UNITED24 - Make a charitable donation in support of Ukraine!

Homeland Security

[House Hearing, 112 Congress]
[From the U.S. Government Printing Office]






                                     

                         [H.A.S.C. No. 112-26]
 
                                HEARING
                                   ON
                   NATIONAL DEFENSE AUTHORIZATION ACT
                          FOR FISCAL YEAR 2012
                                  AND
              OVERSIGHT OF PREVIOUSLY AUTHORIZED PROGRAMS

                               BEFORE THE

                      COMMITTEE ON ARMED SERVICES

                        HOUSE OF REPRESENTATIVES

                      ONE HUNDRED TWELFTH CONGRESS

                             FIRST SESSION

                               __________

       SUBCOMMITTEE ON EMERGING THREATS AND CAPABILITIES HEARING

                                   ON

                 BUDGET REQUEST FOR U.S. CYBER COMMAND

                               __________

                              HEARING HELD
                             MARCH 16, 2011


                                     
[GRAPHIC] [TIFF OMITTED] TONGRESS.#13

                                     

                  U.S. GOVERNMENT PRINTING OFFICE
65-593                    WASHINGTON : 2011
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing 
Office, http://bookstore.gpo.gov. For more information, contact the 
GPO Customer Contact Center, U.S. Government Printing Office. 
Phone 202-512-1800, or 866-512-1800 (toll-free). E-mail, gpo@custhelp.com.  
  


           SUBCOMMITTEE ON EMERGING THREATS AND CAPABILITIES

                    MAC THORNBERRY, Texas, Chairman
JEFF MILLER, Florida                 JAMES R. LANGEVIN, Rhode Island
JOHN KLINE, Minnesota                LORETTA SANCHEZ, California
BILL SHUSTER, Pennsylvania           ROBERT ANDREWS, New Jersey
K. MICHAEL CONAWAY, Texas            SUSAN A. DAVIS, California
CHRIS GIBSON, New York               TIM RYAN, Ohio
BOBBY SCHILLING, Illinois            C.A. DUTCH RUPPERSBERGER, Maryland
ALLEN B. WEST, Florida               HANK JOHNSON, Georgia
TRENT FRANKS, Arizona                KATHY CASTOR, Florida
DUNCAN HUNTER, California
                 Kevin Gates, Professional Staff Member
                 Mark Lewis, Professional Staff Member
                      Jeff Cullen, Staff Assistant


                            C O N T E N T S

                              ----------                              

                     CHRONOLOGICAL LIST OF HEARINGS
                                  2011

                                                                   Page

Hearing:

Wednesday, March 16, 2011, Fiscal Year 2012 National Defense 
  Authorization Budget Request for U.S. Cyber Command............     1

Appendix:

Wednesday, March 16, 2011........................................    27
                              ----------                              

                       WEDNESDAY, MARCH 16, 2011
FISCAL YEAR 2012 NATIONAL DEFENSE AUTHORIZATION BUDGET REQUEST FOR U.S. 
                             CYBER COMMAND
              STATEMENTS PRESENTED BY MEMBERS OF CONGRESS

Langevin, Hon. James R., a Representative from Rhode Island, 
  Ranking Member, Subcommittee on Emerging Threats and 
  Capabilities...................................................     6
Thornberry, Hon. Mac, a Representative from Texas, Chairman, 
  Subcommittee on Emerging Threats and Capabilities..............     1

                               WITNESSES

Alexander, GEN Keith B., USA, Commander, U.S. Cyber Command......     4
Miller, Dr. James N., Principal Deputy Under Secretary of Defense 
  for Policy, U.S. Department of Defense.........................     2

                                APPENDIX

Prepared Statements:

    Alexander, GEN Keith B.......................................    48
    Langevin, Hon. James R.......................................    33
    Miller, Dr. James N..........................................    35
    Thornberry, Hon. Mac.........................................    31

Documents Submitted for the Record:

    [There were no Documents submitted.]

Witness Responses to Questions Asked During the Hearing:

    Mr. Johnson..................................................    71
    Mr. Thornberry...............................................    71

Questions Submitted by Members Post Hearing:

    Mr. Ruppersberger............................................    76
    Mr. Thornberry...............................................    75
FISCAL YEAR 2012 NATIONAL DEFENSE AUTHORIZATION BUDGET REQUEST FOR U.S. 
                             CYBER COMMAND

                              ----------                              

                  House of Representatives,
                       Committee on Armed Services,
         Subcommittee on Emerging Threats and Capabilities,
                         Washington, DC, Wednesday, March 16, 2011.
    The subcommittee met, pursuant to call, at 3:50 p.m. in 
room 2212, Rayburn House Office Building, Hon. Mac Thornberry 
(chairman of the subcommittee) presiding.

OPENING STATEMENT OF HON. MAC THORNBERRY, A REPRESENTATIVE FROM 
     TEXAS, CHAIRMAN, SUBCOMMITTEE ON EMERGING THREATS AND 
                          CAPABILITIES

    Mr. Thornberry. As you all can tell, the votes have 
discombobulated the schedule. I think we are going to go ahead 
and get started in the interest of time.
    We appreciate both of our witnesses and all our guests 
being here.
    The first hearing of this subcommittee posed the question, 
What should be the role of the Department of Defense to defend 
the country in cyberspace? Today, we ask the same question.
    The example we used at our previous hearing was, if a 
formation of planes or hostile-acting ships came barreling 
towards the Houston ship channel, I think we would have some 
sort of idea of what we would expect the Government to do in 
protecting those facilities and the Americans in them. But it 
is a harder question to say, if a bunch of packets come 
barreling through the Internet toward the same facilities, what 
would we expect the Government to do to defend them? Is the 
Government capable of doing what we expect, and is the 
Government authorized to do what we expect?
    There seems to be virtually unanimous agreement that the 
threat to our country in cyberspace is growing. DNI [Director 
of National Intelligence] Clapper testified a few weeks ago 
during the worldwide threat hearing that ``the threat is 
increasing in scope and scale, and its impact is difficult to 
overstate.'' He made a number of other statements in his 
testimony, something like two-thirds of U.S. firms report they 
have been the victim of cyberspace incidents or information 
breaches. Almost half of U.S. computers have been compromised, 
according to another survey.
    Today, General Alexander--in addition to the questions I 
posed, today General Alexander will also give us an update on 
Cyber Command and its budget request for 2012 and how it is 
doing in accomplishing its mission of defending DOD [Department 
of Defense] networks.
    But, as Deputy Secretary Lynn wrote in Foreign Affairs, 
``The best-laid plans for defending military networks will 
matter little if civilian infrastructure--which could be 
greatly targeted in a military conflict or held hostage and 
used as a bargaining chip against the U.S. Government--is not 
secure.''
    In sum, I believe that our Government and our country have 
not yet come to grips with the unique national security 
challenges that cyber poses. The changes in technology have 
simply outpaced the modernization of our laws, regulations, and 
policies. A great deal of work has been done in this area from, 
among others, our witnesses and the distinguished ranking 
member of this subcommittee, but yet we still haven't really 
grappled with these key issues.
    For the last 8 months, Congress has waited to receive the 
White House's proposals on cybersecurity. We continue to hear 
that they may come soon. But I do note that in his July 1 
letter asking for the White House proposals, Majority Leader 
Reid and six committee chairmen from the Senate wrote, ``Each 
day, the threat to cyberspace--and to the American citizens, 
businesses, service members, critical infrastructure, and 
Government agencies that depend on it--only increases.''
    And they also said, ``Securing the vast digital 
infrastructure of our Nation's communications networks and 
information systems--our cyberspace--is essential to the future 
of our Government, our economy, and the security of our 
Nation.'' I would submit, gentlemen, that that is the reason we 
are here today.
    When Mr. Langevin comes, I will give him the opportunity to 
make whatever opening comments he would like to make. But until 
then, let me go ahead and yield to our distinguished witnesses 
for a summary of their opening statement.
    Without objection, your complete statements will be made 
part of the record.
    Today we have with us General Keith Alexander, Commander of 
U.S. Cyber Command and Director of the National Security 
Agency, and Dr. James Miller, Principal Deputy Under Secretary 
of Defense for Policy.
    Thank you both for being with us.
    And I presume, Dr. Miller, you will go first.
    [The prepared statement of Mr. Thornberry can be found in 
the Appendix on page 31.]
    Dr. Miller. Thank you, Chairman Thornberry, members of the 
subcommittee, thank you for inviting me to testify.
    Mr. Thornberry. There is a problem with our sound. We all 
may have to really speak up. I worry about the court reporter, 
whose job it is to take down every word you say. Jeff will 
continue to work on this problem, but if you would like to go 
ahead with raised voice.

   STATEMENT OF DR. JAMES N. MILLER, PRINCIPAL DEPUTY UNDER 
  SECRETARY OF DEFENSE FOR POLICY, U.S. DEPARTMENT OF DEFENSE

    Dr. Miller. Mr. Chairman and members of the subcommittee, 
thank you for inviting me to testify this afternoon. I am very 
pleased to join the CYBERCOM [U.S. Cyber Command] Commander and 
National Security Agency Director, General Keith Alexander.
    As you know, the Department of Defense is investing heavily 
in information technology, with $38.4 billion proposed for 
fiscal year 2012. We are making that investment because IT 
[information technology] is an enormous force multiplier for 
military, intelligence, and business operations. Given DOD's 
reliance on IT, our proposal to spend $3.2 billion for 
cybersecurity in fiscal year 2012, including $159 million for 
USCYBERCOM, makes good sense.
    As I describe in my prepared statement and as the chairman 
alluded to, the threat to DOD and other critical networks is 
large and it is increasing. DOD is undertaking five key 
cyberspace initiatives to improve our posture, and I would like 
to say just a few words about each.
    First, in order to properly train, organize, and equip our 
forces, DOD recognizes cyberspace as a domain for military 
activities, analogous to the maritime, air, land, and space 
domains. CYBERCOM, headed by General Alexander, is a key step 
in improving our posture.
    Because we realize that cyber defense will not always 
succeed, all combatant commands and the services must be 
prepared to operate in a degraded cyber environment in which 
data networks are not fully reliable and access may be 
disrupted.
    DOD's second strategic initiative is to employ new 
operating concepts both for cyberspace hygiene and for active 
cyber defenses. DOD's active cyber defenses include a perimeter 
defense of the dot-mil Internet domain that screens incoming 
traffic for malicious code and malware. And because no 
perimeter defense is fail-proof, DOD also hunts for intrusions 
on our own networks as well. We look for anomalies like 
viruses, worms, and other software that could cause damage to 
our networks and systems.
    DOD's third initiative is to work closely with other U.S. 
Government departments and the private sector to create a 
national approach to cybersecurity. On September 27, 2010, 
Secretary Gates and Secretary of Homeland Security Napolitano 
signed a memorandum of agreement to allow the DHS [Department 
of Homeland Security] to draw on the cybersecurity capabilities 
already established by the National Security Agency and 
USCYBERCOM. A Joint Coordination Element, headed by DHS, now 
resides at Fort Meade and at NSA [the National Security Agency] 
headquarters.
    A great deal of sensitive but unclassified information 
resides on the networks of the 2,600-plus cleared defense 
contractors that work with our military, and DOD is requesting 
$113 million over the Future Years Defense Program to upgrade 
this pilot to a full program. We are also exploring other pilot 
projects with industry that would allow DOD to further extend 
its suite of cybersecurity capabilities to companies in the 
defense industrial base.
    Our fourth strategic cyberspace initiative is to build 
robust relationships with U.S. allies and international 
partners. We have already worked particularly closely with 
Australia, Canada, New Zealand, and the United Kingdom. And, 
over the last year, we have significantly expanded 
collaboration with NATO [the North Atlantic Treaty 
Organization] to implement the Alliance's emphasis on cyber 
defense as agreed in its new Strategic Concept.
    Finally, DOD is working to ensure that we stay on the 
cutting edge with respect to both people and technology for 
cyberspace. We are taking a number of steps to recruit and 
retain talented civilian and military cyber personnel, 
including better utilizing the incredible expertise resident in 
the National Guard and Reserve.
    On the acquisition side, it currently takes the DOD's 
acquisition processes 81 months, on average, to make new 
computing systems operational. That means by the time they are 
fielded, they are already three to four generations behind the 
state of the art. We are working to get cycles of 12 to 36 
months as opposed to 7 or 8 years.
    In conclusion, I want to thank the subcommittee for its 
focus on cyberspace. As a department, I believe we have made a 
lot of progress in developing our approach and in improving 
cybersecurity, but we have a lot of work left to do. I look 
forward to working with Congress and the subcommittee to 
improve our Nation's cyberspace posture as well.
    And I look forward to your questions.
    [The prepared statement of Dr. Miller can be found in the 
Appendix on page 35.]
    Mr. Thornberry. I think they are trying to reset the 
system, and so they are all off--a fascinating thing to have 
happen on a cyberspace hearing. I appreciate everybody's 
indulgence.
    General Alexander, please proceed.

STATEMENT OF GEN KEITH B. ALEXANDER, USA, COMMANDER, U.S. CYBER 
                            COMMAND

    General Alexander. Chairman Thornberry, Ranking Member 
Langevin, distinguished members of the committee, it is an 
honor and a privilege to be here to testify with Dr. Miller.
    Chairman Thornberry, the key points that you made, first, 
on where we are and where we are going, I absolutely agree 100 
percent. I think you hit that correct.
    Thanks for helping us build Cyber Command. I want to hit a 
few key points on what we have done, where we are, where we are 
going, and why we are at where we are today.
    If you recall, a few years ago we looked at the threat. 
What Director Clapper said to you was absolutely right: The 
threat is growing every day. It is something that we have to 
look at from a military perspective. It is the reason we put 
Cyber Command at NSA, to leverage our Nation's capability in 
cyberspace.
    You are seeing what is happening in the commercial sector, 
where we are having exploits going on all the time. Seventy-
five percent of the population's computers have been exploited 
for criminal purposes. If you look at the amount of activity 
that is going on with new devices, the amount of e-mail and 
stuff, this area is exploding rapidly--tremendous opportunities 
and tremendous vulnerabilities.
    In 2008, we had some malware, malicious software, come into 
our networks. When that malware hit our networks, it is what 
started U.S. Cyber Command, because the Secretary of Defense 
realized that we need to bring our defense together with other 
capabilities in the Nation, do that at NSA, leverage that 
platform.
    NSA was one of the initial ones that found the problem, 
came up with a solution for it. And when we looked at that, 
that is what we need in our Nation, and that is what the 
military needs.
    We have moved quickly in putting together Cyber Command. 
May 2010, we had our initial operating capability. October 
2010, full operational capability for the staff. We have stood 
up the four components under that, and we are growing capacity. 
That will take some time, to build that capacity, but every day 
is an improvement.
    We are building plans with the other combatant commands to 
help in cyberspace. And we are defending and operating the 
military networks today--a huge step forward. And we are doing 
that by bringing the full capability of the Defense Department 
and the intel community together under one roof. I can't tell 
you how important that is. It is huge in our capabilities.
    So when you look at that, the Defense Department has a 
tremendous jump forward in what we are doing and how we are 
doing it. And the ability and agility to move quickly between 
operations in defense when events like what has happened in 
Japan to our networks, we can quickly accommodate, whether it 
is a natural disaster or a manmade disaster. I think that is a 
huge step forward.
    So I wanted to leave time for questions, and I know we have 
been asked to go quickly. But there are a few things I would 
like to hit that Secretary Lynn hit in the article that you 
referenced. He mentioned five key areas about cyberspace; it is 
a domain analogous to air, land, sea, and space. He talked 
about the active defense, he talked about critical 
infrastructure, he talked about partnering with our allies, and 
he talked about leveraging technology.
    Two of those are key--they are all key, of course--but two 
of those are key for this discussion, and that is, how are we 
going to defend? And the active defense is what we did in 
leveraging what NSA can do with what the Defense Department is 
doing.
    And, from my perspective, that is key. How are we going to 
hunt in our networks? How do we provide a capability that goes 
beyond what you can commercially buy, by leveraging our 
intelligence community and our military capabilities to help 
expand our defense? How do you leverage that global cryptologic 
platform as an early warning capability? It is those kinds of 
things that we have to look at.
    And, finally, when we prove that that is good for the 
military networks, I think he made a great point that resonates 
with what you said: How do we then extend that, lawfully, while 
protecting civil liberties and security, to the rest of 
Government and critical infrastructure? And, of course, doing 
that right, that is what is taking time, that is what everyone 
is working on. I think that is a huge step forward.
    I will tell you that one of the things that, from my 
perspective, is so important in this area--you know, our Nation 
built the Internet. We are the ones that developed this, the 
iPad and many of the devices that we have. We are an innovation 
nation; we are the ones who came up with that. It seems to me, 
we are the ones that ought to solve this security problem. And 
we can. And it is going to take a partnership between us and 
industry. It is something that we ought to work together. And 
we can do this; we just need to drive through it.
    Mr. Chairman, that is all I have.
    [The prepared statement of General Alexander can be found 
in the Appendix on page 48.]
    Mr. Thornberry. Thank you. I appreciate your comments.
    Let me yield to the ranking member for any comments he 
would like to make. And if he wants to go ahead and do his 
questions right after that. I yield to him.

  STATEMENT OF HON. JAMES R. LANGEVIN, A REPRESENTATIVE FROM 
RHODE ISLAND, RANKING MEMBER, SUBCOMMITTEE ON EMERGING THREATS 
                        AND CAPABILITIES

    Mr. Langevin. Thank you, Mr. Chairman, first of all, for 
calling this very important subcommittee hearing.
    I want to thank Dr. Miller and General Alexander for being 
here today. I want to welcome you.
    And, in particular, General, I want to just take a moment 
to commend you on the successful stand-up of your new command 
over the past months.
    And I want to thank you both for appearing today to discuss 
what I believe is one of the most important missions and 
national security issues facing our Nation today.
    It is difficult to fully appreciate the importance of 
cybersecurity issues to our national security. From day-to-day 
tasks to critical operations, our warfighters depend on the 
integrity of our networks.
    At the same time, cyberspace itself has become weaponized. 
The STUXNET virus as well as massive denial-of-service attacks 
successfully targeting our allies in Georgia and Estonia have 
given us a glimpse of the damage cyber-weapons can cause.
    In some ways, thinking about conflict in cyberspace reminds 
us of some warfighting basics. The principles of offense and 
defense appear to remain largely the same, but the speed of 
information is so fast that complexity increases exponentially. 
Also, unlike the land, sea, or air, this virtual, manmade 
domain is limitless.
    I believe that we must better understand how the United 
States should safeguard our critical networks, while at the 
same time developing the full spectrum of cyber tools to deal 
with conflict in a new environment.
    General Alexander, last September, when you appeared before 
the Armed Services Committee, I asked you about your role in 
defending critical infrastructure from cyber attack that may 
reside in other parts of the Government or in private hands. 
You noted that your role as head of USCYBERCOM was to protect 
only military networks. And that is within your authority, and 
it, for the most part, is limited there.
    At an Emerging Threats Subcommittee hearing later that day 
with the chiefs of our Services' cyber components, I revisited 
your answer and asked what they were doing to protect military 
bases that solely rely on civilian critical infrastructure. 
Their answers, unfortunately, were grim but not unexpected. For 
example, Vice Admiral Barry McCullough, head of the Navy's 10th 
Fleet, testified that, and I quote, ``These systems are very 
vulnerable to attack,'' end quote, noting that much of the 
power and water systems for our military bases are served by 
single sources that have only very limited backup capabilities.
    With an attack like the one demonstrated by Idaho National 
Labs in their Aurora experiment on a power station, potentially 
requiring weeks or months to recover from, our bases could face 
serious problems maintaining operational status. Beyond even 
the massive damage to our economy and civilian institutions 
that a major attack on our critical infrastructure could have, 
clearly this is a vital military concern, as well.
    Today, I reintroduced language, which the House passed in 
our National Defense Authorization Act last year, which would 
enable the White House to better coordinate our Federal cyber 
defenses and secure our critical infrastructure. I believe it 
is essential that we continue to make progress in managing this 
threat.
    Although we have not yet faced a catastrophic cyber 
attack--and that is very fortunate--I do recognize that every 
day we see lower-level intrusions and thefts of everything from 
sensitive defense information to information on our financial 
system and critical infrastructure, as suggested in numerous 
press reports. While I am certainly thankful that we have so 
far been spared a major attack, the low level of these 
incidents has in some ways hindered our ability to move forward 
on solving this issue.
    As the commander of CYBERCOM and the director of the 
National Security Agency, General, you direct our Nation's most 
powerful capabilities in the cyber realm. And I know, from 
speaking with you, that you also share my concerns that we have 
not yet fully seen the extent of the damage that cyber-weapons 
can wreak.
    I know that defending against a collapse of our financial 
system or a meltdown of our power grid is outside the scope of 
the Department of Defense's responsibilities, in many ways, but 
if done intentionally, it would still amount to an act of war.
    Today, I look forward to discussing and hearing further 
about how Cyber Command is growing and how your component 
commands are coming on line. I also look forward to hearing how 
the Administration is developing an overarching approach to 
cybersecurity and how DOD's role may need to evolve.
    Most of all, I hope to understand what the Administration 
plans to do to fill the gap between these growing threats and 
our ability in the public and private sectors to manage them. 
What authorities should we examine and what tools can the 
Government develop to increase our ability on a national level 
to meet these challenges?
    Again, I want to thank you both for being here today. I 
appreciate your testimony, and I look forward to our question-
and-answer period. Thank you.
    Mr. Chairman, with that, I will yield back to you, unless 
you want me to go into my questions.
    [The prepared statement of Mr. Langevin can be found in the 
Appendix on page 33.]
    Mr. Thornberry. I think if the gentleman wants to proceed 
with his questions, we will operate under the 5-minute rule.
    Mr. Langevin. Thank you, Mr. Chairman.
    General, if I could, perhaps I would begin with you.
    It is clear that if enemy bombers were heading to the 
United States and we had actionable intelligence that they were 
clearly targeting critical infrastructure within our Nation, 
that the Air Force and other components of the military would 
take them down. And it is clearly the responsibility of DOD to 
stop that attack.
    If there were an attack in cyberspace, an attack on the 
SCADA [Supervisory Control and Data Acquisition] system, with 
the clear intention of taking down sectors of our electric 
grid, do you have the authority to stop that attack? And, if 
not, who does?
    General Alexander. We do not have the authority to stop 
that attack. And on the critical infrastructure, I think that 
would fall to DHS. DHS has some of the authority, and I think 
extending that to critical infrastructure is something that the 
Government is addressing in the White House-led legislative 
proposals to ensure that we encompass that.
    Right?
    Dr. Miller. That is right.
    Mr. Langevin. General, then, let me ask you this: How do 
you think CYBERCOM should work with other Government agencies 
and the private sector to leverage the powerful capabilities 
that you possess for the protection of networks and 
infrastructure not specifically within the dot-mil domain? In 
particular--well, let me stop there, and I will come back if I 
need to.
    General Alexander. To answer that question, I am going to 
give you two, Congressman, two pieces of that, break it out 
into components.
    First, for Cyber Command, technically there are two things 
that we can do, the Defense Department and the intel community, 
Cyber Command. It is, we can provide malicious software 
signatures to help protect that, and early warning. So those 
are the two capabilities.
    The issue that you raise is, so how do we go about doing 
that, the roles and responsibilities between the Defense 
Department, DHS, and the intel community? And I think that is 
where the partnership that Secretary Gates and Secretary 
Napolitano addressed, and their initial memorandum of agreement 
in September 2010 is focused on addressing that. We have to 
bring those two departments together. I think both Secretaries 
see that.
    And the intent of that memorandum of agreement is a first 
step in how we leverage the capabilities that NSA has to help 
DHS. So I think that is a step in the right direction.
    Mr. Langevin. General, we know that the Tutelage program is 
designed to provide perimeter defense to the dot-mil network. 
What is the best way to extend similar protection to the dot-
gov network? And who does that? How do we do it?
    General Alexander. I believe the best way is to take that 
capability and work with industry to do that in a manner 
similar to what we are trying in the Defense Industrial Base 
Pilot with DHS and the Defense Department.
    In that pilot, the Department of Homeland Security and the 
Defense Department are working with the Tier 1 Internet service 
providers to provide that technical capability to them, along 
with some of the signatures and stuff, to defend a couple of 
defense industrial base companies. About 30 of them I think is 
what it will end up being. And it is showing that you can do 
that, that it scales across that level. We will demonstrate 
that with a few of the capabilities that we have.
    I think concurrent with that, as we are doing that, we have 
to look at the authorities and legislation to do the rest: What 
is required, and how do we quickly move to do that? 
Technically, we can do that very quickly. We want to make sure 
that we then have the authorities to do that, as well. And the 
pilot would show that we can do that.
    Mr. Langevin. And so then you have touched on, perhaps, 
taking the next step. Then, also, what is the best way to 
defend the dot-com network, particularly on critical 
infrastructure? So much of it is owned and operated in private 
hands. How do we then take that to the next step? And where do 
those responsibilities and authorities lie?
    General Alexander. From a technical perspective, the 
easiest way to do that is to partner with the Tier 1 Internet 
service providers. Government traffic and critical 
infrastructure traffic can be segregated in those areas and 
protected by those companies easiest. And our ability to work 
with them in a classified environment to ensure they have the 
signatures and stuff is probably the technically quickest way 
to go and the best way to go. It scales, and it shows it. And 
that is what the pilot would do.
    If we can do it for the Government, the way the Government 
is spread out, that would scale also to critical infrastructure 
if we deemed it necessary to do those, as well.
    Mr. Langevin. Very good.
    I see my time has expired. I have other questions, but 
thank you for your answers. And I will yield back at this time.
    Mr. Thornberry. I thank the gentleman.
    Dr. Miller, let me, just to be clear, ask you: Do you agree 
with Secretary Lynn's comments that the best-laid plans for 
defending military networks will matter little if civilian 
infrastructure is not secure?
    Dr. Miller. Yes, sir, I do.
    Mr. Thornberry. And my understanding, from the exchange 
from Mr. Langevin and General Alexander, is that, currently, 
Cyber Command does not have authority to make civilian networks 
secure.
    Dr. Miller. That is correct. CYBERCOM's mission is to 
provide the connectivity and oversight of our networks and to 
protect them and to be prepared to conduct full-spectrum 
cyberspace operations as directed by the President and 
Secretary of Defense.
    The National Security Agency, as you know, has provided 
technical assistance to our interagency partners, in particular 
working with the Department of Homeland Security. And the cyber 
pilot program that General Alexander talked about is a great 
example of that. We think we need to do more of that and to 
move forward as quickly as possible.
    Mr. Thornberry. Well, that gets me to the next question. In 
the same article, Deputy Secretary Lynn said that the Pentagon 
was working with Homeland Security and the private sector to 
look for innovative ways to use the military's cyber defense 
capabilities to protect the defense industry, as a start.
    So what are some of those innovative ways?
    Dr. Miller. Sir, the principal one that we are focused on 
now in bringing the innovation and new technologies to them is 
to look at the application of the systems that you referred to 
earlier and that General Alexander spoke about to help on 
perimeter defense. That is working with the ISPs [Internet 
service providers], as General Alexander noted.
    The other side of it, just like for DOD, we need to think 
about the cyber hygiene and what we can do internally. We need 
to think about how to hunt on our own networks and look for the 
problems that may already exist. And we need to work on that 
perimeter defense. I think all of those apply, as well, to dot-
gov, to the rest of the Government. And all those principles 
apply, as well, to the critical infrastructure in particular, 
the 18 designated areas of critical infrastructure.
    And so, as we look at what can be done to improve the 
posture from where we are today, the legislative proposals that 
the Administration is considering could span all of those: What 
are the incentives and assistance that can be provided for 
cyber hygiene, for example, as well as for the active defense?
    Mr. Thornberry. Yeah. Well, as I say, we are anxiously 
awaiting those.
    Last question: General Alexander, are you convinced that 
you can share some of this sensitive information to help 
provide greater perimeter defense and protect national security 
at the same time?
    General Alexander. Mr. Chairman, I am convinced that the 
Internet service providers can protect sensitive information.
    Mr. Thornberry. Okay.
    Let me yield at this point to Mr. Kline.
    Mr. Kline. Thank you. Thank you, Mr. Chairman.
    And thank you, gentlemen, for being here, for your 
testimony.
    I find myself still scratching my head over the same issues 
that we have heard discussed here, and that is, how do you even 
make a distinction between an attack on defense and keep it 
separate from an attack on something that is directly related 
to defense? A critical infrastructure question. Clearly, if you 
shut down the financial system in the United States, it would 
affect defense, it would affect everything.
    So I want to make sure I am clear on two things. One, I 
understand we are all anticipating this prospective 
legislation--although I must say, we have way too much 
experience in this committee with legislation, putting things 
into law, directing the Department of Defense to do stuff, and 
then the Department of Defense just deciding not to do it, 
frankly.
    We have put in law, for example, Mr. Thornberry and I 
worked very hard a couple of years ago on the NDAA [National 
Defense Authorization Act] directing the Secretary of Defense 
and the DNI to come up with a charter for the National 
Reconnaissance Office. It is a year and a half late now. It has 
been in law, but we haven't seen the results. And I know people 
are working. In fact, we have had interim reports.
    So while I am delighted that there is prospective 
legislation, I am just suggesting that might not be the whole 
answer. I trust, General and Mr. Secretary, that you are 
working on how to fight this in any case, despite the 
legislation.
    I want to see if I understand this. I am looking at the 
mission of USCYBERCOM as stated here in front of me: Plan, 
coordinate, and so forth. And it says, ``and when directed, 
conduct full-spectrum military cyberspace operations in order 
to enable actions in all domains, ensure U.S./Allied freedom of 
action in cyberspace, and deny the same to our adversaries.''
    So, if directed, then you would step in and provide 
defense, active or passive, in the event of an attack on 
infrastructure? Is that correct or not correct?
    General Alexander. Well, that is correct as you stated. Let 
me just give you, if I could, Congressman, a couple points on 
that.
    What that really drives to is--as part of my confirmation 
hearing, Senator Levin asked a very similar question, which 
was, so what does that mean? And the specifics of it are: If we 
are overseas in an area of hostilities, Cyber Command would be 
operating under Title 10 authorities----
    Mr. Kline. Uh-huh.
    General Alexander [continuing]. And we would be taking on 
the adversary, and we would have the authority to operate in 
cyberspace in that case.
    The issue becomes a little bit more difficult when you 
start looking at cyberspace as a global capability and bouncing 
through neutral countries. Now what are the authorities of land 
warfare? What are the laws and what are the policies on it? You 
have the inherent right of self-defense, but what can you do to 
stop somebody in a neutral country? And in cyberspace it is 
easy to jump through neutral countries to attack someone. And 
the third and the most difficult is what happens if they use 
the United States infrastructure to attack the United States? 
How do you do that? All of those are key things.
    For us to operate overseas, it is an execute order from the 
Secretary of Defense and the President. And that is what that 
specifically lays out. And that execute order gives us the 
authority to operate under those conditions and defines those 
conditions for us.
    Mr. Kline. What about if it is not overseas, which is kind 
of an antiquated, bizarre concept when we are talking about 
cyberspace, but what if it is not overseas? Is there a ``when 
directed'' still possible here?
    General Alexander. That is correct. There is a ``when 
directed.'' And that is----
    Mr. Kline. And by whom?
    General Alexander. It would be by the Secretary of Defense 
and the President.
    Mr. Kline. Okay.
    I have just about run out of time, but very quickly, there 
are a number of issues about getting adequately trained 
personnel in high-technical areas. It is true in space, and I 
would think it would be true in cyberspace.
    And so, are you having difficulties or is there anything we 
could do that would help you recruit and retain people who can 
actually take on this task?
    General Alexander. There are some things, Congressman, that 
I think we will need to work jointly. And that is, like we do, 
proficiency pay for linguists and others, what is it that we 
need for our cyber personnel? We are going out to hire, the 
services are. Right now, that is not an issue. But the services 
are discussing that type of pay for those to get it. We do want 
to create a force.
    I think the other thing that we are looking at is how do we 
collapse some of our military occupational specialties down 
into a few that allow us to look at the full spectrum: Defend, 
operate, all the way through. I think we need to do that, and 
the Services have been wonderful in setting that up. And the 
way that we would define that is by looking at how we are going 
to operate in those foreign areas, how do we need our forces to 
be developed.
    This is a very technical area. There is discussion, and we 
will evolve how this command works, I think, over the next few 
years. We have had great success, on the NSA side, of hiring a 
highly talented workforce and keeping them. Our retention is 
amongst the best in Government. So I think we can do the same 
in cyberspace. And I think we will get a lot of people that 
want to take this mission on.
    Mr. Kline. Okay. Thank you. I trust you will let us know if 
you need legislative assistance.
    I yield back. Thank you.
    Mr. Thornberry. Mr. Gibson.
    Mr. Gibson. Thanks, Mr. Chairman.
    And I thank the distinguished panelists here today. I thank 
them not only for their testimony, which has been illuminating, 
but also for their leadership in this key area. And as we 
proceed, you know, given classification issues, if we start to 
move into an area, I assume that you will make it clear to me.
    But I am interested in probing a little bit further the 
issue of unity of effort. And I have a question both on the 
governmental side, the whole Government side, and then also on 
the private side. I think I will start with the private side; 
it looks to be simpler.
    Do we have a list of instructions for individuals, what to 
do if they sense they are under some kind of cyber attack, 
similar to our SAEDA [Subversion and Espionage Directed Against 
the Army] instructions of how to report, that we pass out to 
infrastructure or proliferate in any way?
    Dr. Miller. This is outside the scope of the Department of 
Defense responsibilities. What we have is a--as a Government, 
working together on a National Cyber Incident Response Plan, 
part of that is to clarify what those activities and responses 
would be. I think it is fair to say we have some more work to 
do there. And I would be happy to respond for the record with 
more details.
    [The information referred to can be found in the Appendix 
on page 71.]
    General Alexander. Could I add, Congressman, a couple 
things on that? And I did throw that over on Dr. Miller, 
because I think the first part is, it is really, how do we 
train our teams to hunt and operate within our systems? So 
system administrators today need to evolve to people who can 
police networks tomorrow.
    And when they do that, part of the training that we give 
our red, our blue, and some of our what we call green teams is 
just what you are talking about. That has to be a continuous 
process, not something that happens once every 2 years. So how 
do we evolve that force will be a key part of the defense, and 
that is part of that active defense that I referred to.
    Mr. Gibson. Yeah. Very good. And I think you would 
appreciate that standardized reporting format would probably be 
helpful as we go forward.
    And then, related--now we are in the governmental realm--I 
am trying to get a sense of--and I can imagine the challenge 
that you have, trying to coordinate this effort toward unity of 
effort.
    So is this event-driven, or is it battle rhythm-driven? Is 
there a working group that meets across the intelligence 
communities, the DHS and the DOD? How do you go about 
coordinating your effort now, given the challenges that you 
have?
    General Alexander. Sir, we do have meetings, especially in 
the area--let me focus just a little bit more into looking at 
malicious software, tactics, techniques, and procedures, people 
that are trying to get into the networks. We do have meetings 
both within the Government that looks at this--so the Computer 
Emergency Response Teams at DHS, within DOD and across the 
Government work that.
    Private industry, selected parts of those, also participate 
in that at times, because they have some expertise. And going 
back and forth on those is key. And the reason private industry 
is brought in is, some of the signatures for the antivirus 
community that private industry creates helps protect 
Government systems. And we want to ensure that that is done 
right and that they have the full advantage of that.
    Mr. Gibson. Thanks very much.
    Chairman, I yield back.
    Mr. Thornberry. Mr. West.
    Mr. West. Thank you, Mr. Chairman and Mr. Ranking Member.
    And, sirs, it is a pleasure and honor to see you all here 
today.
    Four elements of national power, the DIME [Diplomatic, 
Information, Military and Economic] theory, and, of course, the 
``I'' stands for ``information.'' So I think it is very 
important that we recognize that aspect here on this modern 
battlefield. And we, you know, congratulate you on standing up 
the CYBERCOM.
    But this is one of my big concerns: You know, what can we 
do to combat the proliferation of Islamic terrorism propaganda 
on the Internet? Because I see this as just another weapon on 
this modern-day battlefield. And if we are serious about this 
global war on terror, this propaganda is truly a tool or a 
weapon that they are levying against us.
    Now, does that fall under CYBERCOM's purview? And, if not, 
who is contending or dealing with that?
    General Alexander. I think that is a policy issue, in terms 
of whether we choose to stem the flow of radical propaganda and 
how. Technically, Cyber Command could be one of the agencies 
given that mission to go do. We have not been given that 
mission, under either a CT [counterterrorism] or a CYBERCOM 
authority.
    So I think the question is, one, has a decision been made 
to do just that? And, to my knowledge, there is no decision to 
block the radical propaganda on the networks. If it was, then 
it could technically go to either Cyber Command or one of the 
other agencies.
    Mr. West. So who makes the decision?
    General Alexander. That would be the White House and the 
Principals Committee.
    Dr. Miller. That would be a decision at the level of the 
President and, as the general said, of the Cabinet, as well.
    There is no question that this Administration, as past 
administrations, are working to counter the ideology that you 
spoke about. The Internet has an important role in that, in 
terms of how we get our message out. And, obviously, it is part 
of how these groups have used--you know, it is something that 
these groups have used, as well.
    But you have put your finger on a central policy question 
that remains, essentially, open.
    Mr. West. Well, my fear is that the longer it remains open, 
the more we get exploited and the more we get infiltrated 
across this country. So at what point in time are we going to 
tackle this question?
    Dr. Miller. The authorities for dealing with that are not 
principally Department of Defense authorities.
    General Alexander. And there is one other thing, 
Congressman, if I could, on this, just to add on that.
    If we see this on U.S. infrastructure and it is wrong, we 
can reach out, through the FBI [Federal Bureau of 
Investigation], and ask that that be removed. And we have a 
high success rate in getting that done. So when we see things 
that are particularly wrong, we reach out. And all the 
companies, when they see that, they take it off, both here and 
global.
    Mr. West. Okay.
    General Alexander. And so, there is a way of doing that 
when we see those. So I didn't want you to think--the way I 
answered it is, we are not reaching out and causing it to be 
removed globally. We can reach out and ask that it be removed 
globally. And we are having a pretty good success at doing 
that.
    Dr. Miller. And if I could just add very briefly, the ``D'' 
in your DIME model, sir, the diplomatic effort is absolutely 
important.
    Mr. West. Absolutely.
    Dr. Miller. And that is something that this Administration 
has obviously pursued.
    Mr. West. Okay. I got it, but, you know, we are getting our 
butts handed to us on that means. And when I think about Major 
Hasan and some of the things that he was able to utilize the 
Internet for, you know, I don't want to see a repeat of those 
type of circumstances.
    So thank you very much, and I yield back.
    Mr. Thornberry. I thank the gentleman. And as I am sure he 
knows, there is a number of folks who have served in-theater 
who share his frustration, who think there is a lot more we 
could be doing but are not doing. And I am very sympathetic 
with that view, as well.
    General Alexander, let me follow up on what Mr. Kline was 
asking about on people. And I know you said you would get back 
to us on additional authorities. And you said you have a great 
record of retaining people at NSA. But those are not 
necessarily military folks who may go through basic training 
and all the rest.
    Can you get and keep the kind of people you need for 
CYBERCOM with the military requirements? Or does there have to 
be some greater flexibility than we are used to?
    General Alexander. Well, I am an optimist, Chairman. I 
think we can, one, get them. I do think it may require more 
authorities, but we have to look at that.
    And, more importantly, I would like to put forward this 
thought: We want NSA to have one certain level, technical level 
of expertise that Cyber Command can use. And we want Cyber 
Command to have a breadth and a deployment capability.
    And so, these two have to work together. And I think we can 
do both. I think we can get the service people on one side. 
That may require some additional authorities. We have to look 
at it and come back to you. And I think we want the NSA 
infrastructure to have this technical depth that we can rely on 
back and forth. I think that is absolutely vital.
    Dr. Miller. I would just briefly add that we owe a report 
on this issue, Section, I think, 934 of the National Defense 
Authorization Act.
    And in addition to the factors that the general talked 
about, I think we need to look hard at what we can do under 
existing authorities, including making better use of the Guard 
and Reserve. That is an essential part of what we need to do.
    The type of people that we are looking for will span a 
wider range than the profile of people that we--the type of 
people that we are looking for with the skills for cyber will 
span a wider range than the standard profile for military 
service. And we need to have a higher degree of flexibility and 
continue to look to target those groups and to work on some of 
the pilot programs we have under way now, to work with them and 
to have outreach, so they see what DOD can provide for their 
education and see that they can make a contribution to national 
security, as well.
    Mr. Thornberry. Well, we want to work with you. You made an 
impression on me in your written statement, General, where you 
said this was the thing you were most concerned about, or 
however you phrased it.
    But, please, go ahead.
    General Alexander. I was going to add that--I hate to give 
the Navy all the credit here, with him sitting right behind 
me--but the Navy Postgraduate School has also started a 
master's degree course in January that will produce a master's 
in cyber that is a technical degree, either in computer science 
or EE [electrical engineering], with the majority of the 
courses being in cyber- and cybersecurity-related things.
    So that is a step in the right direction and some of the 
things that we need to do more of.
    Mr. Thornberry. Okay.
    Dr. Miller, one hears--and maybe one of you all mentioned 
it in your written testimony, back to the authorities issues--
about the military's ability to provide support to civilian 
authorities when called upon to do so. How does that fit in a 
cyber context?
    Dr. Miller. Sir, let me talk about both sides of that, if I 
can.
    The first, as we were discussing earlier, is that the 
Department does recognize that we are dependent on both our 
partners in Government, so the dot-gov, and our partners in the 
industry to be able to conduct just military operations and to 
succeed in those operations so that we have a stake, in 
addition to the stake we have in the broader security of the 
Nation, we have a stake in just our ability to operate, itself.
    The Department of Defense, as you alluded to, has 
authorities to provide defense support to civilian authorities 
under existing law. And the challenge associated with that in 
this area is that it gives a good set of authorities for 
responding to an incident. And what is not so clear is that it 
gives the appropriate set of authorities to assist in 
prevention of attack in the first place.
    And as we have looked at possible legislation, we are 
looking at what additional authorities may be required for the 
Department of Homeland Security so that it can provide that 
degree of protection, and then what set of authorities may be 
necessary or changes may be necessary for the Department of 
Defense to assist in providing that prevention, as opposed to 
solely focusing on response.
    You have asked exactly the right question. We intend to 
address it in legislation. And we understand that there are 
legitimate concerns about imposing costs on private industry, 
and we need to think through that. But we also understand that, 
as we have discussed earlier, that we have a lot of catching up 
to do.
    Mr. Thornberry. Yeah. Well, and as your answer recognizes, 
response after the fact to a cyber event is not really a very 
good answer to the challenges we face there.
    So, let me just ask about a couple more things, and then I 
will yield to the ranking member and Mr. Gibson, if they have 
other questions.
    Again, I can't remember exactly which of you talked about 
this. But there were two efforts under way: One is the Enduring 
Security Framework, and the other is the Defense Industrial 
Base Pilot.
    Could either or both of you all expand a little on what 
those are and where we are with them?
    General Alexander. The Enduring Security Framework is a 
partnership between Government with DHS, DOD, the DNI, and 
industry to look at critical cybersecurity issues throughout 
the different components from communications devices, 
computers, and others.
    I think that is a great partnership between the Government 
and industry in identifying problems and solutions to those 
problems. If we can identify those problems, it has been our 
experience that industry, in developing much of that equipment, 
will go solve those, free to the Government.
    That is a huge step forward, and we have made some 
tremendous jumps in that area. I think industry has more than 
done their share. It has been a privilege and honor to work on 
that. That has been great.
    The Defense Industrial Base Pilot takes the technology that 
we have within the Department and uses some of that with some 
of the Tier 1 Internet service providers to test and ensure 
that that would work under the concept that I discussed 
earlier, where the Tier 1 Internet providers ensure that we can 
do what we are doing now for the Defense Department for these 
defense industrial base companies.
    Once we have done that, the key is now identifying the 
authorities and ensure that we have the authorities to do the 
rest of it. So we are only going to do a few narrow things 
under the DIB [Defense Industrial Base] Pilot, a few narrow 
activities. Once we have shown that we can do those, the rest 
of those activities will be added.
    We will have to ensure that we have the legal framework for 
that and everybody agrees with that for the rest of those. And 
that may be parts of the stuff that come forward from the White 
House on the legislative proposals that we have.
    Dr. Miller. And, sir, if I could add very briefly, the 
Enduring Security Framework, we have found that the industry 
that participate help both on helping us understand the problem 
and working the solution. And that is, as the general said, 
very important.
    I want to distinguish, as we talk about the DIB Pilot, 
there are really two things under way. One is a broad Defense 
Industrial Base Pilot, in which we are sharing information 
about potential threats and looking at how to do that more 
effectively. It has been a two-way street. It has been very 
effective. And we are looking to continue that and grow that.
    It has been focused primarily on the cyber-hygiene side, if 
you will, on defending the networks better. The new element 
that the general has been referring to has been added to that, 
and we are currently examining how to implement that. We have 
called that, for shorthand, the Opt-In Pilot because companies 
would opt in to participate on that. And as the general said, 
we are working with a number of defense industrial base 
companies and several Internet service providers. That has not 
yet kicked off. It is something that I hope that we are very 
close to initiating.
    And by way of analog, it is looking for part of the dot-com 
to bring what Einstein 3 is supposed to bring to that dot-gov. 
And, as General Alexander said, it is not the full suite, but 
we are looking at a way to get started and show that we can do 
this and to make it work.
    Mr. Thornberry. And about how long would it take, do you 
think, to prove that it can work?
    Dr. Miller. About 90 days we are looking at to execute this 
pilot.
    Mr. Thornberry. Okay, good. Thank you.
    Mr. Langevin.
    Mr. Langevin. Thank you, Mr. Chairman.
    General Alexander, CYBERCOM has maybe two, maybe, primary 
missions among several, but two primary missions: First, to 
ensure that our military networks stay online, and, also, to 
support our warfighters in their missions around the world.
    We talked before about the network defense side of the 
issue, but I would like to turn to the second side, if I could, 
of support to the warfighter. You rightly recognize that 
cyberspace is a new domain, similar to land, air, sea, and 
space. How do you make sure that cyber is treated equally and 
not just as a supporting entity?
    Can you outline the command structure for integrating 
nonkinetic cyber effects into both tactical and operational 
levels of a conflict? And beyond the use of cyber domain, how 
are cyber mission areas different from the electronic warfare 
mission areas?
    General Alexander. Well, let me start with the first one, 
and then I will come back to electronic warfare, if I could.
    On the first one, our staff is organized like the rest of 
the COCOM staffs, the combatant commander staffs, with the J3, 
J5, J2, J6, et cetera. Our planning folks reach out to the 
combatant commands, and we are working with those combatant 
commands on their plans to integrate cyber into those plans 
from both a defense and a full-spectrum capability.
    My experience to date is that the commands have jumped on 
this. Every one of them has been eager and helpful to do that. 
I am extremely pleased that they are rolling this into the full 
spectrum. They realize the importance of it, both to defending 
our capabilities and extending those out.
    If you were to make bubbles on the role of cyber and 
electronic warfare, they are going to touch together, 
electronic warfare predominantly being looked at primarily 
today, if you will, for jamming radars back and forth. I mean, 
that is the way we look at it, in physical space by radio 
waves. In cyber, we are acting within networks.
    You can picture a time in the future where those two may 
come together, and it may be that the Department begins to 
bring some of that together, from both a technical perspective 
and an operational perspective. We are not there today because 
the way we build our EW [electronic warfare] capabilities is 
separate and apart, as part of the defensive systems of 
aircraft and other things like that.
    I did go to school in some of that, so I do understand 
those parts. And I think you can see them coming together as 
the digital technology matures.
    Mr. Langevin. Thank you. Anything else in the area of 
electronic warfare that you want to get into?
    General Alexander. Not that I can think of, Congressman.
    Mr. Langevin. Okay.
    Dr. Miller, and also to you, General, in addition to the 
$159 million provided in the President's fiscal year 2012 
budget to support CYBERCOM, what other costs are associated 
with cyber operations across the Department for fiscal year 
2012? To what extent will DOD's current efficiency and cost-
saving efforts impact CYBERCOM's current and future 
cybersecurity funding, if at all? And to what extent is DOD 
taking steps to ensure that CYBERCOM and associated military 
components are organizing in a manner that prevents or 
minimizes duplication?
    Dr. Miller. Sir, let me first say, glad to provide for the 
record the breakdown of the costs in more detail than I did in 
my prepared statement. What I could do is refer to a $3.2 
billion total for cybersecurity and the $159 million associated 
with USCYBERCOM.
    The other--the largest single category is information 
assurance, which includes our public key infrastructure and key 
management initiative. That is at a little over $2 billion for 
fiscal year 2012.
    Rather than go through each of the other categories, I 
would just, I guess, add, we have noted the importance of 
science and technology, and about $258 million of that is in 
the S&T realm. We will provide the rest of those, if you like, 
for the record.
    As we look at the work on efficiencies and the importance 
of both saving money and improving security--I will turn it 
over to General Alexander--one of the most innovative and 
interesting ideas and concepts for how to pursue those in 
tandem is to look at how we can move to a cloud-based 
architecture in a way that improves security.
    If we do it the wrong way, it could increase our 
cybersecurity challenges. If we do it appropriately over time 
and move to virtualization of some of the, if you will, 
interior of the architecture, we will have the ability to 
present a much more challenging target to those who want to 
attack us.
    I think General Alexander can speak in much more detail 
than I can to that issue.
    General Alexander. Congressman, let me answer two parts of 
that, taking off from what Dr. Miller said.
    First, on the IT efficiencies, one of the things that we 
looked at: What was the best way that we could help secure the 
Defense Department's networks, given the vast topology of those 
networks? And it was our opinion that the best way was to go to 
a thin cloud, virtual cloud environment, analogous to the way 
that Google, AT&T, and others are doing, but do that for the 
Defense Department.
    As we looked at that, we also believe that we can do that 
more efficiently in terms of manpower and moneys. That is yet 
to be proven, but it does give us a much more defensible way.
    So the IT efficiencies is something that Secretary Gates 
has pushed out that we are looking at how can we now help do 
that. And what our intent is, if we can do this right, we can 
now take part of the workforce that we have in IT and train 
them to be full-spectrum cyber capability. That is something 
that, working with the service, will help build the capacity 
quicker, that I mentioned is that shortfall.
    So I think that is one of the things that we are looking 
at. We have discussed it with the service chiefs. That is 
something that we have to walk through. The service components 
are looking at it. That is a huge step. Now, to get there, NSA 
is actually testing out parts of that right now in our 
infrastructure, and we will prove that that is right.
    The other thing, that duplication of effort, I would just 
tell you that that is one of the things, as a CYBERCOM 
commander, that I take very seriously. How do we ensure that 
the services are doing this as a joint team versus each one of 
them doing the same tool four times?
    We have great cooperation with the services in doing that. 
Our components said, we are bringing all of that together. Our 
J3 and J5 will take that on. Our suite of tools will be looked 
at and scrubbed in that way. And we have already started that 
with our planning process.
    Mr. Langevin. Very good.
    With that, gentlemen, thank you very much for your 
testimony. I know that this is an enormous challenge that we 
all face in cyberspace, and I just appreciate your dedication 
and the work you are doing.
    Thank you.
    Mr. Thornberry. Mr. Gibson.
    Mr. Gibson. Thanks, Mr. Chairman.
    And, really, just a summary of what I am taking away from 
the hearing and from also reviewing the written testimony, I 
think Cyber Command is doing a tremendous job in gaining 
situational awareness, getting organized, trying to get their 
arms around the threat and to take concerted action.
    But, to a degree, our country is hampered, the effort 
toward unity of effort--that we need mission clarity, 
authorities, legal framework, and organizational design. And 
what strikes me is that these are similar findings to the QDR 
[Quadrennial Defense Review] independent panel and the need 
towards looking at both congressional, organizational reform so 
that we can facilitate better, legislate better, and provide 
better oversight, and then also executive reform, executive 
branch reform, so that the DOD can get the guidance it needs to 
move forward.
    So these are areas of interest to me, Mr. Chairman. And I 
look forward to--I appreciate you calling this hearing and the 
testimony from our expert witnesses here. And I look forward to 
working with you as we go forward.
    I yield back.
    Mr. Thornberry. I thank the gentleman.
    The areas he identified are also of interest to me, as he 
knows, so I want to pursue it along with the gentleman.
    General Alexander, following up on your conversation with 
Mr. Langevin, do you have the authority you need, as CYBERCOM 
commander, to eliminate duplication in the services?
    General Alexander. I believe I have all the authority I 
need to eliminate duplication with the services. More 
importantly, I have their support in doing it. They want to do 
this. It makes sense. Nobody is pushing back. The key is 
finding all of that for all of us, because there is a lot of 
ingenuity that goes on.
    To date, I have not found anyone that has pushed back on 
that. I believe that, through both the Joint Staff and the JROC 
[Joint Requirements Oversight Council] process, we can push 
that. And through the Deputy Secretary and the policy level, we 
will get all the support we need. I don't see any issues with 
that. It is more of just making sure that they surface.
    Mr. Thornberry. I am always concerned when something 
becomes a very, you know, high-priority issue, then all sorts 
of programs have that label put on them to take advantage of 
the budgetary things that go with it. And ferreting out what is 
real and needed versus what may be an effort to gain more of 
the defense pie is an important capability, I think, for you to 
have.
    Can you talk a little more generally, though, about budget? 
Obviously, we are going to be in a limited budget for the 
Government, for the Defense Department for some years to come.
    As we think about cyber and spending money, you know, it 
doesn't cost very much money to send an electron through a 
fiberglass pipe. But where is our money going to have to go in 
order to defend the country properly? I mean, I assume people 
has got to be number one.
    But can you elaborate, not just on this year's budget, but 
on those trends over the next several years and what you see 
the most growth in when it comes to cyber?
    General Alexander. Chairman, I think you hit it on the 
head. People is the big thing here in cyber and for our future. 
Investing in people is key.
    We are building capacity. And, as you correctly noted, that 
is one of the key things that we have to go build and go work, 
and the Services are helping us do that. In my budget, both the 
military and the civilian side, that is the biggest portion of 
the budget--
people.
    The next is facilities to operate in, the IT infrastructure 
that we need to operate. That accounts for another 25 percent 
of the budget. And operations is the last part. So, if you 
break it out, people is the biggest share of the budget.
    One of the things that I would just highlight is we did 
look at building an integrated cyber center that brings 
together all the different elements that we have within the 
Department, all the different centers within our Department and 
potentially across the Government into one facility that allows 
us to operate seamlessly from peace time to crisis, back and 
forth. I think that is huge, and in this budget here is the 
planning and development of that 
facility.
    Dr. Miller. Sir, if I could add very briefly, for overall 
IT, the request for fiscal year 2011 was $36.6 billion, for 
2012 was $38.4 billion. We actually hope that that number will 
come down over time, as we move to a different architecture and 
be able to make some savings there.
    For overall expenditures relating to cybersecurity, the 
numbers, in fiscal year 2010 the number was about $2.96 
billion, 2011 request was $3.2 billion or a little under, and 
for 2012 we are a little over $3.2 billion.
    So we have increased somewhat. Particularly, I think, we 
are focusing those resources better, as we look to, for 
example, increase substantially how much we hunt on our own 
networks and so forth. But we would be happy to provide the 
next level of granularity, if you like. I am afraid that if I 
did it real-time, you would, you know----
    Mr. Thornberry. Yeah. The staff could take it, but I am not 
sure that I could. But it is, I think, helpful for us to see 
the longer-term trends, because I think we are all going to be 
challenged in that regard.
    Dr. Miller, one thing we really haven't touched on too much 
today is the whole subject of international cooperation in 
getting any of this done. We have talked about how geography 
doesn't matter very much in cyber, but can you just briefly 
touch on the international aspect of this?
    Dr. Miller. Sir, I would be very glad to.
    As I had talked about before, working with our 
international allies and partners is one of the key five 
initiatives that we have under way as part of our strategy. So 
we recognize its importance. And we recognize that, because we 
operate in fighting the coalition, that the security of our 
information, the security of our operations is also going to be 
dependent on the security of our partners' and allies' 
networks, as well.
    As we have begun really pushing out on cybersecurity 
efforts internationally, the first focus--I should put that 
differently--a very significant focus has been on working with 
our allies, Great Britain, Australia, New Zealand, and Canada. 
We have long-standing relationships with them on intelligence 
issues, and that has been a good foundation for what we do in 
cyber, as well.
    A very significant effort over the last year with NATO. And 
having cybersecurity being one of the key thrusts of the NATO 
Strategic Concept that was brought forward at the Lisbon 
summit, I think, is a good accomplishment. The cybersecurity 
center that has been established has begun to operate, and we 
have a lot more work to do there in NATO, in terms of 
implementing that effort.
    We have also worked with other partners and allies around 
the globe, including, for example, the Republic of Korea and 
Japan, and are beginning to have, I think, useful conversations 
there.
    One of the other areas, sir, that I just want to add is 
that we need also to have conversations about cyber and other 
strategic issues with Russia and with China. I think we have 
made some headway with respect to Russia and having the initial 
conversations on cybersecurity. Our lead on this for the 
national security staff, Howard Schmidt, took a team there just 
a little over a month ago to have this--to begin this 
conversation. And so far, with China, we have not yet really 
been able to have the same level of conversation.
    I think transparency and understanding about how each of us 
approaches this challenge is very important to avoid any 
misunderstandings or miscalculations.
    Mr. Thornberry. Finally, for me, I think, General 
Alexander, if you had to grade our ability to defend DOD 
networks, what sort of grade would you give us at this stage, 
like, A through F?
    General Alexander. I would give us today probably a C, 
going up. And the reason I say a C is, we are working extremely 
hard on building the hardening part of our networks. We have 
done an awful lot of work to bring in the host-based security 
system and made tremendous movements. And we are moving in that 
range and building that up and training the force and hardening 
that. And it has made tremendous progress over the last 2 
years. When you looked at the problems we had on our networks a 
few years ago to where we are today, it is a huge improvement.
    I would like to say an A, but I think it is going to take 
some time to get us to an A. And an A is where I believe nobody 
could penetrate that network. But we have made it extremely 
difficult for adversaries to get in, and every day we improve 
that.
    And that has the visibility and support of the Joint Staff 
and the Secretary. They have personally gotten involved. I had 
to take the reports up to both of them. And they are looking at 
that across all of the services. And each of the services are 
working it hard. We do that by network, by service, by COCOM, 
by agency. And we are looking at it in a very detailed way on 
our network operations and network security.
    But I would say a C today and going up.
    Mr. Thornberry. Well, and the ``going up'' was really my 
follow-up question. In earlier hearings, we have heard 
testimony that the advantage is with the attacker, and not only 
that, but the gap is growing so that the attacker has more 
advantage, if you look at the Internet as a whole, and versus 
the attempts to defend.
    But I take it from what you have said that that gap, when 
it comes to defending military networks, is closing, that our 
ability to defend is--well, as I say, the gap is closing versus 
the attackers. Is that right?
    General Alexander. That is correct.
    Mr. Thornberry. A significant difference from what we have 
heard from the civilian infrastructure, I would say.
    I understand Mr. Johnson has a question.
    Mr. Johnson. Yes, I do. Thank you, Mr. Chairman, for 
holding this very important hearing.
    And we certainly need to be attuned to the fact that, for 
us to get on the dean's list, General Alexander, we are going 
to have to spend a lot more money than we are spending, and we 
will have to spend in accordance with long-term budgets, as 
opposed to short-term continuing resolutions. And it is the 
welfare of the people that is at stake.
    Dr. Miller, you are, no doubt, familiar with the firm 
Palantir Technologies, are you not?
    Dr. Miller. I am not deeply familiar. I know the name, sir.
    Mr. Johnson. And what about Berico Technologies?
    Dr. Miller. I also know the name.
    Mr. Johnson. All right.
    General Alexander, have you worked with Palantir in any of 
your official capacities?
    General Alexander. I am familiar with it. We have seen some 
of their technology, and they have demonstrated that. I am not 
sure of the number of contracts that we have with Palantir, to 
be honest.
    Mr. Johnson. What about Berico?
    General Alexander. The same. I know the name. I would have 
to go back and look and see exactly what the contracts are with 
Berico.
    Mr. Johnson. General, can you explain what services and 
capabilities those two firms offer to the Department of Defense 
and the intelligence community?
    General Alexander. My recollection of Palantir was a way of 
visualizing what is going on in the networks. One of the 
problems that we have is, how do you see what is going on in 
cyberspace? How do you actually see a network in a way that is 
meaningful to help defend and operate that? Especially if you 
have a network that has 15,000 different enclaves and all these 
different pieces, how do you make that meaningful?
    And my recollection, working with Palantir, was, here is an 
idea that we could use for how to look at networks and how to 
secure it. We are looking at multiple options for how you 
actually see that. That is one of the things I think I put in 
my statement, you know, situational awareness, how do you 
actually see? I think that is an important step for us to all 
have that common situational awareness.
    Mr. Johnson. Are those tools that are developed for use by 
the defense and intelligence communities by those contractors, 
do those contractors have the ability to use those tools, or 
the authority, actually, to use those tools in the private 
sector? Can they market those tools, in other words, to the 
private sector?
    General Alexander. I think every contract is written 
differently that gives you authorities to do things, and I 
would have to go look at how those contracts were written. I am 
not personally familiar with the contracts, so I would have to 
go look at that. And I don't know who those contracts are with 
specifically, so I would have to check that out.
    But, generally speaking, in the development of a tool or a 
capability, in the contract it specifies whether that can be 
used broadly or whether it can be used only for the Government. 
And it depends on where it is being developed, for whom, and 
how.
    Mr. Johnson. Dr. Miller, anything you want to add on that?
    Dr. Miller. Sir, General Alexander has it exactly right. 
And I can't provide any more details. We would have to go back 
and look at the individual contracts to answer those questions.
    Mr. Johnson. Dr. Miller, would you be so kind as to provide 
my office with the DOD contracts with Palantir Technologies, 
Berico Technologies, and the firm HBGary Federal as soon as 
possible?
    Dr. Miller. Sir, I will do everything possible to do so. 
What I will need to do is, frankly, talk to our general counsel 
and make sure that the provision of that type of information is 
allowed contractually. And, in any case, we will get back to 
you as quickly as possible with as much information as 
possible.
    Mr. Johnson. The contract could bar the executive branch 
from providing information to the legislative branch?
    Dr. Miller. No. No, sir. I guess I would like to be able to 
provide that information to you, and without knowing all the 
organizations within the Department that have the contracts, I 
am going to have to go back and--it will take a bit of time to 
be able to map that out.
    And I also need--I need to have an assessment of whether or 
not--not of whether or not to provide the information, but in 
what form to provide the information to you. If you are asking 
for just the stack of contracts, I will say I will take that 
back to the Department and----
    Mr. Thornberry. Yeah, Dr. Miller, if you would take the 
request back, get the lawyers to look at it, see what is 
possible. If it is not possible to provide the information the 
gentleman is asking, if you would ask the appropriate folks at 
the Department to let us know why. And, also, any information 
provided, of course, we would ask that it be provided to the 
whole subcommittee, so that all members can have it.
    [The information referred to can be found in the Appendix 
on page 71.]
    Mr. Thornberry. Does that sound good?
    Mr. Johnson. Yes. Thank you, Mr. Chairman. And that will 
conclude my questions.
    Mr. Thornberry. I thank the gentleman.
    And I thank the witnesses very much for being here to 
testify, for your patience with our delays and other problems, 
which were rapidly solved.
    Dr. Miller. Mr. Chairman, if I might, in response to an 
earlier question about what the Government is doing with 
respect to radical groups' propaganda, I said it was an open 
policy issue. If I could have just a moment, I would like to 
clarify?
    Mr. Thornberry. Sure.
    Dr. Miller. What I should have said is that it is a 
recurring, ongoing policy issue; that these issues need to be 
dealt with on a case-by-case basis; that, as the Congressman 
said, it is all the tools available to us, including diplomatic 
tools; and that, on a case-by-case basis, there will be a 
question about our desire to promote free speech and our real, 
not just desire, but requirement to protect our forces and our 
people.
    And so I just wanted to--it is not a question of whether 
the issue is addressed. It is a question of how, in each case. 
And one would have to get down to the ``eaches'' to respond 
effectively.
    I appreciate the opportunity to clarify that, sir.
    Mr. Thornberry. No, I appreciate you bringing that. And I 
will also talk to Mr. West about my Smith-Mundt Repeal Act. It 
may be of interest to him as we pursue those issues.
    So, again, we thank you all very much for being here, for 
the work you are doing in this area. And we anxiously await the 
Administration proposals so that we can all get to work on 
specific things.
    With that, the hearing is adjourned.
    [Whereupon, at 5:07 p.m., the subcommittee was adjourned.]
?

      
=======================================================================




                            A P P E N D I X

                             March 16, 2011

=======================================================================

      
?

      
=======================================================================


              PREPARED STATEMENTS SUBMITTED FOR THE RECORD

                             March 16, 2011

=======================================================================

      
      
    [GRAPHIC] [TIFF OMITTED] T5593.001
    
    [GRAPHIC] [TIFF OMITTED] T5593.002
    
    [GRAPHIC] [TIFF OMITTED] T5593.036
    
    [GRAPHIC] [TIFF OMITTED] T5593.037
    
    [GRAPHIC] [TIFF OMITTED] T5593.023
    
    [GRAPHIC] [TIFF OMITTED] T5593.024
    
    [GRAPHIC] [TIFF OMITTED] T5593.025
    
    [GRAPHIC] [TIFF OMITTED] T5593.026
    
    [GRAPHIC] [TIFF OMITTED] T5593.027
    
    [GRAPHIC] [TIFF OMITTED] T5593.028
    
    [GRAPHIC] [TIFF OMITTED] T5593.029
    
    [GRAPHIC] [TIFF OMITTED] T5593.030
    
    [GRAPHIC] [TIFF OMITTED] T5593.031
    
    [GRAPHIC] [TIFF OMITTED] T5593.032
    
    [GRAPHIC] [TIFF OMITTED] T5593.033
    
    [GRAPHIC] [TIFF OMITTED] T5593.034
    
    [GRAPHIC] [TIFF OMITTED] T5593.035
    
    [GRAPHIC] [TIFF OMITTED] T5593.003
    
    [GRAPHIC] [TIFF OMITTED] T5593.004
    
    [GRAPHIC] [TIFF OMITTED] T5593.005
    
    [GRAPHIC] [TIFF OMITTED] T5593.006
    
    [GRAPHIC] [TIFF OMITTED] T5593.007
    
    [GRAPHIC] [TIFF OMITTED] T5593.008
    
    [GRAPHIC] [TIFF OMITTED] T5593.009
    
    [GRAPHIC] [TIFF OMITTED] T5593.010
    
    [GRAPHIC] [TIFF OMITTED] T5593.011
    
    [GRAPHIC] [TIFF OMITTED] T5593.012
    
    [GRAPHIC] [TIFF OMITTED] T5593.013
    
    [GRAPHIC] [TIFF OMITTED] T5593.014
    
    [GRAPHIC] [TIFF OMITTED] T5593.015
    
    [GRAPHIC] [TIFF OMITTED] T5593.016
    
    [GRAPHIC] [TIFF OMITTED] T5593.017
    
    [GRAPHIC] [TIFF OMITTED] T5593.018
    
    [GRAPHIC] [TIFF OMITTED] T5593.019
    
    [GRAPHIC] [TIFF OMITTED] T5593.020
    
    [GRAPHIC] [TIFF OMITTED] T5593.021
    
    [GRAPHIC] [TIFF OMITTED] T5593.022
    
?

      
=======================================================================


              WITNESS RESPONSES TO QUESTIONS ASKED DURING

                              THE HEARING

                             March 16, 2011

=======================================================================

      
            RESPONSE TO QUESTION SUBMITTED BY MR. THORNBERRY

    General Alexander. In accordance with the requirements of Section 
934, of the FY11 National Defense Authorization Act, the Office of the 
Secretary of Defense is drafting a report to Congress on the Cyber 
Warfare Policy of the Department of Defense. The department is 
currently coordinating the response to that reporting requirement to 
meet the extended July 1, 2011 report due date. [See page 12.]
                                 ______
                                 
             RESPONSE TO QUESTION SUBMITTED BY MR. JOHNSON
    Dr. Miller. [The information referred to is classified and retained 
in the subcommittee files.] [See page 24.]
?

      
=======================================================================


              QUESTIONS SUBMITTED BY MEMBERS POST HEARING

                             March 16, 2011

=======================================================================

      
                 QUESTIONS SUBMITTED BY MR. THORNBERRY

    Mr. Thornberry. What is the average cost of a breach in the 
Department of Defense for mission critical systems as measured in 
either dollars or degraded mission capability?
    Dr. Miller. [The information was not available at the time of 
printing.]
    Mr. Thornberry. What do you estimate the overall loss for breaches 
is in the DoD or by Military Service element?
    Dr. Miller. [The information was not available at the time of 
printing.]
    Mr. Thornberry. As outlined by the DOD's Strategic Management Plan, 
the DOD currently has a strategic performance goal to protect its IT 
infrastructure. The key measure of performance to meet that goal is the 
percentage of IT systems that are compliant with certification and 
accreditation processes. Considering the importance of this mission, 
shouldn't we have a more robust set of performance measures related to 
cyber? If so, what do you think those additional metrics should be.
    Dr. Miller. [The information was not available at the time of 
printing.]
    Mr. Thornberry. How do Defense Support to Civil Authorities (DSCA) 
authorities in the DOD work in the realm of cyber?
    Dr. Miller. [The information was not available at the time of 
printing.]

    Mr. Thornberry. What progress has U.S. Cyber Command and/or DOD 
made in developing a lexicon for cyberspace-related terms that can be 
used throughout DOD and across the federal government?
    General Alexander. Within the DoD, lexicons are strongly linked to 
doctrine. The Joint Staff J-7 authorized the development of cyberspace 
operations test doctrine, including a proposed cyber lexicon, in 
December of 2009. By April 2010, the J-7 published a draft of Joint 
Test Publication (JTP) 3-12, Cyberspace Operations. After an initial 
round of coordination, the Evaluation Draft of JTP 3-12 was released in 
September 2010 to be evaluated for effectiveness by use in exercises 
and operations.
    Mr. Thornberry. How is U.S. Cyber Command working with the services 
and DOD to ensure that they have the right mix of military, civilian, 
and contractor personnel to conduct cyberspace operations?
    General Alexander. United States Cyber Command (USCYBERCOM) is a 
key contributor along with the Office of the Under Secretary of 
Defense, Policy, the Office of the Assistant Secretary of Defense 
(Network and Information Integration) and the Department of Defense 
(DoD) Chief Information Officer, the Services, and other partners 
within the DoD Cyber Community of Interest to finalize the Cyber 
Workforce Development Study in response to the Defense Planning 
Programming Guidance. The goal of this study is to assess the current 
and future DoD cyber workforce requirements (including DoD civilians, 
contractors, and active and reserve components). USCYBERCOM's focus in 
this effort is providing information on cyber work roles and training 
requirements. USCYBERCOM will continue engagement and provide 
recommendations for recruiting, training, and retaining the cyberspace 
workforce and associated resourcing requirements for implementation.
    Mr. Thornberry. How do Defense Support to Civil Authorities (DSCA) 
authorities in the DOD work in the realm of cyber?
    General Alexander. Consistent with the authorities granted in 
Department of Defense (DoD) Directive 3025.dd, United States Cyber 
Command (USCYBERCOM) may provide Defense Support to Civil Authorities 
(DSCA) assistance as directed by the President or Secretary of Defense 
(SECDEF).
    USCYBERCOM works closely with US Strategic Command and US Northern 
Command to answer any routine Requests for Assistance (RFA) from the 
Department of Homeland Security (DHS). A 26 Sept 2010 memorandum signed 
jointly by the Secretaries of Homeland Security and Defense solidified 
the support relationship between DoD and DHS making collaboration 
between the two departments official policy. It encourages information 
sharing and mutual support.
    USCYBERCOM assistance may be technical assistance or 
recommendations for immediate defensive actions; similarly, they might 
entail recommendations for more systemic mitigation, such as 
improvements in network configurations and improvements in information 
assurance measures or best practices. Additionally, USCYBERCOM 
continually assesses the cyber threat to DoD's military networks and 
information systems to ensure we are prepared to provide support to 
civil authorities in the event of a cyber threat to the nation's 
critical infrastructure. If a major cyber event struck the nation, 
however, SECDEF would determine the most appropriate combatant command 
to lead the DSCA effort.
    Mr. Thornberry. DHS recently tested something called the National 
Cyber Incident Response Plan as part of CyberStorm III. Do you have any 
insight into how effective that plan was during the exercise? What 
should the interagency community, including DOD and the Intelligence 
Community, take from that plan?
    General Alexander. [The information referred to is classified and 
retained in the subcommittee files.]
    Mr. Thornberry. What transition pathway courses of action do you 
envision for the DARPA National Cyber Range (NCR)? What role do you 
envision for CYBERCOM in that transition process?
    General Alexander. United States Cyber Command (USCYBERCOM) 
considers the National Cyber Range (NCR) as the prototype development 
portion to the larger Cyber Range Environment (CRE) initiative. DARPA 
is the NCR lead with prototype completion projected for mid-/late-FY12. 
Transition funding for FY13 and out-year sustainment are undetermined 
at this time.
    Currently, there are three possible courses of action:
    1) Once NCR prototype development is completed in FY12, provide 
adequate transition and sustainment funding and advocate integration 
into the larger CRE ``whole of government'' range that Department of 
Homeland Security (DHS), Industry and Department of Defense (DoD) could 
use for operational training and experimentation and testing of future 
technical architectures.
    2) Complete NCR prototype development as scheduled in FY12, and 
operate as a stand-alone range for specific/limited DHS, Industry and 
DoD use for experimentation and testing.
    3) Complete NCR prototype development, and offer technology/
software tools to other existing DoD/Federal government ranges for 
reuse/integration without a transition or any sustainment program 
considerations.
    USCYBERCOM's sees potential in this prototype effort, and envisions 
our role as providing support/operational expertise to DARPA with 
potential use cases, lessons learned, and possibly assist with 
technology transition under whichever course of action is chosen.
                                 ______
                                 
                QUESTION SUBMITTED BY MR. RUPPERSBERGER

    Mr. Ruppersberger. U.S. Cyber Command was stood up at Fort Meade 
and reached full operational capability in the Fall of 2010. What do 
you expect to be the final footprint of CYBERCOM will be?
    General Alexander. With regard to the United States Cyber Command 
(USCYBERCOM) personnel footprint, the current planning projections for 
FY11 are approximately 1,404 military, civilian, and contractor 
personnel. The demographic for the personnel footprint includes 260 
Officers, 204 Enlisted, 467 Civilians, 237 Contractors and 236 
Augmentees. The USCYBERCOM footprint planning projections include space 
to support a ten percent increase in the staffing to support Combatant 
Commands, other government agency liaisons and integrated personnel as 
well as military reserve support. The National Security Agency (NSA) 
provides current facility support through existing owned and leased 
facilities. FY13 begins the military construction (MILCON) of the 
Integrated Cyber Center (ICC). This FY13 MILCON establishes 
USCYBERCOM's Joint Operations Center (JOC) and will accommodate the 
command's most critical cyber warriors.

 
  



NEWSLETTER
Join the GlobalSecurity.org mailing list