because we haven't proven that they are bad.

    3) Today's game: avoid damage;
    Tomorrow's game: fight through and recover quickly from damage

    Today we have a large investment in perimeter defense not only to 
keep adversaries from learning our secrets, but also to prevent their 
tampering with our data and command and control systems. We have COOPs 
and mirrored data centers designed for recovery from physical damage. 
We have learned, though, that perimeter defense does not always work, 
and that attacks on the integrity or available of our assets look very 
different from flood damage or electrical blackouts, so in the new game 
we emphasize the ability to maintain operations in the face of attack. 
Virtualization can help us again here. Virtualization obviates the 
necessity for coupling together specific logical and physical assets. 
For example, each user's environment (data and computing tools) can be 
stored and maintained as a digital file or image in a central control 
area. Should those environments be lost or compromised, they can easily 
be ``reincarnated'' into any compatible physical platform. We may also 
choose to prophylactically refresh stored images periodically just in 
case. Other promising paths include ``battle mode'' where assets are 
stripped down to an easier-to-guarantee austere functionality, and 
self-healing to bootstrap back up.
    The new paradigms described above take us to a future where we are 
not so vulnerable to the asymmetric advantage enjoyed today by the 
remote network attacker. Each of the new games takes advantage of 
technology which seems to be emerging on the near horizon to mitigate 
our need to depend on things that are too hard for us to do.
    Mr. Smith. The Secretary of Defense recently placed the Joint Task 
Force for Global Network Operations under the operational control of 
JFCC-NW. Why was that important and how does it make our DOD systems 
more secure?
    General Alexander. Earlier, the Department of Defense established 
two separate military cyber component commands under U.S. Strategic 
Command--one dedicated to defensive cyber operations (JTF-GNO), the 
other to building an offensive capability (JFCC-NW). However, neither 
of these entities was fully resourced and their separation inherently 
precluded the type of dynamic defense and agile, fluid maneuvering 
needed to secure our equities in cyberspace. In recognition of this, 
the decision was made in November of 2008 to consolidate these two 
components. The contested cyber environment clearly demands an ability 
to seamlessly integrate and synchronize cyber offense with cyber 
defense--at network speed. Further, it requires a unifying construct 
with the focus, scope of responsibility and authority to succeed in 
this mission space. Unifying command and control along the full range 
of capabilities will streamline operations, improve situational 
awareness and ultimately provide a much more robustly and reliably 
defended Global Information Grid.
    Mr. Smith. What are the pros and cons of establishing a sub-unified 
Cyber Command under STRATCOM? How would this be different from the 
current structure?
    General Alexander. The decision to establish a sub-unified Cyber 
Command was made in the Office of the Secretary of Defense (OSD) and is 
best answered by OSD.
    Mr. Smith. What role do you have in helping define the S&T 
requirements for cyberoperations?
    General Alexander. Joint Task Force-Global Network Operations (JTF-
GNO) and Joint Functional Component Command for Network Warfare (JFCC-
NW) have a cadre of military, government, and contractor personnel who 
directly support cyber operations planning, define cyber capabilities 
requirements, prototype and/or manage funding, on behalf of U.S. 
Strategic Command, related to cyber capabilities, technical assurance 
and risk assessment. Collection of Combatant Command requirements is a 
proactive endeavor, conducted and maintained via a JWICS-based 
intellipedia wiki website known as the Collaborative Environment (CE).
    In general, these requirements require long term solutions and 
extensive intelligence efforts software and hardware research 
development, as well as test and operational fielding. Emergent 
operational needs or enabling requirements are also identified by cyber 
operators, crisis planners and Combatant Commands, sometimes in ``real 
time.'' Emergent requirements may drive more future S&T efforts but the 
standing Combatant Command requirements are the primary drivers for the 
ongoing S&T efforts which are funded through a Call for Proposals 
process. This also provides a direct linkage to the Service and Agency 
research laboratories, which are the primary developers of 
capabilities. The National Security Agency (NSA), JFCC-NW and JTF-GNO 
provide collaborative operational and technical inputs to U.S. 
Strategic Command's Integrated Priority List gap analysis effort to 
ensure both budgetary and S&T awareness of areas requiring attention.
    Mr. Smith. What is the process for remediating a hardware or 
software vulnerability identified during an information assurance 
vulnerability assessment? Are there institutional processes and funds 
available, or are you forced to ``take this out of hide.''
    General Alexander. As a routine matter, the remediation process for 
hardware and software vulnerabilities that are identified during an 
inspection are usually mitigated by the associated vendor. Each vendor 
provides fixes for products with active support for lifecycles. These 
fixes are provided to the users of those products at no additional 
costs to the user as long as they are within the supported lifecycle. 
In many instances Agencies will purchase an additional support 
agreement for specific products for technical guidance or warranties 
for newly purchased products. During the purchase of those products, 
vendors will recommend a support agreement for their product for an 
additional fee or on an as required basis (hourly rate). This agreement 
will normally provide the user with an account or support contact to 
access the required update or technical support information
    Most large software companies (i.e. Microsoft, Cisco and Oracle 
etc.) will provide fixes for vulnerable software Operating Systems and 
applications that are still supported by the vendor at no additional 
cost to the user. Open source applications are usually updated/upgraded 
as vulnerabilities are identified by any associated developer that has 
technical knowledge of the affected code and is normally provided at no 
additional charge. At any given time a vendor patch has the ability to 
break something. In this case the vendor will try to provide an 
appropriate fix for their product however; if this is a special case 
you may need a Technical Support Agreement with the vendor to 
troubleshoot your problem which may incur an additional cost.
    However, there are other significant costs associated with 
investigation, analysis and remediation of compromised systems outside 
of the normal life-cycle arrangements. This question is best answered 
by the individual services and agencies as they are in the best 
position to discuss the budgetary impact of those activities.
    Mr. Smith. What are you doing in the Services and OSD to develop a 
career cyber force?
    General Alexander. Developing cyber forces is a Service organize, 
train, and equip responsibility, and they are best positioned to 
address individual Service career field development efforts.
    A lot of planning work is being done within all the Services, 
regarding identification of new skills needed to perform emerging 
missions. We must also leverage the unique contributions of 
universities and research institutions as well as private enterprise to 
ensure U.S. forces are always on the cutting edge.
    The Secretary of Defense has directed all the Services to maximize 
the facility at the Center for Information Dominance in Corry Station, 
Pensacola (the Executive Agent for Cryptologic Computer Network 
Exploitation and Defense training) to acquire the technical skills 
required for cybersecurity missions. (Those with more analytic work 
roles receive their training at Goodfellow Air Force Base.) It is 
expected that graduates of both programs will be assigned to places 
where they can practice what they learned, gain mission experience in 
several sectors of Computer Network Operations, and participate in more 
advanced training fielded by the Services and the Crytologic Training 
System.
    Mr. Smith. What incentives are available to recruit and retain the 
types of individuals you would like to attract to the military cyber 
corps? Are there other incentives that you would like to be able to 
offer, but do not currently have the authority to provide?
    General Alexander. Recruiting will be one of our top priorities. 
Unfortunately, very little is available today as the Services do not 
currently recruit specifically for cyberspace forces. However, as we 
move forward, there are a number of recruitment and retention 
incentives we would recommend.
    We will encourage Service ``cyberspace branches'' to operate 
independent of recruiting operations within their Service, with subject 
matter experts interviewing and testing candidates from within the 
ranks. We should provide recruiters with sufficient knowledge of the 
cyberspace career opportunities in DOD to address basic questions of 
potential recruits. We should enhance recruiting organizations with 
cyber mentors, test materials, and military cyberspace points of 
contact. And just as importantly, we must use DOD and Service public 
affairs resources to aggressively promote a professional cyberspace 
field. In addition, we should also consider the implications of total 
force recruitment, leveraging our Reserve and National Guard 
components, to identify colleagues as potential members of the DOD 
workforce while also identifying and considering the cyber-related 
talents they may bring from their civilian employment.
    Once we've begun to recruit highly motivated candidates with the 
potential to succeed in the cyberspace workforce, we will continue to 
seek and leverage a wide variety of incentives and career options to 
retain them. Individual services should seek to introduce incentives 
based on their ability to attract and retain personnel can develop 
monetary and other incentives that are widely used across DOD. 
Incentives such as additional skills pay, performance and re-enlistment 
bonuses, special schooling and certifications, as well as advancement 
in specialized fields (e.g., nuclear power incentive pays) will have to 
be considered. We should seek to recruit DOD civilian cyber specialists 
from our military personnel and allow them to benefit from military 
retirement benefits while continue to advance their careers as 
government civilians. We should consider a ``cyber branch'' model that 
allows us to affect assignment tempo for exceptionally talented 
performers, thus allow cyber specialists to continue to work their 
specialties. To keep our world-class force, we need to provide non-
traditional means to routinely update cyber skills and develop inter- 
and intra-Service competitions to identify and reward the best of the 
best. Finally, we should continually emphasize the uniqueness of the 
work, access to some of the world's most advanced cyber technologies, 
and the critical importance of this mission to both DOD and the nation.
    Mr. Smith. What kinds of leap-ahead technologies do you believe we 
need to be investing in?
    General Alexander. The following are examples of current 
investments:

      Knowledge Management Systems (KMS). An integrated and 
automated requirements database; a tools and tactics repository; and an 
Analyst Workcenter interface with an information warfare planning 
system.
      Common Cyber Operational Picture (COP): Automated 
combination/deconfliction of germane real-time exploitation and attack 
warning and characterization along with real-time situational awareness 
of defense measures; functionally tailorable to facilitate information 
sharing with different U.S. agencies and allies.
      Attribution Science: Anti-anonymizer technologies (how to 
both create them and defeat them); hardware and software signatures; 
and tactics techniques and procedures (TTP) for operational uses.
      Internet Governance. Thorough research of: 1) the next 
generation Internet Protocol version 6 (IPv6), which is prevalent in 
many universities and R&D environments and is quickly emerging in many 
foreign sectors. 2) the ``.tel'' internet domain, the online equivalent 
to the phone directory, which is the most significant innovation in the 
domain name system since the advent of .com.
      Network Traffic Interdiction Capabilities: Capabilities 
facilitating interdiction of targeted traffic in transit across the 
global network.
      Automated network re-configuration and Computer Network 
Defense applications. Requires all of the above technologies to be 
applied and integrated in real-time.
                                 ______
                                 
                 QUESTIONS SUBMITTED BY MR. THORNBERRY

    Mr. Thornberry. Define a cyber warfighter, or cyber warfare 
professional as he exists today.
    Mr. Krieger. ``Cyber warfigher'' and ``Cyber Warfare Professional'' 
are still fluid terms; however, the terms can include professionals who 
perform duties under three categories: Computer Network Attack (CNA), 
Computer Network Exploit (CNE), or Computer Network Defense (CND)/
Network Operations (NETOPS).
    Mr. Thornberry. Describe what you envision for the cyber warfighter 
of the future in terms of education (undergraduate/graduate or high 
school only, too), training, career path, rank structure, capability, 
mission, responsibilities, organization, etc.
    Mr. Krieger. Army's education, career path and management of future 
cyber warfighters is being developed using standard paths through our 
personnel management system for officers, enlisted and Department of 
the Army Civilians to ensure that our workforce meets the Army's needs 
in the Cyberspace field. The Army follows the Federal Information 
Security Management Act (FISMA) and Department of Defense Training and 
Certification mandates which require Information Security 
Certifications and all levels of our Information Security Professional 
Corp.
    Mr. Thornberry. Given the limited pool of individuals with the 
necessary technical skills, as stated recently by Gen Shelton, and the 
growing cyber personnel requirements articulated by Secretary Gates, 
what is the plan to recruit, organize, train, and equip prospective and 
current cyber warfare professionals? Is it joint or by service? Please 
explain.
    Mr. Krieger. The Army conducts ongoing reviews to ensure it is 
manned, trained and equipped to meet the Army's operational missions 
and increase the pool of eligible candidates that meet the standards 
for occupational skills which are deemed critical. The Army works 
diligently with Joint Staff and other services to combine its training 
and other efforts wherever possible to make sure that the needs of the 
Department of Defense are integrated wherever possible to increase 
efficiency and effectiveness.
    Mr. Thornberry. In your opinion should the cyber warfighter be 
trained by service branch, jointly, jointly with service specific 
trailer courses, or somehow else? Why?
    Mr. Krieger. The Army fights as a Joint/Coalition force and 
therefore supports Joint training to the maximum extent possible, but 
recognizes the peculiarities of each individual service. Joint training 
allows services to train to a single standard and leverages the one-
time investment in infrastructure, training curriculum and reduces 
duplication. The Land, Air, Sea, and Space domains each have unique 
characteristics and challenges while working in and through the 
cyberspace domain. Functioning effectively in each of these domains 
require different equipment sets/characteristics, training/education 
and operational principles. As standardized and/or unique joint mission 
requirements are identified, specific joint trailer courses will allow 
the services to focus the skill sets of the personnel to satisfy that 
particular mission.
    Mr. Thornberry. In the current overseas contingencies, please 
describe to what extent, if any, has U.S. Strategic Command 
(USSTRATCOM) taken an active role supporting U.S. Central Command?
    Mr. Krieger. USSTRATCOM along with the Army Service Component 
Command has played a very active role in the development of Computer 
Network Operations tools supporting USCENTCOM. USSTRATCOM was integral 
in mitigating Computer Network Defense/Information Assurance issues in 
support of Operation Iraqi Freedom and Operation Enduring Freedom. 
USSTRATCOM recently marshaled resources to mitigate capacity 
degradation stemming from breaks in undersea cables, restoring service 
with no significant operational impact. USSTRATCOM's main focus over 
the past year has been on establishing common standards, procedures, 
and discipline to better secure military networks. This benefits all 
warfighters, to include USCENTCOM, who are dependent on Cyberspace to 
conduct operations.
    Mr. Thornberry. Irrespective of service branch, does USSTRATCOM's 
cyber warfighters possess the skills necessary to ensure all secure 
battlefield communications? Please explain.
    Mr. Krieger. Gen Chilton, Commander USSTRATCOM, stated in 
Congressional Testimony to the Senate Committee on Armed Services, on 
19 March 2009:
    ``The provisioning of adequate cyber forces to execute our assigned 
missions remains our greatest need in this mission area.''
    The Army is aware of this requirement, and has been very proactive 
in training, equipping and manning USSTRATCOM and its Functional 
Components with requested cyber warfighters to secure the internet and 
battlefield communications. Consistent with the National Military 
Strategy for Cyberspace Operations, the Army has made progress toward 
defining Service level requirements and advocating for Service 
cyberspace workforces. We understand the demands, and have moved 
aggressively to grow our cyber expertise; organize and orient against 
threats; and improve the technical and manpower capabilities our Joint 
Warfighters and interagency partners require for the cyberspace fight.
    Mr. Thornberry. How is responsibility between USSTRATCOM, NSA, and 
DISA clearly defined in theater?
    Mr. Krieger. Currently, USSTRATCOM operates through two subordinate 
component commands: Joint Functional Component Command for Network 
Warfare (JFCC NW) and Joint Task Force for Global Network Operations 
(JTF-GNO). Both commands have implemented a more responsive command and 
control structure reliant on centralized orders and decentralized 
execution. Tightening the relationship between JFCC NW and JTF-GNO this 
past year has led to a better, more responsive capability to defend our 
military networks. But, we have found the need for closer coordination 
and clearer delineation of responsibilities at the national and theater 
levels, and are moving to form USCYBERCOM. This new organizational 
structure will enable DOD-wide leadership to address computer security 
incidents and network compromises enhancing timely threat 
identification and mitigation through unity of effort, both within 
theater and globally.
    Mr. Thornberry. Should the Department of Defense establish a 
``Cyber Agency'' at the same level of the National Security Agency 
(NSA) and Defense Information Services Agency (DISA)? Why or why not?
    Mr. Krieger. Army stands ready to support the strategy defined by 
Department of Defense leadership.
    Mr. Thornberry. To what extent is the cyber domain being integrated 
into other domain and domain awareness initiatives (i.e. battlespace, 
maritime, air, space)? Please describe.
    Mr. Krieger. The U.S. Army Training and Doctrine Command 
established an Integrated Capabilities Development Team (ICDT) 
chartered to integrate cyberspace operations into full spectrum land 
domain operations. This ICDT is developing a Cyberspace Operations 
Concept of Operations (CONOPS) which will articulate how the Army 
intends to fight in the Cyberspace domain which incorporates lessons 
learned from Operation Iraqi Freedom (OIF), Operation Enduring Freedom 
(OEF) and our National Training Centers which stresses integration. The 
CONOPS describes how the Army will use the other domains to support 
land component Battle command in terms of cyberspace awareness. This 
CONOPS will form the basis for future Army analysis and capability 
development efforts.
    Mr. Thornberry. Define a cyber warfighter, or cyber warfare 
professional as he exists today.
    Mr. Carey. While all who engage the network to perform their 
missions are members of the cyber workforce, we consider a cyber 
warfare professional as an officer, enlisted member or civilian trained 
to work in an interdisciplinary domain including networks, computer 
applications and services. These professionals work in information 
operations, computer network defense, attack, and exploitation aspects 
of network operations, which must be aligned from end to end with the 
Intelligence Community. They will work as a cohesive unit, combining 
Intelligence and Operations to perform information assurance in 
protecting, monitoring, analyzing, detecting and responding to threats 
on the network, and manage information by retrieving, caching, 
compiling, cataloging and distributing it. The management mission also 
includes information technology system acquisition and architecture 
development and compliance.
    Mr. Thornberry. Describe what you envision for the cyber warfighter 
of the future in terms of education (undergraduate/graduate or high 
school only, too), training, career path, rank structure, capability, 
mission, responsibilities, organization, etc.
    Mr. Carey. The DON will recruit cyber workforce personnel from 
multiple educational levels, hiring experienced personnel and 
developing the cyber skills of others through career path education and 
training. The DON will recruit from high school, vocational school, 
junior college, undergraduate and graduate programs. DON cyber 
personnel will be educated and trained through a blended approach of 
traditional schoolhouse instruction, on line, and commercial vendor 
instruction including cyber and information assurance certification and 
licensing programs, joint education, on-the-job training and 
qualification, and team and unit tactical training. A key element of 
this program will be standardized training (applicable to positions 
regardless of the military or civilian status of the person performing 
the work in the position) and education curricula to support a core 
capability that is fungible across the contractor/civilian/military 
workforces.
    Rank and grade structures for military and civilian personnel will 
follow current structures, and it is expected that cyber workforce 
personnel will be required at all rank and grade levels. Career path 
development is still in progress as the missions, functions and tasks 
of the DON cyber structure are developed, but it is expected that there 
will be military career paths leading to the most senior enlisted and 
officer ranks. Civilian personnel will be able to follow paths leading 
to, and including Senior Executive Service positions.
    The DON cyber workforce will be capable of supporting all DON 
missions. Within the cyber arena they will provide Computer Network 
Defense (CND), Network Operations (NETOPs), Information Assurance (IA), 
Computer Network Attack (CNA), Computer Network Exploitation (CNE), and 
All-Source Intelligence support; telecommunications, and management 
functions including design and development, strategic planning and 
investment, policy and planning, and acquisition.
    Cyber workforce responsibilities will be split among military, 
government civilian and contractor support personnel as required. 
Decisions on workforce structure, the number of inherently governmental 
activities, and the scope of in-sourcing and outsourcing will be 
finalized following the establishment of the Department of Defense and 
the DON Cyber Command structures, missions, functions and tasks.
    Mr. Thornberry. Given the limited pool of individuals with the 
necessary technical skills, as stated recently by Gen Shelton, and the 
growing cyber personnel requirements articulated by Secretary Gates, 
what is the plan to recruit, organize, train, and equip prospective and 
current cyber warfare professionals? Is it joint or by service? Please 
explain.
    Mr. Carey. The Department of the Navy (DON) is developing plans to 
recruit, organize, train, and equip military and civilian cyber warfare 
professionals. The first step being taken is to determine the specific 
skill sets needed for cyber warfare. The DON will also develop career 
options to support recruitment, retention, and development of personnel 
with the needed skill sets. The DON is looking at ways to modify career 
paths and improve training to prepare the current workforce to meet the 
cyber challenge. The Navy along with the other services will continue 
to leverage training and educational opportunities by sharing resources 
at the Center for Information Dominance, Joint/National-sponsored 
schools, and post-graduate schools. The task of equipping this force 
will follow closely the training model for the near term, primarily 
leveraging Joint/National capabilities.
    Mr. Thornberry. In your opinion should the cyber warfighter be 
trained by service branch, jointly, jointly with service specific 
trailer courses, or somehow else? Why?
    Mr. Carey. Cyber warfighters must be thoroughly trained, employing 
both formal education and on-the-job training tracks within both their 
respective Services and the Joint environment. This is essential, due 
to the nature of cyber warfare and the need to be able to defend the 
Global Information Grid and its Service components. Foundational 
education and training should take place within the Service framework, 
and experienced personnel should take that knowledge into the Joint 
operational and training environments, facilitating DOD-wide synergies. 
When possible, DON cyber workforce development plans should include 
participation in forums including not only DOD, but also other Federal 
and private industry workers. Increased familiarity with non-
governmental and inter/intra-agency organizations' tactics, techniques, 
and procedures will increase the overall efficiency and effectiveness 
of cyber operations supporting national security objectives.
    Mr. Thornberry. In the current overseas contingencies, please 
describe to what extent, if any, has U.S. Strategic Command 
(USSTRATCOM) taken an active role supporting U.S. Central Command?
    Mr. Carey. The Department of the Navy Chief Information Officer 
respects the direction and authority of the Secretary of Defense and 
his assignment of Title 10 and UCP authority to CDR USSTRATCOM.
    Service network operations centers (NOSCs) are under CDR 
USSTRATCOM's operational control. JTF-GNO orders Service NOSCs to 
perform network operations and defense. USSTRATCOM, through the CENTCOM 
AOR DON Network Operation Centers' direct reporting relationship to the 
Joint Task Force-Global Network Operations, is very active in providing 
direction on network operations and defense and ensuring computer 
devices and networks are compliant with published IA Vulnerability 
Alerts (IAVAs), Communications Tasking Orders (CTOs), Operations 
Directive Messages (ODMs), etc. These efforts mitigate vulnerabilities 
and eliminate (or reduce) the instance of infections. This work is a 
major challenge in the forward tactical environment where forces 
frequently rotate every six months to one year, bringing with them 
personnel who have various (often limited) levels of network 
administration skills. Additionally, the Commander, USSTRATCOM and his 
staff have traveled to the CENTCOM AOR, visiting the Defense 
Information Systems Agency and Service NOSCs in search of ways in which 
U.S. Strategic Command can better support the current overseas 
contingencies.
    Mr. Thornberry. Irrespective of service branch, does USSTRATCOM's 
cyber warfighters possess the skills necessary to ensure all secure 
battlefield communications? Please explain.
    Mr. Carey. The Department of the Navy Chief Information Officer 
respects the direction and authority of the Secretary of Defense and 
his assignment of responsibilities to USSTRATCOM. However, it should be 
noted that most technical work in the battlefield/AOR is performed by 
Service-specific personnel/organizations, and not USSTRATCOM personnel.
    Mr. Thornberry. How is responsibility between USSTRATCOM, NSA, and 
DISA clearly defined in theater?
    Mr. Carey. The Department of the Navy Chief Information Officer 
respects the direction and authority of the Secretary of Defense and 
his assignment of Title 10/50 and UCP authorities to CDR USSTRATCOM, 
NSA, and DISA. The in-theater responsibilities of USSTRATCOM, NSA, and 
DISA are outlined in Chairman, Joint Chiefs of Staff Directives and 
Instructions, including interactions with COCOMs and the Services. NSA 
responsibilities are also found in U.S. Signals Intelligence Directives 
(USSIDs).
    Mr. Thornberry. Should the Department of Defense establish a 
``Cyber Agency'' at the same level of the National Security Agency 
(NSA) and Defense Information Services Agency (DISA)? Why or why not?
    Mr. Carey. The Department of the Navy Chief Information Officer 
respects the direction and authority of the Secretary of Defense in his 
establishment of the USCYBERCOM. The SECDEF memo of 23 June 09 stated 
it best when it said that the ``Department of Defense requires a 
command that possesses the required technical capability and remains 
focused on the integration of cyberspace operations. Further, this 
command must be capable of synchronizing warfighting effects across the 
global security environment as well as providing support to civil 
authorities and international partners.'' The DON supports the 
establishment of U. S. Cyber Command, which presently appoints the 
Director, National Security Agency the Commander, U.S. Cyber Command, 
making the integration of activities easier. The Director of the 
Defense Information Systems Agency (DISA) is tasked to provide network 
and information assurance technical assistance to USCYBERCOM as 
required. The Joint Task Force-Global Network Operations (JTF-GNO) and 
the Joint Functional Component Command for Network Warfare are merged 
into the new Cyber Command, bringing together the strengths of both of 
these commands. The DON believes that functional reporting 
relationships between the cyber operating forces, USCYBERCOM and the 
Military Departments and Services must be established to ensure 
efficient and effective command and control of these vital assets.
    Mr. Thornberry. To what extent is the cyber domain being integrated 
into other domain and domain awareness initiatives (i.e. battlespace, 
maritime, air, space)? Please describe.
    Mr. Carey. In May 2008, the Department of Defense published the 
following definition of cyberspace: ``A global domain within the 
information environment consisting of the interdependent network of 
information technology infrastructures, including the Internet, 
telecommunications networks, computer systems, and embedded processors 
and controllers.'' This definition is almost identical to that which 
was developed by the Department of Homeland Security and the National 
Institute of Standards and Technology.
    The Information Technology Reform Act of 1996 (Clinger Cohen Act) 
defines IT as: ``Any equipment or interconnected system or subsystem of 
equipment that is used in the automatic acquisition, storage, 
manipulation, management, movement, control, display, switching, 
interchange, transmission, or reception of data or information.'' The 
term information technology includes computers, ancillary equipment, 
software, firmware and similar procedures, services (including support 
services), and related resources.
    Given these terms of reference, Cyberspace (IM/IT) is present in 
all domains. The ability to operate within cyberspace is vital to the 
DON's mission. Achieving an appropriate balance between the need to 
collaborate and share information and the need to protect information 
will be key to our success.
    The DON has established a DON Enterprise Architecture framework or 
``blueprint'' to enable the exchange of information, integration of 
systems and management of resources to support cyberspace domain 
capabilities across all mission areas (surface (sea and ground), sub-
surface, air and space). Further, to support system development and 
integration, the DON mandates use of the Defense Information System 
Registry (DISR) as its authoritative standards source. The DON 
established a governance structure to ensure adherence to the DON EA 
framework and standards in system development supporting the cyberspace 
domain.
    Mr. Thornberry. Define a cyber warfighter, or cyber warfare 
professional as he exists today.
    General Shelton. Cyber warfighters are skilled professionals 
working to deter and prevent cyberspace attacks against vital U.S. 
interests, ensure our freedom of action in cyberspace, respond to 
attacks and reconstitute operations, develop persistent cyberspace 
situational awareness and defeat adversaries operating through 
cyberspace.
    Today, these personnel are drawn primarily from communications, 
intelligence and engineering specialties, often returning after a 
single assignment. While initially adequate, cyberspace has emerged as 
a dynamic and technically demanding warfighting domain of strategic 
national importance. The Air Force recognizes this and has committed to 
establishing dedicated officer, enlisted and civilian career fields to 
meet emerging demand and address recruiting, training, retention and 
force development challenges.
    Mr. Thornberry. Describe what you envision for the cyber warfighter 
of the future in terms of education (undergraduate/graduate or high 
school only, too), training, career path, rank structure, capability, 
mission, responsibilities, organization, etc.
    General Shelton. Cyber warfighters are skilled professionals 
working to deter and prevent cyberspace attacks against vital U.S. 
interests, ensure our freedom of action in cyberspace, respond to 
attacks and reconstitute operations, develop persistent cyberspace 
situational awareness and defeat adversaries operating through 
cyberspace.
    Today, these personnel are drawn primarily from communications, 
intelligence and engineering specialties, often returning after a 
single assignment. While initially adequate, cyberspace has emerged as 
a dynamic and technically demanding warfighting domain of strategic 
national importance. The Air Force recognizes this and has committed to 
establishing dedicated officer, enlisted and civilian career fields to 
meet emerging demand and address recruiting, training, retention and 
force development challenges.
    Mr. Thornberry. Given the limited pool of individuals with the 
necessary technical skills, as stated recently by Gen Shelton, and the 
growing cyber personnel requirements articulated by Secretary Gates, 
what is the plan to recruit, organize, train, and equip prospective and 
current cyber warfare professionals? Is it joint or by service? Please 
explain.
    General Shelton. Growing and developing cyber forces is a DOD-wide 
challenge. Recognizing this, the Services are cooperating with each 
other, Joint Staff and OSD to develop new approaches and more effective 
solutions for recruiting, acquisitions, training and retention.
    Mr. Thornberry. In your opinion should the cyber warfighter be 
trained by service branch, jointly, jointly with service specific 
trailer courses, or somehow else? Why?
    General Shelton. Initial training of cyber forces should be 
conducted by the Services, with joint post graduate training reserved 
for specialized tasks.
    Mr. Thornberry. In the current overseas contingencies, please 
describe to what extent, if any, has U.S. Strategic Command 
(USSTRATCOM) taken an active role supporting U.S. Central Command?
    General Shelton. Congressman, I would respectfully ask that this 
question be directed to the Commander of U.S. Strategic Command, 
General Chilton, who can provide you with the most up-to-date and 
accurate information regarding his command's support to U.S. Central 
Command.
    Mr. Thornberry. Irrespective of service branch, does USSTRATCOM's 
cyber warfighters possess the skills necessary to ensure all secure 
battlefield communications? Please explain.
    General Shelton. Congressman, I would respectfully ask that this 
question be directed to the Commander of U.S. Strategic Command, 
General Chilton, who can provide you with the most up-to-date and 
accurate information regarding his command's ability to secure 
battlefield communications.
    Mr. Thornberry. How is responsibility between USSTRATCOM, NSA, and 
DISA clearly defined in theater?
    General Shelton. Congressman, I would respectfully ask that this 
question be directed to the Commander of U.S. Strategic Command, 
General Chilton, the Director of NSA, Lieutenant General Alexander, and 
Lieutenant General Pollet, the Director of DISA, who can provide you 
with the most up-to-date and accurate information regarding the 
division of their responsibilities in theater.
    Mr. Thornberry. Should the Department of Defense establish a 
``Cyber Agency'' at the same level of the National Security Agency 
(NSA) and Defense Information Services Agency (DISA)? Why or why not?
    General Shelton. Currently, it is the Secretary of Defense's intent 
to establish a U.S. Cyber Command as a sub-unified command under U.S. 
Strategic Command. The Air Force is standing up the 24th Air Force in 
order to present Air Force cyber forces to this command. The Air Force 
stands ready to respond to any cyber-related requirements from the 
Department.
    Mr. Thornberry. To what extent is the cyber domain being integrated 
into other domain and domain awareness initiatives (i.e. battlespace, 
maritime, air, space)? Please describe.
    General Shelton. Secretary Gates' decision to stand-up USCYBERCOM 
indicates the importance the Department of Defense places on this 
domain. The Air Force also recognizes the criticality of cyberspace to 
Joint and AF operations and is standing up 24th Air Force to focus on 
this key area. The integration of cyberspace operations with other 
operations happens at Joint and Service levels. For the Air Force, this 
integration will occur at 24 AF with USSTRATCOM/USCYBERCOM and at Air 
Operations Centers (AOC) supporting Combatant Commanders (CCDR). When 
CCDRs rely on reach-back cyberspace operations, Airmen in the 24 AF and 
AOCs will facilitate integration of applicable AF capabilities.
    Mr. Thornberry. Define a cyber warfighter, or cyber warfare 
professional as he exists today.
    Mr. Lentz. The Cyber warfighter is evolving from a variety of 
military specialties such as Intelligence, Communications, Information 
Technology, and Information Assurance. The primary roles currently 
identified for Cyberspace Operations include military, civilian, and 
contractors performing:

      Computer Network Operations (CNO) Execution, consisting 
of:
          Computer Network Attack (CNA)
          Computer Network Exploitation (CNE)
          Computer Network Defense (CND)
          Network Operations (NetOps)
          Information Assurance (IA) Computer Network Defense 
        Service-Providers

    The ``Cyber-warfighter'' is a relatively new concept. The 
Department is developing the concept of operations. This includes the 
structure, missions, career progression and general responsibilities of 
the developing Cyber workforce. The diagram below suggests notional 
thoughts on the integration of the various components of the Cyber 
workforce.

[GRAPHIC] [TIFF OMITTED] T7218.069


    Mr. Thornberry. Describe what you envision for the cyber warfighter 
of the future in terms of education (undergraduate/graduate or high 
school only, too), training, career path, rank structure, capability, 
mission, responsibilities, organization, etc.
    Mr. Lentz. Cyber Warfighter Education and Training will depend on 
how the position/person supports cyber warfighting. We anticipate the 
cyber warfighter of the future to reflect the following basic education 
and training qualifications:
    Military Officers: Receive professional military education in 
conjunction with cyber specific training so that they can conduct cyber 
warfare in their role as leaders and managers.

    Education:

          Bachelor or advanced degree preferably in information 
        systems related program
          Service officer basic professional education
          Service intermediate professional education
          Service/Joint Warfare Command and Staff College

    Training:

          Common foundational cyber warfare skills at career start
          Functional mission specific cyber warfare skills at mid-
        career
          Senior strategic leadership training across the cyber 
        warfare domain
          Baseline IA/IT commercial certification

    Government Civilian Cyber Warfare Managers: May receive DOD 
education in conjunction with cyber training so that they can apply 
cyber to their role as managers.

    Education:

          Bachelor or advanced degree preferably in information 
        systems related program
          National Defense University (NDU) Information Resource 
        Management College (IRMC) professional development programs or 
        certificates.

    Training:

          Component-specific policy, processes, and requirements
          Cyber related continuous training
          Component-specific/sponsored cyber courses
          Baseline IA/IT commercial certification

    Contractors performing cyber warfare management roles should meet 
the same/equivalent education and training as their government 
counterparts. DOD unique training or equivalent should be available to 
contractors.

    Military Operators (hands-on/technical): We anticipate these 
individuals will receive cyber warfare training along with their 
military and technical education for their role as operators.

    Education:

          High school/community college
          Rank/Grade appropriate professional education

    Training:

          Basic and advanced cyber related occupational specialty 
        training
          NetOps/IA certification depending on position 
        requirements
          Operational and exercise training

    Government Civilian Operators (hands-on/technical): Receive cyber 
training, which they apply along with their technical education to 
their role as operators.

    Education:

          Community college/baccalaureate degree in information 
        technology field

    Training:

          NetOps/IA certification depending on position 
        requirements
          Operational and exercise training

    Contractors performing cyber warfare technical roles should meet 
the same/equivalent education and training as their government 
counterparts. DOD unique training or equivalent should be available to 
contractors.
    Mr. Thornberry. Given the limited pool of individuals with the 
necessary technical skills, as stated recently by Gen Shelton, and the 
growing cyber personnel requirements articulated by Secretary Gates, 
what is the plan to recruit, organize, train, and equip prospective and 
current cyber warfare professionals? Is it joint or by service? Please 
explain.
    Mr. Lentz. There are several steps required to recruit and train 
personnel into the cyber workforce. The Services and Agencies are 
specifically responsible for accomplishing these tasks in compliance 
with DOD policy (which is still evolving for cyber warfare and its 
workforce). Based on current processes, the following actions must be 
accomplished by the Services and Agencies to develop a Cyber Workforce:

          Define their cyber workforce (what are the position 
        requirements)
          Identify their position requirements
          Document manning requirements/table of organization
          Program and budget to fill the documented positions.
          Develop recruiting requirements/quotas
          Identify recruitment incentives to attract potential 
        cyber warriors
          Recruit personnel with qualifications/potential to learn 
        required skills
          Provide baseline training for specific job/positions 
        skills
          Provide Continuous training via on-line, classroom, or 
        exercises

    The DOD is currently working with the Services, Agencies, Joint 
Staff, and STRATCOM to develop baseline cyber workforce standards. The 
current model for these standards is the current DOD 8570.01-M 
``Information Assurance Workforce Improvement Program''.
    Organizing and equipping the cyber warfare professionals is a 
function of mission capability requirements defined by the Chairman of 
Joint Chiefs of Staff and executed by the Services and Agencies.
    Mr. Thornberry. In your opinion should the cyber warfighter be 
trained by service branch, jointly, jointly with service specific 
trailer courses, or somehow else? Why?
    Mr. Lentz. The cyber warfighter should be primarily trained to meet 
DOD and service level baseline requirements established by the Services 
under Title 10 authorities. Such training should be augmented by 
applicable joint specialized training.
    Efforts are underway by the Joint Staff to finalize the cyber joint 
mission task list and to develop a joint learning continuum for cyber 
training. This should form the basis for joint specialized training.
    At both the DOD and joint level, there is a significant emphasis on 
joint training exercises for the cybersecurity workforce. Exercises are 
focused on attack detection, diagnosis, and reaction at military 
speeds.
    Mr. Thornberry. In the current overseas contingencies, please 
describe to what extent, if any, has U.S. Strategic Command 
(USSTRATCOM) taken an active role supporting U.S. Central Command?
    Mr. Lentz. Joint Functional Component Command for Network Warfare 
(JFCC-NW) and Joint Task Force-Global Network Operations (JTF-GNO), 
which are two USSTRATCOM components, are actively engaged in support of 
U.S. forces in the USCENTCOM area of responsibility.
    In today's battlefield, our networks are a critical force 
multiplier. Both JTF-GNO and JFCC-NW work closely with USCENTCOM 
leaders and staff, in Tampa as well as forward in theater, to ensure 
vital warfighting networks are robust and defended.
    Mr. Thornberry. Irrespective of service branch, does USSTRATCOM's 
cyber warfighters possess the skills necessary to ensure all secure 
battlefield communications? Please explain.
    Mr. Lentz. Commander, USSTRATCOM met the DOD's 2008 Information 
Assurance (IA) workforce certification goal to certify 40% of their 
Information Assurance/Cybersecurity workforce by December 31, 2008. 
Overall, the Department's information assurance workforce personnel 
certification rate as of December 31, 2008, was 23% (for its 
approximately 84,000 IA positions), with a target date of December 31, 
2010, for certification of the remaining IA workforce.
    Commander, USSTRATCOM has ``cyber-warfighters'' from a variety of 
military specialties such as Intelligence, Communications, Information 
Technology, and Information Assurance with the skills necessary to 
direct the DOD's Global Information Grid operations and defense. 
USSTRATCOM provides direction to the Services and organizations to 
secure their portions of the defense information environment including 
battlefield communications. The ``cyber-warfighter'' skill requirements 
are evolving and DOD is developing the structure, missions, career 
progression and general responsibilities of the cyber workforce.
    Mr. Thornberry. How is responsibility between USSTRATCOM, NSA, and 
DISA clearly defined in theater?
    Mr. Lentz. Joint Functional Component Command for Network Warfare 
(JFCC-NW) and Joint Task Force-Global Network Operations (JTF-GNO), the 
two USSTRATCOM components for which I am responsible, maintain a close 
and collaborative partnership with NSA and DISA. NSA maintains a robust 
forward presence in Iraq and Afghanistan to provide both cryptologic 
and information assurance support to deployed forces. These 
capabilities support both JFCC-NW and JTF-GNO in their respective 
missions of providing support for offensive and defensive cyber 
operations. DISA's mission to build, provision and engineer the 
backbone of the military networks also serves as a key enabler for JTF-
GNO's ability to direct the operations and defense of these networks.
    We use liaison officers and support elements embedded within each 
organization to help ensure our activities are mutually supporting and 
to avoid conflicting objectives. While each organization has distinct 
responsibilities, functions and authorities as defined by law and DOD 
regulations, connective tissue between these organizations is naturally 
bolstered by the relationships which exist between the Director, DISA 
dual-hatted as Commander, JTF-GNO, my role as both Director, NSA and 
Commander, JFCC-NW and since November 08, the relationship established 
by the SECDEF's decision to place JTF-GNO under the operational control 
of JFCCNW. It is critical that we continue to maintain and strengthen 
this connective tissue between our organizations in order to optimize 
agile cyber support for combatant commanders and DOD as a whole.
    Mr. Thornberry. Should the Department of Defense establish a 
``Cyber Agency'' at the same level of the National Security Agency 
(NSA) and Defense Information Services Agency (DISA)? Why or why not?
    Mr. Lentz. Cyberspace is critical to joint military operations, and 
we must protect it. To do this, the Department of Defense needs to 
ensure it has the right balance of integrated cyber capabilities. Our 
increasing dependency on cyberspace, alongside a growing array of cyber 
threats and vulnerabilities, adds a new element of risk to national 
security. To effectively address this risk and secure freedom of access 
in cyberspace, the DOD requires a command possessing the required 
technical capability and which remains focused on streamlining 
cyberspace operations. The Secretary of Defense has recently 
recommended the officer serving as Director of the National Security 
Agency be nominated as Commander of USCYBERCOM. In his role as the 
commander of USCYBERCOM, he will report to the Commander of USSTRATCOM.
    Mr. Thornberry. To what extent is the cyber domain being integrated 
into other domain and domain awareness initiatives (i.e. battlespace, 
maritime, air, space)? Please describe.
    Mr. Lentz. The cyber domain is integrated with the other domains 
and provides supporting capabilities that enable command, control, 
communications, computing, and information (C4I) processes. The cyber 
domain is an essential enabler for virtually all functions, including 
mission operations, information sharing and mission-related data 
processing.
    Domain awareness for the cyber domain is a difficult challenge. At 
this time, cyber domain awareness capabilities are not completely 
integrated with domain awareness capabilities for the other operational 
domains. Cyber domain awareness is routinely included in daily status 
briefs to commanders, providing a rough awareness of key cyber issues 
to warfighting commanders. However, cyber operations and incidents are 
difficult to model and present in visual form, and they are generally 
not depicted in warfighting common operational pictures.
    Mr. Thornberry. Define a cyber warfighter, or cyber warfare 
professional as he exists today.
    General Alexander. Cyber professionals are a cross-disciplinary 
team of highly-trained individuals that bring together diverse skill 
sets to conduct cyberspace operations. Their mission includes operation 
and defense of Department of Defense Global Information Grid. Technical 
expertise and roles cover the span of traditional military planning, 
intelligence preparation, command and control, operational assessment, 
requirements development, and operationalization of capabilities; all 
done in an ever-changing mission space. Cyber warfighters are directly 
supported by experienced intelligence analysts familiar with the larger 
cultural and operational contexts, expert language analysts, network 
analysts, cryptologists and operational planners, to name a few. These 
experts, be they military or civilian, work together in real time to 
effectively operate in cyberspace.
    Mr. Thornberry. Describe what you envision for the cyber warfighter 
of the future in terms of education (undergraduate/graduate or high 
school only, too), training, career path, rank structure, capability, 
mission, responsibilities, organization, etc.
    General Alexander. DOD's Cyber force must be continuously educated 
and mentored, sharpened by experience and drilled to operate in a 
dynamic environment. I envision a total force solution, active and 
reserve components, military and civilian, appropriately supported by 
contractors to build the cyber warfighters of the future. They will 
arrive with high school diplomas, undergraduate, and graduate degrees. 
Our training and education programs will fill the skill gaps to create 
increasingly skilled and adaptable personnel who will either specialize 
in specific cyberspace capabilities or develop broad-based experience 
to lead and manage future cyberspace operations. Continual specialized 
training will be necessary because the mission space encompasses an 
enormous number of different systems and software and is constantly 
being updated and reconfigured. Mentoring and growing leaders must be 
done as we do in other specialized fields to ensure experience is 
distilled to the next generation of planners and operators; a challenge 
for the nation as well as the military. On the learning continuum, a 
cyber warfighter will progress from the most basic of tasks through the 
most complex, by attending formal training, having work assignments 
that provide the opportunity to perform various missions, and 
participating in formal education programs.
    The Secretary of Defense has directed all the Services to maximize 
the facility at the Center for Information Dominance in Corry Station, 
Pensacola (the Executive Agent for Cryptologic Computer Network 
Exploitation and Defense training) to acquire the technical skills 
required for cybersecurity missions. (Those with more analytic roles 
receive their training at Goodfellow Air Force Base.) It is expected 
that graduates of both programs will be assigned to places where they 
can practice what they learned, gain mission experience in several 
sectors of Computer Network Operations, and participate in more 
advanced training fielded by the Services and the Crytologic Training 
System.
    Specific plans regarding rank structure, responsibilities, and 
organizations are all under development. The future cyberspace warrior 
must be adaptive and flexible with the ability to fulfill multiple 
roles that quickly adjust to changing conditions within the cyberspace 
domain and the joint warfighter's requirements. Of special importance 
will be the ability to shift though all missions required for steady 
state and surge requirements. It is important that individuals be 
assigned to organizations that are flexible enough to meet the complex 
challenges of the environment in which they will operate. While a 
specific organizational construct remains in development, the 
capabilities should be centered on cyberspace operations that support 
joint warfighter requirements.
    Mr. Thornberry. Given the limited pool of individuals with the 
necessary technical skills, as stated recently by Gen Shelton, and the 
growing cyber personnel requirements articulated by Secretary Gates, 
what is the plan to recruit, organize, train, and equip prospective and 
current cyber warfare professionals? Is it joint or by service? Please 
explain.
    General Alexander. In anticipation of this need, we have been hard 
at work over the past year identifying the necessary individual 
technical skills for future cyberspace missions and the training 
required for those skills.
    We currently conduct this training at both Corry Station in 
Pensacola, Florida and Fort Meade, Maryland and are working through 
resource requirements to meet future demand for trained and ready 
cyberspace forces.
    While we were developing training, we've also worked closely with 
the Services and national community to determine future force number 
requirements for the Department that included initial estimates for the 
expected end strength in a ``total force'' approach.
    We envision that the future cyberspace forces will be a total force 
approach of both Service and joint--the Services will organize, train, 
and equip cyberspace forces that will be presented to joint 
warfighters. Additionally, there will be a joint force that provides 
day-to-day support to USCYBERCOM missions as directed by Commander, 
USSTRATCOM. Using common force training and skills baseline, the 
services will generate forces that will rotate back and forth between 
the joint community and Service unit assignments.
    We must also leverage the unique contributions of universities and 
research institutions as well as private enterprise to ensure U.S. 
forces are always on the cutting edge.
    Mr. Thornberry. In your opinion should the cyber warfighter be 
trained by service branch, jointly, jointly with service specific 
trailer courses, or somehow else? Why?
    General Alexander. There is clearly a need for Service and Joint 
training for the cyber warfighter as well as more robust leveraging of 
the scientific and technical expertise found in our universities, 
research institutions and private enterprise. The complex and dynamic 
nature of the operational environment should dissuade us from adopting 
a one-size-fits-all approach. As in other military disciplines, we must 
train individuals with the basic skills they will need to operate and 
adapt in this domain: technology, analytics, cryptanalysis, languages, 
intelligence, operational planning and effective command and control. 
The Services play an enormous role here. There is a great deal of work 
being done by the Services to determine how they can best organize, 
train and equip forces for the combatant commanders. The Services, of 
course, also need much of this same expertise to effectively operate, 
secure and defend their networks and communication systems.
    Joint training is also critical; we must train how we fight. Part 
of the reason Secretary Perry first created the Joint Task Force-
Computer Defense Network in the late 1990s was because he realized 
then, as we do now, that unity of command and unity of effort is as 
essential in cyberspace as it is in the physical domains of air, sea, 
land and space. All we have learned in the intervening years led 
Secretary Gates to direct the creation of U.S. Cyber Command. It is 
only by focusing the talent and resources of the Services and forging 
and training Joint teams with interoperable equipment and unifying 
doctrine that we will be as effective in this domain as we are in the 
physical domains.
    Mr. Thornberry. In the current overseas contingencies, please 
describe to what extent, if any, has U.S. Strategic Command 
(USSTRATCOM) taken an active role supporting U.S. Central Command?
    General Alexander. Joint Functional Component Command for Network 
Warfare (JFCC-NW) and Joint Task Force-Global Network Operations (JTF-
GNO), the two USSSTRATCOM components for which I am responsible, are 
actively engaged in support of U.S. forces in the USCENTCOM area of 
responsibility.
    In today's battlefield, our networks are a critical force 
multiplier. Both JTF-GNO and JFCC-NW work closely with USCENTCOM 
leaders and staff, in Tampa as well as forward in theater, to ensure 
vital warfighting networks are robust and defended. We also plan, 
synchronize and execute cyberspace operations to deny a widely 
disbursed adversary the ability to easily use the Internet to 
orchestrate complex operations that target our forces, friends and 
allies. Of course, these commands also engage in deliberate planning in 
support of other long-term USCENTCOM priorities.
    The bright, energetic people assigned to these organizations are 
committed to this mission. They work to build the relationships with 
USCENTCOM that are so vital to the kinds of sophisticated, synchronized 
operations conducted by U.S. forces and Coalition partners. We must 
build the same kind of robust relationship with the other Combatant 
Commanders and ensure our operational planning and activities are well 
integrated with the other global missions for which USSTRATCOM is 
responsible.
    Mr. Thornberry. Irrespective of service branch, does USSTRATCOM's 
cyber warfighters possess the skills necessary to ensure all secure 
battlefield communications? Please explain.
    General Alexander. Let me begin by saying that no commander can 
guarantee battlefield communications will always get through or that 
they won't be intercepted by an adversary. The military, by definition, 
must be able to operate in a degraded environment. Yet, it is 
imperative that we ensure availability and security of communications. 
The Department of Defense has come a long way since the President first 
assigned U.S. Strategic Command the mission to defend DOD networks in 
2002. In Joint Task Force-Global Network Operations and Joint 
Functional Component Command for Network Warfare, U.S. Strategic 
Command has highly-motivated, well-trained personnel engaged in the 24/
7/365 defense of our vital networks. But we must do more.
    Over the years, the Secretary of Defense has provided U.S. 
Strategic Command with the authority to direct the operations and 
defense of defense networks, known as the ``Global Information Grid'' 
or ``GIG.'' We have established command and control that begins to 
enable the coordinated security configuration and defense of globally 
dispersed military networks. We also established baseline standards for 
network configuration, readiness standards and incident response. 
Service and Joint training are based on these collaboratively developed 
standards.
    However, even with well-trained and engaged personnel, the 
challenges are great. The Internet's open architecture is one of its 
principal strengths, but it is also its principal vulnerability. To 
defend national interests, DOD's GIG must be reliable, resilient and 
its individual components and date must be secured. We must be able to 
operate at ``network speed'' to be effective. Without greater machine-
to-machine interfaces, we cannot hope to dynamically configure systems 
to contain and defeat the threat of malicious traffic on a real-time 
basis--a necessity in this era's battlefield environments. Achieving 
much greater unity of effort throughout the Department as well as 
information sharing and collaboration with our Intelligence Community, 
Law Enforcement and Homeland Security partners as well as leveraging 
the expertise of universities, research institutions and private 
enterprise is also essential. We must continue to evolve training and 
operational exercises to ensure all personnel can appropriately and 
quickly leverage the diverse skill-sets needed to secure and defend 
military networks in this dynamic domain.
    Mr. Thornberry. How is responsibility between USSTRATCOM, NSA, and 
DISA clearly defined in theater?
    General Alexander. Joint Functional Component Command for Network 
Warfare (JFCC-NW) and Joint Task Force-Global Network Operations (JTF-
GNO), the two USSTRATCOM components for which I am responsible, 
maintain a close and collaborative partnership with NSA and DISA. NSA 
maintains a robust forward presence in Iraq and Afghanistan to provide 
both cryptologic and information assurance support to deployed forces. 
These capabilities support both JFCC-NW and JTF-GNO in their respective 
missions of providing support for offensive and defensive cyber 
operations. DISA's mission to build, provision and engineer the 
backbone of the military networks also serves as a key enabler for JTF-
GNO's ability to direct the operations and defense of these networks.
    We use liaison officers and support elements embedded within each 
organization to help ensure our activities are mutually supporting and 
to avoid conflicting objectives. While each organization has distinct 
responsibilities, functions and authorities as defined by law and DOD 
regulations, connective tissue between these organizations is naturally 
bolstered by the relationships which exist between the Director, DISA 
dual-hatted as Commander, JTF-GNO, my role as both Director, NSA and 
Commander, JFCC-NW and since November 08, the relationship established 
by the SECDEF's decision to place JTF-GNO under the operational control 
of JFCC-NW. It is critical that we continue to maintain and strengthen 
this connective tissue between our organizations in order to optimize 
agile cyber support for combatant commanders and DOD as a whole.
    Mr. Thornberry. Should the Department of Defense establish a 
``Cyber Agency'' at the same level of the National Security Agency 
(NSA) and Defense Information Services Agency (DISA)? Why or why not?
    General Alexander. On 23 June 2009, Secretary of Defense Gates 
directed the Commander of U.S. Strategic Command (USSTRATCOM) to 
establish a subunified U.S. Cyber Command (USCYBERCOM). Since that 
time, a STRATCOM-chartered CYBERCOM Implementation Team, with 
membership from NSA, DISA, JFCC-NW and JTF-GNO, have been working to 
produce a plan which would outline the mission and operating framework 
for this command. Both DISA and NSA will play critical roles in the 
Command's ability to successfully operate and defend our military 
networks.
    Mr. Thornberry. To what extent is the cyber domain being integrated 
into other domain and domain awareness initiatives (i.e. battlespace, 
maritime, air, space)? Please describe.
    General Alexander. Cyberspace operations are being integrated with 
operations in other domains through a myriad of efforts. These include 
developing joint doctrine to inform warfighters of extant capabilities, 
tactics, techniques, and procedures; developing cyber force constructs 
and associated training; integrating cyberspace operations within joint 
force exercises; ensuring cyberspace operations are included in 
combatant command plans; and developing initiatives which inform cyber 
users by examining culture, conduct, and capabilities. Although still 
in initial stages, initiatives to provide decision-makers with holistic 
views of the cyberspace domain, similar to the Maritime Awareness 
Initiative, are being addressed. Much remains to be done; however, the 
increasing national focus on cybersecurity is encouraging and will 
provide impetus to DOD and interagency efforts to increase awareness of 
this critical domain.
                                 ______
                                 
                   QUESTIONS SUBMITTED BY MR. MURPHY
    Mr. Murphy. We have heard a lot about how our government's 
resources are organized to address the threat posed by cyber hackers, 
but if we want to direct our efforts most effectively, it's also 
important to know how the hacker community is organized. What do we 
know about the culture of hackers, what motivates their actions, and 
what political, economic and social forces shape their behavior? It 
would seem that the answers to these questions should inform some of 
our decisions on how best to organize ourselves.
    General Alexander, I understand that a small office at the NSA--the 
Institute for Analysis--has done some innovative work to address these 
questions about the culture of hackers. Can you briefly describe, in an 
unclassified manner, this work and how it is contributing to our cyber 
security efforts?
    General Alexander.

    Background
    The Institute for Analysis (IFA) is an NSA-sponsored program 
launched in October 2004 with the intent of 1) reaching out to and 
engaging external world-class experts in addressing internal 
intelligence analytic problems in an unclassified setting and 2) 
learning from and applying new or unique analytic processes, 
methodologies, techniques, and associated tools developed in the ``real 
world'' to improve the overall health of analytic tradecraft at NSA. 
The primary vehicle used by the IFA is a ``challenge problem'' which is 
essentially an unclassified ``analog'' problem that stands in for/
represents the actual classified analytic problem identified by mission 
elements. IFA also facilitates networking between external experts and 
analysts and also develops and offers new analytic methodology training 
courses to analysts. Since 2008, IFA has been able to increasingly 
share these opportunities with other Intelligence Community partners.

    The Challenge
    In early 2008, an analyst from the NSA/VCSS Threat Operations 
Center (NTOC) brought the issue of understanding hacker cultures to the 
IFA as a potential challenge problem. The analyst understood that 
hacker scenes evolve and continue to evolve. In an effort to best focus 
his time and resources, the analyst wanted to know if there was a way 
to better understand the culture of hacker groups and therefore better 
understand the potential for a group of hackers to pose a significant 
national security threat. Specifically, he wanted to know the answers 
to the following questions:

      What motivates hackers?
      How do they learn, team up, and execute attacks?
      How do their strategies and operations differ from 
country to country?

    NTOC analysts have a solid understanding of the technical elements 
associated with hacking, but they wanted to know more about the 
sociological and ``cultural'' aspects. The challenge therefore was to 
strengthen analysts' understandings of the human side of hacking: what 
motivates hackers; where do they go to learn new techniques; how do 
they find out about new technologies; what self-identified hacker 
communities have emerged; and finally, what the relationship was, if 
any, between relatively benign ``tinkering networks'' and truly 
malicious hackers?
    What makes this a difficult problem was that virtually all hacker 
scenes are animated by a culture of secrecy and anonymity. Many 
hackers, and especially those who are likely to be of most interest to 
the USG, do not wish to have their activities and habits documented.

    Project Scope

    There were three specific goals built into this challenge question, 
as follows:
      1)   Systematically identify subcultures within the global hacker 
scene, and the key traits that distinguish them from other hacker 
subcultures, with a focus on teaming/interaction, learning, technology 
use, and motivations with the intent of developing the ability to 
``strategically segment'' these subcultures to identify other hackers 
of potential interest;
      2)   Identify how these scenes vary from region to region (or 
along other lines, e.g., by generation, motivation, etc.) with 
potential concentrations on Russia, China, and/or the Middle East. This 
would allow analysts to differentiate the threat matrix by region or 
other factors;
      3)   Research and analyze how these scenes have changed over the 
past decade and may continue to change going forward. This will enable 
analysts to better anticipate strategic or tactical surprises that may 
emerge from the hacker scene.

    Two substantive limits were also identified, as follows:
      1)   This project focused on the culture of hackers and the 
hacking scene, not on the wider issue of cybercrime, writ large. That 
is to say, the analysts were interested in understanding the habits of 
those who like to break into secured computer systems, whatever their 
motives, rather than on criminality which just happens to take place on 
or via the Internet. Clearly criminals of one sort and another may well 
adopt innovations and techniques that emerge from the hacker scene for 
their own purposes but that was not the main focus of the challenge 
problem;
      2)   Open source research would focus on the dimensions of the 
hacking scene that are most pertinent to national security: penetration 
of government systems, disruption of critical infrastructure, 
significant intellectual property theft, etc. This scoping excluded, 
for example, spambots, the hacking of consumer electronics, defacement 
of websites, etc., except insofar as such activities connected in some 
tangible way to national security.

    Challenge Results
    Specific results of this challenge problem provided detailed 
descriptions of hacker cultures in two areas of interest to NTOC as 
well as a framework that allowed NTOC analysts to rapidly identify, 
characterize, and categorize hacking activities based on potential 
threats to national security. The framework in particular has already 
been integrated into NTOC operations and has resulted in a quantitative 
increase in reporting on adversarial capabilities, including 
capabilities previously undiscovered using more conventional 
techniques. According to NTIOC management, this framework has also 
resulted in a significant savings of time, measured in man-years, in 
the ``discovery'' process.

 



NEWSLETTER
Join the GlobalSecurity.org mailing list