Datasets:

Modalities:
Text
Formats:
text
Languages:
English
Libraries:
Datasets
License:
CoCoHD_transcripts / data /CHRG-114 /CHRG-114hhrg20064.txt
erikliu18's picture
Upload folder using huggingface_hub
067e9f5 verified
raw
history blame
84.3 kB
<html>
<title> - [H.A.S.C. No. 114-112] HEARING ON NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2017 AND OVERSIGHT OF PREVIOUSLY AUTHORIZED PROGRAMS BEFORE THE COMMITTEE ON ARMED SERVICES HOUSE OF REPRESENTATIVES ONE HUNDRED FOURTEENTH CONGRESS SECOND SESSION</title>
<body><pre>
[House Hearing, 114 Congress]
[From the U.S. Government Publishing Office]
[H.A.S.C. No. 114-112]
HEARING
ON
NATIONAL DEFENSE AUTHORIZATION ACT
FOR FISCAL YEAR 2017
AND
OVERSIGHT OF PREVIOUSLY AUTHORIZED PROGRAMS
BEFORE THE
COMMITTEE ON ARMED SERVICES
HOUSE OF REPRESENTATIVES
ONE HUNDRED FOURTEENTH CONGRESS
SECOND SESSION
__________
SUBCOMMITTEE ON EMERGING THREATS AND CAPABILITIES HEARING
ON
FISCAL YEAR 2017 BUDGET REQUEST FOR
U.S. CYBER COMMAND: PREPARING
FOR OPERATIONS IN THE CYBER DOMAIN
__________
HEARING HELD
MARCH 16, 2016
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
______
U.S. GOVERNMENT PUBLISHING OFFICE
20-064 WASHINGTON : 2017
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Publishing
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800;
DC area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC,
Washington, DC 20402-0001
SUBCOMMITTEE ON EMERGING THREATS AND CAPABILITIES
JOE WILSON, South Carolina, Chairman
JOHN KLINE, Minnesota JAMES R. LANGEVIN, Rhode Island
BILL SHUSTER, Pennsylvania JIM COOPER, Tennessee
DUNCAN HUNTER, California JOHN GARAMENDI, California
RICHARD B. NUGENT, Florida JOAQUIN CASTRO, Texas
RYAN K. ZINKE, Montana MARC A. VEASEY, Texas
TRENT FRANKS, Arizona, Vice Chair DONALD NORCROSS, New Jersey
DOUG LAMBORN, Colorado BRAD ASHFORD, Nebraska
MO BROOKS, Alabama PETE AGUILAR, California
BRADLEY BYRNE, Alabama
ELISE M. STEFANIK, New York
Kevin Gates, Professional Staff Member
Lindsay Kavanaugh, Professional Staff Member
Neve Schadler, Clerk
C O N T E N T S
----------
Page
STATEMENTS PRESENTED BY MEMBERS OF CONGRESS
Langevin, Hon. James R., a Representative from Rhode Island,
Ranking Member, Subcommittee on Emerging Threats and
Capabilities................................................... 2
Wilson, Hon. Joe, a Representative from South Carolina, Chairman,
Subcommittee on Emerging Threats and Capabilities.............. 1
WITNESSES
Rogers, ADM Michael S., USN, Commander, U.S. Cyber Command....... 3
APPENDIX
Prepared Statements:
Rogers, ADM Michael S........................................ 28
Wilson, Hon. Joe............................................. 27
Documents Submitted for the Record:
[There were no Documents submitted.]
Witness Responses to Questions Asked During the Hearing:
[There were no Questions submitted during the hearing.]
Questions Submitted by Members Post Hearing:
Mr. Lamborn.................................................. 49
Mr. Wilson................................................... 49
FISCAL YEAR 2017 BUDGET REQUEST FOR U.S. CYBER COMMAND: PREPARING FOR
OPERATIONS IN THE CYBER DOMAIN
----------
House of Representatives,
Committee on Armed Services,
Subcommittee on Emerging Threats and Capabilities,
Washington, DC, Wednesday, March 16, 2016.
The subcommittee met, pursuant to call, at 2:03 p.m., in
room 2212, Rayburn House Office Building, Hon. Joe Wilson
(chairman of the subcommittee) presiding.
OPENING STATEMENT OF HON. JOE WILSON, A REPRESENTATIVE FROM
SOUTH CAROLINA, CHAIRMAN, SUBCOMMITTEE ON EMERGING THREATS AND
CAPABILITIES
Mr. Wilson. Ladies and gentlemen, I call this hearing of
the Emerging Threats and Capabilities Subcommittee of the House
Armed Services Committee to order.
I am pleased to welcome everyone here today for the hearing
on the fiscal year 2017 budget request of the United States
Cyber Command. Since we last met to talk about the work of
USCYBERCOM, the news has been filled with stories that remind
us of the critical job facing the Department of Defense [DOD],
from the intrusion on the Joint Staff networks to the
compromise of personal information of millions of government
personnel and their families.
Cyber is proving to be both a domain of warfare on its own
as well as a key enabler for all other domains of war. In
looking through this most recent budget request, we should be
asking ourselves some important questions.
Do we have the resources, people, cyber tools and training
needed to be effective?
Do we have the necessary policies and authorities to
conduct cyber operations?
What areas require additional refinement?
Are we deterring potential adversaries and contributing to
our overall national security?
As we tackle these tough questions, I would like to take
the opportunity to welcome back as our witness today, Admiral
Michael Rogers, commander of U.S. Cyber Command.
One of the major tests that our Admiral Rogers has to
contend with is how to operate in an environment in our
interagency, international, and industry partners. I am pleased
to hear that in a major upcoming exercise entitled Cyber Guard
2016, personnel from the House administration staff will be
participating. I am especially looking forward to hearing the
plans for that exercise and how we might also apply its lessons
in defending the House of Representatives' networks.
I would like now to turn to my friend, Ranking Member
Congressman Jim Langevin from Rhode Island, for any comments he
would like to make.
[The prepared statement of Mr. Wilson can be found in the
Appendix on page 27.]
STATEMENT OF HON. JAMES R. LANGEVIN, A REPRESENTATIVE FROM
RHODE ISLAND, RANKING MEMBER, SUBCOMMITTEE ON EMERGING THREATS
AND CAPABILITIES
Mr. Langevin. Well, thank you, Mr. Chairman. I want to
welcome Admiral Rogers back before the subcommittee today. It
is an honor to have you here, Admiral, and appreciate all you
are doing to protect our Nation's cyberspace and certainly look
forward to discussing cybersecurity and operational fiscal year
2017 budget request for U.S. Cyber Command across the
Department.
I have been one of the biggest proponents of cybersecurity
as a critical warfighting domain during my time in Congress. So
I am pleased to discuss this vital piece of our national
security here with you today.
As we know, cybersecurity and cyber operations are
paramount in today's world, from defending the DODIN
[Department of Defense Information Network], to deterring and
defending against adversaries, to meeting combatant command
needs. Cyber is a key component of all strategies across every
aspect of national defense and security.
As such, the total cybersecurity and cyberspace operations
budget for the DOD is $6.8 billion for fiscal year 2017 and
ranges from protecting data to operating in the domain.
Now, of that investment approximately $505 million is
requested for Cyber Command. Now, the funds requested for the
service cyber components to mature the command and increase the
capacity of cyber mission forces [CMF] make up a substantial
portion of that request.
While we have made tremendous progress in this area,
significant investment over the Future Years Defense Program
will still be required. And as the CMF matures we must work to
synchronize investments made by services in other agencies.
Now today, I look forward to receiving an update on the
CMF, particularly with regard to the readiness of our service
cyber components to meet the initial and fully operational
capability goal dates for the teams, as well as the challenges
and risks associated with meeting those mandatory deadlines.
We must have the right number of teams, but just as
importantly we must also have a ready force that is manned,
trained, and equipped to meet the mission.
I am particularly pleased that Cyber Command has made
progress in measuring readiness. Now, since last year strides
have also been made in establishing a persistent training
environment, a necessity for preparedness.
Today I hope to hear more about the steps Cyber Command has
taken since last year to promote a joint environment with
common standards such as issuing guiding frameworks for
doctrine, organization, training, leadership, education, and
policy, as well as whether or not capability baselines for
cyber protection teams have been established to ensure
interoperability and aligned investments.
With respect to the cyber teams' missions, there is a whole
host of policy questions we must address as we continue to
mature our offensive and defensive capabilities and operations.
I believe it is imperative that we understand lessons
learned from real world experiences about command and control
of teams and their various roles in missions, capabilities
required, authorities used, and new authorities that may be
required for more effective operations as well as internal-
external oversight.
So finally, Mr. Chairman and Admiral, I look forward to
hearing about the status of the implementation, acquisition,
and personnel management authorities that were granted in the
fiscal year 2016 NDAA [National Defense Authorization Act].
So I know it is a lot to cover, Admiral. You have got a lot
on your plate. I appreciate the extraordinary work that you and
your team do at Cyber Command or at NSA [National Security
Agency] are doing to protect our country in cyberspace and
leverage all the capabilities for the benefit ultimately of our
warfighter and our national defense.
So with that, thank you again for testifying here today,
Admiral Rogers, and thank you for your service to our Nation.
And Mr. Chairman, thank you for your attention, your focus
and your support on this issue especially. And I yield back.
Mr. Wilson. Thank you, Congressman Langevin.
I am grateful, Admiral Rogers, that your written statement
has been submitted for the record. So we ask that you summarize
your comments within the 5-minute rule, which is applicable to
all of us and being well-maintained by Kevin Gates.
Admiral Rogers, please begin.
STATEMENT OF ADM MICHAEL S. ROGERS, USN, COMMANDER, U.S. CYBER
COMMAND
Admiral Rogers. Before my clock starts, I would like to
start with we should be doing this outside given how beautiful
the day is. We should be outside.
With that, Chairman Wilson, Ranking Member Langevin,
distinguished members of the committee, I am pleased to appear
before you today to discuss the opportunities and challenges
facing Cyber Command. And I would like to thank you for
convening this forum.
It is an honor to represent the individuals of this fine
organization, and I am grateful for and humbled by the
opportunity to lead this impressive team. I am confident you
would be extremely proud of the men and women of Cyber Command
if you saw their commitment to mission and hard-earned success
on a daily basis as I do.
While my written statement goes into greater detail, I
would like to briefly highlight the challenges we face in
today's environment and also some of the initiatives the
command is pursuing to meet these challenges.
Since I testified last year, U.S. Cyber Command has seen an
intensification of cyberspace operations by a range of state
and non-state actors. We have seen a wide range of malicious
cyber activities aimed against both government and private
sector targets.
At U.S. Cyber Command we focus on foreign actors that pose
a threat to our national interests through cyberspace. At this
time nations still present the greatest or gravest threats to
our Nation's cybersecurity because they alone can commit the
significant resources needed to sustain sophisticated campaigns
to penetrate in our best-guarded networks.
But we continue to also look closely for signs of non-state
actors making significant improvements in their cyber
capabilities. The states we watch most closely remain Russia,
China, Iran, and North Korea. The self-proclaimed Islamic State
is also a concern, although mainly for their use of cyberspace
propaganda and recruiting.
In general, these actors conduct a range of cyber
activities to support their state's interest. They steal
intellectual property, citizens' personal information, and they
have intruded into networks ranging from the Joint Staff's
unclassified network to networks controlling our Nation's
critical infrastructure.
These threat actors are using cyberspace to shape potential
future operations with a view to limiting our options in the
event of a crisis.
Despite this challenging environment, Cyber Command
continues to make progress as its emphasis shifts to
operationalizing the command and sustaining its capabilities.
Over the past year we have continued building the
capability and capacity of Cyber Command while operating at an
ever-increased tempo. We continue to make progress in building
a cyber mission force of the 133 teams that will be built and
fully operational by 30 September 2018. Today we have 27 teams
that are fully operational and 68 that have attained the
initial operating capability landmark.
And it is also important to note that even as teams that
are not yet fully operational or have even met our initial
operational capability, they are contributing to our cyberspace
efforts with nearly 100 teams or elements of those teams
conducting cyber operation to include teams that are supporting
Central Command's ongoing efforts to degrade, dismantle, and
ultimately defeat ISIL [Islamic State of Iraq and the Levant].
Last year I noted we had just established the Joint Force
Headquarters [JFHQ] DOD Information Networks, or DODIN. Today I
can proudly report that JFHQ-DODIN has made great strides
towards its goal of leading the day-to-day security and defense
of the Department's data and networks.
Also as the DOD expands the Joint Information Environment
we will have significantly more confidence in the overall
security and resiliency of our systems. Our operations to
defend DOD networks and the Nation's critical infrastructure
proceed in conjunction with a host of Federal, industry, and
international partners.
No single agency or department has the authority,
information, or wisdom to accomplish this mission alone, which
is why Cyber Command recently updated our understanding with
both NSA and the Department of Homeland Security in a cyber
action plan to chart our collaboration.
Our cyber mission forces continue to operate safely and in
a manner that respects the civil liberties and privacies of
American citizens. Additionally, cyber mission teams and joint
cyber headquarters are regular participants in the annual
exercises of the combatant commands.
Cyber Command's only annual exercises, as you have
highlighted, Cyber Flag and Cyber Guard offer unmatched realism
as we train with Federal, State, industry, and international
partners. And while our training is improving we need a
persistent training environment which the Department is
continuing to develop to gain necessary operational skills and
to sustain readiness across the force.
Cyber Command is also actively contributing to the
implementation of the new DOD cyber strategy. Senior leaders at
the command are leading or serving on teams charged with
implementing the strategies and the initiatives, particularly
the lines of effort regarding the training and proficiency of
the cyber mission force and the broader cyber workforce across
the Department, as well as the integration of cyber effects and
DOD and cross-agency planning efforts.
To help with all of this we needed enhanced acquisition and
manpower authorities, and I thank Congress and the President
for the authorities granted to Cyber Command in the fiscal year
2016 National Defense Authorization Act. This represents a
significant augmentation of our ability to provide capabilities
to our cyber mission teams, as well as our ability to attract
and retain a skilled cyber workforce.
We are now studying how to best implement the Act's
provisions and laying the groundwork needed to put them into
effect while in parallel evolving a formalized synchronization
framework to operationalize and optimize the employment of
cyber mission forces.
Let me assure the committee that despite the challenging
cyber environment we operate in, Cyber Command continues to
make significant progress, all while simultaneously conducting
cyber operations against determined adversaries.
Additionally, the command has a clear path ahead and is
actively pursuing new initiatives and authorities to best
position the command to address the challenges and
opportunities that we will undoubtedly confront.
With that, thank you again, Mr. Chairman and members of the
committee for convening this forum and inviting me to speak.
And I look forward to your questions.
[The prepared statement of Admiral Rogers can be found in
the Appendix on page 28.]
Mr. Wilson. Thank you very much. And we now will proceed,
and Mr. Gates will maintain the 5-minute rule on behalf of all
of us as we rotate.
And Admiral, I want to thank you again. It is a challenging
environment. There are gruesomely capable adversaries, but I
just appreciate your service and your colleagues and however we
can back you up.
And in regard to that, currently, is the throughput of the
training pipeline a limiting factor in our ability to get cyber
mission teams up and running? And if so, do you have any
suggestions on how to improve that situation?
Admiral Rogers. So it is probably the single greatest
limiting factor at the moment. It is a little uneven. It
impacts more services than others. I would argue at the moment
it is probably having more impact on the Air Force probably
than any other services.
In fact, I just met with all of my service component
commanders in February. We reviewed where we are in bringing
the mission force online. That review highlighted that to meet
initial operational capability for the force we will have 91
percent of that completed on time. That means 9 percent behind,
so I have got between now and the end of the year to figure out
what are we going to do to get that 9 percent back online.
I have already seen some improvement just in the 6 weeks,
and I, in fact, have highlighted the results of that review
with the service chiefs as well as the chairman and the vice
chairman. So we are working collectively as a Department to
move forward.
That review also highlighted that when it comes to full
operating capability, which is the final milestone, if you
will, that is all 133 teams and at full capability by 30
September of 2018, that right now we assess as of February in
the last review 93 percent of the force will be delivered on
time. And we have 7 percent that we have got to get back
online. I have got 2 years to do that.
I am confident that we are going to be able to do it. And
as you have said, I would highlight right now training
throughput probably the single greatest limiting factor.
Mr. Wilson. And is there anything that we can do to help?
Admiral Rogers. At the moment I am still working with the
Air Force in particular. I am not ready to come to you and say
I need more external help. I want to make sure we have
exhausted everything that we can do internally.
Mr. Wilson. Well, if there has ever been strong bipartisan
support----
Admiral Rogers. Yes, sir.
Mr. Wilson [continuing]. It is people who are here today
who want to back you up.
Additionally, could you explain the capabilities
development group and give us highlights of their work?
Admiral Rogers. So it is a capability that we carved out at
Cyber Command because one of my observations was, and I have
said this to the committee before, I believe fiscal year 2016
is a tipping point for us as an organization where we will go
from a focus on developing capacity to a focus on actually
employing the capacity that we have been developing over the
last 3 years. You see that reflected in the range of both
defensive and offensive real world operations that we are doing
right now.
And so part of our capability to do that is generating very
specific technical and operational capabilities. And so I felt
we needed to carve out a segment of the team that was
partnering with the private sector, the rest of DOD, other
elements of the government, as well as NSA about how can we
bring together those capacities to generate actual outcomes in
capacities and capabilities that we can employ with the force.
Mr. Wilson. Well, so----
Admiral Rogers. So we stood that up.
Mr. Wilson. Well, again, thank you for being innovative.
How are you addressing new and emerging cybersecurity
challenges not directly related to the network like
vulnerabilities to datalinks, weapons systems, industrial
control systems, or the Internet of Things?
Admiral Rogers. Right. So just a few challenges there with
that statement.
[Laughter.]
Mr. Wilson. And I am glad Congresswoman Stefanik is here
because she understood what I asked.
[Laughter.]
Admiral Rogers. So what I have tried to do is prioritize. I
have said industrial control systems and SCADA [Supervisory
Control and Data Acquisition] probably is the next big area for
us because we have got to transition from a focus purely on the
network structure. We have to retain that but we have got to
move into other areas.
The other areas that really concern me when I look at the
problem set are platforms and systems and getting down to
individual data concentrations across the Department. We have
started an effort to look at data concentrations, a focus
industrial control systems and SCADA.
I would highlight in this regard some great work, for
example, that the Guard and Reserve are doing. I highlight
specifically out in Washington State the Army National Guard is
really doing some interesting work that we are partnering with
them on. In fact, the Secretary was just out there to take a
look at that about 2 weeks ago.
The challenge for now, because I want to set everyone's
expectations in a realistic way, I mean, what I have told the
leadership of the Department is I acknowledge that this is what
we have to do, but we have finite capacity.
So it is all about I have to prioritize and then we have
got to figure out who are the other partners that we have who
could bring additional capacity to help us in this fight. And
we are in the process of doing that.
Mr. Wilson. And for the benefit of me, can you identify
what the Internet of Things means?
Admiral Rogers. So increasingly what you are finding is in
the production of almost--increasingly everything we--
refrigerators, automobiles, your iron. I was looking at an
Internet-connected iron, for example, just a little while ago.
Increasingly those everyday devices that we take for granted in
the lives we lead are being connected with each other, designed
to increase their capability.
For example, a refrigerator, would you be interested in a
consumer if your refrigerator was able to tell you what your
current milk load is in the refrigerator and when are you going
to need to buy more? Could it do that automatically?
Could you do upgrades, for example, to systems that you are
buying now automatically remotely so that you don't have to
physically take that device into a dealer or the manufacturer,
they can do it remotely. So increasingly you are finding this
connectivity proliferating across almost everything that we are
building and buying these days.
Mr. Wilson. Well, thank you so much.
And we now proceed to Congressman Langevin.
Mr. Langevin. Thank you, Mr. Chairman.
Yes, it is a bolder world out there, Admiral, for sure. It
is just scary, challenging, and fascinating all at once.
Well, with respect to cyber mission force issues, policy,
authority, and doctrine are paramount to effectively employing
the cyber mission force. Yet those key ingredients lag behind
our talent pool and toolsets.
Now, given that the cyber domain is a relatively new
operating environment and the strategic implications associated
with operating in that environment, I understand why policy,
doctrine, and authorities have taken time to develop.
Now that said, state and non-state actors continue to be
aggressive in this environment, and we must move forward. So
this committee must also understand how they are developing and
being formalized so that we can assist where needed and
obviously conduct oversight of activities.
So my question is how are real world events such as the OPM
[Office of Personnel Management] and Joint Staff incidents and
counter-ISIL operations influencing and shaping policy,
authorities, and doctrine are required to effectively employ
our force?
Admiral Rogers. So if you take a look at Cyber Command's
three mission sets--it is kind of the way I have been doing
it--so what are the acquisitions and the authorities that we
require to make sure we are able to execute each of those three
missions in an effective and efficient manner?
So the first mission, defense of the DOD networks, I am
very comfortable that we have all the authorities that we need
and that I can do what I need to do in a timely manner within
the Department to defend our networks.
The second mission is about our ability to generate
capacity and capability to support the combatant commanders
from the defensive to the offensive. That is an area where
quite frankly we are trying to use our work, which again, I am
not going to discuss in any great detail in an unclassified
setting, but we are trying to use some of the real world
insights that you highlighted several of them, ISIL, the last
major intrusion we dealt with, which is now almost a year ago.
We are asking for the authorities we need for that and I
would highlight, boy, we are seeing a massive amount of change
within the last 6 months, so I am very comfortable that we have
identified the requirements.
We have got endorsement for what we need to do and in fact
I am expecting the last couple of changes we will ask for will
be signed out by the end of the month.
The one area that I think is still where we still need more
collective work, and I need to work on this, too. I don't want
to make it sound as if I am trying to put anyone else on
report. Is how do you apply DOD-generated capacity in the cyber
arena outside the government in the private sector?
That is probably the area where I would say we still need
to do more work. I will be honest. It hasn't been my highest
priority. As I have told you every time generally when we meet
I always remind everybody, look, there is such a disconnect
between the requirements of this mission set and where we are
in capability. It is all about prioritization and making smart
investments.
And so I have consciously prioritized along those three
missions that I just discussed. So it is the next big area that
we really have got to get into.
Mr. Langevin. Thank you, Admiral. What does Defense Support
of Civilian Authorities look like for cyber? And in our current
framework--is our current framework applicable to the cyber
domain?
Admiral Rogers. So that is a part of our previous
discussion about this fact. I think it is the area where we
still need the most work, as I know you are aware. We have an
existing framework, DSCA, Defense Support to Civil Authorities,
that we currently have in place that talks about how the
Department will employ its capabilities in support of civil
authorities.
That structure has been used for decades from tornado and,
you know, and hurricane, natural disaster response to a host of
other capabilities. It does not as currently written explicitly
address cyber.
So it is one of the areas that we are collectively stepping
back and asking ourselves, so how does the DSCA construct apply
to cyber and what is the most effective and efficient way to
use it? Because my attitude is, and it is not unique to DSCA,
let us start where cyber is very similar to the other
mechanisms we have already put in place. Don't reinvent the
wheel every time just because it is cyber.
And so we have a framework right now through DSCA for how
the Department provides capacity and capability to support
external civil authority. I think it is an area, as again I
have said previously though, we have to dig into a little bit
deeper about how are we going to do that in the cyber arena?
Mr. Langevin. Okay. Maybe to further drill down on this,
what are best practices from capability development to
leadership development are you seeing from the services? And
what steps are you taking to institutionalize these best
practices across the services?
Admiral Rogers. So I am going to combine that question with
a previous where you asked about, for example, what have you
learned from previous events like OPM and the Joint Staff
intrusion? One, and I will just use this as one example, one of
our takeaways for our effort on the Joint Staff was we needed
to do a better job of formalizing a common set of tools,
defensive tool capabilities across all the defensive teams that
we were creating.
And so I went to each of the services and said, so let us
talk about what is the best of breed, what are the best of
capabilities that we have identified within each service that
we can port across the entire enterprise? Let us not spend a
lot of time and money with everybody independently trying to
develop similar capabilities.
So in fact the Air Force has a tool that we were very
impressed with, and I am currently working with the services to
let us adopt this. This is the standard across the Department.
We don't need to do four different funding streams here to go
after the same problems sets.
We do that with respect to we regularly review training
standards and training equivalencies and when Army, for
example, has developed some capabilities in terms of the
development of training standards where they have come back to
us and asked that we adopt this, which we have agreed. I have
talked about, hey, let us use this across the entire
Department.
So we try to do it in a very systematic ongoing way because
I am a big fan of we have got to be more efficient and, you
know, we have got to be faster. And the best way to do that is
to look across an entire enterprise, both within the Department
as well as what we are trying to do outside the Department.
I won't get into that right now for this question, but I am
sure you will ask me about that later what we are doing outside
the Department to try to do those same kinds of things.
Mr. Langevin. Very good. Thank you, Admiral.
I yield back, Mr. Chairman.
Mr. Wilson. And thank you, Mr. Langevin.
We now proceed to Congressman Mo Brooks, of Alabama.
Mr. Brooks. Admiral Rogers, how much is the Cyber Command
requesting for this year?
Admiral Rogers. Slightly over $500 million.
Mr. Brooks. How much funding did the Cyber Command receive
for fiscal year 2016, the current year?
Admiral Rogers. Slightly under $500 million. It was, if my
memory is right, $488 million, and the 2017 budget request is
an approximate 9 percent increase over our 2016 authorization.
Mr. Brooks. What was it in fiscal year 2015?
Admiral Rogers. I apologize, sir. I don't know it off the
top of my head.
Mr. Brooks. Do you recall by any chance for fiscal year
2014?
Admiral Rogers. No. I don't. I apologize.
Mr. Brooks. My recollection and the reason I was asking
this is try to get better information than just my
recollection, is that the Cyber Command has had significant
increases over the last 3 or 4 years. Would that be a fair
statement to the best as you can recall?
Admiral Rogers. I would phrase it as our funding has
increased in a systematic way over the last few years.
Mr. Brooks. The reason I bring this up, and I am not sure
if you are familiar with it, but America's financial condition
has taken a fairly stark turn for the worse.
Just to iterate some of the numbers, the Congressional
Budget Office [CBO] is warning us that in about 6 years we are
going to hit a string of trillion dollar a year deficits until
such time as whatever really bad can happen happens. In my
judgment it would be a debilitating insolvency and bankruptcy
of our country.
This year the CBO is telling us that our deficit is going
to be $105 billion worse than last year at $544 billion. In
terms of our budget, we are right now having some pretty
intense discussions in Congress about our $1.07 trillion
budget. Keep in mind that there is a lot more off-budget
entitlement programs, debt service, and whatnot.
But if you have $1.07 trillion in budgetary items that you
actually have control over and have to vote on each year, that
means that right now we are being asked to borrow about half of
what we spend, a little bit over 50 percent. Money we don't
have; can't afford to pay back once we borrow it.
And all this is coming to a head. What efficiency measures
can the Cyber Command implement in order to help the taxpayer
get more bang for the buck for the day when we start seeing
sizeable cuts across the board in defense and every place else
simply because we have run out of money and we have run out of
borrowing capacity?
Admiral Rogers. So we have been doing that since the day
U.S. Cyber Command was created. It is one of the reasons, for
example, why the Department decided to align U.S. Cyber Command
and NSA very closely. That the idea was don't replicate the
billions of dollars of investment that the Nation has made in
generating cyber expertise, for example, at the National
Security Agency.
Rather than replicate that scale of investment in U.S.
Cyber Command how can you align them so Cyber Command can take
advantage of the investments that have already been made? It
goes into the way Cyber Command prioritizes. As I constantly
tell the team, nobody gets a blank check. Nobody gets a blank
check.
Mr. Brooks. Well, if we are improving efficiency normally
that means that you are getting more done for the same or less
or fewer dollars. Why then the request for an increase in
spending----
Admiral Rogers. Because I would argue, sir, look at the
world around you.
Mr. Brooks. I understand it is a very dangerous place.
Admiral Rogers [continuing]. As well. We can't----
Mr. Brooks. Okay. Let us assume for a moment then----
Admiral Rogers. If I could just finish the thought? Sorry,
sir.
Mr. Brooks. Go ahead.
Admiral Rogers. And I, please, don't mean to be rude or----
Mr. Brooks. No, that is okay.
Admiral Rogers. But just to finish the thought.
Mr. Brooks. I get interrupted all the time.
[Laughter.]
And I apologize for when I interrupt you. Go ahead.
Admiral Rogers. This is not a mission set that we are going
to efficiency our way out of. I just don't believe that that is
achievable. In no way should you take from that comment, so
Admiral, are you telling me that you don't have a
responsibility to the citizens of this nation to execute your
mission in an efficient and effective way? That is not what I
am saying.
But my only point is the investments that we are making in
cyber reflect the nature of the world we are dealing with from
a threat perspective. Even as we acknowledge that that threat
picture is occurring in an environment in which resources are
very tight. I am the first to acknowledge that.
So what I try to do as a commander, what I try to do as a
citizen, is make sure that what Cyber Command is doing is
prioritized, realizing we can't do it all. We try to space
events out over a reasonable period of time. That is what I try
to make sure we do because I think you raise a very valid
concern. I am the first to----
Mr. Brooks. Okay. I get the argument we have a growing
threat matrix therefore we need more funding in order to
properly defend against that greater threat.
Now, let us assume for the moment that there aren't any
efficiencies that you can implement that would allow us to have
the kind of security we want at current funding. Where do you
suggest the money come from in the defense budget in order to
help with Cyber Command?
Admiral Rogers. Fortunately, sir, that is not the role that
I play.
Mr. Brooks. I thought I would ask anyway, but I understand.
Admiral Rogers. [Laughter.]
Mr. Brooks. Thank you, Mr. Chairman. I yield back.
Mr. Wilson. And thank you very much, Congressman Brooks.
And we now proceed to Congressman Brad Ashford, of
Nebraska.
Mr. Ashford. Thank you, Admiral.
Admiral Rogers. Sir.
Mr. Ashford. And since I have been here it is just amazing
how quickly from when we had these discussions when I first met
you 8, 14 months ago where we are today is----
Admiral Rogers. Right.
Mr. Ashford [continuing]. Beyond remarkable. I have a lot
of questions and I know--well, just training for the moment. Do
you see the--and you already have these collaborations with
academia and others to help train and increase training
capabilities. Do you see an enlargement of that utilizing
almost a UARC [University Affiliated Research Center] model? As
for an example, I mean, I know where UARC in Nebraska, there is
MIT's [Massachusetts Institute of Technology's] UARC.
Admiral Rogers. Right.
Mr. Ashford. They have all these various ones. How do you
see--if the mission is training more and more cyber people, is
that an avenue to do that?
Admiral Rogers. I mean----
Mr. Ashford. Or how do you see that happening?
Admiral Rogers. I think that is clearly a role. One thing I
try and remind people when it comes to training I think one of
the important things is we must ensure that the output we
generate is standardized across the entire force.
Mr. Ashford. Right.
Admiral Rogers. Because if we don't do that, I believe we
are going to run into challenges when it comes to actually
employing that force. So one of the things that I have been
very insistent on, even as we partner across the total force in
DOD and we look at broader partnerships outside the DOD for the
mission force that we are creating, is that the team standards,
the training approaches we take, the certification standards
that we put in place, we have got to standardize those.
Now, within those standards what I tell the team is, look,
I am open to what are the options that are out there? And
clearly academia and the private sector are part of that
solution set.
To date we have tended to use them more on the capability
side development, if you will, than we have on the training
side, although we are doing some things on the training side.
But to be honest, I would say to date it has been more on the
capability side.
Mr. Ashford. What I see in my area, companies like, you
know, First Data, Mutual of Omaha, whatever it is, everybody
has those kind of corporate presence somewhere in or near their
districts.
And then we have STRATCOM [U.S. Strategic Command]. So what
we have, for example, in Omaha area is STRATCOM, and numbers of
employees at STRATCOM that are contractors, were in the
military, whatever, with IT [information technology]
backgrounds going back and forth either working at STRATCOM or
to Offutt or coming back into the private sector.
And there are just a huge number of these people in varying
degrees of capabilities, some younger, some retired. Maybe you
have answered this, but how do you organize that? I mean, there
is a clear force there and a lot of capability. How do you
bring them and exchange them back and forth? How would that
work?
Admiral Rogers. So in fact right now one of the things we
have started in the last year since our last budget testimony
to take the idea that you have articulated, which is how do you
harness the capabilities resonant in the private sector,
particularly those people----
Mr. Ashford. Right.
Admiral Rogers [continuing]. Who either have previous DOD
experience----
Mr. Ashford. Right.
Admiral Rogers [continuing]. And who are now operating in
the private sector? So we have created out in Silicon Valley
what we call the United States Cyber Command Point of
Partnership or Point of Presence.
We have tied it into the broader DIUx [Defense Innovation
Unit Experimental] effort, and what we have done is I put one
active individual out there, but then we have identified a team
of prior military individuals currently working in Silicon
Valley in different companies, and we are asking ourselves can
we use this as an incubator for a model that we can employ
elsewhere?
We have done it in Silicon Valley in the last year. I was
just in Boston at the end of last week. We are going to use
Boston as our second test case because of the IT capabilities
there. And then I am looking to see does this scale into
others, Omaha, for example.
Mr. Ashford. Yes.
Admiral Rogers. There are about five that we have
identified that are possibilities for the future.
Mr. Ashford. Yes, I mean, I think it is an incredible
concept and to me it is amazing how quickly you have
implemented this because just a year ago when you were talking
about it----
Admiral Rogers. Yes, sir.
Mr. Ashford [continuing]. This idea and there is just this
abundance--and I will let it go, Mr. Chairman because I am
being redundant a bit here. But is that it is amazing the
appetite on the private sector that, you know, these major
companies give us a way to help and then we have got all this
capability or whatever. But you do have to have standards
obviously.
Admiral Rogers. Right.
Mr. Ashford. And then this whole group of retired or, you
know, military personnel at STRATCOM, it is just to harness
that. And you are capturing that. It is very exciting, and I
appreciate your efforts. I think the incubator idea is great,
Center of Excellence, whatever you want to call it.
Thank you, Mr. Chairman.
Admiral Rogers. If I could, just one quick comment? I was
out in the valley 2 weeks ago talking to the team. It is one of
the most energizing--I mean----
Mr. Ashford. Yes.
Admiral Rogers [continuing]. Watching these men and women
talking about how they can take advantage of what they are
doing every day with company X, Y, or Z in the valley and how
they want to harness their knowledge----
Mr. Ashford. Yes.
Admiral Rogers [continuing]. And their military experience.
Mr. Ashford. And I see that. We meet with these companies
all the time in Omaha. The first question they have is how can
we help----
Admiral Rogers. What can I do?
Mr. Ashford [continuing]. The military, too? Thank you, Mr.
Chairman.
[Laughter.]
Mr. Wilson. And then thank you, Congressman Ashford, and it
is encouraging to see Secretary Carter and the public-private
cooperation.
And speaking of good cooperation, Congressman Doug Lamborn
all the way from Colorado.
Mr. Lamborn. Yes, thank you, Mr. Chairman. And you came all
the way from South Carolina.
[Laughter.]
Mr. Lamborn. Anyway, Admiral, I am going to build on some
questions that have already been begun by my colleague,
Representative Ashford, but he was talking about you were
responding corporations in the private sector and academia.
What are ways of just fostering this private-public
partnership? If there is anything more you could add to that?
Because I know there are folks in Colorado Springs that are
very keen on this as well.
Admiral Rogers. Yes, sir. So a couple things come to mind.
We have created an exercise series, you heard it in my remarks
and the chair mentioned, that we call Cyber Guard where once a
year we pick a problem set. We come up with an exercise
scenario that crosses the Nation so we can bring together
entities from across the Nation.
We bring together private companies, State, local, and
Federal actors, Cyber Command and the Department of Defense as
well as commercial infrastructure providers, for example, and
we outline a problem set.
We actually create a notional network that reflects if we
are modeling for example an attack against the power structure.
We actually in partnership with some of the power companies we
develop a network simulation that replicates the network
associated with a large utility.
We have done this in multiple areas. This exercise scenario
occurs every June. We ask private companies if you want to
participate we would love to have you. We are up to about 100
right now. We just started this in the last 3 years.
And I can remember the first one we did we had about three.
It is getting to the point now where I am starting to run into
a capacity concern where we have got more interest than there
is room.
In addition, I am also doing this more on the NSA side
first, but the other area that I have tried to highlight
potentially with the private sector is, is there a way to take
some of our DOD workforce, have it spend some time in the
private sector, and then come back to us? And is there a way
also to have the private sector spend some time with us?
That hasn't been a traditional DOD model. And, boy, it
certainly hasn't been the traditional Intelligence Community
model in my other job. But my view is that that is kind of
among the things that we have got to do for the future. We have
got to view this as much more of a broader partnership.
One of my takeaways is, I mean, this is just the ultimate
team activity. I have never done so much private sector and
interagency work in 35 years of military service.
Mr. Lamborn. Well, and academia as well.
Admiral Rogers. Yes, sir, which is why I was just up at
Harvard on Thursday when I was up there. I have been to
Carnegie-Mellon, Berkeley, and Stanford in the last 8 weeks
trying to talk to the private sector about, hey, what can we
do? I am actually in Colorado Springs in 30 days. Going to
spend some day out there working on a couple things.
Mr. Lamborn. That is wonderful. And I like that idea of
private-public partnership, collaboration, teamwork and maybe
with some of our allies. What are your thoughts on working with
allies, you know, Israel or some of the NATO [North Atlantic
Treaty Organization] allies?
Admiral Rogers. Right. So I won't get into the particulars,
but in fact today U.S. Cyber Command is hosting a deterrence
workshop with one of our allies that you just mentioned. I am
not going to say which one.
In addition we are doing partnerships and capabilities
development probably with, you know, five or so key nations
right now, foreign nations. In addition, we are also doing
things in a much broader front talking about cyber theory,
cyber defense across the NATO alliance, and literally with
nations around the world. It is one of the reasons why I spent
some time on the road, you know, internationally.
Mr. Lamborn. Lastly, with the limited time I have, let me
shift gears. Everyone knows the Guard and Reserve make a
wonderful component of this effort. You can do cyber from
anywhere. And we find Guard and Reserve all throughout the
country.
You can do it anytime. And of course their schedules are,
you know, 24/7 as well. Given the wealth of knowledge,
experience, and certifications in the Guard and Reserve would
it be prudent to consider a streamlined accessions process to
get these specialists onto the job quicker?
Admiral Rogers. I don't intellectually disagree. The only
comment I would make is in my discussions with the Guard and
the Reserve segment when I have asked so do you have issues
that I can help with in terms of your ability to assess and
bring into the force, into the Reserve and Guard Components,
you know, the kind of skill sets and the people we need? Is
that an issue for you?
To date the answer I have heard is, no, quite frankly, we
have more people trying to get in than we really have space for
in some ways. I have not heard the leadership come back to me
and say no, this is really something that is a major issue. I
am not trying to pretend it is not. I am just trying to
highlight it hasn't when I have asked, bubble it to my level.
Each service has taken a slightly different approach for
how it integrates Guard and Reserves into the broader
structure. Some services are looking at Guard and Reserve as a
cadre to augment the active side.
Other services, if you look at Army, for example, they are
doing wholesale investments in building cyber capacity in the
Guard and Reserve over and above what the cyber mission force
needs. And Air Force is actually using Guard and Reserve as
part of their cyber mission force build.
Mr. Lamborn. Yes. That is what General Hyten was telling
us----
Admiral Rogers. Yes, sir.
Mr. Lamborn [continuing]. Some of us at the space power
caucus the other morning.
Thank you, Mr. Chairman. I yield back.
Mr. Wilson. And thank you very much, Congressman Lamborn.
We now proceed to Congressman Jim Cooper of Tennessee.
Mr. Cooper. I thank you, Mr. Chairman. Admiral, when a
Congressman like Mr. Brooks asks you how we could get savings
from the DOD budget, you might want to remind the members of
the committee that we have banned the Pentagon from even
thinking about any possible BRAC [Base Realignment and Closure]
savings.
It would be illegal even though the Air Force I think has
testified that 25 percent of their capacity is redundant
surplus. So that is the easy savings that this committee has
willfully ignored.
I am a little worried that I think on the Secretary's trip
2 weeks ago to Joint Base McChord, he met some very interesting
people there and----
Admiral Rogers. Right.
Mr. Cooper [continuing]. All the message he received was
that it was easier to hire cyber experts before we
bureaucratized everything. Now there is a requirement that you
take a 6- to 9-month course and some of these folks we are
trying to recruit could actually teach the course.
And they are not going to sit through something like that
just to get their stripes when they already have all the skills
that we are seeking. So I hope that as we seek out these folks
we don't discourage them from coming.
Admiral Rogers. Can I make a comment on that?
Mr. Cooper. Sure.
Admiral Rogers. We have created a capability in the regular
force that we call our equivalency board, because my concern
was, look, we don't want to do a cookie cutter approach, one
size fits all, in which we have a formalized process that we
give equivalent credit to people based on experience and not
just, hey, did you go to military course X, Y, or Z?
So far I think we have approved almost 500 individuals
where we have just granted credit for equivalent experience.
We are in the beginnings of an initial discussion with the
Guard and the Reserve about couldn't we use the same thought
process on the Guard and Reserve side so we give people
equivalent credit, if you will, for real life experience so we
can be faster and more efficient?
Mr. Cooper. I also hope the Guard and Reserve will get up
to speed on the locational advantages. I was under the
impression from a briefing yesterday that one of the top Guard
efforts in cyber will be located in Arkansas. And I don't
believe you mentioned that on the list of your visits.
Admiral Rogers. I didn't, but I am aware of it.
Mr. Cooper. And I would think, and I have got nothing
against Arkansas, but it would not be as target-rich an
environment as some other parts of the country. But it is we
have got to make sure we are doing the right thing here.
Another question is this. If you were in command and it
turned out in retrospect that during the duration of your
command it had been hacked, and yet you were in charge of that
throughout your tenure, you are retired now, what consequence
should there be?
Admiral Rogers. I don't like speaking in theoreticals, sir.
What I generally tell people is, look, we all should be held
accountable for our actions. I am the first to acknowledge as a
commander I have accountability for the missions. And I don't
duck that for one minute. I would rather not get into
hypotheticals.
Mr. Cooper. Well, unfortunately, it may not be a
hypothetical. I am not speaking of your case, but in the case
of other folks.
Admiral Rogers. Well, who knows, sir? It could be at some
point in the future----
Mr. Cooper. Well----
Admiral Rogers [continuing]. Rogers isn't at the job
anymore and I am the first to acknowledge that.
Mr. Cooper. Well, this is an increasing challenge because
it is hard to know necessarily when you have been hacked or not
and what the consequences of that----
Admiral Rogers. Yes, sir.
Mr. Cooper [continuing]. Are. So it is a very ambiguous
area. Is it currently against the Uniform Code of Military
Justice to use improper computer hygiene? Like, it is my
impression that you can be a commanding officer and lose your
command if you commit adultery, but you can pollute the SIPRNET
[Secure Internet Protocol Router Network] and it is really not
a legal infraction.
Admiral Rogers. I will say we are having an ongoing
discussion about we have a very, as you have highlighted, we
have got a very formalized and long practice mechanisms of
accountability for performance in a lot of other areas.
How do we ensure that we do that same approach in cyber,
because one of the concerns that I have, and I have mentioned
this to the committee before, is you can have the greatest
defensive structure in the world but the individual actions of
every individual user that we have can make our ability to
actually take full advantage of those investments and those
capabilities very difficult.
And you saw that in the Joint Staff intrusion, for example,
where ultimately we were able to defeat the attempt in almost
60 other networks simultaneously except in this one particular
network. The final defense is the user. In this case we had
users who clicked on a link that I said what? What would lead
you to do this? You know, read this. It doesn't make any sense.
And as a result of this, we are spending time, we are
spending money. We have got mission operational impact here. We
can't afford to have this sort of thing. It is one of the
reasons why the previous vice chairman in particular felt very
strongly we have got to create this culture of accountability.
So we have created an initiative. We call it DC3I [Defense
Cybersecurity Culture and Compliance Initiative] and U.S. Cyber
Command is the lead for the Department, about what are the
kinds of steps we have to do to create that culture of
accountability.
Mr. Cooper. Thank you. I see my time has expired.
Mr. Wilson. Thank you, Congressman Cooper.
And now I will proceed to Congresswoman Elise Stefanik, of
New York.
Ms. Stefanik. Thank you, Chairman Wilson and thank you
Chairman for the great question on the Internet of Things where
we are facing unique challenges as mobile devices and household
devices become more interconnected. That increases the
likelihood of cyber vulnerabilities. So it is a great question
and I want to continue working with you on that issue.
Admiral Rogers, thank you for being here today, and thank
you for your service to our country. Through the posture
hearings from the past few months, we have heard about the
evolving strategic threats in the cyber realm from a resurgent
Russia, destabilizing threats from both state and non-state
actors in the Middle East, and overt provocative cyber activity
coming out of the Pacific region.
So today I want to focus my questions on the evolutions of
these threats and how we maintain the edge on the 21st century
battlefield. How confident are you moving forward that our
cyber capabilities are robust enough to face the threats of the
future on these multiple fronts? And then can you speak
specifically to your concerns about adversarial cyber
capabilities and your assessment of our own cyber capabilities
moving forward?
Admiral Rogers. So I feel comfortable with our level of
capability. I have yet to run into a threat scenario that we
didn't have the expertise to deal with. What concerns me is
capacity, how much of it do you have?
And as the threats proliferate, our ability to deal with
high-end simultaneous complicated threats. That is probably the
biggest limiting factor for right now, which is why generating
the mission force is so critical. That gives us that capacity
as well as the tools and the other investments we are asking
the committee and the Nation to support to get us to that
capacity.
In terms of evolution of the threat as I look into the
future I am going to riff off for just a little and if it
doesn't get to your question, ma'am, you please just tell me.
As I look at the evolution of the threat what concerns me
is you are seeing the last 18 months data in massive quantities
now in and of itself has a value that previously we would have
said to ourselves, look, this dataset is so large nobody can
really do anything with it.
OPM, Anthem, those are good examples to us of data now is a
commodity that has a value for a variety of purposes, whether
that be counterintelligence, whether it be social engineering
and helping to refine cyber activity, you will see increased
attacks against big data concentrations is a trend of the
future.
You are watching nation-states right now create
relationships in many cases with a much broader range of actors
out there than we traditionally had seen. I think this is in no
small part an attempt to obscure what the real originator and
director of the activity is.
It potentially or theoretically makes it more difficult for
us to go to country X and say, hey, we see this activity going
on. You are doing it. This is unacceptable to us.
And their ability to say, it is not us. It is a criminal
group. It is some other actor. You have criminals in the United
States, don't you? You don't control all that. We don't control
all that.
So you are watching nation-states create these
partnerships, I think in no small part to try to obscure our
ability to highlight that their activity. Criminal activity
continues to get more sophisticated. You are going to see a lot
more ransomware. You watch over the next year you will see a
lot more ransomware activity.
Ms. Stefanik. So based on the fiscal year 2017 requested
increase in funding for cyber capabilities, development, and
operational support that you noted before, where do you feel
the cyber community is assuming risk for readiness?
Admiral Rogers. So we are still taking more risk than I
would like. You look at individual platforms and weapons
systems. Just because of the scale of the investments, because
literally you are trying to overcome decades of investment in
which redundancy, reliability, and defensibility against a
cyber threat were just not core design characteristics.
And just as you highlighted in your comment about the
Internet of Things, this increased connectivity and eternal
connections that we developed in our system, not for bad
reasons. I am not trying to criticize that for one minute.
If you are interested in designing--as a naval officer if
you are in there interested in designing hull forms for future
service combatants, you are interested in understanding how
hull forms today are responding to different sea states around
the world.
So you put telemetry and measurement devices and then now
you are measuring it remotely. That also represents a potential
threat vector now for someone to gain access.
So we are literally trying to overcome decades of
investment in a very different threat world. So it is all about
prioritization, and it is going to take us some measure of time
to overcome or change that investment strategy.
So that would probably be the biggest area in some ways
where you never have all you want. And particularly in this
mission we are only 6 years old. In May, we will celebrate our
sixth birthday, so, you know, we are new to this.
Ms. Stefanik. Well, as you need those resources it is
important for you to continue telling us on this committee to
make sure that we are able to maintain the capabilities for our
cyber capabilities moving forward. So thank you so much for the
thoughtful answer.
Mr. Wilson. And thank you, Congresswoman Stefanik.
We now proceed to Congressman Joaquin Castro, of Texas.
Mr. Castro. Thank you, Chairman, and thank you, Admiral
for----
Admiral Rogers. Sir.
Mr. Castro [continuing]. Your testimony here today. I
represent San Antonio, Texas, of course a very big military
town, and my district includes Lackland Air Force Base, very
proudly home of the 24th Air Force.
And so I want to ask a question about the cyber operators.
Have you encountered any issues within the security clearance
process in recruiting cyber operators?
Admiral Rogers. I won't say there is none. Nothing that has
led me to believe we have got a systematic problem that
requires fundamental change. We always are looking to see can
we accelerate or make this faster.
If you have been doing this long enough it is--I just had a
discussion with a brand new hire about a month ago who
expressed frustration to me. And I said I know. We are working
our way through it. I would only tell you that we will make you
happy, young man.
Boy, compared to where we were 3 years ago, 5 years ago we
are in a much better place. So it is something we continue to
look at, but there is no easy answer here because it is all
about that balance.
Mr. Castro. Right.
Admiral Rogers. You are concerned about threat. On the
other hand you realize, look, you can't execute the mission
without good people. And you can't get good people in to do the
work unless you get them through your system.
Mr. Castro. Sure. And you mentioned, you know, the speed of
processing. Do you see a merit in fast-tracking for certain
critical positions?
Admiral Rogers. There might be for some. There are a
handful of--if you look across the cyber mission force there is
probably I would argue a handful of skill sets where it is
either very difficult for us to replicate it in a military
environment, so we look to the civilian sector.
Or the skill, the level of knowledge and experience really
narrows down the population that is qualified to do the job, so
to speak. Those might be a couple things worth looking at.
Mr. Castro. Sure. And we would love to hear your
suggestions, you know, at the appropriate time if you do come
up with them.
Admiral Rogers. Yes, sir.
Mr. Castro. So thank you. I yield back, Chairman.
Admiral Rogers. And if I could, I am actually going to be
in San Antonio with the 24th and the 25th Air Force----
Mr. Castro. All right.
Admiral Rogers [continuing]. In about 10 days, so----
Mr. Castro. Well, welcome.
Admiral Rogers. Sir.
Mr. Wilson. And thank you very much, Congressman Castro,
and Admiral, thank you for being here today. We had a really
good turnout from members of the subcommittee because what you
are doing is so important for our country and what your
colleagues are doing. And however we can be supportive and it
is obviously, remarkably, incredibly bipartisan.
Admiral Rogers. Sir. Thank you.
Mr. Wilson. We are now adjourned.
[Whereupon, at 2:59 p.m., the subcommittee was adjourned.]
=======================================================================
A P P E N D I X
March 16, 2016
=======================================================================
PREPARED STATEMENTS SUBMITTED FOR THE RECORD
March 16, 2016
=======================================================================
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
=======================================================================
QUESTIONS SUBMITTED BY MEMBERS POST HEARING
March 16, 2016
=======================================================================
QUESTIONS SUBMITTED BY MR. WILSON
Mr. Wilson. What are the most common and consequential types of
cyber incidents that affect public safety or critical infrastructure
security in the United States? Do the Department of Defense and
National Guard assist with response to domestic cyber incidents that
threaten public safety or critical infrastructure security, or do you
expect that they will need to do so in the future? If so, how are they
preparing for these incidents?
Admiral Rogers. Consequential cyber incidents affecting the public
safety or critical infrastructure security in the United States include
attacks which degrade or disrupt major functions of the 16 critical
infrastructure sectors identified in Presidential Policy Directive 21
(PPD-21), Critical Infrastructure Security Resilience. According to
PPD-21, each sector ``. . . provides the essential services that
underpin American society.'' Disruption of any of these services for a
significant period of time would have an impact on public safety.
Potential cyber incidents include attacks which achieve unauthorized
access, destroy data or system function, or result in release of
sensitive information.
The Department of Homeland Security (DHS) is the lead for domestic
incident response to cyber incidents. If unable to address a cyber
incident, the DHS may submit a Defense Support to Civil Authority
(DSCA) request which potentially could task resources through the DOD,
USSTRATCOM, and ultimately USCYBERCOM. Currently this scenario is
viewed as a last resort situation.
The National Guard assigned cyber forces are available to support
any federal response in Title 10 status or State response in either
State Active Duty (SAD) or when authorized in Title 32 status. Ensuring
the National Guard cyber forces are properly manned, trained, and
equipped for any particular mission set, is key. The DOD, National
Guard, and DHS have trained to respond to cyber incidences, as part of
a Whole-of-Nation approach, through exercises like CYBER GUARD.
Mr. Wilson. To what extent has U.S. Cyber Command collected
measures of performance or measures of effectiveness to demonstrate
that the dual-hatted position with the National Security Agency is the
most effective and most efficient approach to both agencies missions?
Admiral Rogers. USCYBERCOM has focused its assessment efforts on
evaluating its growing resource requirements, increasing support to the
Geographic Combatant Commanders' plans, named cyber operations, and the
Department's requirements for information network security. Our
assessment program reviews and analyzes progress towards achieving
campaign plans objectives but has not studied alternative command
structures. To date, we have not collected measures of performance or
effectiveness to demonstrate that the dual-hat approach is the most
effective and efficient approach. USCYBERCOM is reliant on the National
Security Agency to accomplish large portions of our missions, which
requires close and continual technical coordination.
______
QUESTIONS SUBMITTED BY MR. LAMBORN
Mr. Lamborn. Given the rapidly growing demand for CMF training, do
you think DOD needs to begin to look at other ways to deliver training,
including through greater influencing courses offered at university,
and by developing commercial training opportunities?
Admiral Rogers. DOD continues to examine the most effective means
to deliver joint training for the Cyber Mission Force (CMF). CMF
training provided by the Services and the National Security Agency
(NSA) Cryptologic Training System (CTS) rely on both government and
contractor provided training courses. Currently 60% of the NSA offered
courses that are on the CMF Training Pipeline are instructed by
commercial vendors. We are working with NSA to continue to leverage
their robust academic outreach programs to connect with government
(e.g., National Defense University, Defense Cyberspace Investigation
Training Academy, service academies, war colleges) and universities/
colleges.
Mr. Lamborn. What standards do CPT personnel have to meet in order
for them to be fully qualified cyber defenders? Please provide a copy
of the standards to the Committee.
Admiral Rogers. In accordance with the Cyber Mission Force (CMF)
Training Model, Cyber Protection Team (CPT) personnel must meet the
standards for individual proficiency contained in the USCYBERCOM Joint
Cyberspace Training and Certification Standards (JCT&CS) and team/force
proficiency in the Training and Readiness (T&R) Manual in order for
them to be fully qualified cyber defenders. The JCT&CS provide the
specific knowledge, skill and ability standards for each CMF work role
at the apprentice, intermediate and expert levels. The T&R Manual
provides the development, execution, and assessment of collective
(squad, team, headquarters) training to support force development and
readiness.
The CMF Training Model is a phased training process based on
mission-specific requirements and tasks. Personnel assigned to a CPT
begin with a mix of foundation training or Service equivalent training,
then move to specialized technical/tradecraft instruction, and
localized individual technical joint qualification record (JQR) and on
the job training (OJT), coupled with an intensive staff and collective
training and exercise program to achieve mission readiness. Collective
training activities are an extension of individual proficiency to team
and unit proficiency. An example of a collective training event for CPT
Teams is the CYBER GUARD exercise, which is focused on exercising a
whole of nation defense of U.S. critical infrastructure from
destructive cyber attack.
When a CPT member has met their JCT&CS work role specific
individual tasks, JQR/OJT, and participated in team collective training
event assessed using the T&R manual, they are then considered a fully
qualified cyber defender.
Mr. Lamborn. Who is responsible for training CPTs, and do you
believe the CPTs have enough training to effectively protect our
networks against advanced cyber adversaries like Russia and China? How
do you plan to get the CPTs capable of defending against such threats?
Are the Services doing their part to train the CPTs?
Admiral Rogers. The military Services and U.S. Cyber Command,
working with the National Security Agency (NSA), are responsible for
training CPTs. No, we do not yet believe CPTs have enough training to
effectively protect our networks against advanced cyber adversaries.
However, we are making significant progress in maturing and expanding
training to achieve required levels of operational readiness for CPTs.
We have a strong program in place for Cyber Mission Force (CMF)
individual training and qualification to joint standards for personnel
assigned to CPTs. Personnel begin with Service-provided training in a
primary specialty, and then once assigned to a CPT each person
completes work role-specific training and qualification to rigorous
joint standards under a system managed by U.S. Cyber Command, working
with the National Security Agency's Cryptologic Training System. This
individual training process provides the baseline for individual
proficiency. We continue to mature the individual training process as
we grow the CMF and the Services are fully involved in that process and
doing their part. The Services are expanding Service-provided training
to deliver outcomes that meet joint standards for the CPTs.
We do not yet have sufficient collective training capacity for CPTs
because we still lack a Persistent Training Environment (PTE) for DOD
cyberspace forces. CPTs are not groups of trained technicians, but
maneuver forces that must operate as a disciplined fighting force to
perform assigned missions against determined adversaries. That requires
CPTs conduct collective training in a closed network environment in
realistic operational scenarios against an opposing force simulating
advanced cyber adversaries. That enables our forces to train as they
fight. We currently use limited, existing DOD capabilities to conduct
periodic collective training and exercises, such as CYBER FLAG and
CYBER GUARD. However, we don't have sufficient training capability or
capacity to train continuously to achieve or sustain the levels of
required readiness for all CPTs. The PTE for cyberspace forces that is
included in the President's FY17 Budget Request is essential to
providing the capability needed to train CPTs, along with the entire
Department of Defense cyberspace workforce. The PTE will enable us to
train CPTs to effectively protect our networks against advanced
adversaries.
Beyond training, we are preparing CPTs to address threats by
leveraging expertise from across the government, including NSA and the
Services' network defenders that have experience in this area. We are
building capability to better posture our teams against high level
malicious cyber actors through the utilization of incident response
teams, increased use of intelligence to understand the threat,
identification of unique network technology in specialized systems
(Industrial Control Systems/Supervisory Control and Data Acquisition,
etc.), and by building a more detailed understanding of critical
infrastructure and key resource vulnerabilities. Finally, we are
strengthening partnerships within government, with allies and the
private sector to train and operate together. We believe that these
initiatives, along with training, will ensure the CPTs achieve and
sustain readiness to defend against such threats.
Mr. Lamborn. On a yearly basis, how many hours of live, on-network
training with a realistic cyber-adversary do CPT personnel receive in
order to ensure they can hone their defensive cyber skills? Do you
think this training is sufficient, and if not, how do you plan to
increase the amount of realistic training the CPT personnel receive?
Admiral Rogers. At this time, it is difficult to quantify the exact
number of live, on-network hours our Cyber Protection Team (CPT)
personnel receive on an annual basis as we continue to mature CPT
training/methodologies and work through certifying teams currently in
the build phase. USCYBERCOM hosts two major cyber exercises (CYBER
GUARD and CYBER FLAG) and numerous team-level exercises (CYBER KNIGHT)
each year, which offer a certain degree of realism against an advanced
cyber-adversary. In CYBER GUARD and CYBER FLAG, a CPT receives a
minimum of 60 hours in each exercise of live, on-network training
against a realistic cyber-adversary. Combatant Command Tier 1 level
exercises provide additional opportunities for training the Cyber
Mission Force (CMF) via red teams emulating advanced adversary tactics,
techniques, and procedures (TTPs). The intelligence community works in
coordination with the red teams to ensure realistic cyber adversary
TTPs are utilized and that defenders are exposed to current and future
cyber adversary TTPs to ensure quality training is continuously
achieved. The realism these exercises offers is limited, in part
because the teams operate on simulated networks that do not come close
to approximating the scale and complexity of the Internet.
USCYBERCOM recognizes there is currently a capacity issue in terms
of realistic training opportunities for our CPT personnel, which is why
a Persistent Training Environment (PTE) and all of its elements are
critical to the training and readiness of the CMF. The PTE, a
geographically distributed, federated system of interconnected
capabilities (not just a coalition of cyber training ranges), provides
an integrated common training capability to deliver individual and
collective training outcomes for DOD cyberspace forces to generate and
sustain force readiness across the full spectrum of operations from the
tactical to strategic level of conflict. The DOD cyber forces require a
Joint PTE with sufficient capacity to ensure geographically dispersed
teams across the total force are fully prepared to conduct current
cyberspace operations and future scenarios involving cyberspace
operations consistent with approved plans (e.g., CONPLANs, OPLANs,
etc.).
Mr. Lamborn. As the Department moves toward JIE and a government-
owned, contractor-operated model for its core infrastructure, what is
the plan for the thousands of civil service IT professionals currently
maintaining this infrastructure? Will they be retrained for assignment
to a CPT or CMF, and do current legal authorities allow for civilian
participation in these Title 10 activities?
Admiral Rogers. A tenant of JIE is to align DOD Component IT
capabilities by bringing them together under an enterprise services
construct to leverage economies of scale in terms of IT resources,
money and manpower. Traditionally, DOD Components are responsible for
deploying capabilities, as well as manning, training and equipping
their IT workforces to meet mission requirements. Workforce
efficiencies gained as a result of JIE would be available for DOD
Components to repurpose. There may be a need for retraining of duties,
re-scoping of responsibilities or leveraging existing skills with no
additional training required.
The Department is in the process of developing and implementing
initiatives which could assist the DOD components to identify options
for reassigning personnel. The DOD Cyberspace Workforce Framework
(DCWF) provides descriptions for 54 cyber work roles and was developed
from the National Initiative for Cybersecurity Education, Cybersecurity
Workforce Framework, and the USCYBERCOM Joint Cyberspace Training
Certification Standards (JCT&CS). Additionally, the DCWF contains a
cross-functional analysis that identifies the knowledge, skill and
ability deviations between each role. Furthermore, CMF training will be
more widely available as the Services continue to advance on the
training transition plan. The availability of additional training such
as CMF training will assist with personnel transitioning from
traditional IT and network operations roles into cybersecurity or
cyberspace effects roles. The CMF would benefit from a workforce
trained in network engineering, incident response, and other cyber
disciplines. IT professionals' careers may be re-scoped to support
tasks within the Defend the Nation (DTN), Offensive Cyberspace
Operations (OCO) and Defensive Cyberspace Operations (DCO) missions.
DOD civil servants currently serve across the CMF and can, consistent
with law and policy, participate in the CMF's Title 10 activities.
Additionally, DOD Components may leverage their civil service IT
professionals to support emerging IT initiatives, including protection
of Industrial Control Systems/Supervisory Control and Data Acquisition
(ICS/SCADA) and enabling mobility capabilities. Portions of a DOD
Components' workforce can be retrained to perform Defensive Cyberspace
Operations--Internal Defensive Measures (DCO-IDM) actions such as
Cybersecurity Service Provider duties.
Some examples of USCYBERCOM's vision for possible manpower
realignment:
--Retrain and Repurpose within the Combatant Commands, Services and
Agencies: Support to emerging IT initiatives, including protection of
Industrial Control Systems/Supervisory Control and Data Acquisition
(ICS/SCADA) and enabling mobility capabilities may require a degree of
retraining. Portions of a Component's workforce can be retrained to
perform defensive cyberspace actions such as Cybersecurity Service
Provider duties and augmenting cybersecurity capability readiness.
--Retrain and Repurpose of the Cyber Mission Force (CMF): The CMF
could benefit from a workforce trained in network engineering, incident
response, and other cyber disciplines. Careers may be re-scoped to
support tasks within the Defend the Nation (DTN), Offensive Cyberspace
Operations (OCO) and Defensive Cyberspace Operations (DCO) missions.
--Migrate to an IT-focused Combat Support Agency (CSA): The Defense
Information Systems Agency (DISA) and the National Security Agency
(NSA) have large roles in architecting, engineering and maintaining JIE
Enterprise Services. Portions of the workforce formerly operating IT
capabilities on behalf of a DOD Component could be leveraged by CSAs to
continue supporting the global DOD Cyber Operations Mission.
--Reduction in Force: Personnel who decline to undertake one of the
above options could be reassigned into other mission areas, or reduced
through attrition. It is at the discretion of the individual DOD
Component to determine how to best undertake this option.
The move toward JIE provides an opportunity for the existing IT
workforce to retrain, re-scope and realign high-demand low-density
positions with emerging mission requirements.
[all]
</pre></body></html>