[Senate Hearing 112-221]
[From the U.S. Government Printing Office]
S. Hrg. 112-221
PROTECTING CYBERSPACE: ASSESSING THE WHITE HOUSE PROPOSAL
=======================================================================
HEARING
before the
COMMITTEE ON
HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS
UNITED STATES SENATE
ONE HUNDRED TWELFTH CONGRESS
FIRST SESSION
__________
MAY 23, 2011
__________
Available via the World Wide Web: http://www.fdsys.gov/
Printed for the use of the
Committee on Homeland Security and Governmental Affairs
[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
_____
U.S. GOVERNMENT PRINTING OFFICE
67-638 PDF WASHINGTON : 2012
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC
area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC
20402-0001
COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS
JOSEPH I. LIEBERMAN, Connecticut, Chairman
CARL LEVIN, Michigan SUSAN M. COLLINS, Maine
DANIEL K. AKAKA, Hawaii TOM COBURN, Oklahoma
THOMAS R. CARPER, Delaware SCOTT P. BROWN, Massachusetts
MARK L. PRYOR, Arkansas JOHN McCAIN, Arizona
MARY L. LANDRIEU, Louisiana RON JOHNSON, Wisconsin
CLAIRE McCASKILL, Missouri ROB PORTMAN, Ohio
JON TESTER, Montana RAND PAUL, Kentucky
MARK BEGICH, Alaska JERRY MORAN, Kansas
Michael L. Alexander, Staff Director
Jeffrey E. Greene, Senior Counsel
Matthew R. Grote, Professional Staff Member
Nicholas A. Rossi, Minority Staff Director
Brendan P. Shields, Minority Director of Homeland Security Policy
Denise E. Zheng, Minority Professional Staff Member
Trina Driessnack Tyrer, Chief Clerk
Patricia R. Hogan, Publications Clerk and GPO Detailee
Laura W. Kilbride, Hearing Clerk
C O N T E N T S
------
Opening statements:
Page
Senator Lieberman............................................ 1
Senator Collins.............................................. 4
Senator Carper............................................... 6
Prepared statements:
Senator Lieberman............................................ 35
Senator Collins.............................................. 38
WITNESSES
Monday, May 23, 2011
Philip R. Reitinger, Deputy Under Secretary, National Protection
and Programs Directorate, U.S. Department of Homeland Security. 8
Robert J. Butler, Deputy Assistant Secretary for Cyber Policy,
U.S. Department of Defense..................................... 10
Ari Schwatz, Senior Internet Policy Advisor, National Institute
of Standards and Technology, U.S. Department of Commerce....... 11
Jason C. Chipman, Senior Counsel to the Deputy Attorney General,
U.S. Department of Justice..................................... 13
Alphabetical List of Witnesses
Butler, Robert J.:
Testimony.................................................... 10
Joint prepared statement..................................... 40
Chipman, Jason C.:
Testimony.................................................... 13
Joint prepared statement..................................... 40
Reitinger, Philip R.:
Testimony.................................................... 8
Joint prepared statement..................................... 40
Schwartz, Ari:
Testimony.................................................... 11
Joint prepared statement..................................... 40
APPENDIX
Responses to post-hearing questions for the Record from:
Mr. Reitinger, Mr. Butler, Mr. Schwartz, and Mr. Chipman..... 46
PROTECTING CYBERSPACE: ASSESSING THE WHITE HOUSE PROPOSAL
----------
MONDAY, MAY 23, 2011
U.S. Senate,
Committee on Homeland Security
and Governmental Affairs,
Washington, DC.
The Committee met, pursuant to notice, at 10:33 a.m., in
room SD-342, Dirksen Senate Office Building, Hon. Joseph I.
Lieberman, Chairman of the Committee, presiding.
Present: Senators Lieberman, Carper, and Collins.
OPENING STATEMENT OF CHAIRMAN LIEBERMAN
Chairman Lieberman. Good morning. The hearing will come to
order. Thanks to everyone for being here. Thanks particularly
to the representatives of the Administration who are before us
as witnesses.
If there is anyone who does not believe that we urgently
need to pass strong cybersecurity legislation, which is the
topic of our hearing today, I would tell them to look at some
of the high-profile computer attacks that have happened in the
past several months, that is, the ones that we know about.
Let us just take the Sony Corporation as an example. In two
separate attacks, hackers stole the personal and billing
information, including reportedly some of the credit card
numbers, of 100 million people. And when the Sony site finally
reopened last Thursday, the company found that they had not
actually been able to close all the vulnerabilities that had
been opened up in the wake of the first two attacks and that
hackers could still use the information to hijack users'
accounts.
If that does not convince skeptics we have a real
cybersecurity problem in America, then consider the breaches
that have occurred in the cyber systems of organizations that
specialize in cybersecurity. Take our own Oak Ridge National
Laboratory, which has a very important role in fulfilling the
Department of Energy's responsibility to secure our electric
grid from cyber attack, whether by enemy nations or cyber
terrorists. Oak Ridge National Laboratory was itself
successfully cyber attacked just last month.
Or one that has been widely described in the media, RSA, a
company whose SecurID program is used by about 40 million
entities, users, really, at 30,000 companies, including parts
of the Federal Government. And those parts include the Social
Security Administration, the Department of Defense (DOD), and
the U.S. Senate. RSA had valuable security information stolen
from its computers that could compromise these systems and
actually be used in future attacks.
So, bottom line--and these are just a few examples, and
again, these are examples that are on the public record--if we
do not do something soon, the Internet is going to become a
digital Dodge City. Cyberspace is just too important to modern
life for us to sit back and allow that to happen. This is a
place that really cries out for law. It is time to say, if I
may continue the Dodge City metaphor, that there is a new
sheriff in town and we are going to have some law and order
around here, and we could do that, of course, without
compromising, in effect, alongside elevating liberty and
privacy.
The recent release of the White House's proposed
cybersecurity legislation is a very important step in that
direction. I think it represents a turning point in our efforts
to pass the strong measures we need to protect consumers,
businesses, critical infrastructure, and our national security
from cyber attack by terrorists, spies, or crooks.
I am pleased not just by the appearance of the
Administration's cybersecurity legislation, but by its
substance. The President's proposal is similar in many ways to
legislation this Committee reported out earlier in this session
of Congress, and where there are differences, I think we can
work together to find agreement. So I am, in this regard, very
grateful to the witnesses for appearing before us today. This
is the first public testimony that the Administration has given
on its cybersecurity proposal since it was released.
One important area of agreement is the recognition that the
Department of Homeland Security must be given the job of
protecting the ``dot-gov'' and ``dot-com'' domains. In other
words, the Department of Homeland Security (DHS) will be the
new sheriff in cyber-town that we need. A crucial part of this
job will be for DHS to identify critical cyber infrastructure,
the systems or assets that control things like power plants,
electric grids, and pipelines that, if commandeered by our
enemies, could lead to havoc and, of course, death and
destruction. DHS needs that authority and also the ability to
evaluate the risks to those systems.
Once the systems and risks have been identified, their
owners and operators, under the proposal that we have made,
will be required to develop plans to safeguard their systems.
Those plans will be reviewed to ensure they will actually
improve security, reviewed in our proposal by the Department of
Homeland Security, in the White House proposal by government-
accredited third-party evaluators.
Just last week, if I may say, in our role as oversight
Committee of the Department of Homeland Security, that we saw
an example of why this kind of planning is so necessary and why
the Department of Homeland Security has raised itself to a
quality of performance that it deserves to have the job. A
private researcher apparently discovered a major security flaw
in a widely-used industrial control system and planned to
present this research at a conference. When personnel at the
Department of Homeland Security discovered this and explained
to the researcher how dangerous it would be to have this
information out in public before the security flaws had been
patched, he voluntarily canceled his talk. This is very
important because another cybersecurity expert said of this
particular vulnerability, ``This is different from simply
stealing money out of someone's bank account. Things could
explode.''
Besides securing critical infrastructure, our bill and the
White House bill would direct the Department of Homeland
Security to work cooperatively and on a voluntary basis with
the private sector and State and local governments to share
cybersecurity risk and best practice information.
The White House proposal also clears the way for industry
to share cybersecurity information without having to worry
about running afoul of various privacy statutes that impede
information sharing now. The business and government
communities would be free to use this advice as best suits
their needs. There would be no one-size-fits-all mandates or
dictates.
Both the White House bill and our Committee bill also
contain robust privacy oversight to ensure that our broader
cybersecurity efforts do not impact individual privacy or civil
liberties.
And finally, both our proposals would also reform and
update the Federal Information Security Management Act (FISMA)
to require continuous monitoring and protection of our Federal
computer networks and to do away with the current paper-based
reporting system.
Now, one key difference between our bill and the White
House proposal is that our legislation creates a White House
Office of Cyberspace Policy with a Senate-confirmed leader. We
believe that the stakes are so high when it comes to
cybersecurity for our country that whoever holds that position
should be confirmed by the Senate and, therefore, accountable
to Congress.
Our Committee's bill would also clarify the President's
authority to act in the event of a true cyber emergency while
at the same time ensuring that the President cannot take any
action that would limit free speech or shut down the Internet.
In its original version, this section was, in our opinion,
misconstrued, and we have tried in the language that was
reported out of Committee to reassure everybody about the
limitations, the very limited circumstances under which the
President could act and the limited range of his actions.
The Administration, on the other hand, and I will be
interested in discussing this, believes that additional
statutory authority in this regard is unnecessary because the
President has the authority that we give him in this proposal
already in existing law.
Bottom line, the Internet is a thrilling new frontier of
our age, with a plugged-in population of almost two billion
now, and that number is growing every day. The Internet has
created a revolution in commerce, communications,
entertainment, finance, and government, really, just about
every aspect of our lives. But what we are saying is that it
must not be a lawless frontier. I believe that with the
proposals we have in front of us, we can bring about the needed
change this year to make the Internet safer and more secure.
The Majority Leader, Senator Harry Reid, has taken a very
active interest in this legislation. It remains a priority of
his for this session. I have said to him that I believe it is
the most important piece of legislation coming out of our
Homeland Security Committee in this session. He is working, I
am pleased to say, with the Republican leader, Senator Mitch
McConnell, as Senator Collins and I, of course, have worked
together here. There are five or six different committees of
the Senate that claim some part of the jurisdiction over this
subject matter, and I believe it is the intention of the
bipartisan leadership of the Senate to establish a process by
which all those Committees can, as quickly as possible,
negotiate any remaining differences in the bills that have come
out of committee so that we can bring it to the Senate floor as
quickly as possible.
We have had a very successful round of negotiations with
the Commerce Committee, which is the other committee claiming
major jurisdiction here, and we have resolved just about all of
the differences, not every one, but just about every one that
we had between us.
Now, before I yield to Senator Collins, I want to just take
a moment to thank Phil Reitinger, who, as Deputy Under
Secretary of the National Protection and Programs Directorate
has done a great job in a relatively short period of time,
really elevating the quality of the cybersecurity operations at
DHS and has been a real leader in crafting this White House
proposal, including working very productively and cooperatively
with our Committee. So we thank you for that, Mr. Reitinger.
With the bill finalized, as I suppose most people in the
room know, Mr. Reitinger has decided to move on to the next
great chapter of his life. I am not going to put him under oath
to have him declare exactly what that will be yet, but whatever
it is, we wish you well and thank you for your public service,
which has made a real difference to our country.
Senator Collins.
OPENING STATEMENT OF SENATOR COLLINS
Senator Collins. Thank you, Mr. Chairman.
Let me begin by saying that I am very pleased that the
Administration is now fully engaged on the imperative issue of
drafting and passing cybersecurity legislation. Experts tell me
that the cyber arena is where the biggest gap exists between
the threat level and vulnerabilities and our level of
preparedness.
Virtually every week, we learn of another massive cyber
breach. The company that authenticates users seeking to access
Senate networks was hacked. As the Chairman has indicated,
Sony's online gaming network was breached. This morning, we
read in our newspapers that the repressive government of Syria
attacked the social media sites of dissidents and protesters.
The truth is that the number and sophistication of cyber
attacks continue to grow each and every day. The Federal Bureau
of Investigations (FBI) reports that small and medium-sized
businesses in our country lost more than $11 million over the
past year in online scams in which stolen banking credentials
were used for fraudulent buyer transfers to Chinese companies.
Worldwide, the annual cost of cyber crime has climbed to more
than $1 trillion. And according to the alarming testimony last
year from the office of the Senate Sergeant at Arms, on
average, each month, 1.8 billion cyber attacks target the
computer systems of Congress and the Executive Branch.
Unfortunately, the government's overall approach to
cybersecurity has been disjointed and uncoordinated to date.
The threat is simply too great to allow this to continue. The
need for Congress to pass comprehensive cybersecurity
legislation is more urgent than ever.
So I am pleased that the White House has now joined the
efforts that this Committee has undertaken over the past few
years to develop a bill to help safeguard the American people
from a cyber September 11, 2001. I am also encouraged that the
Administration's approach is similar in many respects to our
framework. Both bills call for a strong public-private
partnership to improve cybersecurity. Our bill would bolster
sharing within the private sector and across government of
actionable threat intelligence that would help protect the
private sector from advanced cyber threats. It would also
direct the Department of Homeland Security to collaborate with
the private sector to develop and promote cybersecurity best
practices.
Like our bill, the White House proposal recognizes that the
Department of Homeland Security should be the appropriate
agency to lead the Federal effort to secure Federal civilian
agencies, the dot-gov domain, as well as the critical
infrastructure in the private sector and public sector against
cyber threats.
I believe that cybersecurity at DHS must be led by a strong
and empowered director who can close the coordination gaps that
now exist. This leader should report directly to the Secretary
of Homeland Security and also serve as the principal adviser to
the President on cybersecurity. To me, the best construct,
which is not included in the White House proposal, is modeled
on the National Counterterrorism Center and would apply a
multi-agency approach to this issue that would be within DHS,
and I look forward to exploring that issue with our witnesses
this morning.
On a positive note, the Administration's approach to
securing our Nation's most critical infrastructure is very
similar to the risk-based approach in our bill. Our bill
differs, however, in providing liability protection as an
incentive for companies to maintain continuous compliance with
risk-based performance requirements.
We should also detail the extent of the President's
authority to deal with cyber emergencies. As the Chairman has
pointed out, our bill has explicit provisions preventing the
President from shutting down the Internet. It also places
limits on the length of any emergency actions, requires
reporting to Congress, ensures remedial actions are the least
disruptive steps feasible, and includes privacy protections. By
contrast, and I must say this baffles me, the Administration
appears to be relying on outmoded yet potentially sweeping
authorities granted in the Communications Act of 1934. I want
to emphasize that date to point out just how outmoded those
authorities are.
Our bill explicitly calls for the development of a supply
chain strategy to leverage the Federal Government's buying
power to drive improvements in cybersecurity. This would have
beneficial ripple effects in the larger commercial market. As a
very large customer, the Federal Government can contract with
companies to innovate and improve the security of their
information technology (IT) services and products. These
innovations could lead to new security baseline for services
and products offered to the private sector and the general
public without mandating specific market outcomes.
In addition, our bill would give DHS the authority to hire
and retain highly qualified cybersecurity professionals.
I look forward to discussing these important issues with
our witnesses today, but most of all, to working together to
finally secure the passage of comprehensive cybersecurity
legislation.
Thank you, Mr. Chairman.
Chairman Lieberman. Thanks, Senator Collins. Thank you very
much.
Senator Carper has been a cosponsor with Senator Collins
and me of the legislation originally introduced, particularly
with interest over the longer haul in the FISMA part of the
bill, but overall, and I would welcome an opening statement
from you at this time.
OPENING STATEMENT OF SENATOR CARPER
Senator Carper. Thanks, Mr. Chairman. I am delighted to
give one. As the clock was ticking down into this weekend and
we were approaching the end of the world----
Chairman Lieberman. Yes. [Laughter.]
Senator Carper [continuing]. I was thinking, we worked so
hard to try to develop consensus on this Committee----
Chairman Lieberman. Right.
Senator Carper [continuing]. With the Commerce Committee,
and with the Administration. It would really be a shame if it
all ended before we got this done.
Chairman Lieberman. It could be that is why it did not end.
Senator Carper. The good news is we are all still here. The
bad news is, so are the hackers that are trying to get into our
bank accounts and steal our secrets, whether military secrets
or all kinds of trade secrets, innovation secrets. I guess if
you had to choose between one outcome or the other, this is
probably the better outcome, and I am pleased that we have some
consensus that is building. I really want to thank both of you
for helping to spearhead that.
I am delighted that we are moving swiftly to hold this
hearing on the Administration's proposal to improve our
Nation's ability to defend against cyber attacks, and I ran
into a couple of these fellows earlier this morning coming into
the Dirksen Building. One of them actually had his father in
tow, and we especially welcome him and thank him for sharing
his son with us.
It has now been nearly 10 years since September 11, 2001,
and over that period of time, our country has done a tremendous
amount of work to defend against the kinds of attacks that we
saw that day. We started with our airports, launching pad of
the destruction the September 11, 2001 terrorists inflicted
upon us, and under your leadership, Mr. Chairman, and the
leadership of Senator Collins, we then dramatically reorganized
our government to better prevent attacks and prepare for the
consequences of both natural and manmade disasters. We have
also worked to better secure our ports, our mass transit
systems, our chemical facilities, and other key pieces of our
infrastructure.
Today, the architect of September 11, 2001, is dead. And
while we still face many threats, I think we can say that our
country is, in a number of ways, safer, I think maybe much
safer, than it was on September 10, 2001. That does not mean we
sit back and take it easy. We are not going to do that. But we
do face a new threat today that I do not think was even on our
radar screen 10 years ago. More and more Americans live their
lives and conduct their businesses online, and this has created
an attractive target for hackers and criminals looking to steal
information or money or just to cause mischief.
At the same time, we have an increased reliance on
sophisticated technology to keep the lights on, keep our water
clean, run our factories, and even to fight wars and defend our
country. Terrorists with the ability to compromise and damage
or destroy the technology we depend on every day could cause
serious damage, potentially even on the scale of a cyber
September 11, 2001.
In past congresses, I have introduced legislation that
would begin the process of addressing our cyber vulnerabilities
by improving the way in which Federal agencies secure their
networks. Over the course of a series of hearings, the
Subcommittee on Federal Financial Management, Government
Information, Federal Services, and International Security,
which I chair, learned that agencies were relying on an
outdated, expensive, paperwork-heavy systems to secure the
technology they rely on to serve the public and protect the
important data they are entrusted with. Nobody could say for
sure that the system worked and that our agencies were safe
from cyber attack. My legislation aimed to hold agencies
accountable for continuously monitoring their networks to
ensure that they are as secure as possible at all times.
Last year, Mr. Chairman, I was pleased to join with you and
Senator Collins in developing comprehensive cybersecurity
legislation that would have better secured agency networks
while also beginning the process of working with the private
sector to secure the critical systems that they own. We
introduced what I think as an improved version of our bill
again this year.
As my colleagues are aware, it has proven difficult so far
this year to find bipartisan consensus on many issues here in
the Senate. I have a feeling, though, that it might just be
possible in this instance to work across the aisle, like we did
after September 11, 2001, to address the serious security
challenges that we face as a country. It is my hope, however,
that we can act this time before the damage is done.
Thank you. It is great to be here with both of you and we
look forward to hearing from our witnesses.
Chairman Lieberman. Thanks, Senator Carper.
Let me just stress something you said. A while back,
Senator Reid and Senator McConnell called in the chairs of the
six committees with jurisdiction over some aspect of
cybersecurity and the Ranking Republican members. It is a sad
fact of life around here that I cannot remember the last time
that happened. But it also, in this regard, shows how seriously
the bipartisan leadership of the Senate takes the cybersecurity
challenge. And though there are differences that may, in at
least one case, fall on partisan lines, this is not a partisan
debate. It is a national security debate. And it is an economic
growth and security debate. I am confident we are going to go
at it with national interests first and partisan interests way
behind.
Mr. Reitinger, welcome. This could be the last time you
come before us as a witness, so we are probably going to be
especially brutal in our cross examination. But, truthfully,
thanks for all you have done and we welcome your testimony now.
TESTIMONY OF PHILIP R. REITINGER,\1\ DEPUTY UNDER SECRETARY,
NATIONAL PROTECTION AND PROGRAMS DIRECTORATE, U.S. DEPARTMENT
OF HOMELAND SECURITY
Mr. Reitinger. Thank you very much, Chairman Lieberman,
Ranking Member Collins, and Senator Carper, for your leadership
on this issue.
---------------------------------------------------------------------------
\1\ The joint prepared statement of Mr. Reitinger, Mr. Butler, Mr.
Schwatz, and Mr. Chipman appears in the Appendix on page 40.
---------------------------------------------------------------------------
The bipartisan approach and the leadership this Committee
has shown on this issue has been inspiring to me and the many
people I work with, and I would like to thank you, as you
thanked me for my efforts, for your efforts to keep this issue
on the front burner and to move forward.
Clearly, where you stand depends on where you sit, and I
sit in cybersecurity. I would agree with all three of you that
there is no more important issue that we need to address in the
immediate future than that of cybersecurity. Clearly, the
threats are real and they are growing. The hackers are getting
better and better and better day to day, and we are depending
more and more on the infrastructure which they are attacking
every day. This makes our risk profile more and more
significant.
It is an issue of intellectual property. Our intellectual
property is being stolen. It is an issue of identity theft and
our personal information being stolen. But it is much more than
that. It is a national security issue. Can we deploy our assets
to defend our country? It is a homeland security issue. When
you call 911, do people show up? And it is an issue of critical
infrastructure protection, not just, again, are our assets
taken, but is the power on? Are the phone systems working? Do
we have the services we need to operate as a country? No other
issue, to my mind, ties together the need for economic success,
for economic security, for national security, and homeland
security like this issue.
This is a place where we must move forward and we must
focus on outcomes. How do we ensure that government has the
authorities and the processes and the private sector is moving
forward in the right way to jointly advance this issue?
So given the leadership that this Committee has shown,
including the work that was done by it in the past Congress,
the Administration worked long and hard to put together a
legislative proposal which we transmitted to Congress a couple
of weeks ago. Certainly, it is a broad issue, but one that does
not cover all of the subjects that had been under discussion on
the Hill, and we recognize that. So it is the Administration's
input into the discussion and not a bill that we expect the
Congress to pass without discussion. We look forward strongly
to the discussions that we will have with the Members of this
Committee and with the Senate and the House, generally, to make
sure that we all move forward in a bipartisan way.
And I cannot emphasize, as a number of the Senators did,
the importance of approaching this in a bipartisan way going
forward. Cybersecurity cuts across these issues. The
Administration's approach over time has not been to say the
work of the past Administration was wrong. Therefore, we are
going to go in a different direction. Instead, we have tried to
take the Comprehensive National Cybersecurity Initiative, which
began in the Bush Administration, and continue to advance its
efforts and enhance them so that we could move forward as a
Nation.
So this proposal does a number of things. It is divided
into three main categories: Protecting the American people,
protecting government systems, and protecting critical
infrastructure. I am going to talk about some of the proposals
in those last two categories rather briefly and then I am happy
to explore them in the question and answer session.
Within the protecting of the critical infrastructure, one
of the things that the bill does, as the Senator indicated, is
it gives DHS much clearer authority and responsibility to work
in a voluntary way with the private sector. The government does
not have all of the answers, but it has some of the answers and
it can help the private sector. And so it gives DHS the mission
and authorities to help the private sector.
It, as the Chairman indicated, speeds information sharing
so that we can get much better data much more rapidly from the
private sector so we can have real situational awareness, a
real national common operating picture of what the threats look
like.
And it, as was discussed in the opening statements of the
Senators, creates a framework very similar in many ways to that
which the Committee included in its bill that would bring
private sector efforts to bear, provide benefits to the private
sector companies that identify a set of risks, cybersecurity
risks to be identified by DHS, as in the Lieberman-Collins-
Carper proposal that came up in the last Congress, with some
differences, but a very similar approach.
With regard to protecting the government, the bill does a
number of things. It takes a number of the proposals, that
Senator Carper has been in the lead in advancing, in
modernizing FISMA, taking the ongoing work that has been moving
forward to move policy, operational, and oversight mechanisms
from the Office of Management and Budget (OMB) to the
Department of Homeland Security so we could unite all of those
things and then have the capability to observe in real time by
continuously monitoring agency networks, as it has been called
for, focus on outcomes, and when problems arise, respond to
them in real time. Change policy, change oversight, change
mechanisms, creating that center of gravity that the Chairman
referred to, to much more aggressively protect Federal networks
under the Federal Information Security Management Act.
It strengthens DHS's role to deploy more rapidly intrusion
protection, intrusion prevention, and other mechanisms for the
Federal Government, for example, resolving some of the legal
questions that have slowed the deployment of EINSTEIN 2 and
EINSTEIN 3 systems. We are continuing to move forward
aggressively to deploy them, but the more rapidly we can do
that, the better. And it gives DHS, recognizing our similar
role to the Department of Defense with regard to Federal
civilian networks, similar authorities with regard to
personnel, so we could hire people and bring them on board as
rapidly as they can in the Department of Defense.
In conclusion, I would simply like to say, in reference to
your comments, Chairman, I wanted to offer my thanks to this
Committee. I have been with the Department a little over 2
years and it has been one of the best experiences of my life.
It has been a real opportunity to serve my country. As I said
at the start, I have found the work of this Committee and the
focus that you have brought to the issue inspiring to me and
inspiring to the entire team I have, including a number of
people who are seated behind me, such as Assistant Secretary
Greg Schaffer, who will be the Acting Deputy Under Secretary
when I depart.
Thank you very much for your leadership of this issue. I
look forward to continuing to work with you in whatever new
role comes to me. Thank you.
Chairman Lieberman. Thank you very much.
We will go now to Robert Butler, Deputy Assistant Secretary
of Defense for Cyber Policy. Thanks for being here.
TESTIMONY OF ROBERT J. BUTLER,\1\ DEPUTY ASSISTANT SECRETARY
FOR CYBER POLICY, U.S. DEPARTMENT OF DEFENSE
Mr. Butler. Thank you, Chairman Lieberman, Senator Collins,
and Senator Carper. It truly is a distinct honor and privilege
to be before you today. From the Department of Defense's
perspective, as has been discussed, we focus first and
initially on the threat, a threat that continues to grow
against our critical information systems that comes from nation
states, terrorists, criminal organizations, and malicious
hackers.
---------------------------------------------------------------------------
\1\ The joint prepared statement of Mr. Reitinger, Mr. Butler, Mr.
Schwatz, and Mr. Chipman appears in the Appendix on page 40.
---------------------------------------------------------------------------
DOD is reliant, as you know, on the Nation's critical
infrastructure, whether we are talking about deployment or
employment of forces. We are critically dependent on power
generation, all modes of the transportation sector,
telecommunications, of course, and the defense industrial base
to perform the missions that we have been assigned as well as
are expected to do overseas.
Just as our reliance on critical infrastructure has grown,
so, too, have the threats that we are facing today. Probably
the most perplexing concern is the asymmetric threats, the
threats that continue to advance in sophistication and in
persistence. And so it is not just about intellectual property
theft today, but the real possibility of a large-scale attack
on any segment of America's critical infrastructure that would
be disruptive to our way of life.
I believe that fact has been recognized and encouraged
discussion on the matter of what we are about to deal with
today. And, in fact, as the President has stated, the status
quo is really no longer acceptable, not when there is so much
at stake and we can and must do better.
The most important aspect from DOD's perspective as we look
at the Nation's critical infrastructure and what to do about it
is really that it is not dependent upon any particular entity
or party. It really requires a whole of government and really a
whole of America approach, necessitating many different Federal
agencies, State governments, and the private sector to work
together.
This proposed legislation is an important step in that
direction. It breaks down the barriers to information sharing
so that stakeholders can really communicate effectively. It
updates the criminal statutes, such as the Racketeering,
Influenced, and Corrupt Organizations Act, to deter criminal
activity. It engages the private sector as valuable
stakeholders and really strengthens the ability of the
Department of Homeland Security to lead the Executive Branch in
defending the Nation against this threat. As Mr. Reitinger has
explained, it really advances us not only in FISMA, but in
other provisions, especially in growing the next generation
workforce and hiring practices and exchange of personnel.
Importantly, this legislation accomplishes all of this while
respecting the values of freedom and ensuring the protection of
privacy and civil liberties that we cherish so deeply in our
country.
The Department of Defense has an important role, as you
know, in protecting the military networks and the national
security systems while providing support and technical
capabilities to help protect other critical infrastructure. DOD
has and will continue to work hand-in-hand with the departments
alongside of us here at this table as well as the other
Departments within the Executive Branch and with the private
sector, in countering cyber threats and protecting our national
critical infrastructure. We really look forward to the
leadership that this Committee has taken and working with
Congress to make sure the Executive Branch has the appropriate
authorities for cybersecurity and improving the overall
security and safety of our Nation. Thank you.
Chairman Lieberman. Thank you, Mr. Butler. I appreciate
that you are here.
Next, we will go to a familiar face at the Committee, Ari
Schwartz, who is here before us today as the Senior Internet
Policy Advisor at the National Institute of Standards and
Technology (NIST) at the Department of Commerce. Thank you for
being here.
TESTIMONY OF ARI SCHWARTZ,\1\ SENIOR INTERNET POLICY ADVISOR,
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, U.S. DEPARTMENT
OF COMMERCE
Mr. Schwartz. Thank you, Mr. Chairman. It is good to be
back. Ranking Member Collins, Senator Carper, and Mr. Chairman,
it is a pleasure to be here and thank you for inviting me to
testify on behalf of the Department of Commerce and the
National Institute of Standards and Technology on the
Administration's cybersecurity legislative proposal.
---------------------------------------------------------------------------
\1\ The joint prepared statement of Mr. Reitinger, Mr. Butler, Mr.
Schwatz, and Mr. Chipman appears in the Appendix on page 40.
---------------------------------------------------------------------------
The main goal of the proposal is really to maximize the
country's effectiveness in protecting the security of key
critical infrastructure networks and systems that rely on the
Internet, while also minimizing the regulatory burden on the
entities that it covers and protecting the privacy and civil
liberties of the public--quite a tall order.
I will be addressing five important pieces of the proposal.
The first is creating the security plans, as Senator Collins
discussed in detail. Second is promoting secure data centers.
Third is protecting Federal systems. Fourth, data breach
reporting. And fifth, privacy protections.
An important theme of the proposal is accountability
through disclosure. In requiring creation of security plans,
the Administration is promoting the use of private sector
expertise and innovation over top-down regulation. Importantly,
the proposal only covers the core critical infrastructure as it
relates to cybersecurity. DHS would define these sectors
through an open public rulemaking process. The critical
infrastructure entities will take the lead in developing
frameworks of performance standards for mitigating identified
cybersecurity risks and could ask the National Institute of
Standards and Technology to work with them to help create
cybersecurity frameworks.
There will be strong incentive for both industry to build
effective frameworks and for DHS to approve those created by
industry. The entities involved will want the certainty of
knowing that their approach has been approved, and DHS will
benefit from knowing that it will not need to invest the
resource-intensive approach of developing a government-mandated
framework unless industry really fails to act. Covered critical
infrastructure firms and their executives will have to sign off
on the cybersecurity plans, subject them to performance
evaluation, and disclose them in their annual reports.
Rather than substituting the government's judgment for
private firms, the plan holds the covered entities accountable
to consumers in the market. This encourages innovation in
mitigation strategies as well as improving adherence to best
practice by facilitating greater transparency, understanding,
and collaboration. The main goal is to create an institutional
culture in which cybersecurity is part of everyday practice
without creating a slow-moving regulatory structure.
In that same spirit, the Administration also seeks to
promote cloud services that can provide more efficient services
and better security to government agencies and a wide range of
businesses, particularly small business. To do so, the draft
legislation proposes to prevent States from requiring companies
to build data centers in that State, except where expressly
authorized by Federal law.
The proposal also clarifies roles and responsibilities for
setting Federal information security standards. Importantly,
the Secretary of Commerce will maintain the responsibility for
promulgating standards and guidelines, which will continue to
be developed by NIST. DHS will use these standards as a basis
for the binding directive and memoranda issued to Federal
agencies. A working partnership between Commerce, NIST, and DHS
will be essential to ensure that agencies receive information
security requirements that are developed with the appropriate
technical, operational, and policy expertise.
On data breach reporting, as my colleague from the
Department of Justice (DOJ) will detail, the Administration has
learned a good deal from the States, selecting and augmenting
those strategies and practices we felt most effective to
protect both security and privacy. The legislation will help
build certainty and trust in the marketplace by making it
easier for consumers to understand the breach notices that they
receive and why they are receiving them. As a result, they will
better be able to take appropriate action.
As Secretary Gary Locke and others at the Commerce
Department have heard from many companies in different
industries, including in response to our Notice of Inquiry on
the topic last year, a nationwide standard for data breach
notification will make compliance much easier for the wide
range of companies that must follow 47 different legal
standards today.
Finally, I would like to point out that many of the new and
augmented authorities in this package are governed by a new
privacy framework for government that we believe would enhance
privacy protection for information collected and shared with
government for cybersecurity purposes. This framework would be
created by DHS in consultation with privacy and civil liberty
experts and the Attorney General, subject to regular reports by
the Justice Privacy Office, and overseen by the independent
Privacy and Civil Liberties Oversight Board. Government
violations of this framework will be subject to both criminal
and financial penalties.
Thank you again for holding this important hearing, and
thank you for your leadership on this issue. I look forward to
your questions.
Chairman Lieberman. Thanks, Mr. Schwartz. As I bid farewell
to Mr. Reitinger, I should have formally welcome you to
government service.
Mr. Schwartz. Thank you.
Chairman Lieberman. You appeared before us many times in
your independent advocacy role.
The final expert on the panel will be Jason Chipman, Senior
Counsel to the Deputy Attorney General, Department of Justice.
We now look forward to your testimony.
TESTIMONY OF JASON C. CHIPMAN,\1\ SENIOR COUNSEL TO THE DEPUTY
ATTORNEY GENERAL, U.S. DEPARTMENT OF JUSTICE
Mr. Chipman. Thank you, Chairman Lieberman, Ranking Member
Collins, and Senator Carper. It is a real pleasure to be here
and I appreciate the opportunity to testify on behalf of the
Department of Justice about the Administration's cyber
legislative proposal.
---------------------------------------------------------------------------
\1\ The joint prepared statement of Mr. Reitinger, Mr. Butler, Mr.
Schwatz, and Mr. Chipman appears in the Appendix on page 40.
---------------------------------------------------------------------------
This Committee knows well that the United States confronts
a serious and complex cybersecurity threat. The critical
infrastructure of our Nation is vulnerable to cyber intrusions
that could damage vital national resources and put lives at
risk. Indeed, intruders have stolen confidential information,
intellectual property, and substantial amounts of money.
At the Department of Justice, we see cyber crime on the
rise, with criminal syndicates operating around the globe with
increasing sophistication to steal from innocent Americans.
Even more alarming, these intrusions might be creating future
access points through which criminal actors and other
adversaries can compromise critical systems during a crisis or
for other nefarious purposes.
President Obama has stated publicly that cyber threats
represent one of the great challenges to the economic and
national security of our country. Indeed, given the scope of
the problem, as you have heard and as you know, the President
has made this a significant priority for the Administration.
Over the past few years, all of the agencies before you
have made great progress in confronting these threats. At the
Justice Department, our criminal and national security
investigators and prosecutors and attorneys have been working
hard establishing new units, like the National Cyber
Investigative Joint Task Force, to pull together the resources
of many different agencies to investigate and address
cybersecurity threats.
With that said and despite good work in this area, the
problem is far from resolved. It is clear that new legislation
can help tremendously to improve cybersecurity in a number of
critical respects.
From the Justice Department's perspective, I would like to
take a moment to highlight two parts of the Administration's
cyber legislative package aimed at confronting identity theft
and at improving the tools that we use to fight computer
crimes.
First, the Administration's proposal includes a new
national data breach reporting requirement. Data breaches
frequently involve the compromise of sensitive personal
information that subject individual consumers and citizens to
identity theft or to other crimes. Right now, as Mr. Schwartz
mentioned, there are 47 different State laws that apply in
different situations and require reporting through different
mechanisms. The Administration's data breach proposal would
replace those 47 State laws with a single national standard
applicable to companies and institutions that meet a minimum
threshold set forward in the draft bill. If enacted into law,
this proposal would ensure that companies notify consumers when
sensitive personal information is stolen or compromised, and it
would require that they give them information about what they
can do in response to the theft or the compromise of their
information.
The proposal would empower the Federal Trade Commission to
enforce the reporting requirements and it would establish new
requirements for what must be reported to law enforcement
agencies when there is a significant intrusion so that
institutions like the FBI and the U.S. Secret Service can
quickly work to try to identify the culprits and protect others
from being victimized. We believe that the national standard
would also make compliance easier for industry, which currently
has the burden of operating under a patchwork of different
rules.
Second, the Administration's proposal includes a handful of
changes to the criminal laws aimed at ensuring that computer
crimes and cyber intrusions can be investigated and punished to
the same extent as other similar criminal activity. Of
particular note, the Administration's proposal would clearly
make it unlawful to damage or shut down a computer system that
manages or controls critical infrastructure, and it would
establish minimum sentence requirements for such activities. We
believe this narrow, focused proposal will provide strong
deterrence to this class of serious and sometimes potentially
life-threatening crimes.
Moreover, because cyber crime has become a big business for
organized crime groups, the Administration proposal would make
it clear that the Racketeering, Influenced, and Corrupt
Organizations Act (RICO), applies to computer crimes.
Also the proposal would harmonize the sentences and
penalties for violations of the Computer Fraud and Abuse Act.
For example, acts of wire fraud in the United States carry a
maximum penalty of 20 years in prison, but similar violations
of the Criminal Fraud and Abuse Act very frequently carry a
maximum of 5 years in prison. That is a discrepancy we think
should be corrected.
Mr. Chairman and Members of the Committee, this is an
important topic. The country is at risk. There is a lot of work
to be done to protect the critical infrastructure of our
country and to stop computer crimes from victimizing and
threatening Americans. I look forward to answering your
questions. Thank you very much.
Chairman Lieberman. Thanks, Mr. Chipman.
You know, the testimony of the four of you makes clear how
comprehensive the President's proposal is, of course, as is the
Committee's proposal. I think both are necessarily
comprehensive administrative reorganizations to better deal
with the security threat, both also involve questions of how we
protect civil liberties, privacy, and then what the role of the
law is here. Are there not certain kinds of behavior in
cyberspace that ought to be officially designated as illegal,
adjusting existing legal framework. So the testimony has been
very helpful.
We will do a first round of 7 minutes each.
Mr. Butler, let me begin with you because in the discussion
of cybersecurity, both inside Congress and outside, and various
times, people have said, look, the expertise in this area and
in our government is in the Department of Defense and the
National Security Agency (NSA). Maybe DHS is not the right
place to be given enhanced authorities, but I take it from your
testimony and the process that was going on within the
Administration that a decision has been made which is supported
by the Department of Defense that when it comes to the dot-gov,
that is, the non-Defense dot-gov and dot-com networks, that it
is the Department of Homeland Security that should have primary
responsibility. Is that right?
Mr. Butler. That is correct, Mr. Chairman. If you have
watched the Department of Defense and the Department of
Homeland Security dialogue over the last couple of years, it
really has grown in the areas of collaboration. Probably one of
the hallmark events was last year's signing of a Memorandum of
Agreement (MOA) between Secretary Janet Napolitano and
Secretary Robert Gates which laid out a foundation for new ways
of collaborating as we move forward in operational planning as
well as in capability development.
So the sharing of technical expertise from the National
Security Agency, being an element of that, the formation of a
joint coordination element up at Fort Meade led by a DHS senior
as part of that, the sharing of personnel between the two
departments in different ways that allows a better
understanding of not only capabilities but how to best satisfy
information requirements, while at the same time ensuring
strong oversight of privacy and civil liberties by having DHS
very much engaged with the Department of Defense on looking at
those issues.
So over the last year, especially, I think we have seen new
ways of doing business together, certainly from Secretary
Gates' perspective and the Department's perspective, and the
recognition that DHS is the leader with regards to cyber
protection for our Nation. We are now working towards a
unifying vision for how we will protect and help enable the
protection of not just dot-gov and dot-com, but working to
learn from what we have experienced on the dot-mil side, as
well.
Chairman Lieberman. So thank you. You actually answered my
second question before I asked it, which was what are we doing
to make sure that the Department of Homeland Security in some
sense leverages on the expertise that DOD and NSA have rather
than recreating them within the Department of Homeland
Security.
Mr. Butler. So a key element of that was an agreement
between the two Secretaries that we would, one, share
personnel. Two is to actually develop a set of activities
underneath the joint coordination element to really help us
understand how we could better leverage what is in the
Department of Defense today. I think a good example of that is
the work being done to help with the National Cyber Incident
Response Plan. And then going beyond that, looking at other
efforts where we can share both in capability expertise as well
as in technology what we are doing with intrusion detection and
intrusion prevention systems as we move forward in time, so the
EINSTEIN 3 efforts can move forward.
Chairman Lieberman. Mr. Reitinger, from a DHS perspective,
how would you evaluate the relationship between your Department
and DOD? Obviously, part of what you have wanted to do is build
up your own expertise within DHS, but also, as I said, to
leverage on what already exists in DOD and NSA.
Mr. Reitinger. Thank you, Chairman. That is exactly
correct. I think we each bring unique things to the table.
Certainly, DOD has unparalleled technical expertise and
cybersecurity expertise build up over the course of years. In
the Department of Homeland Security, we have built up our own
expertise, particularly around things like control systems, how
to work broadly across a broad distributed interagency and deal
with the multiple barriers that one faces in that space.
As a result, I think over the course of the last year, as
Mr. Butler indicated--we are very good friends--we have built
up a much stronger partnership, not only having the MOA, which
along with that joint coordination element works to make sure
that we can stay fully operationally synced with DOD on a very
tight basis. We will be developing people that will be deployed
in the NSA Technology and Acquisitions Directorate so that as
it develops technology, it meets Homeland Security needs, as
well. We will be deploying people in the Threat Operations
Center at NSA so we have full knowledge of what they are seeing
from a threat perspective. And similarly, both Cyber Command
and the National Security Agency will deploy elements to the
National Cybersecurity Communications and Integration Center to
support our operations under the National Cyber Incident
Response Plan. So from Cyber Command, there will be a cyber
support element, a team of people at our offices on Glebe Road,
and a cryptologic support group from NSA, to similarly support
what we do.
But separate and apart from the MOA, we continue to work
together. We literally meet regularly with DOD at the deputies'
level to make sure that we can stay fully synced at a
leadership level, and Mr. Butler and I personally participate
in a weekly secure video teleconference with individuals from
NSA and other people from DOD and DHS so that we do not allow
any delta to occur in terms of what our operational activity is
so we can move together most effectively.
Chairman Lieberman. That is great to hear. That is exactly
the opposite of the kind of stovepiping that we always worry
about, and obviously it is critically necessary.
Mr. Butler, did you want to add anything?
Mr. Butler. Just one additional element. Building beyond
the National Security Agency, we have found ways to better
collaborate with the Defense Cyber Crimes Center. So as was
mentioned, cyber crime is a big issue. We are working with DHS
now, looking at how we can leverage forensics expertise to help
not only with the defense industrial base, but helping in other
parts of the critical infrastructure that we are trying to
protect.
Chairman Lieberman. Mr. Schwartz, just building a little
bit on your previous existence as an advocate for privacy, is
it correct to assume, just to build on the record here, that if
the Committee and the Administration came in with a proposal
that put responsibility for the dot-com and dot-gov,
particularly dot-com cyberspace into the Department of Defense
and NSA, there would be real concerns in the privacy community?
Mr. Schwartz. I think that if you were to take the core
critical infrastructure and put that regulatory authority
primarily at the Defense Department, there would be major
concerns from privacy and civil liberties groups.
Chairman Lieberman. Thank you. Mr. Reitinger, this
Committee in its broad homeland security responsibility often
interacts with the private sector, and when we come to a
question of how we protect infrastructure, we have become
accustomed to saying that 85 percent of the infrastructure of
the United States is owned and operated by the private sector.
What would you say that percentage is for cyberspace, if you
can hazard a guess, and I am not going to hold you to this.
Mr. Reitinger. Sir, I have heard everything from 75 to 95.
Chairman Lieberman. Yes.
Mr. Reitinger. I will freely admit to you, I have never
seen a rigorous analysis of this.
Chairman Lieberman. Right.
Mr. Reitinger. I think it varies from country to country.
Certainly, in the United States, it is the vast majority, and
even when you talk about government critical infrastructure, in
many cases, it is the State and local government critical
infrastructure that is often more important on a real-time
basis than the Federal critical infrastructure. So we
absolutely need to work closely with our critical
infrastructure partners, our State, local, tribal, and
territorial partners, and our Federal Government partners to
secure critical infrastructure.
Chairman Lieberman. So, bottom line, whatever the exact
percentage, it is clear from what you said that there is a
consensus that most of cyberspace is owned or operated by the
private sector, and that makes the parts of this legislation
that create and authorize new ways for the Department of
Homeland Security to interact with the private cyberspace
infrastructure, particularly with regard to the dot-com
networks, critically important.
My time is up on this round, but I will come back to that
after my colleagues have the next round. Senator Collins.
Senator Collins. Thank you, Mr. Chairman.
Mr. Reitinger, about a year ago, you testified before our
Committee that Section 706 of the 1934 Communications Act
already provided emergency authority to the President. That
prompted me to actually go read Section 706 of the 1934
Communications Act, and I am not going to read all of it out
loud today, but let me just read parts of it, because I think
that it will emphasize two points. One, that the President's
authority under this law is enormously broad, and second, that
the language shows that it was written for another era.
The section says that when the President finds that there
is war or a threat of war or a state of public peril or a
disaster or any other national emergency, that the President
may cause the closing of any station for radio communication.
The President may remove all the equipment and apparatus from
the station. He may authorize the use and the control of the
station by any department of government. In other words, under
this section of the law, the President is allowed to have the
government actually take over any radio station in the United
States, or close it down completely, or remove the equipment
from it.
Nowadays, if that were proposed, it would create a
tremendous uproar and free speech concerns. This authority is
far broader than the authority in our bill, since this
authority does allow a government takeover of transmission
equipment, and it is clearly outdated since it is tied to
traditional communication facilities and it does not reach
interconnected critical infrastructure entities that are not
covered by the Communications Act.
We spent a lot of time, and indeed, most recently revised
our bill to carefully constrain and define exactly what
authority the President would have. We made it very clear that
the President could not shut down the Internet, that government
could not take over the Internet. There was a lot of theories
in the Internet world that perhaps we wanted that. We did not,
but we made it explicit in our new bill. We carefully
constrained the President's authority with reporting to
Congress, with time limits, with privacy limitations, by saying
it has to be the least intrusive means possible.
So I am very curious why the Administration, in your
approach, does not update the 1934 Communications Act, which
clearly speaks to a different era, and carefully define exactly
what the President's authority would be. And Mr. Chipman, just
to put you on notice, since you are from the Justice
Department, I am going to ask you that question, as well.
Mr. Reitinger. So, thank you, ma'am. I will do my best. You
are clearly correct. Let me agree with you that the statutory
authorities that exist in this space were written long ago, as
you said, in 1934, and were not designed with the current
environment that we have in mind. There are authorities there.
That said, the Administration's bill does not include any
additional emergency authorities for the President. Instead, as
you point out, neither the Committee nor the Administration has
sought or seeks any form of Internet kill switch. This is,
however, a critical issue. Clearly, if something significant
were to happen, the American people would expect us to be able
to respond, and respond appropriately.
To that end, we would, if something significant happens,
use the authorities that we bring to bear in the right way, not
to restrict Internet freedom, but to preserve Internet freedom
while protecting the country, and we would do so using the
authorities that we currently have and the processes that we
have developed, such as the National Cyber Incident Response
Plan, which details the roles and responsibilities and how we
would move forward to respond to an event.
I can say, as you pointed out, Ranking Member Collins, this
is a critical issue. This is an area where I think different
people have different views about how the government ought to
be empowered and what the constraints on the government
exercise of authorities ought to be. And this is a key area
where I would hope there would be further discussions between
the Administration and the Congress to figure out the right set
of mechanisms, if any, that were necessary to move forward in
this space.
Senator Collins. Mr. Chipman, you represent the Justice
Department. Why did the Justice Department not recommend
amendments to the 1934 Communications Act, which is clearly
outmoded, and also a carefully constrained limitation,
carefully defined, on what the President could and could not do
if there was a cyber emergency?
Mr. Chipman. Thank you. Senator, I think I would echo Mr.
Reitinger's comments and say that, clearly, this is an
important topic, and clearly, it is an issue that merits
discussion, and I think it is fair to say the Administration
wants to engage in that discussion with you and your
colleagues.
In my experience, the issue of what emergency powers are
needed tends to be very context-driven, and so the answer to
that question, I think, becomes fairly nuanced depending on
what type of emergency the government is facing. I think, no
doubt, Mr. Reitinger is quite right. The American people expect
the government to be able to respond, and I think that the work
DHS has done within the interagency to create a National Cyber
Incident Response Plan is quite key. But beyond that, in terms
of the specifics of this particular Act, I think it merits
discussion, but it is not in the Administration's proposal
right now.
Senator Collins. But that perplexes me. This is an area
where we should be thinking ahead about exactly what
authorities we want the President to have rather than leaving
it ambiguous, rather than relying on a 1934 law that allows the
President to take over control of radio stations. This just
does not make sense to me and I hope you will work further with
us to carefully define what the authorities are and to update
the law.
Let me just make one other quick comment, since my time has
expired. I cannot help but be struck by the irony that we have
four different departments represented here today, and that is
a very good thing because it shows that the Administration is
working across departments. But it is ironic, because unlike
our bill, the Administration chose not to include in its bill
an entity similar to the National Counterterrorism Center which
would bring together within DHS representatives of all of your
agencies as well as the Director of National Intelligence and
other agencies so we would institutionalize the kind of
coordination and cooperation that you have described is
occurring informally. So it is ironic that the Administration
has four departments represented here, yet has rejected the
construct that we have in our bill of institutionalizing that
interagency cooperation.
Thank you, Mr. Chairman.
Chairman Lieberman. Thanks, Senator Collins.
For the record, I share Senator Collins' sense of irony
about this, truly. Also, for the record, I do think the country
would be better off if we did create some new law regarding the
authority of the President to act in these emergencies. As
Senator Collins and I know, this can be a very controversial
area because people can quite easily misunderstand. There is an
admirably ferocious interest among inhabitants of cyberspace in
their privacy and liberty. You know, God bless them, I agree,
and so we want to hear that voice. But in the case of a really
catastrophic emergency, I think we want to be clear that the
President has authority to act, and frankly, in a way that the
1934 law does not make clear, that there are limits to what we
want the President to do and that does require new statutes. So
I pick you up, Mr. Reitinger, on your suggestion that this is
an area where we should, in the best Biblical sense, reason
together.
Senator Carper.
Senator Carper. Thanks very much.
Mr. Reitinger, as you prepare to depart, any final words of
advice? Let me just ask, first, what do you feel especially
good about that has been accomplished during your watch, and
what are some of the areas that you think we have some serious
work still to do?
Mr. Reitinger. Well, thank you, sir. It is rare to have the
opportunity to say something like that, so let me just say a
couple of things. I feel most happy about two things. One, the
fact, as was just remarked by the Chairman and the Ranking
Member, that we have four departments and agencies up here all
speaking from the same voice. The fact that we have a cross-
government approach, and indeed, an approach with many people
in the private sector, as well, that says, here is how we think
we need to move forward as a Nation. One can agree or disagree
with what that approach says, but that we are collaborating
effectively under the leadership of Howard Schmidt at the White
House and broadly across agencies, I think, is a very positive
thing.
The other thing I would say I am most happy about is the
team that we have built at DHS. The fact that, going back into
the prior Administration--at one point about 3 years ago, DHS
had about 40 people working in cybersecurity. We are up to
about 260 now and we will be growing towards 400 by the end of
fiscal year 2012. So we have built a significant team with
significant capabilities that brings a lot to the table, some
significant expertise, and can leverage other sources of
expertise in government, including DOD, the Department of
Commerce, and the Department of Justice. So the people piece
that we have built, both across government and with the private
sector and within DHS, is the thing that I am most proud of
because I believe that organizations and entities succeed or
fail based on the people, and so that is what is most important
to me, sir.
Senator Carper. And maybe in the category of incomplete,
what are some major to do's that are still out there for
whoever succeeds you and the rest of us?
Mr. Reitinger. Sir, there are innumerable to do's. It is an
old saying, but a true one, to say cybersecurity is a journey
and not a destination. As we get better and better, so will the
bad guys. I can say that as a former prosecutor. They continue
to share information, to develop new techniques, and so this is
not a game that we are going to win. This is a game we are
going to do better at and win more often, but it is not going
to end.
So the major thing to do that unites all of those things
together is the need to keep focus on this issue, to make sure
that it stays on the front burner, and to make sure that
Congress and the Administration and the private sector work
together to pass cybersecurity legislation as rapidly as
possible.
Before and after that legislation is passed, we need to
make sure that we are doing the right things, both in
implementation of measures, in development of strategy, and in
hiring of people broadly across the public and private sectors
that ensure that cybersecurity retains the level of importance
that we have given it very broadly across the homeland security
enterprise and the national security enterprise.
One of the things that I like to point out is that a little
over a year ago, on February 1 of last year, the Department of
Defense and the Department of Homeland Security released their
Quadrennial Strategies, on the same day, and in the Quadrennial
Defense Review, cybersecurity received a new and increased
level of importance for the Department of Defense.
Similarly, in the first ever Quadrennial Homeland Security
Review, cybersecurity rose to one of the top five mission areas
of the entire homeland security enterprise, and that is not
just DHS. That includes the private sector and multiple
government agencies.
So we have got the right focus on the issue. We have the
right importance. It has to stay there.
Senator Carper. Well, my guess is the media will help us
with that, because every time there is one of these
disclosures, we hear a lot about it, and that is probably not a
bad thing.
Just to follow up on the question I have asked you, how
have things improved in recent months under the reforms that
have been put in place under current law, and maybe give us
some other ideas about how this proposal would further improve
things.
Mr. Reitinger. Certainly, sir. So we have been staffing up,
as your question indicates, over the past year-plus a lot of
the things that are described in the Federal Information
Security Management Act reforms. We have been taking
significant steps to implement under administrative processes.
So in two memoranda, I believe M-10-15 and M-10-28--it is sad
that I might remember this----
Senator Carper. That is sad.
Mr. Reitinger. It is, sir. [Laughter.]
Senator Carper. But I am glad at least someone is
remembering that.
Mr. Reitinger. I am working on this. I will work to forget
them by mid-summer.
Senator Carper. The next time I see you, I will say, what
were those numbers? [Laughter.]
Mr. Reitinger. OMB, sir, has been working, one, to move
more and more towards continuous monitoring, and two, to
transfer a lot of the operational responsibilities for FISMA to
DHS. So we have been building up the capabilities. We have been
working with the Department of Justice, in particular, to
expand and roll out CyberScope, which is an online continuous
monitoring tool that will be used to work more directly with
the agencies, for example, holding deeper dives on agency
security. It is what we call the CyberStat process, with the
collaboration and work with OMB.
So we have been working to roll out that greater focus, and
again, in full partnership with the Department of Commerce, who
has the lead on the development of standards for the Federal
Information Security Management Act, to work together to deploy
a focus on continuous monitoring, on real-time metrics, and we
are going to continue that process, which will, in fact,
accelerate if an appropriate FISMA reform act is passed.
Senator Carper. All right. Thanks. Mr. Reitinger spoke
proudly of the Department's ability to attract and put together
a good team and still attract more, hopefully well-qualified
people. But the question I have of the panel, in order to have
effective cybersecurity both in government and in the private
sector, we are going to need to attract a significant number of
additional qualified people with the same skills as those who
are seeking to do us harm. Let me just ask, what kind of job do
you think we have done to date in finding those people, not
just in the Department, but outside of the Department, and not
just in government, but outside of government? Do we need to
give agencies more tools to hire the right people and retain
them once they are here? Mr. Butler.
Mr. Butler. Thank you, Senator Carper.
I will speak from a DOD perspective as well as from being
in this business for a while, both on the private sector and
public sector side of the house. Importantly for the Department
of Defense, it is not only about today, but it is about
tomorrow and the next generation workforce. And so Secretary
Gates has made it a big priority.
As we work through a variety of what I would call pilot
initiatives--Cyber Patriot at the high school level, State
competitions, National Defense Cyber Competition, I mentioned
the Defense Cyber Crimes Center and its National Digital
Forensics Competition--we are building not only competitions,
but mentoring and coaching programs. Those mentoring and
coaching programs really become, I think, the heart and soul of
what we need to recruit from both a national security base and
a homeland security base. Whether those individuals go into the
private or public sector, we are seeing both an aptitude and an
attitude about cybersecurity.
I spoke for the Deputy Secretary of Defense at the Cyber
Patriot Competition, which was held about a month ago, the
national competition, and we are now not just pulling from
military institutions and high schools and colleges, but really
now creating a base that is allowing us to go across the
country into the inner cities to inspire kids for the next
level.
We are working through, I think, with limited funding,
different ways to incentivize that and to continue those
programs. But to me, those are the important elements that we
need to----
Senator Carper. Good. That is very helpful. I am out of
time. Mr. Schwartz, just very briefly, and then Mr. Chipman, if
we could do that.
Chairman Lieberman. Yes.
Senator Carper. Go ahead.
Mr. Schwartz. I will say I have been in the government for
9 months at NIST and I have been really impressed with the
folks that we have in NIST. I think part of that is the great
environment, but it is also that hiring authority that was
mentioned. At NIST, we do have direct hire authority, and we
have the flexible hiring. That has given us the ability to hire
and compete with others that need those cybersecurity aims. So
I completely understand where this Committee has come down in
terms of DHS getting similar authorities and that is in the
Administration's proposal, as well.
Senator Carper. All right. Thank you. Mr. Chipman.
Mr. Chipman. Thank you. I would add that I know that this
is an important aspect of the Administration's focus on
cybersecurity, indeed, the Comprehensive National Cybersecurity
Initiative that Mr. Reitinger mentioned included cyber
education as a very important topic, and I know that work has
continued.
At the DOJ, it is certainly an important topic that is
getting a lot of attention, especially at the FBI. I know the
FBI in recent years has created a 5- to 7-year training program
for agents to make sure that they are equipped to confront the
sorts of cyber threats that we have been talking about.
Senator Carper. All right. Thanks, Mr. Chairman.
Chairman Lieberman. Thank you, Senator Carper.
Mr. Reitinger, let me come back to the topic I raised at
the end of my first round of questions and pose it in this
general sense and ask you to answer it in that way, which is
since we agree that most of cyberspace is in the hands of the
private sector--appropriately, rightly--and we also understand
that attacks on privately owned cyberspace can have very
serious effects on our economy and our national security--
obviously, we know that some of these are going on right now.
So the question is, what is the approach in the White House
proposal for making sure, to the best of our ability, that the
private sector is taking steps to defend itself, particularly
the most critical parts of it, and in that sense to defend our
country, because an attack on our privately-owned
infrastructure in cyberspace, electric grid, transportation
systems, or finance systems could have, in many ways, as
devastating an effect as a conventional military attack? So
give us an overview of what the approach is in the White House
legislation to the private sector.
Mr. Reitinger. Thank you, Mr. Chairman. The approach is
actually, I think, as I said before, very similar to that that
was in the bill that this Committee developed last year. There
are a couple of concerns here. One is that, clearly, cyberspace
is not an area that is amenable to extensive top-down
prescriptive regulation. The technology moves too quickly.
There are innumerable differences between entities. So one
needs to find the right way to bring the expertise of the
private sector to bear, to continue to rely on innovation to
address the problem, and then also to ensure that you have the
right mechanisms to ensure that homeland and national security
requirements are met.
And it is that last space that, I think on occasion, we
have not seen as much progress as we all believe that we should
have. We need to find the right way to set requirements in a
way that actually reward private sector companies that are
doing the right thing, that give a benefit, and make sure that
without unduly restricting innovation in any way, that we do
make sure that the power stays on, that the most critical of
critical infrastructure can continue to operate.
The approach that the Administration took is similar to the
one that the Committee developed.
Chairman Lieberman. Right.
Mr. Reitinger. In essence, the Department of Homeland
Security, in collaboration with the partners that you see at
this table and the private sector, would develop a set of
criteria for determining, again, what is the most critical of
critical infrastructure. So the notion is that this would not
be every part of current critical infrastructure, but
absolutely the most important pieces.
Chairman Lieberman. So we start with priorities.
Mr. Reitinger. Yes, sir. We prioritize what has been
referred to in the bill as covered critical infrastructure.
Chairman Lieberman. Right.
Mr. Reitinger. And for those entities, DHS would identify--
I am going to say this a bunch--again in collaboration with the
government agencies you see and in the private sector, a set of
risks that would need to be mitigated. So this would not be a,
``Thou shalt not use this technology,'' but here is a risk and
you need to have a mechanism to identify it.
And then under the Administration's approach, DHS would not
then say, here is a set of choices you have. You have to do one
of them. Instead, industry, the private sector, would be
responsible for putting forward frameworks of essentially
performance standards and/or performance measurements that
would focus not just on particular steps that you need to do,
but on actual effectiveness, on measurements that would
indicate how effective the measurements were, and then industry
would develop a plan. So any covered entity would need to
develop a plan that aligned with that framework and was
evaluated under that framework for addressing the risk that DHS
identified.
Then, industry would also be responsible for having itself
evaluated by a set of effectively certified evaluators.
Chairman Lieberman. Right.
Mr. Reitinger. So it would not be DHS doing the direct
evaluation, but there would be entities that were chosen to do
evaluations. Industry would receive those evaluations and then
would publish--so the biggest lever would be transparency.
Industry would publish the high-level description of its plan
and a high-level description of the evaluation results. And
then we would use that transparency to drive market activity
that would enhance security in covered critical infrastructure
and as a standard of care is developed more broadly throughout
critical infrastructure.
In addition, and as an additional incentive, there could be
procurement advantages or disadvantages based on how one did in
the process----
Chairman Lieberman. Explain that a little bit more. So that
is the next point. I think that your description is excellent.
You are right. The White House and Committee bills have a
generally similar proposal, although as you know, we give DHS
the authority to evaluate the plans as opposed to third-party.
But is there a reward and punishment here? In other words, do
industries that follow their plans get rewarded and ones that
do not get, in some sense, punished?
Mr. Reitinger. So, yes, sir. There are a number of
different levers, or levels, and I might ask Mr. Schwartz to
supplement this, because he has a particular taxonomy that I
happen to like. But in essence, one, your evaluation results
will be published, so there is a direct ability of the market,
your key partners and customers to take that into account.
Second, the activity, the process of developing these
frameworks and plans is going to start to create a standard of
care that entities will need to step to over time, perhaps for
insurance purposes, perhaps for other purposes.
Last, DHS is directed to work with the Federal Acquisition
Council so that the results of these evaluations can
appropriately be taken into account in Federal procurements,
which will provide an additional incentive to private sector
players.
It is very much intended to be a light-touch approach, but
one that we believe, over time, will move the private sector
and critical infrastructure in the right way, will reward the
companies that are doing a very good job, and will get us to a
more secure state in the future.
With your permission, sir, I would like to ask Mr. Schwartz
to supplement that.
Chairman Lieberman. The resident taxonomist.
Mr. Schwartz. Getting to this balance of the right levers
and incentives is really the key to answer these questions for
covered critical infrastructure as we see it in the plan, and
there are a number of incentives that you have identified in
your bill that we have put forward here; most of them are
similar. The question is getting at the right particular
balance between them.
The taxonomy that Mr. Reitinger is referring to breaks down
to four different areas that are somewhat related. One is the
effects of public disclosure for cybersecurity performance.
Chairman Lieberman. So a kind of public incentive or shame?
Mr. Schwartz. Well, the second, I would say, is reputation
and risk----
Chairman Lieberman. Right.
Mr. Schwartz. It is more that they know that markets may
act on it. Where the second is, really, if they do things
completely wrong, then you are going to have brand impact,
potentially, where markets really exist in that space.
Chairman Lieberman. OK.
Mr. Schwartz. And the third is access to government
procurement, so questions about procurement, and our bill links
it to the Federal Acquisition Regulation (FAR) and----
Chairman Lieberman. In other words, you can make some more
money. You will have preference in selling, or offering
services to the government.
Mr. Schwartz. Correct. And the fourth is perceived
litigation risk that shareholders or others may come forward
with, and that would have to work out over time, as well.
But we are open, and we do not claim to have everything in
perfect alignment or balance in terms of these levers. No one
can know exactly what will happen in terms of getting this
right, but we can work together with you to try and come up
with what we think is the best solution. So we are completely
open to having this discussion about what are the best
incentives moving forward.
Chairman Lieberman. Good. No, that is very helpful, because
our bill, as you know, has a provision for limited liability
protection as another incentive, consistent with the
Administration approach to the private sector to take
preventive, defensive action so that, in one case, if they did,
they would be protected, for instance, from punitive damages
and liability.
In the extreme case of a President taking action in a
catastrophic case, whether under the old law or under our
proposal, to protect really the national interests, there would
probably be claims, significant ones, against some elements of
the cyberspace community, and the question there that we raise
is whether they ought to be protected from liability overall
because they were acting pursuant to an order of the President
of the United States.
Do either of you want to comment on the general subject of
offering some liability protection to the private sector as an
additional incentive beyond what the White House proposes to
the private sector to cooperate?
Mr. Reitinger. I think I would simply say two things, Mr.
Chairman. One, as Mr. Schwartz indicated, and maybe I will call
that the Schwartz taxonomy--the balance--there's different ways
to tweak it, and I think we would be happy to continue to
discuss that with you.
Second, there is some liability protections, not under this
particular provision dealing with the overall incentives regime
for the private sector, but to the extent that the private
sector shares information with government or is assisting
government with protecting dot-gov, there is both an immunity
and a good faith immunity that is written into that section of
the statute.
Chairman Lieberman. Do you want to add anything, Mr.
Schwartz?
Mr. Schwartz. I will just say, it is similar to my comments
about being open to the levers----
Chairman Lieberman. Yes.
Mr. Schwartz [continuing]. That we are definitely
interested in having this discussion with you to further figure
out how we can come up with the right balance here, and this
fits into that discussion.
Chairman Lieberman. This could, unfortunately, end up as a
real obstacle to the passage of the bill, the failure to do
something about liability, and I think it would be good if we
worked together to try to find a common ground. Thank you.
Senator Collins.
Senator Collins. Thank you. Let me first endorse the
Chairman's comments on liability and encourage you to take
another look at our bill.
I want to follow up on the issue of how you handle critical
infrastructure. In the statement, it says that the White House
proposal emphasizes transparency to help market forces ensure
that critical infrastructure operators are accountable for
cybersecurity, and it goes on to say there would be new
requirements for reporting to the Securities and Exchange
Commission, that there would be publication of a summary of the
evaluation results, and I must say, these provisions surprise
me, and the reason that they surprise me is the list of
critical infrastructure is now classified. Now, granted, I am
sure that many Americans and many of those who would do us harm
could obviously figure out what a lot of the critical
infrastructure sites and capabilities are, but the fact is, the
list is classified. So are you planning to change the
classification and make the list public?
Mr. Reitinger. Thank you, Ranking Member Collins. This
would actually be a different list and one that is of somewhat
lower sensitivity. The list that you are referring to
references or includes classified or tiered systems and assets.
Senator Collins. Yes.
Mr. Reitinger. This would actually be a list of entities as
opposed to specific assets. So instead of, for example, this
generation facility, it would be this company that owns a
number of different generation facilities, and I think that is
of a lower level of sensitivity, and, in fact, is much more
broadly known to the public.
Second, if one is going to bring public transparency
disclosure levers to bear, one needs to have that information
open. So in this case, we drew the conclusion that the list of
entities, of critical infrastructure entities, would need to be
public in order to move forward in this way.
Senator Collins. But you also go on to say that there would
be a summary of the security plan and the evaluation of that
plan would be publicly accessible. My concern is, we do not
want to give those who would do us harm a roadmap to how to
attack our critical infrastructure. If, in fact, you publicize,
even at a broader level, what the critical infrastructure is
and then require publication of a summary of the security plan,
and this part is the most troubling part to me--the publication
of the evaluation of that plan, are you not providing very
valuable information to not only cyber criminals, but perhaps
terrorist groups or nation-states that are constantly trying to
probe our systems? I am really surprised that you want that to
be public.
Mr. Reitinger. Yes, ma'am. I understand. If you will note
the section, it specifically requires that only a high-level
description of the plan and only a high-level description of
results would be published, and specifically requires that in
the regulations to be developed by the Secretary that
information not be reported to such a detail that it would
impair the security of that entity.
In point of fact, critical infrastructure entities are
tested and probed all the time. That is simply the nature. I do
not believe that on the level of reporting we would intend to
require in going forward that we will increase the level of
risk of those entities. In fact, if the publication of the
results causes such entities to say, well, we need to do a much
better job, then the regime is going to be having the effect we
intend in that they will rapidly move to enhance their own
security.
Senator Collins. But that is a name and shame approach,
essentially, that you are hoping that there will be public
criticism or press scrutiny that will essentially embarrass
these entities into doing a better job. To me, if they are not
doing a good job, then DHS goes in and applies sanctions or
requires a better security plan. I do not think the answer is
to make the weakness public. And the fact is that even if, in
your scenario, it encourages that entity to do a better job, it
is also telling very sophisticated computer hackers that this
is an entity that they should focus on and that has some
security lapses.
I really hope you will take another look at that. I
understand what you are trying to do, but I think that you are
also giving information to the enemy.
Mr. Reitinger. Just a couple of comments, ma'am, and I
appreciate that. I understand your level of concern, which is
appropriate. What I would say is, briefly, it is not just that
the entity would receive shame, but that the market would
actually take that into account, that if you are a more secure
entity as opposed to a less secure entity, then business
partners and not just government may want to do work with the
more secure entity because it gives them a higher level of
assurance. So it is not just the name and shame. It is actually
to drive market effects.
The second thing is we would intend that any publication of
results be at such a high level that it would not increase the
level of security, or the level of threat that an entity would
face, but instead would merely make the public aware of the
overall level of security.
Senator Collins. But if it is sufficient to cause a
business to no longer do business with that entity, it is
sufficient to wave a red flag at those who would do us harm.
That is my point. I do not think you can have it both ways. If
the vulnerability that is revealed or the poor evaluation that
is published is sufficient to cause other commercial entities
to refrain from doing business with this section of the
critical infrastructure, then surely it is going to be
sufficient to prompt a computer hacker or terrorist group or
Russia or China to redouble its efforts. I just think we need
to think about that issue.
Let me just quickly switch to another issue, since my time
is expiring rapidly. Mr. Schwartz, because of your background
on privacy, and you have always been such a help to our
Committee as we have wrestled with those issues, I want to talk
to you about the idea of the national law for data breach
reporting. My first reaction is that that is a good idea, that
there should be more uniformity. I think it would be easier for
consumers as well as for businesses to not have to figure out
what an individual law in one of those 47 states that has them
means in their particular case.
Are you talking about just a uniform nationwide reporting
of breaches, or are you also talking about having uniform
remedies for what a company has to do when there is a breach? I
ask this not looking for any particular answer, but just to
better understand what you are proposing.
Mr. Schwartz. The focus is really on the reporting and
making sure that consumers get the same information as the law
enforcement and others that work on these issues receieve.
Also, the focus is to make sure that they are getting the right
information about the cases so that we can go after the bad
guys when a breach has happened and is tied to something more
than simply a lost laptop or something like that.
But, we need to try to figure out how to best get to that
kind of level where consumers get the same information, and it
is actionable. We think that what we have come up with moves us
forward in that regard. We have had a lot of experimentation in
the States. We have learned a lot from that. We think that it
has been a useful avenue and that those laws have been
successful. It is time to move forward and make sure that we
can capitalize on that at this point.
Senator Collins. Thank you.
Chairman Lieberman. Thanks, Senator Collins. Senator
Carper.
Senator Carper. Just to follow up on the last question that
Senator Collins was pursuing, and Mr. Chipman, feel free to
jump in on this, as well. Former Senator Robert Bennett of Utah
and I had worked on disclosure legislation in at least the last
Congress, maybe the last two Congresses. We were on the Banking
Committee, and this was an area where other committees had
jurisdiction.
Do either of you know in the Administration's proposal what
legislation you drew from in order to prepare and present the
Administration's proposal in this regard?
Mr. Chipman. I am not sure if we drew from that particular
proposal. I think a number of different bills and ideas in this
area were looked at.
Senator Carper. We could never move the legislation forward
because we were on the Banking Committee. We had some
jurisdiction. The Commerce Committee had some jurisdiction. The
Judiciary Committee, had some jurisdiction. Because of
jurisdictional grounds, we could never move anything forward.
How have you acted this way to help us thread the needle here?
Mr. Schwartz. Well, I think, again, coming back to this
partnership between the different agencies involved, we had all
of our equities lined up and tried to work together to develop
this in a way that worked for all of the different
jurisdictions that you would have to have issues with, where we
could have this kind of conversation to move past some of those
concerns.
Senator Carper. I want to go back to another point that
Senator Collins was making and talking a little bit about the
name and shame. We got into a little discussion of how do we
harness market forces to help drive good public policy
behavior. We can have all the laws on the books, we can have
regulations on the books, and we can have prosecutors out there
trying to capture the bad guys and put them in jail, but to the
extent that we can harness market forces to help us solve this
problem or address these challenges, that is a very good thing.
Does anybody want to talk a little bit more about that for us,
please? Anybody at all?
Mr. Schwartz. This comes back to how to get those
incentives right, and we agree with the way that you framed it
that market forces are extremely important, especially because
we cannot expect the government to be able to go into all of
these different areas that we are going to consider to be
covered critical infrastructure in this space and have exact
knowledge of how to operate in each of those areas from the
beginning.
What we can do is to work in a public-private partnership,
especially on the Internet, where we have so many public-
private partnerships, and try and come up with solutions that
work for the market. We feel as though the security plans
process moves us much further down that line and that will help
us build innovation in the mitigation strategies in a way that
the government approach, the government coming in, cannot do.
Senator Carper. All right. Thanks.
Mr. Chipman, the Administration's testimony mentioned that
our critical cyber infrastructure is attacked repeatedly. We
all know that. In addition, sensitive, personal, government,
and business information is stolen online all the time. How
often are we able to actually catch and successfully prosecute
the individuals or the groups who commit these crimes? How will
the Administration's proposal help further with these efforts?
Mr. Chipman. Thank you. You are quite right. The amount of
cyber crime, the number of intrusions, is growing, and they are
challenging cases to bring, for sure. There is a level of
anonymity on the Internet at times that make these hard cases
to bring. Many times, there are actors outside of the United
States and it is simply hard to find out where they are or who
they are to bring cases against them, though we have had a fair
amount of success in recent years. In 2009, I believe, there
were over 150 cases brought. We have had a number of recent
successes bringing down large organized crime rings engaged in
mainly banking fraud and other types of computer intrusions to
steal money, credit card numbers, and things like that.
I think the proposals in the Administration's cyber package
will help in a number of ways. They will help harmonize laws
relative to penalties and will add a few tools to the tool box,
for example, making clear that computer crimes are a RICO
predicate. I think that will help and it will add to the tools
that we can bring to bear in these cases.
Senator Carper. All right. I am going to be leaving. I do
not know if you all are going to stay on for another round here
or not, but let me just ask you as we conclude here, or at
least as my participation concludes, would you all just take
maybe a minute apiece and reflect on what has been said here,
what you have said, what you have heard others say, the
questions that have been asked, and the answers given, and
maybe just give us some concluding thoughts, starting with you,
Mr. Chipman, then concluding with Mr. Reitinger.
Mr. Chipman. Sure. Thank you very much. I think I am struck
here by how collaborative, as Mr. Reitinger and others have
mentioned, this process has been within the Executive Branch in
terms of trying to, as Mr. Schwartz said, trying to get the
balance right.
Senator Carper. It reflects this Committee, does it not?
Mr. Chipman. That is what I was about to say. And I am
struck by what I hope is the start here of a very collaborative
process with all of you and others, and I think I can fairly
speak for the Administration in that regard.
Senator Carper. All right. A closing thought, Mr. Schwartz?
And I understand your father is here, is that right?
Mr. Schwartz. That is right.
Senator Carper. If we were to line all the men up here in
this room in a row, do you think we could pick him out?
Mr. Schwartz. He looks a lot like me. He is in town for a
conference, and this just happened to work out.
Senator Carper. There is no denying who your father is. We
welcome your dad and thank him and your mom for instilling some
really good values in you to get you to this place today.
Mr. Schwartz. Thank you, Senator. So, briefly, the one
thing I would say, it is on this point that you raised before
about public-private partnerships and getting the market moving
in the right area. Our work over the past year from the
Internet Policy Task Force that Secretary Locke helped put
together at the Commerce Department, we received a lot of
comments from the private sector on this and I think they
really are incentivized right now to try and move forward in
the right way, at least those that have been paying attention
to this space, and they want to move forward in the right way.
I think we can put together those best practices that can build
a framework for success in these different areas, and we should
use that to our advantage now while we have it.
Senator Carper. All right. Thank you.
Any closing thoughts, Mr. Butler?
Mr. Butler. Sure, Senator Carper. My sense is that it is
collaboration and not being complacent with where we are, to
continue to build on the collaboration. People have mentioned
partnerships. It is interagency. It is with the Congress. It is
certainly with industry and focusing on not just the easy
areas, but the hard areas that we need to work through. As the
Administration announced last week, there is an international
aspect that needs to be taken into account as we move forward
in time.
Senator Carper. All right. Thank you. Mr. Reitinger.
Mr. Reitinger. Thank you, Senator. Just briefly, I think it
is important to recognize that we do not have all the answers
in government. I do not think the private sector has all the
answers and I do not think all the answers exist on the Hill.
This is going to take all of us working together. This is not a
question of, for example, the government coming in and saying,
the private sector is not doing its job, it needs to do a
better job, and it is pounding the table, or them coming in and
saying the same thing. We need to find the right way to bring
the capabilities of government together with the capabilities
of the private sector, and we very much look forward to
continuing to work with the Members of this Committee and
Congress generally to make sure we get the balance right as
cybersecurity legislation moves forward.
Senator Carper. All right. Thanks. And as you prepare to
weigh anchor and head out into the other uncharted waters, an
old saying we have from my days in the Navy, is fair winds and
a following sea. We thank you for your service and wish you
Godspeed.
Mr. Reitinger. Thank you.
Chairman Lieberman. Thanks, Senator Carper.
Thanks to all of our witnesses. Since I now know your
father is here, Mr. Schwartz, I want to say in his presence,
Senator Collins and I were remarking that by your testimony
over the years, you have really built up a lot of credibility
with the Committee. You have been straight ahead and presented
your arguments well, never contentiously. Occasionally, we have
a contentious witness from an advocacy group here. It is a
pleasure to be able to share that private conversation in the
presence of your father.
I thank all of you for the testimony. I want to come back
and say that Senator Reid, I believe working with Senator
McConnell, is now talking about setting up different groups to
negotiate with the Administration on different parts of the
bill to try to expedite it forward.
Senator Collins, I am under the impression that one of the
things holding up the immediate initiation of those
negotiations is something that is another favorite of yours and
mine, and talk about irony, these folks are going to be
testifying before five more committees of Congress, in the next
week and a half, and therefore, their staffs are preoccupied
with that and not able to initiate the negotiations.
We have had a longstanding interest pursuant to a
recommendation of the 9/11 Commission to try to reduce the
number of committees that people have to testify before. We
have been pretty good at reforming the Executive Branch of
Government, less successful at reforming the Legislative
Branch.
Anyway, I thank you very much. We are really going to push
full steam ahead here, to continue the nautical metaphors of
Senator Carper, and hope to get this to the floor as soon as we
possibly can, hopefully with a good consensus approach. But
thank you for everything you have done, the considerable work
that was done. We were impatient, but when you produced the
Administration proposal, it was not an outline, it was
legislation. It was quite comprehensive. And, of course, we
like it because it is very much like what we proposed in our
Committee bill. So we look forward to taking it from here
together to enactment.
We are going to keep the record of the hearing open for 15
days for any additional questions or answers. I thank Senator
Collins, Senator Carper, and all of you.
And with that, the hearing is adjourned.
[Whereupon, at 12:23 p.m., the Committee was adjourned.]
A P P E N D I X
----------
[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
NEWSLETTER
|
Join the GlobalSecurity.org mailing list
|
|