[House Hearing, 112 Congress]
[From the U.S. Government Printing Office]
EXAMINING THE CYBER THREAT TO CRITICAL INFRASTRUCTURE AND THE AMERICAN
ECONOMY
=======================================================================
HEARING
before the
SUBCOMMITTEE ON CYBERSECURITY,
INFRASTRUCTURE PROTECTION,
AND SECURITY TECHNOLOGIES
of the
COMMITTEE ON HOMELAND SECURITY
HOUSE OF REPRESENTATIVES
ONE HUNDRED TWELFTH CONGRESS
FIRST SESSION
__________
MARCH 16, 2011
__________
Serial No. 112-11
__________
Printed for the use of the Committee on Homeland Security
[GRAPHIC] [TIFF OMITTED]
Available via the World Wide Web: http://www.gpo.gov/fdsys/
__________
U.S. GOVERNMENT PRINTING OFFICE
72-221 WASHINGTON : 2012
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC
area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC
20402-0001
COMMITTEE ON HOMELAND SECURITY
Peter T. King, New York, Chairman
Lamar Smith, Texas Bennie G. Thompson, Mississippi
Daniel E. Lungren, California Loretta Sanchez, California
Mike Rogers, Alabama Sheila Jackson Lee, Texas
Michael T. McCaul, Texas Henry Cuellar, Texas
Gus M. Bilirakis, Florida Yvette D. Clarke, New York
Paul C. Broun, Georgia Laura Richardson, California
Candice S. Miller, Michigan Danny K. Davis, Illinois
Tim Walberg, Michigan Brian Higgins, New York
Chip Cravaack, Minnesota Jackie Speier, California
Joe Walsh, Illinois Cedric L. Richmond, Louisiana
Patrick Meehan, Pennsylvania Hansen Clarke, Michigan
Ben Quayle, Arizona William R. Keating, Massachusetts
Scott Rigell, Virginia Vacancy
Billy Long, Missouri Vacancy
Jeff Duncan, South Carolina
Tom Marino, Pennsylvania
Blake Farenthold, Texas
Mo Brooks, Alabama
Michael J. Russell, Staff Director/Chief Counsel
Kerry Ann Watkins, Senior Policy Director
Michael S. Twinchek, Chief Clerk
I. Lanier Avant, Minority Staff Director
------
SUBCOMMITTEE ON CYBERSECURITY, INFRASTRUCTURE PROTECTION, AND SECURITY
TECHNOLOGIES
Daniel E. Lungren, California, Chairman
Michael T. McCaul, Texas Yvette D. Clarke, New York
Tim Walberg, Michigan, Vice Chair Laura Richardson, California
Patrick Meehan, Pennsylvania Cedric L. Richmond, Louisiana
Billy Long, Missouri William R. Keating, Massachusetts
Tom Marino, Pennsylvania Bennie G. Thompson, Mississippi
Peter T. King, New York (Ex (Ex Officio)
Officio)
Coley C. O'Brien, Staff Director
Alan Carroll, Subcommittee Clerk
Dr. Chris Beck, Minority Subcommittee Director
C O N T E N T S
----------
Page
Statements
The Honorable Daniel E. Lungren, a Representative in Congress
From the State of California, and Chairman, Subcommittee on
Cybersecurity, Infrastructure Protection, and Security
Technologies................................................... 1
The Honorable Yvette D. Clark, a Representative in Congress From
the State of New York, and Ranking Member, Subcommittee on
Cybersecurity, Infrastructure Protection, and Security
Technologies................................................... 2
Witness
Mr. Philip Reitinger, Deputy Under Secretary, National Protection
and Programs Directorate, Department of Homeland Security:
Oral Statement................................................. 5
Prepared Statement............................................. 6
Mr. Gregory Wilshusen, Director of Information Security Issues,
Government Accountability Office:
Oral Statement................................................. 14
Prepared Statement............................................. 16
Dr. Phyllis Schneck, Vice President and Chief Technical Officer,
McAfee Inc.:
Oral Statement................................................. 32
Prepared Statement............................................. 34
Mr. James A. Lewis, Director and Senior Fellow, Technology and
Public Policy Program, Center for Strategic and International
Studies:
Oral Statement................................................. 39
Prepared Statement............................................. 40
Ms. Mischel Kwon, President, Mischel Kwon Associates:
Oral Statement................................................. 46
Prepared Statement............................................. 47
Appendix
Question From Chairman Daniel E. Lungren of California........... 63
EXAMINING THE CYBER THREAT TO
CRITICAL INFRASTRUCTURE AND THE AMERICAN ECONOMY
----------
Wednesday, March 16, 2011
U.S. House of Representatives,
Committee on Homeland Security,
Subcommittee on Cybersecurity, Infrastructure Protection,
and Security Technologies,
Washington, DC.
The subcommittee met, pursuant to call, at 10:05 a.m., in
Room 311, Cannon House Office Building, Hon. Daniel E. Lungren
[Chairman of the subcommittee] presiding.
Present: Representatives Lungren, McCaul, Walberg, Meehan,
Long, Marino, Clarke, Richmond, and Keating.
Mr. Lungren. The Committee on Homeland Security,
Subcommittee on Cybersecurity, Infrastructure Protection, and
Security Technologies will come to order.
The subcommittee is meeting today to hear testimony from
Phil Reitinger, the Deputy Under Secretary for National
Protection and Programs Directorate of DHS; Gregory Wilshusen,
the Director of Information Security Issues at GAO; Phyllis
Schneck, Vice President and Chief Technology Officer at McAfee,
Inc.; James Lewis, Director and Senior Policy Fellow at the
Center for Strategic and International Studies; and Mischel
Kwon, President of Mischel Kwon Associates, LLC.
Today we will examine the cyber threat to U.S. critical
infrastructure, how it affects the economy, and what Government
is doing to address the threat.
Twenty-five years ago, the concept of cyber threat, or a
cyber attack, was an issue of interest to really only a few
researchers in academics. In this post-9/11 terrorist era the
cyber threat is serious, multifaceted, and boundless, posing a
significant risk to U.S. economic and National security.
The Director of National Intelligence stated in testimony
before the Congress, ``The growing connectivity between
information systems, the internet, and other infrastructures
creates opportunities for attackers to disrupt
telecommunications, electrical power, energy pipelines,
financial networks, and other critical infrastructures.''
The information revolution launched by the internet has
reached into every corner of our lives. While it provides users
many benefits, it also exposes them to new and dangerous risks.
These new risks include cyber criminals, spies and terrorists,
using the digital internet as a pathway to personal bank
accounts as well as Government and industrial secrets. Cyber
attacks are growing more frequent, targeted, sophisticated, and
dangerous.
Most of these attacks are motivated by financial or
intellectual property theft, disruption of commerce, or
intelligence collection. Cyber attacks have been launched
against nations, Estonia in 2007, Georgia in 2009, and Iran in
2010. They were all the subject of cyber attacks that either
paralyzed Government operations or targeted critical
infrastructure. Last year, Google and 20 other major companies
were the targets of highly sophisticated attacks to steal their
intellectual property and user accounts. This attack allegedly
emanated from China.
If terror groups are watching this cyber activity and
targeting our critical infrastructure--and we believe they
are--this raises the stakes in our war on terror. U.S. critical
infrastructure--by that I mean roads, bridges, dams, electrical
system, power systems--overall, that critical infrastructure is
the backbone of our dynamic and productive economy. Attacks on
this critical infrastructure will impact our National and
economic security as well as the health and safety of our
fellow citizens.
Today, our critical infrastructure relies extensively on
computerized information systems and the internet which cannot
be protected as in the traditional way with guns, gates, and
guards. This reliance on computers and the internet makes our
critical infrastructure operations vulnerable to cyber attack.
This vulnerability was demonstrated a few years ago in a
simulated attack on our electric power grid, which also was
code-named Aurora.
The computer security company, McAfee, reports that 54
percent of executives of critical infrastructure companies
surveyed said their companies had been the victims of denial of
service attacks and network infiltration from organized crime,
terrorists, or other nation states.
Recent media reports have described a new cyber threat
called Stuxnet, which can target critical infrastructure,
including nuclear facilities. According to these published
reports, Stuxnet is a complex piece of malware designed to
interfere with the seamen's industrial control systems
operating the Iranian nuclear facilities. This makes Stuxnet,
at least according to published reports, it makes that malware
a very dangerous offensive cyber weapon that overtakes critical
control system operations.
So if an anonymous enemy or terrorist ever seizes the
control systems of, let's say, dams or chemical or power plants
via the cyber world, that terrorist could cause death and
destruction in the real world.
So many questions remain about how to defend our
cyberspace. What solutions, policies, or technology can we
develop to improve our Nation's cybersecurity? We welcome our
public and private witnesses today who will begin us on a
journey to answer these questions.
It is now my pleasure to recognize the Ranking Member of
our subcommittee, Ms. Clarke, for her opening statement.
Ms. Clarke. Good morning, and thank you to all of our
witnesses for appearing before us today.
I would like to thank Chairman Lungren for holding this
hearing on cybersecurity and for your intention to move
expeditiously on what I know we both recognize as a critical
issue.
While there are a number of new faces up here on the dais,
I believe this subcommittee will continue to place significant
focus on the issue of cybersecurity just as we did during the
110th Congress. I know Mr. Lungren takes this responsibility as
seriously as I do, and I look forward to partnering with him
again over the next 2 years to ensure the safety and security
of the American people, American businesses, American
infrastructure, and the American way of life.
Today's hearing will likely be the first of several
cybersecurity hearings that the subcommittee will hold, and it
is easy to understand why this issue dominates our agenda. We
rely on information technology in every aspect of our lives,
from our electric grid, banking systems, military and
government functions, to our e-mail and web browsers.
Interconnected computers and networks have led to amazing
developments in our society. Increased productivity, knowledge,
services, and revenues are all benefits generated by our modern
networked world. But in our rush to network everything, few
stopped to consider the security ramifications of this new
world we were creating, and so we find ourselves in an
extremely dangerous situation today.
Too many vulnerabilities exist on too many critical
networks which are exposed to too many skilled attackers who
can inflict too many intrusions into our systems.
Unfortunately, to this day, too few people are even aware of
these dangers and fewer still are doing anything about it. This
committee will continue to sound the alarm, raise awareness of
the problems we face, and move forward with practical,
effective solutions.
This hearing comes at a critical moment in our Nation's
approach to the cyber threat. There is a very real and
significant threat to our National and economic security that
we now face in cyberspace, and we must do something equally
real and significant to meet this challenge.
We are expecting, and this committee is eager to see, a
National cybersecurity strategy from the White House to be
released very soon. The Department is finalizing its National
cyber incident response plan and will also include a
cybersecurity strategy as called for in the 2010 Quadrennial
Homeland Security Review.
The Congress is interested in legislation to afford DHS
authority it needs to protect the dot-gov domain and critical
infrastructures in the private sector. The previous two decades
have seen countless reports from America's thought leaders in
cybersecurity containing hundreds of recommendations about how
to improve America's posture in cyberspace. What has been
lacking is the courage and leadership to actually implement
these recommendations. To ensure our National and economic
security, now is the time we must act.
The U.S. Government must chart a new course to cyberspace.
The private sector must also be a full partner and accept its
share of responsibility for our combined security. Now is the
time to stop planning and start acting.
The Chairman's intention with this hearing is to give this
subcommittee some background on the issues facing us.
Cybercrime costs this country billions of dollars a year. We
know that our Government networks are attacked tens of
thousands of times per day and private sector networks are
attacked even more often. We know that our critical
infrastructures are already compromised and penetrated. The
enemy has already successfully attacked and continues to do so.
We need to absorb this information, get up to speed quickly,
and move forward to address this issue. We have already lost
many small battles. We have to start protecting ourselves
before an attack big enough to cause irreparable damage is
carried out.
To the witnesses appearing before us today, I thank you for
being here, and I welcome your thoughts on the issues before
us, including what you think an effective National
cybersecurity policy should look like. Chairman Lungren and I
intend for this subcommittee, as well as the full committee, to
play a leading role in shaping our National cyber posture in
the years to come.
Thank you, Chairman, and I yield back.
Mr. Lungren. Thank you very much, Madam Ranking Member, and
I appreciate your spirit of cooperation with which you led this
subcommittee and continuing now.
Other Members are reminded that they may give us their
statements that will be entered into the record.
We are pleased to have a very distinguished panel of
witnesses before us today on this important topic. Deputy Under
Secretary Phil Reitinger was named Deputy Under Secretary for
NPPD in 2009. He also serves as the Director of the National
Cybersecurity Center. In this role, he provides strategic
direction to the Department's cybersecurity efforts. Prior to
joining the Department, he was the senior security strategist
for Microsoft's trustworthy computing program, so he is well
versed in the challenges facing both Government and the private
sector in dealing with the important issue of cybersecurity.
Prior to serving with Microsoft, Deputy Under Secretary
Reitinger was the Executive Director for the Department of
Defense's Cybercrime Center. Before that, he was the Deputy
Chief of the Department of Justice's Computer Crime and
Intellectual Property Section, proving that he just can't keep
a job. No. He has had tremendous experience and has a unique
perspective from multiple positions within the administration
and therefore has much wisdom with which to guide us.
Greg Wilshusen has been with the GAO for over 13 years and
has been over 29 years in auditing financial management
information systems. He is a certified public accountant,
certified internal auditor, certified information systems
auditor. He holds a B.S. degree in business administration from
the University of Missouri. Are they in the----
Mr. Wilshusen. Yes, they are. In fact, they are playing
tomorrow evening at 9:50 against----
Mr. Lungren. I see. Notre Dame doesn't play until Friday at
1:40 eastern time, but I hope to be in California so I will be
watching them from the Pacific coast.
An MS in information management from George Washington
University School of Engineering and Applied Sciences. At GAO,
he has overseen multiple reports on information security, both
at DHS and Government-wide.
The Chair recognizes Mr. Reitinger, who will testify on
behalf of the Department of Homeland Security.
STATEMENT OF PHILIP REITINGER, DEPUTY UNDER SECRETARY, NATIONAL
PROTECTION AND PROGRAMS DIRECTORATE, DEPARTMENT OF HOMELAND
SECURITY
Mr. Reitinger. Thank you very much, Chairman Lungren and
Ranking Member Clarke. It is indeed an honor to be here today
to talk before the committee.
As you pointed out, sir, my name is Phillip Reitinger, and
I am the Deputy Under Secretary at the Department of Homeland
Security.
Appropos of your comment about my inability to keep a job,
I would say I am not sure I need to be here today based on the
opening comments that you and the Ranking Member made. Let me
give you an Amen from the congregation; you understand the
issue, you get it. So I am going to speak very briefly about
three quick points, and then I would be happy, after Greg
talks, to answer any questions that you have.
The three points I wanted to quickly raise are that
cybersecurity is a critical issue; second, there is no simple
solution, neither entity or technology, that is going to solve
the problem; and three, that although we have made significant
progress over the course of my 15 to 20 years involved in this
space and the more significant efforts of many more people over
a longer period of time, we are not yet where we need to be. We
need to actually--not to be jargonistic, but we need to take
this to a new level.
So let me start with the first point, that cybersecurity is
a critical issue. This goes back to the comments that you made,
Chairman. The threat is significant, and the threat is getting
more significant. Perhaps more important, we are depending more
on information networks every day--not just for looking at a
cute video on-line or our ability to send an e-mail, but for
the basic functioning of our economy.
It is not just a security issue, it is an economic issue.
We don't have power, we don't have phone service, we don't have
9-1-1 service, we don't get water, we don't have banking
without the proper functioning of the internet and the systems
that are connected to it. So we must treat this as a critical
issue, and, in fact, we have, over the course of the last two
administrations. Cybersecurity has been a bipartisan issue,
going from the launch of the Comprehensive National
Cybersecurity Initiative in the prior administration through
the current Presidents's Cyberspace Policy Review and the on-
going work to cross both administrations and across both
parties in both Houses of Congress to move the issue forward.
But it is a complex problem. There is no simple solution.
There is no single entity, no private sector player or even the
private sector together. DHS, DOD, the Department of Commerce,
all of them need to be involved, and none of them standing
alone--and none of them even standing in the forefront with a
little bit of help from others is going to solve the problem.
We actually do have to work this broadly in partnership. By
partnership, I don't mean saying partnership we all sing
Kumbaya and we go home. I mean, we actually work together to
drive outcomes, that we have known roles and responsibilities
and we execute on those things.
In that space, DHS plays a critical role. We are
responsible for leading the protection of the civilian
government systems and private sector, so-called dot-com
systems, even though it is broader than that. I say ``lead''
advisedly because this is not about DHS will come in and solve
all your problems for you. We are not going to do that. But
what we can do is we can help. Everybody has got to build
security into their own operations--private sector companies,
civilian government agencies and DHS; we have got to build it
into our DNA. DHS has got to do the job of helping people to
execute much more effectively. We have had signal successes in
that role. The Chairman mentioned the creation of the first
real National incident response plan to bring all of Government
and private sector together so we can respond as one Nation to
a significant cyber event.
A plan that we tested in a major exercise last year that
involved several thousand people--literally, several thousand
people around the globe, tens of private sector companies, over
10 nations around the world and over 10 States and localities.
I will talk more after my opening statement in response to your
questions.
The last thing I would say in closing is that much more
remains to be done. As the Ranking Member indicated, we are
systemically vulnerable. We have made significant progress, but
we are not yet where we need to be. So as the Ranking Member
indicated, what we have to do is focus on implementation. What
makes a difference day to day, week to week, month to month?
How can we do that? That is one of the reasons why partnership
from the Government Accountability Office is so important to
us. It can help us prioritize, indicate areas for further
progress, and help us find the best way forward.
Together, we need to have that broad public dialogue which
I am sure will take place this year across the public and
private sectors about how we close the gap between where we are
now and where we need to be. With that, I will look forward
very much to the questions of the subcommittee. Thank you.
[The statement of Mr. Reitinger follows:]
Prepared Statement of Philip Reitinger
March 16, 2011
introduction
Chairman Lungren, Vice Chairman Walberg, Ranking Member Clarke, and
distinguished Members of the subcommittee, it is a pleasure to appear
before you today to discuss the Department of Homeland Security's (DHS)
cybersecurity mission. I will provide an overview of the current
cybersecurity environment, the Department's cybersecurity mission as it
relates to critical infrastructure, and the coordination of this
mission with our public and private sector partners.
We would like to work more with you to convey the relevance of
cybersecurity to average Americans. Increasingly, the services we rely
on for daily life, such as water distribution and treatment,
electricity generation and transmission, health care, transportation,
and financial transactions depend on an underlying information
technology and communications infrastructure. Cyber threats put the
availability and security of these and other services at risk.
the current cybersecurity environment
The United States confronts a combination of known and unknown
vulnerabilities, strong and rapidly expanding adversary capabilities,
and a lack of comprehensive threat and vulnerability awareness. Within
this dynamic environment, we are confronted with threats that are more
targeted, more sophisticated, and more serious.
Sensitive information is routinely stolen from both Government and
private sector networks, undermining confidence in our information
systems and the information collection and sharing process, and as bad
as the loss of precious National intellectual capital is, we
increasingly face threats that are even greater. We currently cannot be
certain that our information infrastructure will remain accessible and
reliable during a time of crisis.
We face persistent, unauthorized, and often unattributed intrusions
into Federal Executive Branch civilian networks. These intruders span a
spectrum of malicious actors, including nation states, terrorist
networks, organized criminal groups, or individuals located here in the
United States. They have varying levels of access and technical
sophistication, but all have nefarious intent. Several are capable of
targeting elements of the U.S. information infrastructure to disrupt,
dismantle, or destroy systems upon which we depend. Motives include
intelligence collection, intellectual property or monetary theft, or
disruption of commercial activities, among others. Criminal elements
continue to show increasing levels of sophistication in their technical
and targeting capabilities and have shown a willingness to sell these
capabilities on the underground market. In addition, terrorist groups
and their sympathizers have expressed interest in using cyberspace to
target and harm the United States and its citizens. While some have
commented on terrorists' own lack of technical abilities, the
availability of technical tools for purchase and use remains a
potential threat.
Malicious cyber activity can instantaneously result in virtual or
physical consequences that threaten National and economic security,
critical infrastructure, public health and welfare, and confidence in
Government. Similarly, stealthy intruders can lay a hidden foundation
for future exploitation or attack, which they can then execute at their
leisure--and at their time of greatest advantage. Securing cyberspace
requires a layered security approach. Moreover, securing cyberspace is
also critical to accomplishing nearly all of DHS's other missions
successfully.
We need to support the efforts of our State and local government
and private sector partners to secure themselves against malicious
activity in cyberspace. Similarly, we need to ensure that the Federal
civilian environment is secure and that legitimate traffic is allowed
to flow freely while malicious traffic is prevented from penetrating
our defenses. Collaboratively, public and private sector partners must
use our knowledge of these systems and their interdependencies to
prepare to respond should defensive efforts fail. This is a serious
challenge, and DHS is continually making strides to improve the
Nation's overall operational posture and policy efforts. In addition,
other departments, such as the Department of Education, are working to
educate parents and students on internet safety and privacy protection.
cybersecurity mission
Let me be clear that no single technology--or single Government
entity--alone can overcome the cybersecurity challenges our Nation
faces. Cybersecurity must start with informed users taking necessary
precautions and extend through a coordinated effort between the private
sector, critical infrastructure owners and operators, and the extensive
expertise that lies across coordinated Government entities. The
National Protection and Programs Directorate (NPPD) within DHS is
responsible for the following key cybersecurity missions:
Leading the effort to secure Federal Executive Branch
civilian departments and agencies' unclassified networks;
Providing technical expertise to the private sector and
critical infrastructure and key resources (CIKR) owners and
operators--whether private sector, State, or municipality
owned--to bolster their cybersecurity preparedness, risk
assessment, mitigation and incident response capabilities;
Raising cybersecurity awareness among the general public;
and
Coordinating the National response to domestic cyber
emergencies.
Leveraging cyber defense capability across all departments
and agencies to detect, respond, isolate, and remediate cyber
attacks or practices dangerous to security and privacy.
In a reflection of the bipartisan nature with which the Federal
Government continues to approach cybersecurity, President Obama
determined that the Comprehensive National Cybersecurity Initiative
(CNCI) and its associated activities should evolve to become key
elements of the broader National cybersecurity efforts. These CNCI
initiatives play a central role in achieving many of the key
recommendations of the President's Cyberspace Policy Review: Assuring a
Trusted and Resilient Information and Communications Infrastructure.
Following the publication of those recommendations in May 2009, DHS and
its components developed a long-range vision of cybersecurity for the
Department and the Nation's homeland security enterprise, which is
encapsulated in the Quadrennial Homeland Security Review (QHSR). The
QHSR provides an overarching framework for the Department and defines
our key priorities and goals. One of the five priority areas detailed
in the QHSR is safeguarding and securing cyberspace. Within the
cybersecurity mission area, the QHSR identifies two overarching goals:
To help create a safe, secure, and resilient cyber environment; and to
promote cybersecurity knowledge and innovation.
In alignment with the QHSR, Secretary Napolitano consolidated many
of the Department's cybersecurity efforts under NPPD. The Office of
Cybersecurity and Communications (CS&C), a component of NPPD, focuses
on reducing risk to the Nation's communications and information
technology infrastructures and the sectors that depend upon them, as
well as enabling timely response and recovery of these infrastructures
under all circumstances. The functions and mission of the National
Cybersecurity Center (NCSC) are now supported by CS&C. These functions
include coordinating operations among the six largest Federal cyber
centers. CS&C also coordinates National security and emergency
preparedness communications planning and provisioning for the Federal
Government and other stakeholders. CS&C comprises three divisions: the
National Cyber Security Division (NCSD), the Office of Emergency
Communications, and the National Communications System. Within NCSD,
the United States Computer Emergency Readiness Team (US-CERT) is
working more closely than ever with our public and private sector
partners to share what we learn from EINSTEIN 2, a Federal executive
agency computer network intrusion detection system, to deepen our
collective understanding, identify threats collaboratively, and develop
effective security responses. EINSTEIN enables us to respond
proactively to warnings and other indicators of operational cyber
attacks, and we have many examples showing that this program investment
has paid for itself several times over.
Teamwork--ranging from intra-agency to international
collaboration--is essential to securing cyberspace. Simply put, the
cybersecurity mission cannot be accomplished by any one agency; it
requires teamwork and coordination. Together, we can leverage
resources, personnel, and skill sets that are needed to achieve a more
secure and reliable cyberspace.
NCSD collaborates with Federal Government stakeholders, including
civilian agencies, law enforcement, the military, the intelligence
community, State and local partners, and private sector stakeholders,
to conduct risk assessments and mitigate vulnerabilities and threats to
information technology assets and activities affecting the operation of
civilian government and private sector critical infrastructures. NCSD
also provides cyber threat and vulnerability analysis, early warning,
and incident response assistance for public and private sector
constituents. To that end, NCSD carries out the majority of DHS' non-
law enforcement cybersecurity responsibilities.
national cyber incident response
The President's Cyberspace Policy Review called for ``a
comprehensive framework to facilitate coordinated responses by
government, the private sector, and allies to a significant cyber
incident.'' DHS coordinated the interagency, State and local
government, and private sector working group that developed the
National Cyber Incident Response Plan. The plan provides a framework
for effective incident response capabilities and coordination among
Federal agencies, State and local governments, the private sector, and
international partners during significant cyber incidents. It is
designed to be flexible and adaptable to allow synchronization of
response activities across jurisdictional lines. In September 2010, DHS
hosted Cyber Storm III, a response exercise in which members of the
domestic and international cyber incident response community addressed
the scenario of a coordinated cyber event. During the event, the
National Cyber Incident Response Plan was activated and its incident
response framework was tested. Based on observations from the exercise,
the plan is in its final stages of revision prior to publication.
Cyber Storm III also tested the National Cybersecurity and
Communications Integration Center (NCCIC)--DHS' 24-hour cyber watch and
warning center--and the Federal Government's full suite of
cybersecurity response capabilities. The NCCIC works closely with
Government at all levels and with the private sector to coordinate the
integrated and unified response to cyber and communications incidents
impacting homeland security.
Numerous DHS components, including US-CERT, the Industrial Control
Systems Cyber Emergency Response Team (ICS-CERT), and the National
Coordinating Center for Telecommunications (NCC), are collocated into
the NCCIC. Also present in the NCCIC are other Federal partners, such
as the Department of Defense (DoD) and members of the law enforcement
and intelligence communities. The NCCIC also physically collocates
Federal staff with private sector and non-Governmental partners.
Currently, representatives from the Information Technology and
Communications sectors are located at the NCCIC. We are also finalizing
steps to add representatives from the Banking and Finance sector, as
well as the Multi-State Information Sharing and Analysis Center (MS-
ISAC).
By leveraging the integrated operational capabilities of its member
organizations, the NCCIC serves as an ``always on'' cyber incident
response and management center, providing indications and warning of
imminent incidents, and maintaining a National cyber ``common operating
picture.'' This facilitates situational awareness among all partner
organizations, and also creates a repository of all vulnerability,
intrusion, incident, and mitigation activities. The NCCIC also serves
as a National point of integration for cyber expertise and
collaboration, particularly when developing guidance to mitigate risks
and resolve incidents. Finally, the unique and integrated nature of the
NCCIC allows for a scalable and flexible coordination with all
interagency and private sector staff during steady-state operations, in
order to strengthen relationships and solidify procedures as well as
effectively incorporate partners as needed during incidents.
providing technical expertise to the private sector and critical
infrastructure
DHS has significant cybersecurity capabilities, and we are using
those capabilities to great effect as we work collaboratively with the
private sector to protect the Nation's CIKR. We engage with the private
sector on a voluntary basis to provide on-site analysis, mitigation
support, and assessment assistance. Over the past year, we have
repeatedly shown our ability to materially and expeditiously assist
companies with cyber intrusion mitigation and incident response. We are
able to do so through our trusted and close relationships with private
sector companies as well as Federal departments and agencies. Finally,
our success in assisting the private sector is due in no small part to
our dedication to properly and fully addressing privacy, civil rights,
and civil liberties in all that we do. Initiating technical assistance
with a private company to provide them analysis and mitigation advice
is a sensitive endeavor--one that requires trust and strict
confidentiality. Within our analysis and warning mission space, DHS has
a proven ability to provide that level of trust and confidence in the
engagement. Our efforts are unique among Federal agencies' capabilities
in that DHS focuses on computer network defense and protection rather
than law enforcement or intelligence functions. DHS engages precisely
to mitigate the threat to the network to reduce future risks.
Our approach requires vigilance and a voluntary public-private
partnership. Indeed, we are continuing to build our capabilities and
our relationships; we must because the cyber threat trends only more
sophisticated and more frequent.
Over the past year, we stood up the NCCIC and are adding staff to
that center, both from existing DHS personnel and from partner
organizations in the public and private sectors. More broadly, we are
continuing to hire more cybersecurity professionals and are increasing
training available to our employees. We have an operational National
Cyber Incident Response Plan (NCIRP), and we continue to update and
improve it with input from senior cybersecurity leaders. We will be
releasing the NCIRP publicly in the coming weeks. We are executing
within our current mission and authorities now: Receiving and
responding to substantial netflow data from our intrusion detection
technologies deployed to our Federal partners, and leveraging that data
to provide early warnings and indicators across Government and
industry. With our people, processes, and technology, we stand ready to
execute the responsibilities of the future.
US-CERT provides remote and on-site response support and defense
against malicious cyber activity for the Federal Executive Branch
civilian networks. US-CERT also collaborates, provides remote and on-
site response support and shares information with State and local
government, critical infrastructure owners and operators, and
international partners to address cyber threats and develop effective
security responses.
In addition to specific mitigation work we conduct with individual
companies and sectors, DHS looks at the interdependencies across
critical infrastructure sectors for a holistic approach to providing
our cyber expertise. For example, the electric, nuclear, water,
transportation, and communications sectors support functions across all
levels of government including Federal, State, local, and Tribal
governments, and the private sector. Government bodies and
organizations do not inherently produce these services and must rely on
private sector organizations, just as other businesses and private
citizens do. Therefore, an event impacting control systems has
potential implications at all these levels, and could also have
cascading effects upon all 18 sectors. For example, water and
wastewater treatment, chemical, and transportation depend on the energy
sector, and failure in one of these sectors could subsequently affect
Government and private sector operations.
NCCIC's operations are complemented in the arena of industrial
control systems by ICS-CERT. The term ``control system'' encompasses
several types of systems, including Supervisory Control and Data
Acquisition (SCADA), process control, and other automated systems that
are found in the industrial sectors and critical infrastructure. These
systems are used to operate physical processes that produce the goods
and services that we rely upon, such as energy, drinking water,
emergency services, transportation, postal and shipping, and public
health. Control systems security is particularly important because of
the inherent interconnectedness of the CIKR sectors and their
dependence on one another.
As such, assessing risk and effectively securing industrial control
systems are vital to maintaining our Nation's strategic interests,
public safety, and economic well-being. A successful cyber attack on a
control system could result in physical damage, loss of life, and
cascading effects that could disrupt services. DHS recognizes that the
protection and security of control systems is essential to the Nation's
overarching security and economy. In this context, as an example of
many related initiatives and activities, DHS--in coordination with the
Department of Commerce's National Institute of Standards and Technology
(NIST), the Department of Energy, and DoD--has provided a forum for
researchers, subject matter experts and practitioners dealing with
cyber-physical systems security to assess the current state of the art,
identify challenges, and provide input to developing strategies for
addressing these challenges. Specific infrastructure sectors considered
include energy, chemical, transportation, water and wastewater
treatment, health care and public health, and commercial facilities. A
2010 published report of findings and recommendations is available upon
request.
ICS-CERT provides on-site support to owners and operators of
critical infrastructure for protection against and response to cyber
threats, including incident response, forensic analysis, and site
assessments. ICS-CERT also provides tools and training to increase
stakeholder awareness of evolving threats to industrial control
systems.
A real-world threat emerged last year that significantly changed
the landscape of targeted cyber attacks on industrial control systems.
Malicious code, dubbed Stuxnet, was detected in July 2010. DHS analysis
concluded that this highly complex computer worm was the first of its
kind, written to specifically target mission-critical control systems
running a specific combination of software and hardware.
ICS-CERT analyzed the code and coordinated actions with critical
infrastructure asset owners and operators, Federal partners, and
Information Sharing and Analysis Centers. Our analysis quickly
uncovered that sophisticated malware of this type potentially has the
ability to gain access to, steal detailed proprietary information from,
and manipulate the systems that operate mission-critical processes
within the Nation's infrastructure. In other words, this code can
automatically enter a system, steal the formula for the product being
manufactured, alter the ingredients being mixed in the product, and
indicate to the operator and the operator's anti-virus software that
everything is functioning normally.
To combat this threat, ICS-CERT has been actively analyzing and
reporting on Stuxnet since it was first detected in July 2010. To date,
ICS-CERT has briefed dozens of Government and industry organizations
and released multiple advisories and updates to the industrial control
systems community describing steps for detecting an infection and
mitigating the threat. As always, we attempt to balance the need for
public information sharing while limiting the information that
malicious actors may exploit. DHS provided the alerts in accordance
with its responsible disclosure processes.
The purpose and function for responsible disclosure is to ensure
that DHS executes its mission of mitigating risk to critical
infrastructure, not necessarily to be the first to publish on a given
threat. For example, ICS-CERT's purpose in conducting the Stuxnet
analysis was to ensure that DHS understood the extent of the risks so
that they could be mitigated. After conducting in-depth malware
analysis and developing mitigation steps, we were able to release
actionable information that benefited our private sector partners.
Looking ahead, the Department is concerned that attackers could use
the increasingly public information about the code to develop variants
targeted at broader installations of programmable equipment in control
systems. Copies of the Stuxnet code, in various different iterations,
have been publicly available for some time now. ICS-CERT and the NCCIC
remain vigilant and continue analysis and mitigation efforts of any
derivative malware.
ICS-CERT will continue to work with the industrial control systems
community to investigate these and other threats through malicious code
and digital media analysis, on-site incident response activities, and
information sharing and partnerships.
protecting federal civilian government networks
In addition to its support of private sector owners and operators
of infrastructure, DHS also collaborates with its partners to increase
the security of Federal Executive Branch civilian agency networks. The
fundamental ways that DHS works to secure Federal networks are by
improving the ability of departments and agencies to defend their
systems and by directly providing expertise and specific technology
that detects, mitigates, and prevents malicious activity on these
networks.
As part of the CNCI, DHS works with the Office of Management and
Budget (OMB) to reduce and consolidate the number of external
connections that Federal agencies have to the internet through the
Trusted Internet Connection (TIC) initiative. This initiative reduces
the number of entry points for potential vulnerabilities into
Government networks and allows DHS to focus monitoring efforts on
limited and known avenues through which internet traffic must travel.
DHS conducts on-site evaluations of agencies' progress toward
implementing TIC goals.
In conjunction with the TIC initiative, the EINSTEIN system is
designed to provide the U.S. Government with an early warning system
for intrusions to Federal Executive Branch civilian networks, near
real-time identification of malicious activity, and automated
disruption of that malicious activity. The second phase of EINSTEIN,
known as EINSTEIN 2 and developed in 2008 as part of the CNCI,
incorporates intrusion detection capabilities into the original
EINSTEIN system. DHS is currently deploying EINSTEIN 2 to Federal
Executive Branch civilian agency TIC locations and Networx Managed
Trusted Internet Protocol Services (MTIPS) providers, which are private
internet service providers that serve Federal agencies, to assist them
with protecting their computers, networks, and information. EINSTEIN 2
has now been deployed at 15 of the 19 large departments and agencies
who maintain their own TIC locations. Also, the four MTIPS providers
currently provide service to seven additional Federal agencies. In
2010, EINSTEIN 2 sensors registered 5.4 million ``hits,'' an average of
more than 450,000 hits per month or nearly 15,000 hits per day. A hit
is an alert triggered by a predetermined intrusion detection signature
that corresponds to a known threat. Each hit represents potential
malicious activity for further assessment by US-CERT.
DHS is currently developing the third phase of the EINSTEIN
system--an intrusion prevention capability which will provide DHS with
the ability to automatically detect and disrupt malicious activity
before harm is done to critical networks and systems. In advance of
this development, DHS, in coordination with the National Security
Agency (NSA), conducted the CNCI Initiative 3 Exercise, which advanced
the potential capabilities of the EINSTEIN system by demonstrating
defensive technology, sharing near real-time threat information with
DoD for enhanced situational awareness, and providing a platform upon
which an oversight and compliance process can be implemented for the
evolving set of EINSTEIN capabilities. The Department's Privacy Office
and its Office for Civil Rights and Civil Liberties carefully reviewed
the exercise concept of operations, and the Privacy Office worked with
US-CERT to publicly release a detailed Privacy Impact Assessment
evaluating the exercise. US-CERT also briefed the exercise to the cyber
subcommittee of the independent DHS Data Privacy and Integrity
Committee.
Beyond the TIC initiative and the EINSTEIN system, DHS, OMB, and
the National Institute for Standards and Technology work cooperatively
with agencies across the Federal Government to coordinate the
protection of the Nation's Federal information systems through
compliance with the Federal Information Security Management Act of 2002
(FISMA). US-CERT monitors EINSTEIN 2 sensors for intrusion activity and
receives self-reported incident information from Federal agencies. This
information is reported to OMB for use in its FISMA oversight capacity.
In 2010, DHS also began to administer oversight of the CyberScope
system, which was developed by the Department of Justice. This system
collects agency information regarding FISMA compliance and, as DHS,
OMB, and their agency partners move toward automated reporting, the
system will enable real-time assessments of baseline security postures
across individual agencies and the Federal enterprise as a whole. This
activity complements the development of reference architectures that
DHS designs for Federal agency stakeholders that are interested in
implementing security solutions based on standards and best practices.
DHS also works with the General Services Administration to create
Blanket Purchase Agreements that address various security solutions for
Federal agencies.
the dhs cybersecurity workforce
As DHS continues to make progress on initiatives such as TIC and
EINSTEIN, the Department is also mindful that the Nation's
cybersecurity challenge will not be solved by a single technology
solution. Multiple innovative technical tools are necessary and indeed,
technology alone is insufficient. The mission requires a larger
cybersecurity professional workforce, governance structures for
enhanced partnerships, more robust information sharing and identity
protection, and increased cybersecurity awareness among the general
public. Responsibility for these solutions is, and will remain,
distributed across public and private sector partners.
DHS is focused on building a world-class cybersecurity team by
hiring a diverse group of cybersecurity professionals--computer
engineers, scientists, and analysts--to secure the Nation's digital
assets and protect against cyber threats to our critical infrastructure
and key resources. NCSD continues to hire cybersecurity and information
technology professionals, nearly tripling its cybersecurity workforce
in fiscal year 2009 and nearly doubling that number again in fiscal
year 2010. NCSD currently has more than 230 cybersecurity professionals
on board, with dozens more in the hiring pipeline.
Several initiatives are designed to increase the Nation's number of
highly qualified cybersecurity professionals. DHS and NSA co-sponsor
the Centers of Academic Excellence in Information Assurance Education
and Research programs, the goal of which is to produce a growing number
of professionals with information assurance expertise in various
disciplines. DHS and the Department of State co-hosted Operation Cyber
Threat (OCT1.0), the first in a series of Government-wide experiential
and interactive cybersecurity training pilots designed to apply
learning concepts and share best practices in a secure, simulated
environment to build capacity within the Federal workforce. In December
2010, the Institute of Electrical and Electronics Engineers Computer
Society, the world's leading organization of computing professionals,
formally recognized the Master of Software Assurance (MSwA) Reference
Curriculum, which DHS sponsored through its Software Assurance (SwA)
Curriculum Project. The MSwA program is the first curriculum of its
kind to focus on assuring the functionality, dependability, and
security of software and systems. Finally, DHS co-sponsored the annual
Colloquium for Information Systems Security Education and the
Scholarship for Services (SFS) Job Fair/Symposium, which brought
together 55 Federal agencies and more than 200 SFS students.
The National Initiative for Cybersecurity Education (NICE) has the
dual goals of a cyber-savvy citizenry and a cyber-capable workforce.
Working with NIST, which is the overall interagency lead, DHS heads the
NICE awareness elements and co-leads the training and professional
development components with DoD and the Office of the Director of
National Intelligence.
interagency and public-private coordination
Overcoming new cybersecurity challenges requires a coordinated and
focused approach to better secure the Nation's information and
communications infrastructures. President Obama's Cyberspace Policy
Review reaffirms cybersecurity's significance to the Nation's economy
and security. Establishment of a White House Cybersecurity Coordinator
position solidified the priority the administration places on improving
cybersecurity.
No single agency controls cyberspace and the success of our
cybersecurity mission relies on effective communication and critical
partnerships. Many Government players have complementary roles--
including DHS, the intelligence community, DoD, the Department of
Justice, the Department of State, and other Federal agencies--and they
require coordination and leadership to ensure effective and efficient
execution of our collective cyber missions. The creation of a senior-
level cyber position within the White House ensures coordination and
collaboration across Government agencies.
DHS works closely with its Federal, State, and local partners to
protect Government cyber networks. In September 2010, DHS and DoD
signed a memorandum of agreement that aligns and enhances America's
capabilities to protect against threats to our critical civilian and
military computer systems and networks, including deploying a National
Security Agency support team to the NCCIC to enhance the National Cyber
Incident Response Plan and sending a full-time senior DHS leader and
support team to the National Security Agency.
In November 2010, the MS-ISAC opened its Cyber Security Operations
Center, a 24-hour watch and warning facility, which will both enhance
situational awareness at the State and local level for the NCCIC and
allow the Federal Government to quickly and efficiently provide
critical cyber risk, vulnerability, and mitigation data to State and
local governments. An MS-ISAC analyst/liaison is collocated in the
NCCIC.
Private industry owns and operates the vast majority of the
Nation's critical infrastructure and cyber networks. Consequently, the
private sector plays an important role in cybersecurity, and DHS has
initiated several pilot programs to promote public-private sector
collaboration. In its engagement with the private sector, DHS
recognizes the need to avoid technology prescription and to support
innovation that enhances critical infrastructure cybersecurity. DHS,
through the National Infrastructure Protection Plan partnership
framework, has many years of experience in private sector
collaboration, leveraging our relationships in both the physical and
cybersecurity protection areas. Within current legal authorities, DHS
engages with the private sector on a voluntary basis. We stand by to
assist our private sector partners upon their request, and thus far
have been able to do so successfully due to our technical capabilities,
existing private sector relationships, and expertise in matters
relating to privacy and civil rights and civil liberties.
In February 2010, DHS, DoD, and the Financial Services Information
Sharing and Analysis Center (FS-ISAC) launched a pilot designed to help
protect key critical networks and infrastructure within the financial
services sector by sharing actionable, sensitive information. Based on
lessons learned from the pilot, DHS is developing comprehensive
information-sharing and incident response coordination processes with
CIKR sectors, leveraging capabilities from within DHS and across the
response community, through the NCCIC.
In June 2010, DHS implemented the Cybersecurity Partner Local
Access Plan, which allows security-cleared owners and operators of
CIKR, as well as State technology officials and law enforcement
officials, to access secret-level cybersecurity information and video
teleconference calls via State and local fusion centers. In November
2010, DHS signed an agreement with the Information Technology
Information Sharing and Analysis Center (IT-ISAC) to embed a full-time
IT-ISAC analyst and liaison to DHS at the NCCIC, part of the on-going
effort to collocate private sector representatives alongside Federal
and State government counterparts. The IT-ISAC consists of information
technology stakeholders from the private sector and facilitates
cooperation among members to identify sector-specific vulnerabilities
and risk mitigation strategies.
In July 2010, DHS worked extensively with the White House on the
publication of a draft National Strategy for Trusted Identities in
Cyberspace, which seeks to secure the digital identities of
individuals, organizations, services, and devices during on-line
transactions, as well as the infrastructure supporting the transaction.
This fulfills one of the near-term action items of the President's
Cyberspace Policy Review. The strategy is based on public-private
partnerships and supports the protection of privacy, and civil rights
and civil liberties by enabling only the minimum necessary amount of
personal information to be transferred in any particular transaction.
Its implementation will be led by the Department of Commerce.
In December 2010, DHS and NIST signed a Memorandum of Understanding
with the Financial Services Sector Coordinating Council. The goal of
the agreement is to speed the commercialization of cybersecurity
research innovations that support our Nation's critical
infrastructures. This agreement will accelerate the deployment of
network test beds for specific use cases that strengthen the
resiliency, security, integrity, and usability of financial services
and other critical infrastructures.
While considerable activity is focused on public and private sector
critical infrastructure protection, DHS is committed to developing
innovative ways to enhance the general public's awareness about the
importance of safeguarding America's computer systems and networks from
attacks. Every October, DHS and its public and private sector partners
promote efforts to educate citizens about guarding against cyber
threats as part of National Cybersecurity Awareness Month. In March
2010, Secretary Napolitano launched the National Cybersecurity
Awareness Challenge, which called on the general public and private
sector companies to develop creative and innovative ways to enhance
cybersecurity awareness. In July 2010, seven of the more than 80
proposals were selected and recognized at a White House ceremony. The
winning proposals helped inform the development of the National
Cybersecurity Awareness Campaign, Stop. Think. Connect., which DHS
launched in conjunction with private sector partners during the October
2010 National Cybersecurity Awareness Month. Stop. Think. Connect., a
message developed with the private sector, has evolved into an on-going
National public education campaign designed to increase public
understanding of cyber threats and how individual citizens can develop
safer cyber habits that will help make networks more secure. The
campaign fulfills a key element of President Obama's Cyberspace Policy
Review, which tasked DHS with developing a public awareness campaign to
inform Americans about ways to use technology safely. The program is
part of the NIST National Initiative for Cyber Education (NICE).
Throughout its public and private sector activities, DHS is
committed to supporting the public's privacy, civil rights, and civil
liberties. Accordingly, the Department has implemented strong privacy
and civil rights and civil liberties standards into all of its
cybersecurity programs and initiatives from the outset. To support
this, DHS established an Oversight and Compliance Officer within NPPD,
and key cybersecurity personnel receive specific training on the
protection of privacy and other civil liberties as they relate to
computer network security activities. In an effort to increase
transparency, DHS also publishes privacy impact assessments on its
website, www.dhs.gov, for all of its cybersecurity systems.
conclusion
Set within an environment characterized by a dangerous combination
of known and unknown vulnerabilities, strong and rapidly expanding
adversary capabilities, and a lack of comprehensive threat and
vulnerability awareness, the cybersecurity mission is truly a National
one requiring collaboration across the homeland security enterprise.
The Department of Homeland Security is committed to creating a safe,
secure, and resilient cyber environment while promoting cybersecurity
knowledge and innovation. We must continue to secure today's
infrastructure as we prepare for tomorrow's challenges and
opportunities. It is important to recognize that we do not undertake
cybersecurity for the sake of security itself, but rather to ensure
that Government, business, and critical societal functions can continue
to use the information technology and communications infrastructure on
which they depend.
Within our current legal authorities, DHS continues to engage and
collaborate with partners in the private and public sectors. We are
deploying intrusion detection and prevention technologies across the
Federal enterprise, aiding departments and agencies in securing their
networks, and providing analysis, vulnerability, and mitigation
assistance to private sector CIKR partners. Our continued dedication to
privacy, civil rights, and civil liberties ensures a positive,
sustainable model for cybersecurity engagement in the future. Finally,
we work closely with our interagency partners in law enforcement and
intelligence, providing the full complement of Federal capabilities in
preparation for, and in response to, significant cyber incidents.
Chairman Lungren, Vice Chairman Walberg, Ranking Member Clarke, and
distinguished Members of the subcommittee, let me end by reiterating
that I look forward to exploring opportunities to advance this mission
in collaboration with the subcommittee and my colleagues in the public
and private sectors. Thank you again for this opportunity to testify. I
would be happy to answer your questions.
Mr. Lungren. Thank you very much, Mr. Reitinger.
Now Mr. Wilshusen, who is looking forward to tomorrow's
basketball game, if you could give us about 5 minutes of your
best pitch right now and then we can ask questions.
STATEMENT OF GREGORY WILSHUSEN, DIRECTOR OF INFORMATION
SECURITY ISSUES, GOVERNMENT ACCOUNTABILITY OFFICE
Mr. Wilshusen. Chairman Lungren, Ranking Member Clarke, and
Members of the subcommittee, thank you for the opportunity to
testify at today's hearing on cyber threats to critical
infrastructure and the American economy.
As you mentioned in your opening statements, pervasive and
sustained cyber attacks against the United States continue to
threaten Federal and non-Federal systems and operations. The
every-increasing interdependence on these systems to carry out
essential everyday operations and activities makes us
vulnerable to a wide array of cyber-based threats. Thus, it is
increasingly important that Federal and non-Federal entities
carry out concerted efforts to safeguard their systems and the
information they contain.
Mr. Chairman, today we will discuss the threats to cyber-
reliant critical infrastructures and with Federal information
systems and the challenges agencies face in protecting them.
Cyber threats to critical infrastructure and Federal
services are evolving and growing and can come from a variety
of sources, including criminals and foreign nations, as well as
hackers and disgruntled employees. It is important not to
forget about the insider threat. Potential hackers have a
variety of techniques at their disposal that can vastly expand
the risk, the reach, and impact of their operations, including
use of social engineering and malicious software. The
interconnectivity between information systems, the internet,
and other infrastructure also presents increasing opportunities
for such attacks. Not surprisingly, security incidents reported
by Federal agencies are on the rise, increasing over 650
percent during the past 5 years to nearly 42,000 in fiscal year
2010.
Cyber attack incidents can seriously impact our National
and economic security and have resulted in the loss of
classified information and intellectual property, and financial
crimes reportedly totaling billions of dollars. Although the
administration and Federal agencies continue to act to
strengthen the Nation's cybersecurity posture, challenges
remain. Key actions to improve our National approach to
cybersecurity have not been fully implemented, Federal capacity
to protect against cyber threats needs to improve, and Federal
agencies have not fully addressed persistent control weaknesses
or consistently implemented effective information security
programs. For these reasons, GAO once again identified
protecting the Federal Government's information systems and the
Nation's critical infrastructure as a Government-wide high-risk
area in its biennial report to the Congress on high-risk
Government programs.
Mr. Chairman, much work remains to be done. Additional
Federal efforts are needed to implement actions recommended by
the President's Cybersecurity Policy Review, update the
National strategy for securing the information and
communications infrastructure, develop a National strategy for
addressing the global aspects of cybersecurity, and create a
prioritized National and Federal cybersecurity research and
development agenda.
Federal agencies, and in particular DHS, need to enhance
their cyber analysis and warning capabilities and help
strengthen the effectiveness of public-private sector
partnerships in securing cyber critical infrastructure. Federal
agencies also need to mitigate known vulnerabilities, fully
implement comprehensive information security programs, and
facilitate Government-wide efforts to secure their systems.
GAO has made numerous recommendations to assist agencies in
these areas, and agencies have implemented or are in the
process of implementing many of them.
In summary, Mr. Chairman, the threats to information
systems are evolving and growing, and systems supporting
Federal operations and the Nation's critical infrastructures
are not sufficiently protected to consistently thwart those
threats. Until the administration and Federal agencies working
with the private sector fully address the challenges before
them, our Nation's cybersecurity critical infrastructure will
remain vulnerable.
Mr. Chairman, this concludes my statement. I would be happy
to answer any questions.
[The statement of Mr. Wilshusen follows:]
Prepared Statement of Gregory Wilshusen
March 16, 2011
cybersecurity: continued attention needed to protect our nation's
critical infrastructure and federal information systems
Chairman Lungren, Ranking Member Clarke, and Members of the
subcommittee: Thank you for the opportunity to testify at today's
hearing on the cyber threats to critical infrastructure and the
American economy.
Pervasive and sustained cyber attacks against the United States
continue to pose a potentially devastating impact on Federal and non-
Federal systems and operations. In February 2011, the Director of
National Intelligence testified that, in the past year, there had been
a dramatic increase in malicious cyber activity targeting U.S.
computers and networks, including a more than tripling of the volume of
malicious software since 2009.\1\ Recent press reports that computer
hackers broke into and stole proprietary information worth millions of
dollars from the networks of six U.S. and European energy companies
also demonstrate the risk that our Nation faces. Such attacks highlight
the importance of developing a concerted response to safeguard Federal
and non-Federal information systems.
---------------------------------------------------------------------------
\1\ Director of National Intelligence, Statement for the Record on
the Worldwide Threat Assessment of the U.S. Intelligence Community,
statement before the Senate Select Committee on Intelligence (Feb. 16,
2011).
---------------------------------------------------------------------------
Mr. Chairman, GAO recently issued its high-risk list of Government
programs that have greater vulnerability to fraud, waste, abuse, and
mismanagement or need transformation to address economy, efficiency, or
effectiveness challenges.\2\ Once again, we identified protecting the
Federal Government's information systems and the Nation's cyber
critical infrastructure as a Government-wide high-risk area. We have
designated Federal information security as a high-risk area since 1997;
in 2003, we expanded this high-risk area to include protecting systems
supporting our Nation's critical infrastructure, referred to as cyber
critical infrastructure protection or cyber CIP.
---------------------------------------------------------------------------
\2\ GAO, High-Risk Series: An Update, (Washington, DC: February
2011).
---------------------------------------------------------------------------
In my testimony today I will describe: (1) Cyber threats to cyber-
reliant critical infrastructures and Federal information systems and
(2) the continuing challenges Federal agencies face in protecting the
Nation's cyber-reliant critical infrastructures and Federal systems. In
preparing this statement in March 2011, we relied on our previous work
in these areas (please see the related GAO products page at the end of
this statement). These products contain detailed overviews of the scope
and methodology we used. The work on which this statement is based was
performed in accordance with generally accepted Government auditing
standards. Those standards require that we plan and perform audits to
obtain sufficient, appropriate evidence to provide a reasonable basis
for our findings and conclusions based on our audit objectives. We
believe that the evidence obtained provided a reasonable basis for our
findings and conclusions based on our audit objectives.
background
As computer technology has advanced, Federal agencies and our
Nation's critical infrastructures \3\--such as power distribution,
water supply, telecommunications, and emergency services--have become
increasingly dependent on computerized information systems to carry out
their operations and to process, maintain, and report essential
information. Public and private organizations rely on computer systems
to transfer increasing amounts of money and sensitive and proprietary
information, conduct operations, and deliver services to constituents.
---------------------------------------------------------------------------
\3\ Critical infrastructures are systems and assets, whether
physical or virtual, so vital to the Nation that their incapacity or
destruction would have a debilitating impact on National security,
National economic security, National public health or safety, or any
combination of those matters.
---------------------------------------------------------------------------
The security of these systems and data is essential to protecting
National and economic security, and public health and safety.
Conversely, ineffective information security controls can result in
significant risks, including the loss of resources, such as Federal
payments and collections; inappropriate access to sensitive
information, such as National security information, personal
information on taxpayers, or proprietary business information;
disruption of critical operations supporting critical infrastructure,
National defense, or emergency services; and undermining of agency
missions due to embarrassing incidents that diminish public confidence
in Government.
cyber-reliant critical infrastructure and federal systems face
increasing cyber threats
Threats to systems supporting critical infrastructure and Federal
information systems are evolving and growing. Government officials are
concerned about attacks from individuals and groups with malicious
intent, such as criminals, terrorists, and foreign nations. Federal law
enforcement and intelligence agencies have identified multiple sources
of threats to our Nation's critical information systems, including
foreign nations engaged in espionage and information warfare,
criminals, hackers, virus writers, and disgruntled employees and
contractors. These groups and individuals have a variety of attack
techniques at their disposal that can be used to determine
vulnerabilities and gain entry into targeted systems. For example,
phishing involves the creation and use of fake e-mails and websites to
deceive internet users into disclosing their personal data and other
sensitive information.
The connectivity between information systems, the internet, and
other infrastructures also creates opportunities for attackers to
disrupt telecommunications, electrical power, and other critical
services. For example, in May 2008, we reported that the Tennessee
Valley Authority's (TVA) corporate network contained security
weaknesses that could lead to the disruption of control systems
networks and devices connected to that network.\4\ We made 19
recommendations to improve the implementation of information security
program activities for the control systems governing TVA's critical
infrastructures and 73 recommendations to address weaknesses in
information security controls. TVA concurred with the recommendations
and has taken steps to implement them. As Government, private sector,
and personal activities continue to move to networked operations, the
threat will continue to grow.
---------------------------------------------------------------------------
\4\ GAO, Information Security: TVA Needs to Address Weaknesses in
Control Systems and Networks, (Washington, DC: May 21, 2008).
---------------------------------------------------------------------------
Reported Security Incidents Are on the Rise
Consistent with the evolving and growing nature of the threats to
Federal systems, agencies are reporting an increasing number of
security incidents. These incidents put sensitive information at risk.
Personally identifiable information about U.S. citizens has been lost,
stolen, or improperly disclosed, thereby potentially exposing those
individuals to loss of privacy, identity theft, and financial crimes.
Agencies have experienced a wide range of incidents involving data loss
or theft, computer intrusions, and privacy breaches, underscoring the
need for improved security practices. Further, reported attacks and
unintentional incidents involving critical infrastructure systems
demonstrate that a serious attack could be devastating.
When incidents occur, agencies are to notify the Federal
information security incident center--the United States Computer
Emergency Readiness Team (US-CERT). Over the past 5 years, the number
of incidents reported by Federal agencies to US-CERT has increased
dramatically, from 5,503 incidents reported in fiscal year 2006 to
about 41,776 incidents in fiscal year 2010 (a more than 650 percent
increase). The three most prevalent types of incidents and events
reported to US-CERT during fiscal year 2010 were: (1) Malicious code
(software that infects an operating system or application), (2)
improper usage (a violation of acceptable computing use policies), and
(3) unauthorized access (where an individual gains logical or physical
access to a system without permission). Additionally, according to
Department of Homeland Security (DHS) officials, US-CERT detects
incidents and events through its intrusion detection system,
supplemented by agency reports, for investigation (unconfirmed
incidents that are potentially malicious or anomalous activity deemed
by the reporting entity to warrant further review).
Reports of cyber attacks and information security incidents against
Federal systems and systems supporting critical infrastructure
illustrate the effect that such incidents could have on National and
economic security.
In July 2010, the Department of Defense (DOD) launched an
investigation to identify how thousands of classified military
documents (including Afghanistan and Iraq war operations, as
well as field reports on Pakistan) were obtained by the group
WikiLeaks.org. According to DOD, this investigation was related
to an on-going investigation of an Army private charged with,
among other things, transmitting National defense information
to an unauthorized source.
In 2010, the Deputy Secretary of Defense stated that DOD
suffered a significant compromise of its classified military
computer networks in 2008. It began when a flash drive's
malicious computer code, placed there by a foreign intelligence
agency, uploaded itself onto a network and spread on both
classified and unclassified systems.\5\
---------------------------------------------------------------------------
\5\ Foreign Affairs, Defending a New Domain: The Pentagon's
Cyberstrategy, William J. Lynn III, U.S. Deputy Secretary of Defense
(New York, NY: September/October 2010).
---------------------------------------------------------------------------
In February 2011, media reports stated that computer hackers
broke into and stole proprietary information worth millions of
dollars from the networks of six U.S. and European energy
companies.
the federal government has taken actions to address cyber threats, but
challenges remain in protecting critical systems
The Federal Government has a variety of roles and responsibilities
in protecting the Nation's cyber-reliant critical infrastructure,
enhancing the Nation's overall cybersecurity posture, and ensuring the
security of Federal systems and the information they contain. In light
of the pervasive and increasing threats to critical systems, the
Executive branch is taking a number of steps to strengthen the Nation's
approach to cybersecurity. For example, in its role as the focal point
for Federal efforts to protect the Nation's cyber critical
infrastructures,\6\ DHS issued a revised National infrastructure
protection plan in 2009 and an interim National cyber incident response
plan in 2010. Executive branch agencies have also made progress
instituting several Government-wide initiatives that are aimed at
bolstering aspects of Federal cybersecurity, such as reducing the
number of Federal access points to the internet, establishing security
configurations for desktop computers, and enhancing situational
awareness of cyber events. Despite these efforts, the Federal
Government continues to face significant challenges in protecting the
Nation's cyber-reliant critical infrastructure and Federal information
systems.
---------------------------------------------------------------------------
\6\ As established by Federal law and policy, including the
Homeland Security Act of 2002, Homeland Security Presidential
Directive--7, and the National Strategy to Secure Cyberspace.
---------------------------------------------------------------------------
Key Actions to Improve Our Current National Approach to Cybersecurity
Have Not Yet Been Fully Implemented
The administration and Executive branch agencies have not yet fully
implemented key actions that are intended to address threats and
improve the current U.S. approach to cybersecurity.
Implementing actions recommended by the President's
Cybersecurity Policy Review. In February 2009, the President
initiated a review of the Government's cybersecurity policies
and structures, which resulted in 24 near- and mid-term
recommendations to address organizational and policy changes to
improve the current U.S. approach to cybersecurity.\7\ In
October 2010, we reported that 2 recommendations had been
implemented and 22 were partially implemented.\8\ Officials
from key agencies involved in these efforts (e.g., DHS, DOD,
and the Office of Management and Budget (OMB)) stated that
progress had been slower than expected because agencies lacked
assigned roles and responsibilities and because several of the
mid-term recommendations would require action over multiple
years. We recommended that the National Cybersecurity
Coordinator (whose role was established as a result of the
policy review) designate roles and responsibilities for each
recommendation and develop milestones and plans, including
measures to show agencies' progress and performance.
---------------------------------------------------------------------------
\7\ The White House, Cyberspace Policy Review: Assuring a Trusted
and Resilient Information and Communications Infrastructure
(Washington, DC: May 29, 2009).
\8\ GAO, Cyberspace Policy: Executive Branch Is Making Progress
Implementing 2009 Policy Review Recommendations, but Sustained
Leadership Is Needed, GAO-11-24 (Washington, DC: Oct. 6, 2010).
---------------------------------------------------------------------------
Updating the National strategy for securing the information
and communications infrastructure. In March 2009, we testified
on the needed improvements to the Nation's cybersecurity
strategy.\9\ In preparation for that testimony, we convened a
panel of experts that included former Federal officials,
academics, and private sector executives. The panel highlighted
12 key improvements that are, in its view, essential to
improving the strategy and our National cybersecurity posture,
including the development of a National strategy that clearly
articulates strategic objectives, goals, and priorities.
---------------------------------------------------------------------------
\9\ GAO, National Cybersecurity Strategy: Key Improvements Are
Needed to Strengthen the Nation's Posture, GAO-09-432T (Washington, DC:
Mar. 10, 2009).
---------------------------------------------------------------------------
Developing a comprehensive National strategy for addressing
global cybersecurity and governance. In July 2010, we reported
that the U.S. Government faced a number of challenges in
formulating and implementing a coherent approach to global
aspects of cyberspace, including, among other things, providing
top-level leadership and developing a comprehensive
strategy.\10\ Specifically, we found that the National
Cybersecurity Coordinator's authority and capacity to
effectively coordinate and forge a coherent National approach
to cybersecurity were still under development. In addition, the
U.S. Government had not documented a clear vision of how the
international efforts of Federal entities, taken together,
support overarching National goals. We recommended that, among
other things, the National Cybersecurity Coordinator develop
with other relevant entities a comprehensive U.S. global
cyberspace strategy. The coordinator and his staff concurred
with our recommendations and stated that actions had already
been initiated to address them.
---------------------------------------------------------------------------
\10\ GAO, Cyberspace: United States Faces Challenges in Addressing
Global Cybersecurity and Governance, GAO-10-606 (Washington, DC: July
2, 2010).
---------------------------------------------------------------------------
Finalizing cybersecurity guidelines and monitoring
compliance related to electricity grid modernization. In
January 2011, we reported on efforts by the National Institute
of Standards and Technology (NIST) to develop cybersecurity
guidelines and Federal Energy Regulatory Commission (FERC)
efforts to adopt and monitor cybersecurity standards related to
the electric industry's incorporation of IT systems to improve
reliability and efficiency--commonly referred to as the smart
grid.\11\ We determined that NIST had not addressed all key
elements of cybersecurity in its initial guidelines or
finalized plans for doing so. We also determined that FERC had
not developed an approach for monitoring industry compliance
with its initial set of voluntary standards. Further, we
identified six key challenges with respect to securing smart
grid systems, including a lack of security features being built
into certain smart grid systems and an ineffective mechanism
for sharing information on cybersecurity within the industry.
We recommended that NIST finalize its plans for updating its
cybersecurity guidelines to incorporate missing elements and
that FERC develop a coordinated approach to monitor voluntary
standards and address any gaps in compliance. Both agencies
agreed with these recommendations.
---------------------------------------------------------------------------
\11\ GAO, Electricity Grid Modernization: Progress Being Made on
Cybersecurity Guidelines, but Key Challenges Remain to be Addressed,
GAO-11-117 (Washington, DC: Jan. 12, 2011).
---------------------------------------------------------------------------
Creating a prioritized National and Federal cybersecurity
research and development (R&D) agenda. In June 2010, we
reported that while efforts to improve cybersecurity R&D were
under way by the White House's Office Science and Technology
Policy (OSTP) and other Federal entities, six major challenges
impeded these efforts.\12\ Among the most critical was the lack
of a prioritized National cybersecurity research and
development agenda. We found that despite its legal
responsibility and our past recommendations, a key OSTP
subcommittee had not created a prioritized National R&D agenda,
increasing the risk that research pursued by individual
organizations will not reflect National priorities. We
recommended that OSTP direct the subcommittee to take several
actions, including developing a National cybersecurity R&D
agenda. OSTP agreed with our recommendation and provided
details on planned actions.
---------------------------------------------------------------------------
\12\ GAO, Cybersecurity: Key Challenges Need to Be Addressed to
Improve Research and Development, GAO-10-466 (Washington, DC: June 3,
2010).
---------------------------------------------------------------------------
We are in the process of verifying actions taken to implement our
recommendations. In addition, we have on-going work related to cyber
CIP efforts in several other areas including: (1) Cybersecurity-related
standards used by critical infrastructure sectors, (2) Federal efforts
to recruit, retain, train, and develop cybersecurity professionals, and
(3) Federal efforts to address risks to the information technology
supply chain.
Federal Capacity to Protect Against Cyber Threats Needs to Improve
In addition to improving our National capability to address
cybersecurity, Executive branch agencies, in particular DHS, also need
to improve their capacity to protect against cyber threats by, among
other things, advancing cyber analysis and warning capabilities and
strengthening the effectiveness of the public-private sector
partnerships in securing cyber critical infrastructure.
Enhancing cyber analysis and warning capabilities. In July
2008, we reported that DHS's US-CERT had not fully addressed 15
key attributes of cyber analysis and warning capabilities.\13\
As a result, we recommended that the Department address
shortfalls associated with the 15 attributes in order to fully
establish a National cyber analysis and warning capability as
envisioned in the National strategy. DHS agreed in large part
with our recommendations and has reported that it is taking
steps to implement them. We are currently working with DHS
officials to determine the status of their efforts to address
these recommendations.
---------------------------------------------------------------------------
\13\ GAO, Cyber Analysis and Warning: DHS Faces Challenges in
Establishing a Comprehensive National Capability, GAO-08-588
(Washington, DC: Jul. 31, 2008).
---------------------------------------------------------------------------
Strengthening the public-private partnerships for securing
cyber critical infrastructure. In July 2010, we reported that
the expectations of private sector stakeholders were not being
met by their Federal partners in areas related to sharing
information about cyber-based threats to critical
infrastructure.\14\ Federal partners, such as DHS, were taking
steps that may address the key expectations of the private
sector, including developing new information-sharing
arrangements. We also reported that public sector stakeholders
believed that improvements could be made to the partnership,
including improving private sector sharing of sensitive
information. We recommended that the National Cybersecurity
Coordinator and DHS work with their Federal and private sector
partners to enhance information-sharing efforts, including
leveraging a central focal point for sharing information among
the private sector, civilian government, law enforcement, the
military, and the intelligence community. DHS officials stated
that they have made progress in addressing these
recommendations, and we will be determining the extent of that
progress as part of our audit follow-up efforts.
---------------------------------------------------------------------------
\14\ GAO, Critical Infrastructure Protection: Key Private and
Public Cyber Expectations Need to Be Consistently Addressed, GAO-10-628
(Washington, DC: July 15, 2010).
---------------------------------------------------------------------------
Federal Agencies Have Not Addressed Persistent Control Weaknesses or
Implemented Effective Information Security Programs
Federal systems continue to be afflicted by persistent information
security control weaknesses. Specifically, agencies did not
consistently implement effective controls to prevent, limit, and detect
unauthorized access or manage the configuration of network devices to
prevent unauthorized access and ensure system integrity. Most of the 24
major Federal agencies had information security weaknesses in five key
internal control categories,\15\ as illustrated in Figure 1. In
addition, GAO determined that serious and widespread information
security control deficiencies were a Government-wide material weakness
in internal control over financial reporting as part of its audit of
the fiscal year 2010 financial statements for the United States
Government.
---------------------------------------------------------------------------
\15\ The five internal controls are access controls, which ensure
that only authorized individuals can read, alter, or delete data;
configuration management controls, which provide assurance that only
authorized software programs are implemented; segregation of duties,
which reduces the risk that one individual can independently perform
inappropriate actions without detection; continuity of operations
planning, which provides for the prevention of significant disruptions
of computer-dependent operations; and an agency-wide information
security program (security management), which provides the framework
for ensuring that risks are understood and that effective controls are
selected and properly implemented.
[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
Over the past several years, we and inspectors general have made
hundreds of recommendations to agencies for actions necessary to
resolve prior significant control deficiencies and information security
program shortfalls. For example, we recommended that agencies correct
specific information security deficiencies related to user
identification and authentication, authorization, boundary protections,
cryptography, audit and monitoring, physical security, configuration
management, segregation of duties, and contingency planning. We have
also recommended that agencies fully implement comprehensive, agency-
wide information security programs by correcting weaknesses in risk
assessments, information security policies and procedures, security
planning, security training, system tests and evaluations, and remedial
actions. The effective implementation of these recommendations will
strengthen the security posture at these agencies. Agencies have
implemented or are in the process of implementing many of our
recommendations.
In addition, the White House, OMB, and selected Federal agencies
have undertaken Government-wide initiatives to enhance information
security at Federal agencies. For example, the Comprehensive National
Cybersecurity Initiative, a series of 12 projects, is aimed primarily
at improving DHS's and other Federal agencies' efforts to reduce
vulnerabilities, protect against intrusion attempts, and anticipate
future threats against Federal Executive branch information systems.
However, the projects face challenges in achieving their objectives
related to securing Federal information, including better defining
agency roles and responsibilities, establishing measures of
effectiveness, and establishing an appropriate level of transparency.
These challenges require sustained attention, which agencies have begun
to provide.
In summary, the threats to information systems are evolving and
growing, and systems supporting our Nation's critical infrastructure
and Federal systems are not sufficiently protected to consistently
thwart the threats. Administration and Executive branch agencies need
to take actions to improve our Nation's cybersecurity posture,
including implementing the actions recommended by the President's
cybersecurity policy review and enhancing cyber analysis and warning
capabilities. In addition, actions are needed to enhance security over
Federal systems and information, including fully developing and
effectively implementing agency-wide information security programs and
implementing open recommendations. Until these actions are taken, our
Nation's Federal and non-Federal cyber critical infrastructure will
remain vulnerable. Mr. Chairman, this completes my statement. I would
be happy to answer any questions you or other Members of the
subcommittee have at this time.
Mr. Lungren. Thank you very much. We will now start a round
of questioning, and I yield myself 5 minutes.
Mr. Reitinger, it is so easy to be a Monday morning
quarterback. As we look at what is happening in Japan, you see
the effects of one of the largest recorded, most powerful
earthquakes in history, a tsunami that, if you watch it via the
internet, if you watch it via YouTube, you see something that
is stronger than any words could present. Then you see the
resulting failure at the nuclear power plants. I wonder if
Japan, in analyzing threats, would ever have seen that triple
whammy scenario.
So I wonder what is it that you worry most about, Mr.
Reitinger? The only reason I ask you that is, I think we need
to do something to get a sense of urgency about this particular
subject matter, not only in the Congress, but in the public at
large. So what is the most serious threat that you see to our
critical infrastructure as a result of something that may visit
it by way of cybersecurity, or a lack of cybersecurity, an
invasion of our cyber system, penetration of our cyber system.
Mr. Reitinger. Thank you very much, Mr. Chairman.
I would like to take that in a slightly different
direction, if I might. The threats are very serious, but I
think it is somewhat difficult to say that this particular
vector of attack is greater than this particular vector.
Certainly I do worry very much about things like attacks on
control systems, where it is not just, well, we can't get
access to our data, but we can't have the power on; or it is
not just we can't get access to our data or somebody access to
our data, somebody may have filled with our data, not just
attacks on confidentiality, but integrity. So if someone got
access to a major medical database and changed the contents of
it, that could have significant consequences in terms of human
life for a large number of people.
But what concerns me the most is not any of those
particular things, it is what you started out your question
with. Was Japan fully prepared? As much as they prepared, were
they prepared? Are we now prepared for that type of cyber
attack and are we doing the things that we need to do now to be
ready when and if that sort of event takes place? We have done
considerable things to raise the priority of cybersecurity.
Just last year, the Ranking Member mentioned the first-ever
Quadrennial Homeland Security Review which identified
cybersecurity as one of the top mission areas for the entire
homeland security enterprise on a par with protecting our
borders and having domestic security and providing resilience
to disasters. On a par with those things, cybersecurity is just
as important. But are we, as a Nation, going to do the things
that we need to do to make sure that we have got the
capabilities and ability to respond across the public and
private sectors? Are we going to keep the focus and move
forward rather than waiting to respond when it is too late?
Mr. Lungren. Mr. Wilshusen, looking at your report and your
comments, your suggestion is we are not doing all that we need
to do. Can you outline, in your opinion, for instance, what is
hindering DHS's cybersecurity mission right now?
Mr. Wilshusen. Well, I think there are probably a couple of
issues. Just to echo what Mr. Reitinger mentioned, too, is that
preparation is key in order to address these threats because
often you may not know exactly what will happen, but you will
need to be able to respond to them and hopefully take
corrective action before the need occurs.
One of the things that DHS could do to help the private
sector and others to better protect their systems is to provide
clear, actionable, and alert threat information and share
techniques with the private sector to improve their security.
Mr. Lungren. Is that not being done, in your opinion, to
the extent necessary?
Mr. Wilshusen. Well, we recently completed a review in
which we asked private sector organizations what its key
expectations are of the private sector/public partnerships.
Over 98 percent of the respondents indicated that having
actionable and timely threat and alert information was
essential to a great or moderate extent, but only 27 percent
felt that they were actually receiving that type of information
to a great or moderate extent.
So clearly, one of the actions that DHS can do is to help
provide value-added services to its constituents and to the
private sector. It is attempting to and has taken actions to
help improve its cyber analysis and warning capabilities, but
as Mr. Reitinger mentioned in his opening remarks, more needs
to be done.
Mr. Lungren. My time is up.
The Ranking Member is recognized for 5 minutes.
Ms. Clarke. Mr. Reitinger and Mr. Wilshusen, DHS has many
detractors on any number of issues, but we want to make sure
that the right people are tasked with doing the job of
addressing cybersecurity to our critical infrastructure. The
other agencies in the Federal Government with considerable
cybersecurity expertise are the NSA and the DOD. Is DHS the
proper agency to lead Federal cybersecurity efforts? Is there
another Federal agency that should do this?
Mr. Reitinger. Thank you, ma'am. I think I will start, if
that is all right.
I think DHS absolutely is the right place to lead efforts
with regard to Federal civilian systems and the private sector.
I would like to respond in part of response to your question to
what Greg had indicated. There is a long way to go in terms of
being able to share the right information with the private
sector. We have made significant strides. If you just take the
last couple of years, at the start of fiscal year 2009, DHS and
the entire National Cybersecurity Division had, I think, 38
people at the start of the year. Over the last 2 years, we have
roughly tripled that, and then roughly doubled it in 2009 and
2010, so we are up to about 240 right now. In the President's
request in the fiscal year 2012 budget, we grow that to a
little more than 400 people.
So we are significantly expanding our people, and expanding
our people expands our capabilities. I think Greg would tell
you that we have done a lot.
We have had significant successes, for example, in terms of
sharing actionable information. We are in the course of a pilot
right now with the financial services sector where we share
information--and we partnered with DOD and the financial
services sector for this. We have shared literally hundreds of
pieces of actionable information with the financial services
sector, which has also shared hundreds of pieces of information
back to us. We then take that information, it comes back to us
in an itemized form, we can glean data from it and pass that
out. So we are moving forward on actionable activities that
actually add value.
There are lots of roles to play here. DOD has an essential
role to play protecting military systems and providing a core
and deep technical expertise in the National Security Agency
and Cyber Command on which all of us in appropriate cases rely.
We at DHS have our own expertise. For example, we have
deployed, in the much messier environment of the Federal
civilian infrastructure, EINSTEIN 2, which is a system designed
to detect attempts to break into Federal civilian systems. Just
last year, it detected over 5.4 million events. We have not
done that in a unitary network that is subject to command and
control, but in, so far, 15 of 19 different major Federal
agencies and at four internet service providers.
So we have developed the expertise on how to act in that
environment, move forward to protect security, and to protect
privacy at the same time.
Mr. Wilshusen. I would just like to add that DHS is
building out its capabilities to provide services to its
constituents. It has also received responsibility for providing
increased oversight and assistance to other Federal agencies in
implementing their information security programs and practices.
One of the issues confronting DHS, at least as we see it,
do they have the proper authorities to do that? There are
challenges associated with one agency providing oversight over
another agency. At present, under the Federal Information
Security Management Act, many of the authorities are granted to
the Office of Management and Budget. But last year, in July,
OMB assigned some of those responsibilities over to DHS, and
DHS is working to build out its capacity to perform those
services.
Certainly, as you mentioned before with DOD and NSA, they
have a high level of skill and capabilities in this area. To my
knowledge, they have been working with DHS to some extent in
transferring some of those skills and abilities as DHS builds
out its own capabilities.
Ms. Clarke. Just following up, Mr. Reitinger, on the
EINSTEIN issue, the National Cybersecurity Division is
currently planning to deploy five EINSTEIN monitors or five key
nodes in the dot-gov domain that will be used to prevent and
detect intrusions on computer systems. If the continuing
resolution is adopted by Congress and you don't receive your
requested funds for 2011, how would it affect this much-needed
project and the request for $226.6 million in the fiscal year
2012 budget?
Mr. Reitinger. Thank you, ma'am.
I think the proposal under H.R. 1 would cut roughly $60
million from the entire NPPD budget. It is actually a budget
cut not specifically to cyber, but more broadly to NPPD, but
there is no way in our budget to do that without a cut to
cyber. So a big chunk of those resources would, in fact, be
drawn from the resources we would use to deploy what you are
referring to, the EINSTEIN 3 system, and it would adversely
affect the time line for deployment of those sensors, yes,
ma'am, and our ability to provide advice and assistance to
agencies on the data that we receive.
Ms. Clarke. Thank you very much.
I yield back, Mr. Chairman.
Mr. Lungren. Mr. Reitinger, you are not here to testify as
to whether or not we should have another month in which we have
a $228 billion addition to the debt, are you? I didn't think
so.
Mr. Walberg is recognized for 5 minutes.
Mr. Walberg. Thank you, Mr. Chairman. Thanks to the panel
for being here talking about an area that is expanding my mind
daily, as I think about it--so far not causing me a lot of loss
of sleep because I know that there are people who are thinking
about it regularly, but I appreciate your testimony this
morning.
The question I would just begin with to each of you is a
short question with an answer that probably I would ask you to
consider answering in relationship to what you know today and
what you perceive today.
In which sector could a cyber attack do the most damage?
Mr. Reitinger. So, sir, I am somewhat hesitant simply
because it is hard to say that one sector grown large is
critical from top to bottom whereas another sector is not
critical from top to bottom. There are, however, critical
entities in many sectors, and some of the sectors we worry most
about are, for example, financial services and electric power,
primarily because those are sectors, along with information and
communications, where you notice adverse effects in
milliseconds--and I mean that, milliseconds--as opposed to
seconds, minutes, hours, or days.
Mr. Walberg. Thank you.
Mr. Wilshusen.
Mr. Wilshusen. I would agree with Mr. Reitinger's remarks,
particularly as it relates to the financial services and
electrical power sectors.
There was an incident a couple years ago at a power plant,
nuclear power plant in Alabama. Now this was an unintended
incident, it was not due to a cyber attack, but it does
represent and illustrate the impact that could occur from such
an attack. It was due to an equipment failure on a network that
was connected to one of the control systems. Through a series
of events that occurred as a result of that equipment failure,
the plant had to bring down its nuclear reactor for a time. Its
due to, in part, because of the interconnectivity of these
systems to control systems. So it can have a potentially
devastating effect.
Certainly on the financial services side, there have been
numerous reports where literally millions of dollars have been
lost and absconded with through cyber attacks.
Mr. Walberg. Thank you.
Mr. Reitinger, moving on from that--and I would suggest
that your answers coincided with my thoughts, as elementary as
they may be, in talking with energy providers and financial
institutions in the past several weeks, that just the effect of
a keystroke is amazing.
But let me ask you, Mr. Reitinger, are private sector
entities responsive to the efforts the Government makes with
them to warn of threats and mitigate the consequence of
attacks? What is the experience there?
Mr. Reitinger. I think, sir, you would find that the
experience in the private sector is similar to that in
Government agencies. There are a lot of entities who get it and
some who don't. The private sector has created wholly new
technical capabilities over the last 10 years and has itself
built new ways of working together and sharing information, not
only expanding their information sharing and analysis centers,
but creating other mechanisms to work together.
All that said, we are not yet where we need to be in terms
of broad awareness, but within the business community and among
individuals, in terms of what the threat is and what actions
they need to take. One of the things that we are trying very
much to do in the Department of Homeland Security is do less of
the talking to ourselves, and as we raise awareness, making
sure we are talking to the right people, talking not just to
CISs, chief information security officers or chief risk
management officers, but talking to chief financial officers
and chief operating officers, the people who cut the checks and
say this will affect your bottom line.
There is broad willingness and interest across the public
and private sectors to work together. There is still a long way
to go to have uniform action.
Mr. Walberg. Mr. Wilshusen, you mentioned that the
Government must improve the public-private partnership by
improving information sharing. What are some specific
recommendations you would have?
Mr. Wilshusen. Well, one is, as I mentioned before, for
DHS, in its role as a key focal point with dealing with the
private sector, is to provide actionable, timely notices of
either warnings, threat warnings, as well as alerts of specific
actions currently underway. That has been one of the key
services that the private sector organizations have indicated
that they expect to receive but have not yet fully received to
the levels of expectations. So that would be one area that DHS
could work on. Indeed, as Mr. Reitinger mentioned earlier, they
are taking steps to address those areas.
Mr. Walberg. I see my time is up. Thank you.
Mr. Lungren. The gentleman from Louisiana, Mr. Richmond, is
recognized for 5 minutes.
Mr. Richmond. Thank you, Mr. Chairman.
I guess my question is for whoever wants to answer. Part of
what at least I saw in the BP Horizon oil spill in Louisiana
was that as soon as it happened, there was a clear chain of
command and there was a set up protocol and people who took
over at certain points. Do we have, in the event of a cyber
attack, a clear chain of command with defined roles and
responsibilities within Government?
Mr. Reitinger. Sir, to be frank, I think we could use
further clarity. We have made significant strides in that
regard. Overall, cyber incidents are going to be incredibly
complex, and so it is hard to generalize. But it is clear that
the President is in charge overall, that with regard to
domestic response, the Secretary of Homeland Security, under
her Homeland Security Act and authorities under the various
Presidential directives, is responsible, and DOD is responsible
for National defense. We built the mechanisms to work
effectively together. We now have a National cyber incident
response plan that defines roles and responsibilities, and we
are going to continue to improve that as our experience
develops.
We have also established a mechanism so that two of the
largest players--DOD and DHS--can work effectively together,
notably signing a memorandum of agreement which was driven, I
will tell you, at the Secretarial level; so directly between
the Secretary of Homeland Security and the Secretary of Defense
to enable effective synchronization between DOD. So we have a
team of senior people, are deploying a team of senior people at
NSA and Cyber Command, and they are deploying two groups--one
from NSA and one from Cyber Command--to our cyber operation
center so they can effectively support us.
One of the things that we are doing in DHS is--and this is
not just about cyber, it is also about infrastructure
protection--is, as we develop capability, we are becoming an
operational entity. We think it is very important that we be
not about discussing, but about doing and enabling others to
do. So that is where our focus is.
Mr. Wilshusen. I would just add that one of the key aspects
to this that would also be helpful to have a straight line of
chain of command is for the administration and Federal agencies
to establish and update the National Policy for Securing
Cyberspace. This is a document that is many years old. It has
had a number of issues with it that have impeded its progress
in being able to be implemented. One thing that needs to be
developed is just a clear articulation of the objectives,
goals, and priorities for Federal agencies and the private
sector to implement security over cyberspace and the systems
that they operate.
Mr. Richmond. Thank you.
As I was talking to my community health centers yesterday,
we started talking about electronic health records and they
mentioned to me that there were 60 companies just in my area
that provided those services. Then I started thinking about
smart grids. Do we have an industry standard or is there a
published standard that these companies have to have in
relation to protecting their electronic health records? Or have
we set a baseline that they have to at least adhere to to make
sure that we protect people's privacy and we protect the risk
of an attack in that area?
Mr. Wilshusen. Well, the Department of Health and Human
Services, under HIPAA, issues a security rule that health care
providers are required to follow certain security and privacy
guidelines. So that is probably as close as anything that
exists to a standard, if you will, or guidelines and
requirements for protecting the confidentiality and integrity
of health information.
Mr. Richmond. But under HIPAA, have they--I hate to put it
this way, have they gotten to the level of sophistication to
address cybersecurity in terms of protecting those health
records? I know traditionally we just said don't leak people's
medical condition, don't publish it, you have to protect it and
put it in a safe place. But now when we start going to
electronic health records, the question is whether somebody has
put out the technical guidelines and the technical
responsibilities to make sure that at least those companies are
not easily hacked. That will be my question, and I yield back,
Mr. Chairman.
Mr. Wilshusen. Well, the security rule does provide some
guidelines, but probably not to the level that you are
referring to in terms of the very detailed technical standards
that may be required.
One of the issues that also comes up is in terms of data
interoperability between various different health organizations
and States to make sure that this health information is
actually interoperable among different States as they develop
their own individual standards. So that is another issue that
is attendant to the one you are asking about.
Mr. Lungren. The gentleman's time has expired.
Mr. Meehan is recognized for 5 minutes.
Mr. Meehan. Thank you, Mr. Chairman. Thank you to each of
our panelists for their very revealing testimony today.
Let me ask both of you, 15 million reports in the course of
a year, and yet we are trying to communicate with the private
sector simultaneously, particularly those with these control
systems. How do you triage to know what to communicate down the
line and say this is something we ought to be reaching out to
without becoming a point in time where you are--what is the old
adage--crying wolf and they don't know when to really be
alerted?
Mr. Reitinger. Sir, I would say you have to do a couple of
things. One, you broadly have to find the broader points of
influence. In a time that we all have those scarce resources,
what is the most effective way to institute protections to get
the private sector not only to understand the threat, but
implement the threat? So we focus very much on that.
You try to have broad campaigns. So one of the things that
we did this year for the first time as a response to the
President's Cyberspace Policy Review, instead of just having an
annual Cybersecurity Security Awareness Month, we have now got
an annual campaign, the ``Stop. Think. Connect.'' Campaign,
which we are advocating for. It was developed--not by DHS, but
actually by a partnership. That is something a partnership can
do; it is people in the private sector and the public sector
working together to come up with a message that we can all work
together to implement, something fairly actionable.
The last thing is that you do have to make choices, you do
have to triage. That is something we do generally in the space.
We have 5.4 million events. You can't look in detail at every
one of them. You have to figure out fairly rapidly, look for
indicators for what are the most severe? You try to expand our
capabilities.
One of the things we have done in DHS is established fly-
away teams. So we have a team of people that we can deploy if
there is a significant incident in at a private sector company
and they need our assistance.
In some sense it is because of the act, in some sense it is
because of a prioritization, that team is typically deployed
for control systems-type incidents because that is one of the
things that we worry about significantly. So there are a lot of
processes that one has to go through to try to figure out where
you are most effectively applying resources to the effect you
need.
Mr. Meehan. Do you agree with that sort of assessment?
Mr. Wilshusen. Yes, I would.
Mr. Meehan. The thing that really strikes me again is the
interoperability. We keep talking about these control systems
and the capacity to be able to impact entire areas which are
interdependent. How can we create the kind of requirement, so
to speak, from the private sector to collaborate with you to be
able to, as we say, meet some kind of National policy standards
or objectives so that we are working together? We have
effectively independent agencies that have oversight over
critical pieces of this infrastructure which are at risk.
Mr. Reitinger. So, sir--I feel like I keep jumping ahead of
Greg. Do you want to go first or I will?
I would say there are a number of things we need to do. We
at DHS are focused on executing within our existing authorities
to accomplish that mission. There are a number of things we can
do. We talked a lot about awareness, so raising awareness among
the companies is a key part of this. As Greg has indicated,
sharing classified and unclassified threat information so that
they are really sensitized to what the issues are.
Second, we can work on things like helping develop
standards and working with the private sector to make sure that
they have available solutions so that there is a known path to
better security.
Mr. Meehan. My time will run out, but are there minimal
standards right now that we have in the industry that we can
expect people to abide by so that at least there is some kind
of a baseline that we can expect collaboration that they will
address within their own institution so that they are capable
of communicating with you about these issues?
Mr. Reitinger. So there are many standards, sir, of
differing degrees or prescriptiveness, if you will, and
effectiveness. One of the things that I don't think we have
right now is what one might think of as a baseline ability to
say across all of the critical infrastructures we are meeting
the standard that we need. So one of the things that we are
doing is working with not only other agencies within the
Federal Government so that they are aware of what the
requirements are, but we have, in one case, DHS has specific
authority, and that is for the chemical facilities sector, or
the chemical sector where we have put in a risk-based
performance standard into the existing CFATS regime related to
cybersecurity. We will be continuing to look at that going
forward to make sure that it meets National requirements.
Mr. Wilshusen. If I may add, we have an on-going engagement
right now looking at what standards are in effect at various
different critical infrastructure sectors and to assess, to the
extent that those standards exist, whether they are voluntary;
and how those sectors either enforce or assure that their
members actually implement those standards. We expect to be
reporting out on that later this year.
Mr. Meehan. Thank you, Mr. Chairman.
Mr. Lungren. I will just tell the gentleman that we will
shortly schedule a markup on the CFATS bill so that we will
have that issue going forward.
I understand Mr. Keating has no questions at this time, so
Mr. McCaul is recognized for 5 minutes.
Mr. McCaul. Thank you, Mr. Chairman. Phil, it is good to
see you again. Thank you for your hard work on the CSIS
Commission. It is a great report, outstanding.
I mean, the threats are real, we all know what they are--
the power grids, financial sectors. You know, when I was
Ranking Member of this subcommittee two Congresses ago, we held
hearings and talked about what is the coordination between DHS?
DHS has a primary mission to defend. Are they talking to DOD or
NSA that has the offensive capability, not that one is charged
with defensive, are those coordinating as well?
I will say, I think, DHS has come a long way since those
hearings, and that is very good news. I noticed, Phil, in your
testimony you talked about an MOU that has been signed between
DHS and the DOD, and I was very glad to see that. Can you
explain how that is working? Also, do you anticipate doing
something similar with NSA?
Mr. Reitinger. Absolutely, sir. So I talked a little bit
about that before. We signed, at the Secretarial level, an MOA,
a memorandum of agreement--sorry, I fall back into acronyms too
much--between the Department of Defense and the Department
Homeland Security. There are two points of contact on that; one
is me, and the other is Dr. Jim Miller, who is the Principal
Under Secretary of Defense for Policy at DOD. Under that
agreement, DHS, so that we can stay fully synched with our
partners in the Department of Defense, has and is deploying a
team of people to Fort Meade that will be led by a DHS senior,
who is currently Rear Admiral Mike Brown, who has been in the
Department of Homeland Security on detail from DOD for a number
of years.
He will have a team of people that will comprise first a
joint coordination element to do joint planning at DOD, make
sure we can stay operationally synched, a group of people who
are going to work with NSA on its technology, and another group
of people who will be embedded in the NTOC at NSA so that we
have full assay of the NSA's knowledge of the threat.
NSA and Cyber Command are both deploying teams of people to
our Cyber Operation Center to support our domestic cyber
operations. So there will be a cryptologic support group from
NSA and a cyber support element--I am more comfortable with CSG
and CSE, but those are what they are called--from Cyber Command
that will directly support us. We are in the initial stages of
developing these capabilities, but it is already working very
well. I would also say that those are not the only means that
we have to coordinate. So we literally hold a weekly SVTC, a
secure video teleconference, with our partners in DOD to make
sure we are staying coordinated. We work with them at deputies
committee meetings and lots of other administrative policy and
other processes. So we have come a long way between these two
departments in our ability to support each other and our
respective mission spaces.
Mr. McCaul. That is certainly good news, and I do want to
commend you for that. Again, from two Congresses ago, that is
great progress, and I am very glad to hear that. They have the
assets, the expertise, and the capabilities, so it makes no
sense for them not to work with you and share that.
Private sector sharing threat information, it is always
difficult for the private sector to share that with the Federal
Government. The incentives are still lacking, I think, to some
extent. They have a duty to their shareholders, they don't want
to report this kind of stuff. How do you incentivize them to do
that? Would an exception to FOIA be helpful in terms of that
threat information not being subjected to a FOIA request?
Mr. Reitinger. With regard to at least some information
submitted under the Protected Critical Information
Infrastructure program, the PCII program, there is a FOIA
exception. The issue I think is a little broader, and that is
that there remains a lack of clarity about the costs and risks
of sharing information from the private sector to the
Government. So sometimes one has the problem that when the
private sector and Government want to talk--I think generally
if something is happening, the private sector will lean forward
to figure out a way to share information, as will the
Government. Because when you get operators talking with
operators, they have a problem to solve. If it is more on-
going, the problem is, nowadays, if you get together and you
want to work together, you want to share information, not just
to share information to solve a particular problem, sometimes
the first thing you have to do is call the lawyers into the
room. You and I, sir, are both lawyers, we love lawyers, but--
--
Mr. McCaul. I wouldn't necessarily say that.
Mr. Reitinger. So we have some internal processes going now
to try and generate some clarity with the private sector about
what the rules are so that you can have a more rapid and
effective conversation.
Mr. McCaul. Last, if I could indulge the Chair, the
National Policy for Cyberspace--it was mentioned earlier--sir,
the last one was developed in 2003, I think one of the
recommendations we had with the Commission was to develop a
National policy. That is within the jurisdiction and authority
of the White House. Can you demonstrate why that is so
important and so critical?
Mr. Reitinger. Well, I think having a National policy is
critical. I would personally favor, while I think we knew new
ways to do things, focusing very heavily on implementation. We
at DHS are working right now on the strategy which will
underlie the cybersecurity part of the Quadrennial Homeland
Security Review that the Ranking Member brought up. So for us
this is mission four or cybersecurity across the Homeland
Security enterprise. We are working now across Government and
with the private sector to develop that strategy that will roll
out to the broader National strategy.
Mr. McCaul. Thank you so much.
Mr. Lungren. I want to thank our panelists for not only
your oral testimony here today but your written testimony. You
have helped us considerably.
Mr. Reitinger, and also in classified briefings, I just
want to tell you that members of this panel very much
appreciated your participation and the participation of others,
and that has helped us a great deal.
I will be calling on both of you in the future to help us a
little bit more as we go forward on an issue that will not go
away and only needs greater clarity and greater visibility. So
we thank both of you.
Now, we would move to our second panel, and I know it will
take a little while for the three of them to get there.
We are very pleased to have our second panel. We have
outstanding panelists in both panels, and we very much
appreciate your time and your effort and the knowledge that you
are relaying to us here today.
Dr. Phyllis Schneck is the vice president and chief
technical officer of Global Public Sector for McAfee. She also
serves as a volunteer as chairman of the board of directors of
the National Cyber-Forensics & Training Alliance, which is an
important partnership between Government, law enforcement, and
the private sector for information analytics and has been used
to prosecute over 150 cyber criminals worldwide.
Earlier Dr. Schneck worked as vice president of Threat
Intelligence at McAfee and was responsible for the design and
application of McAfee's internet reputation intelligence. She
has Ph.D. in computer science from Georgia Tech where she
pioneered the field of information security and security-based
higher-performance computing.
Thank you for being here.
Dr. James Lewis is a senior fellow and program director at
CSIS where he writes on technology, National security, and the
international economy.
Before joining CSIS, he worked in the Federal Government as
a Foreign Service officer and as a member of the Senior
Executive Service. Most recently he was the project director of
CSIS's Commission on Cyber Security for the 44th Presidency.
That report has been downloaded, I understand, more than 40,000
times, so no secrets there. He received his Ph.D. from the
University of Chicago in 1984.
Mischel Kwon is an IT executive with more than 29 years of
experience ranging from application, design, and development to
building organizational and National level computer emergency
instant response and readiness teams. She is most recently the
vice president of Public Sector Security for RSA, the security
division of the EMC Corporation, and prior to that, she was the
director of the United States Computer Emergency Readiness
Team, US-CERT, at DHS.
We welcome all of our witnesses. We are pleased that you
are able to share your perspective with us. As I said, your
written testimony will be made part of the record. We would
like to recognize each of you in order for 5 minutes, and I
know that is a short period of time, but we will try and stay
with that as much as possible and then ask you questions.
So, first of all, Dr. Schneck.
STATEMENTS OF PHYLLIS SCHNECK, VICE PRESIDENT AND CHIEF
TECHNICAL OFFICER, MC AFEE INC.
Ms. Schneck. Good morning.
Chairman Lungren, Ranking Member Clarke, and other
distinguished Members of the subcommittee, thank you for
requesting McAfee's views on cyber threat to critical
infrastructure and the American economy. It is an honor and a
pleasure to be part of the process and to be here today.
Your committee is playing a vital role in helping to define
the contours of cybersecurity debate, and your aim to write
thoughtful and incentives-based legislation must be commended.
As you mentioned, I focused my entire career on
cybersecurity, looking at both the technology and the
applications and certainly the trust engaged in public-private
partnership and the need for more information sharing.
McAfee is the largest dedicated cybersecurity company in
the world, and we are also a wholly-owned subsidy of the Intel
Corporation. We protect the cyber spectrum, from the biggest
computers and the big cloud computing, as we all refer, to the
smallest components, even down to our cell phones or airplane
avionics systems and our cars and certainly now to the chip.
My testimony will focus on the following key areas: The
evolution of the cyber threat landscape; McAfee's Global Threat
Intelligence Solution; and the paradigm change that we need to
make in order to protect our cyber infrastructures and thus our
global critical infrastructures; two major cyber security
events, advanced persistent threats that we have seen, these
are just two of many, many, just two that have been vocalized;
and certainly some policy recommendations to improve public-
private sector information sharing.
Our adversary is strong. Our adversary is smart. They act
faster than we do. They have full funding, in many cases, from
governments, from nation states. They have malicious intent,
and they don't have the intellectual property barriers that we
do. They don't have the legal barriers that we do to execute.
They are criminals; there is nothing to lose.
So when you look at the landscape from 20 years ago and you
look at ``antivirus,'' all of the adversary's ability over the
past 2 decades, all of the damage we have talked about this
morning, has been enabled by malicious code, the ability of an
adversary to execute their will somewhere else, and whether it
causes, as in the old days, just something to prove that
somebody can do something all the way to financial organized
crime with a financial motivation, and now, as we are seeing,
government-structured or nation-state attacks that look for
destruction and/or the taking of intellectual property.
As we look at how we fight that, a signature will not beat
this adversary. Signature was a legacy model. We should know
about the attack. We will protect everybody, and boom, they are
fine when they get it, sort of like a vaccination.
That doesn't work anymore. We need a full paradigm shift to
retake the global cybersecurity picture that we have as a
private industry and Government and infuse that into our
network fabric, again from cloud to chip, where the enemy's
will is blocked before it reaches a target.
When you think about global threat intelligence and what we
mean by that, McAfee and other companies in the IT
infrastructure and other infrastructures have the ability and
have developed very sophisticated information-gathering
capabilities where we have a weather map, a cyber weather map
of events that happen all over the world, an understanding of
traffic volumes, an understanding of what machines are doing,
what harm and to where, where they are targeting, where
malicious code that looks just like other malicious code is
being sent.
We have to react in two ways: We have to react first and
foremost to beat this adversary in milliseconds. The one thing
this enemy can't do is understand how the entire system works
and block it in real time, so the disease never reaches your
body or your body can fight the disease in real time without
understanding the name of the germ first.
The second thing we have to do is better enable ourselves
to share information at the human level. While that is not real
time, it helps us understand the motivation, understand future
targets and, first and foremost, protect ourselves.
We looked at two major threats over the past couple of
years and led the investigations at McAfee. There are many
others like this, but first one was Operation Aurora, same name
as the diesel generator explosion at INL; however, we kept the
name for this one. That is the name the bad guys gave it. It is
in the file path.
This was the most sophisticated event we have ever seen
targeted toward the private sector. They usually save this for
our friends in Government. We estimate it took teams of people
many weeks to target the 20 or so companies they looked for,
the information they wanted to get, and, most powerfully, the
people in those companies that had an access to code stores of
that size, meaning the people that tested the code, the people
that have to see all of it working together.
They exfiltrated or took the copies of the code out to
servers placed in different countries, and they are using that
likely today. Many attacks exist that look just like this
today. They lurk; they are often called advance persistent
threat.
The other one we recently discovered and investigated was
called Night Dragon, similar set up but less sophisticated,
again one of many. But they were looking specifically at
architectural plans for pipelines in the oil and gas sector,
and this one was around the world.
Leading to the policy recommendations, the private sector
needs some stronger protections to share information with
Government and law enforcement. It was said in the earlier
panel, in the middle of the crisis, the operators will talk,
and they do. But we need to be better protected.
We and other companies put little pieces of the puzzle
together, and we get a very big picture, and we want to share
that with our colleagues in Government and in law enforcement.
We want to do that faster. We can't. It creates in many
cases material information that affects shareholders,
companies' bottom lines, and it can breach trust. We need much
stronger protection, so that when someone in law enforcement,
as they did, called me up and says, why didn't I have this
yesterday when you knew it, my answer doesn't have to be,
because I could get fired.
We have to beat this adversary, and we have to--we all of
the--we have a lot of the information we need among the private
sector to use the great collaborative organizations that DHS
and the FBI and others have created for us with the private
sector. Great construct exists. If we can put more information
into those, we can use those constructs to their fullest
potential.
So, in conclusion, I do want to thank you very much for
having us today, for being a part of the process. McAfee is
very committed to working with the U.S. Government to solve the
cybersecurity challenges and to beat this adversary.
[The statement of Ms. Schneck follows:]
Prepared Statement of Phyllis Schneck
March 16, 2011
Chairman Lungren, Ranking Member Clarke, and other distinguished
Members of the subcommittee, thank you for requesting McAfee's views on
the cyber threat to critical infrastructure and the American economy.
Your committee is playing a vital role in helping to define the
contours of the cyber security debate, and your aim to write
thoughtful, incentives-based legislation must be commended.
My name is Phyllis Schneck and I have dedicated my entire
professional career to the security and infrastructure protection
community. My technical background is in high performance computing and
cryptography. In addition to serving as Vice President and Chief
Technology Officer, Global Public Sector, for McAfee, I serve as
Chairman of the Board of Directors of the National Cyber Forensics and
Training Alliance, a partnership between Government, law enforcement,
and the private sector for information analytics that has been used to
prosecute over 150 cyber criminals world-wide. Earlier, I worked as
Vice President of Threat Intelligence at McAfee and was responsible for
the design and application of McAfee'sTM internet reputation
intelligence. I have also served as a commissioner and working group
co-chair on the public-private partnership for the CSIS Commission to
Advise the 44th President on Cyber Security.
Additionally, I served for 8 years as chairman of the National
Board of Directors of the FBI's InfraGardTM program and as
founding president of InfraGard Atlanta, growing the InfraGard program
from 2,000 to over 33,000 members Nation-wide. Before joining McAfee, I
was Vice President of Research Integration at Secure Computing. I hold
a Ph.D. in Computer Science from Georgia Tech, where I pioneered the
field of information security and security-based high-performance
computing.
My testimony will focus on the following key areas:
The evolution of the cyber security threat landscape;
McAfee's Global Threat Intelligence Solution and the role it
plays in enabling us to detect and remediate a wide range of
cyber security attacks on our Nation's critical
infrastructures;
Two major cyber security attacks, Night Dragon and Operation
Aurora, and their implications for our homeland security; and
Policy recommendations to improve public/private sector
information sharing that is essential to give the Government
the capabilities it needs to respond to the modern
cybersecurity challenge.
First I would like to provide a little background on McAfee and
some of our cybersecurity initiatives.
mc afee's role in cyber security
McAfee, Inc. protects businesses, consumers, and the public sector
from cyber attacks, viruses, and a wide range of on-line security
threats. Headquartered in Santa Clara, California, and Plano, Texas,
McAfee is the world's largest dedicated security technology company and
is a proven force in combating the world's toughest security
challenges. McAfee is a wholly owned subsidiary of Intel Corporation.
McAfee delivers proactive and proven solutions, services, and
global threat intelligence that help secure systems and networks around
the world, allowing users to safely connect to the internet and browse
and shop the web more securely. Fueled by an award-winning research
team, McAfee creates innovative products that empower home users,
businesses, the public sector and service providers by enabling them to
prove compliance with regulations, protect data, prevent disruptions,
identify vulnerabilities, and continuously monitor and improve their
security.
To help organizations take full advantage of their security
infrastructure, McAfee launched the Security Innovation Alliance, which
allows organizations to benefit from the most innovative security
technologies from thousands of developers who can now snap into our
extensible management platform. Today, more than 100 technology
partners--large and small businesses all committed to continuous
innovation in security--have joined the alliance, with more to be
announced soon.
Two years ago, McAfee announced an initiative to fight cybercrime,
a wide-ranging initiative aimed at closing critical gaps in assisting
victims of cybercrime and preventing new events. The initiative is
anchored by a multi-point plan that includes calls for action from law
enforcement, academia, service providers, Government, the security
industry and society at large to deliver more effective investigations
and prosecutions of cybercrime.
Key elements of the plan include:
Education and Awareness.--McAfee works to ensure that
officials around the world have the capacity to properly fight
cybercrime, while helping users build ``street smarts'' so that
they don't become easy victims.
Legal Frameworks and Law Enforcement.--McAfee works to
facilitate international collaboration and mutual assistance on
cybercrime among governments, industry, and non-governmental
organizations (NGOs).
Innovation.--McAfee works with the technology industry to
provide technology solutions that stay one step ahead of the
threats.
McAfee is also supportive of the National Strategy for Trusted
Identities in Cyberspace (NSTIC), working with our partners in
Government and industry to enable innovation for more efficient
authentication and other technologies facilitating a safer and more
pleasant experience for electronic transactions.
McAfee is committed to bringing the best security products and
services to the market, partnering with leading IT vendors to ensure
that customers have the ability to pick and choose the best solutions
to close their security gaps, and giving consumers and organizations
additional resources and support to fight cyber-crime ranging from
organized financial crime to attacks that user the cyber infrastructure
to gain access to intellectual property or physical infrastructure.
Likewise, McAfee is committed to taking part in a constructive dialogue
with policy makers on cyber security initiatives, as we are pleased to
do in this hearing today.
the evolution of the cyber security threat landscape
For purposes of this testimony, we define malware as a set of
instructions for a computer that causes the computer to behave in the
will of the malware owner, such as providing unauthorized access to
information or systems that control physical/kinetic infrastructure.
Computers execute instructions. Malware puts the enemy's instruction
next on the list, and then the adversary controls all actions forward,
sometimes hiding its presence. Malware enters a machine from a variety
of ports, typically email, web, or connection-level access that is
unprotected or ill advised to admit these harmful instructions. Malware
can also be referred to commonly as a ``virus.'' As in biology, when a
machine has a virus it is compromised and its functions can cause harm.
Historically, security software relied on antivirus ``signatures''
to recognize and block malware. Once a virus was detected, a signature
was developed by the security software vendor and deployed in the form
of a DAT file downloaded to the security software on customers'
computers. That software would then be in a position to recognize and
block the malware--an approach much like a vaccine that requires
advance knowledge of the threat. However, this approach is not
sufficiently fast to fight today's cyber adversary, and that is why
McAfee is changing the paradigm to proactive defence in real-time: to
make our networks sufficiently intelligent to prevent malicious
instructions from reaching the target--instead of requiring that the
target be vaccinated with a signature.
Today, malware developers combine web, host, and network
vulnerabilities with spam, rootkits, spyware, worms, and other means of
attack. Significantly, malware is often distributed with micro-
variations (polymorphism), or the ability to change quickly, with the
effect that a signature developed when the malware is first discovered
is ineffective against the multiple, very slightly different forms of
the same malware. This is analogous to a disease mutating so that the
vaccine is no longer effective. Malware may be distributed indirectly
by networks of computers that have been corrupted by a criminal (a
``botnet'').
Criminals, terrorists, and nation states often invest great efforts
to deploy their software in hundreds of thousands or indeed millions of
computers owned by innocent third parties, in order then remotely to
command their botnet to launch an attack on a particular set of
targets. The malicious software distributed by botnets will often
actively evolve to become whatever is needed by its controller and is
not limited by the boundaries of antivirus labels. This means that code
that appears otherwise harmless in order to be let into the network can
be told to spread rapidly. This is why we refer to this type of code as
a worm. It means, for example, that malware originally configured to
generate spam messages can be instructed to steal banking information.
Again, cyber actions rely on the execution of instructions, and a
compromised machine often follows the adversary's instructions to reach
out to a server in another location for its next set of instructions,
which can vary widely.
By leveraging multiple threat vectors and ``one-time usage,''
hackers are able to extend the time period in which their malware
remains undetected and are thus able to steal the money, personal data,
and other valuable information of users throughout the United States
and the world. In this way, what might be called classic ``viruses''
have been blended in recent years with other types of malware and
techniques used by malicious hackers intent on stealing personal data.
Hackers have discovered that direct external attacks are unnecessary
and risky. It is now easier to engineer malicious software that is
delivered to a system remotely through various means.
Modern malware thus can no longer be classified by its perceived
purpose or propagation method, because those change in an instant. Some
types of software can be engineered to gain access to and maintain
control over the victim's machine. Once the malware is on the system,
it seeks to communicate with its controlling entity--the criminal
actor. Once communication is established over the internet, any
compromised machine can be instructed both to pass over any data of
value to the criminal and to act as an instrument of attack against
other computers and networks.
mc afee global threat intelligence
McAfee and other sophisticated cyber security providers have
developed multi-vector, real-time, predictive protection against these
more sophisticated attacks on information systems. McAfee's solution is
known as Global Threat Intelligence, or GTI. Cybersecurity solutions
based on this GTI approach protect the customer's computer by
calculating the potential risk of a piece of content based on
experience with the IP address from which it originates, the website,
or other elements associated with the content in question.
Thus cybersecurity providers offer solutions enabling the customer
to stop content that is analyzed as having a risk probability score
that in the customer's view is ``too risky'' to be loaded into the
memory of the customer's computer. McAfee GTI tracks the anomalous
behavior and proactively adjusts an entity's reputation--its website,
IP address, domain, file, network connection, and so forth--so that
McAfee products can block the threat and protect customers. Then McAfee
GTI looks out across its broad network of sensors and connects the dots
between the website and associated malware, email messages, IP
addresses, and other associations, adjusting the reputation of each
related entity so that McAfee's security products--from endpoint to
network to gateway--can protect users from cyber threats at every
angle.
McAfee GTI offers the most comprehensive threat intelligence in the
market. With visibility across all threat vectors--file, web, message,
and network--and a view into the latest vulnerabilities across the IT
industry, McAfee correlates real-world data collected from millions of
sensors around the globe and delivers real-time, and often predictive,
protection via its security products.
Our cyber enemies are smart and fast. They maintain their knowledge
of networks and techniques by freely sharing information, enjoying a
lack of legal or intellectual property barriers that often block the
defenders. The adversary is well-funded, often by governments, and has
no barrier to swift execution. This is why our cyber infrastructures
have become their play land. The ability to see a global cyber picture
and to have situational awareness is what the adversary cannot do. This
is where we can win--by making the network fabric reject malicious
instructions in real-time, at the speed of light, before they can hit a
target. This is how we can be faster than the adversary, and this is
the paradigm shift from vaccines to a cyber immune system that enhances
cross-sector cyber resiliency.
Our Global Threat Intelligence service as well as a number of our
other products and services helped us first detect and then remediate
two important global cyber security attacks--Night Dragon and Operation
Aurora. These attacks are significant because they were managed by
coordinated and organized teams that succeeded in extracting billions
of dollars of intellectual property from leading American companies in
the information technology, defense, and energy sectors--strategic
industries vital to the country's long-term economic success and
National security.
operation aurora
On January 14, 2010 McAfee Labs identified a zero-day (previously
publicly unknown) vulnerability in Microsoft Internet Explorer that was
used as an entry point for Operation Aurora to exploit Google and at
least 20 other companies. Microsoft has since issued a security
bulletin and patch.
Operation Aurora was a coordinated attack that included a piece of
computer code that exploits the Microsoft Internet Explorer
vulnerability to gain access to computer systems. This exploit is then
extended to download and activate malware within the systems. The
attack, which was initiated surreptitiously when targeted users
accessed a malicious web page (likely because they believed it to be
reputable), ultimately connected those computer systems to a remote
server. That connection was used to steal company intellectual property
and, according to Google, additionally gain access to user accounts.
We also discovered that intruders used a social engineering
message, known as spear-phishing, to target employees with a high level
of access in these companies (either software developers, quality
assurance engineers, or domain administrators). The message would come
from a previous acquaintance of the targeted user and would ask them to
click on a web link pointing to a web server in Taiwan. As we uncovered
and then reported to Microsoft, the web link hosted an obfuscated and
encoded exploit for a zero-day vulnerability in Internet Explorer.
If a user had clicked on a link with Internet Explorer version 6,
their machine would be automatically compromised and malicious code
would be downloaded and executed stealthily on the computer. The Trojan
would establish an evasive backdoor command and control channel to the
same server in Taiwan through which live attackers would jump onto the
system and proceed to escalate their privileges on the local machine as
well as other servers within the network. As they moved rapidly through
the network, they would identify and compromise repositories of
intellectual property and exfiltrated data of interest out of the
company. In many cases, this data included source code--the crown
jewels of these information technology companies--which then could be
used by attackers to discover new vulnerabilities in software that is
used by the critical infrastructure industry, Government agencies, and
many other organizations across the globe.
McAfee is continuing to work with multiple organizations that were
impacted by this attack, as well as with various Government agencies,
to address this major supply chain attack in the U.S. commercial
sector.
night dragon
McAfee has identified a string of attacks designed to steal
sensitive data from targeted organizations. Unlike opportunistic
attacks, the perpetrators appear to be highly organized, premeditative,
and motivated in their pursuits.
Night Dragon attacks are similar to Operation Aurora and other
advanced persistent threats, or APTs, in that they employ a combination
of social engineering and well-coordinated, targeted cyber attacks
using remote control software and other malware. McAfee has linked
these attacks to intrusions starting in November 2009, and there is
circumstantial evidence suggesting they may have begun as early as
2007. Currently, new Night Dragon victims are being identified almost
weekly.
Night Dragon attacks leverage coordinated, covert, and targeted
cyber attacks involving social engineering, spear-phishing,
vulnerability exploits in the Windows operating system, Active
Directory compromises, and remote administration tools, or RATs. The
attack sequence is as follows:
Public-facing web servers are compromised via SQL injection;
malware and RATs are installed.
The compromised web servers are used to stage attacks on
internal targets.
Spear-phishing email attacks on mobile, VPN-connected
workers are used to gain additional internal access.
Attackers use password-stealing tools to access other
systems--installing RATs and malware as they go.
Systems belonging to executives are targeted for emails and
files, which are captured and extracted by the attackers.
McAfee has evidence of Night Dragon malware infections in the
Americas, Europe, and Asia. McAfee has also identified tactics,
techniques, and procedures (TTPs) utilized during these continuing
attacks that point to individuals in China as the primary source. The
Night Dragon attackers are currently targeting global oil, energy, and
petrochemical companies with the apparent intent of stealing sensitive
information such as operational details, exploration research, and
financial data related to new oil and gas field bid negotiations. As we
saw with the WikiLeaks document disclosures brought about by a
malicious insider, sensitive data theft can be highly damaging beyond
regulatory penalties and lost revenue. And unlike Stuxnet, the tools
and techniques behind Night Dragon are not specific to critical
infrastructure and can be used to launch attacks against any industry.
policy recommendations
Officials have made tremendous progress in the creation of
information-sharing constructs comprising multiple agencies and the
private sector. With good information, the collaboration enabled by
these constructs will help us to achieve what the enemy already has:
Speed and alacrity of information sharing and acting on it for high
impact.
In many cases, private sector companies can solve a cybersecurity
puzzle by evaluating many disparate clues. Private companies need
protected ways to share their big-picture research findings with the
Government without loss of trust or creation of material events for
stockholders, so that the most significant cybersecurity information is
expeditiously actionable. This is the human component of what Global
Threat Intelligence does at machine speed. We need both in order to
defeat cyber adversaries, whose aim is to harm our way of life.
Existing public/private partnerships should ensure that senior
corporate and Government officials are positioned to share vital
information and best practices. Among other things, this means access
to sensitive (or classified) information and a secure mechanism for
sharing it.
Broad-based situational awareness is vital to securing our global
cyber systems and ensuring our National security. Policies that enable
companies and governments to work together, using global threat
intelligence (e.g., combining cyber, energy, finance, and other data)
to enhance correlation and predictive capabilities, are critical to
real-time responsiveness within the network switching/routing fabric.
The Lieberman-Collins-Carper bill supports such information sharing by
requiring the Government to share information, including threat
analysis and warning information, with owners and operators regarding
risks to their networks. Legislation developed in the House of
Representatives would benefit from similar language.
conclusion
The cybersecurity challenge faced by our country is a serious
matter that requires an evolution in the way in which both the public
and private sectors collaborate. Each sector has its own set of core
capabilities; only the Government can implement the complex set of
organizational and policy responses necessary to counter the growing
cybersecurity threat. Leading information technology companies and
their customers are uniquely positioned to act as early warning systems
that can identify and help address cybersecurity attacks as a real-time
cyber immune system.
With the right industry-Government collaboration, networks of the
future can comprise intelligence and create resiliency by instantly
rejecting harmful code in milliseconds as opposed to the hours it
traditionally takes to make a signature, just as our bodies reject
viruses even though we may not know the name of the particular disease.
Information technology companies focused on cybersecurity in particular
have the resources and the economic incentives to continue to invent
and develop the technologies and solutions needed to stay ahead of
sophisticated cyber attackers. In the best American tradition of
collaboration, the public and private sectors have made important
strides to address the cybersecurity challenge and to enhance trusted
working relationships. As we work together to further evolve our
collaboration models, we can succeed in protecting our homeland from
the threat of cyber attacks.
Thank you for asking me to take part in this hearing on behalf of
McAfee. I would be happy to answer your questions.
Mr. Lungren. Thank you very much.
Mr. Lewis.
STATEMENT OF JAMES A. LEWIS, DIRECTOR AND SENIOR FELLOW,
TECHNOLOGY AND PUBLIC POLICY PROGRAM, CENTER FOR STRATEGIC AND
INTERNATIONAL STUDIES
Mr. Lewis. Thank you very much, Mr. Chairman, and thanks to
Ranking Member Clarke and, of course, hello to Congressman
McCaul, who was invaluable as the cochair in leading the CSIS
commission. So one of the reasons it has been downloaded so
many times is due to him.
This will be a good year for cyber security because of the
work of this committee and others. With luck, I think in this
Congress, we will see real progress in making our Nation more
secure.
But this outcome is not guaranteed. We have been trying for
years to secure our networks, and we have not succeeded, right.
So you have heard the litany of problems, major
corporations, banks, Government agencies; they have all been
victims. We have lost sensitive military information, oil
exploration data, valuable commercial technologies and millions
of dollars from banks.
The interesting thing about these crimes is that they are
risk-free. No one has ever been punished for them, and so, of
course, when you have a crime and no one gets punished, they
are just going to do it again, right.
What we are doing now to secure cyberspace is not working.
There has been real progress at some agencies, like DHS, but we
need to rethink our approach. To put this in perspective, think
about the threats we face. First, a few advanced militaries
have the ability to use cyber attacks to disrupt critical
infrastructure and service. They have done the reconnaissance
on critical infrastructure. They have planned how to do this.
They will not launch a cyber attack because they are not
going to start a war for no reason with the United States; they
are deterred by our military. But if they ever did attack us,
we are prepared to defend ourselves.
Terrorists do not yet have the capability to launch cyber
attacks, but groups like al-Qaeda in the Arabian Peninsula are
seeking to acquire these capabilities. Perhaps more worrisome,
Iran and North Korea are developing cyber attack capabilities.
When these terrorist and rogue states can launch a cyber
attack, they, too, will find that we are unprepared.
Cyber espionage and cyber crime are daily occurrences in
the United States, and they do long-term damage to our economy
and to our global competitiveness. They also help set the stage
for cyber attack. Some of our opponents use cyber criminals as
mercenaries, as proxy forces. Our most advanced opponents in
cyber crime and cyber espionage can overpower even the most
technologically sophisticated U.S. company, and we have seen
many examples of that.
Agencies have made strenuous efforts, but we are not yet
prepared to defend ourselves. There are three key issues that I
call to the committee's attention, how to give Government a
leading role in cybersecurity, how to ensure cybersecurity at
critical infrastructure, something we cannot do now, and how to
create international rules to reduce the risk of cyber crime
and the risk of cyber war?
These are all hard problems, but they are not impossible.
CSIS' Cyber-Security Commission, which Congressman McCaul
helped lead, has released two reports with recommendations. Our
fundamental point, and this gets to the question about the 2003
National strategy, our fundamental point is that the old
approach doesn't work, and we need a new strategy that uses all
the tools of American power, military, law enforcement,
Homeland Security, partnership with the private sector. If we
can come up with this new combined strategy, we will be able to
do something effective to protect ourselves, but we are not
there yet by any stretch of the imagination.
With this, I thank the committee and look forward to your
questions.
[The statement of Mr. Lewis follows:]
Prepared Statement of James A. Lewis
March 16, 2010
Chairman Lungren, Ranking Member Clarke, and Members of the
committee. Let me begin by thanking you for this opportunity to testify
on this important subject.
Cybersecurity first came to the attention of the public in the mid-
1990s, some 15 years ago. The first major policy for cybersecurity,
Presidential Decision Directive 63, appeared in 1998.
In the intervening years, there has been much discussion and a few
new ideas. We can get a sense of the state of cybersecurity and whether
there has been any progress the United States by reviewing major
cybersecurity events that have occurred since the start of 2010.
January 2010.--Google announced that an attack had
penetrated its networks, along with the networks of more than
80 other U.S. high-tech companies. The goal of the
penetrations, which Google ascribed to China, were to collect
technology, gain access to activist Gmail accounts and to
Google's password management system.
January 2010.--Intel Corporation also disclosed that it has
experienced a harmful cyber attack at the same time.
January 2010.--Global financial services firm Morgan Stanley
experienced a ``very sensitive'' break-in to its network by the
same hackers who attacked Google, according to leaked e-mails.
March 2010.--NATO and the European Union warned that the
number of successful cyber attacks against their networks have
increased significantly over the past 12 months.
March 2010.--Australian authorities say there were more than
200 attempts to hack into the networks of the legal defense
team for executives from Australian energy company Rio Tinto,
to gain inside information on the trial defense strategy.
April 2010.--Hackers break into classified systems at the
Indian Defence Ministry and Indian embassies around the world,
gaining access to Indian defense and armament planning.
May 2010.--A leaked memo from the Canadian Security and
Intelligence Service (CSIS) says, ``Compromises of computer and
combinations networks of the Government of Canada, Canadian
universities, private companies and individual customer
networks have increased substantially . . . In addition to
being virtually unattributable, these remotely operated attacks
offer a productive, secure, and low-risk means to conduct
espionage.''
October 2010.--Stuxnet, a complex piece of malware designed
to interfere with Siemens Industrial Control Systems discovered
in Iran, Indonesia, and elsewhere, results in significant
physical damage to the Iranian nuclear program.
October 2010.--The Wall Street Journal reports that hackers
using ``Zeus'' malware, available in cybercrime black markets
for about $1,200, were able to steal over $12 million from five
banks in the United States and United Kingdom.
December 2010.--British Foreign Minister William Hague
reported (in February 2011) attacks by a foreign power on the
U.K. Foreign Ministry, a defence contractor and ``other British
interests.'' The attack succeeded by pretending to come from
the White House.
January 2011.--The Canadian government reports a major cyber
intrusion involving the Defence Research and Development
Canada, a research agency for the Department of National
Defence, the Department of Finance, and the Treasury Board,
Canada's main economic agencies. The intrusions forced the
Finance Department and the Treasury Board, to disconnect from
the internet.
March 2011.--Hackers penetrate French government computer
networks in search of sensitive information on upcoming G-20
meetings.
March 2011.--The Republic of Korea said that foreign hackers
penetrated its defense networks in an attempt to steal
information on the U.S.-made Global Hawk unmanned aircraft,
provided to Korea as it considers whether to buy the UAV.
Major corporations, financial firms, Government agencies, and
allies have all been victims, and these are just the events we know
about. There are of course many more incidents stretching back into the
1990s, that include the loss of tens of thousands of pages of sensitive
military information, market and exploration data worth millions from
oil companies, the loss of valuable commercial technologies, and
hundreds of millions of dollars from banks and other financial
institutions. Classified military networks have been penetrated by
foreign intelligence agencies. Best of all, from the perpetrators'
perspective, no one has ever been punished for any of these actions.
This is not a record of success. Whatever we are doing is not
working. Since 1998, we have repeatedly tried a combination of
information sharing, market-based approaches, public/private
partnership and self-regulation in a vain effort to strengthen our
cyber defenses. However, despite this dispiriting record of opponent
success, I feel confident in predicting that this year, the old, failed
formulas will be trotted out again this year. Many of the reports and
essays we see emerging now will advocate tired ideas in order to block
change rather than increase cybersecurity. While individual Government
agencies have made strenuous efforts to improve our cyber defenses, as
a Nation, despite all the talk, we are still not serious about
cybersecurity.
This is due to a reluctance to make the changes cybersecurity
requires. People still advocate strategies and policies that appeared
more than a decade ago and which have not worked. We have consistently
underestimated the risks and damage from weak cybersecurity. Everyone
is for better security, but there has always been some other objective
that seemed more important.
Cybersecurity is another of those situations in American history,
ranging from Pearl Harbor to 9/11, where we knew there was risk and
that we were unprepared, but assumed it would never happen because
America is too powerful or too big to attack.
Nothing has yet punctured this misplaced sense of invulnerability.
America is still powerful, and it is easy to say that the sky is not
falling and there is no need for haste. The effect of this over
confidence is to make tolerable the slow erosion of our National power
due to feeble cybersecurity. Some call it the ``death of a thousand
cuts,'' where each tiny cut goes unnoticed by the victim. There are
warning signs that even a Nation as rich and as powerful as the United
States is at risk. The challenges to our financial system and the loss
of manufacturing and innovative capabilities are subjects for another
hearing, but weak cybersecurity exacerbates these problems. Business as
usual means long-term decline as our economic and technological
leadership is damaged by cyber espionage.
There are also two sets of risk. One is immediate and real. Two of
our potential military opponents have the capability to launch damaging
cyber attacks against America's critical infrastructure. The Aurora
test at the Idaho National Labs and the Stuxnet worm showed that cyber
attacks can do physical damage. These opponents have carried out
network reconnaissance against critical infrastructure to allow them to
plan their attacks. The issue for this committee is that after 12 years
of information sharing, public private partnership, and voluntary
action, critical infrastructure in the United States is not ready for
an attack.
While these militaries have the capability to launch a damaging
cyber attack, they are unlikely to do so short of an armed conflict.
They are deterred by the threat of an American military response. Only
if we were to get into a shooting war with them, over Taiwan or
Estonia, could we expect to see cyber attacks. However, while we can
deter military attack, our military strength does not deter espionage
and crime in cyberspace. Deterrence not a solution for cybersecurity's
most pressing problems.
Cyber terrorism is still a distant threat, but it is a threat that
is increasing. Terrorists lack the capability to launch cyber attacks.
If they had this capability, they would have already used it. Our
original emphasis on ``cyber terrorism'' was wrong. The day a terrorist
group gets cyber attack capabilities, they will use them. At that
moment, if we have not improved our cyber defenses, they will succeed
in causing disruption and damage. It is concerning to note that a few
terrorist groups have expressed interest in acquiring cyber attack
capabilities--the most recent was al-Qaeda in the Arabian Peninsula
(AQAP). This group is worrisome. They are inventive in using the
internet for propaganda and organization, and they have said one of
their goals is to disrupt the American economy--this was the alleged
motive for their effort using printer cartridges in air shipments. We
have some number of years--I hope--before AQAP or another group, or an
irresponsible nation like North Korea or Iran, acquires cyber attack
capabilities, because we will not be able to deter them from attacking
and our defenses are inadequate.
If there is one conclusion that we can draw from the long list of
cyber incidents, it is that we are not prepared to defend ourselves. So
we are vulnerable, but the risk of attack is low for the moment. As
long as our opponents do not attack us, we are safe. This is not an
ideal strategy for a superpower. Our current approach to cybersecurity
leaves initiative and control to our opponents. It also is ineffective
in stopping the slow but steady damage to our economy and to our
National security that comes from cyber espionage.
Remedying the situation will take a concerted effort, but we are
far from consensus on how to proceed. We will hear that public-private
partnership is essential, because the private sector owns 85% of
critical infrastructure. The private sector owns 100% of the airlines
in the United States as well, but no one uses this as an excuse to say
we do not need an air force. We will hear that the internet must be
protected because it is a source of innovation. Now, in other fora, it
is common to hear that the United States is lagging behind in
innovation, so it is fair to ask just how much the internet has helped.
Innovation is a complex process and focusing on the internet as its
source is probably wrong, perhaps a last left-over form the dot-com
bubble. But the notion that ability to better protect intellectual
property and proprietary business information will somehow hurt
innovation is bound to reappear. We will hear that technology moves too
fast for regulation, but this is true only if you try to write
prescriptive regulations. It is an avoidable mistake. And there will be
a call for incentives, as if paying for an inadequate defense will
somehow make it better.
No sector has a greater incentive than banks to protect their
networks. They are a constant target. Some banks, particularly the top
tier banks, have sophisticated defenses. Despite this, they are hacked.
This is not surprising considering the thousand of probes they face
each year, but even with all the incentives in the world and with a
strong focus on cybersecurity that is matched in few other critical
sectors, they cannot be secure. If the banks cannot protect themselves,
why do we think other sectors will be able to do so?
The business implications for spending on cybersecurity by private
companies, especially critical infrastructure companies, are
straightforward. Investing in increased cybersecurity requires them to
spend on nonproductive assets. They will not get an increased return on
investment from this spending. There is a notion that if we could only
demonstrate the scope of the losses, companies would be incentivized to
recalculate the business case for cybersecurity and spend more. This
may not make sense for critical infrastructure. The bulk of the losses
come from the theft of intellectual property from commercial research
and manufacturing companies. Critical infrastructure companies are
likely experience less loss of this kind of data. The risk they face is
the potential for service disruption, but before the disruption occurs,
the cost may be so low as to be unnoticeable.
Additionally, it is likely that some industry sectors are more
important than others for cybersecurity. Opponents may consider the
defense, high-tech, or energy sectors as higher-value targets for
economic espionage. Electrical and telephone grids may be high-value
targets for critical infrastructure attacks, as disrupting them could
have cascading effects through the economy. The financial sector may be
particularly attractive as it is both a critical infrastructure--stop
the flow of money and you trigger immense disruption--and attractive as
a target for crime. There are indications that the financial sector and
the electrical grid face increasing risk because of heightened opponent
interest (whether State or criminal) in these sectors as targets.
This has implications for a National resiliency strategy. Without
external incentives, companies will be unwilling to invest in redundant
infrastructure to provide resilience. On the other hand, providing
incentives without also being able to enforce compliance means at best,
we will get a very uneven level of implementation and continued
vulnerability. Incentives only make sense if increased authority for
the Department of Homeland Security (DHS) accompanies them. Incentives
by themselves are a give-away without benefit to security.
Incentives will not solve the problem of our reliance on a
disaggregated, point cyber defense, where each network or user is
responsible for their own defense. This is the worst possible defense
against a skilled opponent. Every company is on its own, and they can
be picked off one by one. Providing incentives without being able to
coordinate our cyber defenses and ensure a common level of performance
is not an improvement.
Voluntary action is also not enough. Is there a more sophisticated
technology company than Google? Google has unparalleled skills and
resources. The same is true for Intel, Adobe, Microsoft, and the many
other companies that have allegedly been hacked. Voluntary action by
even the most sophisticated tech companies is inadequate. The reason
for this is simple. Pros always beat amateurs. We are asking
corporations to take on the most powerful military and intelligence
agencies in the world, agencies that do not observe our laws and that
do not like us. It is no contest. It is like sending the company
softball team against the Giants or the Yankees. Voluntary action by
itself will always be inadequate against dangerous foreign opponents.
Efforts to secure the Smart Grid are a good example of the problems
with a voluntary approach. Security standards published by the National
Institute for Standards and Technology in August 2010 were developed by
a consensus process that included 475 participants from the private
sector participants. A consensus process involving 475 people is itself
problematic. This is why the founders wisely opted for majority rule in
the Constitution. A report by the General Accountability Office from
January 2011 found that since these consensus standards are voluntary,
there is no way to enforce them or even know if companies are following
them. Perhaps unsurprisingly, the GAO also found that critical smart
grid elements ``do not have adequate security built in, thus increasing
their vulnerability to attack.''\1\
---------------------------------------------------------------------------
\1\ GAO, Electricity Grid Modernization (http://www.gao.gov/
new.items/d11117.pdf).
---------------------------------------------------------------------------
Voluntary action has not worked, but some argue it deserves another
chance and that we should pay companies to put better cybersecurity in
place, using incentives, but that we should also not tell them what to
do. This is a recipe for disaster. There is no other area of National
security were we rely on voluntary action reinforced by incentives. A
policy of voluntary efforts for better cybersecurity reinforced by
incentives is not a serious effort to protect National security against
real damage and a growing threat. These proposals are best seen as
intended to block reform rather than to promote cybersecurity.
Information sharing is a more difficult problem. No single agency
or company knows the full range of threats we face in cyberspace. The
National Security Agency, Cyber Command, and DHS have part of the
puzzle, the big telecom companies have another part, the antivirus
companies and big internet service providers another. If we could put
these parts together, our ability to protect the Nation would be
significantly improved. Perhaps 20 or 30 companies and two or three
agencies would need to share information and be partners in a National
defense. This would be a public-private partnership that could make a
difference.
And of course, it is impossible do to this in the United States.
Our laws and our policies block the one area where we could have
meaningful public private partnership and information sharing that
could make a difference. Some of the very organizations that stoutly
proclaim the need for public-private partnership also object to
meaningful information sharing, the one area where public-private
partnership makes sense.
After 12 years of experience, we can now say with confidence that a
voluntary approach to cybersecurity based on public-private partnership
and information sharing is inadequate to defend America. These are
elements of a comprehensive defense, but by themselves they are not
enough. They must be reinforced by an active defense that uses our
military and intelligence assets, by flexible regulation of critical
infrastructures and internet service providers, by a strong diplomatic
effort to extend the rule of law into cyberspace, and by expanding law
enforcement cooperation in every country to which we are connected.
In December 2008, CSIS issued a report by its Commission on
Cybersecurity for the 44th Presidency that laid out a number of
recommendations for a comprehensive National approach to
cybersecurity.\2\ While the report was well received, the
implementation of the recommendation has been slow. In February 2011,
the Commission issued a second, final report \3\ that assessed where
progress still needs to be made. We identified ten key areas and listed
the tangible steps that need to be taken. The most important of these
were the need for coherent Federal leadership, clear authority to
mandate better cybersecurity in critical infrastructure, and a foreign
policy that used both military and diplomatic tools to bring the rule
of law to cyberspace.
---------------------------------------------------------------------------
\2\ http://csis.org/files/media/csis/pubs/
081208_securingcyberspace_44.pdf.
\3\ http://csis.org/files/publication/
110128_Lewis_CybersecurityTwoYearsLater_Web.pdf.
---------------------------------------------------------------------------
These are crucial areas for improvement, but each raises
significant issues for the upcoming legislative debate. One issue is
whether DHS or at the White House should lead cybersecurity efforts. In
this case, there is not simple answer. DHS is best placed, working with
the Department of Defense and the National Institute of Standards and
Technology (NIST), to develop standards and regulations. DHS is best
placed to work with first-party regulators--FERC, FCC, FFIEC, and
others--to ensure compliance. On the other hand, the White House is
best placed to develop a National strategy, to coordinate military,
intelligence, law enforcement, and diplomatic activities, and to
provide Executive branch oversight and guidance for cybersecurity
activities and for privacy protection.
The first CSIS report discussed a new, flexible approach to
regulation that gave the private sector a greater role in designing the
rules while leaving enforcement to the Federal Government. Now, it is
quite true that regulation done badly can be very damaging. There are
countless example of that kind of prescriptive overregulation and
finding ways to streamline regulation is an essential task for America.
It is also true that no regulation leads to disaster. Even the
strongest proponents of deregulation do not call for the elimination of
the Federal Aviation Authority. All the airlines mean well and do their
best, but we do not feel comfortable leaving air safety to voluntary
action because lives are at stake. We do not feel comfortable saying to
companies, you make the decision on whether to sell nuclear or missile
technology to a foreign customer. We regulate them. Public safety and
National security require it. Regulation is unpleasant, but in some
cases, the alternative is worse. Cybersecurity is one such case. The
approach proposed in draft legislation, which is based on the Chemical
Facilities Anti-Terrorism Standards found in the Homeland Security Act,
offers a reasonable approach to better cybersecurity.
Precedents for a new approach can be found in recent changes to the
implementation of the Federal Information Systems Management Act
Reporting Guidelines or in the Consensus Audit Guidelines developed by
a consortium of Federal agencies including NSA and private
organizations. These guidelines identify technical security controls
that are effective in blocking high-priority attacks. They show that is
possible to identify practices that improve cybersecurity and measure
their effectiveness, since technology does not change too fast. I
recently spoke to the Deputy Chief Information Officer of an agency
that had implemented the guidelines--this was an agency that suffered
major losses to hacking a few years ago--and he said the improvement in
their defenses has been dramatic. I asked if the Guidelines are not
getting out of date, as they are 2 years old, and he replied that not
only are they are still effective, that implementing the first four
guidelines stops most of the attacks. It is now possible to identify
effective practices and continuously measure how well they work--if
they are implemented.
A comprehensive strategy that coordinates military, intelligence,
law enforcement, and diplomatic activities is essential for securing a
global network. Reducing cyber crime will require a strategic,
National-level approach that uses law enforcement, intelligence, and
diplomacy. The most sophisticated cyber criminals live overseas, in
countries that do not cooperate with U.S. law enforcement. The problem
is complicated by the fact that a few countries tolerate and even
encourage cyber criminals. They use them as proxies, as irregular
forces to carry out operations for the Government. The provide
resources and sometimes training. It will not be an easy task to get
these countries to stop cybercrime, and there is little that the
private sector can do.
Limitations on the use of our military and intelligence
capabilities continue to weaken cybersecurity in the United States. A
case from last year shows the situation. We are told that a leading
American bank had its networks penetrated by Russian hackers. The
hackers extracted millions of dollars. The bank, of course, said
nothing publicly. But while the crime was in progress, it was detected
by an American intelligence agency. As an intelligence agency with no
domestic authority, there was nothing it could do other than relay the
information to law enforcement agencies, a cumbersome process under
today's laws. By the time this was done, the crime was over. Active
defense would have let the intelligence agency detect the incoming
attack on the internet backbone, on the borders of America's National
networks, and stop it. Active defense could be structured to operate
like NORAD, where the Air Force protects our skies, by focusing on
foreign threats. It is not perfect, but it works and other nations are
deploying this kind of defense against foreign attacks.
Active defense is the future of cybersecurity. It raises two key
issues, the first being the need for additional privacy safeguards and
oversight and the second being the division of responsibility between
DHS and DOD. Stronger cybersecurity probably requires a new approach to
privacy and a strengthening of existing oversight mechanisms. To give
two examples, the Privacy and Civil Liberties Oversight Board, PCLOB,
does not have cybersecurity in its legislative charter, nor is there
Executive branch guidance (along the lines of Executive Order 12333,
which governs intelligence activities) for agencies in how to perform
their cybersecurity missions. Both of these reflect the need to adjust
our laws and regulations to the new cyber environment.
DHS and DOD both have important and potentially complementary roles
to play in cybersecurity. DHS is best placed to work with critical
infrastructure and to ensure domestic preparedness. Only DOD has the
capability to respond to foreign opponents. There are still
coordination issues that need to be worked through, and some of these
issues will be resolved only when the White House has a stronger role
in cybersecurity, but the recently signed Memorandum of Understanding
signed between Secretaries Napolitano and Gates is an important first
step in building a coordinated defense.
The problem of international engagement is challenging, in part
because for years the United States believed that cyberspace would be
some kind of self-governing utopia. As the security situation worsened,
as cyberspace became a new domain for conflict, and as the political
implications of the new technologies became apparent, other nations
have decided to extend government control into cyberspace. This trend
is irreversible. The United States must engage with these nations in
order to influence, if not lead, this restructuring of cyberspace
governance, in order to ensure that the political values we cherish--
openness, global connectivity, and freedom of speech--continue to guide
development of the global network. Thinking on how to do this is at a
very early stage. New kinds of expertise are required and there are
only a handful of people with relevant experience. The State Department
has just created a new cyber coordinator position and with the right
support form Congress, this could allow the United States to regain
international influence.
These are complicated issues and the account above is necessarily
summary. They receive more detailed treatment in the CSIS reports.
However, in drafting the final report, we found that as the prospect
for change increases, so will resistance to it. People are wedded to
old ideas, even if they do not work. New kinds of expertise are
required for understanding cybersecurity. Above all, many still place
some other priority above securing our Nation's networks.
It is this last point that worries me the most. When we look at
nations that have fallen on hard times, losing their power and their
international standing, very often it was because of internal problems.
Often, the leaders of these countries knew what the problems were. They
even knew what the solutions were, but their beliefs and reliance on
old approaches kept them from making the needed changes. So far, this
has been the case with cybersecurity in America. We are in a new world
and face new problems that old ideas will not solve, but it is hard to
give them up. Better cybersecurity is possible, but not if we continue
to use failed approaches.
This puts a great responsibility on Congress and the White House.
We have a real opportunity in the next 2 years to improve our cyber
defense. Doing this will require leaving old ideas behind, even though
many will still advocate them, and moving to a new, comprehensive
approach to cybersecurity that treats it as a major component of
National defense and homeland security. I thank the committee for the
opportunity to testify and will be happy to take any questions.
Mr. Lungren. Ms. Kwon.
STATEMENT OF MISCHEL KWON, PRESIDENT, MISCHEL KWON ASSOCIATES
Ms. Kwon. Thank you.
Good morning, Chairman Lungren, Ranking Member Clarke, and
other distinguished Members of the subcommittee.
My name is Mischel Kwon, and I am the president of Mischel
Kwon and Associates, LLC, a consulting firm specializing in
technical defense security, security operations, and
information assurance.
It is interesting to look at the changes and advances and
struggles of IT over the 30 years of my experience. If we look
out into the future, if I were to be testifying before this
committee in 10 years, I predict a very different situation. No
longer will governments or car manufacturers or hospitals or
electric power companies be in the business of IT.
None of these organizations will have large data centers
and infrastructures, e-mail servers, or application
programmers. Instead, we will have IT providers, just as we
have power providers and health care providers.
The cloud today is the first move to this new paradigm.
This movement is our opportunity to fix many of the problems
that rapid individualized IT growth has caused. We have the
opportunity to build security in, to fix the IT refresh
problem, to enable innovative technology, and to collapse the
IT community, allowing better collaboration, communication, and
sharing.
In looking to the future, it is important to recognize
where we have been successful and where we are stuck. We must
look at where IT is going in the next 10 years and prioritize
what we are working on so that we are addressing the issues
head on.
We have had significant progress over the 10 years in
heightening the importance of securing our IT systems and
infrastructures. We now understand the importance of policy,
process, technology, and detection.
We clearly understand the need for information sharing. We
now also realize we are all in the same infrastructure, the
internet, and that the idea of sharing infrastructure is the
wave of future.
Much-needed progress is being made in the modernization of
FISMA, understanding the need for continuous monitoring and
cyber scope that will enable the departments and agencies to
have a real understanding of the health and well-being of the
systems and networks supporting the Federal missions.
It is critical that as we move into this era of the cloud
that we are careful not to create home-grown solutions but rely
on the private sector and the COTS, commercial off-the-shelf
products, that can accomplish the requirements needed.
Difficulties have challenged us in security governance,
authorities, and information sharing. Many of these issues have
been complicated because we are trying to solve the policy
issues and the operational issues at the same time.
I do believe good efforts by good people with good
intentions have been made at the Department of Homeland
Security and across the U.S. Federal Government.
Today, many of the impediments in Federal Government that
slow down efforts to improve cybersecurity are caused by a lack
of clear governance structure, clear defined mission spaces,
and the authorities and budgets to successfully accomplish
those missions and understanding where collaboration is needed.
I do believe DHS has a primary role in cyber. Though I have
not always thought DHS could handle the important and broad
mission of cyber because of the maturation level of this young
agency, I do believe the operational mission of US-CERT belongs
to DHS, but as an autonomous, operational component, similar to
FEMA, with direct reporting capabilities to the Secretary.
I believe the mission of US-CERT must be more clearly
defined to enable it to be successful. It must be enabled to
succeed in the important operational mission and firewalled
away from the struggles of policy and relationship development.
The appropriate authorities must be given to US-CERT to allow
it to carry out the assigned mission.
Effective and actionable information sharing and a public-
private partnership is essential for cyber today and for the
future. We have made significant progress over the years but
now seem to be in a holding pattern, struggling with
procurement and legal issues that have frozen progress.
As we move to the new model of IT and the cloud, we will
need to take two steps: One to understand how we can
technologically share information more efficiently; and two,
how the private sector can take a leadership role, possibly
through a non-profit organization, to help free us from the
holding pattern from both sides.
We are moving rapidly to the new world in IT, a new world
in cyber with many opportunities. We must be prepared with a
strong, well-defined operational US-CERT that has the autonomy,
authority, budget to be successful in protecting the Federal-
civilian space. We must defend the shared space together with
the ability to share information through a healthy, public-
private partnership.
Thank you very much for the opportunity to testify.
[The statement of Ms. Kwon follows:]
Prepared Statement of Mischel Kwon
March 16, 2011
Good morning Chairman Lungren, Ranking Member Clarke, and other
distinguished Members of the subcommittee. Thank you for the
opportunity to testify before the Subcommittee for Cybersecurity,
Infrastructure Protection, and Security Technologies.
My name is Mischel Kwon and I am the President of Mischel Kwon and
Associates, LLC, a consulting firm specializing in Technical Defensive
Security, Security Operations and Information Assurance.
Previously I served as the Director of the United States Computer
Emergency Readiness Team (US-CERT) at the Department of Homeland
Security (DHS), and as the Deputy Chief Information Security Officer
and Director of the Justice Security Operations Center at the
Department of Justice. Most recently I was the Vice President of Public
Sector Security Solutions for RSA, the Security Division of EMC
Corporation. I received my Bachelor of Science and Master of Science
from Marymount University and a Master Certificate in Information
Assurance from George Washington University. I was a Cyber Corps
Scholar. In the nearly 30 years of my career to date as an IT
professional I have been a programmer, systems developer, network
engineer, program manager, and security professional.
Over the past 10 years the U.S. Federal Government has been
struggling, learning, and discovering what to do about ``cyber''. We
have been moving on a continuum that started with the discovery of
adversaries in our networks, has found us struggling with how to manage
our systems through the Federal Information Security and Management Act
(FISMA) and compliance, how to identify threats, attacks,
vulnerabilities, and how to work together to defend our networks. As we
move forward in a constantly evolving world of technology, life as we
know it is changing rapidly. Soon, most companies, even Government
departments and agencies, will no longer have data centers or continue
to own or manage their own e-mail servers, applications, or desktops.
The use of virtualized IT infrastructure is the future.
Virtualization, as the foundation of cloud computing infrastructure
will enable the ``Cloud'' to be the provider of most IT services. You
may say this is jumping ahead, but we must look at the answers to the
questions you are asking with the near-term future in mind, and the
near-term future is now--as many departments and agencies are already
moving applications such as e-mail to the cloud, many are building
private clouds, and many private sector companies are rapidly moving to
the cloud. This is not only an innovative solution to a much-needed
technology refresh in the civil government space, but if done
correctly, could be the answer to information sharing, infrastructure-
based defensive security, the cyber talent pool shortage and guaranteed
life-cycle management of our infrastructure resources. No longer will
companies or departments and agencies with missions different than
Information Technology need to be in the ``IT'' business. No longer
will we need to educate the heads of these organizations and have them
making IT risk decisions outside of the scope of their knowledge base.
We will deliver the requirements to the vendors; the vendors will then
supply the appropriate infrastructure and services, with security built
right into the technologies and the offerings.
This brings us to a critical crossroads in the continuum of
cybersecurity. Not only are we at the point where we realize the need
for governance, leadership, and cooperation between the Government and
private sector in order to have a chance at combating the adversaries
in an efficient manner, but we also are now at the part of the
continuum where the responsibility of protecting our assets processed
on IT systems--whether it is data or an operational function--will be
the responsibility of the private sector infrastructure providers. This
point was driven home during the initial phases of the Comprehensive
National Cybersecurity Initiative (CNCI) when the Federal Government
realized just how much of the internet is private sector-owned and -
operated, and that even if we do better at securing Federal systems, we
can't improve our Nation's cybersecurity posture without improvements
in the private sector in partnership with industry. As we continue to
move infrastructure and services to the ``cloud'', effective and
lasting partnerships with the private sector must be fully embraced and
leveraged.
Understanding the Information Technology roadmap that we are all
moving rapidly on also increases the importance of enhancing the
governance, authorities, and relationships that the Federal Government
has between and among the civilian departments and agencies, the
homeland security and law enforcement communities, the defense and
intelligence community and of course, the private sector.
As I move into the portion of my testimony where I will be
identifying obstacles and problems I have encountered during my Federal
Government service, there are a few caveats and points I would like to
make clear. First of all, cyber is a new field. At most, we can say
this is a 25-30-year-old industry. We must understand this is going to
take some time to mature. We will and have encountered issues, we will
learn of new problems . . . but we must work together to overcome these
challenges, quickly and effectively. Second, the Department of Homeland
Security (DHS) is a new Department and because of that it struggles
with the fundamental daily functions of being a Department from
procurement and budgets to hiring and operations. DHS is going to take
some time to develop the processes, policies, and procedures needed to
run smoothly and efficiently. It will not happen overnight and will not
occur without specific actions and programs to improve the baseline
operations. In addition, DHS has a very broad set of missions and
duties. Cybersecurity often takes a back seat to physical threats and
natural disasters in the daily and weekly grind of the Department.
Congress should do more to enable the cybersecurity components in the
Department to operate more effectively and independently without
getting bogged down in other DHS mission spaces, allowing cyber to
effectively operate as an independent component; allowing cyber to
separate itself from the quagmire of internal politics and jostling for
resources and mindshare. Third, there are a lot of really good people
who have worked this problem in the past and are working on
cybersecurity challenges today. As we point out the weaknesses and
problems, we must be cautious of tying the hands of dedicated security
professionals who are currently doing battle on a daily basis
(unfortunately not just with adversaries in cyberspace, but with the
bureaucracy within DHS). We cannot afford to forget these people. We
need these qualified individuals in this young and growing field. They
make sacrifices with their families, careers, and personal sanity to
serve our country in trying to fix these problems. We should take the
time to remember their service and take care not to diminish their
contributions as we examine and address cybersecurity challenges in
both the public and private sector.
During my tenure at US-CERT, we were at the very early stages of
developing critical relationships with Federal civilian departments and
agencies as well as relationships with the homeland security, law
enforcement, defense and intelligence communities, and the private
sector. It was clear there was a lack of governance and lack of
authorities to carry out the poorly-defined mission US-CERT set out to
accomplish. To examine this problem it is critical to break down the
US-CERT mission into: (1) Protecting the Federal civilian departments
and agencies, and (2) coordinating and collaborating with the private
sector.
Governance over IT in the Federal space has been an issue for many
years and to date has not been solved. FISMA, which was enacted in late
2002, was a start in attempting to set up roles and responsibilities,
including defining the roles of Federal CIOs and CISOs enabling
security structures to be built in Federal Executive branch departments
and agencies, as well as establishing reporting process for incidents
to US-CERT. This all being said, there were overarching and important
components of a success risk management strategy that have been
missing. As it stands today, the only requirement a Federal department
or agency has is to report the incident to US-CERT in the dictated time
frame based upon incident categorization using a 20-year-old taxonomy
that no longer describes the types of attacks that organizations are
experiencing. This creates inaccurate metrics, and little to no real
data on the actual attacks that are occurring in the Federal civil
space. US-CERT does not have the authority to require the departments
or agencies to share detailed information, or follow any specific
instructions. Departments and agencies interpret their reporting
requirements differently and therefore each reports incidents using
different definitions and methodologies. When I was the Director of US-
CERT if we needed Federal departments and agencies to follow specific
instructions, we would have to have the Office of Management and Budget
(OMB) require them to follow the instructions. Despite even OMB
guidance, the cooperation from Federal civilian agencies was
consistently on the low end.
Because many of the existing IT systems are owned and operated by
Federal departments and agencies, there is no existing direct authority
for DHS to require cooperation with US-CERT. This being said, it should
also be understood that some of the departments and agencies have more
sophisticated operations than US-CERT. The security operations centers
at State Department, Department of Justice, the Federal Aviation
Administration have a much higher technical monitoring and response
capability than US-CERT. In order for US-CERT to accomplish the mission
of protecting the Federal civilian agencies and departments day in and
day out, US-CERT must be empowered and its capabilities must continue
to be developed. It must have a clearly defined mission, authority, and
budget. It must have tools. These tools must be determined by what will
support the mission, not be tied to legacy systems, management, or
contractors. This must be a collaborative mission between US-CERT and
the departments and agencies. A ``dictatorship'' is not what is needed.
Collaboration and cooperation will enable the road to success. Even
more important is to clearly define US-CERT's role and the authorities
the organization and Director carry. Developing a ``council'' of
Federal department and agency Security Operations Center Directors and
the Director of US-CERT to help guide this mission makes sense in order
to ensure the mission of US-CERT stays on track, serves its Government
customers, and has a focused and effective mission strategy.
Today US-CERT is buried too deep within DHS. To even confuse the
issue more, US-CERT is a part of the National Cybersecurity and
Communications Integration Center. Instead of integrating the NCC into
US-CERT, yet another functional area has been opened, creating and
compounding the confusion. US-CERT must be given autonomy to allow it
to function as a successful operational entity--not laden in the
political quagmire of DHS, NPPD, CS&C, NCSD. In my view, in order to be
successful, US-CERT should be removed from the National Cybersecurity
Division (NCSD) and treated as a component organization similar to
FEMA. It should have its own budget that is not constantly diluted by
other, projects, programs and internal politics in NPPD, CS&C and NCSD.
US-CERT should have a clearly defined mission with attainable goals and
the autonomy to succeed in this operational mission. Yes, operational.
This is a roll up your sleeves and respond mission. This mission cannot
be performed anywhere else in the Federal civilian government . . . the
White House cannot carry out an operational function, the DoD cannot
perform an operational function of this nature domestically based on
the Constitution, and no other department or agency has the overarching
mission that allows for both emergency response and homeland
protection. DHS makes functional sense; US-CERT must be empowered to
fulfill its operational mission. As it stands today, US-CERT is
constantly caught up in political priorities and much time is spent
thrashing around, attempting to service too many projects and
stakeholders. A clear governance process in the Federal space, a
clearly defined mission and the authorities to support that mission, a
budget to carry out this operational mission, as well as autonomy to
operationally perform the operational duties are the steps to US-CERT
having the capability to make a difference in supporting the
departments and agencies as a part of DHS.
US-CERT's other mission is to coordinate and collaborate with the
private sector--specifically with critical infrastructure owners and
operators--is equally as important. Again, great mission, but rarely
accomplished. The work is often clouded by poorly defined expectations
and internal politics. US-CERT has absolutely no authority within
critical infrastructure that is owned or operated by the private
sector--nor should it. The Federal Government has no claims or
authority over privately held companies. Even in some of the current
draft legislation in both the House and Senate, participation in
Government-led cyber activities is by invitation only. Today's private-
public partnership efforts are bogged down with the same rhetoric,
politics, and legal barriers of the past 20 years. I will say that
presently US-CERT does little of the coordination. This is done
primarily through NCSD. Most of the communications is done by the
CSCSWG (Cross Sector Cybersecurity Working Group, a working group of
the ISACs) and most of the members are not actual security
professionals running security organizations, but a confusing mix of IT
and communications companies with individual company-focused agendas
and little or no focus on the operational agenda. An operational unit
like US-CERT must be firewalled away from this kind of dysfunction to
allow it to concentrate on the operation response mission.
The relationship between US-CERT and the private sector must be a
focused and well-defined mission. Prioritizing work with the
infrastructure providers--not individual IT product vendors--such as
ISPs, web hosting and caching, cloud providers and IT infrastructure
providers--to enable the focus on the operational response mission. I
understand the entire private sector IT and communications sector wants
to participate in future policy creation, but that function must not be
mixed with the operational mission US-CERT must succeed in.
So far, I haven't painted a very pretty picture of what is going on
at DHS in regards to cyber, but I want to re-iterate that I do believe
DHS is the right place for cyber. I also believe changes need to be
made in order for DHS to have a successful cyber mission. Giving US-
CERT the autonomy to embrace a well-defined operational response
mission (both with the departments and agencies as well as with
critical private sector players), with a budget and capabilities to
execute on the mission, and authorities to enable them to execute on
the mission is a very important step to success.
Creating a successful public-private partnership to help secure
cyber space is yet another mission that must be addressed. I think we
need to approach this problem from a different direction. We must not
look at it as a ``cyber space'' problem. That mission space is far too
broad. We must look at this problem in digestible pieces. Internet
infrastructure: Internet Service Providers, Cloud Providers, Web
Providers and Information Infrastructure Providers. Separate this from
the ``cyber war'' issue, separate this from the policy and legislative
issues. Move these layers away from the operational mission of US-CERT.
Take on the protect the infrastructure problem first. Work on the
information sharing problem with an operational lens. I truly believe a
technical solution must come in order to break the stalemate we find
ourselves in with regards to cooperation and information sharing. The
stalemate is centered on procurement, legal, privacy and proprietary
information issues. We must determine a technical function for
anonymously exchanging information. In addition, we must start
articulating the problem with the same vernacular. We must spend time
redefining the taxonomy and vernacular we use to work the cyber
problem. We must do this in order to establish meaningful metrics,
solutions, and focused solutions to the problem.
The ancient category one through eight taxonomy, where 99% of all
incidents are categorized as category three ``malware''--is useless in
the world of complex attacks and sophisticated adversaries. I do
believe this will become easier as we move on our continuum to the
cloud. I believe as it becomes a more defined industry and who actually
runs the ``IT infrastructures'' (i.e. clouds) becomes more defined,
information sharing will become better as a function of how many
entities must actually participate in the defense of IT as a whole. It
must be understood that a public-private relationship is a two-way
street. Often the Government is left holding the bag of failure when it
comes to this relationship. The burden here is not and should not be
solely on the Government. We all have critical information that, if
shared, would help the community as a whole. In the near future, the
Government will be squarely in the customer role as we move on the IT
continuum to the Cloud. We must look at how the Government and private
sector can shape a healthy relationship. I am a firm believer that the
private sector needs a private non-profit entity that would facilitate
the relationships of the many privately held IT companies. This non-
profit entity would facilitate the information sharing both on the
private side as well as a focused conduit for information sharing with
the Government. I do not see this as an inherent Government-only role.
I clearly understand there is a National defense role for the
Government in times of war, but we need to clearly define what that
means in terms of cyber, and yes that is clearly a DoD role--not a
civil Government role.
This being said, I do see technology developments that will remove
the legal and privacy issues around information sharing. We must
technologically come to a place where we can exchange information on a
technical level about threats, attacks, and mitigations without
disclosing information about the entity or entities involved. We must
focus as a community--not as a Government--on moving this solution
track along. We must be mindful of the circular rhetoric trap we get
caught in when we hear the words--public-private partnership--and
realize the actual work that needs to happen to accomplish the goal--
defending our IT assets and missions. The work that needs to be done is
to create technical processes, overcome procurement and legal issues.
This must be done as a community, lead by the private sector. The
Government's participation should be as a member of the community.
In conclusion, I do believe DHS has a primary role in cyber. Though
I have not always thought DHS could handle the important mission
because of its maturation level, I do believe the operational mission
of US-CERT belongs in DHS--but as an autonomous operational component
with direct reporting capabilities to the Secretary. I believe the
mission of US-CERT must be more clearly defined to enable it to be
successful. The appropriate authorities must be given to US-CERT to
allow it to function. Public-private partnerships need to be rescued
from the circling drain of rhetoric and lead by the private sector with
Government participation.
We are moving rapidly to a new world--we must clear our plates of
the static yada yada of stale circular discussions, identify the
operational function and technical solutions. Empower US-CERT to
succeed. Empower the private sector to lead. Empower the Government to
participate.
Thank you for this opportunity to testify. I would be happy to
answer any questions you may have at this time.
Mr. Lungren. I thank you all for your testimony.
I thank you all for being cognizant of our time limits, and
I appreciate that.
Dr. Schneck, how do we solve this problem of stronger
protections for sharing information from the private sector to
the Government? The reason I say that is, you have members of
the public who are naturally suspicious or skeptical of the
Government working with the private sector and not protecting
the individual rights of consumers and so forth.
If I am a credit card holder and all of a sudden, I find
that my credit card has been cancelled through no action of my
own, which happened one time when I tried to present it at a
restaurant, and then 2 days later, after we called one of the
major credit--that night when we tried to call them--well,
first of all, my wife went on the internet to find out what our
account was, and our account was gone. Then they told us, well,
they would send us a card in a couple of days. Now, obviously
there had been some sort of a loss of security within their
operation, but they didn't tell me what it was all about.
I suppose, so long as I didn't suffer anything beyond
that--however, if I had been traveling in the middle of the
country and only had one credit card, I would have been in real
trouble. But they obviously didn't want to share with me
whatever that was; they believe that they took care of it
internally.
But members of the public might be a little skeptical if
there is this broad protection that no matter what the company
involved with that information did, as long as they shared it
with the Government, they were protected from any liability, on
the one hand.
On the other hand, we want companies to come forward with
information about how there has been an intrusion. We want that
shared.
Where do we strike that balance? How do we strike that
balance from your point of view?
Ms. Schneck. So, thank you, Chairman Lungren, I will start
out by saying I am not a lawyer. I surround myself with a lot
and actually find it fun.
Mr. Lungren. Well, we have an abundance of lawyers here, so
we need some help.
Ms. Schneck. So, first, on the note of your lost account,
it likely is somewhere in Romania, and we can help with that
later.
The issue is difficult at best from what we see. You said
the word that I would choose, and that is balance. So, first
and foremost, we are not talking about sharing any kind of PII
or private information.
This type of data looks at volumes of traffic, malicious
code, malicious code that we can say, at a human level and at a
machine level for a lot of math, looks the same for a variety
of parameters. One might be an encryption algorithm that is not
commonly used, but, look, it is used here and it was used here
on the other side of the planet within the same 2 hours from
machines that have the same pattern of sending traffic.
That is the kind of data that our analysts and we call our
colleagues within the sector and across the critical
infrastructure sectors, and we reach out to the US-CERT. We
reach out to the FBI National Cyber Investigative Joint Task
Force with this kind of data of, and then it builds into a much
bigger picture.
The analogy I would use is from my days working as an
intern in a weather lab. If you see a lot of cold air above a
lot of hot air with wind direction in the opposite waves at
certain levels from the altitudes and then an air pressure that
is fairly low over a large region, any one of those things
could mean just a little storm. But if you put those together,
and you have a tornado, high probability.
What we want to share is not the air temperature in every
county; what we want to share is the people that need to leave
their homes, and we need to be able to do that more quickly. So
there is a big picture that we draw.
The problem is when you share out that big picture, such as
XYZ is happening in this sector, are we endangering the
companies in those sectors that we have already protected, both
electronically as well as informing the humans in those
companies, do we risk them having material shareholder issues?
This is such a new area for policy. That is the problem.
Mr. Lungren. Well, I would love to work with you and any
lawyers that you might run into on that, because I do think
that we have to have a greater accessibility of information in
both directions, and sometimes liability issues will interfere.
Let me ask you this. You used a great analogy, you said
vaccination doesn't work any more. Golly, I have McAfee on my
computer, and I thought I had vaccinated myself against
intrusions. Now you are telling me that my attempt at
vaccinating myself, my computer system, isn't enough?
Ms. Schneck. First of all, any security provider that says
you are 100 percent safe, I would get rid of them.
Mr. Lungren. Well, McAfee has never told me that.
Ms. Schneck. All right. So, second, you are vaccinated
against everything that we in the community know about.
The problem is the bad guy creates this code that changes
itself, just like the flu mutates, so we worry about the new
vaccine, in case your body can't deal with the mutation of the
disease and you get sick anyway.
What you are protected by with McAfee is the view of the
whole world now, so not just what we know about but what we are
seeing happening right now. Believe it or not, you are able to
be protected against something that might have been developed
on the other side of the planet that comes in with a risk score
so high it may not have a name, but you are going to block it.
That is the new paradigm we need, and it is not just our
data. We need the ability to combine our data with data from
other sectors, across the energy sector. What is the energy
sector seeing in cyber?
As a vision for the future, to Mischel's point, it will
look a lot different and a lot better in the future and we can
leverage the power of the cloud that was mentioned by being
able to put this kind of data together, infuse it into the
fabric, and make things more intelligent.
Mr. Lungren. Thank you.
My time has expired.
The gentlelady from New York is recognized for 5 minutes.
Ms. Clarke. Thank you very much, Mr. Chairman.
Ms. Kwon, cyber intrusions affect the private sector even
more than Government networks. Some of these private networks
involve critical infrastructures necessary for our society and
our economy to function.
What can DHS do to foster better cybersecurity practices in
the private sector? Does DHS need regulatory or enforcement
authority for critical infrastructure sectors, and should the
private sector be doing more on its own? If so, why isn't it
happening?
Ms. Kwon. Well, this has been always the very difficult
question because our critical infrastructure is not owned or
operated by the Government. Therefore, the Government does not
have any authority over the private sector.
What is needed here is better collaboration and better
communication.
Whether regulation is needed or not, I am not a regulator.
I am not in that kind of business. I am a technical geek by
nature. So I will leave that decision to the lawmakers and the
regulators.
But enabling us to more clearly communicate amongst the
Government and the private sector and share that critical
threat information is actually--is very important. But even
more than that, DHS helping the security teams that work in
those critical infrastructure environments to communicate with
their executives and their board members to enable the
financing that needs to be put behind securing critical
infrastructure is critical and important and to helping them
accomplish their mission.
Mr. Lewis. Can I just jump in on that one for a second? We
did a poll with McAfee recently, and it found that two-thirds
of the electrical companies in the United States had found
Stuxnet on their system, two-thirds. Of those two-thirds, only
40 percent had taken steps to remove it.
Does that make you feel good? Not me.
I think if we don't give DHS more authority, we will not
succeed at this, and I think CFATS might be a useful model to
think about.
Ms. Clarke. Thank you.
Dr. Schneck, your recent report on Chinese-sponsored
hacking into our energy sector computers was very concerning.
Is the industry now fully aware of this issue, and if so, have
you seen evidence that they have acted to protect themselves?
If not, why not, and where is the disconnect?
Ms. Schneck. So, on the question of, is the industry fully
aware, from reports like these that we have done with CSIS, we
consistently get surprise answers back. So, for example,
security spending last year went down with the recession, even
though awareness of the threat went up. So awareness and acting
may not always be related.
In addition, when you talk about being aware, although many
are aware there is a threat, I think that both public and
private can do a better job of explaining what that threat
really means. For example, you can have, you can have the
malicious code on your system, and it wouldn't be a threat, and
there are two cases why this is true.
One is, if you are not running any systems that that code
can actually access or use to your harm, you don't need to
worry about that particular threat, so we need to do some risk
analysis, back to the comment earlier about looking to the CFOs
and the risk people in each company; this is all a question of
the risk.
But the second thing is there is technology today that can
sit very quietly on a system and just decide these X processes
may run, that is it. Anything outside of those processes simply
should not run. So we are working with our colleagues and our
partners on how you embed this kind of technology into the big
component levels of industrial control systems, because we
can't always assume everyone is aware. This rose so quickly, we
can't make everyone aware, and we certainly can't predict the
next threat as quickly as the bad guy can send it.
You are leveraging the power of light. This is happening in
bits and bytes at the speed of light. So what we can do is say,
only those authorized can act.
Ms. Clarke. Thank you.
Mr. Lewis, in your writings, you have talked a lot about
public-private partnerships for the cybersecurity mission. Can
you explain to us what roles you feel each side needs to play?
What, for example, are the inherently Government functions, the
public side, and what components are best left for or even must
be left for the private sector?
Mr. Lewis. Thanks. That is a great question. The obvious
place to start for me is that development of technology has to
be left to the private sector, and they are just the masters at
it. We have to let them do it.
A place where public-private partnership makes sense is on
information sharing, and it is easy to get sort-of distracted
by the numbers in information sharing, but basically, there is
a small set of companies that have, including McAfee and
Symantec and others, the big telco operators, the big ISPs like
Comcast or Cox, put them together with DHS and with NSA, and we
will have a pretty complete picture of what is going on, on the
internet.
Now there are legal impediments to doing that, right, and
that is a harm to the ability to secure our Nation's networks.
But that kind of focused information sharing with a small group
of companies is a perfect place for a public-private
partnership.
On the other hand, there are some threats that only the
government can deal with. If we are talking about the Russian
military or the German military or al-Qaeda or the Iranian and
North Korean military, that is a government response, and there
is no company--the story I like to show is Google, greatest
technology company in the world, some would say, didn't take
the Chinese very long to get through their defenses. There are
some things only government can do.
Mr. Lungren. The gentleman from the second-largest State in
the union, Mr. McCaul, is recognized.
Mr. McCaul. California is close behind, I might add.
Jim, it is great to see you again.
Dr. Schneck, thank you for your service on the commission
as well.
I assure the Chairman that I was not personally responsible
for the 40,000 downloads of that report, but I will, I just
want to commend your leadership, which was far greater than
mine, in really herding cats on some of the top experts in the
Nation, putting that report together. Perhaps we should call
you the bots herder in cyber terms, I don't know.
You know, 15,000 Federal intrusions take place per day, so
you are going to have 40,000 downloads over a period of a year
or so, but 15,000 intrusions per day on the Federal Government.
As was pointed out, the three levels we always talk about is
the criminal aspect, the espionage and the warfare piece.
God knows how many are taking place in the private sector.
I am sure it is far greater than that. When you look at the
amount of data that has been stolen from just the Federal
Government alone, it rivals the Library of Congress, so it is a
very serious issue.
Jim, I just want to throw out just a very generic question.
Since the time of the report, I think the threat level has
increased. Do you feel that we have made any progress, and do
you feel that in any way we are safer?
Mr. Lewis. Thank you, and I do want to say that I believe
Congressman McCaul is right in that there were lots of clicking
noises late at night from both of our offices, but that wasn't
the cause of the downloads. So are we making progress? The
answer, I think, is, ``Depends.''
When you look at the Department of Defense, some tremendous
efforts with the creation of Cyber Command. When you look at
the Department of Homeland Security, significant improvement. I
think you heard Phil describe that. Other departments, State,
Commerce, have made some efforts.
So, overall as a Nation, OMB with its efforts to revise
FISMA and to find a better way to secure Federal systems, those
are all signs of progress, but it is not enough. We were behind
when we started, as you know, and we have not caught up.
So do I feel like we were more secure? We were on the path
to being more secure, and I think the work that this committee
and others in Congress can do might get us there by 2012, but
we are not there yet.
Mr. McCaul. With respect to--I am sorry, Ms. Kwon.
Ms. Kwon. Yes. I just want to add something to that in that
we do spend a lot of time talking about the success of DHS, but
I also want to say that there has been a lot of great success
among the departments and agencies. They have, over the past
several years, stood up several security operation centers and
have improved the security amongst some of the larger
departments and agencies, and I think that needs to be
recognized.
I think a lot of that comes from the actual awareness that
has been brought to bear through the CSIS Commission and other
efforts in getting the word out that cyber needs to be a
priority.
But I do think, in looking towards the future and things
that we need to improve is improving that communication within
the Government on the Federal, civil, civilian side of the
house, getting DHS to work more closely, not only with private
sector but with the civil agencies, CIOs and CISOs and work
that improvement across the Federal space together.
Mr. McCaul. One thing I noticed both you, Ms. Kwon, and Jim
mentioned was that DHS needs more authorities and that you, I
think you mentioned appropriate authorities must be given to
US-CERT. Can you be more specific?
Ms. Kwon. Well US-CERT does not--the authorities US-CERT
has today are centered around what they have with FISMA and the
reporting that the departments and agencies must do with them.
The problem with that is reporting is simply reporting,
working together is not working together.
So being able to work from a position of authority during
an incident with the departments and agencies, to request
information from them, to have certain actions performed, it is
very important for them to have that authority over the space
they are trying to protect, and they don't have that authority
today.
But in giving them the authority, they also have to have
the relationship with those departments and agencies. I think
that is where we are falling short; we are talking a lot about
authorities and more of a dictatorship and what we really need
to have is a collaborative partnership with those departments
and agencies so that they can take the actions needed in the
time of an event.
Mr. McCaul. I couldn't agree with you more on that.
You said something interesting that caught my attention
that I hadn't heard before, and that is that the nonprofit
could play a role in protecting the private sector.
Ms. Kwon. Well, I often find that private sector also has a
problem sharing with themselves. So sharing information about a
cyber attack is very difficult. I mean, it goes to reputation.
It has financial implications. It can ruin and crush companies,
as we have seen in the near recent past.
So it is important to be able to share. I think if we take
the Government out of the picture and allow private sector to
create a nonprofit together and start that sharing with the
Government as being a member but not the leader, I think we
might be able to find some success.
I also think that there are different levels of information
that we are talking about here, whether we are talking about
broad-threat information with attribution or whether we are
talking about technical TTPs, ways in which the malware works,
the actual code itself, how to detect it.
Being able to put together an organization that can share
those very granular, technical bits of information I think is
critical and important in moving forward and a way in which we
can do it circumventing some of the problems of law.
Mr. McCaul. I wanted to ask a question about Einstein-3,
but I see my time has expired.
Mr. Lungren. We might come back to you.
Mr. McCaul. Or somebody else. I would love a grade on
Einstein-3. Maybe I will ask it in a written question.
Mr. Lungren. The gentleman from Louisiana, Mr. Richmond, is
recognized for 5 minutes.
Mr. Richmond. Thank you, Mr. Chairman.
I guess this question is to Mr. Lewis. You were here when I
was asking the question about the health, electronic health
records and a baseline or a set of standards that we should
have, and I am looking at part of your testimony where we talk
about the smart grids and the voluntary approach.
I guess I am interested in your opinion on both with
electronic health records and the small grid and how vulnerable
we are, where we should be going and where we are today in
light of where we should be.
Mr. Lewis. Certainly. Thank you.
You know, a lot of times you will hear people say that we
don't know what standards to put in place and there are too
many standards or there are lots of standards, and that was
probably true a few years ago.
But we are now at the point where between our ability to
collect data, our ability to identify best practices, we can
now start to do things. We can now start to think of standards
or mandatory best practices that would improve cybersecurity,
either in health or in smart grids, in the electrical sector.
So I think we are on the cusp of being able to make that
leap. You can look at places like the Department of State that
have put into place a set of standards that have been very
effective.
In 2003, State lost 3 to 4 terabytes of information to an
unknown foreign opponent who probably lived in China. Three or
4 terabytes is about the equivalent of a third of the Library
of Congress. Today that couldn't happen because they have
identified best practices and things you can do.
So I think we can say now, do this and we will be safer,
right.
When it comes to actually putting those in place, HIPAA,
very old, very prescriptive regulations have immense drawbacks,
and we need to find a more flexible approach.
Smart grids, well, it will take a while before it's secure,
that might be the nicest thing to say. It is not secure now.
People are trying hard, but as I think I mentioned in my
written testimony, the process that the National Institute of
Standards and Technology used was a consensus process of 475
members. One way to put that in perspective is that is about as
many people as there are in the Congress. Suppose you had to
get every single person in the Congress to agree to a rule. It
would be a challenging exercise, and I think that is what is in
front of us.
We can come up with standards. It is possible to say what
works, but we don't have the processes in place to do that yet.
Mr. Richmond. Well, which is very long and especially when
you talk about the smart grid, and now I think that my utility
is starting to experiment with smart meters on homes. Is that
just as vulnerable?
Mr. Lewis. No, fortunately, because it means that an
individual home or perhaps a block of homes would be more
vulnerable, right, because the smart grid itself can be hacked.
But it doesn't mean you will be able to hack the actual power-
generating facility. It doesn't increase the vulnerability
there.
So are you as an individual more vulnerable? Yes. But as a
Nation, is our critical infrastructure more vulnerable? Not as
much.
Mr. Richmond. It appears that in, I think it is just a
given that we can accept is true, that this changes every
minute, every second of every day, the risk assessment. I know,
as a lawyer, the law changes a little less frequently, but we
are required to do continuing education on changes in the law.
Is there an industry practice where the chief technology
officer or whoever is responsible for threat assessments, do we
have an industry standard or something where they stay up-to-
date with the new threats, new technology, and as it comes
abroad? I am sure McAfee probably has it; they do it on their
own. But what I am thinking about, just smaller businesses, to
make sure that they are aware of the seriousness of the
threats.
Mr. Lewis. I think we all want to talk on this one.
Ms. Schneck. So, thank you. I can speak for McAfee, and I
can speak for the colleagues with whom we work. I will leverage
a little bit of my experience.
A few years ago I ran, for about 8 years, the private-side
sector of the FBI's InfraGard program. We grew that from 2,000
members to 33,000 members, bringing subject-matter experts
across the critical infrastructure sectors into relationships
with their Federal, State, and, most importantly, local
community law enforcement officers and Government officials to
share information about cyber and about all the sectors as they
are all connected.
One of the things we learned very quickly is our small to
medium business base, about 60 percent of our GDP, was probably
the biggest beneficiary of these relationships because without
that, they don't have the access and the resources that we are
privileged to have in larger companies to educate our
executives, to give our executives the time to go out and learn
what is really outside of your four walls.
I would recommend that, not just our organization but
others, small to medium businesses, to your point, need to
educate their executives on the crossover between the legal,
the policy, and the technical because it really--they work
together so much now. The point was made, a beautiful point
earlier, about how we are now focusing on the chief financial
officers and the risk officers.
When we need to tell a company not to sell something but to
understand that there is a big risk, we go to the CEO or the
CFO, so you will see law and policy, I believe, greater value
placed on that and more effused used in our businesses' future.
Mr. Richmond. Thank you, Mr. Chairman. I yield back.
Mr. Lungren. The gentleman from Missouri, Mr. Long, is
recognized for 5 minutes.
Mr. Long. Thank you, Mr. Chairman. Mr. Lewis, I don't
understand if I understood you right, were you talking about
CFATS program when you said we should emulate that? CFATS, can
you elaborate on that?
Mr. Lewis. Sure, I think it was in Phil Reitinger's
testimony as well. This is a program for the Department of
Homeland Security that lets the Department set standards in
cooperation with the operators and owners of chemical
facilities for anti-terrorism purposes to make the chemical
facilities more secure.
It is a little bit of a regulatory authority. It is a
little bit of a partnership. CFATS is not a bad model, and
there are things that need to be fixed in it, I think, and
there are probably some issues on liability. But it is a way to
say to the companies, here is our goal, you need to make your
network secure and here are some hints, here are some
suggestions on how you can do that. But you can do whatever you
think is best to secure your networks. We have the ability to
come in and look and say is it actually working.
So CFATS, not a perfect model, but it is a little more
flexible than a heavy-handed regulatory approach, and it does
seem to have had some success.
Mr. Long. I, as a precautionary note, we had the folks from
CFATS in a couple of weeks ago, and I asked them, after 4 years
of their program and hundreds of millions of dollars, if they
could name their top three accomplishments, things they had
done. They said, well, Mr. Long, we would say, No. 1, we have
identified the problem. So I didn't listen too hard to 2 and 3.
So before we go dovetailing in and trying to emulate CFATS, I
just want to make sure I understood which program you were
talking about.
Dr. Schneck, I think that you kind of answered my question
that I was going to ask you and on Mr. Richmond, however, I
just wanted to for the record state that there is a small
business in my district, a title company, that had $400,000
electronically removed, and we think, over the weekend, this is
within the last 12 months, $400,000 removed from their bank
account, and we believe, the authorities are telling us, that
it ended up in Pakistan.
When we had Secretary Napolitano in, I was asking her about
if the Secret Service is the one that is in charge of that. She
didn't seem to think they were. The Secret Service had told us
all please listen all along that they are. So I guess, is there
any way small businesses like that can protect themselves? So
you did kind of cover part of it in Mr. Richmond's testimony.
Ms. Schneck. Absolutely. I think it is a good point to note
also, and Ms. Kwon made this point earlier, there are many
agencies that work together in this cyber endeavor. The FBI or
the Secret Service, there are ways that they are
interconnected. I think sometimes when we name one agency over
another, we don't give enough credit to that point.
The Secret Service, not only part of DHS and their efforts,
but they are an integral part of the National Cyber
Investigative Joint Task Force, which I analogize a little bit
to Noah's ark. There are one or two of each in that task force,
so when we have a cyber investigation, we call them directly
because I know that that data that we can share will get all
across the agencies more quickly than if I make 20 phone calls.
So the Secret Service or the FBI, one may be working it at
one point; the other organizations, like the US-CERT, the NCIC,
everybody is engaged at that point.
There are things that small to medium businesses can do. My
best advice from personal experience driving news programs at
the local level as well, build those relationships before you
need them. You can meet your State Homeland Security officers.
You can meet your local police. You can meet--every FBI, every
State has an FBI field office, some have more than one. Go in
and meet, I would recommend, the cyber people, meet the Secret
Service people that work there. They are all friendly, and they
really do want that outreach.
DHS actually has a Protective Service Advisor Program, the
CSAs. These are Federal employees that are positioned in each
of our States. Some States, the bigger ones, have more than
others. Their job, part of their job is to know the community,
know the people there and know the mission of that State, and
those are also great people and know they can tie you directly
back to DHS.
The resources are there. I don't think we as a country have
done enough to tell the smallest communities and the small to
medium businesses that they are available.
Mr. Long. Okay, thank you.
Ms. Kwon, for you, the large U.S. banks have tremendous
security setups, and they still get hit, and if the largest
U.S. banks can't defend themselves, how are regulations that we
are going to impose, or what can we do to help the small
businesses?
Ms. Kwon. Well, this actually goes back to the question
with Mr. Richmond and is a very difficult question because
often implementing defensive security is expensive and often it
is not affordable for a small business or even a medium-sized
business, or in large corporations where large budget cuts have
been seen over the past year, this is often a problem.
I do see the future of moving IT out of the individual
organizations and into a hosted environment, into a cloud
environment, is a good defensive mechanism for a lot of small
companies. You are seeing a lot of that happening today,
particularly in health care, as we are going to electronic
health care records.
You are seeing a lot of doctors moving to IT services
instead of hosting it in their own offices. That way the
security costs can be spread over many doctors' offices as
opposed to being burdened with one. So I definitely see moving
to new ways of implementing IT as a good solution for
particularly small businesses.
Mr. Long. Okay, thank you.
I yield back.
Mr. Lungren. I thank the gentleman for yielding back.
I thank the witnesses for your valuable testimony, both
this panel and the previous panel. You have both help us very
much as we are on this journey to ask the right questions and
to come up with some of the right answers and to see what the
proper role of the Federal Government is in this and where
regulation is appropriate, where cooperation is appropriate.
I have also wondered where the insurance industry is
appropriate in this, since they seem to have a record for risk
management in the world, and how you join all those things
together? Those are some of the things that we will be pursuing
with this subcommittee.
Some Members of the committee may have additional questions
for our witnesses, and I would ask you, if you would, to
respond to those in writing. The hearing record will remain
open for 10 days.
Without objection, the subcommittee stands adjourned.
[Whereupon, at 11:55 a.m., the subcommittee was adjourned.]
A P P E N D I X
----------
Questions From Chairman Daniel E. Lungren of California for Philip
Reitinger
Question 1. The various drafts of comprehensive cyber legislation
that have been circulating recently have attempted to re-organize the
Department. In fact, the former Director of US-CERT states today in her
written testimony that US-CERT should report directly to the Secretary.
Is this necessary?
What are the positives and negatives, as the Department sees them,
to re-organization?
Answer. As detailed in the Quadrennial Homeland Security Review
(QHSR), cybersecurity is a recognized and vital mission responsibility
of the Department of Homeland Security (DHS). The United States
Computer Emergency Readiness Team (US-CERT) is the operational
component of the integrated capabilities within the Department to
satisfy its cybersecurity responsibilities. US-CERT has an enhanced
ability to keep DHS informed about important cybersecurity events since
2009. US-CERT provides watch, warning, and response functions through
the National Cybersecurity and Communications Integration Center to the
Government and to our international and private sector partners. The
US-CERT provides daily input to the Secretary of Homeland Security. The
current reporting arrangement has proven successful through CyberStorm
III as well as all cyber events that have occurred over the past year.
Moreover, the QHSR was followed by the Bottom-Up Review (BUR),
which included a plan for DHS to:
``Increase the focus and integration of DHS's operational cybersecurity
and infrastructure resilience activities. DHS has substantial
operational cybersecurity responsibilities, which are inextricably
intertwined with its responsibilities to manage all hazards risk to
critical infrastructure. DHS typically manages its operational
responsibilities through operating components. However, the majority of
DHS's operational activities relating to cybersecurity and
infrastructure protection and resilience are currently administered by
NPPD, which is designated as a DHS headquarters element. DHS will focus
NPPD's activities on operations and more closely align cyber and
critical infrastructure protection and resilience efforts, in
cooperation with the private sector, to secure cyber networks and make
critical infrastructure resilient.''
Thus, DHS is moving to increasingly integrate physical and
cybersecurity operations across critical infrastructure. Isolating US-
CERT from that integration could degrade the Department's ability to
respond to complex incidents.
Question 2. You mentioned in your statement that DHS signed an MOU
with DoD that ``aligns and enhances America's capabilities to protect
against threats to our critical civilian and military computer systems
and networks.'' How does this MOU benefit the private sector, if at
all?
Answer. The Department of Defense (DOD) and the Department of
Homeland Security (DHS) already work closely together, and this
agreement formalizes a process to increase the ability of each agency
to work in its mission space. In particular, DHS leverages DOD's
significant technical capabilities through its National Security Agency
(NSA). To support DHS activities in protecting Government civilian
networks and critical infrastructure, DOD has collocated a Cryptologic
Services Group and a Cyber Support Element at DHS's National
Cybersecurity and Communications Integration Center (NCCIC), the hub
for responding to domestic cyber incidents.
Through enhanced joint planning and better visibility into each
others' operational processes, the Memorandum of Agreement (MOA) will
increase each agency's effectiveness and build on the capabilities of
each. This in turn will enhance the response capabilities of both
agencies while dealing with incidents that may affect the private
sector.
The MOA does not alter existing DOD and DHS authorities, command
relationships, or other oversight relationships. The MOA will not
extend DOD's cyber involvement with the private sector beyond its
current role. DOD already operates within DHS's National Infrastructure
Protection Plan (NIPP) framework as the Sector Specific Agency for the
Defense Industrial Base. Within the critical infrastructure and key
resources community, DOD works directly with defense industrial base
partners, DHS and Sector Specific Agencies (SSA), and other critical
infrastructure partners in developing plans to assist in reducing risk
and better securing critical infrastructure information systems.
Moreover, the MOA provides a framework that enables DHS to fuse DOD
and NSA information, through the NCCIC, with that of the private
sector. This provides all parties with a more comprehensive situational
awareness of cyber activity impacting the Nation, and permits all
parties to respond more effectively to those threats.
Question 3. How has the OMB memo providing DHS with operational
review of Federal CIO's compliance with FISMA going to affect the
cybersecurity program within NPPD?
Will taking on such wide responsibilities alter the priorities
within the cybersecurity mission? How will the cyber mission be
affected?
Answer. Office of Management and Budget (OMB) Memorandum M-10-28
``outlines and clarifies the respective responsibilities and activities
of OMB, the Cybersecurity Coordinator, and the Department of Homeland
Security (DHS), in particular with respect to the Federal Government's
implementation of the Federal Information Security Management Act of
2002 (FISMA).'' It assigns DHS immediate primary responsibility for the
operational aspects of Federal agency cybersecurity with respect to
FISMA, including, but not limited to:
1. Overseeing the Government-wide and agency-specific
implementation of and reporting on cybersecurity policies and
guidance;
2. Overseeing and assisting Government-wide and agency-specific
efforts to provide adequate, risk-based and cost-effective
cybersecurity;
3. Overseeing the agencies' compliance with FISMA and developing
analyses for OMB to assist in the development of the FISMA
annual report;
4. Overseeing the agencies' cybersecurity operations and incident
response and providing appropriate assistance; and,
5. Annually reviewing the agencies' cybersecurity programs.
The memorandum enables new, proactive protection activities, which
complement the Department's pre-existing, reactive incident response
activities in the area of Federal Executive branch agency
cybersecurity. While the United States Computer Emergency Readiness
Team (US-CERT) is already focused on detecting malicious activity and
providing incident response support, the new activities permit DHS to
better understand the Federal Executive branch's cybersecurity posture
from both an agency-specific perspective and on an enterprise-wide
basis. Examples of specific activities include: FISMA reporting to OMB
based on agency periodic reporting through the CyberScope platform;
recurring Cybersecurity Compliance Validation (CCV) program engagements
with agencies; and establishment of Government or private sector Shared
Service Centers (SSCs) and Blanket Purchase Agreements (BPAs) that
deliver cost-effective security solutions to Federal agencies and
further permit those agencies to allocate limited resources to more
mission-critical activities.
As it continues to implement the memorandum, DHS will conduct
annual agency Chief Information Officer (CIO)/Chief Information
Security Officer (CISO) interviews to maintain awareness of agency-
specific successes and challenges. Interview input enables DHS to
better assess Government-wide and agency-specific needs and gaps, which
ultimately leads to establishing new, targeted capabilities or
processes. DHS recently also began conducting CyberStat reviews with
Agency CIOs and CISOs in coordination with the National Security Staff
and OMB to assist agencies in defining action plans to improve FISMA-
related cybersecurity capabilities.
Undertaken by the Federal Network Security (FNS) branch within DHS'
National Cyber Security Division, the activities pursuant to the
memorandum enable DHS and its agency partners to enhance their security
posture before incidents occur. They also provide US-CERT with a
clearer picture of an agency's networks, systems, and policies when
investigating an incident and providing support.
Question 4. With regard to the private sector the Department is
still more of a coordinator rather than a directive authority, is that
an effective role?
Is the private sector being best served by DHS?
What additional authorities does the Department feel are necessary
to better serve and protect the private sector, and especially critical
infrastructure?
Answer. The Department of Homeland Security (DHS) has a clear
authority to conduct analysis, develop mitigation plans, and provide
warnings with regards to cybersecurity. DHS serves the private sector
in these capacities on a daily basis. However, nearly all of our
private sector programs are built on voluntary participation. These
programs have provided valuable, timely, and actionable vulnerability
information, risk assessments, and mitigation strategies to our private
sector partners.
For instance, both the Cyber Security Evaluations Program and the
Control Systems Security Program (CSSP) conducted more than 50 on-site
voluntary assessments in fiscal year 2010. Within CSSP, the Industrial
Control Systems Cyber Emergency Response Team (ICS-CERT) provides on-
site support to owners and operators of critical infrastructure for
protection against and response to cyber threats, including incident
response, forensic analysis, and site assessments. ICS-CERT also
provides tools and training to increase stakeholder awareness of
evolving threats to industrial control systems. The United States
Computer Emergency Readiness Team (US-CERT) also provides similar
vulnerability, assessment, and mitigation information for private
sector business networks, upon request. Similarly, a large number of
private sector participants take part in the Cyber Exercise Program,
including the recent Cyber Storm III. These exercises are designed to
increase the preparedness of individual participants, and across the
public-private response community as a whole.
Question 5. What is the goal 10-15 years down the road for dot-gov
protection?
Answer. Dot-gov protection is a complex, multi-enterprise issue.
The challenge for dot-gov protection increases as the complexity of the
Information Technology (IT) environment and the data and services
consumed become more distributed. The technologies used to manage
information and to create services that defend information must evolve
with the larger environment.
Dot-gov protection must transition from network and signature-based
security to security that also incorporates information and user-
centric security. Government must adopt IT innovations that better
serve Federal dot-gov users and the users who interface with Government
systems. To effect this transition, Government must make fundamental
changes in the following areas:
Security Operations
Coordinated Risk Management.--Policy and standards must build on
knowledge and experience drawn from various sources, including
intelligence, law enforcement, industry, Government departments and
agencies (D/As), and others. The Federal Government will continue to
play a significant role in the development of policy, standards, and
countermeasures.
Information Sharing.--Information sharing that ensures the rights,
privacy, and protection of individuals and their information is
critical--particularly with the continued expansion of cloud computing,
solutions as a service, and social networking.
Distributed Execution.--Distributed execution requires increased
partnership with D/As and industry. D/As must continuously monitor
their networks and hosts in order to provide insight into the health
and status of Federal systems. Government relies on industry to: (1)
Build product capabilities that secure customers, (2) develop system
capabilities to provide increased capability to self-heal, and (3)
provide prevention-oriented solutions to seek out, detect, and protect
the user from malicious actors.
Technology Attributes
Identity Awareness.--Full protection of dot-gov requires
development of ``identity awareness,'' which is a capability that
provides every component in the ``service chain'' with the ability to
validate identity, ensure its authenticity, and provide access based on
the role of that identity.
Agility.--Advances in mobile computing, cloud-based systems, and
telework are posing new security challenges to the traditional concept
of a static security perimeter protecting private Government systems
and information. Government must be able to adapt as Government
information is stored and accessed wherever an agency mission requires
it. The security challenge associated with this agility is deciding
which new risks are, or are not, acceptable when operating in a
dynamic, mobile, and cloud-based computing environment, which may be
only partially under the agency's control.
Diversity.--In the past, Government agencies operated relatively
homogenous computing environments; Intel-based workstations running
Microsoft operating systems were the norm. Now, we see a proliferation
of device types (netbooks, smart-phones, and tablets) joining
traditional workstations and laptops. The industry development cycle is
now measured in months. We can't predict the next great device or
program, however, we know the trend runs towards smaller, more capable,
and cheaper devices. Furthermore, capabilities begin to blur as new
generations of devices emerge. For example, we now judge phones on
their ability to run applications and computers on their ability to
make calls. The security challenges associated with this diversity of
devices ultimately impacts our ability to secure these devices without
degrading their capabilities.
Convergence.--As device diversity grows, we begin to see a
convergence in network space and functionality. Accessing dot-gov no
longer requires a user to sit in front of a computer. They may access
our networks from any type of network, including traditional Ethernet,
telephone systems, cellular lines, or wireless networks. Gone are the
days when we could devise protections based on relatively stable,
predicable network paths. The security challenge associated with this
convergence ultimately concerns our ability to secure these pathways
without disrupting connectivity.
In order to address these changes, Government must partner with the
private sector and academia to develop new security ideas. These new
ideas must be based on an information- and user-centric view that
enhances new capabilities, rather than impeding them. These
considerations are among those addressed in Enabling Distributed
Security in Cyberspace: Building a Healthy and Resilient Cyber
Ecosystem with Automated Collective Action. This paper, recently
published by DHS, presents a five-level maturity model for ecosystem
focus and convergence that is associated with increasing agility and
provides an approach for achieving and employing these various levels.
Ecosystem maturity is further explored through a discussion of healthy
attributes.
Source: http://blog.dhs.gov/2011/03/enabling-distributed-security-
in.html.
Question 6. Are private sector entities responsive to the efforts
the Government makes with them to warn of threats and mitigate the
consequences of attacks?
Answer. Due to the variety of Department of Homeland Security (DHS)
programs and activities engaged in collaboratively improving
cybersecurity, and the diverse nature of the private sector, private
sector responsiveness varies considerably. Several examples of private
sector responsiveness are outlined below.
United States Computer Emergency Readiness Team (US-CERT).--Formed
in 2003, US-CERT is the operational arm of DHS' National Cyber Security
Division. US-CERT's mission is to lead and direct efforts to improve
the Nation's cybersecurity posture, coordinate cyber information
sharing, and proactively manage cyber risks to the Nation while
protecting the Constitutional rights of Americans.
If a private-sector entity requests assistance from the Government,
DHS may provide on-site or remote assistance to perform analysis and
recommend mitigation actions through US-CERT. This assistance, which is
based on a signed request for technical assistance, is designed to
assist private sector entities in detecting the scope of the malicious
activity and determining mitigation actions to protect the system from
current and future attacks or breaches. In addition, US-CERT provides
standardized warning and mitigation information products to its private
sector partners and constituents through its secure portal and through
its public facing website.
The private sector's response varies depending on the entity and
circumstances. However, we have seen growing private sector interest in
receiving DHS on-site or remote analytical support. Some issues that
may inhibit private sector responsiveness include concerns about: (1)
Exposure of proprietary data; (2) prosecution or regulatory action; and
(3) negative publicity.
Cyber Security Evaluations Program.--Since 2009, the National Cyber
Security Division's (NCSD) Cyber Security Evaluations Program has
conducted on-site assessments through its Cyber Resilience Review. In
2010, NCSD deployed its first Cyber Security Advisor (CSA), located in
the mid-Atlantic region, to promote cyber preparedness, risk
mitigation, and incident response. In this short period of time, it has
become apparent that many critical infrastructure owners and operators
have a general awareness of cybersecurity issues, but only those
partnering with fusion centers, the Federal Bureau of Investigation's
(FBI) Infragard program, local communities-of-interest, or those that
subscribed to the United States Computer Emergency Readiness Team (US-
CERT) informational products, routinely receive Government-provided
threat warnings. To date, only a limited set of owners and operators
have been directly engaged in assessments or other targeted
cybersecurity activities.
Private sector entities, however, respond well when the Government
solicits their participation in specific initiatives and they readily
work with the Government to identify appropriate subject matter experts
within their organizations. They also work with DHS personnel and other
Government representatives to develop threat mitigations. For example,
recent Cyber Unified Coordination Group Integrated Management Team
operations, under the National Cyber Incident Response Plan (NCIRP),
used joint private-public partnerships to raise alerts, and to focus
subject matter expertise and create tractable risk mitigations.
Cyber Exercise Program.--Private sector partners repeatedly mention
that Cyber Storm and other DHS-sponsored exercises help improve their
individual and collective cybersecurity and incident response
capabilities. The number of private sector organizations that played in
Cyber Storm III represented a 75 percent increase over Cyber Storm II
(from 40 to 70 participants). Private sector organizations also
actively participated in initiatives resulting from Cyber Storm III,
including development of the Cyber Storm III summary and observations
report, making edits to the NCIRP, and continuing active membership in
the Unified Coordination Group, an interagency and inter-organizational
coordination body that incorporates public and private sector
officials. Private sector organizations from three critical
infrastructure sectors already have engaged with NCSD to conduct
follow-on exercise activities that examine operational changes made as
a result of Cyber Storm III.
Control Systems Security Program.--The private sector has shown
growing interest in the services of the DHS Control Systems Security
Program (CSSP), which works with public and private sector partners to
improve cybersecurity of critical infrastructure industrial control
systems. Since the advent of their activities, CSSP and the Industrial
Control Systems Cyber Emergency Response Team (ICS-CERT) have grown in
scope and received increasingly more requests for on-site incident
response, assessments, control systems training, and other offerings.
The statistical trend from year-to-year indicates that the community as
a whole is showing an increased interest in the Government program.
Their interest also serves as an indicator of the effectiveness of the
program's outreach and awareness efforts.
More specifically, ICS-CERT works on a voluntary basis with
critical infrastructure owner-operators to respond to and analyze
control systems related incidents, vulnerabilities, and threats. The
team can perform a comprehensive range of services and activities,
including providing sophisticated analysis of malware and deploying
full fly-away teams. ICS-CERT incident response teams (also known as
fly-away teams), which are routinely requested by the private sector,
deploy to critical infrastructure facilities bringing advanced and
unique malware evaluation capabilities and leveraging our control
systems expertise and fused intelligence analysis. The team then works
with the company to develop and implement a mitigation plan to
eliminate the malicious activity and limit the risk of future
incidents. The team appropriately addresses sensitive information using
Protected Critical Infrastructure Information (PCII) protections and
works to mitigate any privacy and civil liberties issues. ICS-CERT is
then able to carefully aggregate and anonymize data about the incident
and disseminate early warning alerts and advisories to critical
infrastructure owners and operators on a sector-by-sector basis.
Actionable alerts to our stakeholder communities include threat
information, validated vulnerabilities, and related patches and
mitigation strategies.
Once the ICS-CERT actively engages with a specific private sector
entity via the voluntary incident response process, oftentimes the
company will continue to implement the mitigation solutions that are
offered, and, if needed, request additional support from DHS in the
area of control systems security. Quite often these engagements evolve
into trusted long-term information-sharing relationships that benefit
both the Government and the private sector.
In addition to sending fly-away teams, DHS is also able to
proactively work with companies to conduct cybersecurity assessments
using the Cyber Security Evaluation Tool (CSET). These no-cost
assessments enable users to assess their network and ICS security
practices against recognized industry and Government standards,
guidelines, and practices. The assessment tool can be used
independently by the asset owner, or upon request, CSSP teams can
assist with a full assessment on-site. The completed CSET assessment
provides a prioritized list of recommendations for increasing the
cybersecurity posture of an organization's ICS or enterprise network
and identifies what is needed to achieve the desired level of security
within the specific standard(s) selected. The CSET has increased in
popularity among our partners over the years; in 2010, for example, the
CSSP conducted 50 on-site assessments spanning 12 critical
infrastructure sectors (including the Electric subsector) and is on
target to complete 75 in fiscal year 2011. The tool is now publicly
available for download on the CSSP website, and countless copies of the
CSET have already been handed out at conferences and other events.
CSSP also works closely with the Department of Energy Idaho
National Laboratory (INL) to provide cybersecurity training to private
sector employees. The training consists of a weeklong class held at
INL, instructing in cyber protection and intrusion mitigation
techniques. Response to the classes has been highly positive--thus far,
DHS and Idaho National Labs have trained over 16,000 control system
officials, from chief executive officers to technical operators.
DHS has worked closely with the private sector as it expands its
diverse set of resources available to the private sector, including
threat and vulnerability situational awareness, risk assessment, and
mitigation, and remote and on-site assistance. The trusted
relationships DHS has with the private sector--through engagements,
working groups, co-location on the NCCIC operations floor, and
outreach--have allowed DHS to incorporate private sector input at every
step as we build our capabilities. Private sector engagement is a
cornerstone of the Department's cybersecurity mission and we look
forward to working with Congress to continue to improve private sector
outreach efforts.
Question 7. How does the cloud, or computing as a service, change
the cybersecurity mission?
Is the Department prepared for the Government's effort to move more
and more computing resources to ``the cloud''?
Answer. The cyber threat environment changes continuously as
malicious actors adjust their tactics and adopt new technologies.
Similarly, the evolution of network architectures necessitates a
cybersecurity posture that is adaptable and focused on risk mitigation.
Regardless of changes in network architecture, the Department of
Homeland Security (DHS) will continue to execute its critical mission
to create a safe and secure cyberspace.
Cloud computing, computing as a service, time-sharing, and utility
computing raise many of the same security issues that emerged when
shared computer services were created in the 1960's. Yet, the
cybersecurity mission remains the same. The many advantages of cloud
computing also create many security challenges. We can never eliminate
all the risks inherent to cloud computing. Instead, we must accept that
differing levels of acceptable risk will exist for different users.
Even if private, community, and public cloud computing business models
use the same security techniques and tools, different business models
create different security risk environments.
DHS encourages cloud computing providers to propose innovative
security solutions that effectively protect Federal systems,
information, communications, and ultimately, the agency's mission.
DHS has avoided requiring providers to follow particular designs or
architecture for cloud computing. For example, due to a constantly
evolving threat environment, the Federal Risk and Authorization
Management Program (FedRAMP) was established to provide a standard
approach to assessing and authorizing cloud computing services and
products. The National Cyber Security Division is actively
participating in the FedRAMP development. FedRAMP allows joint
authorizations and continuous security monitoring services for
Government and commercial cloud computing systems intended for multi-
agency use.
These considerations are among those addressed in Enabling
Distributed Security in Cyberspace: Building a Healthy and Resilient
Cyber Ecosystem with Automated Collective Action. This paper, recently
published by DHS, presents a five-level maturity model for ecosystem
focus and convergence that is associated with increasing agility and
provides an approach for achieving and employing these various levels.
Ecosystem maturity is further explored through a discussion of healthy
attributes.
Source: http://blog.dhs.gov/2011/03/enabling-distributed-security-
in.html.
Questions From Chairman Daniel E. Lungren of California for Gregory C.
Wilshusen
Question 1a. In your testimony you comment how the Government is
lacking a National cybersecurity strategy. I have three related
questions for that issue:
How is the lack of a National cybersecurity strategy hindering the
Government-wide cybersecurity mission?
Question 1b. How, in your opinion, is it hindering DHS's
cybersecurity mission?
Question 1c. How is it affecting the private sector?
Answer. The lack of an updated National cybersecurity strategy can
hinder the effective implementation of the Government-wide
cybersecurity mission. Our work has demonstrated the importance of
comprehensive strategies that specify overarching goals, subordinate
objectives, supporting activities, roles, and responsibilities, and
outcome-oriented performance metrics, as well as time frames to help
ensure accountability and align agency activities with National
priorities. National strategies help shape the policies, programs,
priorities, resource allocations, and standards that can enable Federal
agencies and other stakeholders to implement the strategies and achieve
the intended results. Without such an updated comprehensive National
strategy for cybersecurity, increased risk exists that our Nation will
not be able to obtain the desired posture against sophisticated
threats.
Our work has shown that Federal initiatives and efforts to improve
information security have consistently fallen short of the mark. The
following are illustrative examples:
In October 2010, we reported that only 2 of the 24
recommendations in the President's May 2009 cyber policy review
had been fully implemented. Officials from key agencies
involved in these efforts attributed the partial implementation
status of the remaining 22 recommendations in part to the fact
that agencies had not been assigned roles and responsibilities
with regard to recommendation implementation.\1\ One of these
recommendations was to develop an updated National cyber
strategy; however, administration officials were unable to
provide a draft strategy or milestones for when the updated
strategy is to be finalized and issued. We concluded that
Federal agencies appeared to be making progress toward
implementing the recommendations, but lacked milestones, plans,
and measures that are essential to ensuring successful
recommendation implementation, including the development of an
updated strategy. We recommended that the National
Cybersecurity Coordinator (whose role was established as a
result of the policy review) designate roles and
responsibilities for each recommendation and develop milestones
and plans, including measures to show agencies' progress and
performance.
---------------------------------------------------------------------------
\1\ GAO, Cyberspace Policy: Executive Branch Is Making Progress
Implementing 2009 Policy Review Recommendations, but Sustained
Leadership Is Needed, GAO-11-24 (Washington, DC: Oct. 6, 2010).
---------------------------------------------------------------------------
Our examination of Federal efforts to address the global
aspects of cyberspace determined that the U.S. Government had
not documented a clear vision of how the international efforts
of Federal entities, taken together, support overarching
National goals and that the Federal Government had not forged a
coherent and comprehensive strategy for cyberspace security and
governance policy.\2\ As a result, the United States is
hindered in promoting our National interests in the realm of
cyberspace. We recommended that, among other things, the
National Cybersecurity Coordinator develop with other relevant
entities a comprehensive U.S. global cyberspace strategy. The
coordinator and his staff concurred with our recommendations.
---------------------------------------------------------------------------
\2\ GAO, Cyberspace: United States Faces Challenges in Addressing
Global Cybersecurity and Governance, GAO-10-606 (Washington, DC: July
2, 2010).
---------------------------------------------------------------------------
Our review of Federal cybersecurity research and development
efforts found that among the most critical challenges was the
lack of a prioritized National cybersecurity research and
development agenda, which increased the risk that research and
development efforts will not reflect National priorities, key
decisions will be postponed, and Federal agencies will lack
overall direction for their efforts.\3\ We recommended several
actions, including developing such a National cybersecurity
research and development agenda. The White House Office of
Science and Technology Policy agreed with our recommendation
and provided details on planned actions.
---------------------------------------------------------------------------
\3\ GAO, Cybersecurity: Key Challenges Need to Be Addressed to
Improve Research and Development, GAO-10-466 (Washington, DC: June 3,
2010).
---------------------------------------------------------------------------
The lack of an updated strategy can also affect the Department of
Homeland Security's (DHS) and the private sector's cybersecurity
efforts. While the existing strategy encourages action by private-
sector owners and operators of cyber critical infrastructure, we
testified in March 2009 that a panel of experts agreed that there were
not adequate economic and other incentives (i.e., a value proposition)
for greater investment and partnering in cybersecurity.\4\ The
panelists also stated that the Federal Government should provide valued
services (such as offering useful threat or analysis and warning
information) or incentives (such as grants or tax reductions) to
encourage action by and effective partnerships with the private sector.
---------------------------------------------------------------------------
\4\ GAO, National Cybersecurity Strategy: Key Improvements Are
Needed to Strengthen the Nation's Posture, GAO-09-432T (Washington, DC:
Mar. 10, 2009).
---------------------------------------------------------------------------
In addition, we reported in July 2010 that public sector
stakeholders from DHS and other entities stated that improvements could
be made to the public-private partnership, including improving private
sector sharing of sensitive information.\5\ We also reported that the
expectations of private sector stakeholders were not being met by their
Federal partners in areas related to sharing information about cyber-
based threats to critical infrastructure. We concluded that the public-
private partnership remained a key part of our Nation's efforts but
without improvements in meeting public and private sector expectations,
the partnership would remain less than optimal. As a result, increased
risk existed that owners of critical infrastructure would not have the
appropriate information and mechanisms to thwart sophisticated cyber
attacks that could have catastrophic effects on our Nation's cyber-
reliant critical infrastructure. We recommended that the National
Cybersecurity Coordinator and DHS work with their Federal and private
sector partners to enhance information-sharing efforts, including
leveraging a central focal point for sharing information among the
private sector, civilian government, law enforcement, the military, and
the intelligence community. DHS officials stated that they have made
progress in addressing these recommendations; we will be determining
the extent of that progress as part of our follow-up efforts.
---------------------------------------------------------------------------
\5\ GAO, Critical Infrastructure Protection: Key Private and Public
Cyber Expectations Need to Be Consistently Addressed, GAO-10-628
(Washington, DC: July 15, 2010).
---------------------------------------------------------------------------
Updating the National cybersecurity strategy can increase the
likelihood of improving the cybersecurity posture of our Nation.
Additionally, an updated strategy could help ensure accountability and
align agency activities with the United States' long-term economic and
National security interests, including globally promoting our National
interests in the realm of cyberspace and ensuring that the Nation does
not fall behind in cybersecurity and will be able to adequately protect
its digital infrastructure. As the administration updates the current
strategy, it needs to focus on clearly articulating goals and
objectives, assigning roles and responsibilities, developing
milestones, deploying sufficient resources, defining performance
metrics, monitoring progress, and validating effectiveness of completed
actions.
Our responses to these questions are based on previous work that
was performed in accordance with generally accepted Government auditing
standards. Those standards require that we plan and perform the audit
to obtain sufficient, appropriate evidence to provide a reasonable
basis for our findings and conclusions based on our audit objectives.
We believe that the evidence obtained provides a reasonable basis for
our findings and conclusions based on our audit objectives. Should you
or your office have any questions on the matters discussed in this
letter, please contact me.
Questions From Chairman Daniel E. Lungren of California for Phyllis
Schneck
Question 1a. In your Although it's oft repeated, McAfee shared with
us that when they discovered the Night Dragon attacks, those Federal
agencies who were not contacted first, even maybe hours later,
expressed their disapproval.
How do you coordinate sharing the information with the Federal
Government?
Answer. We are committed to sharing threat information to help the
U.S. Government gain a deeper insight into the threat landscape and
respond to specific attacks. Toward this goal, we work closely with our
customers to ensure that we adhere to our NDA's as required by the law.
Once we are sure that we have met all of our obligations to our
customers, we contact representatives in the various agencies with
authority over cyber security. We do our best to contact all of the
actors at the same time--whether in defense, civilian, or crime
prevention institutions.
Question 1b. Does there need to be a single source of contact?
Answer. We believe that the information-sharing process is
improving. A few years ago, we would experience, on a regular basis, a
high degree of complexity and difficulty getting to all of the right
decision makers in a timely way. We often found that agencies that had
been briefed were unwilling to share information with their colleagues
in other agencies. It generally took us 2 weeks to brief all of the
officials in the agencies. More recently, we have found that the
process is improving. During the recent Night Dragon event, we did one
briefing, for instance, which included defense, NSA, and FBI officials.
This was an example of an improved process.
We understand how complex the information-sharing challenge is in
the U.S. Government. Many rules regulate the way in which information
sharing is done, and there are limitations on the types of information
various agencies can share with each other. These limitations derive
from law and agency regulations that seek to balance National security,
domestic security, and privacy rights. Nevertheless, we would urge that
some type of enhanced procedure be put in place to facilitate the
ability of companies to share information in a manner that enhances
their ability to share information in a rapid and efficient manner with
the Government. Remediating cyber attacks is a complex, time-consuming
process and the more rapidly the private and the public sectors can
respond, the sooner our teams can ensure that vital information and
systems are protected from additional attacks. Bringing down the
response time from weeks to a few days would do much to enhance the
security posture of our country.
Question 2. In a briefing to staff, McAfee brought up the technique
of ``white listing'' where a computer is essentially limited in what
applications it could run, which could potentially limit malware from
infecting a computer.
Could you give us a little more information about the technique and
how you see it being used most effectively?
Answer. White listing technology ensures that only good executable
code can run on protected systems. The technology is used to protect
servers, endpoints, embedded devices, and mobile devices. It is used in
many ATM's, point-of-sale terminals, and Supervisory Control and Data
Acquisition (SCADA) systems. White listing technology narrows the scope
of many embedded systems to ensure that an attacker can't install
malicious code.
White listing is one of the exciting technologies of the future
because it can enable organizations to be much more proactive in
protecting their systems--it gives them much more control because only
good communications can be received. This contrasts in a considerable
way with the older model of security, the anti-virus model, which is
inherently defensive. This model is based on blocking malicious code
and letting everything else into customer sites. This model has been
breaking down for some time given the geometric growth in malware over
the last few years. McAfee detected as much new malware in 2010 as we
detected since the founding of our company 19 years ago. White listing
is an important part of the cyber security solution moving forward.
Questions From Chairman Daniel E. Lungren of California for James A.
Lewis
Question 1a. In some regulated industries, companies do only the
minimum needed to stay compliant with the regulations. In the world of
security, the minimum effort does not necessarily make one more secure.
How does one prevent the ``race to the bottom'' in a regulatory
regime?
Question 1b. How do we change that culture of security to one not
of mere compliance, but security?
Answer. Doing the minimum would be an improvement from where we are
now. That said, there are several measures that can to prevent a ``race
to the bottom.''
The first is to increase transparency and reporting on the number
of probes, breaches, or service disruptions of computer networks. By
reporting on the number of security failures, we would be able to
assess the effectiveness of regulations. The larger goal is to move
companies to automatic monitoring of networks and to adopt something
like the ``IT Dashboard'' OMB is putting in place for Federal networks.
The Security Content Automation Protocol (SCAP) NIST is developing is
an example of emerging approaches that could automatic and accelerate
cybersecurity efforts.
The second would be to allow for some kind of ``spot checks'' of
computer systems, random checks to see if computer networks were
adequately secured. This is a standard law enforcement and regulatory
technique, and could involve DHS or some outside auditor inspecting the
adequacy of a company's cybersecurity efforts. The knowledge that a
random check could be carried out would in and of itself encourage
better compliance.
A related goal would be to avoid defining compliance as a paper-
driven process, where companies filed regular reports on performance.
These are inadequate for several reasons, but the most important is
frequency. Long annual written reports on compliance only benefit
report writers. A better approach would be to require companies to
immediately inform the appropriate agency when their networks have been
successfully penetrated. This changes the metric for compliance. We
want people to report failures and report the actions they have taken
in response immediately. In this, a regulatory approach would be part
of a larger effort to develop a broad understanding of the level and
kind of malicious activities in cyberspace.
Questions From Chairman Daniel E. Lungren of California for Mischel
Kwon
Question 1. In your written statement you advocate separating US-
CERT, the operational arm, from the more policy- and coordination-
driven NCSD. I'm interested in having you elaborate a bit more on that:
How does separating elements of the cybersecurity mission benefit the
Department and/or the private sector especially the critical
infrastructure?
Answer. US-CERT is an operational unit with a very important
mission to support the Federal departments and agencies.
(1) This mission is buried deep within DHS, which makes decision-
making slow because of all the chains of command it must go through
(NCSD, CS&C, NPPD). The operational mission is one that must be enabled
to focus and act quickly.
(2) US-CERT is often distracted and taken off this mission by the
policy and coordination arm of NCSD.
Cyber is a fast-moving space where nimbleness is important for
success. It often takes US-CERT days, even weeks, to get approval for
actions because of the need to go through NCSD, CS&S, NPPD, and then to
get to the Secretaries' attention. As issues go through this chain they
are often distracted by politics and other priorities and delayed
further, or veered off from the operationally correct decision. US-CERT
is often volunteered for programs and projects by the policy and
coordination arm, thereby taking it off its core mission and into
projects that are not planned for, budgeted for, or in the scope of
their expertise.
It is important for this operational mission to be clear. There
must be firm process for changing this mission. It cannot be constantly
changing and moving at the whim of politics driven by a policy team
seeking its own success at the price of US-CERT's.
Today, US-CERT's clear mission--as stated in FISMA--is to support
the Federal departments and agencies. If you were to ask the major
departments and agencies how often US-CERT assists them, you will be
surprised to find out that it is very little. US-CERT's focus is very
fragmented and confused. It has been tasked by NCSD, CS&S, and NPPD to
participate in a plethora of other projects that take US-CERT's
understaffed, under budgeted, and technology-limited National security
operations unit far away from its legislated mission space.
Question 2a. While you were with US-CERT, how often did you provide
technical assistance to private sector entities?
Answer. Once. This is not US-CERT's mission, nor do they have the
expertise, staff, or budget to assist the private sector on a regular
basis.
Question 2b. Does the Department have an established process for
private entities to request assistance?
Answer. No.
Question 2c. If so, how can it be improved? If not, what should it
look like?
Answer. If US-CERT is to take on the mission of assisting private
sector entities it would have to have an increase in budget, staffing,
and tools. Currently, it is not their mission to assist private sector
entities.
Question 3a. In your testimony, you stated that virtualization
through ``cloud'' technologies is the future for information technology
infrastructures.
What are the security risks of moving systems and applications to
the ``cloud''?
Answer. The security risks are similar to those of any IT
infrastructure. The key here is that moving to the ``cloud'' is an
opportunity to bake security in, build it more securely, and revitalize
IT infrastructure and share in the cost of better security mechanisms.
Question 3b. Will we be more secure or less secure from cyber
attacks?
Answer. It depends. If the opportunity to improve security is
taken, it could be more secure, if not . . . no.
Question 3c. If the Federal Government and private companies are
moving to the ``cloud,'' what precautionary measures should be taken to
maintain the integrity of these information systems?
Answer. First and foremost, we should be looking at new security
technologies. Technologies where we can cleanse the known malware from
the infrastructure layer. We need to move to technologies that allow us
to understand what is good and what is bad. We need to move away from
signature-based tools where we have to be infected first in order to
detect the attack. We must move to a more defensive posture where the
attacks can be detected and stopped on the infrastructure layer, before
they reach the users.
Question 4a. In your testimony you discussed the stalemate of
cooperation and information sharing with the private sector as a result
of procurement, privacy, and proprietary information issues.
Answer. First it must be understood that most networks have already
been compromised. It is actually the rare few who identify the
intrusions. With this in mind, we must not take a position of
punishment for those who identify the problems, but we must assist. We
cannot allow cyber attacks to defeat our private or public sector
entities.
Question 4b. What actions need to be taken to aggregate shared
information about known cyber vulnerabilities from the private sector?
Answer. I'm not sure cyber vulnerabilities are the problem. We know
about millions of vulnerabilities. We need to understand more about the
attacks. As a community--whether we are private or public--we need to
know more about the details of the attack that would enable detection.
Not the ``who'', not the ``what'' was taken, but the TTPs, The Tactics,
Techniques, and Procedures the attackers use. I believe, for both
private and public, we need an autonomous entity (I referred to this in
my testimony as a non-profit organization) that can take anonymous TTP
information and make it available for others to use.
Question 4c. What other measures should be taken to encourage
private sector's willingness to share information?
Answer. There are a few places where this can be improved for both
private and public sectors.
(1) Take the attacks and the responses out of the public and press.
You must take the reputational damage issue off the table.
(2) Lower the liability concerns.
(3) Have an anonymous way to share.
NEWSLETTER
|
Join the GlobalSecurity.org mailing list
|
|