[House Hearing, 113 Congress]
[From the U.S. Government Printing Office]
[H.A.S.C. No. 113-17]
INFORMATION TECHNOLOGY AND CYBER OPERATIONS: MODERNIZATION AND
POLICY ISSUES TO SUPPORT THE FUTURE FORCE
__________
HEARING
BEFORE THE
SUBCOMMITTEE ON INTELLIGENCE, EMERGING THREATS AND CAPABILITIES
OF THE
COMMITTEE ON ARMED SERVICES
HOUSE OF REPRESENTATIVES
ONE HUNDRED THIRTEENTH CONGRESS
FIRST SESSION
__________
HEARING HELD
MARCH 13, 2013
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
----------
U.S. GOVERNMENT PRINTING OFFICE
80-187 PDF WASHINGTON : 2013
SUBCOMMITTEE ON INTELLIGENCE, EMERGING THREATS AND CAPABILITIES
MAC THORNBERRY, Texas, Chairman
JEFF MILLER, Florida JAMES R. LANGEVIN, Rhode Island
JOHN KLINE, Minnesota SUSAN A. DAVIS, California
BILL SHUSTER, Pennsylvania HENRY C. ``HANK'' JOHNSON, Jr.,
RICHARD B. NUGENT, Florida Georgia
TRENT FRANKS, Arizona ANDRE CARSON, Indiana
DUNCAN HUNTER, California DANIEL B. MAFFEI, New York
CHRISTOPHER P. GIBSON, New York DEREK KILMER, Washington
VICKY HARTZLER, Missouri JOAQUIN CASTRO, Texas
JOSEPH J. HECK, Nevada SCOTT H. PETERS, California
Kevin Gates, Professional Staff Member
Tim McClees, Professional Staff Member
Julie Herbert, Clerk
C O N T E N T S
----------
CHRONOLOGICAL LIST OF HEARINGS
2013
Page
Hearing:
Wednesday, March 13, 2013, Information Technology and Cyber
Operations: Modernization and Policy Issues to Support the
Future Force................................................... 1
Appendix:
Wednesday, March 13, 2013........................................ 27
----------
WEDNESDAY, MARCH 13, 2013
INFORMATION TECHNOLOGY AND CYBER OPERATIONS: MODERNIZATION AND POLICY
ISSUES TO SUPPORT THE FUTURE FORCE
STATEMENTS PRESENTED BY MEMBERS OF CONGRESS
Langevin, Hon. James R., a Representative from Rhode Island,
Ranking Member, Subcommittee on Intelligence, Emerging Threats
and Capabilities............................................... 1
Thornberry, Hon. Mac, a Representative from Texas, Chairman,
Subcommittee on Intelligence, Emerging Threats and Capabilities 1
WITNESSES
Alexander, GEN Keith B., USA, Commander, United States Cyber
Command........................................................ 6
McGrath, Hon. Elizabeth A., Deputy Chief Management Officer, U.S.
Department of Defense.......................................... 5
Takai, Hon. Teresa M., Chief Information Officer, U.S. Department
of Defense..................................................... 3
APPENDIX
Prepared Statements:
Alexander, GEN Keith B....................................... 62
Langevin, Hon. James R....................................... 31
McGrath, Hon. Elizabeth A.................................... 54
Takai, Hon. Teresa M......................................... 33
Documents Submitted for the Record:
[There were no Documents submitted.]
Witness Responses to Questions Asked During the Hearing:
Mr. Thornberry............................................... 77
Questions Submitted by Members Post Hearing:
Mr. Franks................................................... 87
Mr. Langevin................................................. 84
Mr. Rogers................................................... 85
Mr. Thornberry............................................... 81
INFORMATION TECHNOLOGY AND CYBER OPERATIONS: MODERNIZATION AND POLICY
ISSUES TO SUPPORT THE FUTURE FORCE
----------
House of Representatives,
Committee on Armed Services,
Subcommittee on Intelligence, Emerging Threats
and Capabilities,
Washington, DC, Wednesday, March 13, 2013.
The subcommittee met, pursuant to call, at 3:46 p.m., in
room 2212, Rayburn House Office Building, Hon. Mac Thornberry
(chairman of the subcommittee) presiding.
OPENING STATEMENT OF HON. MAC THORNBERRY, A REPRESENTATIVE FROM
TEXAS, CHAIRMAN, SUBCOMMITTEE ON INTELLIGENCE, EMERGING THREATS
AND CAPABILITIES
Mr. Thornberry. The subcommittee hearing will come to
order. I appreciate our witnesses and guests and their
patience. There are some days that just don't work very well,
and this is certainly one of them.
I will ask unanimous consent to put my opening statement in
the record and yield to the gentleman from Rhode Island for any
comments he would like to make.
STATEMENT OF HON. JAMES R. LANGEVIN, A REPRESENTATIVE FROM
RHODE ISLAND, RANKING MEMBER, SUBCOMMITTEE ON INTELLIGENCE,
EMERGING THREATS AND CAPABILITIES
Mr. Langevin. Thank you, Mr. Chairman.
I want to thank our witnesses for appearing before the
subcommittee today. This is obviously an important hearing as
our national security is dependent on our information systems,
and those networks are critical to all aspects of our defense.
Yet, one only needs to look at recent headlines, even of the
day, to understand the unrelenting and sophisticated threats
that we face in the cyber domain.
Now we continue to see just how vulnerable such networks
are in other sectors of our society, at a potential cost of
billions lost to cybercrime, and we know our defense networks
are at even greater risk. So obviously, though, they must be
fail-proof and secure.
Now we are still waiting for this year's budget, but I
believe it is safe to say that IT [information technology]
represents a large piece, $33 billion last year for that
matter, and that is a significant figure. And we must be ever
mindful of our responsibility to make the most effective use of
taxpayer's investments in these capabilities.
Now we are aware that the Department has experienced some
challenges in acquiring certain IT systems and services in the
past. So today, I would like to hear what steps we are taking
to tackle those challenges in order to get the connectivity we
need at a reasonable price.
DOD [Department of Defense] cyber operations are quite
literally a growth business, and it is one of the rare portions
of the DOD that will be growing indefinitely into the future;
and there have been significant developments in just one year
since our last posture hearing.
Now we are starting to get answers to some of the questions
about how and when the United States might conduct the full
range of military cyber activities, and I would like to discuss
that today to the extent that this forum allows.
And I understand that Cyber Command [CYBERCOM] is beginning
to organize itself into mission teams, which is an exciting
step. But the manpower cost is enormous and the education and
training requirement significant. This is going to take,
obviously, a lot of work to get right.
I would be greatly interested to hear how, to hear our
panelists' thoughts on how we refine the education,
recruitment, retention and training of the highly specialized
personnel that we need. And I would also like to hear how
CYBERCOM is interfacing with combatant commanders to provide
its unique capabilities wherever and whenever they are needed.
Lastly, there are two other areas of vulnerability that I
want to address today. The first is supply chain security for
our IT systems. Now we could get IT functionality perfect and a
robust defense of networks in place and still be at risk of
compromise from counterfeit components as well as unknown
design specifications within an approved component,
particularly, also looking at things like zero-day exploits
which we know our adversaries make extensive use of.
So the second is the vulnerability of our critical
infrastructure to cyber attacks. DOD relies on these services
but they are defended by other Federal agencies or departments,
or not at all. So I mention this frequently because I want to
make progress in the effort to close these gaps. And today is
another opportunity to see where we are on this matter.
So with that, again, I want to welcome our witnesses here
today. Before turning it over to you--back to you, Mr.
Chairman, I just want to take this opportunity to congratulate
General Alexander in particular. This is grandchild number 15
was born today. A grandson. And General, I just want to
congratulate you and your family on the addition to your
family.
[The prepared statement of Mr. Langevin can be found in the
Appendix on page 31.]
General Alexander. It is probably more than----
Mr. Langevin. Thank you. And congratulations again,
General. And I yield back, Mr. Chairman.
Mr. Thornberry. And then what State was he born?
General Alexander. Texas.
[Laughter.]
Mr. Thornberry. Thank you. I just want to get that on the
record.
Mr. Langevin. Point well taken.
Mr. Thornberry. And I appreciate the gentleman's comments.
And just as an administrative note, I want to remind members
that next week, we have our first quarterly cyber operations
briefing which is similar to the counterterrorism quarterly
updates that we have been receiving. This is a new provision in
the Defense Authorization Act, and we will have that classified
briefing next week.
Without objection, all of your statements will be made a
part of the record. And we would appreciate your summarizing
them. We again appreciate our witnesses, the Honorable Teresa
``Teri'' Takai, Chief Information Officer of the Department of
Defense; the Honorable Elizabeth McGrath, Deputy Chief
Management Officer at the Department of Defense; and General
Keith Alexander, Commander of USCYBERCOM.
Thank you all for being here. Ms. Takai, you may summarize
your statement.
STATEMENT OF HON. TERESA M. TAKAI, CHIEF INFORMATION OFFICER,
U.S. DEPARTMENT OF DEFENSE
Ms. Takai. Good afternoon, Mr. Chairman and distinguished
members of the subcommittee. Thank you so much for giving us
the opportunity to testify today on the importance of
information technology to the transformation of the Department
of Defense.
I am responsible for ensuring the Department has access to
the information, the communication networks, and the decision
support tools needed to successfully execute our warfighting
and business support missions. The Department's IT investments
support mission critical operations that must be delivered in
both an office environment and the tactical edge.
Just to give you some perspective on the size and scope of
what we cover, we operate in over 6,000 locations worldwide.
And we support the unique needs and missions of three military
departments and over 40 defense agencies and field activities,
and our services are used by 3.7 million people.
Included in the overall IT budget are the Department's
cybersecurity activities and efforts that are designed to
ensure our information systems and networks are protected
against the ever-increasing cyber threats the Department and
the Nation face.
We are undertaking an ambitious effort to realign and
restructure our ability to provide better access to
information, improve our ability to defend and keep pace. This
effort is the Joint Information Environment [JIE].
The Department is aligning its existing IT networks into a
Joint Information Environment that will define how we are
restructuring not only our networks but our computer centers,
our computing networks and cyber defenses to provide a singular
joint cybersecurity approach that is common across the
classified, secret, and coalition networks. This is in contrast
to today's networks in which each military department differs
in its approach and design in cyber defense.
The ultimate beneficiary is the commander in the field. The
consistent network in IT and security architecture will enable
innovative information technologies that keep pace with today's
fast-paced operational requirements.
Our standard security architecture will enable cyber
operators at every level to see who is operating on our
networks and what they are doing. This will enable a
synchronized cyber response. And I am sure General Alexander
will be speaking more to you about this in his words.
The consolidation of data centers, operations centers and
help desks will enable timely and secure access to the
information and services needed to accomplish their assigned
missions, regardless of the location.
As we have refined the JIE concept, we have concluded that
we can achieve all of the Department's cybersecurity goals but
just as importantly, still have better joint warfighting
decision support, better operational and acquisition agility,
and also importantly, better efficiency. On cybersecurity we
are focused on ensuring that the essential DOD missions are
dependable and resilient in the face of cyber warfare. The
first of the efforts that we will embark on as I have mentioned
is JIE. The second effort is our deployment and use of
cybersecurity identity credentials for all users of our secret
network. We are currently deployed on our unclassified network
and we will complete the classified network this year.
The next is continuous monitoring. This will allow us much
faster detection and remediation of mission vulnerability
across the millions of computers that are in our networks, give
us a chain of command and accountability tool, and will give
the Cyber Command better ability to set remediation priorities.
The fourth effort as was mentioned is our supply chain risk
management. Globally sourced technology provides real benefits
to the Department but it also provides the opportunity for
potential adversaries to compromise our missions through
subversion of the supply chain. The Department recently issued
policy that makes permanent the Department's efforts to
minimize the risk to DOD missions from this vulnerability.
And lastly is our successful voluntary cyber information-
sharing efforts with the Defense Industrial Base. We have 78
participating companies which represent a majority of our
acquisition spending in the Department.
We share classified and unclassified cyber threat
information and companies that have been participating said
that the program has significantly improved their cybersecurity
efforts. We are also partnering with security service
providers, for those companies that choose to use that service,
they will have additional classified threat information.
I would like to conclude by mentioning a few other efforts
that we are working on. We have a new focus on the development
of secure communications for Presidential and senior leader
comms [communications], nuclear command and control, and
continuity of government. We are working with other Federal
agencies to ensure that we have the ability to communicate at
all times. We are also working to ensure that the Department's
position, navigation and timing infrastructure is robust.
Next, my office recently issued the DOD commercial mobile
device strategy and implementation plan which allows us to use
commercial mobile devices in both a classified and unclassified
environment.
And finally, spectrum has become increasingly important not
only to the Department's mission but to consumers and the
economy of the Nation. While fully committed to the President's
500 megahertz initiative, it is important that we balance the
use of our finite radio spectrum to meet national security
requirements as well.
Thank you so much for your interest in our efforts and I
look forward to taking your questions.
[The prepared statement of Ms. Takai can be found in the
Appendix on page 33.]
Mr. Thornberry. Thank you, Ma'am.
Ms. McGrath.
STATEMENT OF HON. ELIZABETH A. MCGRATH, DEPUTY CHIEF MANAGEMENT
OFFICER, U.S. DEPARTMENT OF DEFENSE
Ms. McGrath. Thank you, Mr. Chairman. Good afternoon. We
really appreciate the opportunity to discuss with you the
progress that we have made in the defense business operations.
We feel they are critical enablers of our national security
mission and our goal is to ensure we have effective, agile and
innovative business operations that support and enable our
warfighters.
This work spans every organization in all functional areas.
Our goals are to optimize business processes and identify key
outcome-based measures. Here, information technology is a key
enabler. Over the past number of years, attention to this issue
has steadily increased and Congress has been instrumental in
shaping the governance framework and supporting processes the
Department uses to oversee these efforts. And we thank you for
that.
My written statement provides updates on our integrated
business environment framework; therein you will see evidence
of the maturation of our Business Enterprise Architecture and
some of the recent successes and challenges in the
implementations of our largest IT systems.
I will take a few moments to highlight a few of the points.
First, Section 901 of the 2012 National Defense Authorization
Act included significant changes to the Department's investment
management process for defense business systems. We established
a single Investment Review Board which we execute through a
Defense Business Council which replaced five separate
functionally based boards.
It also significantly expanded the scope of the systems to
be reviewed by the board to include those in sustainment.
Previously, it was simply modernization and development. This
new investment process allows the Department for the first time
to holistically manage the entire portfolio of business systems
in a deliberate and organized manner.
This legislation is truly serving as a catalyst for
dramatic improvements across the defense enterprise. We now
have functional strategies that articulate goals, outcomes,
expectations, standards, mandatory solution across business
lines.
Military departments and defense agencies all must align
with execution plans to these imperatives across their IT
portfolio. As an example of the Investment Review Board's
value, we identified approximately 10 percent of the systems
reviewed as legacy systems that will be retired over the next 3
years. And we are using this process to both ensure
architectural compliance and business process reengineering.
Second, I would like to highlight the ongoing work to
improve the implementation of some of the Department's most
visible defense business systems, our Enterprise Resource
Planning systems or ERPs. The Department is committed to
learning from its successes and failures as well as learning
from the findings from the Government Accountability Office and
the Inspector General.
In addition to a number of ongoing initiatives to improve
specific aspects of our implementations, I have over the last 6
months undertaken a substantial effort to work with industry
leaders to fully understand and define the leading root causes
of program successes and failures across the dimension of cost,
schedule and performance.
Our findings reinforce the need to focus the Department on
quality upfront work extremely early in a program's life cycle
to include ensuring clarity of requirements, quantifiable
business cases. As a result of this work, I have directed a
number of actions across the Department.
While we have certainly faced challenges, the Department is
making steady progress in this area including having now
successfully fielded a number of Enterprise Resource Planning
systems.
In closing, the Department remains committed to improving
the management and acquisition of IT systems as well as our
overarching business environment. These issues receive
significant management attention and are a key part of our
enterprise strategy to build better business processes that
will create lasting results for our men and women in uniform
and the American taxpayer.
I look forward to your questions.
[The prepared statement of Ms. McGrath can be found in the
Appendix on page 54.]
Mr. Thornberry. Thank you.
General Alexander.
STATEMENT OF GEN KEITH B. ALEXANDER, USA, COMMANDER, UNITED
STATES CYBER COMMAND
General Alexander. Chairman, Ranking Member, I would read
my statement but you know I can't read so I am just going to
give you the highlights from that. And I know both Ms. Takai
and Ms. McGrath can read really well. Perhaps you should read
my part.
What I want to hit is a few things that I think it is
important for the committee to know. First, you all know we
have great people. We are getting great people both in our
staff and the service components that have--that are building
the teams that we need. And issues come up with sequester
especially for the civilian folks; having to furlough those
people that we are bringing in sends a wrong message.
Further, the continuing resolution compounds our ability to
actually conduct the training missions that we need to bring
these teams on board. We talked a great deal about the threat.
You know what is going on in Wall Street, what has happened
over the last 6 months. What happened in Saudi Arabia with
Saudi Aramco, the threat is real and growing.
From our perspective, we need to be prepared for attacks
against our Nation in cyberspace. In order to do this, we do it
as a team. And that team includes DHS, Department of Homeland
Security, FBI [Federal Bureau of Investigation] and, of course,
DOD.
DHS has the resilience and recovery just like it would in a
kinetic operation. And it is the public interface for our
industry. FBI would lead investigations, look at who is doing
this inside the United States; they are the domestic handler.
And DOD has responsibility to defend our Nation from an attack,
to support the combatant commands and their operations in
planning, defend the DOD networks and other networks as
authorized.
We have created roles and responsibilities between
Secretary Napolitano, myself and Director Bob Mueller, we all
agree on that, it has gone to the White House. I think that
helps lay out the plan for how we can work with you in
establishing legislation for the future. And I can talk to
legislation and questions if that comes up.
When is civil liberties and privacy upfront here? We know
how important that is. We can protect civil liberties and
privacy in our networks. This isn't one or the other, it is
both. And I think we can do both. And to understand that, I
think we need to get into technical details. I won't do that
here, but you know we have the capacity to do that.
And I just encourage you to look at the facts in this as we
go forward. Five things that we are looking at from my
perspective in setting up Cyber Command and the teams that we
have. First and most important are people, building and
training a ready workforce. The second thing, command and
control and doctrine, we are establishing that and how we work
with the combatant commands that I can answer more, Congressman
Langevin, to your question later on about how we work with the
combatant commands. Situational awareness--how do you see what
is going on in cyberspace and how do you react to it. A
defensible architecture, I think this is absolutely vital,
especially for the Defense Department. Today, we have 15,000
enclaves. It is very difficult to defend and get situational
awareness around that. We need to go the Joint Information
Environment, something that we work very closely with Ms. Takai
and her folks. And finally the authorities, policies and
standing rules of engagement. Those are vital for the future
and we need to work with you to get those right.
That is a quick summary of my 26-page written--and so, Mr.
Chairman, I turn it back to you.
[The prepared statement of General Alexander can be found
in the Appendix on page 62.]
Mr. Thornberry. Thank you. I think that may be a record on
shortness of your testimony.
Let me just start by asking about a couple of things.
General Alexander, I think the statements you just made that
there is a role for the military, especially Cyber Command, to
defend the country in cyberspace. I think that is a step beyond
where we have been in previous years' hearings.
Can you tell us a little bit more about how that--where we
are in that discussion? Exactly what should we expect the
military to defend us against and what sort of circumstances?
And then what are the sort of circumstances that industries or
us as individuals are required to defend ourselves?
General Alexander. So there is two parts to this, to your
question. And I will give it to you as accurately as I can from
my perspective and then show you where the range of options
that the administration and the Defense Department have to look
at.
First, I think it is reasonable that we the American people
know that when our Nation is under attack, whether it is
physical attack or cyber attack, that the Defense Department
will do its part to defend the country.
It is not going to just defend itself. Our job is to defend
the country. And the focus would be, obviously, on critical
infrastructure just as it would in kinetic and other things.
The issue becomes when does an exploit become an attack and
when does an attack become something that we respond to?
Those are policy decisions and the red lines that goes to
those would be policy decisions. Our job would be to set up the
options that the President and the Secretary could do to stop
that. And as you may recall, both the former President and the
current President have both said that they would keep the
options open in this area.
I mean, I think that is reasonable, from using State
Department to demarche all the way over to kinetic options or
cyber. So they have that whole range. What we are building is
the cyber options that would fit that tool kit for the
administration and policymakers to determine exactly what to
do.
As an example, it is reasonable to expect that we would
have the ability to stop a distributed denial of service
attack, and so creating the tools and capabilities of that,
which would get into the classified area, you would expect that
we would actually go and work with our teams to do that. And
those are the kinds of things that we do. So how do we defend
the country in that? What kinds of capabilities that we need?
We have laid that out in great detail. And I think the training
on that is superb.
Mr. Thornberry. Just to make an editorial comment. I
appreciate your point that the authorities, policies, rules of
engagement are key to deciding how to use the tools that your
folks have evolved. My opinion is that the more the
administration consults with Congress, the more we can make
these decisions out in the open, the better result we will have
and in addition, the more you will have the support of the
American people.
The more that is kept secret with some White House meeting
or White House paper that is hard to access to, the more
suspicions there will be about what the government is really
doing. So I know that is kind of a different realm from yours
but I think the circumstances under which the government will
act and how it will act and who will act are important to be as
public and transparent as we possibly can.
Finally, let me ask, Ms. Takai, I have got this Defense
Science Board study that came out in January that basically
concludes, we cannot be confident that our critical information
technology systems will work under attack from a sophisticated
actor.
I mean, I am sure you have seen it. Can you just make a
comment about whether you think this Defense Science Board
study got it right about our vulnerabilities?
Ms. Takai. Well, I think, first of all, any independent
report like that is useful because it does give us an
independent view of a way of looking at our vulnerabilities.
The report is a year old at this point in time and it really
is--it does precede several of the actions that General
Alexander has taken in terms of looking to remediate.
It also does not consider some of the actions that we have
been taking to change our cyber defense approach from looking
at how we protect the perimeter and how we just protect
networks to actually how we look at it from a mission
perspective.
So what we have done is ahead of actually the Defense
Science Board report coming out, those are the same areas that
we have been looking at. Those are the same areas that we are
looking for remediation actions and some of the things that I
described in my testimony are really a step toward actually
moving forward to address some of those issues.
Now, the challenge is you are never 100 percent. And so, I
think the point around, really, looking at it from a mission
perspective is important because we need to be sure that we are
prioritizing from the standpoint of where we put our resources,
looking at it from the most critical areas and making sure they
are secure.
Mr. Thornberry. If your folks look at this and think it
appropriate, I would appreciate in a written answer some more
updates as to how far you think we have come in addressing the
shortfalls that they identified here.
Ms. Takai. Yes, sir. Absolutely. General Alexander and I
are actually working on that document, so we would be happy as
we get that developed to provide that to the committee.
[The information referred to can be found in the Appendix
beginning on page 77.]
Mr. Thornberry. Thank you.
Mr. Langevin.
Mr. Langevin. Thank you, Mr. Chairman. Again, thank you to
our witnesses. General Alexander, I would just start with you,
if I could. More of a follow-on on to the chairman's question.
Can you speak to the role of CYBERCOM as defender of last
resort in the event upon civilian--in the event of an attack on
civilian critical infrastructure?
As we know, these attacks move at network speed. And what I
want to know is what the, you know, the processes that are put
in place in terms of establishing rules of the road so that you
know how and when you can respond--if there is an attack on
critical infrastructure and CYBERCOM has to step in as the
defender of last resort?
General Alexander. So we are working with the Defense
Department, the White House, and the interagency to set up
those standing rules of engagement, put forward what I will
call the way in which we would actually execute some of these.
Right now, those decisions would rest with the President,
the Secretary. And they would tell us to execute. I think as we
go down the road, we are going to have to look at what are the
things that you would automatically do, think of this as the
missile defense, but missiles in real time.
And I think that is an education and learning process that
changes fundamentally the way that we have defended the Nation
from a kinetic perspective to how we are going to have to
defend the Nation in a cyber perspective.
So there is a lot to learn there. Most important on that,
one is the team that I talked about. But two is the partnership
with industry. And that is where the legislation is going to be
important.
We cannot see attacks going against Wall Street today.
Somebody has to tell us, and if we are going to be able to
react to it in time to have favorable results, we need to know
that at network speed so that we can react at network speed. So
those types of information-sharing and the liability of
protection that goes with them is key to this. The other part,
you know, you could put under building up standards and helping
people get to this, the executive order takes a great step in
that direction.
I think getting incentives would really help. So I think
there is a partnership here, one within the administration for
how we set this up and the rules of engagement, I take the
chairman's comments that you put about working together in a
transparent way. And the second part is we have got to have
that same discussion with industry.
Mr. Langevin. And let me use this as an opportunity to talk
about the information-sharing, and give you an opportunity to
talk about the, you know, the concerns that people have in
terms of information that would be shared with the government.
I understand--you and I understand that we are not actually
looking at information that would be shared, it is more the
bits and bytes, the ones and zeros, the attack signatures that
we would be looking for.
But I would like to again give you the opportunity for the
public to reassure them of what this is, what information would
be shared.
General Alexander. Thank you, Congressman, because I do
think this a key point.
The issue would be if somebody were throwing an attack at
Wall Street, as an example, what we would want to know is the
fact of the attack and the type of attack. We don't need to
read people's email or see their communications to get that
information.
The Internet service providers would actually see that. So
we could tell them the types of attacks, the types of exploits
and those things that the government needs to know. That
includes DHS, FBI, NSA [National Security Agency] and the
Defense Department, all together need to know that.
What we are talking about is, for example, I use the car
going up the New Jersey Turnpike on its way to Rhode Island and
it would go through an E-ZPass lane--well, in E-ZPass what
happens is the car is scanned. You don't read what is inside
the car. You just get the metadata.
In a similar way, if a packet were going forward, what the
Internet service providers need to tell us is there was a
packet, we saw bad software, malicious software in that packet,
of the type you were looking for. We stopped that packet. It
was coming from this IP [Internet protocol] address, going to
this IP address.
And it would be up to FBI if it was domestic to work with
the courts to do that or to Cyber Command if it were coming
from outside the United States. And so, the bottom line, there
is a way to do this that ensures civil liberties and privacy
and does ensure the protection of the country.
And I think we ought to work towards that and help educate
the American people on what we are trying to do here.
Mr. Langevin. I agree and I appreciate you getting that out
there.
General, if I could, I would also turn our discussion to
the new mission teams that are forming within your command. In
testimony before the Senate Armed Services Committee on
Tuesday, you noted the creation of 13 teams within--with an
offensive focus. Can you lay out for us what authority these
teams would be operating under and how will they interface with
their Intelligence Community colleagues?
General Alexander. Sure, Congressman. The key is we
organize the teams into groups. So the teams that you are
referencing, those 13 are what I will call the National Mission
teams, that would have the mission to counter an adversary who
is attacking our country.
They are the counter-cyber force. I call that offensive
because their job is to stop--like a missile coming into the
country, their job would be to stop that and provide options
for the White House and the President on what more to do.
So they are the folks that would counter any cyber
adversary. We also are creating teams to support combatant
commanders and their missions and operations, and then we are
building teams to operate and defend our networks within DOD
and work with DHS and FBI as required.
So those are the three sets of teams and the three general
missions that they have. And then, we have supporting them,
what we call direct support teams that provide the analytic
support that we would need for that.
All of this is integrated and works seamlessly with the
Intelligence Community and with FBI to ensure we don't have
duplication of effort and we are not all operating on the same
place in cyberspace so that that is deconflicted.
Mr. Langevin. My time is expired. I will have more
questions for the witnesses in round two. I yield back.
Mr. Thornberry. I thank the gentleman. And I think it is
helpful that explanation of what offensive means in this
context because there is a variety of definitions that people
use for that.
Dr. Heck.
Dr. Heck. Thank you, Mr. Chairman. I thank all of you for
being here.
General Alexander, there have been some discussions about
the roles of Cyber Command and protecting domestic critical
infrastructure. How would that role differ if the attack was
coming from OCONUS [outside the contiguous United States]
versus CONUS [contiguous United States] and do you have the
Title 10 authorities necessary to respond to a domestic attack
in real time since you are really the only entity that can
defend in real time.
General Alexander. Congressman, thanks, because I think for
clarity, from my perspective, the domestic actor would be the
FBI. And the FBI, we share our tools with the FBI.
They would work through the courts to have the authority to
do what they need to do in domestic space to withstand an
attack. We have worked very closely together.
Director Mueller and his teams are absolutely superb to
work with. And we have come up with a way that he would do
inside, we would do outside. Now, there may be points in time
where you have different--you know, significant attacks where
we need to change parts of that.
But the key thing is to have him do inside the country. We
can support back and forth and do this at network speed. So we
are practicing that. I think that is something that we can do.
He would work with the courts as appropriate to do his
portion of the mission. Outside the country, that is where we
would operate.
Dr. Heck. So you would be comfortable if there was a Saudi
Aramco kind of attack that originated from within the United
States at U.S. infrastructure, that the FBI would be able to
respond and thwart that attack in real time?
General Alexander. Assuming that we could see it because
that kind of an attack is a whole different issue. And on that,
where we would really depend is on working with the Internet
service providers. They would stop that packet initially by
some signature that we gave them.
And so, that is something that would go to a domain
controller that we could stop. I think that is a different set
of tactics that you would use versus the distributed denial of
service attack where you are trying to take out the bots and
the command and control infrastructure.
Dr. Heck. Okay. And then, how is the IC [Intelligence
Community] supporting the cyber intelligence needs of DOD? I
mean, beyond NSA, what IC organizations are the primary
intelligence providers for CYBERCOM?
General Alexander. Well, there are several, of course, the
Central Intelligence Agency [CIA], the Defense Intelligence
Agency [DIA] and NGA, the National Geospatial Agency. Tish Long
and her folks have done a superb job, too.
It is kind of interesting. You say, ``Well, what can you
see from imagery?'' But there are some great things that you
can do by bringing the actual physical infrastructure and
overlaying the cyber infrastructure--so all those work.
And within the military, DIA has, within our J2, people, at
Cyber Command that work at--and of course, NSA has a great
foundation of folks that really provide the best support that
we have across that technical layer.
Dr. Heck. Thank you, Mr. Chairman.
Mr. Thornberry. Thank you.
Mr. Kilmer.
Mr. Kilmer. Thank you, Mr. Chairman.
I am particularly interested in workforce issues and how we
prepare the workforce to meet the needs within the cyberspace.
And I have a number of questions in that regard.
And I guess, Ms. Takai, I will start with you. As CIO
[Chief Information Officer] you oversee the Information
Technology Exchange Program that is set to expire on September
the 30th, which seems like a good opportunity to leverage
talent that is already in the workforce to bring industry and
the Federal Government together, to knowledge share and learn
best practices in cybersecurity.
I was hoping you would give a little update on that
program's success and then I have a few specific questions
therein. Do you feel like enough private companies know about
the program and have been able to take part? Can you speak to
the advantages of extending and/or expanding the program?
Have there been any problems with any aspects of the
program that you think, if we looked at continuing it, should
be addressed? And then, finally, I know to be eligible, an
employee must be a GS-11 or the equivalent or above. Do you
think that is an appropriate level or would you think there
would a value in adding additional--involving additional
workers in the mix?
Ms. Takai. Well, let me see if I can take all those
questions in turn.
First of all, I think, we probably do need to expand our
communications on that program. The program has been, I think,
a great opportunity for us to bring industry technology experts
into DOD and likewise, be able to look at where DOD employees
can go out into industry to get experience.
But to date, we really do need to think about how we expand
the program and from a communication perspective. However, I
think it is important to note that right now, we have a key
individual who has just recently joined my department from
Cisco.
He is a very skilled, highly capable architect and one that
is always difficult to grow. That kind of technical knowledge
is something that just takes time. And so, the ability to bring
that individual in and have them take a look at the work we are
doing on the Joint Information Environment has really been
valuable.
So we are really seeing the benefit of the program and
therefore it is very important to us to continue the program. I
think in terms of some of the challenges that we have had in
terms of moving the program forward, it has really been
understanding how to get the companies to understand the
security requirements and for us to be able to get them in
through our fairly long security process.
And I think some of that is just a part of it. But I think
also we need to be in a position where we can better educate
the companies on the kinds of security requirements that we are
going to be asking about. And so, we are looking very much to
take the lessons learned from the program, to be able to expand
it. I think from a level perspective, I think starting at the
GS-15s is sort of the--you know, the first level is actually a
good place because it does give us the opportunity to go from
the GS-11 level up through various levels, you know, into
actually an SES [Senior Executive Service] level, which is the
more highly skilled folks.
So I think starting there is a good place and the program
does give us the flexibility then to bring people in at
different levels. So we are very excited about the program. As
I say, we appreciate the industry participation we have had so
far and would very much like to continue the program past the
sunset date in September.
Mr. Kilmer. Thank you. Maybe just in follow-up, I would
just like to ask more generally what you feel collectively we
can do as Members of Congress to help you recruit an adequate
number of workers in the cybersecurity realm?
Ms. McGrath. So I can say from a--again, I am more in the
business space within the Department and it is always
challenging to find skill sets even with the Enterprise
Resource Planning and the more modern technological capability.
So we are buying commercial-off-the-shelf. It is really
educating the workforce to get there. The Congress has passed
legislation to enable us to hire highly qualified experts. I
feel the Department has not leveraged the opportunity that we
have so far, or to date, as much as we could have, really
bringing folks in for a term.
It can be 1 to 5 years to work on some of these really sort
of hard problems that we have, to ensure that our outcomes are
what we need. But we do have actually a very good model in the
SECDEF [Secretary of Defense] Corporate Fellows Program where
we take our military and send them out to industry for a year
at some of the, I would say, best and brightest companies like
Cisco and Caterpillar and Google and--so we are not leaving
anybody out, but I couldn't possibly mention them all.
Because they are already cleared, they have, I will say
those kinds of requirements already met and it seems to be an
easier transition from within the Department for our military
externally, but I would wholeheartedly welcome, you know,
anything we could do to advance the communication because I
think it helps certainly in the business space with the
activities we have under way.
Mr. Thornberry. Mr. Peters.
Mr. Peters. Thank you, Mr. Chairman.
Just maybe a follow-up on that. I think, General, it was
you who may have told us a few weeks ago about some of the
difficulties you were having recruiting talented individuals in
light of the budget uncertainty that we had.
That perhaps, people are coming to you and saying--I heard
this at one testimony I think it was you--saying, ``Gee, you
know we can't really depend on this for a career if we don't
think that Congress is behind it.''
Last week, we took an action to relieve some of the
pressure, perhaps, on the military side at the House level and
that is working its way through Congress. But, do you want to
update us, just to follow on Mr. Kilmer's question, how is the
uncertainty around the budget or how is the budgeting
continuing to affect your ability to recruit the kind of people
we need to be our warriors?
General Alexander. So, you have hit it right on the head,
Congressman, that what we are getting from some of our people
especially those who come from industry, they already take a
pay cut coming to the government. And they do this because they
are patriots.
The issue is they have taken a pay cut and now we are
saying, ``Well, you might get a pay cut again and this pay cut
will be furlough and we are not sure how that is going to go,
or where that is going to be.''
That uncertainty is something that truly complicates their
willingness to stay with us. And we don't--we should not do
this to them. You know, we are trying to get the great people
into cyber. These are technically qualified people.
You go out to Google, they are looking for people today.
You know, I sat down with the Google HR [human relations]
folks. They said, ``Look, we are paying, you know, probably
twice as much as you are paying folks'' and they are having
trouble getting them.
We get them because they want to do something good for the
Nation. So as a consequence, I do think we have to, one, give
them the certainty. I would just say, two, they are our most
valuable assets. You know, it is the people. That is the talent
that we need and we need to let them know we care about them,
all of us, and we need your support in that.
Mr. Peters. Thank you.
Thank you, Mr. Chairman. I yield back.
Mr. Thornberry. Thank you.
Mrs. Davis.
Mrs. Davis. Thank you, Mr. Chairman.
And I would certainly appreciate that comment because
sometimes we have a perception out there that somehow Federal
workers are not necessary to make everything work in this
country. And I think that we know that that isn't true on just
about every level. And so, I appreciate your comments.
I wanted to ask about the electronic health records. I know
that is not exactly on the agenda right now. But I wonder if I
could do that because we know that recently it was announced
that the Department of Defense was going to--no longer are we
going to have parallel efforts, I think, in trying to create an
interoperable system. And that the Department of Defense was
going to try and work with the Veterans Administration [VA].
Can you talk a little bit about that and what is going on? We
had had that strategy articulated that they were going to do
that, and it is just not clear now, exactly, what we are going
to do.
I know that the discussion was around trying to cut costs,
that we were going to create this common system, but in light
of the fact that we are not going to do that, how are we going
to create this interoperable system that is going to work?
Ms. McGrath. So I would be happy to take that question.
The Department of Defense and Veterans Affairs have been
working together over probably 10 years to enable greater
sharing of information between the two organizations. So when
our military members transition from defense to the VA, that
all their information comes with them and we could get out of a
more paper-based approach to medical treatment and history.
And I think we have made significant progress in terms of
sharing the information over big, I'll just say, pipes of
interfaces between the two organizations. Both DOD and VA were
looking to modernize their legacy environment.
And so, back in March of 2011, then Secretary of Defense
Gates and Secretary Shinseki of the VA decided to abandon, if
you will, either legacy system--so in VA it is VistA [Veterans
Health Information Systems and Technology Architecture] and DOD
it is AHLTA [Armed Forces Health Longitudinal Technology
Application]--and move together jointly for sort of a common
system, if you will, although it would probably be a family of
systems that enable this capability to happen.
And we moved out smartly and made sure that we were
approaching the solution, if you will, with a common
architecture, a common data standard which is really key toward
interoperability.
VA has moved their systems into our DISA [Defense
Information Systems Agency], so that we are collocating as much
as possible common business practices.
Because if you don't have all these things, you are still,
I will just say, the IT will only get you so far.
And so, the foundational aspects of all these things we
agreed to in 2011.
What you have heard recently, is the, in December of 2012
the Interagency Program Office had completed an engineering-
based or bottoms-up, if you will, lifecycle cost estimate which
really put the approach, the affordability of the approach, in
question.
So the question Secretary Panetta and Shinseki said to the
teams was, is there a more economical way to still deliver an
innovative electronic health record to our military members and
veterans, but it is done in a less risky way.
So you reduce the risk, decrease the cost and maintain the
schedule that we are on. And that is when the Departments
decided to instead of build, if you will, the system piece by
piece, to start from a core set of capabilities and build out
from a core.
So the VA decided to go back to their legacy system, again,
VistA. The DOD does not have, right now anyway, a desire to use
its legacy system and want to ensure that we have explored all
opportunities.
So when we are looking at what would our core capability--
would it be the VA's VistA core, VistA as our core? Would we
look at--would we have something commercial? The health space
has gone, has made tremendous leaps in terms of modernization
over years. We want to ensure that we are assessing the
capabilities that commercial market brings.
And we are right now--we issued a request for information
in February. We got all the answer, all the responses in. We
are evaluating them through our Cost Assessment and Program
Evaluation team has the lead for that and they will make a
determination whether or not we will go with a COTS
[commercial-off-the-shelf]-based solution or a government-based
solution by the end of March.
Mrs. Davis. Is it fair to say that we have kind of
abandoned, though, the joint strategy?
Ms. McGrath. I think the joint strategy still exists from a
data interoperability and integration. If I talk about a
military member's health record, I am populating that record
from data from different sources.
The change in the strategy is really the underlying IT
system. We still want to do as much joint as we can from the
various applications like immunization, lab, and all the other
health-related stuff.
And I think that the architecture, again all the handshakes
that we made in the beginning in terms of architecture data,
those are all still absolutely at the forefront.
So there has been certainly a change with the approach to
the underlying IT. But there has been no change to our----
Mrs. Davis. I guess what would be helpful to know about
that is how is that going to affect the service member. And if
they are--it sounds like you are looking at a new acquisition
strategy perhaps. And I think we would certainly be concerned
about costs involved and kind of, what have we lost I guess, in
that time that we were working on all that.
So I just wonder maybe we can follow up with those
discussions. But I appreciate it because I wanted to just take
this opportunity to try and understand better what has happened
and how we can move forward.
Ms. McGrath. Yes, ma'am, I would be happy to----
Mrs. Davis. We have spent a lot of time on that.
Ms. McGrath. We have and I would just say that all the
infrastructure, the very foundational things that we have been
working on since the agreement in 2011, all will be carried
forward. And so, we are not, I will just say, scrapping
anything from that perspective; we continue to use those
foundational pieces because they are key irrespective of the
applications that will ride on top of that infrastructure.
But I would be happy to give you more detail.
Mrs. Davis. Thank you. Thank you, Mr. Chairman.
Mr. Thornberry. I appreciate the gentlelady asking about
that because I remember very well the hearing we had in the
full committee with Secretary Panetta and Secretary Shinseki.
And this was the key thing they trumpeted. Never before would
we have this kind of cooperation between the VA and the
Pentagon with one health record that would follow a service
member from the day he enlisted all the way through.
And it is discouraging that under the best case scenario it
is going to be significantly delayed to have that available as
you all work through these various options. I don't understand
or underestimate the technical difficulty in doing so.
I don't know. It is just frustrating I guess when this was
trumpeted as such an achievement; that at least, there is a
change in strategy.
Ms. McGrath, I am really not trying to pick on you but let
me ask you about one other situation that maybe hadn't turned
out so well.
The Air Force's Expeditionary Combat Support System [ECSS],
what happened with that? And what have we learned from it?
Ms. McGrath. I would like to say--and I will very quickly
move to the ECSS question.
But the two things on the electronic health record. One is
the underlying system piece, and sort of the modernization.
What we are also focused on is accelerating data
interoperability. We have standard data in the Defense
Department across the entire organization. Because of the
mobility of our military members, the information must be
wherever the military member is--that is theater, East Coast,
West Coast, does not matter.
The VA--we are mapping the DOD health data dictionary to
the VA data so that by the end of this year we will be using
standard data between the two organizations and we will be able
to populate a military record, an integrated electronic health
record, with DOD and VA information.
And so I don't want to--I understand the concerns. I have
been----
Mr. Thornberry. That is helpful, I appreciate you
clarifying that.
Ms. McGrath. And so, we do. We are moving very smartly
forward.
With regard to the Air Force logistics transformation
program, true, not as positive a story. It was a story that
began in the 2005 timeframe, and it was laden with I will just
call them issues. We had a couple of protests along the way I
think that added at least a year-plus to the program. We
restructured it in 2009. They didn't meet a 5-year initial
operational capability in the 2010 timeframe. So then we put I
will just say stronger fiscal controls on the program to make
sure that we identified success criteria both from a government
perspective and a vendor performance perspective.
We also restructured the contract to be more outcome-
oriented. And frankly, the program overall was not delivering.
And, therefore, we cancelled it in the December timeframe of
last year.
We have this in terms of this program that has provided
many lessons learned as well as some of the other programs,
both--some successful--we still learn from these programs and
some not, in the area of size and scale this clearly was one of
those programs that was way too big.
We need to chunk these IT systems, if you will, into
smaller capability sets. And so, we are delivering and then
adding as opposed to trying to deliver the whole thing at once.
Buy in leadership skill sets. And we talked a little bit
about cyber skills and I mentioned the skill sets. Data, data
quality is huge. For any of these IT programs, you are really
trying to take really old data from old legacy systems, bring
them into the new modern, much more tightly controlled
environment. We have learned a ton with regard to data.
The infrastructure also can't be understated. The work that
Ms. Takai is doing with the Joint Information Environment so
that we have a much more holistic perspective on the network.
How it runs, it is optimized. We find in every program I will
just call it too much infrastructure, so it adds to latency and
all of these kinds of issues. We have captured all of these, if
you will, lessons learned along with some standardization of
leading indicators across programs; we weren't managing and
monitoring them in a similar way. And we have made those
changes so that the program office, us, and us together, can
look at really the health of each one of these programs as they
move throughout the life cycle.
Mr. Thornberry. Well, to state the obvious I realize, but
under the best case scenario we are going to have tight defense
budgets as far as the eye can see. And a large amount of money
goes to these various IT programs.
And obviously we have the same interest that you do, I
know, into making sure that the money we spend is spent well
and you get something for it.
It is particularly--I mean I appreciate the lessons
learned, which are important absolutely. But it is frustrating
also to spend money and then not have a system that works at
the end of the day.
Hopefully, the lessons will improve others but it is
something we are going to have to continue to get better about,
no doubt.
Ms. McGrath. Excuse me, sir, may I add just very quickly?
Mr. Thornberry. Of course.
Ms. McGrath. Because I mean we do share both the desire to
get it better and the frustration when it doesn't. And I am
constantly looking for ways in how you apply the lessons
learned from program A to program B or whatever the next one
is.
But I would also say that I don't want to lose sight of
some of the capability that has been delivered.
And the only data point that I will give you is that in
2009--and when we looked at the amount of money being spent on
really we have about 14 of these major business programs. We
were highly in a developmental stage.
The number of users in these main ERP [Enterprise Resource
Planning] programs was about 27,000. Today, those same
programs, we have 195,000 users. So we have delivered
capability without going through the--I will just say the [word
unclear] we tend to talk about, those that are sort of really
big, expensive and not go so well. But there has been progress
made in terms of delivering supply chain capability, financial
capability, and also contracting. And I just don't want to lose
that--and I appreciate you allowing me to share that.
Mr. Thornberry. Yes, ma'am. I appreciate it.
Kind of continuing on a theme of trying to spend smarter or
at least exploring ways, Ms. Takai, the Defense Business Board
made recommendations about satellite communications [SATCOM]
and recommended that we could make some capital leases in
multiple increments of up to 10 years. It has also been
suggested that we could lease these satellite services for more
than 1 year at a time which is what we have been doing and
probably the most expensive way to do it.
Can you comment on that suggestion? And is that not
something the Department should look at as a way of saving
money for the commercial satellite services that we, that the
Department depends so much on?
Ms. Takai. Yes, sir. We have seen the Defense Business
Board recommendations and we do believe that there is benefit
in looking at the cost recovery model that we are using for
commercial SATCOM. And it is a requirement that we actually
look at that over a multi-year period because of the nature of
the industry.
So one of the things that we are doing is to actually put
together a cost recovery model that takes into account a multi-
year acquisition, to look at what is the best approach so that
we can guide programs going forward.
We are implementing a converged SATCOM gateway architecture
that will help to standardize more on the way that we are
buying commercial SATCOM and actually our own SATCOM. We are
looking at a plan of action for our own nuclear voice
conferencing integration and then looking at--we are actually
conducting an analysis of alternative study as it relates to
that.
One of the challenges for us is that when we look at
commercial SATCOM, it is also important for us to look at the
security of that commercial SATCOM. And in many cases, we are
asking those commercial SATCOM providers to actually provide us
capabilities that aren't necessarily the demand from the rest
of their customers to the extent that we are looking at it.
So that requires some upfront investment for them, and if
we are not able to actually commit to a multi-year capability,
then we get into a couple of situations, neither of which is
good. One of which is we would ask them to take that on and yet
at the point in time we want to use it, we no longer have the
funding in order to be able to do it.
On the other side, we fund it upfront and we aren't
necessarily using the capability. That is why we need to look
at a different way of the cost recovery model from a multi-year
perspective in order to be able to manage the issue that was
raised by the Defense Business Bureau.
Mr. Thornberry. Well, if there are additional authorities
that you need to look at multi-year procurement of these
services, please come and talk to us because I don't see if you
are a satellite company how you can meet the Defense Department
needs a year at a time particularly given what you just said
about enhanced security requirements as part of that. I don't
see how that can ever be done cost-efficiently without looking
ahead several years.
General Alexander, I am going to take the other side of the
argument now. This is a brochure from one of your two hats
about commercial solutions for classified. And I guess it is
inviting commercial companies to submit their products to see
whether it could be used in a classified environment.
I mean--and I guess in a general way, is this a new
emphasis on making more use of commercial hardware and software
in a classified environment? And can we do that in a secure
way? Again, thinking back to the Defense Science Board saying
we got problems here.
General Alexander. Chairman, I think we can. A couple of
areas. If you think about encryption capabilities, going out
and getting commercial encryption and making sure that it meets
the standards, and we can set the standards based on different
encryption levels. We can if we know the company and the way
they actually create the capabilities, the tokens. And you can
look at some of the DOD cards and stuff that we actually use.
We can ensure that it is done right, then there is a great
opportunity for us to work with industry.
I think this is going to become hugely important as we grow
mobile devices that, you know, our spouses will use for
banking, need to be secured at a comparable level to the way
that we would need to do classified and sensitive operations.
So ensuring that the devices have that capability not only
helps industry, it helps the government, and I think there are
great ways to do it. We look at that in some of the encryption
stuff we work with NATO [North Atlantic Treaty Organization]
and elsewhere, so I do think it is a great step forward, and
industry does provide us some great capabilities.
Mr. Thornberry. Mr. Langevin.
Mr. Langevin. So maybe on that line of commercial, let's
talk a little bit about the cloud as where--we seem to be
moving more and more toward the cloud. You know, articles that
I have been reading recently have diminished my confidence in
the security of the cloud, at least it has called it into
question anyway.
There have been some high-profile thefts of information
from that, in that realm. And yet I know that certainly is
something that your operation, General, are looking at moving
more into, more in that direction.
Let's talk about the security of the cloud. And if we do
make a robust change in that direction, you know, what are we
doing about guaranteeing security? What is your level of
confidence in securing the cloud?
General Alexander. So this has several dimensions to answer
that question. I am going to try to hit each of those, and then
if you want more information, we can come back.
First, when we talk about cloud security versus what we
call legacy architectures, the problem that we have with legacy
architectures is if you look at the Defense Department's 15,000
enclaves with administrators for each of those enclaves, the
ability to patch those networks and set vulnerabilities is at
the manual speed.
And the problem that that creates if you say that the time
a vulnerability is publicly identified until it is done in the
Department, it takes way too long because it is done to those
15,000 network parts.
We are using the host-based sensor systems to help speed
that up but it is not where it needs to be. And your ability to
actually see into those enclaves is very difficult. So the
first thing that a cloud can give you is the ability to patch
those systems almost in real time. You can reach out and patch
that network there.
Now there are some issues that we have had with the cloud.
One of the things that we saw is the cloud systems as we saw
them did not have data element-level security tagging
capabilities. So in the one that we created, Accumulo, we
allowed it to have each element of data tagged and secured at
that level, and only accessible at that level.
And there are some exceptional things that we can do in
this area that I can go into more detail in another setting
that gives you how I think this is more securable than legacy
architectures. From our perspective, from our technical
perspective, it is much better. It is not perfect. The issue is
somebody who hacks into your networks over here, you don't know
where they are but they have free--they are free to roam around
once they are inside. You just don't know they are there.
As you may know, most companies that get hacked in the
legacy system don't know about it for 6 to 9 months. I think we
can go much further in the cloud and I think you will see that
that will far outstrip legacy architectures in security. Unless
you come up with an architecture that is completely
independent, nobody else can get into.
But for what we need it for the Defense Department, we need
mobile secure comms [communications]. And when you think about
it, think about our ships, our aircraft and our mobile teams
out there, they have to talk to something in the mobile
environment. They are going to end up talking to the cloud. So
we have to fix that cloud environment.
I will tell you that what Ms. Takai and her folks are doing
with the Joint Staff J6 and our folks on the JIE is a huge step
in that direction. It will address all of those types of issues
and there is more. You know, I feel like the Ginsu knife guy--
``wait, wait, wait, there is more''--because, you know, think
about what you can do in a cloud that you can't do in a normal
system, just to give you a couple of ideas.
You can jump your networks, you can jump your databases,
like frequency-hopping, that makes your ability to hack into
them very, very difficult; and each day down that can be
encrypted with a different algorithm depending on the security
levels of the people who need access to that data. That is a
huge step forward. We are having tremendous success in that
area. And I think you have seen some of the folks who are
working on that.
I think you may talked to some of them, Dave Hurry and some
of the others that are really good at that.
Mr. Langevin. Well, thank you for the answer. That helps
quite a bit. If I could, let me turn now to Ms. Takai. So
obviously this is, you know, all of these great technologies
that we have ultimately come down to the people.
How well they are trained, do they know the capabilities of
the systems and so--I know you touched on this a little bit but
can you speak further to us about how you are developing the
pipeline of cyber and IT professionals in the Department and
are there things that we can do better to support you? And I
know you have talked on this a little bit, I would like to give
you an opportunity to expand on this even further if you would.
Ms. Takai. Thank you very much. Well, first of all, let me
just give you a synopsis of the actions that we are taking
around growing the cyber workforce. The first steps are really
around being able to support General Alexander and making sure
that as we are growing the cyber capabilities, we are doing it
to the requirements of what he feels he needs from the cyber
workforce perspective.
So it is important that we recognize that the capabilities
that we are growing are going to be operational capabilities
and we are really focused on that partnership and making it
happen. We are putting together that strategy today. The first
grouping will be individuals that we have inside DOD and we
will need to update our certifications, we are going to need to
upgrade our capabilities.
And the other thing I think and General Alexander can speak
to this even more. It isn't just necessarily technical people
that are going to be on these teams. It is going to be a
breadth of experience and it is going to really need several
capabilities. Now, just to speak to the technical side of it,
we are going to be bringing in and growing the resources from
some of the technical people that we have today.
The plan is through the Joint Information Environment
really as we begin to implement it, we will be able to free up
individuals who can then be trained with some of the technical
background to be able to move into the cyber defense area much
more heavily than they are today. So that is one--number one.
And then secondly is we are going to step up our recruiting
and with that we are going to have to be more definitive around
the career path for the civilians that we hire. Clearly, the
military and General Alexander is addressing how the military
will be moving folks through. But one of our challenges is we
aren't going to be able to rotate people in and out of jobs in
the same way, because the skill sets that are required here
means we need to have a single career path for these
individuals to continue to grow.
And that will be an area that we will want to come back and
talk with you about because today the way that we do that
career development doesn't necessarily allow us to keep people
in a single path and move them up progressively, it tends to
move them around from position to position. So, that is an area
that we will be back to you.
The third area is that we are going to have to find a way
to be able to recruit individuals at the more senior levels to
be able to supplement. We are not going to be able to grow
everybody from within. And that is an area where we are going
to have to look at our existing programs to see what we can do
from a competitive salary perspective.
We can get a lot of good people because the national
mission is important, but at the same time we are going to have
to look at what those sources of individuals would be and that
would be as I say not only looking at our university systems
and being able to grow them, but also what will it take to
recruit some of them from the outside.
Mr. Langevin. Thank you. Further, you know, to talk about
this issue of integration, how are you planning to integrate
our total force capability such as those resident in the
National Guard cyber units into a comprehensive CYBERCOM
approach, particularly with regard to command and control and
authorities?
Ms. Takai. Let me start and then ask General Alexander to
comment on this as well. We believe that the National Guard
does provide a great opportunity to actually look at being able
to look at other forces. So for instance, particularly in areas
like Washington, particularly around Redmond, and in the areas
of Silicon Valley, we know already that we have individuals
that are in the National Guard that are highly capable.
The key thing I think is to make sure that as we utilize
the National Guard, we are doing it in not only a uniform way
but we are doing it in a way so that we have the advantage in
two senses. One is that it is integrated with the entire cyber
approach that General Alexander is going to speak to. But
second of all, that as we are moving people through there and
as we are actually utilizing them in different settings, that
again they are going to be operating in the same way, they are
going to be able to be integrated rather than them having sort
of a separate approach to the way they are doing the training
and not be able to call them in when they are needed.
But General Alexander, let me have you also talk to how
they are going to fit within your teams.
General Alexander. Congressman, I would add also the great
teams in Rhode Island, Texas and Nevada, just to get all three
of them out.
Mr. Langevin. The 102nd in Rhode Island.
General Alexander. And of course, I know Ms. Takai wanted
me to mention those. We sat down with the National Guard a
couple weeks ago. We have had our first Guard exercise last
summer. We will have another one this summer. As Ms. Takai
said, we are training everybody to the same standard. My
comments to them is, look, your folks have to be trained and
certified to the same standards as the Active Force.
Our focus would initially be on the cyber protection teams
that they would create. And I think they will focus on regional
teams. The 10 regions of the Guard, create those teams first,
train them and operate them. See what their role and
relationship would be working with us, DHS, FBI and NORTHCOM
[Northern Command] defense support to civil authorities. There
are some great things that we can do.
We will also create some offensive teams and some of the
Guard units are already doing that. I talked to General Grass
today on this topic. He, General Jacobi and I will meet next
Tuesday and perhaps we are going to meet right now. That must
be him calling in.
We will meet next Tuesday to actually lay out a transparent
program so the service chiefs see what we are buying. We want
to make sure that this is a program the service chiefs sign up
to because parts of this are going to be in their budget and we
want to make sure that everybody is transparent in what we are
getting here.
So that is the process. There is a Cyber Guard exercise
coming up. I think those are some of the things that you and
some of the other members may be very interested in; you are
welcome to attend parts of that.
Mr. Langevin. Thank you. I am very impressed with the work
of the National Guard and as you have mentioned we have the
102nd in Rhode Island that is actively working with various
aspects of cyber, particularly with the 24th Air Force. I have
had the ability to get down to the 24th Air Force in Texas and
visit with General Vautrinot there. And I know that they are
working very closely with our Rhode Island National Guard in
that respect.
General, as always, we thank you for--and your team. Please
pass on our appreciation to the extraordinary men and women
under your command and also, Ms. Takai, at the Pentagon, for
the work that they are doing, how dedicated they are, it is
obviously very important. We want to do everything we can to
support you and before I yield back I just want to thank the
chairman for his partnership in this effort as well.
There are very few people in the Congress--not enough--that
focus on this issue of cybersecurity and I know, Chairman
Thornberry, how much you put a lot of time and effort into this
issue and there is not another Member of the Congress that has
worked as hard on this issue as you have, so thank you.
Mr. Thornberry. I appreciate it, Jim--obviously, the
gentleman has been a leader in this for some time. Dr. Heck, do
you have other questions?
I just had two more things I wanted to ask about. General
Alexander, to the extent you can talk about it in open session,
this subcommittee has been interested before on tactical use of
cyber in military operations. And I noted that part of your
teams, the teams you are creating in Cyber Command, are those
teams--some teams to support combatant commanders.
And can you in this forum describe how that will work, to
whom they will answer, how it will be decided what operations
to carry out and whatnot, that sort of thing?
General Alexander. Chairman, broadly speaking they are
going to work at the strategic level, those combatant command
[COCOM] mission teams will be directly focused on the COCOM
requirements and answer to those requirements.
We will have a deconfliction process that that combatant
commander and myself will work together to make sure that if
somebody else is working in that space we deconflict it, and
that is logical so that you don't have two people working in
the same space.
That is different than the tactical service teams that we
would create. So if you go into Iraq like in the past 10 years
and look at what we did for our intelligence teams that support
brigade combat teams, that was a huge success.
In the future, you can imagine that we will eventually
grow, at the tactical level, cyber teams that are part of those
intelligence teams or working together with them to provide
local cyber effects. They would have to be trained to the same
standard, deconflict through a theater and others, just as we
do other areas. But I think it would provide that.
And then you can see that the Air Force and Navy would have
tactical and operational level that would nest into what we are
building at the combatant command level. So I think they will
work as a team, think of that as a cryptologic architecture now
for cyber going all the way down. And I think this provides us
tremendous capability at the tactical edge.
Mr. Thornberry. I fully agree, it does. I guess, what I
haven't quite got my mind around is how you deconflict what you
think is a tactical operation when there really is not
geography in cyberspace. And so the equities that--part of
our--my concern has been that if you want to have a tactical
cyber operation, you basically have to have a full complement
of all the agencies in Washington to hash it all out. And that
is not very time efficient for cyberspace and just how that
would work on a practical basis. I think we got to work our way
through it. It is just something that I have been interested in
and we have worked on from time to time. Do you have one----
Ms. Takai, we could not have a hearing without me asking a
question about spectrum, because it is such an important part
of what goes on. I know there was a recommendation for sharing
spectrum as a possible, I don't know solution, but as a
possible step that could increase spectrum for anybody. Do you
have any comments on that recommendation?
Ms. Takai. Yes, sir, and I was wondering whether we would
get to the spectrum question or not, so here we are. We
actually feel very strongly that it is important that we look
at spectrum-sharing as a possibility.
I think the report that you are referring to is probably
the President's PCAST [President's Council of Advisers on
Science and Technology] report that suggested that we have to
look at spectrum-sharing going forward. We are participating
now in five different working groups that are being led by the
NTIA [National Telecommunications and Information
Administration] to look at different areas of spectrum-sharing.
And we actually have had success in spectrum-sharing. We
have had an instance where we have been able to actually use
and be able to share with a medical device, a medical alert
device for some of the areas. So we do believe that there are
opportunities.
But with that, spectrum-sharing has its challenges. It
isn't a new concept; it is certainly just coming to light now
because of the severe pressure on spectrum. There are several
different ways to do it. One of them is geographic, where you
look at exclusion zones.
The difficulty for us in certain bands, like the 1755 to
1850 band, is that the exclusion zones would actually be in the
same areas that the commercial providers are interested in. So
we have to look at that. The second thing is whether we could
do it from a time standpoint.
But again in 1755 to 1850 which we use very heavily for
training in CONUS, that becomes difficult because we can't
predict where in fact we are going to be in the timeframe we
are going to be using it.
So I think it is--there are great opportunities. I think we
do need to explore and we are working and have signed some of
the first ever MOUs [memorandums of understanding] with the
some of the commercial companies to actually do some
experimentation in certain geographic locations.
But I think it is a step beyond where we can, you know,
necessarily say we can go to say that spectrum-sharing is going
to solve the problem. It is really a combination of where do we
have to vacate, where will we need comparable spectrum, and
then where are the areas that we can share now and then going
into the future.
Mr. Thornberry. Thank you. And thank you all again for your
patience and for your brevity. We hit on a wide variety of
topics today and that was very helpful. And as the gentleman
from Rhode Island said, we appreciate each of you and the folks
who work with you and what they do for the country.
With that the hearing stands adjourned.
[Whereupon, at 5:05 p.m., the subcommittee was adjourned.]
=======================================================================
A P P E N D I X
March 13, 2013
=======================================================================
PREPARED STATEMENTS SUBMITTED FOR THE RECORD
March 13, 2013
=======================================================================
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
=======================================================================
WITNESS RESPONSES TO QUESTIONS ASKED DURING
THE HEARING
March 13, 2013
=======================================================================
RESPONSE TO QUESTION SUBMITTED BY MR. THORNBERRY
Ms. Takai. Response to DSB Report on Resiliency:
The Defense Science Board (DSB) report entitled, ``Resilient
Military Systems and the Advanced Cyber Threat'' makes a series of
recommendations. There is significant effort in the CIO, USCYBERCOM,
and NSA mission spaces already happening or planned in each
recommendation area. Below are short summaries of the major DSB
recommendations, and examples of ongoing and planned work to meet them.
This list does not include efforts outside of the CIO/USCYBERCOM/NSA
area of responsibility.
DSB Recommendation #1: Determine the Mix of Cyber, Protected-
Conventional, and Nuclear Capabilities Necessary for Assured Operation
in the Face of a Full-Spectrum Adversary (DSB report page 7).
Secretary of Defense assign United States Strategic Command the
task to ensure the availability of Nuclear Command, Control and
Communications ([N]C3) and the Triad delivery platforms in the face of
a full-spectrum Tier V-VI attack--including cyber (supply chain,
insiders, communications, etc.)
Examples of ongoing efforts
Multi-level human intervention and off-line launch code
authentications
NSA-produced NC3 Information Assurance (IA) materials
Stood up the Strategic and National C3 and Intelligence
(SNC3I) Joint Systems Engineering & Integration Office (JSEIO) to do
end-to-end engineering of NC3
CIO & USD(AT&L) signed DODI 5200.44 which
institutionalizes supply chain risk management in acquisition and
sustainment
CIO & USD(AT&L) assisting STRATCOM in application of
supply chain risk management (SCRM) to its key programs
DSB Recommendation #2: Determine the Mix of Cyber, Protected-
Conventional, and Nuclear Capabilities Necessary for Assured Operation
in the Face of a Full-Spectrum Adversary (DSB report page 7).
SECDEF and Chairman, Joint Chiefs of Staff (CJCS) designate a mix
of forces necessary for assured operation . . . . Segment Sufficient
Forces to Assure Mission Execution in a Cyber Environment
Examples of ongoing efforts
Established Cyber National Mission Force-trained and
certified teams
Implementing the Joint Information Environment (JIE) to
improve cyber defense and resilience of unclassified and secret
networks for better protected conventional capabilities
Increased funding for cyber capability development (on-
hold for sequestration and Continuing Resolution)
NSA collection and analysis critical to understanding
adversary
DSB Recommendation #3: Refocus Intelligence Collection and Analysis
to Understand Adversarial Cyber Capabilities, Plans and Intentions, and
to Enable Counterstrategies (DSB report page 8). SECDEF in coordination
with the Directors of CIA, FBI, and DHS, should require the Director of
National Intelligence (DNI) to support enhanced intelligence collection
and analysis on high-end cyber threats
Examples of ongoing efforts
Improving threat information sharing in real-time across
USG
Increased Intelligence Community (IC)/NSA focus on
cyberspace operations support
Increased ``hunting'' on blue networks
Cyber integrees from NSA/USCYBERCOM at FBI, CIA, and DHS;
and vice versa
DSB Recommendation #4: Build and Maintain World-Class Cyber
Offensive Capabilities (with appropriate authorities) (DSB report page
9).
United States Cyber Command (USCYBERCOM) develop capability to
model, game and train for full-scale cyber warfare.
Under Secretary of Defense for Personnel and Readiness (USD(P&R))
establish a formal career path for civilian and military personnel
engaged in offensive cyber actions.
Examples of ongoing efforts
Established Cyber National Mission Force (Cyber National
Mission Teams and Combatant Command Mission Teams)
Cyberspace operations-focused training exercises (Cyber
Flag, Cyber Guard, and Cyber Knight)
CJCS cyber emergency action conferences
DSB Recommendation #5: Enhance Defenses to Protect Against Low and
Mid-Tier Threats (DSB report page 9).
The DOD should establish an enterprise security architecture,
including appropriate ``Building Codes and Standards'', that ensure the
availability of enabling enterprise missions . . . . The DOD should
leverage commercial technologies to automate portions of network
maintenance and ``real-time'' mitigation of detected malware . . . .
USD(P&R), in Collaboration with the DOD CIO and the Service Chiefs
Establish a Formal Career Path for DOD Civilian and Military Personnel
Engaged in Cyber Defense
Examples of ongoing efforts
Developed JIE enterprise security architecture for
unclassified, secret, and coalition networks
Migrating all internet-facing servers into a separate
zone to isolate and contain attacks
Improving SIPRNET/Coalition/Federal gateways and NIPRNET/
Internet boundary defenses
Developing a Department-wide Cyber Workforce Strategy
that includes military and civilian qualifications and career paths
Automating continuous monitoring of cyber vulnerability
via use of the already deployed Host-Based Security System (HBSS)
DSB Recommendation #6: Change DOD's Culture Regarding Cyber and
Cyber Security (DSB report page 10). Commander, USCYBERCOM and the DOD
CIO establish a plan with measurable milestones and flow down to all
organization elements.
Examples of ongoing efforts
Creating a capstone Cyber Defense strategy document,
describing strategic imperatives that will change behavior, culture,
operations, and intelligence support (e.g., Defending DOD Networks,
Systems, and Data: Strategic Choices for 2020)
Conducting annual IA training across the DOD
Simulating ``Phish-me'' exercises and other real life
exercises
Providing each organization and its chain of command an
automated cyber risk score via continuous monitoring
DSB Recommendation #7: Build a Cyber Resilient Force (DSB report
page 11). DEPSECDEF should direct specific actions to introduce cyber
resiliency requirements throughout DOD force structure.
For programs not part of the segmented force, provide a cyber
standard set of requirements (expected to be a subset of the critical
program requirements list) to be applied to all DOD programs
(USD(AT&L), DOD CIO, SAEs))
Develop DOD-wide cyber technical workforce to support the build out
of the cyber critical survivable mission capability and rolled out to
DOD force structure (USD(AT&L), CIO, SAEs, DOT&E, USD(I), USD(P&R)).
Examples of ongoing efforts
DOD CIO and USCYBERCOM identifying key cyber terrain and
infrastructure that supports critical C4 systems and assets in order to
assure mission execution while under degraded cyber conditions
Developing Resiliency Framework criteria that helps
delineate requirements for contracts and that can be used in the
acquisition process
Creating Cyber security Implementation Guidebook to
assist acquisition program managers in successfully implementing cyber
security requirements (with AT&L)
Use of Cyber Ranges for simulated live fire cyber
security exercises with active Red Team participation
[See page 9.]
?
=======================================================================
QUESTIONS SUBMITTED BY MEMBERS POST HEARING
March 13, 2013
=======================================================================
QUESTIONS SUBMITTED BY MR. THORNBERRY
Mr. Thornberry. Will you comment on requirements and guidelines
being generated by CYBERCOM with respect to an insider threat program?
How do you prevent implementation of this policy devolving into a mere
``check the box'' requirement that does little to enhance our security?
The FY13 NDAA included language on next generation host-based security
solutions and mentioned insider threat mitigation as one of those
capabilities that needed to be addressed in this context. Are
CYBERCOM's guidelines going to specify that established host-based
solutions are required to satisfy the enterprise monitoring and audit
requirements? As a part of your overall risk mitigation strategy, which
networks will your requirements cover in terms of Insider Threat
Monitoring?
General Alexander. USCYBERCOM has developed requirements for
implementation of insider threat capabilities on DOD networks in
coordination with the National Insider Threat Task Force (NITTF) and
the Comprehensive National Cybersecurity Initiative to develop and
implement a government-wide Cyber Counterintelligence Plan (CNCI 6) to
achieve the objectives described in the FY13 NDAA. These insider threat
requirements include auditing and monitoring, insider threat awareness
and training, foreign travel and contact reporting, polygraphs,
personnel security, evaluation, analysis, and reporting and security
incident reporting and evaluation. This provides a comprehensive
defense-in-depth strategy for the detection of and protection from the
insider threat. In addition, these capabilities will deter malicious
insider activity. The comprehensiveness of this approach prevents the
policy from becoming a ``check the box'' requirement. USCYBERCOM
directives as spelled out in OPORD 12-106 specify that host-based
solutions are required to satisfy the enterprise monitoring and audit
requirements. All U.S. owned and operated DOD Non-secure Internet
Protocol Router Network (NIPRNET) and Secret Internet Protocol Router
Network (SIPRNET) networks are covered by these requirements for host-
based security and insider threat monitoring.
Mr. Thornberry. What progress has DOD made in improving the agility
and flexibility of the IT acquisition process?
Ms. McGrath. DOD has taken a number of important steps to improve
the agility and flexibility of our IT acquisition processes both
through policy and through proactive involvement with active IT
acquisition programs. A common theme of these efforts has been to
tailor the processes to the unique attributes of IT in a way that
speeds delivery of capability into the hands of our users.
One important development has been the adoption of an acquisition
model tailored for defense business systems. This alternative
acquisition model provides a comprehensive process that aligns
requirements, investment, and acquisition processes for defense
business systems under an integrated governance framework and focuses
on incremental delivery of capability, within eighteen months of
program initiation. This incremental approach improves control over
cost, schedule and performance requirements.
The Under Secretary of Defense (Acquisition, Technology &
Logistics) issued implementing policy for this model in the summer of
2011 and the guidance was incorporated into the Defense Acquisition
Guidebook in the fall of 2012. This policy is being incorporated into
the next update of the DOD 5000.02 acquisition instruction. The Defense
Enterprise Accounting and Management System (DEAMS), an Air Force
financial management program, was the first program to achieve an
acquisition decision under this new policy and we are in the process of
transitioning several other major IT programs to this new approach as
well.
Through the use of this approach, DEAMS has integrated
traditionally stove-piped processes and enabled tight integration
between the functional sponsor and the program office. We continue to
conduct targeted outreach with Program Managers, Functional Sponsors,
and Program Executive Officers on this new policy, and are working with
the Defense Acquisition University to embed the new process into
appropriate curriculum.
Mr. Thornberry. In the FY12 NDAA, this committee directed the
establishment of an insider threat detection program. Can you please
describe the current status of this effort, which is supposed to
achieve full operational capability later this year?
Ms. Takai. DOD has been actively participating in National Insider
Threat Task Force (NITTF) addressing government-wide insider threat
issue--consistent with EO 13587, ``Structural Reforms to Improve the
Security of Classified Networks and the Responsible Sharing and
Safeguarding of Classified Information.'' The NITTF issued
implementation guidance of EO 13587 via Presidential memo on Nov 21,
2012.
Internally, DOD has:
instituted read/write controls for external secret
computer access ports and restrictions and audits of removable media
(USBs, etc.,);
driven out anonymity and instituted access control
through public key infrastructure (PKI) implementation; and
improved our ability to detect anomalous or malicious
behavior on the DOD's secret network.
o Provides limited ability to discern data access that signal
exceptions to normal data access.
o Provides full packet capture in order to discern patterns of
malicious activity and allow for the investigation of
incidents.
Mr. Thornberry. How will the Joint Information Enterprise (JIE)
interact with other major IT related initiatives, like the Defense
Intelligence Information Enterprise or electronic health records
interoperability? Will it be interoperable with the networks of the
Intelligence Community?
Ms. Takai. The DOD CIO is leading the DOD's IT effectiveness effort
to achieve the Joint Information Environment (JIE) and the Director of
National Intelligence CIO is leading a similar effort of the
Intelligence Community Information Technology Enterprise. Both CIO's
share common objectives and end-states, and actively participate on
each other's governance boards, standards and architect forums, and
Identity Management and data framework forums. Both CIO's recently
established a Joint Information Standards Committee (JESC), and a
directed policy governing the reuse of standards and specifications
between the two communities to ensure interoperability and information
sharing.
The Defense Intelligence Information Enterprise (DI2E) is a
unifying construct between the Department of Defense, the Intelligence
Community (IC), and coalition Intelligence Information Enterprises, and
aligns with the Intelligence Community IT Enterprise (ICITE) and DOD
Joint Information Enterprise (JIE) policy and strategy.
The DI2E Governance Council oversees development and implementation
of a DI2E that is standardized, secure, optimized and interoperable,
that aligns with DOD, IC and Coalition IT Enterprises. The Council
coordinates on similar efforts by the IC Chief Information Officer
(CIO), the DOD CIO, and the Defense Information Systems Agency (DISA)
to ensure intelligence information integration across all security
domains, including top secret, secret, unclassified, and various
coalition fabrics. It enables seamless theater intelligence
architectures and achieves efficiencies across the Defense Intelligence
enterprise by recommending cost saving measures.
With respect to electronic health records interoperability, DOD is
establishing a Medical Community of Interest (Med-COI) virtual network,
under the auspices of JIE and its single security architecture. The
Med-COI, using the JIE architectural construct, will provide enterprise
services and operate within the secure and protected DOD Global
Information Grid (GIG). This capability will support unhindered and
timely data access of patient records for DOD and VA clinicians and
adjudication of VA Benefit claims.
Mr. Thornberry. What role does the Cyber Investment Management
Board (CIMB) play in decisions related to the JIE, especially with
decisions related to service-specific system and network acquisitions?
Ms. Takai. The CIMB is an advisory and management body, established
to facilitate cohesion across S&T, requirements, acquisition, R&D, T&E,
and sustainment efforts to ensure that cyber warfare investments are
effectively coordinated across the Department. In this capacity, the
CIMB is intended to provide a framework to make resourcing
prioritization recommendations consistent with established JIE
milestones.
Mr. Thornberry. In discussing the Joint Information Environment
(JIE), there seems to be a lot that is aspirational with this
construct, but you will be limited by the current network environment
that you have. How does DOD plan to get from the current ``as-is''
state to the ideal ``to-be'' state?
Ms. Takai. DOD is continually modernizing its IT infrastructure and
systems, and has several ``network'' initiatives on-going (i.e.,
LANDWARNET, AFNET, NGEN, etc.) that are focused on achieving the same
objectives as JIE for the individual Military Services. JIE effort will
leverage their already planned activities and technology refresh cycles
to optimize the current network environment to our desired ``to-be''
state from an enterprise perspective. At the enterprise level, DISA has
planned upgrades of the Defense Information Systems Network (DISN)
consistent with the target architecture for the JIE, to include the
replacement of circuit-based switches with IP-enabled technologies, and
replacement of legacy transport routing to Multiprotocol Label
Switching (MPLS). The detailed solution architectures for the JIE are
scheduled for completion in June 2013, and are being incorporated into
Component programming activities for FY15 and beyond. The Department's
JIE Technical Synchronization Office (JTSO) is developing a
consolidated synchronization plan in conjunction with other DOD
Components.
Mr. Thornberry. Last year, the House Oversight and Government
Reform committee introduced the Federal Information Technology
Acquisition Reform Act (FITARA). Are you familiar with this proposed
legislation? If so, what thoughts do you have on how this might affect
DOD equities?
Ms. Takai. I am aware of the some of the provisions of last year's
draft bill, as well as the current version that was introduced earlier
this year. I believe because of the complexity of the Department's
missions, we will need to examine the legislation carefully to ensure
that it does not undo important relationships we have developed between
the Office of the Secretary of Defense and the Services and Agencies as
well as introduce new or overlapping requirements for the Department
for its IT investments.
Mr. Thornberry. Following the termination of the Net-Enabled
Command Capability (NECC), what is the Department doing to modernize
its command and control capabilities?
Ms. Takai. The Department is executing a sustainment and
modernization plan to evolve the current Global Command and Control
System (GCCS) family of systems and related command and control
programs to improve mission effectiveness, achieve efficiencies, and
provide required command and control capabilities to the joint
warfighter. Our sustainment and modernization efforts will ensure
support to current operational priorities while migrating to objective
capabilities described in the recently updated Joint C2 Capability
Development Document (CDD).
Mr. Thornberry. How do you plan to address ``Bring-Your-Own-
Device'' (BYOD) policy and the use of cloud technologies? Also, how can
DOD keep up with the rate of technological change while using the DFAR?
Are current acquisition reform efforts sufficient?
Ms. Takai. Bring Your Own Device (BYOD) and portable cloud services
are emerging trends in commercial industry. Many issues must be
addressed before the DOD can embrace these technologies, such as
overcoming existing DOD policy constraints, understanding the various
operational use scenarios, examining potential security
vulnerabilities, and avoiding potential legal issues that surround BYOD
solutions. My office published the DOD Mobile Device Strategy on June
8, 2012, and the DOD Commercial Mobile Device Implementation Plan on
February 15, 2013, with the focus on improving three areas that are
critical to mobility: 1) the networking infrastructure to support
wireless mobile devices, 2) mobile applications, and 3) a framework
that will allow the Department to sustain a commercial mobile solution
that is reliable, secure, and flexible enough to keep pace with fast-
changing technology. The DOD CIO will continue to monitor BYOD efforts
across our Federal Government and, in conjunction with the Digital
Government Strategy, will continue to evaluate BYOD options.
Cloud Computing is becoming a critical component of the Joint
Information Environment (JIE) and the Department's Information
Technology (IT) modernization efforts and will enable users the access
to data anywhere, anytime on any approved device. One key objective is
to drive the delivery and adoption of a secure, dependable, resilient
multi-provider enterprise cloud computing environment that will enhance
mission effectiveness and improve IT efficiencies. Cloud services will
enhance warfighter mobility by providing secure access to mission data
and enterprise services regardless of where the user is located and
what device he or she uses.
My office recently issued the DOD Cloud Computing Strategy to
provide an approach to move the Department to an end state that is an
agile, secure, and cost effective service environment that can rapidly
respond to changing mission needs. There are two key components of the
Department's cloud strategy. The first component is the establishment
of a private enterprise cloud infrastructure that supports the full
range of DOD activities in unclassified and classified environments and
optimizes data center consolidation efforts. The second is the
Department's adoption of commercial cloud services that can meet the
Department's cybersecurity and other IT needs while providing
capabilities that are at least as effective and efficient as those
provided internally.
The Defense Information Systems Agency (DISA) is designated the DOD
Enterprise Cloud Service Broker to facilitate and optimize access and
use of commercial cloud services that can meet DOD's security and
interoperability requirements, and ensure that new services are not
duplicative of others within the Department while consolidating cloud
service demand at an enterprise level. In addition, DISA, as the DOD
broker, will leverage the Federal Risk Authorization and Management
Program (FedRAMP) standardized security authorization process,
including the accepted minimum security baseline for low and moderate
information security categorizations, and ongoing continuous monitoring
to ensure that appropriate security controls remain in place and are
functioning properly.
Current acquisition reform efforts offer opportunities to
accelerate the adoption of commercial technologies. In many respects,
despite their rapid evolution, mobility solutions are much like other
traditional IT systems that empower users and managers with the tools
and information they need to execute their missions. Our strategy of
integrating well-orchestrated limited deployment pilot implementations
allows users and managers to rapidly innovate, mature critical
technologies, and resolve integration challenges to swiftly address
mission challenges. The Implementation Plan incorporates many of the
Services technology development efforts in a spiral approach with an
18-month acquisition cycle. The Implementation Plan streamlines the
certification and accreditation (C&A) process for mobile devices,
operating systems, and applications. Sharing the workload with industry
will bring the timeline for C&A down from over 18 months to about 30
days with no reduction in security posture. Though the platforms will
continue to evolve, we have the same commitment to systematic
acquisition practices that serve the defense community most
effectively. We continue to review the mobility acquisition lifecycle
for efficiency opportunities.
Mr. Thornberry. Would you tell us how much funding has been set
aside to assist DOD organizations in establishing Insider Threat
Programs in accordance with the recent Presidential Mandate, Memo, and
National Insider Threat Standards? Further, who will be the
organization responsible for identifying and distributing the necessary
funding to each DOD entity? Who will be on point from your office to
ensure the funding is being appropriately spent on the Insider Threat
Mission within each DOD entity? Are there additional monies coming from
the ODNI or the Office of the National Counterintelligence Executive
(NCIX) for Enterprise Audit and Insider Threat missions?
Ms. Takai. The Department initially programmed $162M, FY12-16, in
order to satisfy the Executive Order 13587 requirements. The Department
is assessing the need for additional resources to address the insider
threat as part of our FY 15 budget deliberations. The Defense
Information Systems Agency (DISA) and the Defense Manpower Data Center
(DMDC) are the responsible implementing agencies for the initial $162M.
My office is overseeing implementation of the budgeted and programmed
funds provided to date. The Department is developing the necessary
policy and responsibilities required under the Presidential mandate
issued November 21, 2012. Regarding additional monies, there has been
limited funding provided to a number of our Title 50 elements by ODNI
and NCIX in FY 11 and 12. We don't anticipate any additional funding
from ODNI or NCIX.
Mr. Thornberry. Does the Department have a strategy to leverage
commercial cyber security solutions to enable it to benefit from such
capabilities as real time, global threat intelligence that has been
optimized to work in highly sensitive environments? Who in the
Department is responsible for the operational requirements, technical
requirements, funding and acquisition? When does the Department plan to
start executing against each of these requirements?
Ms. Takai. Yes, for instance, initial funding was secured beginning
in FY 14, under the program name ``Zero day Network Defense'' (ZND)
which consists of commercial tools to be acquired and deployed in
partnership between the Defense Information Systems Agency (DISA) and
NSA to provide this defensive capability at the DOD perimeter, and on
classified end point systems.
While unclassified systems are just beginning to use this
technology from commercial vendors, we are currently seeking funding to
expand the ZND capability to unclassified networks and develop a Global
Reputation Service that will be capable of ingesting information from
commercial vendors, as well as government sources.
The requirements for this capability were derived from multiple
sources, including the Cyber Situational Awareness Initial Capabilities
Document with input from all DOD components and agencies.
______
QUESTIONS SUBMITTED BY MR. LANGEVIN
Mr. Langevin. General Alexander, in testimony before the Senate
Armed Services Committee on Tuesday, you noted the creation of 13 teams
with an offensive focus. Given that cyber in many cases requires
preparatory work in order to access the full range of capabilities, how
forward-leaning will these teams be?
What training will you be providing to the identified mission teams
and to other personnel who are being assigned to cyber work? Do you
require additional authorities or resources in order to fully train the
men and women under your command, particularly with regard to language
skills, emulation and red-teaming?
General Alexander. USCYBERCOM identified 42 specific work roles and
the standards and skills required for planning and executing cyberspace
operations. We worked with the National Security Agency, Service
Departments, academia, and the private sector to leverage existing
training solutions and created new ones, as appropriate, to train the
personnel assigned to those work roles (see Exhibit A for additional
detail.) Over the next three years we will train the Cyber Mission
Forces that will perform world-class offensive and defensive cyber
operations as part of our Cyber National Mission Teams, Cyber Combat
Mission Teams and Cyber Protection Forces. We do not require additional
authorities or resources to train the currently identified cyber
professionals.
[Exhibit A is For Official Use Only and is retained in the
committee files.]
Mr. Langevin. Ms. Takai, what progress has DOD made in improving
the agility and flexibility of the IT acquisition process, and is there
additional Congressional action needed?
Ms. Takai. There are unique characteristics associated with the
acquisition of information systems that require the use of acquisition
approaches different from those normally used by the Department for
acquiring weapons systems. All acquisition approaches should be
tailored to the nature of the product being acquired. For example,
information systems (e.g. business systems) do not require significant
technology development like many weapons systems and they do not have
the long term operations and support challenges facing most weapons
systems. The Department has made steady progress in implementing
several of the key approaches for improving the agility and flexibility
of the IT acquisition process in the areas of requirements,
acquisition, testing and certification and human capital. Many of these
efforts will be captured in the next release of DODI 5000.02,
``Operation of the Defense Acquisition System'' including:
Requirements: The Joint Staff has updated the
requirements management process (Joint Capability Integration and
Development System (JCIDS) to include a more streamlined requirements
management and approval process for acquisition of information systems.
Acquisition: On June 23, 2011, a Directive-Type
Memorandum (DTM) on Business Capability Lifecycle (BCL) was signed and
issued by USD (AT&L). The BCL provides a framework for implementing
more flexible and streamlined processes for the acquisition of these
business information systems and has been incorporated into the next
release of DOD 5000.2.
Test and Certification: The Department's testing
community has been working in collaboration with USD (AT&L) to
incorporate an integrated testing, evaluation, and certification
approach into the DODI 5000.02, to reduce redundancies in system
testing activities and improve the efficiency and effectiveness of
testing the Department's information systems.
Human Capital: A comprehensive review of IT acquisition
competencies is also currently being conducted by the Department's
Chief Information Officer. This review will update the IT acquisition
competencies to better define DOD critical skill sets and assist in the
update of curricula at the Defense Acquisition University and the
Information Resources Management College.
______
QUESTIONS SUBMITTED BY MR. ROGERS
Mr. Rogers. Ms. Takai, could you please explain the Department's
decisionmaking process for when to use ``sole source'' and ``brand name
only'' solicitations, such as those run under the Air Force's NETCENTS-
1 and NETCENTS-2 contracts?
Ms. Takai. The vast majority of procurements through the NETCENTS
vehicles are accomplished via a competitive process. In the rare event
that a sole source or specific brand name is required, appropriate
Justification and Approval documentation is prepared and approved at a
level commensurate with the dollar value of the proposed procurement.
Mr. Rogers. What steps does DOD take to meet the statutory
requirements of FAR sec. 6.303 and/or FAR sec. 16.505, as applicable,
that are the prerequisites for a sole source and/or brand name product
procurement, single name product procurement, including the necessity
to conduct open procurements, determine minimum needs, and solicit the
interest of manufacturers or prospective offerors?
Ms. Takai. All DOD requiring officials must follow and adhere to
applicable procurement policies in accordance with the Defense Federal
Acquisition Regulation Supplement (DFARS), which is regularly revised
to ensure alignment with the Federal Acquisition Regulations (FAR) as
well as other regulations and statutes. DFARS subpart 216.5 requires
that all orders for supplies or services exceeding $150,000 that are
placed under multiple award contracts be awarded on a competitive basis
with fair notice given to vendors of the intent to purchase, and an
opportunity for all vendors to submit offers and receive fair
consideration. There are allowable exceptions that must be based on
justifications and/or determinations written and approved in accordance
with FAR 8.405-6; if a statute requires the purchase be made from a
particular source, or if one of the circumstances described in FAR
16.505 (b) (2) (i) through (iv) applies. DOD contracting officers must
always consider price or cost as factors when selecting a vendor for
award, and should also consider past performance of potential vendors.
As an overview, the steps followed to award in DOD include: 1) system
engineering analysis to determine requirements, 2) market research to
determine what products are available to satisfy those requirements,
and 3) written documentation via a determination or Justification and
Approval of anything less than full and open competition (including
specification of a particular brand name product). Even when a
particular brand name product is required and justified, there is an
expectation of competition if there are multiple competing resellers of
that same brand name product.
Mr. Rogers. When the requirements of FAR sec. 6.303 and/or FAR sec.
16.505, as applicable, are determined not to have been met, what
remedial steps are in place to make sure these requirements are
considered?
Ms. Takai. There are many stages at which such a determination
might be made, such as: by the program manager after market research
activities, by the contracting officer or the contracting activity's
Competition Advocate prior to solicitation and/or award or by the
Government Accountability Office after an unsuccessful vendor files an
appeal. There are different remedial steps for each scenario. Standard
DOD acquisition and procurement procedures contain safeguards and
checkpoints at multiple levels to ensure that any proposed exceptions
to the competition rules are fully vetted and adequately justified. DOD
contracting officers must make public the justification(s) required by
FAR 6.303-1 in accordance with FAR 5.3 and as required by law. If a
prospective (or unsuccessful) offeror believes that the procedures
described in the FAR and/or DFARS have not been followed, they will
generally contact the contracting officer who has responsibility for
the acquisition, or the contracting activity's parent organization. If
warranted, the contracting officer can then cancel the procurement
activity--or issue a ``stop work'' order to study the situation (if the
contract has already been awarded). In order to meet the requirements
of the requesting office, the contracting officer may reshape the
procurement into a competition among multiple vendors under a pre-
existing contract vehicle, or pursue full and open competition among
all vendors of a particular type/class of capability.
Mr. Rogers. What process does DOD use in deciding to standardize on
particular technology, and how does such standardization further the
goal of maintaining a competitive procurement process which is
essential to reducing costs in government procurements? Does that
process flow down to how the Services make similar decisions?
Ms. Takai. When there are clearly definable minimum functional/
technical standards that are available and necessary to attain a
required capability, the DOD CIO will assemble a cross-Component
``tiger team'' (including Acquisition personnel) to translate those
standards into requirements suitable for release of an Request for
Quotes (RFQ) or a Request for Proposals (RFP) to industry. For example,
when data-at-rest (DAR) software was initially identified as an urgent
requirement for all DOD laptops and portable computers, the Defense-
Wide Information Assurance Program (DIAP) assembled such a tiger team
to flesh out the applicable required specifications. Then they
partnered with the DOD ESI Software Product Manager team from USAF to
translate these specifications into an industry solicitation that
resulted in the creation of DOD ESI Blanket Purchase Agreements from 10
different publishers of DAR software. By DOD CIO policy, all DOD buyers
of DAR software were required to buy DAR software only through one of
these agreements. Competition among the resellers generally resulted in
lower prices, and the DIAP certified that all purchased products met
both the functional & technical standards.
______
QUESTIONS SUBMITTED BY MR. FRANKS
Mr. Franks. General Alexander, I want to thank you for your service
and leading such important missions with USCYBERCOM and the NSA. I am a
strong believer that our military is, and should always be, better than
the rest of the world's armed forces, and that we should never be
entering fair fights. With that in mind, and the introduction of these
new offensive cyber teams, and the fact that cyber threats are a
relatively new phenomenon, how much better are we on offense, and
defense in the cyber realm as compared to our enemies.
General Alexander. We believe our offense is the best in the world.
Cyber offense requires a deep, persistent and pervasive presence on
adversary networks in order to precisely deliver effects. We maintain
that access, gain deep understanding of the adversary, and develop
offensive capabilities through the advanced skills and tradecraft of
our analysts, operators and developers. When authorized to deliver
offensive cyber effects, our technological and operational superiority
delivers unparalleled effects against our adversaries systems.
Team Cyber is constantly increasing its operational and analytic
defensive capabilities through the adoption and use of standards to
facilitate domain knowledge representation and information sharing
across the community. In addition, the use of standards ensures
compatibility with technologies commonly available in the public domain
and allows for the rapid integration of new functional capabilities to
avoid long-term engineering and development cycles.
Potential adversaries are demonstrating a rapidly increasing level
of sophistication in their offensive cyber capabilities and tactics. In
order for the Department of Defense to deny these adversaries an
asymmetric advantage, it is essential that we continue the rapid
development and resourcing of our Cyber Mission Forces.
Mr. Franks. General Alexander, last year I asked you a question:
How prepared are we to carry out your mission if the power grid or
substantial part of it were to go down for an extended period of time?
For example, two weeks or longer due to severe space weather or a
manmade electromagnetic pulse.
Your answer included that fact that much of DOD's cyberspace is
served through commercial providers. Do you feel that the power and
electricity needed to carry out your mission is important enough to
require those commercial providers of the power grid to successfully
harden their grid from severe space weather or manmade electromagnetic
pulse? Can the DOD require that of commercial providers of the grid? Do
you feel that this issue is important enough that legislation is needed
to force the hand of industry to act?
General Alexander. While I absolutely agree with the criticality of
cyber hardening the power grid, I also believe any legislative solution
has to take into account the prohibitive costs associated with doing so
given its antiquated state. I believe the activities underway through
the President's EO 13636 ``Improving Critical Infrastructure
Cybersecurity'' and PPD-21 ``Critical Infrastructure Security and
Resilience'' are a good first step. Legislation which builds upon these
activities by providing the right set of incentives would be
invaluable.
From an NSA and CYBERCOM perspective, it is also critical that
Congress pass information sharing legislation that enables effective
two-way sharing of cyber threat information and countermeasures between
the private sector and the USG. By effective two-way sharing, I mean
that the government needs to know, in real time, when there are
indications of cyber intrusions or attacks against the nation's
critical infrastructure, and the government needs to be able to share
in real time, indications and warnings of attacks and associated
countermeasures that the private sector needs to protect their
networks. Given the authority to share information, the ISPs could act
as a domestic radar that can see cyber threats and tip and queue the
government to respond in real time.
NEWSLETTER
|
Join the GlobalSecurity.org mailing list
|
|