UNITED24 - Make a charitable donation in support of Ukraine!

Homeland Security

[House Hearing, 111 Congress]
[From the U.S. Government Printing Office]



                         [H.A.S.C. No. 111-179]

        U.S. CYBER COMMAND: ORGANIZING FOR CYBERSPACE OPERATIONS

                               __________

                      COMMITTEE ON ARMED SERVICES

                        HOUSE OF REPRESENTATIVES

                     ONE HUNDRED ELEVENTH CONGRESS

                             SECOND SESSION

                               __________

                              HEARING HELD

                           SEPTEMBER 23, 2010




[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]





                      U.S. GOVERNMENT PRINTING OFFICE
  62-397                   WASHINGTON : 2010
___________________________________________________________________________
For sale by the Superintendent of Documents, U.S. Government Printing Office, 
http://bookstore.gpo.gov. For more information, contact the GPO Customer 
Contact Center, U.S. Government Printing Office. Phone 202-512-1800, or 
866-512-1800 (toll-free). E-mail, gpo@custhelp.com.  







                                     
                   HOUSE COMMITTEE ON ARMED SERVICES
                     One Hundred Eleventh Congress

                    IKE SKELTON, Missouri, Chairman
JOHN SPRATT, South Carolina          HOWARD P. ``BUCK'' McKEON, 
SOLOMON P. ORTIZ, Texas                  California
GENE TAYLOR, Mississippi             ROSCOE G. BARTLETT, Maryland
SILVESTRE REYES, Texas               MAC THORNBERRY, Texas
VIC SNYDER, Arkansas                 WALTER B. JONES, North Carolina
ADAM SMITH, Washington               W. TODD AKIN, Missouri
LORETTA SANCHEZ, California          J. RANDY FORBES, Virginia
MIKE McINTYRE, North Carolina        JEFF MILLER, Florida
ROBERT A. BRADY, Pennsylvania        JOE WILSON, South Carolina
ROBERT ANDREWS, New Jersey           FRANK A. LoBIONDO, New Jersey
SUSAN A. DAVIS, California           ROB BISHOP, Utah
JAMES R. LANGEVIN, Rhode Island      MICHAEL TURNER, Ohio
RICK LARSEN, Washington              JOHN KLINE, Minnesota
JIM COOPER, Tennessee                MIKE ROGERS, Alabama
JIM MARSHALL, Georgia                TRENT FRANKS, Arizona
MADELEINE Z. BORDALLO, Guam          CATHY McMORRIS RODGERS, Washington
BRAD ELLSWORTH, Indiana              K. MICHAEL CONAWAY, Texas
CAROL SHEA-PORTER, New Hampshire     DOUG LAMBORN, Colorado
JOE COURTNEY, Connecticut            ROB WITTMAN, Virginia
DAVID LOEBSACK, Iowa                 MARY FALLIN, Oklahoma
JOE SESTAK, Pennsylvania             DUNCAN HUNTER, California
GABRIELLE GIFFORDS, Arizona          JOHN C. FLEMING, Louisiana
NIKI TSONGAS, Massachusetts          MIKE COFFMAN, Colorado
GLENN NYE, Virginia                  THOMAS J. ROONEY, Florida
CHELLIE PINGREE, Maine               TODD RUSSELL PLATTS, Pennsylvania
LARRY KISSELL, North Carolina        CHARLES K. DJOU, Hawaii
MARTIN HEINRICH, New Mexico
FRANK M. KRATOVIL, Jr., Maryland
BOBBY BRIGHT, Alabama
SCOTT MURPHY, New York
WILLIAM L. OWENS, New York
JOHN GARAMENDI, California
MARK S. CRITZ, Pennsylvania
LEONARD L. BOSWELL, Iowa
DAN BOREN, Oklahoma
HANK JOHNSON, Georgia
                     Paul Arcangeli, Staff Director
                 Kevin Gates, Professional Staff Member
                 Kari Bingen, Professional Staff Member
                      Jeff Cullen, Staff Assistant












                            C O N T E N T S

                              ----------                              

                     CHRONOLOGICAL LIST OF HEARINGS
                                  2010

                                                                   Page

Hearing:

Thursday, September 23, 2010, U.S. Cyber Command: Organizing for 
  Cyberspace Operations..........................................     1

Appendix:

Thursday, September 23, 2010.....................................    25
                              ----------                              

                      THURSDAY, SEPTEMBER 23, 2010
        U.S. CYBER COMMAND: ORGANIZING FOR CYBERSPACE OPERATIONS
              STATEMENTS PRESENTED BY MEMBERS OF CONGRESS

McKeon, Hon. Howard P. ``Buck,'' a Representative from 
  California, Ranking Member, Committee on Armed Services........     2
Skelton, Hon. Ike, a Representative from Missouri, Chairman, 
  Committee on Armed Services....................................     1

                               WITNESSES

Alexander, Gen. Keith B., USA, Commander, U.S. Cyber Command.....     3

                                APPENDIX

Prepared Statements:

    Alexander, Gen. Keith B......................................    33
    McKeon, Hon. Howard P. ``Buck''..............................    31
    Skelton, Hon. Ike............................................    29

Documents Submitted for the Record:

    [There were no Documents submitted.]

Witness Responses to Questions Asked During the Hearing:

    [There were no Questions submitted during the hearing.]

Questions Submitted by Members Post Hearing:

    Mr. Miller...................................................    49
    Mr. Skelton..................................................    47
    Mr. Turner...................................................    50

 
        U.S. CYBER COMMAND: ORGANIZING FOR CYBERSPACE OPERATIONS

                              ----------                              

                          House of Representatives,
                               Committee on Armed Services,
                      Washington, DC, Thursday, September 23, 2010.
    The committee met, pursuant to call, at 10:05 a.m., in room 
2118, Rayburn House Office Building, Hon. Ike Skelton (chairman 
of the committee) presiding.

 OPENING STATEMENT OF HON. IKE SKELTON, A REPRESENTATIVE FROM 
        MISSOURI, CHAIRMAN, COMMITTEE ON ARMED SERVICES

     The Chairman. Good morning. We welcome you to our hearing 
today, a hearing on U.S. Cyber Command, organizing for 
cyberspace operations.
    We will hear for the first time in this committee since 
Cyber Command was established from General Keith Alexander, the 
first commander of U.S. Cyber Command. He also continues to 
serve in his role as the director of National Security Agency 
[NSA].
    General Alexander has had a long record of service to our 
Nation and is a genuinely nice person, to boot. I think perhaps 
the most important thing for the American people to learn from 
this hearing is that they have exactly the right person in 
charge of this new command. General Alexander is simply the 
best, though I will note that there are some other generals 
from his class at West Point who also haven't done too badly.
    General Alexander, we certainly welcome you and thank you 
for your testimony today.
    U.S. Cyber Command, or CYBERCOM as it has been called, has 
been tasked with conducting the full range of activities needed 
for the Department of Defense [DOD] to operate effectively in 
cyberspace. Of one thing I am confident: Cyberspace will be a 
big part of future warfare.
    That means we can't afford to get this wrong. The 
establishment of CYBERCOM is a critical milestone for our 
Nation's defense. Cyberspace is an environment where 
distinctions and divisions between public and private, 
government and commercial, military and non-military are 
blurred. And while there are limits to what we can talk about 
in this open forum, the importance in this topic requires that 
we engage in this discussion in a very direct way and include 
the public.
    The threats facing the Nation in cyberspace are daunting 
and have been underappreciated until recently. Just within the 
DOD, there are some--more than 15,000 different computer 
networks, including 7 million computing devices on 4,000 
military installations around the world.
    These information systems face thousands of attacks a day 
from criminals, terrorist organizations, and more recently from 
more than 100 foreign intelligence organizations. DOD recently 
announced a new cyber strategy to deal with that burgeoning 
threat.
    To understand how well prepared the Department of Defense 
is to handle the magnitude of the threat, we need to ask some 
fundamental questions. Where are we today with CYBERCOM? Where 
do we want to take it in the future? And do we have what we 
need to get there?
    An additional challenge for this committee is determining 
how CYBERCOM fits into the broader national security effort. 
DOD has traditionally led the way in protecting information 
systems, so it is natural for CYBERCOM to play a role beyond 
just protecting military networks. What that role should be, 
however, needs very careful analysis.
    We know that as a Nation we must do more to improve 
security in cyberspace and manage risk without choking off 
creativity or innovation.
    And, General, we look forward to hearing your testimony 
today on how you intend to address these very, very important 
issues.
    [The prepared statement of Mr. Skelton can be found in the 
Appendix on page 29.]
    The Chairman. Now let me turn to my friend, my colleague, 
the gentleman from California, Mr. McKeon.

 STATEMENT OF HON. HOWARD P. ``BUCK'' MCKEON, A REPRESENTATIVE 
  FROM CALIFORNIA, RANKING MEMBER, COMMITTEE ON ARMED SERVICES

    Mr. McKeon. Thank you, Mr. Chairman. I want to thank you 
for holding today's hearing on Cyber Command and, General 
Alexander, for joining us today. And I would like to align 
myself with your remarks about how fortunate we are to have 
General Alexander as the first commander of Cyber Command and 
to have you in this place at this time. We are very fortunate. 
Thank you.
    Cyber is an operational space that extends well beyond 
Internet searches and e-mail messages into a world of 
networking, interconnected systems, and pathways that can reach 
into individual components of critical weapons systems. The 
potential for harm from malicious activity reaches beyond the 
traditional military sphere of influence, as financial systems, 
critical domestic infrastructure--such as power and water 
treatment plants--and personal information all can be touched 
and disrupted through cyberspace.
    With this in mind, I look with great anticipation to Cyber 
Command becoming fully operational next month. The Department 
of Defense in many ways has been at the leading edge of 
defending against malicious cyber activity and in understanding 
the problems and opportunities that cyberspace brings to our 
Nation. And I believe we have in General Keith Alexander the 
most appropriate person to lead this newly formed command under 
U.S. Strategic Command.
    U.S. Cyber Command will be the touch-point for all things 
cyber within the department and will therefore carry a heavy 
burden. The services have built an infrastructure physical 
capability, as well as policies and processes, to handle the 
extensive activity that must be conducted in the cyber realm. 
Now General Alexander will have to ensure those efforts are 
brought under one vision and one mission, and it is nice to see 
that support group sitting right there behind you, all the 
services, everybody working together, because this is very, 
very important.
    Now General Alexander will have to ensure those efforts are 
brought under one vision and one mission, with the goal of 
maintaining our military's ability to conduct its operations in 
cyberspace. Let there be no doubt: This space is contested and 
presents a persistent vulnerability for our military, civilian, 
and commercial infrastructures, especially as we increase our 
dependence on it.
    As then-DNI [Director of National Intelligence] Dennis 
Blair commented on in testimony to the Senate Select Committee 
on Intelligence on February 2nd, we cannot be certain that our 
cyberspace infrastructure will remain available and reliable 
during a time of crisis.
    In his recent Foreign Affairs opinion piece, Deputy Defense 
Secretary William Lynn also touched on the significant threat 
that exists in cyberspace. The department is under constant 
attack, and attacks will only increase in a crisis situation. 
Accordingly, the department must ensure the appropriate 
investments in technology infrastructure and people are being 
made and the appropriate authorities, processes, policies and 
organizations are in place to allow our Nation's military to 
meet today's challenges.
    The establishment of Cyber Command meets an important step 
in strengthening the department's cyber capabilities. As 
confirmed in the 2010 Quadrennial Defense Review, the Pentagon 
needs both a centralized command for cyber operations and the 
development of a comprehensive approach to cyber operations.
    Despite this progress, many questions remain as to how 
Cyber Command will meet such a broad mandate. Your testimony 
today therefore will help this committee understand Cyber 
Command's functions and how the department is mitigating its 
vulnerabilities in cyberspace.
    Thank you for joining us. I look forward to your testimony.
    I yield back, Mr. Chairman.
    [The prepared statement of Mr. McKeon can be found in the 
Appendix on page 31.]
    The Chairman. I thank the gentleman from California.
    General Alexander, we recognize you for your statement. 
However, would you be kind enough to introduce the folks behind 
you, who as I understand head up the commands of each of the 
services? Would you do that first, please?

  STATEMENT OF GEN. KEITH B. ALEXANDER, USA, COMMANDER, U.S. 
                         CYBER COMMAND

    General Alexander. Chairman Skelton, Ranking Member McKeon, 
absolutely.
    Let me introduce the folks that we have. First, Vice 
Admiral Barry McCullough, a leader of 10th Fleet, Fleet Cyber 
Command. It pains me to say this as an Army guy, but I will 
tell you that they are out front. He has done a superb job 
leading his unit, working with some of the COCOMs [Combatant 
Commands] in setting up the tactics, the techniques, 
procedures, doctrine of how we will fight. We, working as a 
team, have put together a joint task force looking at this, how 
we would, Cyber Command, support the combatant commands. He has 
led a lot of that effort, done absolutely superb. They are 
doing great.
    We have Lieutenant General George Flynn, U.S. Marine Corps, 
leading MARFORCYBER, perhaps one of the best in leading some of 
the stuff and issues that we have in situation awareness and in 
doctrine. And since he has that in the Marine Corps, he can do 
both for us. Absolutely superb to have him.
    Coming on board, Major General Rhett Hernandez on 1 October 
will take over U.S. Army Cyber. He is right now at the deputy 
ops, G3/5. We have had a number of conversations on the way 
forward. He understands the mission. He and Army Cyber are 
jumping forward. They have put together a unit, and I think 
that is making great, great headway.
    Last but not least, Major General Dick Webber, Air Force 
Cyber, 24th Air Force. A couple of things that they have done. 
One, he has set up his command down at San Antonio, Texas, done 
a superb job, recently gone through an I.G. [Inspector General] 
inspection to see if they are ready for their full operational 
capability, did a great job on that, passed that by Air Force 
Space. They have great folks. I was down there a few weeks ago. 
They are doing a great job, absolutely superb.
    I would tell you, Chairman, one of the great honors and 
privileges for being in this job is to have the team behind us 
working this together and working with NSA and the intel 
community, absolutely superb.
    One of the--one of the things that I wanted to do was, 
first, thank you and the committee for the support in helping 
us stand up U.S. Cyber Command and the component commands. Like 
you, we see this as something critical to the Defense 
Department to help us direct the operations in defense of our 
networks.
    And as you stated, this is a complex issue. We face severe 
threats. Those threats to our national security, in my opinion, 
are real. It is occupying much of our time and attention. At 
the unclassified level, we have stated that we see probes and 
scans to our networks that come up on the order of 200,000, 
250,000 times an hour, and we have got to be prepared to meet 
those.
    Our services in combatant commands depend on a command-and-
control system, a computer system that has the integrity and 
reliability to operate in combat. We have the mission to help 
ensure that that happens.
    As you mentioned, we are approaching our full operational 
capability. I will tell you that we have met many of the tasks 
that we set out to do. As we described last time, we have 
brought the Joint Task Force-Global Network Ops up to Fort 
Meade, repositioned the Joint Ops Center there at Fort Meade. 
It is operating today. That was part of the BRAC [Base 
Realignment and Closure] process. Now we have co-located them 
with the NSA Threat Operations Center, and that is a great step 
forward. That was done and completed in May and has been 
operating ever since.
    Some of the issues that we work with are the issues that I 
think you would expect us to do. First and foremost, how are we 
going to support the combatant commands? How are we going to 
defend this network in crisis? And those are the things that we 
are taking on first, establishing the tactics, the techniques 
and procedures for doing just that, and we are breaking this 
out, looking at the most significant threats first and ensuring 
that if something were to happen, we can take those threats on.
    I did provide a written statement for the record. As you 
know, Chairman, I am not that good at reading. I am an Army 
officer, so I would ask that that be submitted.
    The Chairman. Without objection, that will be part of the 
record. Thank you.
    General Alexander. I would--I would tell you that this is a 
work in progress, what we are doing at Cyber Command. This is 
going to take time for us to generate the force. If I were--if 
you were to ask me what is the biggest challenge that we 
currently face, it is generating the people that we need to do 
this mission.
    We have about--we have our command stood up, our staff 
stood up, but the force is what we now have to rely on. The 
services are expanding that mission, going to 1,000 per year 
over the next few years, and I think we are headed in the right 
time. That is the biggest focus that we have, how we get that 
force generated, and the topic of discussion throughout the 
department. And I will tell you, rest assured, we know that 
that is important to get this done.
    I see these remarks and this opportunity to start the 
dialogue, an open, transparent dialogue on what we are trying 
to do in Cyber Command to defend our Defense Department's 
networks against attack and to accomplish other missions that 
we would have as delegated to us to defend other networks 
throughout the government.
    And, Mr. Chairman, I would pass it back to you.
    [The prepared statement of General Alexander can be found 
in the Appendix on page 33.]
    The Chairman. I certainly thank the gentleman.
    Mr. McKeon, gentleman from California.
    Mr. McKeon. Thank you, Mr. Chairman.
    General, how do you see the Cyber Command improving the 
department's ability to provide a trained cyber force to ensure 
that service research and development investments, and 
procurement programs will provide a united, comprehensive 
approach to DOD cyber operations?
    General Alexander. Congressman, I think the key thing on 
this is to do it as a joint organization, so the standards are 
the same throughout--throughout the command. So bringing in--
whether it is the tools we create or the students we put 
through there, doing it as a joint force with one standard is 
the key thing, and we have taken that approach, so our cyber 
training is at one school.
    And if we have to go to multiple schools, it will be done 
with one standard. And I think that is what we need to do, so 
that you know, our combatant commanders know, the folks that 
are forward know that whether they get a soldier, Marine, 
airman or sailor, that that person is trained to a standard and 
can accomplish the mission that is expected of them.
    Mr. McKeon. How does Cyber Command provide U.S. Strategic 
Command with a wider menu of strategic options? How do you 
respond to concerns that the alignment of defensive and 
offensive capabilities represents too much cyber capability 
resting in one command or within the Department of Defense? And 
why were these two functions placed under your command? What 
operational efficiencies were achieved by this alignment?
    General Alexander. That is a great question--question, 
Congressman. Let me--let me just drop back and go to the 2008. 
As you may recall, there was a significant problem on our 
networks that we discovered. At that time, we had the defense 
and the operations in one command, under the Joint Task Force-
Global Network Operations. And that task force got one level of 
intelligence and could see one part of the network.
    Operating on the other side was the Joint Functional 
Component Command-Net Warfare, trained at a different level 
with different intel insights at a different classification 
level, same network, two organizations. And if you are 
operating at the National Training Center, you wouldn't have 
the defensive team out there defending and then take them off 
the field and run out with an offensive team. It is the same 
team.
    And so the good thing that we have done here is we have 
brought those two together, merged those, and I think that is 
key to the success here. We need that to operate as one team.
    The offense and defense cannot be different here, because 
these operations will occur in real time. And I think we have 
to be prepared to do that. It is not time to say, oh, this is 
your mission and you are on your own.
    It is also experience that we have seen in some of our red 
team and blue teams of what is happening in our networks. And I 
think that is a--a huge and a positive step and goes 
significantly towards providing better support to the COCOMs.
    Mr. McKeon. Thank you very much.
    Thank you, Mr. Chairman.
    The Chairman. Historically speaking, we, you, are ahead of 
those examples within the military, particularly the Army, at 
the creation of a new system. The beginning of the Army Air 
Corps was not fully appreciated or understood in its initial 
foray into the military.
    I think the same can be true in transferring the cavalry 
into the tank corps. That was not fully appreciated. But I 
think we do appreciate this new challenge. And we are up to the 
task, it appears.
    I would like to ask you, what do you need from Congress? It 
is our duty, as you know, under the Constitution to provide and 
raise and maintain the military. What do you need from us at 
the inception of your command, which will be a long and 
historic command, long after everyone in this room passes from 
sight? So what do you need to get you off to a good start, 
unlike the cavalry going into the tanks and that flying machine 
of yesteryear?
    General Alexander. Chairman, two things go through my mind 
when you say that. One, I hope that is a long time. And, two, 
somebody offered me some great courses. Now I know what they 
were talking about.
    With respect to--to cyberspace, I think there are two 
things that we need your continued support on. First, in terms 
of resources, we need the continued support of Congress and the 
resources that the department is putting forward for the 
component commands that we have here. It is going to have to 
grow. Each of them are looking at this and addressing that, and 
we will need your continued support to make that happen.
    And the second is authorities. Right now, the White House 
is leading a discussion on what are the authorities needed, and 
how do we do this, and what will the team--the Defense 
Department and Cyber Command is a member of that team--how will 
that team operate to--to defend our country?
    What they will look at across that is, what are the 
authorities? What do we have legally? And then, given that, 
what do we have to come back to Congress and reshape or mold 
for authorities to operate in cyberspace? We would solicit your 
support on that, when that is brought forward from the White 
House.
    The Chairman. Would you please describe for all of us the 
threat environment as you see it? And I know that is a complex 
answer, but would you do your best to describe the threat 
environment that you face on a daily basis?
    General Alexander. In an unclassified forum, let me give 
you the threat in these three broad--broad areas. Going back 
over time, since the--the inception of the Internet, as it 
were, probably the key thing that we have seen is hacker 
activity and exploitation. That is where someone comes in and 
takes information from your computer, steals your credit card 
number, takes money out of your account. We have seen that go 
on, and that endures. And it is perhaps the most significant 
form of the threat that we see today, not just stealing our 
intellectual property, but also our secrets in other parts of 
our networks.
    The concern, though, is if you go to 2007, Estonia was the 
first time that a nation-state was attacked in cyberspace. And 
so we see a shift from exploitation to actually using the 
Internet as a weapons platform to get another country to bend 
to the will of another country. While it is hard to attribute 
that to a nation-state, you can see it did happen when two 
nations were quarreling over political issues.
    That followed, again, by more attacks in 2008 into Georgia. 
Those were disruptive. And let me describe disruptive. I have 
four daughters and 12 grandchildren, so you are driving the 
vehicle with all these kids in the back, and you are trying to 
talk to someone in the front seat, and they are all talking 
real loud. It happens occasionally. That is a disruption. When 
they finally quiet down, you can talk again.
    A disruptive attack prevents you from doing your business 
for the time being, but is normally something that you can 
recover from and then go on and do your business.
    What concerns me the most is destructive attacks that are 
coming. And we are concerned that those are the next things 
that we will see. And those are things that can destroy 
equipment, so it is not something that you recover from by just 
stopping the traffic. It is something that breaks a computer or 
another automated device and, once broken, has to be replaced. 
That could cause tremendous damage.
    In the department's concern, if that were to happen in a--
in a war zone, that means our command-and-control system and 
other things suffer. We have got to be prepared for that, both 
from a defensive perspective and then to ensure that the enemy 
can't do it to us again, so full operational capability.
    The Chairman. General, you have the four service commanders 
seated behind you, and thank you for introducing them a moment 
ago. Would you tell us how they are supposed to interact with 
your command?
    General Alexander. The way--the way we have worked this to 
date is to set this up in the following manner, our first--what 
I will call our first version 1.0. When we look at what is 
going on globally, if there is a global cyber action against 
our department, the question is, how are we going to organize 
our forces? And what we don't want to do is say, well, the Navy 
will do Navy, and the Army will do Army, and the Air Force will 
do Air Force.
    What we have come up with is we need to set up a joint task 
force or, in this case, perhaps a joint cyber ops task force, 
and that cyber ops task force would work with Cyber Command, 
but go forward to work with the combatant command to present 
forces from all the services to meet in operational mission. 
And then let us train as a first step how each of those forces 
would do that, what we would do for PACOM [Pacific Command], 
CENTCOM [Central Command], EUCOM [European Command], SOUTHCOM 
[Southern Command], and NORTHCOM [Northern Command], if 
required.
    So what we are trying to do is organize that as a joint 
force so that in each case you would have folks from each of 
the services supporting that. Rather than having three services 
providing that to a combatant command, have it one, a cyber 
task force.
    You--many make an analogy similar to the way SOF forces are 
presented, special ops forces are presented. I think that is a 
close analogy and probably something that we will get to. So 
that is how we are organizing it. And now what we are doing is 
working with the combatant commands on specific plans to see, 
do we have the force structure to meet what you would require 
in that plan? And if not, what force structure do we need? And 
use those force structure requirements to drive the growth that 
we would have in each of our components.
    So that is a long-winded answer to get to it, but it is 
organizing in a joint force to accomplish those missions. I 
think that is the best thing for the department and our Nation.
    The Chairman. Thank you.
    Mr. Ortiz.
    Mr. Ortiz. Thank you, Mr. Chairman.
    And thank you so much for--for what you do to keep our 
country safe and strong.
    I mean, this seems to be like you have got to get very 
skilled people to work for you. I mean, how do you recruit them 
or how do you train them before you get them to work for you? 
And do you feel that you have enough staff to do what you have 
to do?
    And my next question would be, I mean, if they were to 
disrupt and conduct an attack where you lose all kinds of 
communication, is there any way for a backup system?
    General Alexander. Let me answer this, first, with the 
recruit, train, and I will just add in retain. I think this is 
one of the key issues that we are looking at right now: What is 
the--if you will--the calculus for retaining this high-end 
talent?
    Well, when we send them through school, they go for two 
years. It would be my preference that they don't cycle through 
their jobs as we would normally do in the military, but keep 
them in place longer.
    My initial assessment is all the service chiefs and 
combatant commands see it similarly. We are going to need to 
keep people in place longer and to retain them. We are getting 
a lot of good folks. You know, I will tell you, it is a 
privilege and honor to see the great folks that we are getting 
in there. The key is, how do we retain them? Because everybody 
wants good people.
    And so I think the bonus systems and other things are ones 
that we have to look at. That is yet to be done to ensure that 
we retain that right force.
    Enough staff, I think we have enough staff. I think the 
staffs are, at least for right now, the right size. I think 
that first priority, grow the cyber force and cyber operators, 
make sure we have enough to meet those emerging combatant 
commander requirements. So I would focus on getting the forces 
that we need, then come back and re-address the staff one more 
time later, but I think we have got enough.
    Now, hopefully my staff is not tuned into that right now, 
but I think that is true.
    And your last question was, if they conduct an attack on us 
in cyberspace, do we have a backup system? So there are things 
that we have to look at in that area, whether it is a backup 
system or other options that--that would allow us the agility 
to maintain our command and control are things that we have to 
look at.
    We are looking at those. We are coming up with, I think, 
some tremendously innovative things that I would prefer not to 
put out here right now, but I think it will provide exactly 
what you are asking for, that kind of agility for the command 
and control of our forces abroad.
    Mr. Ortiz. I know there is a lot of Members here, and I 
don't want to take too much time to allow other Members to ask 
questions. Thank you, Mr. Chairman.
    The Chairman. Thank you.
    Mr. Conaway.
    Mr. Conaway. Thank you, Mr. Chairman.
    The--in the open source press, a major disruption drove a 
task force--a deal called Operation Buckshot Yankee. Can you 
visit with us a little bit about what that was and what impact 
it had on the way you looked at the plans that you had in place 
up until that point in time when that happened?
    General Alexander. Thank you, Congressman. Yes, Operation 
Buckshot Yankee, a foreign adversary using an air gap jumping 
tool, had gotten some malicious software on to our classified 
networks.
    Mr. Conaway. Would----
    General Alexander. The way that happens is, if you use a 
thumb drive or other removable media on an unclassified system, 
the malware would get on that removable media, ride that 
removable media over to the other system. And so think of it as 
a man in a loop wire, and so a person could be taking 
information they needed from an unclassified system, putting it 
onto a classified system, and so that software would ride that 
removable media and go back and forth.
    It was detected by some of our network folks within the 
advanced network ops, our information assurance division at 
NSA. When we brought that forward, it caused a couple things to 
happen.
    As I mentioned earlier, first, it became clear that we 
needed to bring together the offense and defense capabilities. 
And so Global Network Ops was put--Joint Task Force-Global 
Network Ops was put under my operational control in--within a 
month of that happening. And I think that started to change the 
way we look at this.
    And then the Secretary of Defense set in motion the next 
step, which was to set up Cyber Command as a sub-unified 
command. And I think both of those are the right things to do. 
What it does is it gets greater synergy between those who are 
defending the networks and what they see and those that are 
operating in the networks abroad and what they see and bringing 
that together for the benefit of our defense. I think that is 
exactly what the Nation would expect of us.
    Mr. Conaway. Okay. And you used the phrase air gap. That is 
the thumb drive that was----
    General Alexander. Right. So when a thumb drive goes from 
one computer, and when it is unplugged, now we call that the 
air. And then when it gets plugged in----
    Mr. Conaway. Okay. Talk to us a little bit about your--the 
dual hats you wear, Cyber Command and heading--still heading 
NSA. I suspect I know what you--the end is--but can you walk us 
through how you are going to make sure both get your undivided 
attention?
    General Alexander. Yes. Well, I--well, I guess the initial 
quip was, I will work twice as hard. But the reality is, in 
cyberspace, that is--that is where NSA operates and has 
tremendous technical expertise. It has our Nation's expertise 
for crypto-mathematicians, for access, for linguists, for 
everything that you would need to operate in cyberspace.
    And what the Secretary said is, we can't afford to 
replicate the hundreds of billions of dollars that we put into 
NSA to do another for Cyber Command and then another perhaps 
for DHS [Department of Homeland Security] and others. Let us 
leverage what we have and bring that together.
    And so by bringing these two together, we have actually 
accomplished that goal. Now, they--they have and operate under 
separate staffs and under different authorities, as you know. 
And so under the Cyber Command, the thing that has helped, I 
always had, since I have been the director of NSA, the 
additional duty as the Joint Functional Component Command-Net 
Warfare, so I had that job. What I didn't have was the staff, 
the--the horsepower and the staff that I have now, so actually 
that helps us.
    And I think you can see the momentum picking up with that 
staff and the staffs of the folks behind us. When you bring 
this much talent to the problem, we are going to make progress, 
and we are. So I think that is a very good value added.
    And I will tell you another thing. We have two great 
deputies. The NSA deputy, Chris Inglis, is one of the best 
people I have ever worked with. And on the cyber side, we have 
now Lieutenant General Bob Schmidle, Rooster, absolutely the 
same type person, just extremely competent, great to work with, 
a team player. And together they are forming the right team, 
and I think our Nation will benefit from that.
    Mr. Conaway. Thank you for that. Let me follow up on--a 
little bit of what Solomon was saying. Our enemy for the most 
part is, you know, 14- to 25-year-old, you know, really bright 
folks who are off the reservation. To counter those, can you, 
in fact, attract and do the standards of personal conduct, 
background, and everything else that you have to have in order 
to allow them access to our secrets? Are there enough folks out 
there who are not tainted by, you know, previous conduct that 
you can still get into the system so we can take advantage of 
them and they can man these slots that you are forming?
    General Alexander. We are having great success to date, 
that if the economy were to pick up, that might change that 
calculus. But right now, we have great success in hiring, great 
outreach. We are getting great people.
    In fact, on the NSA side, one of our positions, we had 800 
applicants. And, you know, so when you look at that--so we are 
getting a great number of folks.
    I think the real key goes back to an earlier question. So 
once you got those great people, now you are going to say, so 
how do you keep them? And I think it is by the job we do, by 
the leadership of the folks behind us, and how they lead and 
train those and the missions that we have.
    If it is exciting, you know they will stay. And if we pay 
them right and take care of them, I think we will keep these 
folks.
    Mr. Conaway. Thank you, Mr. Chairman. Yield back.
    The Chairman. Mr. Taylor, please.
    Mr. Taylor has asked that Mr. Kissell be called upon in his 
stead.
    Mr. Kissell.
    Mr. Kissell. Thank you, Mr. Chairman. I thank the gentleman 
from Mississippi for yielding.
    And, General, thank you and your staff for being here 
today. It is a very important issue. And I want to follow up 
the question a little bit more to what my colleagues have 
already asked about the recruitment of personnel.
    In the recruiting of people to come in and be part of your 
staff, do they then work as civilians and not--not traditional 
military?
    General Alexander. We have a combination of both military 
and civilian.
    Mr. Kissell. Okay. And--and--and taking that a little bit 
further, how do we test our system in terms of bringing people 
in and--and having self-inflicted attacks? How do we figure 
out, you know, where we think we are safe and by bringing 
people in to test it and--and having somebody who is capable to 
come in and test that type system?
    General Alexander. That is the great part, Congressman, 
about bringing together that offense with defense. The red 
teams, our red teams, our advanced network ops, are constantly 
doing that, hunting, checking our networks. It is something 
that we are going to have to grow.
    I think one of the key things that we have put on the table 
is what I will call hunting on our networks for adversaries 
that are there. You are always going to have to do it. And that 
creates it from a more static capability to a more dynamic, 
because you are actually looking for something that is going 
on.
    And, for example, if you had a bank and we set up a 
perimeter defense and then left every night, and every morning 
once a week we would see they got in there, so we keep changing 
the defense, that would be static. But now if we had a roving 
guard there waiting for people, trying to stop them, that would 
be more like the active defense that we are looking at in the 
future. I think we have got to do both.
    Mr. Kissell. And we know that the civilian side of cyber 
defense is--is--is certainly not what we have in the military. 
How does that affect your efforts to compensate for, to--to get 
around whatever the situation may be, the inadequacies in the 
civilian side? What does that mean for you guys?
    General Alexander. Well, we depend on many of those 
civilian networks and infrastructure for department operations, 
especially in crisis. And so our partnership with homeland 
security and others to help work that is a key issue that we 
are working with the Department of Homeland Security.
    I think that--that team and partnership is growing. We need 
to keep pushing that forward, because some of those networks, 
those capabilities have to be there in crisis for our country.
    Mr. Kissell. What about outside of government? You say 
industry--the greater civilian world. Does their--their lack of 
defenses in so many places, does that hamper what you are 
doing? Or is this something you work around?
    General Alexander. Well, I think there are two--two parts 
to that. One is, I think industry also recognized the issues 
here and are trying to step forward, but we have to partner 
with industry, and I think it has to be a partnership. I think 
DHS has to be in that construct of that partnership.
    The reason, much of the infrastructure that we have is 
owned by industry, that we operate on is owned by industry, and 
they have tremendous technical talent. We have to bring those 
together with what the government knows from a threat 
perspective and the tactics, techniques and procedures that we 
develop for operations.
    And we have to bring both of those together and ensure that 
those are right. That is part of the discussion that is ongoing 
right now that will eventually result in, ``Here is how the 
team will operate,'' that would result in the request for 
authorities that I think the White House will--is working now 
to bring forward.
    Mr. Kissell. Thank you, sir.
    And thank you once again to the gentleman from Mississippi.
    And thank you, Mr. Chairman.
    The Chairman. Mr. Coffman, please.
    Mr. Coffman. Thank you, Mr. Chairman.
    I am--I am wondering, General, if you could review for us 
just for a minute--you mentioned 2007, the--the first cyber 
attack on Estonia. Where did that come from? What were the 
ramifications of that, that attack, in terms of the disruption?
    General Alexander. Absolutely. It is in open press, a lot 
of this, so I will give you the gist of it. And I know the--the 
reporters will get this more accurate.
    But in May of 2007, there was a Russian statue that the 
Estonians were going to take down, a big political discussion 
between Estonia and Russia. Hacktivists from Russia appeared to 
attack it, and from around the world different computers were 
brought into play to send spam e-mail, a distributed denial-of-
service attack, on much of the government of Estonia's 
infrastructure, making it almost impossible for their banks to 
do business internally and, for sure, externally to Estonia 
caused tremendous damage and has resulted in them building a 
cyber capability themselves.
    So a huge problem, and it was all around that political 
issue. Attribution, saying specifically was this caused by one 
nation-state or another is difficult and not something that we 
have.
    Mr. Coffman. Okay, thank you, General. The--how would you--
in terms of the threat assessment--and I think you have 
described what the--what the tactical measures are, in terms of 
threatening our infrastructure. But could you, in terms of 
evaluating the peer competitors of the United States, in terms 
of their threats in cyberspace, how would you evaluate them? 
Let us say China, Russia. Who are the peer competitors of the 
United States that threaten us--that potentially would threaten 
us?
    General Alexander. That is a great question, Congressman, 
because in cyberspace, it is not so much necessarily the--the 
size of the country as it is the idea of the person who is 
creating the software.
    I think there are a number of countries out there that are 
near peers to us in cyberspace, and hence the concern. This is 
an area that--that others can have an asymmetric capability and 
advantage.
    And there are two parts to that question, if I could just 
add an extension to it, is, first, we think about nation-
states, but just given that part of the discussion, the non-
nation-state actors are also a concern. And then if you look in 
this, in this area, when people create tools, cyber tools, the 
unintentional distribution of some of those tools can cause the 
most problems. We have got to be prepared for all of that, for 
these nations that are out there.
    And we are not the only smart people in this area. There 
are others that are just as capable of us and in some areas 
perhaps more capable. And so we have to ensure across that 
board that we cover that spectrum. China, Russia, and you can 
just go around the world and pick--most of the modern nations 
have capabilities that I think many could argue are near to us 
and in some areas may exceed our capabilities.
    Mr. Coffman. General, who--who would exceed our 
capabilities?
    General Alexander. Well, it depends on the area. So if you 
were to--if you were to build a--a--a whole suite of tools--and 
if you go back to the 1950s, you know, it was a discussion 
about the different capabilities of us versus Russia, Russia 
had power capabilities over us in some areas, actual electrical 
power and the development of power engines and some 
capabilities, and we had it in perhaps the computer and some 
other areas.
    We are going to see in the tools, the development of tools, 
one country may be the best at developing worms or viruses. 
Another may be the best at developing tools for exploitation 
that are stealthy. We don't see them. Another country may be 
the best at developing tools that can attack certain specific 
systems, because they see that as in their national interest.
    And so our concern, my concern in answering this--and I 
think what we as a Nation have to look at, is you have to cover 
that whole spectrum to protect our country. And so what we have 
to do is--we are not going to be--we have to recognize that, 
first, there are other smart people out there, and that is why 
we have got to take this so serious. It is an asymmetric 
advantage that some could have over us, and we have got to put 
that defense up.
    Mr. Coffman. Thank you.
    Mr. Chairman, I yield back.
    The Chairman. I thank the gentleman.
    Mr. Reyes, please.
    Mr. Reyes. Thank you, Mr. Chairman.
    General, good to see you, and thank you for the work that 
you are doing in this very critical area. I think it is--it is 
great news that we are getting the kind of talent that we know 
we are able to attract, and certainly getting 800 applicants 
for the position that you referenced is good news.
    But I have got--the--the question I have is, you are 
dependent on all the services to provide you the personnel with 
these skills. And I am just curious, do you--do you think that 
all the services are--I guess, first of all, at the same level, 
in terms of attracting and providing for opportunities as a 
career in cyber, for--for their respective personnel? Do you 
think they are all at the same level?
    And the second thing is, are there any concerns that you 
have--since you are dependent on them--that you have--you have 
expressed to the other services about this issue? It seems to 
me you are--you are dependent on their ability to give you that 
kind of support.
    General Alexander. I am optimistic that we will get the 
force that we need. We are pushing on the services to go faster 
to bring those forces in. And the issues that we have talked 
about--how do you not only recruit some of these, but how do 
you retain them? And in what--in what mix do you bring them in? 
Are they all military? Are they military-civilian? How do we 
add those mixes in? And how do they complement other actors 
that we have within NSA, the I.C. [Intelligence Community], and 
other elements of DHS, as an example? How do we bring all that 
together, are parts of the discussion.
    If I were to tell you my greatest concern, it is moving 
fast enough to provide a capability to defend our networks in 
time if a crisis were to occur. We see that as our number-one 
mission: Be ready.
    And right now, we--we have to build that force to get 
there. That is going to take some time. We have some force 
structure. The services have leaned forward on that. They are 
presenting some capabilities. We are moving down that road.
    It doesn't--you don't instantly create a cyber actor or a 
cyber operator. It takes time. Some of the training programs go 
18 months. And so even if we had 100 or 1,000 more today, we 
would want to send those through training.
    Some of the discussions the service chiefs have had with me 
is, can we do on-the-job training for some of these folks that 
are pretty smart, put them in this area, and give us an 
increased capacity earlier, and then send them to a training 
program, a formal training program as we bring in others? We 
have got to look at all of that.
    Mr. Reyes. In the context of the threats that you just 
mentioned, we are focused mostly on attacks from other 
countries on our--through the--via the Internet. I am 
concerned, given the case of Private Manning and--and the 
WikiLeaks case, as well, about attacks within, you know--in 
other words, people that have access to our systems that 
deliberately either steal information from our secure systems 
or, in some cases, may be enemy agents that have access to 
them.
    What--are you concerned about that? What are--what are we 
doing about that? And how can we--what can we do to minimize 
those kinds of concerns?
    General Alexander. Congressman, I am--I am concerned about 
it. It is an issue. I do think we have some ideas on how to 
address that, some of which we have already implemented, some 
that will need to be implemented as we transition to a new 
architecture. I think both of those will help address that 
problem.
    There is always going to be concern about an inside actor 
and, I would just add to it, supply-chain issues. Both of those 
are going to be key things that we are going to have to look 
at. Knowing that those are issues will help us in the 
development and planning of our future systems, and I think we 
have got to address those with our eyes wide open.
    It is always going to be a problem. There are things that 
we can do to mitigate it. We will never solve that 100 percent.
    Mr. Reyes. Thank you. Thank you, General.
    Thank you, Mr. Chairman.
    The Chairman. I thank the gentleman from Texas.
    Mr. Wilson, please.
    Mr. Wilson. Thank you, Mr. Chairman.
    And, General, thank you very much for your service. I am 
very grateful that our colleague, Congressman Roscoe Bartlett 
of Maryland, for years has raised the concerns about cyber 
warfare and how this could affect the American people. And I 
appreciate your efforts to protect the American people.
    Throughout my time in Congress and as the ranking member of 
the Military Personnel Subcommittee, I have had the opportunity 
to meet and hear from many wounded veterans. Many are eager to 
return to the fight. It seems to me it would be in the best 
interests of the Department of Defense to retain these 
individuals and their knowledge and their experience.
    With that said, are there any efforts being made to retrain 
wounded warriors within the Cyber Command? If not, would that 
be a potential option?
    General Alexander. We do have within the services and 
within NSA a program to--to hire the wounded warriors, and we 
have brought some onboard that are operating either in this or 
one capacity or the other. That is a great point.
    I would just like to emphasize, we can use these soldiers, 
sailors, airmen and Marines. They have tremendous capability, 
and they present a credible operator for the rest of the folks 
to see. So it is a huge step forward. And we have brought a 
number on board.
    I think we could do more on that. We need to work with the 
services on that, and we are.
    Mr. Wilson. And I have seen it firsthand. I was visiting at 
Landstuhl, and a young lady had lost both legs. And her--within 
48 hours, her comments were, ``I want to be back with my 
buddies.'' And so people do want to serve. And so I can see 
what you are doing is giving a great opportunity for very 
talented people who want to serve our country.
    There has been concern of personal liberties and privacy 
being compromised with regard to cybersecurity. As a command, 
what will you do from a process perspective, as well as 
technological perspective, to ensure privacy and civil 
liberties are protected? Is there anything Congress can do to 
assist you in your efforts?
    General Alexander. That is a great question. Thank you, 
Congressman, because I think two parts to this. One, we have a 
responsibility to protect the civil liberties and privacy of 
the American people and of our people. That is non-negotiable. 
Constitution, that is what we are there for. We have to do 
that.
    Now, there are two issues with this. One, transparency. 
What can we do to show you, Congress as an oversight body, what 
we are doing and the American people? And, two, how do we also 
help ensure that what they understand is accurate?
    Because a lot of people bring up privacy and civil 
liberties. And then you say, well, what specifically are you 
concerned about? And they say, well, privacy and civil 
liberties.
    So is this system--are you concerned that the anti-virus 
program that McAfee runs invades your privacy or civil 
liberties? And then answer is no, no, no, but I am worried that 
you would. And so now we are--so let us explain what we are 
trying to do to protect the department's systems.
    And I think that is where Congress, the administration, the 
department can work together to ensure that the American people 
understand exactly what we are doing and how we are doing it. 
That is part of the transparency that I think needs to be put 
on the table.
    What we can't do, we can't say, ``Here is a specific threat 
that we are defend against and how we are defending against 
it,'' because the adversary within three days would be able to 
work around it. So it is those--those two things. That is a 
very important issue, I think, that we have to confront now and 
fix.
    Mr. Wilson. And for the health and safety of the American 
people, such as electrical grids, you mentioned the banking, 
commerce system of Estonia, all of this is--is so important.
    A final question. Your activities fall under Intelligence 
Title 50, Attack Title 10, and Law Enforcement Title 18. How do 
you balance these legal authorities?
    General Alexander. Well, for the--for the Title 10, they 
operate under the CYBERCOM hand. Cyber Command operates under 
Title 10 authorities to this committee, the House Armed 
Services Committee.
    NSA, we operate under Title 50, intelligence authorities 
under the House Permanent Select Committee for Intelligence, 
and we have in our staffs the legal teams to ensure that we do 
these exactly right. And so any operations that Cyber Command 
does, defensively we have the standing rules of engagement laid 
out there, and any other operations that we would do would have 
to be done under an execute order through the Secretary of 
Defense to the President.
    Mr. Wilson. And--and, again, thank you very much for your 
service and commitment to our country.
    And I yield the balance of my time.
    The Chairman. I thank the gentleman.
    Mr. Critz, please.
    Mr. Critz. Thank you, Mr. Chairman.
    And thank you, General, for being here. Fortunately, in my 
part of the world, in western Pennsylvania, we have Carnegie 
Mellon University, and they have the CyLab, and they do a lot 
in cybersecurity. And we have been talking about this quite a 
bit.
    And one of--one of the issues that seems to come up--and it 
seems like you have explained it--within the military, that we 
can be stovepiped in how we accomplish or how we do things. And 
it is good to see the different services working together, but 
I would be curious to hear how you are partnering or how you 
are working with not only private industry, but with the 
educational institutions out there that have expertise so that 
we are working cohesively, because I would assume that many of 
the threats are very similar.
    General Alexander. That is a great--a great question, 
because the universities, academic institutions, labs, industry 
are key partners in all of this, and we do have to reach out. 
And we reach out in a couple of ways.
    As you may know, from an information assurance side, both 
we, NSA, Department of Homeland Security, and the department 
run a program, an education program that helps the 
universities. Here is a set of criteria for getting an 
information assurance degree, and we work with those 
universities, over 100 now, in doing that. I think that is 
absolutely the right thing to do.
    And as we said earlier, we are not the only smart people in 
this area. In fact, many of us would argue, heck, our industry 
partners have tremendous capability, so partnerships with them 
makes a lot of sense. And setting up groups--and this is where 
Howard Schmidt, the White House coordinator, comes in and 
Homeland Security to bring these teams together. I think that 
is crucial, bringing all of the players together, industry, 
academia, and government, to solve these problems.
    Mr. Critz. Well, thank you--thank you very much. And you 
mentioned about the 250,000 attacks per hour. I think that was 
the number you used. And certainly that happens in industry, as 
well. In fact, some statistics show that patches to anti-virus 
can be re-engineered or reverse-engineered within moments, 
actually, as the patches come on board, so it is a major issue.
    You mentioned about the--the thumb drives, how they carry 
viruses around, and certainly it is an educational process.
    I have noticed, or have read about a culture shift that has 
been mentioned within the military. And I would be curious to 
hear your--your description of this culture shift and what it--
what it really means.
    General Alexander. So we--we actually hit three parts that 
came out of that Operation Buckshot Yankee: culture, conduct 
and capability. On the culture side, it was getting commanders 
to understand this is commander's business. This isn't 
something that you say, ``I am going to have one of my staff 
run.'' This is commander's business.
    Commanders are responsible for the operation of their 
command, and this operational network is important to them. So 
the big jump first part was commanders have a responsibility.
    The second part is understanding the responsibility to 
actually conduct the patches that you brought up, because if 
you don't fix the patches, as you rightly stated, an adversary 
sees a problem, within minutes of that problem being out there, 
they have a way to hit a system with that vulnerability that we 
are trying to patch.
    If you haven't done the patch, you have a vulnerability 
that somebody will probably exploit. And if you don't do those 
patches on time, you risk not only your system, but the whole 
network. So getting those right and ensuring that commanders 
know that it is their business to do that, that has been the 
greatest cultural things that we have pushed forward in the 
military. Tremendous--tremendous jumps in from where we were 
two years ago to where we are today.
    Mr. Critz. Well, thank you. And my final question is--you 
know, how can the Department of Defense be more proactive, 
rather than reactive, in the dot-mil domain mode of cyber 
defense, by incorporating the assurance, the resilience, and 
the performance?
    General Alexander. I think--I think the first step is, we 
have to look at the way we do business and the way our networks 
operate and, like industry, take that construct and see if 
there isn't a better model, a more efficient, a more defensible 
model, something that would be harder for our adversaries to 
penetrate, and that would provide equal or better command and 
control.
    It is coming in the commercial side. You can see this with 
your iPad, your iPhones, the new technology, computing on the 
edge, all these things, cloud computing. Now we need to look at 
that. Is there opportunities now for the department and the 
government to use in creating more secure networks? Industry, 
academia, and government are all looking at this. We have got 
partners at all of those helping.
    Mr. Critz. Thank you, Mr. Chairman.
    The Chairman. Thank you.
    Mr. McKeon, please.
    Mr. McKeon. Thank you, Mr. Chairman.
    General, does Cyber Command have the mandate to support 
General Petraeus in Afghanistan by denying and disrupting Al 
Qaeda and the Taliban's use of cyberspace? Do you have the 
necessary authorities to carry out this function?
    General Alexander. We have actually deployed an 
expeditionary cyber support element to Afghanistan to support 
General Petraeus. I did not want him to beat me up for not 
doing that.
    And we have a responsibility to help them protect their 
networks, the Afghan Mission Networks. We are working as part 
of a joint team--because the services actually will implement 
that--we are ensuring that the capabilities put into that 
network are defensible in helping to set that up.
    We are not where we need to be in terms of setting all the 
things in place, but we have come a long ways. And I think we 
are making progress in that area.
    If you were to ask what is the--the real issue that--that 
we need to address, it is ensuring that the evolving Afghan 
Mission Network is defensible, up and--up and operating, 
because it is going to cover a number of countries that are in 
Afghanistan.
    Mr. McKeon. Thank you.
    The Chairman. Mr. Langevin.
    Mr. Langevin. Thank you, Mr. Chairman.
    General, welcome. Thank you for your great service to our 
Nation, your presence today. Again, you have had an outstanding 
career, and I look forward to supporting you in your new role 
as head of Cyber Command.
    Cybersecurity, as you know, has been both a personal and 
professional interest of mine for--for several years now. Since 
serving as chairman of the Homeland Security Subcommittee with 
jurisdiction over cybersecurity, I have certainly paid very 
close attention to the cyber threats that are facing our 
government, our military and our citizens, and the 
vulnerabilities that have yet to be addressed.
    I was certainly pleased to include an amendment in the 
fiscal year 2011 Defense Authorization Act that would enhance 
our efforts to secure our Federal networks and coordinate U.S. 
resources. And I certainly strongly support the department's 
moves right now to coordinate its efforts under your new 
command, and I believe that they found a real expert to lead 
this new initiative. And, again, I look forward to supporting 
you in your work.
    General, I want to ask you a direct question. If we--the 
Nation were to endure a major cyber attack right now, could you 
defend the Nation against that attack? Do you have the 
authorities to defend the Nation against that attack? 
Obviously, we are talking about the whole of our--our cyber 
critical infrastructure.
    As I have said--I know--because the President in his major 
address on cybersecurity, the first major world leader to--to 
make a major address on cybersecurity, said that our--our cyber 
assets, our critical national asset--will defend and use all 
assets of national power to defend it.
    But my question is, again, to you. Could you defend the 
Nation right now against a major cyber attack? Do you have the 
authorities that you need?
    General Alexander. First, Congressman, thanks for your 
great support in all the cyber areas and all that you have done 
over the past years on this. It is been tremendous, and we 
appreciate it.
    To answer your question directly, it is not my mission to 
defend today the entire Nation. Our mission in Cyber Command is 
to defend the Defense Department networks. And as if we are 
tasked by either the Secretary or the President to defend those 
networks, then we would have to put in place the capabilities 
to do that. But today, we could not.
    Mr. Langevin. And what would you need to do that, General?
    General Alexander. I think this is what the White House, 
Congressman, is actually looking at, is how do you form the 
team to do the mission that you are--that you have put on the 
table? How do we develop the team between Department of 
Homeland Security, FBI [Federal Bureau of Investigations], 
Cyber Command, and others to work as a team to defend the 
Nation in cyberspace?
    And in that, what are the roles and responsibility of each 
member in that team? And then let us walk through in a war 
game--my words--how that would work? And ensure that everybody 
has the exact authorities and capability to do what needs to be 
done to protect the country.
    Those are the steps that we are going through. It is under 
the leadership of the White House right now. Howard Schmidt and 
his folks are leading that to look at this. We get to 
participate in that, to put forward our ideas on how the 
country could be protected, specifically the government, the 
government networks, and what I will call critical 
infrastructure.
    Mr. Langevin. Well, let me press you a little bit more. If 
America, in fact, experienced a serious high-profile attack 
today against our critical infrastructure, perhaps our power 
grid, banking sector, or transportation, what are the rules for 
self-defense in cyberspace? And can you walk us through how 
such an attack would occur? And how would the U.S. Government 
work to stop it and ensure the security of our citizens?
    General Alexander. That is a great question. Okay, to be 
very direct on it, if an attack were to go against the power 
grids right now, the defense of that would rely heavily on 
commercial industry to protect it. If commercial industry had 
the signatures and the--and the capabilities in place to weed 
out that attack, then they would be successful.
    The issue that you are really getting to is, what happens 
when an attacker comes in with an unknown capability? That 
unknown capability would have the ability to shut down either 
the banks or the power grid if it got through.
    So to defend against that, we need to come up with a more, 
in my terms, a more dynamic or active defense that puts into 
place those capabilities that we would need to defend in a 
crisis.
    That is what we are working right now in the department to 
do to ensure that that works and working, actually, closely 
with Department of Homeland Security and the White House to 
show how that could be done. And they are looking at that as a 
model to put in place and now trying to ensure that they have 
the authority to do that, looking at how that would all be 
created. And if they don't have, I think that is what they 
would bring forward to you.
    Mr. Langevin. Well, General, thank you. I know my time has 
run out, but these are the things that keep me up, at least. 
And I am very concerned about potential threats in the cyber 
realm facing our Nation. And I--I look forward to working with 
you on addressing these--these important challenges. Thank you.
    The Chairman. I thank the gentleman.
    Let me--let me ask this question before I call on Mr. 
Boswell. General, where are each of the four sub-commands 
physically located?
    General Alexander. Right now, three are at Fort Meade--or 
at least major portions of them are at Fort Meade. One, Air 
Force, is at San Antonio, Texas, collocated with San Antonio, 
Texas, and it will have a beachhead at Fort Meade. So I think 
they are all in that enterprise that allows us that capability 
to touch both the NSA portion and work together as an effective 
team.
    The Chairman. Thank you.
    Mr. Boswell.
    Mr. Boswell. Thank you, Mr. Chairman. Just very short.
    Good to see you again, General. Appreciate your work very 
much. If you have done it, why, I will just check the notes, 
but I got here late, but could you tie on the DNI, how they fit 
into this--I know as NSA you report to DNI. Tie this together 
for us.
    General Alexander. All right. NSA has a direct report to 
the DNI for operational intelligence means. And we do that. The 
DNI oversees all the threat-related collection that goes on in 
cyberspace, as you would expect.
    General Clapper, Jim Clapper, the director of--now for DNI, 
absolutely in sync with where the department's going and has 
been a huge advocate and candidate for helping put this 
together, absolutely superb. I think that is going to continue 
to go well. I think we are building those right pieces 
together.
    They understand and I understand the responsibilities that 
I have under the Title 50, back to the Intel Committee, and 
under Title 10, back to this committee. And I think all of 
those understand it, too, and know that we are--we are doing 
those right.
    I think--I think, if I could, one of the things that this 
gets to, this question that you bring up that is so important 
for our country--note that we couldn't replicate the NSA 
capabilities. And so leveraging them is going to be hugely 
important.
    And now, ensuring that we leverage them properly, that we 
need the civil liberties and privacy--and that we are 
transparent, those are going to be the keys, and where we have 
got to come back to you and show you how we are doing that.
    Mr. Boswell. I appreciate that. I also--we all appreciate 
the investment we got in NSA, and we can't duplicate it, so 
that leveraging, I think, is extremely important. There is a 
lot of--a lot of need there, and it is--it is kind of the 
frontier right now, as we all know. So I wish you well and 
thank you for your dedication, and I appreciate those strong 
words you said about the in-depth you have got in the two 
staffs. We wish you well. And we will do our best to be 
helpful. Thank you.
    General Alexander. Thank you, sir.
    Mr. Boswell. I yield back.
    The Chairman. I thank the gentleman.
    Mr. Johnson.
    Mr. Johnson. Thank you, Mr. Speaker--I mean, Mr. Chairman, 
and thank you, General Alexander, for your appearance today.
    I wanted--communications, logistics and intelligence 
operations conducted by the Department of Defense are to some 
extent reliant upon the public Internet. Is that true?
    General Alexander. Absolutely, Congressman.
    Mr. Johnson. And could we fight a war effectively were the 
public Internet to fail or be compromised?
    General Alexander. Well, that would be very difficult. 
Those specific networks that we depend on were not protected, 
so I would put those in that category of critical 
infrastructure, myself.
    Mr. Johnson. Could we fight a war in the event the global 
information grid were substantially or wholly compromised?
    General Alexander. If it is compromised, I think we could--
we could fight a war. If it were destroyed, that is a different 
issue. And now we would--we would be back to many years ago, 
and we would have to look back, because much of our command and 
control, much of our intelligence depends on that network 
operating.
    Mr. Johnson. Do we have a specific contingency plan in the 
event that that happens?
    General Alexander. That is one of the missions that we are 
looking at, is how do we do that? And the I.T. [Information 
Technology] architecture that I described earlier, one of the 
things that we are looking at is, how do we get that agility 
and flexibility to operate in those degraded environments? It 
is something we have got to do.
    Mr. Johnson. Are you satisfied that the various agencies 
and interagency councils responsible for U.S. cybersecurity, 
some of which have overlapping jurisdictions or areas of focus, 
are arranged such that you can do your job efficiently and 
effectively?
    General Alexander. Well, I think with any new area, 
Congressman, you are going to have differences of opinion. I 
think that is a good thing. The team is coming together good. 
Now that we have Howard Schmidt on board as the White House 
coordinator, I think we are getting more folks and faster 
movement within the interagency.
    And it goes back to a couple of the earlier questions. We 
do have to resolve some of these. The White House is working 
that right now to say, whose mission is it to do which part of 
this? And do we have that all right? And do you have the 
capabilities and authorities to do that?
    Mr. Johnson. Yes, we have--we have seen where in our 
intelligence-gathering apparatus there has been silos, I guess, 
built and the information does not flow freely or as freely 
as--as we would like. And that certainly would be--not be a 
model that we would want to adopt when it comes to 
cybersecurity issues. Would you agree?
    General Alexander. I agree. I think it needs to be a team.
    Mr. Johnson. Are there any structural changes that you 
think may accommodate that aspiration?
    General Alexander. I believe in the future we are going to 
need to make structural changes, but I don't know what they 
would be right now. I believe that, as we look at how we are 
going to operate in cyberspace to protect this Nation and the 
areas that you want us to protect and the Nation wants us to 
protect, we then need to look at how that team is organized, 
how it operates, and the authorities upon which it operates.
    That is one of the things the government is working hard on 
right now. We are working our portion of it. I think what you 
would then want is for those teams to come together and put 
that all together, and that is where the White House--
specifically Howard Schmidt and his folks--need to come back, 
lay out those authorities, and come back to you with that.
    And in that, they may come up with recommendations, but I 
don't know any right now that I would make.
    Mr. Johnson. Much of the hardware used on U.S. defense and 
intelligence networks is manufactured abroad, some of it in 
China. Is that correct?
    General Alexander. Yes, much of computers are put together 
or--or built in other countries, and China is one of the big 
producers.
    Mr. Johnson. Are we confident that those hardware supplies 
are not compromised? And is there something that we can do with 
respect to securing the items during the manufacturing process?
    General Alexander. I think there are two parts to that. One 
is, as we manufacture or manufacture things to a specific 
standard and have the capability to test that standard, that 
would be one part. Same for software. And, two, understand that 
people will always try to manipulate your system, and we have 
to be looking out for that and have the capability to 
dynamically look to that within our networks.
    Mr. Johnson. Thank you, General. You and your associates 
have a big job to do, and we appreciate you for your 
professionalism and your--your strong will to win in 
cyberspace. Thank you.
    General Alexander. Thank you.
    The Chairman. I thank the gentleman.
    Ms. Shea-Porter.
    Ms. Shea-Porter. Thank you very much, Mr. Chairman.
    And thank you for being here. Last week, there was a 
briefing that the deputy commander of Cyber Command, he 
discussed an upcoming disaster response exercise that was being 
planned in the Department of Homeland Security and how he was 
working to make sure that Cyber Command was involved in the 
exercise. It was taking some effort to make sure that he was 
able to participate.
    While there have been questions on integration of the 
services, could you please tell me how Cyber Command is working 
with other government agencies, such as Department of Homeland 
Security?
    General Alexander. Right. We work with the Department of 
Homeland Security in a number of ways. If I could, first, we, 
NSA, has a team there, a cryptologic support group, that we 
depend on largely to help in this cyber area.
    Two, within the department, they--our Under Secretary of 
Defense for Policy has a responsibility to reach out to the 
Homeland Security, and we have a direct relationship to them. 
For the US-CERT, the computer emergency response teams that 
they have, for their operations and ensure that information is 
passed back and forth.
    So if you think about it--I am--I am giving you kind of a 
convoluted answer, because it actually goes on several levels. 
At the high level, what the departments are doing, Homeland 
Security and Defense, my opinion, the Secretary of Defense and 
the Secretary of Homeland Security have a vision for how they 
are going to do this and they are working towards that vision 
and trying to bring it.
    The staffs are working together, the department staff and 
that. We fall under that department staff and take their lead. 
And at the operational level, on the networks, the US-CERT 
worked with our Joint Operations Center and others to ensure 
that information is passed on the networks about threats and 
stuff, and that works pretty good.
    So at the--at the player level, that is going on, and we 
are building the others to get to issues like that cyber 
exercise coming up.
    Ms. Shea-Porter. Okay. So you feel that you are a full 
player on the field now, that everybody recognizes how 
essential your mission is, and that you are well integrated?
    General Alexander. I think there is always going to be--for 
the near term, we are going to have to do a lot of work to 
integrate, because there is issues that as--as you would 
expect, of who has got the responsibility for which piece? How 
do we work that? I think those issues are natural. We are 
working those out.
    I do--I would tell you that they know we are here, they are 
working with us. I just had a meeting earlier this week--and we 
had Rand Beers and Phil Reitinger there at the meeting, and we 
have daily VTCs [video teleconferences] with Homeland Security 
in this area.
    That doesn't mean that we are not going to have issues 
about how much do we play, for example, in that cyber exercise, 
Defense Department issues versus Homeland Security issues, and 
that is probably where you will see more friction. So how much 
of each do you play? How--how radical do you make the exercise? 
And----
    Ms. Shea-Porter. I would say that time is our enemy on 
this. As fast as we can move this integration, the better off 
and the safer we will be. So thank you for your efforts, and I 
yield back.
    The Chairman. With no further questions, General, we are 
very appreciative of your being with us today. We wish you 
well. And it appears you have some excellent colleagues to work 
with. And we look forward to your testimony in the future. We 
are, of course, here to be of assistance to make you all the 
more successful.
    With that, the hearing is adjourned. Thank you.
    [Whereupon, at 11:22 a.m., the committee was adjourned.]


      
=======================================================================




                            A P P E N D I X

                           September 23, 2010

=======================================================================


              PREPARED STATEMENTS SUBMITTED FOR THE RECORD

                           September 23, 2010

=======================================================================


[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]

=======================================================================


              QUESTIONS SUBMITTED BY MEMBERS POST HEARING

                           September 23, 2010

=======================================================================

      
                   QUESTIONS SUBMITTED BY MR. SKELTON

    Mr. Skelton. There are a number of efforts underway, in Congress 
and internationally, to better define legal norms and behaviors in 
cyberspace. DOD has traditionally been on the forward edge of thinking 
about these issues, so I would be interested in hearing from you about 
what role do you see for your command in attempting to shape the legal 
environment related to cyber operations? What are some of the pitfalls 
you see in proposals you are aware of? What components should we try to 
pursue more vigorously?
    General Alexander. United States Cyber Command (USCYBERCOM) plans 
and conducts operations fully consistent with all laws and regulations. 
Our foremost responsibility in this regard is to demonstrate our 
support and compliance with the law. As we conduct planning, we 
undertake to determine the limitations and restrictions we face, as 
well as any concerns, and continuously keep the policymakers and 
decisionmakers within the Department informed. We can best contribute 
to effective decisionmaking by providing quality, detailed and expert 
knowledge about operational considerations in and through cyberspace. 
We are aware of many low-level discussions across many organizations. 
At this juncture, we are principally supporting internal discussions 
sponsored by Under Secretary of Defense (Policy) (USD (P)) and the 
Joint Staff. In our view, the most important perspective we can bring 
to the table is a perspective informed through deep technical 
understanding of the domain and based in Combatant Command (COCOM) 
deliberate and adaptive planning processes. The Department, led by the 
Under Secretary of Defense for Policy, is conducting a review of DOD 
policies relating to cyberspace.
    Mr. Skelton. What service and joint training and educational 
institutions do you use now, or will you use in the future, for 
developing your cadre of cyber warriors?
    General Alexander. Currently, the number of fully trained, 
credentialed, and certified cyber personnel, military and civilian, is 
limited. Training and skills development and sustainment demands 
extensive time and effort. Our most significant challenge is to ensure 
that on balance, the Nation benefits from all potential talent 
available. USCYBERCOM currently uses several different venues for cyber 
training and education, to include:

            Service-specific initial occupational training and 
        ongoing professional military education
            Computer Network Defense Course--Fort McCoy, 
        Wisconsin
            Information Assurance Training Center, U.S. Army 
        Signal Center--Fort Gordon, Georgia
            Basic Computer Network Operations Planners Course 
        (BCNOPC)--1st IO Command
            Signal Corps Cyber Security Training--Fort Stewart, 
        Georgia
            Center for Computer Network Operations, Cyber 
        Security & Information Assurance within NSA Associate 
        Directorate for Education and Training (ADET) College of 
        Cryptology
            Eastern Michigan University--Michigan
            University of Maryland Baltimore County (UMBC)--
        Maryland
            Northrop Grumman Cyber Warrior course--Maryland
            DOD Cyber Crime Training Academy--Linthicum, 
        Maryland
            Joint Network Attack Course (JNAC)--Center for 
        Information Dominance, Corey Station, Florida
            Joint Cyber Analysis Course (JCAC)--Center for 
        Information Dominance, Corey Station, Florida

    Each of these courses provides a current foundation in requisite 
Information Assurance (IA) and Computer Network Defense (CND) skills. 
In addition to these Joint Service schools, agency and contract 
efforts, there remain extensive opportunities with significant 
potential: over 100 Community Colleges, Colleges and Universities which 
are National Security Agency (NSA)/Department of Homeland Security 
(DHS) Centers for Academic Excellence; Air Force Institute of 
Technology (AFIT) Center for Cyberspace Research; the Naval Post 
Graduate School (NPS); the Army's Advanced Civil Schooling (ACS) 
program; the National Defense University (NDU) system; the National 
Defense Intelligence College (NDIC); and the Advanced Technical 
Intelligence Center (ATIC). The services are restructuring or 
developing new technical training courses and job skills that will 
potentially result in new occupational specialty codes throughout the 
services that are trained at the basic level to enter the cyber 
community.
    Mr. Skelton. Do you have plans to carry out any significant joint, 
interagency or international exercises that would test out DOD's 
ability to respond to large-scale attacks against DOD computer 
networks, similar to the ELIGIBLE RECEIVER 97 exercise?
    General Alexander. Exercises are a well-recognized and traditional 
DOD mechanism to develop and certify operational constructs. USCYBERCOM 
has participated in one interagency and two COCOM exercises since May 
2010. It is our intention and task to participate in a robust exercise 
regime to support technical and operational concept development and 
validation; and to use these exercises as a means to develop our 
tactics, techniques, and procedures and identify gaps in policy and 
law.
    Mr. Skelton. What capabilities do you have to conduct active 
network operations, such as network hunting, penetration testing and 
other forms of red teaming? Do you have unmet needs in this area (in 
terms of people or tools)?
    General Alexander. USCYBERCOM has limited NSA and Service 
capabilities to leverage in hunting, penetration testing, and red 
teaming. We use Green Teams to respond to cyber incidents; Blue Teams 
that provide in-depth review and resolution of cyber events and Red 
Teams that emulate adversary procedures against DOD hosts to train 
defenders and identify vulnerabilities for mitigation. We estimate that 
current resources (NSA's Advanced Network Operations (ANO) and Service 
Red Teams) can only cover a fraction of the DOD networks. Effective 
hunting is absolutely essential to discovery, characterization, and 
mitigation of threat activity on our networks. USCYBERCOM is working 
with NSA and the Services to leverage the projected resource savings, 
both in terms of personnel and money, we anticipate from planned 
information technology initiatives that will enable us to recruit, 
train, and field more hunting teams and develop and field automated 
hunting and adversary data analysis capabilities to address this key 
shortfall.
    Mr. Skelton. In your testimony, you mentioned something called 
expeditionary cyber support elements. Can you explain in more detail 
what these are, and what role you see them playing in future CYBERCOM 
operations?
    General Alexander. COCOMs and deployed forces require the ability 
to leverage USCYBERCOM expertise and capabilities in planning and 
conducting full-spectrum cyber operations in support of their assigned 
missions. To directly support both Combatant Commanders and Joint Task 
Force Commanders, USCYBERCOM has created two complementary support 
elements--the Cyber Support Element (CSE) and the Expeditionary Cyber 
Support Element (ExCSE). Both are assigned to USCYBERCOM, but the CSE 
is with duty at the Geographic COCOM headquarters, and the ExCSE is 
deployed on orders to a Joint Task Force Commander located in an Area 
of Hostilities.
    The CSE supports the Combatant Commanders at their headquarters 
through liaison, planning, and operations support primarily at the 
Directorate of Operations, or J3 level. However, the CSE is empowered 
to develop relationships and capabilities across the Combatant Command. 
The CSEs have played innovative and complementary roles within the 
COCOM Directorates of Intelligence (J2) and Directorates of Plans and 
Policy (J5). To enable their effectiveness, the CSE has full reach-back 
support to USCYBERCOM headquarters and the NSA Enterprise.
    An ExCSE consists of a team of experts deployed to an active Area 
of Hostilities to enable, implement, integrate, and execute cyber 
operations. Currently, USCYBERCOM has two ExCSEs teams deployed--one in 
Iraq and one in Afghanistan. The teams consist of five personnel: a 
team chief (lead planner), a cyber attack planner, a cyber defense 
planner, and two analysts (cyber and intelligence). USCYBERCOM embeds 
these teams within the supported Joint Task Force headquarters 
(typically J3 Directorate--Operations) to enable the delivery of cyber 
effects in support of the commander's priorities.
    The size, composition, and role of an ExCSE team is scalable 
depending on mission requirements. For example, in Iraq and Afghanistan 
the ExCSEs provide cyber expertise directly to the deployed 
headquarters' planning effort while coordinating the delivery of cyber 
effects through USCYBERCOM headquarters and interagency partners. In 
future conflicts involving full-scale operations against sophisticated 
cyber adversaries, the ExCSEs will scale to meet mission requirements. 
The ExCSE teams will continue to coordinate for global effects through 
USCYBERCOM but will also play a key role in coordinating planning, 
direction, and execution of cyber operations through an in-theater 
Joint Cyber Operations Task Force (JCOTF).
    Mr. Skelton. The Committee appreciates the complexity of 
coordinating cyber operations in various Service, Agency, interagency, 
international and non-governmental organizations geographically 
dispersed across the world. To deal with that challenge, what tools, 
technologies, processes or procedures do you have in place, or are 
planning, to facilitate collaboration across the full range of cyber 
operations?
    General Alexander. Success in the cyber domain does demand 
coordination amongst all entities listed in the committee's question, 
and in fact requires close interaction and cooperation with academia 
and industry. USCYBERCOM has ongoing interaction/collaboration with all 
of these entities and leverages NSA's existing relationships. 
Additionally, to continue building essential collaboration, USCYBERCOM 
is exchanging co-located liaisons and increasing leadership 
participation in interagency groups (existing and planned); information 
and data exchanges to build shared situational awareness; cooperative 
exercises and planning efforts; periodic synchronization conferences; 
and development of an Integrated Cyber Center.
                                 ______
                                 
                   QUESTIONS SUBMITTED BY MR. MILLER
    Mr. Miller. The cyber domain has become a formidable, dangerous 
``fourth'' domain in which warfare is not simply expected to occur but 
indeed is occurring. Numerous sources tell us, including the DOD, that 
the threat is tremendous to U.S. intellectual, utility, and financial 
infrastructure. We see reports every day where other nations, 
organization and, at times, individuals ``attack'' some aspect of 
American society whether it be governmental organizations, civilian 
organizations or even individual citizens. It would seem most of the 
work the services are involved in appears to only provide defense of 
the Department's IT network and specifically for their own service. 
Although this is important, should the Department be involved in the 
defense of the Nation's networks as well? I certainly understand there 
will be legal challenges that will need to be addressed, but are we 
exploring the concept of national cyber defense and not simply DOD 
defense.
    General Alexander. As exemplified by the 27 September 2010 DOD/DHS 
Memorandum of Agreement Regarding Cyber Security, the DOD is actively 
working with U.S. Government (USG) Departments and organizations (e.g. 
U.S. Computer Emergency Response Team, Department of State, Department 
of Energy, Department of Justice, and the Director of National 
Intelligence) to collaborate and synchronize shared situational 
awareness, actionable intelligence, and operations to enhance 
cybersecurity for the Nation. Under authorities granted to USSTRATCOM, 
USCYBERCOM exercises its Title 10 missions, roles and functions in 
accordance with U.S. laws, policies, and regulations. The authority 
delegated to USCYBERCOM extends only to operate, defend, and when 
directed, conduct full-spectrum operations for DOD or ``.mil'' 
networks.
    Mr. Miller. I'm concerned that as each service builds its own cyber 
entities, there could be a divergence in interoperability and a lack of 
interservice cooperation as each service grows in its own unique 
direction thereby creating a pre-Special Operations Command Special 
Operations type of situation. What are we doing to ensure this is not 
happening and ensuring there is no duplication of effort which could 
lead to confusion and ``cyber fratricide'' leading to mission 
degradation? Are we achieving the basic military principles of economy 
of force and unity of effort?
    General Alexander. As a sub-unified command under U.S. Strategic 
Command, U.S. Cyber Command is organized as a joint warfighting command 
supported by Service cyber components. The organizational structure of 
USCYBERCOM and its Service cyber components afford a joint unity of 
effort and economy of force for the planning, coordinating, 
integrating, synchronizing, and conduct of those activities in the 
operation and defense of specified Department of Defense information 
networks. USCYBERCOM and USSTRATCOM have established processes for DOD-
wide cyberspace operations capability development and acquisition to 
ensure cooperation and interoperability for cyber offensive, defensive, 
and network operations in its joint force.
    Mr. Miller. In terms of domains of conflict, there is air, space, 
land and sea. Cyber would seem to be a new domain. Would it be wise to 
consider a service that would be solely dedicated to training and 
equipping personnel for a joint commander just as the services provide 
forces for their respective domains to the combatant commander? If not, 
why not?
    General Alexander. Among the principal challenges facing the DOD in 
cyberspace is the ability to generate capacity--recruiting, training, 
certifying, and retaining a sufficient number of cyber operators. The 
services--Army, Marines, Navy, and Air Force have structure and 
organizational identity to recruit and identify talent. The current 
training regime is built to a Joint standard. The USCYBERCOM stand-up 
was a logical step in bringing similar organizational structure and 
alignment to this domain. USCYBERCOM's goal is for Joint Force 
Commanders to have the ability to plan for effects in cyberspace as an 
integral--not separate--part of their mission planning, execution, and 
assessment cycles.
    Mr. Miller. Cyber Command is intended to be a Joint Sub-unified 
Command reporting to STRATCOM. I would assume that each service is 
``training and equipping'' personnel to provide forces to the Joint 
Cyber Command. Based on the well-documented size and scope of the cyber 
threat, do you all believe that Cyber Command should be its own 
Combatant Command? If the threat truly is a dangerous as we say, and I 
certainly believe that it is, why wouldn't we stand up a command that 
has sole responsibility to execute operations within its AOR such as 
any other COCOM?
    General Alexander. USCYBERCOM is a sub-unified command organized 
under USSTRATCOM. There were several studies--from outside the 
Department, to across the Department, and within USSTRATCOM that 
considered a wide range of options for ``best fit'' organizational 
alignment. These studies were undertaken with facts and informed 
forecasts at that time. We believe a sub-unified command was the best 
first step.
                                 ______
                                 
                   QUESTIONS SUBMITTED BY MR. TURNER
    Mr. Turner. In the opening portion of your verbal testimony, you 
identified developing, training, and educating cyber professionals as 
CYBERCOMMAND's top challenges. Further, training, organizing, and 
equipping the new cadre of cyber professionals has been a common 
concern among policymakers addressing cyber-capabilities for our 
National interests. Our U.S. Deputy Secretary of Defense (DSD), William 
J. Lynn III, identified the ``strengthening of human capital in trained 
cyber-security professionals'' as a significant concern. In his Foreign 
Affairs article, he asserted that the U.S. needs to graduate ``three 
times as many security professionals annually as a few years ago.'' How 
do you envision the premier cyber program at Air Force Institute of 
Technology being optimized to educate and train professionals at/for 
CYBERCOMMAND?
    General Alexander. The Air Force Institute of Technology (AFIT) 
Center for Cyberspace Research offers a wide range of Certificate, 
Undergraduate, Master's, and PhD level programs for the cyber 
community. These programs, along with similar programs through the 
Naval Postgraduate School (NPS) and the Army's Advanced Civil Schooling 
(ACS) program, provide cyber professionals with the educational 
foundation and professional development required to be successful as 
they transition to intermediate and higher levels of responsibility and 
leadership. AFIT supplements the USCYBERCOM requirements for a cadre of 
trained personnel in a standardized cyber curriculum for senior 
enlisted, mid-level Captains and Department of the Air Force civilians. 
We intend to work closely with AFIT and NPS leadership to ensure their 
programs reflect the lessons we learn from operating in cyberspace.
    Mr. Turner. The Dayton area is home to the Advanced Technical 
Intelligence Center (ATIC), a classified facility focused on providing 
the necessary technical education for intelligence professionals. How 
do you see facilities such as ATIC supplementing the training need for 
security professionals?
    General Alexander. The Advanced Technical Intelligence Center 
(ATIC) offers a wide range of classified and unclassified, entry level/
familiarization/overview courses in the intelligence or related fields. 
These programs could help fulfill intelligence community knowledge gaps 
that military educational institutions are currently unable to provide. 
These courses provide an effective means for gaining essential basic 
knowledge requirements or specific specialized training in low-density 
skill sets. USCYBERCOM will continue to collaborate with ATIC as well 
as other elite learning institutions and activities through the 
National Defense University system to integrate, when applicable, 
current training and education requirements. USCYBERCOM will continue 
to provide guidance on future requirements and standards. ATIC's 
distance learning capabilities coupled with abilities to rapidly 
develop training on emerging technologies could be leveraged to support 
cyber-related training requirements across the DOD, until the services 
can generate the capacity and throughput required to meet mission 
demands.
    Mr. Turner. As quoted by Deputy Secretary of Defense William Lynn 
in the Foreign Affairs article, ``Defending a New Domain: The 
Pentagon's Cyberstrategy,'' the report, ``NATO 2020: Assured Security; 
Dynamic Engagement,'' a NATO [North Atlantic Treaty Organization]-
commissioned study chaired by former U.S. Secretary of State Madeleine 
Albright, rightly identified the need for the alliance's new 
``strategic concept'' to further incorporate cyber defense. The U.S. 
government must ensure that NATO moves more resources to cyber defense 
so the member states can defend networks integral to the alliance's 
operations. As a NATO parliamentarian, I am interested in transatlantic 
security and ensuring we continue to build coalition capacity around 
the world. It is notable that DSD Lynn emphasized the five principles 
of Department's strategy in cyberspace in Brussels, while also stating 
that NATO must build a ``cyber shield'' to protect the transatlantic 
alliance from any Internet threats to its military and economic 
infrastructures. A) What initiatives are in place to develop NATO 
partners in the cyber arena? B) When addressing cybersecurity issues 
involving NATO and other international allies, what are your greatest 
challenges? C) How can international partnerships be cultivated and 
improved upon in the cyber domain? D) What mechanisms does USCYBERCOM 
have at its disposal to share intelligence with our allies?
    General Alexander. DOD has an agreement with NATO for conducting 
Information Assurance (IA) and Computer Network Defense (CND) 
information exchanges and related activities. EUCOM's Network Warfare 
Center is the executive agent responsible for overseeing the day-to-day 
management of the implementation activities of the agreement and 
USCYBERCOM is the DOD agent responsible for providing and receiving IA/
CND information with the Technical Centre, NATO Computer Incident 
Response Center.
    The greatest challenges in addressing cybersecurity issues are the 
downgrading, releasing, or disclosing of classified information, which 
supports cybersecurity strategies. Enduring methods to maximize shared 
situational awareness while reducing risk to U.S. networks remain a 
significant challenge. Additionally, USCYBERCOM must have a means to 
rapidly and securely share situational awareness information and 
mitigation strategies.
    Strategic partnerships should mutually benefit both USCYBERCOM and 
its foreign counterparts. At minimum, informal discussions and 
engagement would increase our shared understanding about activities, 
capabilities, and areas for cooperative development, improve cyber 
defense activities and reduce misinterpretation and potential 
escalation of malicious cyber actions. Formal partnerships may also 
increase shared early warning, collective self-defense, and integrated 
operational planning. Further, our efforts are to support COCOM theater 
cooperation plans.
    USCYBERCOM is not an intelligence agency. USCYBERCOM leverages 
existing DOD and intelligence community procedures and protocols. The 
International CND Coordination Working Group was established and 
subsequently developed standard operating procedures to facilitate the 
exchange of information via weekly teleconferences between the 
respective military CND watch centers, and methods to submit requests 
for information regarding noted intrusion activities.
    Mr. Turner. For the purposes of a hypothetical scenario, assume 
Fleet Cyber Command obtains information which they believe poses a 
credible threat to U.S. Naval operations or forces. Further assume that 
Fleet Cyber Command believes this information could compromise Army or 
ARFORCYBER operations or forces if such information were shared beyond 
Fleet Cyber Command officials. How can CYBERCOM ensure that effective 
communication exists among organizations, and avoid the pitfalls/
difficulties in integration faced by other entities within the national 
and homeland security infrastructure?
    General Alexander. Commander USCYBERCOM will lead cyberspace 
operations as a joint endeavor with all cyber forces, regardless of 
service component, fully integrated into a joint fighting force. 
USCYBERCOM will enable and task through a joint operations center the 
synchronization and coordination of DOD cyber operations. USCYBERCOM's 
Joint Operations Center (JOC) is linked to service network operations 
centers ensuring threat information is passed in a timely manner.
    Mr. Turner. Within the last decade, some might argue that the 
organizational structures of the separate agencies (FBI, CIA, etc.) 
were not effectively organized to prevent a national disaster. Of which 
``lessons observed'' from our intelligence community should CYBERCOM be 
mindful, and address in its culture and organizational structure, in 
order to be proactive and effectively prevent future asymmetric 
attacks? How can our national cyber infrastructure avoid organizational 
bureaucratic inefficiencies and stovepiping? How does CYBERCOM 
culturally encourage collaboration, communication and information-
sharing? With which entities throughout the DOD and government does 
CYBERCOM most frequently cooperate on intelligence matters?
    General Alexander. In recent years (2007-2008), the cyber events in 
Latvia, Lithuania, Estonia, and Georgia, have informed all domestic 
U.S. agencies and organizations of the inherent vulnerabilities within 
the cyber domain. USCYBERCOM continuously educates, trains, exercises, 
operates, and assesses operational readiness to conduct full-spectrum 
operations. In partnership with other U.S. Government (USG) agencies, 
COCOMs, and DOD organizations, USCYBERCOM leverages its relationship 
with the NSA to develop, assess, and monitor strategic indications and 
warning through the capabilities and accesses developed by the 
intelligence community (IC) and interagency.
    As exemplified by the 27 September 2010 DOD/DHS Memorandum of 
Agreement Regarding Cybersecurity, the DOD is actively working with the 
other USG Departments to collaborate and synchronize shared situational 
awareness, actionable intelligence, and operations to enhance 
cybersecurity for the Nation.
    To promote shared situational awareness and information sharing, 
USCYBERCOM actively engages with IC and interagency organizations.
    The USCYBERCOM mission requires constant interaction with IC and 
interagency partners. One vehicle for this cooperation is the Joint 
Interagency Task Force-Cyber (JIATF-C). The JIATF-C includes all 
members of the IC, all COCOMS (and their respective Joint Intelligence 
Operations Center (JIOC) elements), and multiple members of the USG 
interagency community (e.g., FBI, DOJ, Treasury, DHS, DOS, etc.). Many 
of these organizations have personnel integrated into USCYBERCOM to 
perform vital coordination and liaison functions dramatically enhancing 
the speed at which USCYBERCOM can access and share intelligence in 
support of USCYBERCOM's missions and goals.
    Mr. Turner. For the purposes of a hypothetical scenario, assume the 
24th Air Force is headquartered and/or operates primarily out of San 
Antonio, TX, and that Fleet Cyber Command is headquartered and/or 
operates primarily out of Annapolis, MD. Further assume that a cyber 
attack has crippled the 24th Air Force's electronic communications 
capabilities. Without the ability to communicate effectively in the 
event of a cyber attack, USCYBERCOM and any one of its members runs the 
risk of being, in essence, useless. If a nation is under attack--be it 
cyber or otherwise--communication and rapid response are vital. A) How 
can USCYBERCOM ensure that the means of communication upon which it 
relies will not itself be compromised? B) How can USCYBERCOM maintain 
open lines of communication among its member when telephone, e-mail, 
fax, etc. are compromised?
    General Alexander. USCYBERCOM has four service components, 
including both 24th Air Force and Fleet Cyber Command. The dispersed 
nature of the headquarters components and global presence of cyber 
forces serves to mitigate this scenario. The key to sustainable mission 
assurance is developing and sharing a combined situational awareness. 
Effectively, cyber forces at all echelons, will access this common 
operational picture and take appropriate actions toward an effective 
defense posture. More broadly, as a matter of prudent military 
planning, USCYBERCOM and its components are developing continuity of 
operations plans. These plans delineate and prioritize critical mission 
functions in the event of short or long-term disruptions and designated 
locations and required functionality for rapid reconstitution of 
command capabilities. As our networks continue to converge, the 
distinction between telephone, e-mail, and facsimile will be far less 
discernable.
    Mr. Turner. Jurisdiction is of tremendous significance in any 
discussion of cyberspace. Cyberspace is the most unique medium through 
which an individual or group may influence or attack. The ability to 
conceal, obscure, or otherwise mask one's identity and geographic 
locale is perhaps more prevalent in cyberspace than in any medium. What 
challenges and processes do you envision in adjudicating or determining 
future jurisdictional issues, which will undoubtedly arise?
    General Alexander. While jurisdiction is more of an immediate 
concern in civilian law enforcement, it is still an issue for military 
cyberspace operators as well. Terrorists can now ``forum shop'' and 
choose beneficial jurisdictions from where they can launch their 
attacks. Cyberspace is a domain in which even one computer operator 
conceivably possesses a global strike capability regardless of 
location. It used to be that terrorists had to physically locate 
themselves in their target area, but that is no longer the case. The 
uniqueness of the cyberspace domain affords terrorists, nation-states, 
or international criminals the ability to strike from or through 
favorable jurisdictions, complicating efforts to identify, investigate, 
and apprehend a perpetrator. Cyberspace affords our adversaries the 
ability to mask the identity and source of an attack, making 
attribution and defense a greater challenge.

                                  



NEWSLETTER
Join the GlobalSecurity.org mailing list