Datasets:

Modalities:
Text
Formats:
text
Languages:
English
Libraries:
Datasets
License:
CoCoHD_transcripts / data /CHRG-108 /CHRG-108hhrg21354.txt
erikliu18's picture
Upload folder using huggingface_hub
efd99c1 verified
raw
history blame
169 kB
<html>
<title> - THE INVISIBLE BATTLEGROUND</title>
<body><pre>
[House Hearing, 108 Congress]
[From the U.S. Government Publishing Office]
THE INVISIBLE BATTLEGROUND
=======================================================================
HEARING
before the
SUBCOMMITTEE ON CYBERSECURITY, SCIENCE, AND RESEARCH AND
DEVELOPMENT
of the
SELECT COMMITTEE ON HOMELAND SECURITY
HOUSE OF REPRESENTATIVES
ONE HUNDRED EIGHTH CONGRESS
FIRST SESSION
__________
SEPTEMBER 16, 2003
__________
Serial No. 108-26
__________
Printed for the use of the Select Committee on Homeland Security
Available via the World Wide Web: http://www.access.gpo.gov/congress/
house
__________
U.S. GOVERNMENT PRINTING OFFICE
21-354 WASHINGTON : 2005
_____________________________________________________________________________
For Sale by the Superintendent of Documents, U.S. Government Printing Office
Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; (202) 512�091800
Fax: (202) 512�092250 Mail: Stop SSOP, Washington, DC 20402�0900012005
SELECT COMMITTEE ON HOMELAND SECURITY
CHRISTOPHER COX, California, Chairman
JENNIFER DUNN, Washington JIM TURNER, Texas, Ranking Member
C.W. BILL YOUNG, Florida BENNIE G. THOMPSON, Mississippi
DON YOUNG, Alaska LORETTA SANCHEZ, California
F. JAMES SENSENBRENNER, JR., EDWARD J. MARKEY, Massachusetts
Wisconsin NORMAN D. DICKS, Washington
W.J. (BILLY) TAUZIN, Louisiana BARNEY FRANK, Massachusetts
DAVID DREIER, California JANE HARMAN, California
DUNCAN HUNTER, California BENJAMIN L. CARDIN, Maryland
HAROLD ROGERS, Kentucky LOUISE McINTOSH SLAUGHTER,
SHERWOOD BOEHLERT, New York New York
LAMAR S. SMITH, Texas PETER A. DeFAZIO, Oregon
CURT WELDON, Pennsylvania NITA M. LOWEY, New York
CHRISTOPHER SHAYS, Connecticut ROBERT E. ANDREWS, New Jersey
PORTER J. GOSS, Florida ELEANOR HOLMES NORTON,
DAVE CAMP, Michigan District of Columbia
LINCOLN DIAZ-BALART, Florida ZOE LOFGREN, California
BOB GOODLATTE, Virginia KAREN McCARTHY, Missouri
ERNEST J. ISTOOK, Jr., Oklahoma SHEILA JACKSON-LEE, Texas
PETER T. KING, New York BILL PASCRELL, JR., New Jersey
JOHN LINDER, Georgia DONNA M. CHRISTENSEN,
JOHN B. SHADEGG, Arizona U.S. Virgin Islands
MARK E. SOUDER, Indiana BOB ETHERIDGE, North Carolina
MAC THORNBERRY, Texas CHARLES GONZALEZ, Texas
JIM GIBBONS, Nevada KEN LUCAS, Kentucky
KAY GRANGER, Texas JAMES R. LANGEVIN, Rhode Island
PETE SESSIONS, Texas KENDRICK B. MEEK, Florida
JOHN E. SWEENEY, New York
JOHN GANNON, Chief of Staff
UTTAM DHILLON, Chief Counsel and Deputy Staff Director
DAVID H. SCHANZER, Democrat Staff Director
MICHAEL S. TWINCHEK, Chief Clerk
______
Subcommittee on Cybersecurity, Science, and Research and Development
MAC THORNBERRY, Texas, Chairman
PETE SESSIONS, Texas, Vice Chairman ZOE LOFGREN, California
SHERWOOD BOEHLERT, New York LORETTA SANCHEZ, California
LAMAR SMITH, Texas ROBERT E. ANDREWS, New Jersey
CURT WELDON, Pennsylvania SHEILA JACKSON-LEE, Texas
DAVE CAMP, Michigan DONNA M. CHRISTENSEN,
ROBERT W. GOODLATTE, Virginia U.S. Virgin Islands
PETER KING, New York BOB ETHERIDGE, North Carolina
JOHN LINDER, Georgia KEN LUCAS, KENTUCKY
MARK SOUDER, Indiana JAMES R. LANGEVIN, Rhode Island
JIM GIBBONS, Nevada KENDRICK B. MEEK, Florida
KAY GRANGER, Texas CHARLES GONZALEZ, Texas
CHRISTOPHER COX, California, ex JIM TURNER, TEXAS, ex officio
officio
(ii)
CONTENTS
----------
Page
STATEMENTS
The Honorable Mac Thornberry, a Representative in Congress From
the State of Texas, and Chairman, Cybersecurity, Science, and
Research and Development....................................... 1
The Honorable Zoe Lofgren, a Representative in Congress From the
State of California, and Ranking Member, Cybersecurity,
Science, and Research and Development
Oral Statement................................................. 2
Prepared Statement............................................. 5
The Honorable Donna M. Christensen, a Delegate From the U.S.
Virgin Islands................................................. 24
The Honorable Jennifer Dunn, a Representative in Congress From
the State of Washington........................................ 4
The Honorable Bob Etheridge, a Representative in Congress From
the State of North Carolina.................................... 20
The Honorable James R. Langevin, a Representative in Congress
From the State of Rhode Island
Oral Statement................................................. 33
Prepared Statement............................................. 6
The Honorable Sheila Jackson-Lee, a Representative in Congress
From the State of Texas
Oral Statement................................................. 29
Prepared Statement............................................. 6
The Honorable John Linder, a Representative in Congress From the
State of Georgia............................................... 23
The Honorable Ken Lucas, a Representative in Congress From the
State of Kentucky.............................................. 26
The Honorable Kendrick B. Meek, a Representative in Congress From
the State of Florida........................................... 37
The Honorable Pete Sessions, a Representative in Congress From
the State of Texas............................................. 27
Witness
The Honorable Robert Liscouski, Assistant Secretary,
Infrastructure Protection Directorate, Department of Homeland
Security
Oral Statement................................................. 7
Prepared Statement............................................. 9
WHAT THE DEPARTMENT OF HOMELAND
SECURITY IS DOING TO MAKE AMERICA'S
CYBERSPACE MORE SECURE
----------
Tuesday, September 16, 2003
House of Representatives,
Subcommittee on Cybersecurity,
Science, and Research and Development,
Select Committee on Homeland Security,
Washington, DC.
The committee met, pursuant to call, at 9:30 a.m., in Room
2118, Rayburn House Office Building, Hon. Mac Thornberry
[chairman of the subcommittee] presiding.
Present: Representatives Thornberry, Sessions, Linder,
Lofgren, Jackson-Lee, Christensen, Etheridge, Lucas, Langevin,
and Meek.
Also Present: Representative Dunn.
Mr. Thornberry. The hearing will come to order. I would
like to welcome our witness and guests to today's hearing,
entitled The Invisible Battleground: What the Department of
Homeland Security is Doing to Make America's Cybersecurity More
Secure.
Over the past several months this subcommittee has received
a number of perspectives on cybersecurity. We have held
classified and unclassified briefings and hearings. We have
heard from witnesses from academia, think tanks, technology
industry, government agency, users, and others. Our goal has
been to deepen our understanding of the issues involved and to
gain a truer perspective on how and where cybersecurity fits
into homeland security.
Now, today, we will hear a progress report from the new
Department of Homeland Security.
From the first bills introduced in Congress to create a
Department of Homeland Security, cybersecurity was one of those
critical elements that was given to the new department, one of
the functions where a number of government agencies would be
brought together with greater emphasis and broader
responsibilities. It was clear that if we were really going to
modernize and strengthen Homeland Security, cybersecurity had
to be a part of it.
The final legislation, in fact, did that. It did not set
cybersecurity apart, as some proposed, but included it as one
of the critical infrastructures placed under the Directorate
for Information Analysis and Infrastructure Protection.
Since the Department began operations in March this year,
it has brought some key people on board, although sometimes it
has seemed to have taken a while. In June, it announced the
creation of a National Cybersecurity Division; just yesterday a
director was announced for that division. Yesterday, also, an
emergency response partnership with Carnegie Mellon University
and a US-CERT was announced. So significant steps have been
taken.
In its strategy, released in February, the administration
acknowledged that cyberspace is the nervous system of the other
infrastructures, the control system of the country. Thus, the
healthy functioning of cyberspace is essential to our economy
and our national security.
In our hearings so far, we have heard that cyber attacks
are growing in number and complexity and in severity of the
consequences. The recent bout with viruses and worms have shown
that once they are launched, they are not easily contained; and
as recently as last week, our hearing on the recent blackouts
have shown again the interconnectiveness of various
infrastructures. And yet there has been a lingering concern
that cybersecurity has not been given the priority it deserves
from the Department.
Today, we are ready to hear from the administration on some
answers to these important questions, such as: Where are we in
implementing each of the five priorities contained in the
national strategy;
What can and should the Federal Government do to require or
encourage better security for all of the IT infrastructure
which is in private hands; and
What about the human element where we have received
testimony that up to two-thirds of the problems that are
created are created by the interface of human beings with
technology?
In today's world, our computers and cyber networks are not
just a place to do business and conduct research and
communicate with our friends. Cyberspace is an invisible
battleground that we must secure and defend, for attacks are
being launched against us every day attacks against the central
nervous system of the country and against our economy and our
security. We must be ready. And today we hope to hear from our
witness that we are in better shape than we have been in the
past.
Before we turn to our witness, I am going to yield to our
distinguished ranking member, my partner in this effort, Ms.
Lofgren.
Ms. Lofgren. Thank you, Chairman Thornberry, for holding
this hearing and for your continued outstanding leadership of
this committee.
I think the chairman did a great job in summarizing the
work that this subcommittee has done to date. All the members
of the subcommittee have taken the time to study this
incredibly complex set of issues involving cybersecurity, and
we certainly know more now than we did when we began our
endeavor.
I think all of us agree that the Nation's cyber
infrastructure remains vulnerable and that the Federal
Government must provide leadership to better secure our systems
in both the public and private sectors. My concerns about the
Department of Homeland Security are that it is not providing
sufficient leadership in the cyber arena, particularly in the
following five areas:
Reducing vulnerabilities: The Department is tasked with
reducing vulnerabilities to government in critical asset
computers as well as responding to cyber incidents. The number
of cyber attacks and resulting damage, however, continues to
increase. This past August was the worst ever for computer
viruses. The Blaster, Welchia, and SoBigF viruses, along with
other attacks, caused more than $32.8 billion in economic
damages according to one digital risk assessments company.
Two, coordination: Is the National Cybersecurity Division
coordinating with the private sector, other government
agencies, and State and local governments to identify
vulnerabilities? Has the NCSD begun a national risk assessment?
If so, when will it be complete? I am concerned that the
Department is not providing quick leadership in this area.
Departures from the administration: In the last 6 months
the most senior Bush administration cyber officials have left
the government. These individuals include Richard Clarke, the
Special Advisor to the President for Cybersecurity; Howard
Schmidt, the Vice Chair of the President's Critical
Infrastructure Board, and Clarke's replacement; Ron Dick, the
Director of the National Infrastructure Protection Center; and
John Tritak, Director of the Critical Infrastructure Assurance
Office. I am concerned about these departures and that the
National Cybersecurity Division may lack sufficient personnel
and resources to operate effectively.
Cyber priorities at DHS: Clearly, as the chairman has
mentioned, cybersecurity is enormously important to the
infrastructure of the Nation. I am worried that cybersecurity
has been demoted in importance in the administration with the
lead official for cyber issues reduced from a Special Advisor
to the President, working in the White House, to a directorship
very deep within the Department of Homeland Security. The
Nation's cyber chief must have both the access and resources to
do the job, the cyber chief at DHS.
It took the Department over 3 months to announce its choice
for a leader of the NCSD. This delay is troublesome, and I am
curious as to why it took the Department so long to settle on a
candidate. I am also concerned about the number of other jobs
that seem to be empty and vacant within NCSD, how many desks
are empty. Is there anyone there to answer the phone?
With these concerns in mind, I am very encouraged by the
person chosen to lead the NCSD. Mr. Yoran currently serves as
the Vice President of Managed Security Services Operation at
Semantech Corporation, the Internet security firm headquartered
in Cupertino, California, near my home.
I am very familiar with the work of Semantech. It is one of
the true bright spots in Silicon Valley, and its CEO, John
Thompson, is a talented and thoughtful leader. I am hopeful
that our new guy will provide needed leadership at the NCSD,
and once he is on the job, I am going to tell him that he must
candidly tell the chairman and me if he has the access and
resources needed to accomplish his mission. If he is unable to
do his job, Secretary Ridge should expect to hear from me and,
I think, the chairman directly.
As you can see, we have many concerns about the cyber
program of the Department of Homeland Security. I am pleased
that we finally today will hear directly from the top official
at DHS on our efforts. And the Assistant Secretary for
Infrastructure has served as the acting chief since it was
established on June 6, so I am sure he will address the
concerns that I have raised; and I hope he will be able to
reassure me that cybersecurity is, in fact, a priority at the
Department.
I thank the chairman for yielding.
Mr. Thornberry. Thank the gentlelady.
Without objection, the distinguished vice chair of the full
committee will sit with the subcommittee today, and the Chair
would yield to the gentlelady from Washington for any opening
statement she would like to make.
Ms. Dunn. Thank you very much, Mr. Chairman.
Mr. Liscouski, I am looking forward to your testimony.
Thank you for joining us here today. We are eager to learn
about the Department of Homeland Security's most recent
efforts, in fact, in June of this year to protect an important
part of our Nation's critical infrastructure, our cyber
systems.
In the wake of September 11, the leaders of this Nation
have realized that securing our homeland against terrorist
attacks also means that we need to think creatively about where
our targets might be. We have visual reminders of many targets
every single day. When we board an airplane, when we drive over
a bridge, when we have our bags searched at football games.
But we also have targets that are far less visible. The
power grid is one such example. Cyberspace is another. And that
is why we are here today.
Your division, Mr. Liscouski, faces no small task. Securing
cyberspace is an international issue, something I realized with
greater awareness this summer when I addressed a group in
London on cybersecurity, and was very happy to learn how
involved the people of the British Government are in making
sure we get this right.
Also, we know that a cyber attack from overseas cannot be
intercepted at the border, or at least is very difficult to be
intercepted at any border, since there are no borders in the
cyber world.
This issue is also one that requires intense partnership
with the private sector. The key to achieving a desired level
of cybersecurity is utilizing and supporting the relationships
that we have formed with the private sector, those on the
ground doing research and development. Companies like
Microsoft, which I represent here in the United States
Congress, have realized that many of its priorities in business
are in line with our Homeland Security priorities here in
Congress. We are all working to prevent a situation where
critical technological infrastructure is brought down.
This committee has spent a significant amount of time
looking into the successful public-private and cross-industry
partnerships that already exist. I hope the Department
continues to work closely with the private sector to reach a
clear understanding of what a safe network system looks like.
As the Department works to protect America's technological
infrastructure, it also must keep in mind the interconnectivity
these cyber connections have with the world's financial
markets, transportation and communications systems.
I am very happy the Department is taking this charge
seriously, and I look forward to your testimony.
Mr. Thornberry. Thank the gentlelady. Does any other member
wish to offer an opening statement at this time?
Without objection, any member may submit an opening
statement for the record.
[The information follows:]
Prepared Statement of the Honorable Zoe Lofgren, Ranking Member,
Subcommittee on Cybersecurity, Science, and Research and Development
Thank you Chairman Thornberry for holding this hearing and for your
continued outstanding leadership of this subcommittee.
Chairman Thornberry did a terrific job in summarizing the work that
this subcommittee has done to date. All Members of this subcommittee
should be commended for taking the time to study the incredible complex
set of issues involving cybersecurity.
We have learned a lot since this subcommittee first met at the
beginning of the year. I think all would agree that our nation's cyber
infrastructure remains vulnerable, and that the federal government must
provide leadership to better secure our systems in both the public and
private sector.
My concerns about the Department of Homeland Security are that it
is just not providing sufficient leadership in the cyber arena,
particularly in the following five areas.
<bullet> Reducing Vulnerabilities: The Department is tasked
with reducing vulnerabilities to government and critical asset
computers, as well as responding to cyber incidents. The number
of cyber attacks, and resultant damage, however, continues to
increase. This past August was the worst month ever for
computer viruses. The Blaster, Welchia, and SoBig.F viruses,
along with other attacks, caused more than $32.8 billion in
economic damages, according to one digital risk assessment
company.
<bullet> Coordination: Is the National Cyber Security Division
(NCSD) coordinating with the private sector, other government
agencies, and state and local governments to identify
vulnerabilities? Has the NCSD begun a national risk assessment?
If so, when will it be complete? I am very concerned that the
Department is just not providing leadership in this area.
<bullet> Bush Administration Departures: In the last six
months, the most senior Bush Administration cyber officials
have left the government. These individuals include Richard
Clarke, the special advisor to the president for cyber
security; Howard Schmidt, the vice chair of the president's
critical infrastructure board and Clarke's replacement; Ron
Dick, the director of the National Infrastructure Protection
Center; and John Tritak, director of the Critical
Infrastructure Assurance Office.
I am very concerned about these departures and that the National
Cyber Security Division may lack sufficient personnel and resources to
operate effectively
<bullet> Cyber priorities at DHS: Clearly, cyber security has
been demoted in importance in the Administration with the lead
official for cyber issues reduced from a special advisor to the
President working in the White House, to a Directorship buried
deep within the Department of Homeland Security. The nation's
cyber chief must have the both the access and resources to do
the job.
<bullet> Cyber Chief at DHS: In addition, it took the
department over 3 months to announce its choice for a leader of
the NCSD. This delay is troublesome, and I am curious as to why
it took the department so long to settle on a candidate. I am
also concerned about the number of other jobs that need to be
filled within the NCSD. How many desks are empty? Is there
anyone there to answer the phone?
<bullet> With these concerns in mind, I am very encouraged by
the person chosen to lead the NCSD. Mr. Amit Yoran currently
serves as the Vice President of Managed Security Services
Operations at Symantec Corporation, the internet security firm
headquartered in Cupertino, California. I am very familiar with
the work of Symantec. It remains one of the true bright spots
in Silicon Valley, and its CEO, John Thompson is a talented and
thoughtful leader.
<bullet> I am hopeful that Mr. Yoran will provide needed
leadership in the NCSD. Once he in on the job, I am going to
tell him that he must candidly tell me if he has the access and
resources needed to do his job. If he is unable to do his job,
Secretary Ridge should expect to hear directly from me.
As you can see, I have many concerns about the cyber program at the
Department of Homeland Security. I am pleased that we finally get to
hear directly from a top official at DHS today on its efforts. Robert
Liscouski, Assistant Secretary for Infrastructure Protection, has
served as the acting chief of the National Cyber Security Division
(NCSD) since it was established on June 6, 2003.
I hope that Mr. Liscouski will address my many concerns and
reassure me that cyber security is in fact a priority at the Department
of Homeland Security.
Prepared Opening Statement of the Honorable James Langevin, a
Representative in Congress from the State of Rhode Island
Thank you, Mr. Chairman. I would like to welcome Assistant
Secretary Liscouski, and express my appreciation for your willingness
to come here for what I expect will be a very informative and
productive hearing. We have heard so much from both the private and
academic sectors about the state of information security and their
hopes and fears about the Department of Homeland Security's plans, and
now we can find out about those plans directly from the source.
Mr. Chairman, my greatest concern by far is the fact that no
information has been forthcoming from DHS until now. While I am pleased
to finally get the chance to discuss how information security fits into
the overall plan for critical infrastructure protection, I must express
my disappointment at how long it has taken.
I believe it is the duty of this Subcommittee to determine what is
being done, and what more can be done, to safeguard our critical
infrastructure. While it is true that much of our information
infrastructure lies with private industry, that should in no way reduce
DHS's efforts to secure and protect it.
I am especially interested to hear Mr. Liscouski's opinion on
whether or not the structure and resources being devoted to
cybersecurity at DHS are sufficient to handle the tasks for which it is
now responsible. In addition, I hope to learn what, if any, attention
is being paid to home users and their security, an important group that
is often left out of ``big picture'' views of information security.
Most importantly, this Subcommittee needs to know how DHS can best work
in conjunction with our computer industry partners and other agencies
in order to raise the bar for information security for all users.
Again, I greatly appreciate Assistant Secretary Liscouski taking
time to be here to discuss these vital issues with us.
Thank you, Mr. Chairman.
Prepared Opening Statement of the Honorable Sheila Jackson-Lee, a
Representative in Congress from the State of Texas
Mr. Chairman, Thank you for calling this important and provocative
hearing. With the recent blackouts, and the viruses which have been
plaguing the House computer systems, our infrastructure networks--and
our dependence on them--is abundantly clear. It will be good to explore
what the Administration is doing to make them more secure.
Obviously, national security is foremost on everyon's minds these
days. As we work to improve our country's security, it is important
that we take inventory of all systems that are vital to the functioning
of the nation, and do all we can to protect them. This certainly
includes our computer networks systems that can be attacked anonymously
and from far away. These networks are the glue that holds our nation's
infrastructure together. An attack from cyberspace could jeopardize
electric power grids, railways, hospitals and financial services, to
name a few. The recent blackouts made it clear how fragile and
vulnerable our infrastructure may be.
We are all aware of the growing number of internet security
incidents. These incidents can come in many flavors: annoying attacks
through emails, involving such things as computer viruses, denial of
service attacks, and defaced web sites; or cyber-crime, such as
identity theft. Such events have disrupted business and government
activities, and have sometimes resulted in significant recovery costs.
Despite the risks, our hospitals and power grids, our
communications, our transportation systems, will probably always be
critically dependent on computers and information flow and the
satellites above us. A terrorist or other criminal tampering with those
systems could devastate entire industries and potentially cost lives.
While we have been fortunate so far in avoiding a catastrophic cyber
attack, Richard Clarke, the President's cyber-terrorism czar from last
year, I guess I should say ``two czars ago,'' said that the government
must make cybersecurity a priority or face the possibility of a
``Digital Pearl Harbor''.
This was truly a frightening prospect. On paper, it seems we are
taking bold steps toward securing cyberspace: we now have a National
Cyber Security Division (NCSD) at the DHS, and its new U.S. Computer
Emergency Response Team (US-CERT). I would like to thank Mr. Liscouski
for taking the time away from the challenges that face him at the DHS
to enlighten us on the progress the Department and the Administration
are making on this important front.
We have been working on this subject for the past year in the
Science Committee as well. One thing I have been disturbed by is the
lack of good data on the threats that face us, and the absence of a
solid assessment of the risks we face. How can we know how much to
invest, and where, if we do not know those basics?
I want to know the magnitude of the threat out there, and how
Americans are dealing with it. What is the role of the private sector,
and of private citizens, and of the federal government? Are we putting
adequate resources and energy into fulfilling that role?
I look forward to the dialogue. Thank you.
Mr. Thornberry. With that, we will turn to our witness. We
want to welcome, Robert P. Liscouski, Assistant Secretary for
Infrastructure Protection of the Department of Homeland
Security.
I understand this is your first opportunity to testify in
front of Congress. We appreciate your being here and you are
recognized. Your full statement will be made part of the
record, and you are recognized to summarize it as you wish.
STATEMENT OF THE HONORABLE ROBERT P. LISCOUSKI, ASSISTANT
SECRETARY FOR INFRASTRUCTURE PROTECTION, U.S. DEPARTMENT OF
HOMELAND SECURITY
Mr. Liscouski. Thank you and good morning, Chairman
Thornberry and members of the committee. I am pleased to appear
before you this morning to discuss some of our efforts to
protect and secure our Nation's critical infrastructure.
From the beginning of DHS, IAIP and the Infrastructure
Protection Office for which I am responsible recognized the
equal importance of protecting physical as well as cyber
assets. Thus, we created the National Cybersecurity Division on
June 6 of this year. Today, I am here to give you a progress
report on where we are now and where we will be going in the
future to implement the President's national strategy to secure
cyberspace.
Mr. Thornberry. Excuse me, Mr. Liscouski, would you pull
the microphone just a little closer to you. It will be easier
for us to hear. Thank you.
Mr. Liscouski. All right.
I am pleased to announce this morning that Amit Yoran has
been formally named as the Director of the NCSD, effective
today. Mr. Yoran is a strategic thinker, a disciplined leader,
who understands the unique threats and vulnerabilities
manifested in cyberspace and is the individual who will further
accelerate our efforts in building a full NCSD team and
increasing the strength of our public and private sector
partnerships.
Building upon the formation of the NCSD, the Department has
worked to assemble a consolidated and coordinated team of
cybersecurity professionals. Despite the many organizational
and cultural challenges associated with integrating these
elements into one entity, our initial efforts have yielded very
effective positive and tangible results. The creation of the
NCSD has enabled the initial consolidation of three 24x7 cyber
watch capabilities; formulation of standardized incident
handling procedures for responding to cybersecurity events; and
the creation of a single national focal point for cybersecurity
leadership for prevention, protection, and response to
incidents.
The most recent accomplishments of the NCSD is the creation
of the National Computer Emergency Response Team or the US-
CERT. The US-CERT, in collaboration with the private sector and
leading response organizations, will improve warning and
response time to security incidents by fostering the
development of detection tools and utilizing common commercial
incident and vulnerability reporting protocols. This will
increase the flow of critical security information throughout
the Internet community.
I would like to take a moment to address our rationale
behind the decision to integrate physical and cybersecurity
within the IAIP directorate. I believe that this approach is
the correct one for three reasons.
First, cybersecurity cannot stand alone. The critical
interdependencies between cyber and physical domains demand
that we coordinate our intelligence and our protection efforts.
Second, with the creation of the NCSD, we have for the
first time implemented a single point of contact for
cybersecurity within the Federal Government that will interact
with other agencies, private security, the resource communities
and State and local governments on a 24x7 basis.
Third, though the director of the NCSD serves as a
technical and operational lead for cybersecurity issues,
cybersecurity will also be championed by Under Secretary Frank
Libutti and myself. And we are committed to the implementation
and the full funding of the NCSD as one of the top priorities
for the IAIP directorate and for DHS at large.
As demonstrated by recent events, the consequences of cyber
attack can manifest with little or no warning, on a widespread
scale, with tremendous speed. Impacts can quickly escalate
across multiple infrastructures, resulting in widespread
disruption of essential services, significant economic losses,
and potentially endangering public safety and national
security. The NCSD, therefore, is implementing its objectives
for the timely execution of three key mission areas--outreach,
prevention, and remediation.
The NCSD is aggressively pursuing an outreach agenda that
will provide education tools for children, parents, teachers,
business owners, and business operators. NCSD, through the
development of partnerships with government agencies such as
the Federal Trade Commission, nonprofits like the National
Cybersecurity Alliance and Internet service providers, will
work to establish and enhance awareness programs for all users
at all levels. We will be making announcements on our progress
in the coming weeks.
NCSD partnerships with industry, academia, and government
will be the foundation for program implementation for
protective and preventive measures to reduce America's
vulnerabilities to cyber attacks. It is crucial that we improve
existing public and private partnerships whose missions are
consistent with the NCSD.
A prime example is the National Cybersecurity Alliance
whose members have committed their time and resources to
regularly educating the home consumer and small businesses on
good security practices. Proactive response and recovery
efforts associated with the recent Blaster worm and SoBig virus
offer the best evidence of the value of partnerships. SoBig
spread faster and more aggressively than any previous e-mail
virus, affecting millions of residential business and
government computers worldwide.
We recognize a cyber attack could easily cascade across
multiple infrastructures, causing widespread, rapid disruption
of essential services and impacting our national economy,
public safety, and national security. The NCSD is committed to
closely working with other government and law enforcement
agencies, private industry, as well as academia, to help secure
our cyberspace from future and potentially more serious
malicious exploitation.
To this end, I am pleased to announce that we are beginning
to organize a National Cybersecurity Summit for later this fall
in order to assemble key industry and government leaders to
energize decisions like several key national cybersecurity
issues.
The Internet and cyber technologies have greatly improved
both the quality of life for our citizens and the efficiency
and the productivity of our business and our government. These
societal and economic benefits are not without their costs.
Malicious actors are devising new and ingenious ways to exploit
vulnerabilities in our cyber world, to disrupt our quality of
life, and threaten our national and economic security. Much
like the larger global war on terrorism, this effort will take
time, resources, dedication, energy, and hard work. But in the
few short months we have been in existence, we have made great
strides and we look forward to working with the Members of
Congress, this committee, our government partners, the private
sector, and the international community in this endeavor.
I come before you today to dedicate ourselves to this
common goal: one team, one fight, one mission, to protect the
United States of America.
I appreciate the opportunity to testify before you today
and I look forward to your questions. Thank you.
[The statement of Mr. Liscouski follows:]
Prepared Statement of the Hon. Robert Liscouski
Good morning Chairman Thornberry and Members of the committee. My
name is Robert Liscouski, I am the Assistant Secretary for
Infrastructure Protection and Acting Director of the National Cyber
Security Division (NCSD) within the Department of Homeland Security. I
am pleased to appear before your Subcommittee to discuss some of our
efforts to protect and secure our Nation's critical infrastructure.
Last week's observances of the two-year anniversary of the
September 11th attacks offer a stark reminder of the threats and
vulnerabilities we as a Nation still confront. The Department's
Information Analysis and Infrastructure Protection Directorate (IAIP)
was established by the Homeland Security Act to lead the Nation's
efforts to prepare for, prevent, respond to, and recover from terrorist
attacks like those perpetrated on 9/11. These terrorist acts may
manifest in many forms, including physical and cyber attacks against
our critical infrastructure, key assets, and national icons. Both
physical and cyber assets have vulnerabilities that may be exploited by
our enemies. The highly interconnected nature of our infrastructure
makes these physical and cyber weaknesses impossible to separate--and
difficult to address separately. Our protection methodology leverages
an integrated physical/cyber protection approach to reduce
vulnerabilities and to optimize our response when an attack does occur.
From the beginning of DHS, the IAIP directorate which includes the
Infrastructure Protection Office for which I am responsible, has
implemented a dedicated organization committed to protecting physical
assets. The organization is called the Protective Security Division
(PSD). Recognizing the equal importance of protecting cyber assets, we
created the National Cyber Security Division on June 6 of this year.
These organizations within the Infrastructure Protection Office work
together to implement the integrated protection methodology that I
previously discussed. Today, I am here to give you a progress report on
where we are now, and what we have in store for the coming months and
years to implement the President's National Strategy to Secure
Cyberspace.
I am pleased to announce that Amit Yoran has been formally named as
the Director of the NCSD effective today. Mr. Yoran is a strategic,
disciplined leader who understands the unique threats and
vulnerabilities manifested in cyberspace and is an individual capable
of managing a diverse, highly technical organization Mr.Yoran was most
recently the Vice President for Managed Security Services at Symantec
Corporation where he was primarily responsible for managing security
infrastructures in 40 different countries. Before working with
Symantec, Mr. Yoran was the Founder, President and CEO of Riptech,
Inc., a leader in outsourced information security management and
monitoring. Before working in the private sector, he was the Director
of the Vulnerability Assessment Program within the Computer Emergency
Response Team at the Department of Defense and the Network Security
Manager and the Department of Defense where he was responsible for
maintaining operations of the Pentagon's network Mr. Yoran's leadership
and respect within the information security industry will further
accelerate our efforts in building the full NCSD team, and increasing
the strength of our public and private sector partnerships.
Since its formal establishment in June, the National Cyber Security
Division has worked closely with our partners in the private sector,
including coordinating response and mitigation of the Blaster worm and
SoBig virus. Without these coordinated efforts, the significant
economic impact of these attacks could have been much worse. In each
situation, the Department's cyber security experts demonstrated the
ability to quickly reach out to the security community, rapidly assess
emerging threats, and provide timely warnings to government, industry,
and the general public. These initial efforts were crucial--they
allowed the NCSD to establish its credibility and demonstrate its value
to the national and international cyber security community.
Since June, IAIP has been assembling a consolidated and coordinated
team of cyber security professionals. These experts were integrated
from portions of the National Infrastructure Protection Center (NIPC),
Critical Infrastructure Assurance Office (CIAO), Energy Assurance
Office (EAO), and the Federal Computer Incident Response Center
(FedCIRC). Despite the many organizational and cultural challenges
associated with integrating these elements into one entity, our initial
efforts have yielded effective and tangible results. Creation of the
NCSD has enabled:
<bullet> Planning for consolidation of three 24x7 cyber watch
centers;
<bullet> Formulation of a standardized incident handling
procedure for responding to cybersecurity events; and
<bullet> Creation of a single national focal point for
cybersecurity leadership for prevention, protection, and
response to incidents.
The most recent accomplishment of the NCSD is the creation of the
National Computer Emergency Response Team (US-CERT). The US-CERT, in
collaboration with the private sector and leading response
organizations, will improve warning and response time to security
incidents by fostering the development of detection tools and utilizing
common commercial incident and vulnerability reporting protocols. This
will increase the flow of critical security information throughout the
Internet community by leveraging the extensive resources and brand of
the Federal Government and Carnegie Mellon's CERT/Coordination Center.
The CERT/CC is a part of the Software Engineering Institute (SEI) and
is affiliated with Carnegie Mellon's new Cyber Security Laboratory. A
key enabler of this partnership is the 19 years of leadership
demonstrated by the U.S. Department of Defense in its sponsorship of
the SEI, a federally funded research & development center. By
integrating capabilities from the Government (FedCIRC), Academia (The
CERT/CC), and the private sector (vendors of security products and
services), the US-CERT will provide a coordination center that, for the
first time, links public and private response capabilities to
facilitate communication across all infrastructure sectors.
Before detailing our future programs and initiatives, I would like
to begin by providing rationale behind the decision to treat physical
and cyber security on part with one another, within the IAIP
directorate. I believe that this approach is the correct one for three
reasons.
First, cyber security cannot be a ``stand alone'' effort. As I
described earlier in my statement, the success of DHS as a Department,
and IAIP specifically, depends on our ability to protect the entire
critical infrastructure against physical and cyber attacks together. We
realize the dominant components common to all 13 critical
infrastructures are physical and cyber components. To best protect the
country against attack, careful integration of both components is
required to achieve a holistic view of critical infrastructure
vulnerabilities. In fact, this view is validated by a common criticism
voiced by the private sector and security experts preceding the
creation of the Department: physical and cyber security were being
addressed by the government independently. We believe the physical and
cyber domains are inextricably linked and vulnerabilities cannot be
effectively analyzed independently. Placing both responsibilities under
one Under Secretary and one Assistant Secretary has ensured successful
integration.
Second, the NCSD will identify, analyze, and reduce cyber threats
and vulnerabilities; disseminate threat warning information, coordinate
incident response; and provide technical assistance in Continuity of
operations and recovery planning. With the creation of the NCSD, we
have for the first time, implemented a single point of contact for the
prevention, protection, and coordination of response to incidents, that
will interact with all federal agencies, private industry, the research
community, State and local governments, and other partners on a 24x7
basis.
Third, while the Director of the NCSD serves as the technical and
operational lead for cybersecurity issues, it is important to remember
that the cyber security issue will now be championed within IAIP by
Under Secretary Frank Libutti, and myself. The Under Secretary and I
have already demonstrated our commitment to developing a world-class
cyber security capability within the Department and believe the
continued implementation and full funding of the NCSD is one of the top
priorities for the IAIP Directorate. Furthermore, cyber security
research and development will be conducted in partnership with the
Department's Science and technology Directorate under the leadership of
Under Secretary Charles McQueary.
Now I would like to focus the remainder of my testimony on our plans
for building on our accomplishments of the last three months to fully
implement the operational NCSD in the coming months.
The Mission: Outreach, Prevention, and Remediation
As demonstrated by recent events, the consequences of a cyber
attack can manifest with little or no warning, on a widespread scale,
and with tremendous speed. Impacts can quickly cascade across multiple
infrastructures, resulting in widespread disruptions of essential
services, significant economic losses, and potentially endangering
public safety and national security. The National Cyber Security
Division, therefore, is implementing its objectives through the timely
execution of three key mission areas--Outreach, Prevention, and
Remediation.
Outreach
The NCSD will create, in coordination with the Office of Personnel
Management and the National Institute of Standards and Technology,
cyber security awareness and education programs and partnerships with
consumers, businesses, governments, academia and international
communities.
An effective outreach program lays the foundation for the ultimate
success of all mission areas of the NCSD. Accordingly, the NCSD
championing the implementation of awareness efforts and campaigns that
use a multi-level approach to provide awareness/educational tools for
all users; for the home, awareness tools for children, parents and
teens; customized approaches for small, medium, and large businesses;
and for government agencies. Every level of user must realize they have
an equally important role in the security of cyberspace. The end user,
for example, needs to be informed about the technical aspects of
security and about their role as gatekeepers in a larger data and
information sharing community.
The NCSD is aggressively pursuing an outreach agenda that will
target groups of citizens by providing education tools for children,
parents, teachers and business owners and operators. There are many
effective existing programs and the NCSD is developing partnerships
with government agencies, such as the Federal Trade Commission, non-
profits like the National Cyber Security Alliance, and the Internet
Service Providers to establish and enhance awareness programs for all
users. We are working to build on existing public/private outreach
groups to assist the spectrum of users in securing their systems
through implementation of effective security practices.
One quick example is establishing National Cyber Security Days. As
Americans change their clocks twice a year, to Daylight Savings and
Standard times, the partnership of the NCSD and the National Cyber
Security Alliance's StaySafeOnline Campaign asks consumers to use the
days as reminders to assess their own computer security. Computer
security needs to be a regular consideration when protecting a home.
Just as consumers remember to lock their doors, so too should they
remember to secure their computers. As a result of this partnership
with the NCSD many other partners in the business and government
communities are starting to design their national ad campaigns around
these two dates to further amplify this important message.
At the same time, the NCSD is partnering with other federal
agencies, including, Commerce, NSA and DOD, state and local government,
private industry, and academia to promote a well-trained IT security
workforce.
Prevention
Consistent with law and policy, NCSD will coordinate closely with
the Office of Management and Budget and NIST regarding the security of
Federal systems and coordinate with Federal law enforcement
authorities, as appropriate. NCSD will leverage other DHS components
including the Science and Technology Directorate, the U.S. Secret
Service and the Department's privacy officer.
To achieve its mission, the NCSD is working with State and local
governments, and the private sector to conduct infrastructure
vulnerability field assessments, while providing the best and most
cost-effective prevention and protection strategies for ``at risk''
infrastructure facilities, assets, and personnel. Due to the diversity
of the critical infrastructure, cyber protection strategies for each
sector must be customized based on the unique geographical and business
operating models of that sector. Due to the highly interconnected yet
physically distributed nature of our critical infrastructure,
prevention and protection strategies are prioritized based on regional,
State, and local needs and on the need for cross-sector coordination.
We recognize that collaborating with industry, academia, and
Government is a key focus of our NCSD activities. With partnerships as
the foundation for program implementation, the NCSD will coordinate
implementation of protective and preventative measures to reduce
America's vulnerability to cyber attacks. It is crucial that we improve
existing public-private partnerships whose missions are consistent with
NCSD functions. A prime example is the National Cyber Security
Alliance, whose members have committed their time and resources to
regularly educating the home consumer and small businesses on good
security practices.
With nearly all of the backbone of cyberspace owned by the private
sector, it is imperative that the NCSD strengthen its relationships
with them. Fortunately, there are mechanisms already in place to
facilitate cooperation between industry and government on cyber
security, most notably the National Coordinating Center (NCC) for
Telecommunications and its Telecommunications Information Sharing and
Analysis Center (ISAC), which are each part of the National
Communications System (NCS) and IAIP. These entities provide the
Department with direct access to leading industry operational and
security experts whose knowledge and insights may prove crucial in
managing a cyber incident. The NCSD, as part of IAIP, also helps to
support two CEO-level advisory committees--The National Security
Telecommunications Advisory Committee (NSTAC) and the National
Infrastructure Advisory Council (NIAC),--which provide advice and
counsel on national security telecommunications and critical
infrastructure matters, including cyber security issues.
By acting as a champion for creating a national and international
culture of cyber security, we aim to promote a security culture at the
CEO-level and demonstrate to corporate leaders that cyber security
ultimately promotes the resiliency of their infrastructures, protects
the interests of their shareholders and corporate brand, and preserves
value and competitive advantage for businesses that implement security
best practices.
Remediation
As I discussed earlier, the proactive response and recovery efforts
associated with the Blaster worm and SoBig computer virus offer the
best evidence of the value of partnerships. SoBig spread faster and
more aggressively than any previous email virus, affecting millions of
residential, business, and government computers worldwide. Internet
traffic was substantially affected by these two events, causing a 25
percent increase in internet traffic and infecting over 600,000
computers. It had a significant impact on cross-sector communication
and impacted productivity.
In August, when the Blaster worm surfaced on the Internet, the NCSD
issued a timely warning to security professionals, suggesting that
Internet service providers and other corporate network administrators
shut off inbound traffic to ports 135, 139, and 445 to block the
spreading of the Blaster infection. Blaster took advantage of a known
vulnerability in a Windows operating system component that handles
messages sent using the remote procedure call (RPC) protocol. RPC is a
common protocol that software programs use to request services from
other programs running on servers in a networked environment.
Vulnerable systems were compromised automatically without any
interaction from users. Through the advisory, users were instructed to
install the appropriate software patches to prevent their computers
from being infected. In the following weeks, the NCSD continued to
issue advisories warning security professionals that a variant of the
Blaster worm, dubbed ``nachi,'' ``welchia'' or ``msblast.D,'' was
proliferating.
Working with Internet security researchers and experts from private
industry and academia, the Division and the FBI uncovered malicious
code hidden within the SoBig worm on twenty master machines that was
programmed to launch a massive denial of service attack. Federal
authorities located the twenty computers infected with this variant of
the worm and asked their Internet service providers to shut down their
Internet access. As a consequence, the second wave of attacks never
materialized.
The NCSD recognizes that a cyber attack could cascade across
multiple infrastructures, causing widespread rapid disruption of
essential services, and impacting our national economy, public safety,
and national security. While this generation of worms has not yet
resulted in irreversible damage (albeit slowing communication,
overstuffing e-mail inboxes, and reducing productivity), the NCSD is
committed to working closely with other government and law enforcement
agencies, private industry, as well as academia to help secure our
cyberspace from future, and potentially more serious malicious
exploitation.
To this end, I am pleased to announce that we are beginning to
organize a National Cyber Security Summit for later this fall, in order
to assemble key industry and government leaders to energize decisions
on several key National cyber security issues. Key goals of the summit
are to--.
<bullet> Produce a common threat and vulnerability reporting
protocol to enhance prevention and response capabilities and to
drive a standards-based system for communicating threats and
vulnerabilities across the Nation;
<bullet> Develop a Vulnerability Reduction Initiative to
significantly reduce vulnerabilities based upon improved
evaluation standards, tools and measures for software, new
tools and methods for rapid patch deployment, and best practice
adoption of security for cyber systems across the critical
infrastructure in partnership with industry and the leading
research universities in the United States;
<bullet> Create an outreach and education partnership to offer
training and awareness to 50 million home users and small
businesses in cyber security within one year; and
<bullet> Formulate and ratify a National Cyber Security Road
Map that defines milestones, work streams, and metrics for
``raising the bar'' of cyber security across the United States
and identify work stream leads from government and industry.
Since its inception, the National Cyber Security Division has
delivered on its commitment to provide a centralized coordination point
for the collection and dissemination of protective measures to reduce
vulnerabilities and risks to the cyber infrastructure through
implementation of the Cyber Security Tracking Analysis and Response
Center (CSTARC). As announced in our press release on Monday morning,
CSTARC, through a partnership with Carnegie Mellon University's CERT/
Coordination Center, will evolve to a new capacity as a national
Computer Emergency Response Team (US-CERT). The US-CERT will enhance
our Nation's prevention of and response to cyber threats and
vulnerabilities. There are currently over two hundred private sector
groups, public sector groups, and universities that operate computer
emergency response teams (CERTs) within the United States. Many of
these groups have varying levels of informal and formal partnerships
with each other and with the US-CERT. This initiative will harness this
massive capability to significantly increase America's ability to
protect against, and respond to, massive scale cyber attacks.
We view the US-CERT as a fundamental element of the DHS strategy to
ensure timely notification of all types of attacks, working toward
having, within a year, an average of a 30-minute response to any
attack. Moreover, the US-CERT will provide a coordination center that,
for the first time, links all public and private response capabilities
and facilitates communication across all sectors. US-CERT will also
lead collaboration with the private sector to develop and distribute
new tools and methods for detecting and identifying vulnerabilities in
an effort to significantly reduce vulnerabilities. Lastly, US-CERT will
help improve incident prevention methods and technologies by
identifying and disseminating best practices and working with the
private security industry to improve warning sensor data collection and
analysis.
Conclusion
The Internet and cyber technologies have greatly improved both the
quality of life for our citizens and the efficiency and productivity of
our businesses and our government. These societal and economic benefits
are not without their costs. Malicious actors are devising new and
ingenious ways to exploit vulnerabilities in those cyber systems, to
disrupt our quality of life and to threaten our national and economic
security. Our ever-growing reliance on the Internet and cyber systems
compels us to counter these threats and vulnerabilities by building
productive partnerships with key stakeholder communities in cyberspace,
improving how we share information, and developing and fielding
innovative technical solutions. As the focal point for the prevention,
protection and coordination of response to incidents, the NCSD must
achieve its mission of ensuring the security of cyberspace. We know
this will not be an easy assignment. Much like the larger global war on
terrorism, this effort will take time, resources, dedication, energy,
and hard work to succeed. But in a few short months, we have made great
strides and are excited about the possibilities that the future offers.
With the appointment of the new Director of the NCSD, we have focused
leadership to guide us forward, to forge new alliances and
partnerships, to implement new tools and capabilities, and to provide a
vision for cyberspace security.
Again, I appreciate the opportunity to testify before you today. I
would be pleased to answer any questions that you have at this time.
Mr. Thornberry. Thank you. And I can assure you that this
subcommittee shares your goal of working together to help the
country be safer. Let me just ask one brief question before
yielding to Ms. Lofgren.
It seems as though that the Department has made several
significant announcements yesterday and today. The
establishment of the US-CERT, the naming of the Director for
the Cybersecurity Division, and now this National Cybersecurity
Summit, which will take place later this fall.
Why is it all coming down now? What has been your decision-
making process, and why are we just having these decisions
made.
Mr. Liscouski. Well, Mr. Chairman, it is a function of our
timing is, we have been working very hard since June, and as
you well know, we have engaged in a lot of other activities in
standing up the division.
One of the things I have been working hard at over the past
few months is putting the right team in place to ensure we
could actually carry out the things that we announced just
these past couple of days. So it is one.
We could have announced them, or at least our intention is
to execute on these objectives, earlier; but the framework from
which we are operating is really one in which we plan
carefully, but quickly, and then with the ability to execute.
So I am here before you today to say that our announcements
are timed with our ability to execute, not so much as anything
else, but just a function of the ability that we are working
very hard, and we have got a good plan together, and we finally
have our teams together to be able to execute on the strategies
we have identified.
Mr. Thornberry. Yield to Ms. Lofgren.
Ms. Lofgren. Thank you, Mr. Chairman. I have just a few
questions.
As I mentioned in my opening statement, the President had a
Special Advisor on Cybersecurity, but that position has been
eliminated. Will the director of the Cybersecurity Division
have direct contact with the President or with Secretary Ridge
on cybersecurity issues? What kind of access will this
individual have?
This is kind of a nerdy subject we all know that and yet it
is very important; and it is important that the decision
makers, who are not necessarily living and breathing computer,
be contacted and be aware of the scope of the issues.
Mr. Liscouski. Yes, ma'am. Mr. Yoran--first of all let me
explain.
Our management style at DHS is, one, a very direct one.
Working for Under Secretary Libutti and Secretary Ridge
requires one to be constantly engaged to ensure that the
leadership knows what is going on. I mean, this is a constant
dialogue we have at senior management levels, particularly as
it relates to infrastructure protection. Information analysis,
because of the very uniqueness of what IAIP brings to the
Department in terms of a function, is one which is heavily
relied upon by the senior management of DHS. So I can tell you
from personal experience that Secretary Ridge, Under Secretary
Libutti reach down into the organization at any level that they
think they need to get the answers to questions that they have,
and we are very responsive.
To that end, Secretary Ridge has been personally involved
in not just overseeing the implementation or the creation of
this division, but engaged with me in identifying the type of
leadership we need and what we need to do to be successful in
this endeavor. So if Mr. Yoran is going to have the the
pleasure, because it is indeed a pleasure to work with the
senior leadership, but more importantly the responsibility of
reporting directly. My management style, Under Secretary
Libutti's management style, is not one in which we say, You
have got to go through a, quote, unquote, ``chain of command.''
Ours is pretty much, You are the expert, you have got the con,
you take the lead, answer the questions, take the initiatives.
Ms. Lofgren. Okay. That is very reassuring. Thank you.
One of the questions I was mentioning to the chairman,
there is modeling going on around the country, university
based, and I am interested in whether the Cybersecurity
Division will be working with the Science and Technology
Directorate on modeling in simulation issues and whether cyber
threats are going to be integrated into these efforts. Can you
give us a progress update on that?
Mr. Liscouski. Yes, ma'am. Let me take the partnership with
S&T first because I think that is where it starts.
The Cyber Division has got a direct nexus into Under
Secretary McCrery's S&T organization, the Directorate. We have
a deputy director named in the research center in S&T. So we
are directly partnering by driving requirements in S&T that we
have identified from the field, not just from our own efforts,
but through our partnerships with State and local governments,
with the industry, with our international partners. We are
taking those requirements and driving them into S&T. That is
point number one.
As it relates to the universities, our relationship with
the US-CERT at Carnegie Mellon clearly is one example. We have
many other relationships with universities and labs to do
modeling. We have got the benefit of having the opportunity of
reaching out to lab relationships we have currently that came
over to us when we formed DHS earlier this year, so we have
already been working on computer simulations for different
types of modeling for attacks and for things that relate to
cybersecurity as well as other parts of our infrastructure.
Ms. Lofgren. Can I ask you about this US-CERT? I saw the
announcement. We have the Federal Government has been a partner
with CERT at Carnegie Mellon for many years. And how is US-CERT
going to be different than regular old CERT?
Mr. Liscouski. Well, I would like to recognize the
Department of Defense obviously for taking the initiative back
some almost 20 years ago, after the Morris worm, to establish
the CERT/CC capability. That relationship has allowed many
parts of the Federal Government to take advantage of the CERT
capabilities.
CERT, as you well know, remains one of the premier
capabilities in the world, and to that end, the partnership
that DHS is establishing is a key one for us because we are
increasing our level of financing to the CERT. So therefore we
are increasing the resources available directly to DHS, vis-a-
vis the CERT, to do things not just around the incident
response area, but also looking at establishing a malicious
code lab there, as well as other enhancements through
financing, through partnerships, through positioning people at
the CERT, working closely with them to ensure that US-CERT can
mature to a capability that is going to serve the National
Strategy for Cyberspace.
Ms. Lofgren. Finally, one of the responsibilities of your
office is to coordinate outreach to State and local
governments, and I am interested in how you are doing that. Is
there an office that is responsible for outreach? Is outreach
institutionalized? And in particular I am interested not just
in what we might think of as cybersecurity, but the physical
infrastructure that allows the cyber world to exist; and I
continue to be concerned about the level of information and
coordination between the Federal Government and State and
local, especially local police officials, in terms of
vulnerabilities that exist to the physical infrastructure.
Because we are very concerned with the viruses and worms
and cyber attack, but the model for terrorists remains some
maniac with a bomb; and so we have vulnerabilities in that area
that I am not yet convinced we have addressed adequately. And
really our first line of defense is going to be local, not
Federal officers.
So can you address that issue for me?
Mr. Liscouski. Yes, ma'am. And I agree with you; I don't
think we have addressed it adequately yet either. We are
working hard to do that. We have got a number of mechanisms for
outreach, and let me just articulate those.
We have a branch in the NCSD dedicated to outreach. It is
headed up by a very seasoned professional. Sally McDonald, who
came to us from the Fed CERT, has done a tremendous amount of
effort in outreach and has got a lot of experience in this
area, so we are relying upon Ms. McDonald to really take the
programs where we need to go.
We have a number of programs currently established at the
NCSD. StaySafeOnline Campaign is one of the dominant ones in
which we are using that to reach many different levels of
constituents in the cyber world. That is just one example.
We are partnering up as you may know, we have got
relationships with ISACS, the Information Sharing Analysis
Centers. There is an IT ISAC, but there is a cyber component in
every ISAC we use for outreach.
We have our advisory systems in which we put out notices
about threats or incidents and events relating to the cyber
world.
We are going to continue to use the private sector for
outreach. Our partnerships with the private sector are
absolutely key for us to ensure that we have got the right
things, the right awareness, going on because, as you are fully
aware, this problem is not necessarily just a technological
problem. In fact, most computer security professionals would
articulate that the problem is typically not the technology; it
is the implementation of proper standards and procedures to
ensure that the technology is used accordingly, patches are
made, remediation work is being done. And those are process
issues; those are not technological issues.
It is all about awareness training, so we are reaching out
using universities, using the private sector, using our own
outreach capabilities to ensure we have multilevel awareness
programs going on; and these are in development, and we are
welcoming suggestions from any of those out there, anybody who
has got an interest in this area to ensure we are doing the
right thing.
As I mentioned in my statement, we are working with ISPs to
ensure that we have got the right awareness going on for users
of broadband connections to ensure that they understand the
dangers of getting on line and in open systems without taking
the appropriate precautions, so--.
Ms. Lofgren. Thank you. I will reserve my other questions
for the next second round.
Mr. Liscouski. Thank you.
Mr. Thornberry. I think the Chair will use the clock not
just as a guide for members, not as a hard and fast rule; and
Ms. Lofgren and I have agreed that we will have as many rounds
as members have questions, with Mr. Liscouski's indulgence.
The Chair would now recognize the gentlelady from
Washington.
Ms. Dunn. I thank the chairman.
Mr. Liscouski, this committee has made it a priority to
understand how communications and information are being shared
across Federal agencies. How will the Cyber Division work
within the larger Information Analysis Division responsible for
analysis and warnings to the Homeland Security community and,
if necessary in an extreme case, to the public?
Mr. Liscouski. Let me describe first our relationship with
the Information Analysis Office. That is the IA component of
IAIP. We are tightly knit together. The IAIP Directorate,
combined of those two offices, was created with the intention
of ensuring that we had overlap of our functions and our
thinking within the structure to ensure that we always had a
very close look at the intelligence components of the threats
mapping vulnerabilities, whether they be physical
vulnerabilities or logical or cyber vulnerabilities.
And in this case, the NCSD plays sort of a unique role.
While it is not an intelligence function, it is a capability-
oriented, technical capability. And we lend ourselves to the IA
function to understand how technical exploits can be used to
conduct cyber terrorist attacks, while the IA function has
clearly got the intelligence requirements to understand how
terrorist groups may, or what their intentions may be to use
technologies to conduct a cyber attack. They are a portal to
the Intelligence Community.
We drive our requirements through the information analysis
component to ensure that they maintain that constant look and
their constant contextual piece around what we are worried
about from a vulnerability standpoint and what the Intelligence
Community needs to be looking at from an intelligence
standpoint. So we are tightly integrated. We drive
requirements. We have--the IA analysts are frequently as
knowledgeable about the technology, at least at a top level, as
our folks are to understand what the vulnerabilities are. So
when they see intelligence pieces they understand the relevance
of intelligence to a particular infrastructure component.
Ms. Dunn. Will you find yourself working with TTIC, with or
through TTIC, during any of the process?
Mr. Liscouski. Yes, ma'am. We would be working with TTIC,
and we do now quite actively through our IA counterparts; and
my colleague, Bill Parrish, the Acting Assistant Secretary for
Information Analysis can go into that much more deeply. But I
am very familiar with our relationships there. We use them
quite robustly.
But, again, we drive those through the IA component, ma'am.
Ms. Dunn. Do you--in your Cyber Division, do you believe
now you have adequate resources to conduct all your activities?
Are there areas where you see specific needs our committee
ought to be focusing on?
Mr. Liscouski. I think, for the present, we have the
resources we need. As you know, we are staffing up. We
currently have approximately 65 people in the division, and we
are looking to staff up to somewhere, I would say about 100 or
so for fiscal year 2004 is our plan.
From my perspective, I think we are adequately staffed. I
think we have got the resources we need, particularly with the
partnership with the US-CERT. I think downstream, as we learn
more about the vulnerabilities and particularly the initiatives
we want to take and the resource areas in the short terms areas
that we need to make improvements, we will probably be coming
back to this committee and articulating what those needs are.
Ms. Dunn. I am not seeing any timing clock. Do you have
one, Mr. Chairman?
Mr. Thornberry. The green light is down in front of the
witness.
Ms. Dunn. Got it.
As I mentioned in my opening statement, we all fully
appreciate cyberspace has no borders. How will you find
yourself working with international organizations in your role?
Mr. Liscouski. The international component is a very
critical one for us. As you know, we have some informal
arrangements. We are working closely with the British
Government, with the Australians, the Germans, the Canadians.
It is critical for us to expand our relationships for
international cooperation. We are working with the Department
of State to formalize those agreements. Bilateral and
multilateral agreements are very key for us.
The national strategy articulated the need for signing for
the--I am sorry--the European convention on cybersecurity. That
is not the exact term, but we fully support that.
We need to work with the international community to ensure
that we have got uniform laws across international boundaries
to enforce violations, to ensure that we have got good thinking
about best practices.
To your point, there are no boundaries. A vulnerability in
Slovakia is as critical as a vulnerability in the United
States. If a company is a Fortune 50 company operating around
the world, we have to be very cognizant of those
vulnerabilities. We are working hard with our partners to bring
them up a level of capability, as well.
Ms. Dunn. And does that include cooperative working when
responding to something?
Mr. Liscouski. Yes, ma'am. The US-CERT is going to be nexus
for that capability. We are going to be using the US-CERT as a
model for CERTs around the world to--and this has clearly been
the model.
So to your point, yes.
Ms. Dunn. What about--is your division considering and in
cooperation with the private sector, considering setting up a
code of standards, best practices, that would be in place both
for the private sector, which you, in your testimony, mentioned
had something over 80 percent of all of the cyber work that we
need to be dealing with and also the public sector?
Mr. Liscouski. Yes, ma'am. And best practices occur at many
different levels.
We are trying to articulate identify and articulate best
practices for home users, for small businesses, universities,
big businesses. We have got to work in cooperation with the
industry to ensure that best practices are effective,
implementable, cost-effective, measurable, all the elements
that you would want to have programs to identify what the right
level of security is.
This is a big area, a big body of work, and we are
spending, we have been spending time, and we are spending much
more a lot more time in the future on this. We are working with
our councils. We have got the NIAC, the National Infrastructure
Advisory Council, you are familiar with, I am sure; the NSTAC,
the National Security Telecommunications Advisory Council. Both
of those bodies have been involved in helping us identify
standards.
We are working with the private sector to determine what
additional standards may be necessary. We are going to make
these standards publicly available on our Web sites as we
promulgate them. So this is all part of our outreach program.
Ms. Dunn. And you can do that, you believe, without
legislation?
Mr. Liscouski. Yes, ma'am. And I think at this point in
time, we have got the industry with the support of the
Congress, with the support of this administration, attuned to
the need that security is more than just something which you
can spend a dollar for and say, I have got adequate security.
The biggest challenge in the business community is, again,
ensuring you can identify what the appropriate level is and
what the right level of investment for a dollar of security,
does it get you anything in return. The cost and the return on
investment is always a key component in the private sector.
The business case here in terms of why businesses should be
spending money on security in advance of legislation, I think,
is one which is based upon competitive advantage. The more we
can educate consumers, either at the basic consumer level,
those who might shop at Amazon.com on line or those who
implement multimillion dollar programs in their businesses,
should know that they have choices about what the right choices
are to make for security, for levels of security in the
technology that they are buying; and the more we can make
those--that awareness known to the consumer groups, the more
pressure they will put on the private sector to ensure that
security is baked into their programs.
Ms. Dunn. Good. Thank you very much.
Thanks, Mr. Chairman.
Mr. Liscouski. Thank you.
Mr. Thornberry. Thank the gentlelady. The gentleman from
North Carolina.
Mr. Etheridge. Thank you, Mr. Chairman, and thank you for
holding this hearing. I think it is we all know how important
it is.
Mr. Liscouski, when we think in terms of cybersecurity, a
lot of folks, when they first hear it, they think of it as how
we protect computers. The truth is, as you know, it is much
broader than that, because so much of our productivity and our
economic fiber of this country is tied to the whole integration
system that we have; and over the last 10, 20 years we have
seen tremendous amounts.
So let me get back to the risk assessment, and I am going
to try not to cover something that hasn't been covered, but
maybe get a little better perspective on it. Because realizing
that a department is just gearing up, and thinking about just
the amount of problems we have had that was mentioned by our
ranking member just this past August, the economic damage that
was done to business and others by independent assessments, by
some of the digital risk companies are saying it was about $32
to $33 billion. So obviously, this whole issue of cybersecurity
is a huge issue.
What progress has the Department of Homeland Security made
in identifying cyber threats and vulnerabilities? And in
conjunction with that, how have you been able to share this
information with State and local organizations, which I think
is critical? You know, just because they have the information
doesn't really do us a whole lot of good unless we can figure
out how we can get it, to get some results in the assessment
area.
Mr. Liscouski. It is an excellent question because it is
the heart of what a good protection program is all about:
understanding the risks, the vulnerabilities to those risks,
and the right practices in which you can engage to mitigate or
reduce those risks or alleviate them.
To that end, a major component of what we have done there
are a number of them. We have got one effort as part of our
responsibility for securing the Federal Government, which is
initiated through the Fed CERT. That is the responsibility, to
ensure that the proper warning alerts, incident notices, are
going out across the Federal Government.
That program has been in place for a while, originally
established with GSA, now moved over to DHS, and is, at the
heart, the NCSD. It is a very robust program. Part of that is
also a patch remediation capability which goes back to the
reduction of vulnerabilities and spreading that word.
As it relates to the private sector and State and local
governments, I think that is where much of our work is required
to be done yet. We have got great relationships in the private
sector in providing us information about vulnerabilities. Our
relationships with Microsoft, with Cisco recently, have enabled
us to be able to respond very quickly to vulnerability
information and exploits and put notices out there to the
general public and the State and local governments as well.
They are all on the same alert system, so therefore they have
the opportunity of receiving this information very quickly.
It is our goal, with the establishment of the US-CERT and
the leadership that we are establishing in the NCSD, to reduce
these notification times from hours, currently, to, hopefully
by the end of fiscal year 2004, an average of 30 minutes. We
are looking to get robust communications capabilities out there
beyond what we have now working, establishing networks with
State and local governments.
We have got some efforts under way right now, which I would
like to keep at a top level, in terms of working very closely
with State initiatives to develop communication networks, and
then ultimately to establish State CERTs again, using the US-
CERT as a model to reach down into the State governments to
help them set up their own capabilities for incident response
and incident warnings.
So there are a number of initiatives we have got going in
the pipeline. Again, we have only been working here for 3
months, so we are moving from the thinking and planning stages
into the execution stages in the next quarter.
Mr. Etheridge. Let me follow that up, if I might, please,
because I think you moved into the advisory and warning area,
which I think is very critical as you deal with the assessed
risk assessment.
You have started a long--but as the Department looks at
this whole area of integrating warnings about the possible
problems of cybersecurity, and you have talked about what you
are doing across the Federal Government to get it done on the
security advisory system, talk to us a little bit more, if you
will, please, about how are you reaching out to locals. You
have talked about it in general terms. Because I think it is
important, because most of the people who are going to be
called upon to respond to such an attack are not traditional
first responders, as we think, in terms of the agency reaching
out to first responders--our fire, police or rescue; they are
important because they have to receive it too--but you are also
talking about a whole new group of first responders.
How about talking about how those two are integrated,
because I think it is critical to know, and what the Department
is doing on it? Because if all you do is go to the end user,
that will help, but you have really got to get upstream; and I
hope that is what you are talking about.
Mr. Liscouski. Yes, sir. And if I understand your question
correctly, this is again a multilevel approach.
Mr. Ethridge. Absolutely, because you have also got the
private sector category there.
Mr. Liscouski. That is correct.
The first responder category in the cyber world is every
user. I mean, it starts with prevention, as you well know, and
ensuring we have got the right procedures in place to protect
our systems; and that is just through basic security practices.
Part of our outreach program is intended to continue to
elevate the level of awareness and understanding and security
posture within our--across the entire Nation by getting the
average user or the business user to understand what they must
do to protect themselves. In response mode, I think the Blaster
and the SoBig virus are a example of how our response needs to
be enhanced. I think we did a very admirable job responding and
putting the advisories out, and we got a significant reach
across our community to do that, both horizontally and
vertically within the State and local government community, as
well as in the private sector.
But the home user was the one that I believe probably
lacked the ability to understand what the implication of the--
they clearly understood the implication, primarily because they
couldn't get on the Internet. It was--remediating from that
problem was where we saw the biggest challenge to be.
So we are looking at many creative ways to put out the
word. We are working with the major media, establishing
relationships with the major media to put the word out to make
sure we have got a consistent message across there. Information
sharing is the primary goal of DHS.
It is often said, you know, it is not need to know, but it
is need to share, and we are looking for as many ways as we can
to put the information out there--on best practices, on
vulnerabilities, on threats--that we possibly can, irrespective
of whether they are in the physical world or the cyber world.
We are not differentiating those things.
The only thing I would add, and I can probably get into
this a little bit later, is the speed at which the cyber world
works. As you well know, it requires a little bit of a
different sort of ops tempo, so to speak, or posture in
ensuring that we have got a consistent, a thorough and a
consistent look across all the infrastructure to ensure that we
are aware of what is going on in the cyber world.
I can address that later.
Mr. Ethridge. Mr. Chairman, I know my time is up, but may I
follow up with one final, since we are on this point, because I
think it is so critical as we do this.
I hope at some point we have in the system a measurement to
know at least when we have we have had some measure of success.
You know, it is one thing to do the assessment, another to
notify. But unless we have a measurement down the road we talk
about what business does in terms of measuring inputs and
outputs. But we have to find a way to know, because this
pressures us to speed up our process in the decision-making
process to save those multitudes of billions of dollars down
the road.
Mr. Liscouski. You are absolutely right, sir. It is about
metrics. It is about ensuring we can find those measurable
programs and those factors within our programs to determine if,
in fact, we are doing the right thing. That is precisely the
business approach that we are taking.
Again, going back to the leadership--and the comments
earlier, ma'am, about, you know, why it took so long to find
our director--the only response on that is, we wanted to make
sure--we are only going to get a chance of doing this right
once, and finding the person with the right capabilities and
qualifications that can understand working in an
entrepreneurial environment.
How do you build an organization and who do you be able to
quickly execute against the requirements you have and this type
of highly threatened environment to make those --to measure
those successes is the type of person we were looking for and
is precisely the reason we were looking for them. It is all
about metrics.
Mr. Etheridge. Thank you, Mr. Chairman.
Mr. Thornberry. Thank the gentleman.
The gentleman from Georgia.
Mr. Linder. Thank you, Mr. Chairman. I only have a couple
of questions on this idea of sharing intelligence and
information.
I think we are beyond the stage where our intelligence
agencies are not sharing with each other. Is that fair to say?
Mr. Liscouski. Yes, if I heard you say, we are beyond the
point where we are not sharing.
Mr. Linder. Yeah.
Mr. Liscouski. Implying we really are sharing the
information. Yes, sir, you are correct.
Mr. Linder. How good are we at analyzing what we are
getting?
Mr. Liscouski. At what level, at the physical level or the
traditional threat level or at the cyber level, sir?
Mr. Linder. The threat level.
Mr. Liscouski. At the traditional threats level, I think we
are very good at analyzing it.
This is an extremely difficult problem, and I can speak to
it some, but I really defer to my colleague, Bill Parrish, the
Assistant Secretary for Information Analysis, in his domain.
But I have operated in this space for quite a long time, and
our capabilities for analyzing information have only increased
over the years. I mean, we have gotten very good as a whole, as
the Intelligence Community, to analyze information.
It is an extremely complex problem because you never have
the perfect information. You can never do the perfect analysis.
You can only do it in hindsight and retrospect. It is an
extremely difficult problem to solve. But I think the
capability is the people we have attracted into the
Intelligence Community, particularly in DHS, are really some of
the finest minds out there to be able to understand these
complex problems.
Mr. Linder. And lastly, how cautious or how careful are you
in sharing this with first responders? There was a time when
they were being overburdened with unanalyzed intelligence right
after September 11 to the point they just set it all aside, and
it had no value whatsoever. I think you have to be careful what
you give to them, that it has to have some specificity, some
analysis, and that it is right down their alley.
Mr. Liscouski. Yes, sir. In fact, our focus is not on first
responders, and I don't mean this in any other way than calling
them first preventors.
When we are sharing intelligence information, it is really
intended to prevent the act from occurring, and we will err on
the side of sharing probably too much sometimes. Of course, not
in the sense of sharing classified information inappropriately.
But working with TTIC, IA, the FBI, we have been very
aggressive in assuring we can quickly declassify information to
share out to the field, to our consumer base, as quickly and as
effectively as we can.
That is a challenge we are always going face. Sources and
methods, as you well know, are one of those things--that is
something that has to be guarded very carefully. But I
believe--and I have seen it in practice--that we will err on
the side of maybe sharing too much information sometimes,
because the frustration you can create by sharing general
information without specifics, and particularly with specific
activities to follow, sometimes can create a frustration. But,
nonetheless, I think as we all mature in this process,
particularly as our end users understand the context during
this threat environment, they themselves will raise up their
capabilities as well.
Mr. Linder. Thank you.
Mr. Liscouski. Thank you, sir.
Mr. Thornberry. Thank the gentleman.
Gentlelady from the Virgin Islands.
Mrs. Christensen. Thank you, Mr. Chairman.
I want to welcome the Assistant Secretary and thank the
chairman and ranking member for holding this hearing, given the
recent attacks, like the Blaster worm, and the concerns that
even a worse attack could occur within several hours or days
and the fact that so much of our physical infrastructure is
dependent--is so cyber dependent.
It is an important hearing, and I want to applaud you, Mr.
Assistant Secretary, for your focus on ensuring that
cybersecurity and physical infrastructure security are linked
in your operation, as it is important as they are linked in
reality.
I have a couple of questions. One of the--we have been
concerned about the slowness of the Department in getting
started and being able to plan and address many issues; and one
of the obstacles to that has been the fact that we were
bringing together 22 agencies and trying to blend them into a
smooth operational unit. The NCSD brings together about five
different parts of five different agencies--FBI, Commerce,
Defense--as well as a center. Are you pretty comfortable that
some of the obstacles of bringing different agencies with
different cultures together has been addressed and that you are
able to move forward smoothly now?
Mr. Liscouski. Yes, ma'am. I will tell you why that is a
great question.
I am satisfied because--I mean, that has been tremendously
challenging. I mean, bringing these organizations together
under one roof has been something that I don't think any person
who even architected this in the planning stages understood the
complexity of it.
I can speak for my own area within IAIP. As you pointed
out, we brought five different organizations into the NCSD and
IAIP. I just remind everyone respectfully that we have been in
business for 6 months, and the challenge we face in trying to
overcome some of those organizations has been pretty daunting;
I've got to be honest with you. I mean, when I came in from the
private sector to do this, it set me back a little bit when I
thought about, How are we going to do this and how are we going
to do this in the context that we have a real threat we are
facing every single day?
If you recall, when we did this, we were at war; and we had
to organize ourselves around work to respond to very real
threats in addition to bringing people on, creating
organization. It was pretty challenging.
The leadership at DHS, the senior leadership of DHS,
provided the right latitude in order to make mistakes. And that
is what we are going to be doing. I mean, clearly, as we start
out with this organization what it looks like today, in 2003,
will probably be a lot different in 2005, 2010. And hopefully
if we are succeeding we are going to continue the path of
evolution that will eventually evolve DHS into the robust
organization it really does need to be.
But we are on that path. It is a long road, but it has been
good. I mean, I can tell you in my private-sector experience
the thing that has been kind of very helpful to me is knowing
that we are going to make mistakes. But we don't have the
luxury of not making them. In fact, when we tell people when
they come on board--and I have said this before, I think,
before the committee--that we have got sort of one thinking. It
is a think big, act small scale, fast.
We know we are going to make mistakes. We know we have to
learn and we are going to evolve. It has been gratifying when
you look at it; and we were, on the way over here, reminding
ourselves it has only been 3 months for the division and it is
been 6 months for the DHS. In dog years it seems like it has
been a lifetime.
I can tell you that right now, it has been pretty
challenging, but we are making some very tremendous progress.
Mrs. Christensen. The other concern that I have is, the
officials who have left the positions over the few months; and
is, related to this, the difficulty in bringing the Department
together? Have you identified what the fault is, what were the
problems that would cause these officials to leave?
As you were looking for a Director of the NCSD several
candidates had indicated they weren't interested because it was
too far down the chain; they didn't have a direct link to the
Secretary.
Have you identified what it is that needed to be fixed?
Because the continuity of leadership is critical.
Mr. Liscouski. Yeah. I would suggest that I am not so sure
it needed to be fixed as much as we just had to find the right
person that understood this is about execution.
The challenge we had was taking a strategy, a highly
articulate and well-developed National Strategy to Secure
Cyberspace, and then putting implementation plans for that
strategy for execution. Two different types of people are
required for that job. And it is really difficult to be a
strategist at one level and an implementer at another level;
and we needed an implementer, and we needed a start-up person
that could take something where, to be quite candid with you,
is now somewhat of a chaotic environment, when you start things
up and just make some very short-term, measurable progress. And
that is the type of person we were looking for.
So I don't think there was a problem as much as there was
finding the right talent to fit that. And it is a challenge,
and it is a very risky challenge, because, you know, Mr. Yoran
is coming in to us with very definable goals. We have got high
expectations. It is very visible. And the risk to him--is you
know, at a personal level in terms of potentially not
succeeding, as well as to the Department is great.
So it is--when you are out there publicly like that, not
many people really want to take that challenge on.
Mrs. Christensen. Okay. One last question in this round.
Reading some of the articles in our background material--and it
is also my feeling that the Federal Government should lead by
example in cybersecurity--where are we in identifying the risks
and vulnerabilities of the government's cyber assets? Are we
leading by example?
Mr. Liscouski. Leading by example; I think we are probably
on a path to leading by example. I suspect there is always a
lot of room for improvement. We do have efforts underway to do
that. I think FISMA--the law has provided us tremendous
guidance and leadership or a framework from which we can
operate to ensure we are doing the rights things. So from that
perspective I think, frankly, FISMA is a wonderful example to
look at as a guide across the board. So I suggest the
government is leading by example on that, in that realm.
In our purchasing requirements, our ability to justify our
programs based upon good security practice, are things that I
think are very rational approaches to take as it relates to
cybersecurity. So I would argue, yes, I would think that the
government is leading by example.
We can be doing better. Cataloging our infrastructures,
understanding the interdependencies, those are things we are
trying to do across the board, and we have got programs in
place to do that. I think we will be getting better as we move
along.
Mrs. Christensen. Thank you.
Mr. Thornberry. I thank the gentlelady.
The gentleman from Kentucky, Mr. Lucas.
Mr. Lucas. Thank you, Mr. Chairman.
Mr. Secretary, in June you had detailed the plans for
Consolidated Cybersecurity Tracking Analysis and Response
Center that would detect and respond to Internet incidents,
track potential threats and vulnerabilities, and coordinate
cybersecurity and incident response for the Federal, State,
local governments, private sector, and international partners.
What has been the status of the center?
Mr. Liscouski. Sir, the CSTARC, the Cybersecurity Tracking
Analysis Center, has evolved into the US-CERT. That was a
preliminary step for us to be able to organize ourselves around
this effort, consolidate the watch centers and the efforts we
had within the other organizations that came to us when DHS was
created--those organizations being the NIPC, the CIAO, elements
of the NCS, the FedCIRC--into one organization. And that CSTARC
represented the first iteration of what we knew was going to
become the US-CERT. With the CSTARC we were able to very
capably manage a number of significant incidents, the SoBig,
the Blaster virus, the Cisco vulnerability. And then that, as I
indicated, provided the framework for us to be able to build on
that to create the CERT, the US-CERT.
Mr. Lucas. This is a hypothetical. In the event that we had
a terrorist incident today, a cyberterrorist event, could you
just explain to me what process we would use today to notify
all these different interested agencies?
Mr. Liscouski. Yes, sir. In the hypothetical example,
suppose we were notified in the private sector that they first
identified a particular exploit, and that exploit resulted in
our analysis to determine that that might be something that
would be used or may be the focus of a terrorist attack. The
combination of resources we have across the Federal Government
currently, if it comes to DHS first, our analysis capabilities,
leveraging on the US-CERT to understand those exploits is our
first stopping point. The US-CERT then quickly engages with
other components of the Federal Government, the JTF, CNO, for
cooperation and additional analysis. We would reach out to the
private sector to do additional analysis. And as quickly as we
get our analysis completed to determine what the vulnerability
or the threat might be, then DHS has got the advisory
capability of putting warnings out very quickly to the entire
community vis-a-vis its alert system as well as the ISACs to
ensure that we have got thorough coverage.
And, again, it is a work in progress. I am not suggesting
it works the way it should work all the time or it is as
thorough as it should be. Over time, our goal is to ensure that
we increase that coverage.
Mr. Lucas. I understand you said you were staffing up. You
have about 65 now, and you are hoping to have 100-plus.
Mr. Liscouski. Yes, sir.
Mr. Lucas. So, do I take it from that that you feel that
you have the financial resources you need to carry out your
mission? Or, if you had additional financial resources, how
would you utilize them?
Mr. Liscouski. You could always use money, but I am not so
sure if adding more money at any point in time is necessarily
the quickest solution. The biggest thing you have got to do is
build the right framework in the right organization in which to
put people in in the partnerships.
I think we are adequately funded right now. I think we have
got the right path to go on. We can come back and address that
downstream in fiscal year 2005.
Mr. Lucas. Those are my questions.
Mr. Thornberry. I thank the gentleman. The Chair recognizes
the Vice Chairman of the subcommittee, Mr. Sessions.
Mr. Sessions. I thank the Chairman and appreciate him
holding this hearing today, along with the Ranking Member.
Mr. Liscouski, welcome. We are delighted to have you here
today. And I would say to you, and I think you have heard this
from members, we appreciate your private sector experience and
the things which you learned there and the focus that that
brings to you and the DHS; I think that the Federal Government
will be better off because of those lessons that you have
learned.
I would like to focus my questions today; I just heard you
use the word ``framework.'' Some people could also say the word
``business plan'' might fit in the middle of that, framework
business plan.
On page 2 of your testimony, there are six different pieces
that are called status of integrating organizations and
functions below into DHS. And it talks about the elements of
the National Infrastructure protection center--formerly housed
in the Federal Bureau of Investigation--DOD, FEMA, Department
of Commerce, Energy, and General Services, GSA, into functions
that you are evidently going to be responsible for.
I am interested in your discussion with us about the word
``framework,'' about how you are going to bring these functions
in to make sure--I guess the best word is to say, ``to measure
twice and saw once'' for the efficiency and the effectiveness
so that we are not recreating something 7 or 8 or 10 months
down the line because of your need just to rush into service.
Would you mind discussing those things, those activities of
those six different pieces.
Mr. Liscouski. Sure. And this is broader than cyber, sir.
This really relates to the entire Infrastructure Protection
Office. And I would be happy to address that because I think I
have got to talk about that, and then the framework for the
other divisions fall out of that.
Generally speaking--and I will go back to the very
beginning when I came to DHS back in March--as I indicated, it
was obviously brand new. We had been involved-- when I got
there it was about 3 weeks old. So--and we were in the middle
of a war and we were staffing up to respond to the threats we
had.
It was immediately apparent that the work that we were
engaged in could not change substantively, because the same
elements that came to us from the Energy assurance office, from
the NIPC, from the CIAO, from the NCS, those elements were the
very elements that were responding to the threats of the
present day. So we had to be very careful as we were building
this framework and identifying what our bigger mission
requirements were that we didn't break anything. So that was
job one, and make sure that we responded to those threats.
So in our current-day thinking, what we did was basically
establish a capability that would operate at one level, which
was just putting one foot in front of the other to make sure we
were not stepping on a land mine, so to speak, and we were
executing against the goals that we had against that particular
threat.
Now, by the same token, we had to also think in a bigger
picture to understand what did the organization need to look
like over the 6, 12, or 18 months? So we began to develop an
organization based upon the work that we were in. And that was
the first question: What business were we in? You know, were we
out there doing vulnerability assessments; were we just out
there thinking great thoughts about protection strategies we
should be doing? How do we create a capability that could
address critical infrastructure vulnerabilities across 13
critical infrastructures, 5 key assets, the cyber environment,
in a way that we could put coherence around this?
So we were able to organize ourselves at the first level to
understand what the organization needed to look like. It
started off with a very basic line of block chart with two
organizations in it. We added a third. We kind of mixed it up.
I mean, we really learned as we were going.
To your point, we wanted to ensure that we acted quickly to
identify the immediate needs but as we built an organization
for the longer term. We are exactly in that process right now.
I now have four divisions in my organization, because we have
identified the need to build it out but yet stay integrated;
not specialize too much, but orient ourselves according to sort
of our business approach.
And I can get into some more detail if you would like. But
effectively what we started doing was a supply chain analysis.
We looked at our client base and we looked at the private
sector, the Federal sector, State and local governments, the
territories. We looked at all those client bases and determined
what was it we were delivering, what was it they needed, and
how do we deliver it and what were the inputs into that
delivery system, into the production system. And that is
precisely what we are doing.
So we are still going through that process. I suggest it is
going to take a few more months before we really figure out the
exact processes we need in terms of an organization. And then,
as I said earlier, this organization is probably going to
evolve as we learn more about our businesses as we go along. It
will be a continuous work in process, I can promise you that.
Mr. Sessions. You know, I think some of my comments--and I
don't presume to know the things which are important
necessarily to each one of these elements, not being aware of
all the databases; but it is my hope that you would be able to
develop in some efficient factor a database with firewalls with
the elements that you need to avoid six database
administrators, six of everything to accomplish these things.
And that kind of goes back to the framework that the
house--the sandbox you are going to build. And it is my hope
that really your private sector vision would allow you and the
assistant secretary that luxury to please make sure when you
build that, whatever it is, that you do it within that
framework. And I guess my last comment is very plain. And that
is, we heard testimony last week where the people who were in
charge didn't communicate what they were in charge of, didn't
tell anybody what they needed to be doing, and there was a
failure from top to bottom, command-and-control structure. And
it is my hope that you really do follow up with those things of
integrating yourself with business leaders and commercial
leaders in this country to make sure they know not only what
you stand for but the lessons learned; because I think that the
key to this is avoiding or being prepared to avoid a strike
that would cripple this great Nation.
Thank you for your service. And we appreciate your being
here today.
Mr. Liscouski. Thank you, sir.
Mr. Thornberry. The gentlelady from Texas.
Ms. Jackson-Lee. I thank the Chairman and Ranking Member
again for holding a very vital and important hearing. And Mr.
Liscouski, thank you for your willingness to accept what I
think is a larger-than-life challenge. It is something that I
hear when we travel. We had some hearings, field hearings in
Los Angeles and Long Beach, looking at the ports; and
cybersecurity technology permeates every aspect of the needs of
homeland security. And I am hoping that you are getting that
sense by the position. And I am going to take a line of very
rapid-fire questions and a series of them, and then if you
could try to respond.
One of the questions already asked about being able to
coordinate, if there was a cybersecurity or cyber attack,
coordinate with respect to our own Federal agencies. My pointed
question is: Do you feel confident that you have the authority,
in essence the power, to be able to command forces that deal
with cyber issues in a time of a cyber attack? And I really
want you to be pointed on the question of authority, because
that is our responsibility. How can we assist you to do that?
Because it certainly is telling that we have had a trail of
back--the back of people's backs--and that is departures--
respecting their reasons for doing so, but that is what has
occurred. So it is a great concern to me that you be vested
with the authority to do the job.
One of the things that the Federal Government has as its
assets--it has many assets, but it has several that relate to
homeland security and terrorist attacks. Certainly it is a role
model in action. So goes the Federal Government, so goes the
rest of the community in terms of looking to how we respond.
They watched us on 9/11, and I think we are quite grateful
that we were able to muster our senses about us and maintain
the continuity of government. The Pentagon was excellent in the
face of tragedy, and we all tried to support them and go
forward. But that was looked upon.
We also have the bully pulpit as to how we can encourage
communities to pull up their boot straps and get going on some
important issues. So I want to know specifically about the
authority.
Let me also say that--have we made and do you have under
your belt the enunciated vulnerabilities of the Federal
Government; specifically know where the cracks in our armor is?
We wanted to come and either have you delineate those--and you
might give them to me generally--but if we wanted to have a
closed-door session where you said, really pointed out some of
the large gaping holes, could you today, September the 16,
2003, list those for us? Very vital. Because as I said, if the
government collapsed in the midst of a tragedy, we are
certainly sending a bad signal out to those who are struggling
to overcome whatever the problem is.
Rapid fire, I continue. Have you found any connection to
cyber problems with respect to the massive blackout? Are you
engaged in a collaborative effort in that investigation?
What would be your response to the fact that we are raising
brighter and more inquisitive teenagers? I cite the 17-year-old
in the western State who was part of the virus epidemic. Of
course, everybody is talking about what a great young man he
is; he didn't mean it. But they are everywhere.
How are we dealing with the potential of this bright
emerging army of detractors? And do we do an outreach campaign?
Do we work with schools? How can Homeland Security be of
help to you on that? Do we have a doctor in the House? Are we
able to have our researchers and doctors look at--and when I
say ``doctors,'' I put quotes around it--look at the next virus
on the scene? Why are we only reacting? Our Nation is going to
look to us to be preventative medicine, so why are we in the
same boat as my BlackBerry ran away with itself a couple of
weeks ago with it is coming, it is coming, it is coming? No
solution, but it is coming. I think we need to be in the
business of preventative medicine. Who are we retaining? What
kind of resources do you need to be able to be the predictor of
what is to come?
And, finally, we did something in a bipartisan manner last
week that I am very proud of, and that is the Fair Credit Act,
I believe. But a big piece of that was the protection against
identity theft. But we can't do it alone with an authorization
bill under financial services.
I believe that identity threat is a threat to the homeland
security because why? Terrorists can steal your identity and
walk around and be as unpredictable as possible. What are we
doing with respect to identity theft which comes a lot through
the computer? And I thank you for responding to these rapid-
fire questions.
Mr. Liscouski. Thank you, ma'am. If I took them down right,
I will be able to respond to them intelligently, hopefully.
First, I have to be able to read my own handwriting.
With respect to coordination, and specifically with respect
to the question of authority, I want to clarify one point. DHS
has got authority, protection authority. By statute, the
Homeland Security Act has set DHS up to be the promulgator of
protection strategies. From an investigative standpoint, we
partner up with the FBI, with the Secret Service, which is
clearly part of DHS. But the FBI has got the lead in many of
these cases to-- and this is where we probably need to get in a
little bit of a closed-door session, I think. But at the top
level, the authorities that we have, clearly I would say we
have adequate authorities to ensure that we have protection on
our cyberspace. And I say that in a thinking mode primarily
because we are just in the execution phase of our strategy. And
I think time will tell whether we have the appropriate--whether
we are impeded from executing fully the strategy that we need,
as has been articulated in the strategy and as we have
identified it. But I would say right now, yes, DHS has been
provided the full authority that we need, there are some
excellent programs we have in place and that we have in plan,
that are not appropriate for this session, that I think really
can articulate what those authorities are and how we are
meeting those things.
As it relates to responding to an attack and what that
might imply for other activities the U.S. Government would be
engaged in to prevent or actually to intercede or interdict a
cyber attack, those are resources which are not just owned by
DHS but other components of the Federal Government. So again,
that might be a more appropriate discussion for a closed
session, if you can indulge me on that.
On the second point: Have we made a full analysis of our
vulnerabilities? Again, I can tell you it is a work in
progress. I don't think we will ever know. I mean, the context
of a full analysis of our vulnerabilities implies that we can
get our arms around these things. And in the dynamic and ever-
changing environment in the technology world, new
vulnerabilities are always going to be coming out. And the
challenge we have is not just articulating or clearly
identifying and articulating those vulnerabilities in a steady
state. But there is no such thing as a steady state in the
technology world you identify with the vulnerability of a
nuclear power plant, because typically that technology doesn't
change. The threats to the nuclear power plant are not
necessarily static, but there are only so many ways you can
attack it. In the cyber world, it is very dynamic. So that will
be a continuous work in progress.
We have our hands on what I think is a good fund of
information that articulates what our vulnerabilities are in
the government, and clearly we are working hard on that. Again,
that might be more appropriate discussion for a closed session.
With respect to the blackout, again I have to apologize. In
fact, I guess I will be coming back tomorrow at a different
committee hearing to discuss the blackout. I am not at liberty
to say what we have found in terms of root cause and what the
respective relationships are in the cyber components. That
report will be coming out. I believe there will be an interim
report here in October, and that will be published by DOE and
the task force. I will have to indulge you on that question as
well.
An interesting point you brought up about the teenagers and
those who are propagating viruses and the relative ease they
have with which they can do that is a serious concern. You have
got a number of different types of viruses that can be created
out there. One is just basic tool sets that people pick up off
the Internet. They get bored with--they decide they want to
cobble them together, and they create a virus, and that can
happen fairly quickly. There is a different one, a different
set, different mind-set of people who decide they want to do
this, and then just quietly make them available to those in the
quote -unquote teenage realm here that you described, that they
are not even smart enough to maybe make their own viruses; they
might evolve them a little bit, but they are not the original
architects, and then all of a sudden these viruses find their
way into the public domain. I think our authorities, I think
the law enforcement community needs to aggressively pursue
these people.
I think this is similar to a discussion I had with some
advocates in the private sector who operate in the security
space, that they really want to see the government, the law
enforcement community, go after folks who provide the basic
tool sets, the basic knowhow to anybody on how to propagate a
virus. This is similar to becoming a conspirator in a crime.
Somebody mentioned an excellent example. If you are the
driver of a getaway car in a bank robbery and a passenger, your
codefendant, decides to shoot somebody and kills them, you are
equally as guilty as the shooter, just being the driver. We
should probably take the same attitude toward people who
propagate viruses. This is serious. And when you talk about
billions of dollars' worth of damage and losses to the private
sector and the government, these are no light matters. We need
to take this seriously.
The doctor in the house, the capability that we have in the
research community of developing the right talent, I think DHS
partnered up with others in the community, DOD in particular,
creating centers of excellence, providing scholarship programs
for cyber--you know, in the information security world. It is a
tremendous step forward. Do we need more people? We absolutely
need more people. And I think we are making the right steps to
address those needs.
And your final question: The Fair Credit Act and what are
we doing to protect against that? Again, I think there are good
efforts going on in that space. I think the FTC, and I know
Orson Swindle in particular, has been very aggressive in
putting the word out about what consumers need to do to protect
themselves. The Secret Service operates in the identity theft
space.
I agree with you, it is a very, very important issue. It
gets back to the issue about privacy and how you protect
privacy, and that is a central component of information
security. You cannot have privacy without good information
security.
So,I appreciate your questions.
Mr. Thornberry. The gentleman from Rhode Island.
Mr. Langevin. Thank you, Mr. Chairman. And I want to join
with my colleagues in thanking the Chairman and the Ranking
Member for organizing this hearing. And, Mr. Secretary, thank
you for being here as well.
If I could, you had said that home and broadband users are
one of the groups you would like to focus on outreach and
education. And certainly, without a doubt, they are one of the
greatest neglected weaknesses in our national plan to secure
cyberspace. Can you give us a better sense of how DHS is
planning to address this? And would it be appropriate to work
with, for example, the Federal Trade Commission, which, as you
may know, is also mounting its own ``stay safe on-line
campaign''? And do you feel that a large-scale public awareness
campaign needs to be launched? And, in particular, and
following up with one of the points my colleague from Texas
made in terms of reaching out to young people, and maybe
through demonstration programs, how we can involve young people
in these awareness campaigns and kind of harness their energy
and natural ability to work with computers? I think that would
be a good place to start.
And one other point I would like to address, and this may
have to be addressed in closed session, but I think it is an
important point of focus. And that is in your vulnerability
assessment on our national assets and other areas. We have seen
a trend in recent years worldwide among terrorist attacks, that
terrorists focus on high-casualty, high-shock value events. And
I am curious and I think we all need to be attentive to what
those areas are in the world of cybersecurity that fall into
that realm. There may be only a few areas that would compare to
the use of a WMD in the cyber world, but those are the things
that I think we need to have high priority and focus on.
And I would like to at some point, even if we can't do it
here in open session, to follow up on that. And I think that
would be important. Thank you.
Mr. Liscouski. Thank you. I am just trying to read my own
handwriting--your first question.
Mr. Langevin. It was on your comment earlier that home and
broadband users--.
Mr. Liscouski. Do we need a large-scale--exactly. With
respect to the broadband, one of the things we are working with
the National Cybersecurity Alliance. Among those
representatives on the Alliance are ISPs, AOL, and others. And
they are taking an individual responsibility to educate home
users to the challenges and security challenges they face in
broadband connections. I would like to see that expanded. I
think there is no question that the broadband community, you
know, the commercial space there needs to be really--from my
point of view, I need to use the bully pulpit to get them to
understand their responsibility that, as they sell broadband
connections, they have got to provide better awareness notices
to their users about the potential damage that can be done.
Because it doesn't just affect the individual. As you are
well aware, the individual user--these viruses propagate very
quickly, and consequently can spread across--using zombies or
using personal computers that are accessible via broadband
connections and then propagate these attacks. So there is a
real, I would suggest almost fiduciary responsibility on their
behalf. But that might be a little bit too aggressive. But at
the end of the day, we need to put that awareness and that
responsibility with the ISPs and the broadband connections,
cable companies, et cetera. So I do certainly agree with that.
The educational efforts, the outreach efforts, from our
point of view are geared toward educating the consumer. Your
point about young people and education, I liken that to, you
know, the DARE program, the Drug Abuse Resistance Education
program that has been around for--must be 20 years now.
Educating kids--and this is clearly a different
perspective. We are moving from self-esteem to responsibility
and how do you act. But I agree. I mean, it scares me to death
to know that young kids are on these Internet connections not
knowing about the dangers that they face through going to chat
rooms and the vulnerabilities that they have there. I mean,
just the vulnerabilities of kids being on the Internet is
something that scares me. And that is something that we can
address through good education programs in the schools.
DHS is going to be working hard to figure out how we do
that and reaching out to the schools to provide good awareness
and good education programs. Fortunately, the NIPC did this
previously. We have inherited those programs so we have got a
basis for doing that, and I think they have been successful.
They have got poster programs. But we need to expand that. It
is a high priority for me personally.
The vulnerability assessments, the trend in recent years
that you have articulated. Clearly, you know, I can get into
depth in this in a closed session, but at a top level we do
worry about the combination of a physical and cyber attack. You
know, a cyber attack preceding a physical attack, taking out a
9/11 system and then combining that with a physical attack. You
know, it is a scare. Is it doable? I would say at this point
anything is doable. And it is something we worry about a lot.
And we are working down--I can tell you one thing we are
working very aggressively on is--and the categories of all the
critical infrastructure we really worry about--we look at what
the nexus would be with a cyber attack to see how that might be
enhanced or what that sequence might look like.
Mr. Langevin. Thank you.
Mr. Thornberry. I thank the gentleman.
Mr. Liscouski, I would like to--first let me ask this.
Before you took office, the administration put forward this
document, which is the National Strategy to Secure Cyberspace,
dated February 2003. So far, have you discovered a major gap or
something that--where you think the emphasis was not placed,
the proper emphasis was not placed in this document? Or is this
something that you can still go by today?
Mr. Liscouski. No, sir. It is still a very valid document.
A lot of good thinking went into that, and I think the private
sector's input into that became particularly valuable to me as
we thought about how we needed to create our national
cybersecurity division.
Mr. Thornberry. Well, I would like to just briefly--and
this will entail a little bit of repetition from what you have
already talked about--but I would like to go through those five
priorities and ask you to kind of give us a snapshot of where
we are with each of them.
For example, the first priority listed in that document was
a National Cyberspace Security Response System. And they talked
about a public/private architecture where you would analyze
attacks and warn and manage incidents and then respond. It
sounds to me like that is essentially what US-CERT is going to
be doing. Is that the primary way that we are going to
implement that priority?
Mr. Liscouski. Yes, sir. It is the foundation for it. The
US-CERT is clearly the linchpin for that effort.
Mr. Thornberry. And then what more needs to be done?
Mr. Liscouski. Well, we need to--clearly, building
relationships at the private sector. I think the US-CERT is an
excellent start at that foundation. And we have engaged in
discussions with the private sector, the Nortons and the
McAfees of the world, to determine how we can integrate their
contributions to this effort. I think there is a lot of good
work that can be done there.
The private sector is doing a tremendous amount of good
information collection and analysis on viruses and
vulnerabilities that we would like to be able to integrate more
robustly. And then extending the information out--as we spoke
earlier, the National Response System is not just national but
it is international as well. So we have a lot of work to do
there as well, sir.
Mr. Thornberry. The second priority is a National
Cyberspace Security Threat and Vulnerability reduction program,
where the National Strategy talks about reducing the threat,
identifying vulnerabilities, and then trying to develop systems
with fewer vulnerabilities. Give me a snapshot of our efforts
to implement priority No. 2.
Mr. Liscouski. Again, and you know, the dominant theme here
is private sector. And we have to again work with the major
manufacturers and the smaller manufacturers of both hardware
and software technologies to ensure that when they produce
technology, it is according to guidelines and expectations that
they have fewer and fewer security vulnerabilities. And if we
can--and to be candid with you, companies are stepping up to
that challenge. You know, pointing out to Microsoft and the
things that they have done, they have taken this
responsibility. I know they have been subject to a lot of
criticism, but at the end of the day they are--their chief
security officer is responsible for overseeing many of the
programs that they have. They have taken very good steps here.
It is a good example of what we need to be doing with the
private sector. Those who produce it have to understand that
they have the responsibility of producing good technology the
first time around. Security defaults should not be off. I mean,
this is the classic thinking of just basic things that need to
be done. They are making good inroads there.
The other point is to continually look at the
infrastructures, you know,the vulnerabilities that we create by
implementing technologies. I mean, this is a bigger discussion,
to be quite candid with you, but we are doing a lot of analysis
as converging technologies come in. I mean, we look at the
convergence between the IP world and the telecom world and the
vulnerabilities that are inherent there, because of--and
forgive me for going too deep into this. But just as an
interesting example, one of the advances of technologies,
because they become more efficient, they themselves bring about
vulnerabilities because now one device can do the work of 10.
Where you had redundancy before, now you are down to a critical
path of one device as being a key vulnerability. So we are
constantly looking at those things as well.
Mr. Thornberry. Talking about the private sector, at this
point, do you have an opinion about whether market forces are
going to be enough to elicit the kind of response from hardware
and software vendors that the country must have?
Mr. Liscouski. I am optimistic that the market forces will
be sufficient. But I am prepared to say that if they are not,
we need to quickly adapt our thinking.
Mr. Thornberry. And as part of that reduction of
vulnerability, is the Department looking at physical
infrastructure related to cybersecurity as part of our
vulnerabilities and part of what we need to assess?
Mr. Liscouski. Yes, sir. And, unfortunately, this has been
going on prior to even the establishment or the articulation of
a national strategy. The NCS, the National Communication
System, which was previously a DOD component, did a significant
amount of work on vulnerability analysis of the telecom
industry and then the IP backbones. So we have got a
significant amount of data here that already allows us to be
able to identify these vulnerabilities, and we are continuing
to expand that.
Mr. Thornberry. It seems to me greater work is going to be
needed in that area, and we can discuss that at another time.
Mr. Liscouski. Yes, sir.
Mr. Thornberry. Let me briefly go through. The third
priority was a Cybersecurity Awareness and Training Program; a
number of questions have dealt with that so far. Is that going
to be the focus of your summit in the fall?
Mr. Liscouski. That is a key component of it--for us,
understanding how we can better reach the community. And our
summit is going to include not just those in the technology
industry, but across industries, so we have a broad approach to
understanding the problems. So, yes, sir.
Mr. Thornberry. The fourth priority was securing
government's own cyberspace. You have been asked about that
before. But I am unclear, frankly, as to how much authority or
influence you have in bringing the rest of the Federal
Government along. My understanding is that that has been
primarily OMB's responsibility. And just about every witness we
have had before this subcommittee says that the government is
nowhere near where they should be, and that if the government
would lead, it is such a big consumer and has such market
power, that it brings the rest of the country along with it.
But what is your role exactly in bringing the rest of the
government along?
Mr. Liscouski. Our role is really to support the OMB. OMB
does have the initial lead to ensure that, through FISMA and
through the regulations that they provide and the oversight,
that the government is responding to their responsibilities to
provide security. DHS's role in this is really to coordinate
the incident response and warning through the FedCIRC through
the Federal Government, and I think that could be expanded to
understanding more about the vulnerabilities.
As I indicated earlier, we do have the patch for
remediation responsibility through the PATC to ensure that the
right tools are available to the government. So we have a
responsibility there, sir.
Mr. Thornberry. The final priority was national security
and international security cooperation. I don't know--you have
alluded to those things briefly before in your testimony. I
suppose that is an area where there are an ongoing efforts and
will have to continue to be ongoing. Let me ask you to do this.
Rate where you believe international cooperation is on
cybersecurity at this point.
Mr. Liscouski. I had said in the beginning stages, it is
tough to put a numerical code on it. I would say we are really
in the beginning stages of understanding--well, we clearly know
what we need to do, but we are just in the very beginning
stages of really making some progress and establishing the
relationships that are so necessary for us. There is a lot of
opportunity there for us. It is a big world. I mean, there is a
lot. And as you pointed out earlier, this technology is
ubiquitous. It is not necessarily discriminating by economic
income in terms of gross national product. I mean, you can get
cheap technology out there and create these vulnerabilities. So
we have a lot of work ahead of us to do, and I think we are
positioned to do it.
Mr. Thornberry. Thank you.
The Chair recognizes the distinguished gentleman from
Florida, Mr. Meek.
Mr. Meek. Thank you, Mr. Chairman. Thank you, Mr.
Secretary, for being here.
Speaking of the private sector, and I guess when we speak
of the private sector we are just not talking about domestic
private sector, because the cybersecurity is a huge issue.
Recently, as you know, with the New York blackout you had
thousands of New Yorkers in subways and you had folks in
Detroit and auto plants that were shut down, and it halted
after-hours trading as it relates to Wall Street. A lot of
things took place. What exercise did the Department go through
to find out was it or was it not a cyber attack? That is one.
Two, what happened in the private sector as it relates to
that, especially in our energy industry and those that handle
their cyber needs? What took place as it relates to checking,
making sure that we weren't under a cyber terrorist attack?
Mr. Liscouski. Okay. If you can indulge me, I have to speak
in general terms.
Mr. Meek. Sure.
Mr. Liscouski. We are in the process of investigating that
component. I chair the Security Working Group for the
Electricity Task Force. So, in that capacity, I have got to be
careful what I can say and what I can't say. We are going to
have a hearing tomorrow on this and we are going to be
publishing reports downstream, so I want to be a little bit
circumspect. But what I can do is discuss what we did as DHS
during the blackout, and I might add some clarity about how
this process works a little bit, because I think it is clearly
relevant and it is not going to be disclosing anything that
can't be disclosed.
I am quite proud--I mean, DHS should be very proud of how
we came together to respond to the blackout along with the rest
of the Federal Government. But DHS in particular was sort of
the point in contact in understanding what was going on in the
industry. We immediately reached out, upon learning what was
going on, to the industry to determine what was their
perspective. I mean, it is the unique thing that DHS has the
ability to reach, through the ISAACS, to the private sector, in
this case the NERC, to determine what is going on and what is
the situational awareness component that we need to respond to.
Do we have a terrorist event? Because precisely how we are
positioned to respond is, you look at an event like that, then
you immediately go to the next step of saying what can occur
next? Is this a terrorist event? And even if it is not, A,
could it be exploited? Or, B, if it is a terrorist event, what
is the next step? And we immediately have the capability to do
that.
So DHS was able to come together very quickly across its
directorates, ask those questions, gain situational awareness,
and provide direct advice to the Secretary and subsequently to
the President about where we were. And then working with the
FBI, the combination between DHS and FBI, we were able to
quickly conclude from an initial perspective that there was no
terrorist nexus there.
Mr. Meek. So were you pleased with the checking process as
it relates to is it terrorism or is it not terrorism amongst
many departments and even the private sector?
Mr. Liscouski. Yes, sir.
Mr. Meek. So this report is going to be based upon trying
to better what is good already? Or what areas will you be
looking at?
Mr. Liscouski. Well, the report is not examining how DHS or
the Federal community acted. We are really looking at the root
cause of the blackout.
Mr. Meek. And its potential for taking place again?
Mr. Liscouski. Correct. That is correct.
Mr. Meek. As you know, with the World Trade Center, there
were many attempts and sometimes folks get great ideas. Will
there be any discussion on how to not only share with New
Yorkers but Americans when an attack like that takes place--as
you know, the power was out, there was no cable television for
folks to look at, there was really no communications
whatsoever. Will that be something that DHS will be looking at,
to see how can we contact--I mean, everyone you hear, oh, New
Yorkers, they did their thing, things went very smoothly,
people knew where to go. But there was a lot of street
hollering on the corner on how do you get out of Manhattan.
Does the Department's looking into reaching out and to
individuals need to be through two-way pagers, through the
telephone, through things that were working?
Mr. Liscouski. Yes, sir. In fact, that is really within the
domain of Emergency Preparedness and Response Directorate under
Secretary Mike Brown. They are looking, they are doing a deep
look about that type of communication requirement, first
responders, et cetera. I would really defer to them.
Mr. Meek. Okay. One last question, Mr. Secretary, or I
guess a concern of mine. I just want to make sure that cyber
partners that we do have that are working with us against this
effort in terrorism, that they are working as hard as possible
and together. I look at what--your job is almost similar to
almost the Intelligence Community. It is kind of hard to share
information. You have competition, you have private sector
needs and technology needs and things that they want to keep to
themselves. But if is not put on the table on behalf of
security as it relates to the cyber world here in the United
States, we may very well have problems. And when we have a
problem, that means that things will be legislated and
decisions will be made in haste that individuals may not like.
And I think it is important that we encourage them to work.
I wish you well on your report. I am looking forward to
seeing and hearing more about it.
Mr. Liscouski. Thank you.
Mr. Meek. Thank you, Mr. Chairman.
Mr. Thornberry. I thank the gentleman, and want to mention,
again, that this subcommittee as well as the Border
Subcommittee will hold our second hearing tomorrow on this
interdependency of infrastructures. And Mr. Liscouski will be
one of the witnesses, as well as others from the Department,
because I agree with the gentleman from Florida; these are
critical issues and we need to learn the lessons when it
happens the first time so that we are not put at a
disadvantage.
The Chair would recognize the Ranking Member.
Ms. Lofgren. Thank you, Mr. Chairman. A lot of the
questions I thought I would ask have already been asked, so I
really just have two issues that I want to raise. One has to do
with the ISACs. You mentioned them in your testimony. And the
feedback I have received from the private sector is that some
of them are performing a lot better than others. And that, in
particular, telecom actually seems to be working pretty well,
IT; but, in the other sectors, that they are basically not
functioning. And--and I don't know if this is true or not, but
this is what some of the private sector people have said--and
the problem may be a lack of funding support. At least that is
what some of the private sector people identified.
Do you think that that assessment about some of these ISACs
is correct? And what should we do to pump them up a bit?
Mr. Liscouski. Yes, I think it is fair. I think your
characterization of the telecoms and the IT-ISAC as well as
others--I think the energy ISAC is another good example, oil
and gas. We are looking at them. I guess the easiest answer is
that we are examining the best model.
I think currently it is sort of a one-size-fits-all model
and it is really not the appropriate one. I think the more we
learn about the way information sharing needs to be propagated
across the sectors, they are so diverse, many of them are very
diverse and not technically connected. We need to look at that
more quickly, and we are going through that examination process
right now.
Ms. Lofgren. When will that be completed, do you think?
Mr. Liscouski. You know, completion is probably--I mean, I
am really looking at changing the model fairly quickly. The
funding model is one of those things. I don't want to give you
specific data. I would like to get back to you with more of an
intelligent answer about what that is going to look like. I
think what I would like to do and what I am planning on doing
is actually starting a couple of different types of pilots to
see what does work. And I would be happy to share that with you
in more detail at a later time when we have pretty much our
plans finalized.
Ms. Lofgren. I would be interested in that, if you could
keep us posted. I am sure the whole committee would like to
know about it. And if there is a requirement to change the
funding stream--I don't know whether we need legislation to do
that or not--but I would be interested in that recommendation
from you.
Mr. Liscouski. Sure.
Ms. Lofgren. And additionally, in addition to the
functioning of the ISACs, internally I have heard criticism
that there is sort of--they are piped, and that there really
needs to be some communication among them as well. So I assume
that you are--.
Mr. Liscouski. Yes, ma'am, that is precisely the point we
are looking.
Ms. Lofgren. All right. The final question I have has to do
with the vacancy rate in your Department. And when you were
talking about how challenging it was to come in, I am sure it
has been and you want to get good people, you want to get the
right people; and it is hard to start an organization from
scratch and try and go 65 miles an hour while you are doing it.
So I don't want to appear overly critical.
But I am concerned that the vacancy rate is still very
high, about 40 percent, I would think. And in a way I have been
concerned about this, not just with DHS but other Federal
departments when we have tried to get people with expertise and
technology to come to work for the Federal Government. I tried
with the former commissioner of the INS before the creation of
the Department. I mean, we couldn't get people to come to work
for the Federal Government, which is disappointing. And
especially now with the terrible economic situation in the tech
sector, it seems almost mysterious that we can't do a faster,
better job of recruiting in this sector.
So the question is: What are you going to do to fill those
vacancies? What can we do, if anything, to help you in getting
staffed up as quickly as possible?
Mr. Liscouski. Well, I appreciate the concern. And, you
know, attrition rates and vacancy rates are things that always
plague every business or every government. So it is not a
question of that. And I can't speak to the exact number, so I
apologize. I mean, we can get back to you on that.
But let me just address it by this. First of all, the
workforce we are attracting is a talented workforce. I mean, we
are extremely fortunate with some of the folks that we have
attracted. And I think, you know, in my experience--I was in
the government; I left my career with the State Department back
in 1991 And was very impressed with the folks I worked with and
my colleagues. I am happy to say I think that workforce has
continually increased in its capabilities, particularly in DHS;
I have been gratified to see that, folks particularly in the
IAIP area. So we have been successful in doing that.
One of the challenges we have when we recruit people from
the private sector is going through the clearance process,
because the clearance process and working at the levels we are
working at require us to take a 6--to 9-month clearance
process, and you really can't even work effectively at all
until you have got those appropriate clearances. So, while we
may have people identified in positions, they can't occupy
those positions until they have been vetted and the clearances
have granted. And that might be contributing to some of the
vacancies you are hearing about.
But we are working hard. And, you know, I appreciate your
comments and I would like to just kind of, I guess, recognize
that the people that are there today are really working
extremely hard. I mean, this country is extremely fortunate,
and I have got the benefit of working with them on a daily
basis, and they put in some incredible hours and they are
really dedicated.
And I can tell you right now, since March 1st, the folks
that work in our directorate have been working nonstop. I mean,
literally, you go in there on Saturdays and Sundays, and some
days you think it is a Wednesday. You know, it is just--it is
staffed, And people work hard and they are dedicated. So we are
very fortunate.
Ms. Lofgren. If I can follow up--and that is good to hear.
Perhaps the resources that we should apply then might not even
be in your Department but in the FBI to--maybe additional
resources to do the clearances. Would that be of assistance? I
mean, there is no real reason why it has to take 9 months to do
the clearances, just the work is the lack of personnel to put
on it.
Mr. Liscouski. I am not competent to be able to answer that
question, but I suspect we can probably get back to you on
that.
Ms. Lofgren. I would like to know that. And that may be
something we could help to address, because that is something
we ought to address, it seems to me.
And I yield back my time, Mr. Chairman. Thank you.
Mr. Thornberry. I thank the gentlelady.
Dr. Christensen.
Mrs. Christensen. Thank you, Mr. Chairman. Mr. Chairman and
Ranking Member, it does occur to me, and it came up earlier,
that there may be reasons for us to ask the assistant secretary
to meet with us in a closed and classified setting, because
there may be some questions we might not want to ask in a
public hearing.
I have one further question for you, Assistant Secretary.
One of the objectives of the National Strategy is to foster
adequate training and education programs to support the
national security need. You talked about the relationship with
Carnegie-Mellon and you made reference to relationships with
other universities. I wonder if you would elaborate on that
some, and also talk a bit about how you would ensure the
involvement of historically black colleges and universities and
other minority-serving institutions.
Mr. Liscouski. Yes, ma'am. There are a couple of different
ways we are addressing that. First of all, my colleague, Under
Secretary McCreary, has got a program--and forgive me for not
knowing the exact specifics on this--in which they are creating
partnerships with universities. And I believe it is among those
major components that the partnerships are to enhance
educational opportunities for the specific areas that we need.
So I think it is probably more appropriate to sort of field
that question to Under Secretary McCreary's area.
But in our area and working with other partners, you know,
the NSA sponsoring the centers of excellence and the university
programs that they have, are geared toward enabling
opportunity, creating opportunities for educational programs
and students to get into the information security area in
particular. It is an area that we have a very keen interest in
and we are looking to support that.
I can't speak to the programs themselves in terms of where
the emphasis is on that program in historically black colleges,
but I am almost certain I remember a conversation with NSA
officials that they have established centers of excellence at
schools that really honor diversity. But, again, I can't speak
competently to that question, but I would be happy to get back
to you.
Mrs. Christensen. Well, given the extensive need for
personnel who are really--who are well-skilled and trained, and
the sensitivity of the issues that we are going to be dealing
with, not allowing us to always go overseas to seek personnel
for these offices, I think it is important that we build up our
personnel from within and that we extend and expand it to
include these institutions as well.
Mr. Liscouski. I agree.
Mrs. Christensen. Thank you.
Mr. Liscouski. Thank you.
Mr. Thornberry. Ms. Jackson-Lee.
Ms. Jackson-Lee. Thank you, Mr. Chairman. I again thank you
for the hearing that we will have tomorrow and the one that we
are having today.
I would like to join Congresswoman Christensen on this
issue of HBCUs and the matching of talent. And I think that
your point about outreach is extremely important. I would make
a suggestion that the Secretary be referred to having a meeting
with the president of at least a number of our HBCUs. They are
certainly--I think it is definable as to those institutions
that may even have those disciplines that would be an excellent
feeding source, or a source of talent. And I would add, of
course, Hispanic-serving institutions as well. We did that in
the previous administration with having a roundtable with about
10 to 20 HBCU presidents, and it really, really is effective in
terms of getting them focused and working in partnership with
talented individuals who may not be aware of the opportunities
and but yet they have great talent.
So I would appreciate it if we could get a response back on
that request as to the facilitating of that meeting. And any
way that we can help to facilitate would be happy to do so.
Mr. Liscouski. Yes, ma'am, thank you. I think that is a
great suggestion. And I can tell you, we would like to take you
up on that, but we will get back to you formally.
Ms. Jackson-Lee. I appreciate it very much.
Mr. Liscouski. Thank you.
Ms. Jackson-Lee. Let me note, if I understand, when I asked
the question about blackout, just give me your answer again.
You were saying it is another committee? Or you are going to be
here tomorrow discussing? I know we have a hearing tomorrow and
we have that as one of our topics. Is that what you were
suggesting to me, that you would be able to give more on this
issue of what impacts cyber had on the blackout tomorrow? Or
are you waiting on a report?
Mr. Liscouski. I may be able to speak at a top level
tomorrow; but in earnest, I have to tell you, we have to really
conclude the report. We are still going through the analysis.
So it is really any preliminary conclusions we come to at this
point can easily be eclipsed by other facts that might lead us
to a different conclusion. So I will just have to defer to the
report, ma'am.
Ms. Jackson-Lee. And that report will be--what is the date
are we looking at for that?
Mr. Liscouski. I don't know if it has been published in
terms of the specific dates. I know the task force is shooting
for sometime in the late October time frame.
Ms. Jackson-Lee. Late October.
Mr. Liscouski. Yes, ma'am.
Ms. Jackson-Lee. And that is, of course, a public report?
Mr. Liscouski. Ma'am, I don't know, to be honest with you.
I will have to find out.
Ms. Jackson-Lee. All right. Well, will you provide us with
that information even tomorrow as to the status of that report?
Mr. Liscouski. Certainly.
Ms. Jackson-Lee. Let me just pursue briefly the line of
questioning that I had before about authority and the role of
DHS. And I think you said to me that the role is to protect
from cyber terrorism; that DHS protects from cyber terrorism,
and the FBI is in the business of responding to the attacks or
really on the aggressive end of it.
My concern is does it make sense to divide the experts, the
ones that are telling us the story, and then those who have to
react to the story? Is there a protocol to have two teams, the
two teams interact with each other? And then when there is a
crisis--that is a question I was asking--who is in charge? Now,
you indicated the FBI. But then how does the component that you
work with get merged into the FBI? Because when we are in
crisis, we need all of the thinkers working together, the
reactors; but those who say I have got a solution, because I
know on the protection side what we had to do. And a protection
response, is it making it more difficult to get people in the
protection side? Because certainly there is a lot more energy
and excitement maybe on the response side. But I am
particularly concerned about the authority question and the
protocol that would merge them, if necessary, and whether there
is interaction even in the backdrop of the day-to-day work,
which I think is extremely important.
Mr. Liscouski. I thank you for the opportunity to clarify,
because I think I misled you a bit on my remarks earlier. It is
not unique to the FBI in terms of the enforcement and the
investigative responsibility. The Secret Service--and, as you
know, Secret Service is a component of DHS with whom we closely
work--also has a responsibility to investigate cyber crime. In
fact, within the financial domain, they are really the
preeminent experts.
Ms. Jackson-Lee. That was a new addition to their
responsibilities.
Mr. Liscouski. Yes, ma'am, and they are effectively
executing against that. They have some tremendous talent, as
does the FBI. We are very ecumenical in our approach. We try to
ensure that we have got the right resources. And I think the
recent--forgive me, I don't know if it was Blaster or SoBig in
which both the FBI and the Secret Service jointly investigated,
and they worked extremely well together; they complemented
themselves extremely well.
From my point of view, you can never have enough resources
to investigate these things. So I think if a little is good,
more is better in this case. And the unique capabilities that
are within the domain of the Bureau and the FBI I think both
complement themselves and overlap where they are necessary; it
is appropriate. We work very closely.
And I will just state this: that my intention in creating
our capability within IAP and the NCSD is to continuously
increase our reliance upon the Secret Service for their
capabilities. So, by extension, I would say DHS clearly has the
authorities we need. When I was discussing this as it relates
to the protection responsibility, it was really relevant to the
IAIP mission and the infrastructure protection mission
specifically. We do not have investigative authority. We don't
need investigative authority, to be candid with you. We have
the resources in-house, the DHS, to investigative requirements
as we identify them.
Ms. Jackson-Lee. But you feel you have sufficient authority
to work on the matters that you are working on, but also to
coordinate with the other agencies when there is a time of
crisis?
Mr. Liscouski. Yes, ma'am. In fact, I think we have been
able to demonstrate that effectively, as I indicated, through
the recent Blaster and SoBig viruses, the blackout. All those
incidents have served to really validate the fact that this
approach is the appropriate one.
Ms. Jackson-Lee. Thank you. Thank you, Mr. Chairman.
Mr. Thornberry. I thank the gentlelady.
Does Mr. Meek have additional questions?
Mr. Meek. Just a small one, Mr. Chairman.
Mr. Secretary, I guess we are going to need at a future
date--and I don't know, maybe the Chairman and others are
thinking about it--but a closed hearing; we can ask a few
aggressive questions as it relates to cybersecurity and as it
relates to the security of our infrastructure here in the
United States.
What level of, would you say, urgency and concern that
jointly government and the private sector may have as it
relates to a cyber attack? The reason why I ask that question,
Mr. Secretary--there may be a quick answer that you can give
me--is the fact that we know that there are terrorist groups
that are abroad, and possibly could be domestic, that would
like to take our ability to be able to live financially and
socially through the Internet. And since we are doing--seems
that we are doing a good job as it relates to trying to keep
terrorists and track them down before they cross our borders,
and using the approach that they are using in Iraq right now of
saying why do we have to come to the United States, we can go
to Iraq and still accomplish our goal--what kind of urgency do
you see? Because I hear a lot of we are fine, we don't need X,
Y, and Z, when I know that there are issues out there that need
to be addressed and there are issues that this subcommittee
needs to address legislatively. There are issues that the
Department needs to address rule-wise and administratively. But
maybe there are some areas that you feel that are important
that we need to fill the gap. And I am just trying to think of
the urgency.
I used to be a law enforcement person, and no one is really
concerned about the parking lot security outside of any
hospital until someone gets pushed down and their wallet or
purse is taken. So I am trying to make sure that what--from a
scale of 1 to 10, where do you think we are and where do we
need to be? Or are we in the right position right now?
Everyone, hands on deck, just like they were for the last
couple of years? What do you think we need to do here?
Mr. Liscouski. Well, I mean, let me just clarify my
statements earlier about where we are. I think we are
positioned for success. I think we have got the right
architecture, the right framework to build on. I think we know
where we have to go. But I did not mean to imply that the world
out there is not a bad world.
I agree with you 100 percent; there are some serious
threats that we face. The cyber community, the cyber world is
one which we are just really beginning to understand and
beginning to see the evidence of what those threats can do to
manifest themselves in our technologies. So in terms of sense
of urgencies, I don't want to sit here calmly explaining to you
what we are doing and give you the false perception that I am
not worried about it. I am worried about it all the time. And
we need to be worried about it. And the community needs to be
worried about it, because we are not in control of those
threats.
The challenge we have on the cyber world, unlike the
physical world where you can really put your arms around
somebody and identify the command-and-control structure and the
capabilities that they may or may not have to conduct an
attack, the cyber world is a lot easier to work in. And
although the technologies that you need to do to--there is a
debate about how technically savvy you have to be to really
conduct a really effective attack or a long sustainable attack.
I would argue that I wouldn't want to wait to find that out,
and we need to move aggressively and we need to be worried
about it.
So I am happy to sit calmly before this committee and talk
about the things we are doing. But we are not sitting back
calmly back at DHS and other places, just thinking about are we
doing the right things. We are really trying to move out and
get urgency around this.
So I agree with you and I share that, and I appreciate your
comments of concern, because we are concerned about it. These
threats are real, they are ubiquitous, they are everything from
the kid that gets bored and decides that he is going to put a
virus out there, to organized crime groups that are out there
exploiting our networks and exploiting our information and
extorting them.
Mr. Liscouski. Terrorist groups, state groups, you name it.
They are out there. Common thieves, common criminals. They all
have the capabilities of doing these things and doing it all
the time. We are constantly under attack on the Internet, and
you know, if you talk to any of the providers out there and you
talk to the folks who are providing services on the Internet
community, the backbone, they see threats all the time. They
see stuff, it just would boggle your mind. Fortunately, you
know they haven't manifest themselves in anything serious yet.
And it is the ``yet'' that worries me, the ability to do that
is out there, so.
Mr. Meek. Mr. Secretary, if I may, that's where I mean, you
are hitting exactly where I thought you would hit as it relates
to the threat. And the threat is real. We have individuals that
are being robbed right now over the Internet, stuck up, ransom,
what have you, $50,000 transferred here and no one will ever
know about it because it has a lot to do with stocks and trades
and investors and security of their own infrastructure. I just
want to make sure that we continue to have a sense of urgency.
It is not about the preparedness. It is about the consistency
of the preparedness. And I know my job and I know our job is to
support the Department and the private sector in its efforts,
but at the same time, make sure not only that DHS has what it
needs, but we keep the pressure on all players of making sure
that we do what we have to do, because the last thing that we
want is for you for me or anyone on this committee to be
identified as okay. You are okay, I am okay, okay, fine.
Everything is fine. We need to make sure that you are okay, I
am okay, how do we move this ball and play offense because they
are playing offense.
So I am glad to hear that you are still sitting on the edge
of your seat personally and that people who serve in your
capacity in the private sector has that same sitting on the
edge of the seat hopefully as it relates to playing toward
overall infrastructure protection. Thank you, Mr. Chairman.
Mr. Liscouski. Thank you.
Mr. Thornberry. I thank the gentleman. And I think that
discussion that he just had with the witness is an appropriate
way to end our hearing because--and I have some additional
questions I would like to submit for the record, but I think
that sense of urgency that he described is difficult to
maintain, not just with cyber, with the whole range of Homeland
Security responsibilities. But, yet, we must try to keep that
sense of urgency because there is so much at stake. Mr.
Liscouski, I will say for me, personally, I am impressed by the
actions that you have taken in the cyber field to help bring us
closer to where we need to be. I am also convinced that you
maintain this sense of urgency.
As you said at the end of your opening statement, we are
partners in this effort. That doesn't mean we are a rubber
stamp, it doesn't mean we are a cheerleading squad. But we are
partners with you to try to help maintain the sense of urgency
and take real concrete steps that help our country be safer. We
look forward to working with you in the future to do that. And
again, thank you for your appearance today. I thank the
gentlelady from California as always for her work and with that
the hearing stands adjourned.
[Whereupon, at 11:40 a.m., the subcommittee was adjourned.]
<all>

</pre></body></html>