au 106-w CYBFR A1TACL I THE GOVERNMET SAFE HEARING BEFORE THlE COMMITTEE ON GOVERNMENTAL AFFAIRS UNITED STATES SENATE ONE HUNRED SIXTH CONGRESS SECOND SESSION MARCH 2 2000 Printed for the use of the Committee on Governmental Affairs 63-69cc U S GOVERNMENT PRINTING OFFICE WABHINGTON 2000 For sale by the U S Government Printing Office Superintendent of Documents Congressonal Sales Ofie Washngton DC 20402 ISBN 0-16-060743-4 COMMIflEE ON GOVERNMENTAL AFFAIRS FRED THOMPSON Tennese C iarman JOSEPH 1 LIEBERMAN Connecticut WILLIAM V ROTH Jr Delaware CARL LEVIN Michigan TED STEVENS aska DANIEL K AKAKA Hawaii SUSAN M COLLINS Maine RICHARD J DURBIN Illinois GEORGE V VOINOVICH Ohio ROBERTO0 TORRICELLI New Jersey PETE V DOMENICI Now Mexico MAX CLELAND Georgis THAD COCHRAN Mississippi JOHN EDWARDS North Carolina ARLEN SPECTER Pennsylvania JUDD GREGG New Hampshire HANNMif S SwumAI Staff Diretor and Counsel ELLN B BROWN Senior Counsel SUSAN 0 MAM11ALL Professional Staff Member Joyci A RecairrcArnn Minority Staff Director and Counsel DUsowM Cotitf Lamnucil Minority Counsel DARLA D CAASzLL Administrative Clerk 11 CONTENTS Openn statemnts PA Senator Thonmpson Senator ieberman Senator Akaka Senator Collins Senator Edwards I 3 5 16 18 Wn G TnuRsDAY MAR CH 2 2000 Kevin Mitnick Jack L Brock Jr Director Governmentwide and Defense Information Sys tems Aooounting and Informnation Management Division U S General AC counting Offce Roberta L Grms Inspector General National Aeronautics and Space Admin istration Kenneth Watson Manager Critical Infrastructure Protection Cisco Systems Inc James Adams Chief Executive Officer Infrastructure Defense Inc 6 21 23 33 35 Au1mBricA Luffr oF Wiwms Adams James Testimony Preared statement Brock Jagck L Jr Testimony Pre axed statement Gross Roerta L Testimony Prepared statement Mitnick Kevin Testimony Prepared statement Watson Kenneth Testimony Prepared statement 3 88 21 55 23 71 6 47 33 83 APPENDix 92 Copy of S 1993 Questions for the record submitted b'y Sen at or Akaka and responses f'ro m 113 Jack L Brock Jr 116 RobertaL Gross 119 Kenneth Watson 11I ICY BER ATrACK IS THE GOVERNAM SAFE THURSDAY MARCH 2 2000 U S SENATE COMMIT EE ON GOVERNMENTAL AFFAIRS Washington DC The Committee met pursuant to notice at 10 05 a m in room SD-342 Dirksen Senate Office Building Hon Fred Thompson Chairman of the Committee presidin Present Senators Thompson Collins Lieberman Akaka and Edwards OPENING STATEMENT OF CHAIRMAN THOMPSON Chairman THOMPSON The Committee will be in order please I am afraid we are going to have a vote I guess it is on right now so we will have to leave momentarily but let us see if we can get a little something accomplished before we have to leave Today the Committee on Governmental Affairs is holding a hearing on the ability of the Federal Government to protect against and res pond to potential cyber attacks This Committee spent considerable time during the last Congress examining the state of Federal Government information systems Numerous Governmental Affairs Committee hearings and General Accounting Office reports uncovered and identified systemic failures of government information systems which highlighted our Nation's vulnerability to computer attacks from international and domestic terrorists to crime rings to everyday hackers We directed GAO to study computer security vulnerabilities at several Federal agencies including the Internal Revenue Service the State Department the Federal Aviation Administration the Social Security Administration and the Department of Veterans' Affairs From these and other numerous reports we learned that our Nation's underlying information infrastructure is riddled with vulnerabilities which represent severe security flaws and risks to our national security pu blic safety and personal privacy the government galters information on every one of Evryyear us ecase we give the government this information in order to obtain government services like getting Social Security benefits veterans' benefits Medicare or paying taxes and yet year after year this Committee continues to receive reports detailing security breaches at these same agencies Sometimes these things improve Agencies usual will respond to specific GAO recommendations or to a particular Tinspector General report But this is a band-aid approach to protecting information systems that is fixing the system little by little problem by problem after it is revealed that it is no longer secure What is most alarming to me is that after all this time and all these reports there is still no organization-wide approach to preventing cyber attacks and the security program management is totally inadequate Iam afraid it is another example of -how difficult it is to get the Federal bureaucracy to move even in an area as important as this Those reports highlight that an underlying cause of Federal information security vulnerabilities is inadequate security program planning and management When GAO studied the management practices of eight organizations known for their superior security programs GAO found that these organizations manage information security through continuous management activities which 'Included specific practices to support their information security principles We think this is lacking in the Federal Government And we think agencies must do more than establish programs and set management goals Agencies and the people responsible for information systems in those agencies must be held accountable for their actions -and I believe that Congress should examine how we can provide assistance to the agencies to ensure that tey have the resources necessary to maintain information technology security preparedness at all times It is clear to me based on GAO report after GAO report that what needs to emerge in government is a coordinated and comprehensive management approach to protecting information which incorporates the efforts already underway and takes advantage of the extended amount of evidence that we have gathered over the years The objective of such an approach should be to encourage agency improvement efforts and measure their effectiveness through an appropriate level of oversight In order to develop such an approach and begin to find solutions to the problems which have been identified we concluded that a more complete statutory foundation for improvement is needed That is why Senator Lieberman and I introduced S 1993 the Government Information Security Act at the end of last year The primary objective of our bill is to address the management challenges associated with operating in the current interdependent computing environment Our bill be gins where the Paperwork Reduction Act of 1995 and the Clinger-C ohen Act of 1996 left off These laws and the Computer Security Act of 1987 provide the basic framework for managing information security We recognize that these are not the only things that need to be done Some have suggested we provide specific standards in the legislation Others have recommended we establish a new position of a national chief information officer or even a national security czar These things should be considered and these issues and more will be brought up during our hearing today The witnesses before us represent a broad array of experience and expertise in the area of information security FirstP we have Kevin Mitnick who has described himself as a reformed hacker Next we will hear from Jack Brock who is the Director of Governmentwide and Defense Information Systems at GAO and Ro- bertst Gross Inspector General for NASA Both of them have done signi- 1cant work in the area of Government information security We will also hear from Ken Watson who is the Manager of Critical Infrastructure Protection at Cisco Sysntems Inc and James Adams the CEO and co-founder of iDEFENSE I welcome all of you and look forward to your testimony about the cyber th eats that we face today and how we can work together to fashion solutions to the many problems associated with computer security Senator Lieberman OPENING STATEMENT OF SENATOR LIEBERMAN Senator LIEBERMAN Thank you very much Mr Chairman Thanks for calling this hearing on a topic of enormous concern to all of us The security of our digital information is something that affects every one of us on a daily basis and should be taken as seriously as the security of our property of our neighborhoods of our communities of our Nation and in the worst case as seriously as the security of our lives The reach of the Internet and the alacrity with which it has achieved that reach is the story of the closing years of the 20th Century and the beginning of the 21st Century Enabled by the remarkable innovation in information technology we are fast approaching a time when the world will always be on always connected always open for business It will be a fast environment marked by increasing efficiency and decreased cost But it also will be intensely competitive and without boundaries Almost every institution we rely on in our daily lives is feeling the effect of this latest technological revolution Just last month the General Services Administration's Chief Information Officer Bill Piatt ' wrote something that I think all of us in government should keep in mind From the perspective of our bosses the citizens electronic government is neither an option to be chosen nor a mandate to be decreed It is simply expected 01 So the basic goals of e-Government which are the electronic delivery of information and services are the same as government's goals have always been as enumerated in our Constitution and the laws that we have adopted pursuant to it But if government is going to be plugged into the networked world as an active permanent presence we will have to protect the confidentiality the integrity and of course the availability of the information contained on government computers We must be acutely aware of the range and content of the information at stake here It covers everything from the movements of our armed forces and the deployment of our most powerful weapons to accumulated data about the economy and the financial markets to support for our transportation networks to theqmost private information about the American people such as _tax wage and medical records The information in far too many cases today is wide open to exploitation from pranksters to terrorists and every disaffected person in between Th act that the GAO has labeled as high risk virtually the entire computer security system of our government is just unacceptable We must take action and quickly to get the goverment's computer security systems oh- of the high-risk watch lhat Last year Senator Thornpson and 1 and this Committee looked into what went wrong in the Federal investigation of Dr Wen Ho Lee the former Los Alamos nuclear laboratory srientist who is charged with downloading classified information to an unclassified computer Mr Lee has been indicted now The Justice Department is still investigating other areas and of course his guilt or innocence is yet to be determined But the case should focus everyone's attention on the vulnerability that comes with reliance on computers So too should the more recent revelations of former CIA Director John Deutch who maintained sensitive information on his home computer The hacking of government sites including those at the Senate the FBI the White Ho use Interior and the Department of Defense is actually becoming a near daily occurrence and I would not be surprised if scores of other government sites have also been invaded But the truth is we will never know because monitoring intrusions much less reporting them is not required There are many reasons Federal computer-based information is inadequately protected but the underlying problem according to GAO who we will hear from this morning is poor management In some cases this is a cultural problem Our concentration on Security simply has not grown at the same p ace as our reliance on computers hat is why the Government Information Security Act of 1999 which Chairman Thompson and I have introduced is a beginning step toward correcting this fundamental shortcoming The bill would put every government agency on notice that it must implement a computer security plan which will be subject to annual independent audits report unauthorized intrusions and provide security awareness training for all its workers There are a number of areas we have not addressed in our bill be asking for input on how best to handle them we will et and yFor example the government needs to increase dramatically the number of trained information security professionals In that regard I am intrigued by President Clinton's proposal for a Federal Cyberservice at universities based on the ROTC model and we need incentives for universities to train more people in this area We also need to consider what to do to keep the government informed of technological changes in computer security so we do not fall behind The President's proposal to establish a Naional Institute for Infrastructure Protection sounds like a good idea if it provides assistance with R D and technical support Mr Chairman I am hopeful that the proposal that you and I have made will stimulate signficant debate and early action Our bill is a work in progress I know that we anticipate hearing from a broad range of interested parties We have got to particularly listen to those in private indutiry who have made I think much more headway than we in the public sector have in protecting the security of computer-based information because we do not need to reinvent the wheel here a ver high-tech wheel We need to share experiences and exchange ideas to learn what works best Think we have put together a very interesting goup of witnesses today I look forward to their testimony which1Ikn ow will help us craft the best possible legislAtion to secure the government's vast and important treasury of information Thank you very much Chairman THOMPSON Thank you very much We are down to a minute or 2 on the vote 80 we will recess for a few minutes to vote Decess J Chairman THOMPSON Let us go back into session Senator Akaka did you have a statement OPENING STATEMENT OF SENATOR AKAKA Senator AXAKA Thank you very much Mr Chairman Thank you for scheduling this hearing I have a longer statement Mr Chairman I will ask that my longer statement be made part of the record Chairman THOMPSON It will be a part of the record Senator AKAK A I just have a few points to make three of them to be exact First computer hacking has gone beyond the stage of being mischief making Too much money is being lost Hacking is a crime but it has also become an act of international aggression Last year there were more than 20 000 cyber attacks on Defense Department networks alone Second current technology has so far failed to provide adequate safeguards for critical infrastructure networks We have little ability to detect or to recognize a cyber attack and even less capability to react Third the President has unveiled his national plan for information systems protection This I feel is a good proposal and deserves the immediate support of Congress Again Mr Chairman my thanks to you The legislation you have introduced on this subject S 1993 is something that we need to address immediately and the Government Information Security Act is an important contribution I look forward to today's discussion Thank you Mr Chairman Chairman THOMPSON Thank you very much The prepared statement of Senator Akaka follows PREPARED STATEMENT OF SENATOR AKAKA Thank you Mr Chairman and Senator Lieberman for providing the opportunity to discuss cybersecurity In this new age of information warfare no issue is of more vital importance to our security A cyber attack against our national information infrastructure would affect the Integrity of our telecommunications energy banking ad finances transportation the Rann Member of the Subwater systems and emergency serie s committee on International Security Proliferation and F eral Services I applaud all efforts to call attention to this issue It is one in which the Subcommittee has also been involved The Chairman and Ranking Member deserve great credit for the effort that they have made to heighten awareness of the threat while proposing methods to counter the threat Computer hacking can no longer be labeled benign mischief Once those who gained unauthorized access to government and private sect-or computer networks were heralded as technical icons whose exploits were lionized by thepopular media That is not the reality any more Now hacking is a Federal crime at the very leastat the worst an international act of aggression As Deputy Secretary of Defense John Hambre has stated We are at war-right now We are in a cyber war Total losses from cyber fraud including loss of service recovery and restoration costs are estimated to be in the hundreds of mil ons of Aoilars We now know that hostile countries have or ame developing the capability to engage in overt and covert information warfare L ast year alone there were more than 20 000 cyber attacks on Department of Defense networks alone Astonishingly we do not know who was behind the majority of those attacks In 1998 during a period of increased tensions with Iraq over United Nations weapons inspections over 500 U S military civilian government and private sector computer systems were attacked What was first thought to be a sophisticated Iraqi cyber attack proved to be a rather unsophisticated yet highly effective attack by two Juveniles from California with the cooperation of several individuals in Israel Last month cyber-based denial of service attacks had a dramatic and immediate and resulted In the loss of millions of dollars when sevmany Americans on ecommerce impact eral large sites were shut down for several hours Just recently a 'itudent at a major university was arrested and charged with hacking into Federal government computers at the National Aeronautics and Space Administration NASA and the Department of Defense where he was able to read delete and alter protected files and intercept and save log-in names Clearly cybercrlme has become a pervasive problem And it is getting worse According to FBI Director Louis Freeh cybercrime is one of the fastesAt evolving areas of criminal behavior and a significant threat to our national and economic security The escalation of cybercrime is rapidly overwhelming our current capability to respond Current technology has thus far failed to provide adequate safeguards for critical infrastructure networks The Internet is international knowing no boundaries and no ownership Any attempt to stifle Its growth and development would be counter productive to the economic interests of America A variety of easy to use sophisticated hacker tools are freely available on the Internet available for use by anyone in the world with an inclination to mount a cyber attack Today the United States has little ability to detect or recognize a cyber attack against either government or private sector infrastructures adeven less capability to react Nevertheless we must through cooperative public and private sector forts develop adequate defensive technologies to neutralize threat Without new defenses it is likely that attacks will occur with greater frequency do more damage and be more difficult to detect and counter In January 2000 President Clinton unveiled his National Plan for Information Systems Protection which proposes critically needed infrastructure improvement with milestones for implementation This multifaceted plan promotes an unprecedented level of public private operation and proposes 10 programs to assess vulnerabilities and significantly enhance capabi li ties to deter detect and effectively respond to hacking incident It also calls for vital research and educational enhancement to train adequate numbers of desperately needed information security specialists and sustain their perishable skills Our cniudlaesianprseity in the global economy may well hinge on our national commitment to act as leaders in bringing information assurance to the global information environment we have helped to create I commend the Chairman and Ranking Member for their leadership in calling attention to this particularly insidious problem by their introduction of S 1993 the Government Information Security Act I welcome our witnesses and look forward to hearing their testimony toay Chairman THOMPSON Our first witness will be Kevin Mitnick Mr Mitnick thank you for beig with us here today Please introduce yourself Your full statement will be made a part of the record If you could summarize that for us we would appreciate it very much TESTIMONY OF KEVIN MITNICK1 Mr MiTNICK Great Good morning It is an honor to be here I am glad that you value my opinion It is interesting to note that the United States was my adversary in years of litigation and despite that fact I am with you here today 'The prepared statement of Mr Mitnick appears in the Appendix on page 47 Chairman THOMN I have seen those documents several timiest United States of America versus some individual It i's kind of intimidating is it not Mr MITNCK It sure is Despite that I am ready willing and able to assist and that is why Il am here today I have written a prepared statement That way I can just read it and hopefully will answer some questions Hon Chairperson Thompson distinguished Senators and Members of the Committee my name is Kevin Mitnick I a appear before you today to discuss your efforts to create legislation that will ensure the future security and reliability of information systems used by the Federal Government As you know I have submitted my written remarks to the Committee I would like to use this time to emphasize some of those remarks and to introduce a few ideas that I did not include in my written testimony I have 20 years' experience circumventing information security measures and can report that I have successfully compromised A systems that I targeted for unauthorized access except one I have 2 years' experience as a private investigator and my responsibilities included finding people and their money primarily using social engineering techniques Breaching information security measures is a difficult undertaking As Ista ted in my prepared remarks my success depended on exploiting weaknesses in computer systems and network security and the use of social engineering techniques However even the sophisticated techniques I have exploited for 2 decades depended on the lack of commitment by software manufacturers to deliver software free of security weaknesses The manufacturers of operating systems and software applications are under enormous pressure to deliver their products to the market with new -features and are unwilling to thoroughly test their software under current market conditions As a result orerapplications contain security flaws that allow systems atin Piope with theand required time money resources motivation ' and persistence to exploit those weaknesses The Federal Government has no control over the security weaknesses that software manufacturers permit to reach the marketplace Thus it is imperative to enhance other security measures to overcome these shortcomings The average American's confidence in the public telephone system is misplaced Here is why If I decided to target a computer system with a dial-in modem my first step would be to use social engineering techniques to find the number of the modem Next I would gain access to the telephone switch that controls the number assigned to the modem line Using that control I would redirect the modem number to a log-in simulator that would enable me to capture the passwords necessary to access the target machine This technique can be performed in real time to capture dynamic passwords that are changed once per minute All of the actions I just described would be invisible to anyone monitoring or auditing the target computer security What is important here is to consider the big picture People use insecure methods to verify security measures The public's confidence in the telephone system as secure is misplaced and the example I just described demonstrates the reason why The human side of computer security is easily exploited and constantly overlooked Companies spend millions of dollars on firewalls encryption and secure access devices and it is money wasted because none of these measures address the weakest link in the security chain the people who use administer operate and account for computer systems that contain protected information It is my understanding that this Committee oversees information security for the Internal Revenue Service and the Social Security Administration In the United States v Czubinski an IRS employee was convicted of wire and comnp uter fraud the same crimes for which I spent 5 years in Federal prison It is not lost on me that Mr Czubinskis conviction was overturned by the First Circuit Court of Appeals as the court found that he never deprived the IRS of their property interest in the confidential information he accessed just to satisfy his personal curiosity the same circumstances which precisely match the crimes to which I plead guilty in March 1999 Ironically in their publicly filed briefs the government revealed the name of the computer system used by IRS employees and the commands reportedly used by Mr Czubinski and IRS employees in ener al to obtain confidential taxpayer information I would like to rigto this Committee's attention how I successfully breached information security at the IRS and the Social Security Administration using social engineering techniques before 1992 which just so happens to be beyond the applicable statute of limitations Laughter I called employees within these agencies an d used social enp neering to obtain the name of the target computer system and the commands used by agency employees to obtain protected taxpayer information Once I was familiar with the agfency' s lingo I was able to successfully social engineer other employees into issuing the commands required to obtain information for me using as a pretext the idea that I was a fellow employee having computer problems I successfully exploited the security measures for which this Committee has oversight authority I obtained confidential information in the same way government employees did and I did it all without even touching a computer Let me emphasize for the Committee the fact that these breaches of information security are ongoing and even as I stand before you today and that agency employees are being manipulated using social engineering exploits despite the current policies procedures guidelines and standards already in place at these agencies S 1993 is an important step toward protecting the confidentiality integrity and availability of critical data residing in government computer systems However after successfully exploiting similar security measures at the IRS and the Social Security Administration as well as some of the planet's largest technology companies including Motorola Nokia Sun Microsystems and Novell I am concerned that enacting this law without vigorous monitoring and auditing accompanied by extensive user education and training will fall short of the Committee's admirable goals In closing I would be happy to offer my knowledge and exprtse to the Committee regarding methods that may be used to counter- act the weakest link in the ecrty chain the human element of information security That is it Thank you Chairman THOMPSON Thank you very much That was very short but very powerful Mr Mitick Thank you very much It seems in essence what you are tolling us is that all of our systems are vulnerable both government and private M0 -Mrmc Absolutely Chairman THOMPSON LW had the members of The LOpft here a couple of years ago some of the computer hackers who basically told us the same thing Tey said they could shut down the Internet and it was not a real problem As I sit here and listen to You you are one individual Obvously you are very bright but there are a lot of very bright individuals out there It makes you wonder if one individual can do what you have done what in the world could a foreign nation with all the assets that they would have at their disposal do Mr MrrzcK It is pretty scary Chairman THOMPSON The point and I think it is one that you make is that we really do not know -to what extent we already have been compromise and te fact that we do not know or that other people or entities have not taken advantage of that or done something bad to us yet does not mean that we have not already been compromised in some way is that not true Mr MITNICK It is a possibility Chairman THOMPSON YOU als o point out that the key to all of this we sit here and think of systems and programs and all but the key is personnel that that is the weakest link point out yNo ou matter what kind of system you have unless you have personnel that are adequately trained adequately motivated-can you explain the importance of the personnel aspect to this and what you think we might be able to do about it Mr MITNICK In my experience when I would tr to get into these systems the first line of attack would be what Icall a social engineering attack which really means trying to manipulate somebody over the phone through deception I was so successful in that line of attack that I rarely had to go towards a technical attack I believe that the government employees and people in the private sector that their level of awareness has to be-you have to do something to raise their level of awareness that they could be the victim of some sort of scam over the telephone What I might suggest is maybe a videotape be made that would demonstrate somebody being manipulated over the phone and the types of pretexts and ruses that are used and maybe that will make somebody think the next time they get a phone call The problem is8 people do what they call information mining is where you call several people within an organization and you basically ask questions that appear to be innocuous but it is really intended to gain intelligence For instance a vendor might call a company and ask them what software what are you currently using what- computer systems do have to sell them a particular product because thenedt you ow that information but the intent of the caller might be to gain intelligence to try to target their computer systems So I really have a firm belief that there has to be extensive tr'aining educate the users and the people who administer and andeducation use thesetocomputer systems that they can be victims of manipulation over the telephone because like I said in my preparedstatement companies could spend millions of dollars towards technological protections and that is money wasted if somebody could basically call somebody on the telephone and either convince them to do something on the computer which lowers the computer's defenses or reveals the information that they are seeking Chairman THOMPSON So you can compromise a target without ever even using the computer Mr MITNICK Yes For example personally with Motorola I was workinF at a law firm in Denver and I left work that day and just on an impulse I used my cellular telephone and called Motorola their 800 number and without getting into details of how this because of the time constraints is by the time I left work and by the time I walked home which was about a 20-minute period 15- to 20-minute period without any planning or anything f was able to by the time I walked to the front door I had the source code to the firmware which controlled the Motorola Ultralight telephone sitting on a server in Colorado Just by simply making pretext telephone calls within that 15- to 20-minute period I had the software I convinced somebody at Motorola to send the software to a particular server Chairman THOMPSON So this has to do with personnel it has to do with training within a larger umbrella of management Mr MITNICK Absolutely and I think the management has to be from top down and the whole idea here is to protect the information regardless of whether it resides on a computer system or not because whether or not this information is printed on a printout or is sitting on a floppy disk it is still information which you want to protect against any type of confidentiality breach and the integrity of the information from being modified or destroyed Chairman THOMPSON These are the things we are trying to address in our bill Mr MITNICK Yes I read the bill Chairman THOMPSON We appreciate your comments on that One of the questions we are going to have to deal with is whether or not we ought to be more specific in terms of training for example Mr MITNIcK I think you should be becauseChairman THOMPSON We vest the responsibility but we kind of end it there and leave it up to the agencies to take it from there but some have suggested that we might be more specific and more precise in exactly what kind of training we ought to have Mr MITNIcK Yes I think that is important because I am not piyto this information but I assume that here are policies proceues guidelines and standards in effect for protecting information at these agencies just by protecting the information without regard to the computer systems I think by explaining my background and experience with the-Committee today that you can see that those policies and procedures were easily circumvented So what the Committee has to-I guess what has to be done is there has to be a way to figure out what the Federal Government could do to protect its information and just enacting a law or policies and procedures may not be eiectlve I do not know I think it really depends on really training the systems administration staff management and the people who use administer and have access to the information about a the different methodologies that could be used to breach computer security which is not only just the human element You have physical security you have network security and you have security of computer systems So it is a very complex issue so you have to be able to get people on board that would know how to protect each different area Chairman THOMPSON We are not interested in another overlay of statutory requirements and you are right there are plenty of laws on the books th at have to do with information systems in general Technology has changed and the government has not changed with it and what we have discovered is that although we have a lot of laws on the books there is no comprehensive management scheme out there There is no way to measure and evaluate the effectiveness of what anybody is doing We will have a GAO witness here in a little while and we will go over the fact that for a few years now we keep being told that government is ineffective It is not working It is not doing the job So we go back and Congress does more So that is what we are trying to do here and your testimony is very helpful We have other Senators here so I will pass Senator Lieberman Senator LIEBERMAN Thanks Mr Chairman Mr MITNICK Can I make a comment Chairman THOMPSON Yes Mr MrrlnCK And by the wuayt private investigators and information brokers today obtain co faaenti al taxpayer information from Social Security and the IRS and they are doing it as we speak You can go to any private investigator and hire them to do this Chairman THOMPSON We have had testimony to that effect Mr MITNIcK So obviously it is8 somebody who has access to the computer either illegitimately or somebody that is taking payola to reveal this information that is within the agency Chairman THOMPSON Thank you Senator LIEBERMAN Thanks Mr Mitnick thanks for your testimony You have been very illuminating and helpful My staff lifted up some clips in preparation and one of them described ou as iargu ably the most notorious computer hacker in the world ' I thought I-would ask you if you would be comfortable as we confront this problem helping us to answer the question of why I mean in one sense the why of a certain number of people national certainly in security areas is clearly a foreign government such as the Serbs during the Kosovo conflict or some subnational group of terrorists tries to break into our computer systems that is a pretty clear why But this is not like most crime waves To a certain extent as I read about your story and hear about others in the kind of daily breaking of government computer systems it seems to me that there is a different sort of motivation In some sense it almost seems to be the challenge of it If you would just talk about why you or if you want to third personalize it why people generally become hackers Mr MITNICK Well the definition of the word hacker it has been widely distorted by the media but why I engage in hacking activity my hacking activity actually waa--my motivation was the the intellectual challenge the thrill and also he gutfor escapeknowledge from reality kind of like somebody who chooses to gamble to block out things that they would rather not think about My hacking involved pretty much exploring computer systems and obtaining access to te source code of telecommunications Systems and computer operating systems because what my goal was was to learn all I can about security vulnerabilities within these systems My goal was not to cause any harm It was not to profit in any way I never made a red cent from doing this activity and I acknowledge that breaking into computers is wrong and we all know that I7consider myself a trespasser and my motivation was more of-I felt like an ox plorer on these computer systems and I was trying-it was not really towards any end What I would do is I would try to obtain information on security vulnerabilities that would give me greater ability at accessing computers and accessing telecommunications systems because ever since I was a young boy I was fascinated with communications I started with GB radio ham radio and eventually went into computers and I was just fascinated with it And back then when I was in school computer hacking was encouraged It was an encouraged activity Senator LIEBERMAN Who encouraged it Mr MITNICK In school In fact f remember one of the projects my teacher gave me was writing a Iog4n simulator A log-in simusrit rvdn lator is a program to trick some unknwn their user name and password and of course I got an A Laughter But it was encouraged back then We are talking about the 1970s And now it is taboo A lot of people in the industry today like Steven Jobs and Steven Wozniak they started out by manipulatin g the phone system and I think even went to the point of selling lue boxes on Berkeley's campus and they are well recognized as computer entrepreneurs They were the founders of Apple Computer Senator LIEBERMAN Yes The fork in the road went in different directions in their case Mr MITNICK Just slightly Laughter Senator LIEBERMAN Well maybe there is still time You are young so there is still time Your answer is very illuminating again Part of what you are saying struck me which is unlike other forms of trespass or crime you did not profit at all Mr MITNICK I did not make a single dime but that is not to say--one of the methods how I would try to avoid detection and being traced was to use illegitimate cellular phone numbers and electronic serial numbers to mask my location Senator LIEBERMAN Right Mr MITNICK I did not use this to avoid the cost of making a phone call because most of the phone calls were local I could have picked up a phone at home and it would have been a flat rate call did it to avoid detection but at the same time it was cellular phone fraud because I was using airtime without paying for it Senator LIEBERMAN Were you aware as you went through this pattern of behavior that you were violating th law Mr MITNICK Oh of course yes Senator LIEBERMAN You were Were you encouraged or at least not deterred by the fact that you had some confidence that there were few or no consequences attached to it There are cases where people know that they are doing something illegal but they think that the prospects of bing apprehended and charged are so slight that they go forward nonethieless Mr MITNICK Well that is true because as you are doing some illegal activity you are not doing a cost-benefit analysis-well at least I was not doing a cost-benefit analysis I did not think of the consequences when I was engaging in this behavior I just did it but I was not thinking about well if I wore to get caught I would have these consequences It was just focusing on the activity at hand and just doing it Senator LIEBERMAN Because of what you described before as the thrill of it or the challenge of it the adventure Mr MITNICK It was quest for knowledge it was the thrill and it was the intellectual challenge and a lot of the companies I targeted to get the software was simply a trophy I would copy the code store it on a computer and go right on to the next without even reading the code Senator LIEBERMAN Interesting Mr MITNIcK I mean that is a compete different motivation of somebody who is really out for financial gain or a foreign country or a competitor trying to obtain information like economic espionage for instance Senator LIEBERMAN Right very different Clearly as a lawmaker part of why I ask these questions is because I wonder whether if we raise the stakes that is to say we set up security systems that make detection more likely and increase penalties for this kind of trespass Internet trespass whether there is a prospect of deterring the next Kevin Mitnick Mr MITNICK You are talking about enacting further criminalSenator LIEBERMAN Yes raising the prospects that a so-called hacker is going to be detected for one and then second raising the criminal penalties for the hacking Mr MITNICK I would encourage you to come up with a method of prevention and detection and I encourage the computer industry today to look to methods to better detect intrusions and again extensive user training and education on how to prevent the human exr nstnce in my case I was basically doing this out of the curiosity rather than for financial gain and what is interesting to note is in that case I described in that U S v Czubinski case where this was an IRS agent who obtained confidential taxpayer information and was eventually prosecuted his convictions were reversed by the First Circuit Court of Appeals because what the court held is that Mr Czubinski did not deprive the IRS of their I property interest in this information because he had no intent to use or disclose the information he obtained That is the same circumstances as in My case I was not doing it to use the information or disclose it to anybody It was the trophy So it is a very interesting issue of whether I really engaged in computer trespass or fraud because fraud is where you deprive someboy f their money or property and in my case while it was a gross evasion of privacy I never in my opinion deprived any of these companies of their software or used it to their detriment So that is the difference in my hacking Then you have people out there who are working for private investigators trying to obtain confidential information like from the IRS or Social Security and through State arnd local government agencies to sell Information brokers sell it to private investigators who have clientele that are trying to find information on people Senator LIEBERMAN You know I hate to sug eat a waste of your talent but as I listen to you I think you would make a great lawyer Laughter Mr MI'rzuCK Well I do not know if you are convicted of a felony if they would allow you to be admitted to the bar Senator LIEBERMAN That is harder to do Laughter Let me ask you just a few more questions Mr MITNICK Maybe I could get a Presidential pardon Senator LIEBERMAN Yes Maybe we will come back Chairman THOMPSON We have a lot- of criminal lawyers around here Senator LIEBERMAN Yes we do Laughter Chairman THOMPSON Nothing personal Senator LIEBERMAN The response of the people attending was much more enthusiastic than we might like Lau ghter Mr Mitnick building on what you have just said obviously you have been away involuntarily from the world of computers for a number of years now I wonder if you feel that the techniques that you used are still useful today and whether they have retained their relevance in light of all the change that has occurred and whether you have any sense that today's computer security systems are more sophisticated than they were when you were involved in your hacking I Mr MITNICK Well I can say that the social engineering or the exploiting the human element of computer security I think is in the same state as it was 5 years ago before I went to prison Senator LIEBERMAN Yes Mr MIrNIcK However by reading materials and magazines and reading advertisements I know that the industry is building security products to try to protect information that resides on computer systems I have not had a chance to evaluate it but it is simply if somebody has the resources the time money and motivation they can get into any computer The only thing that the Federal Government and private sector can do is to reduce the threat You cannot reduce it to zeroSenator LIEBERMAN Make it harder Mr MITrNICK continuing You can only make it harder and hopefully the attacker willI find it difficult that they will go to the next guy just like people do at home They put a lock on the door If somebody really wants to get in they are going to go through a window and you can only make it more difficult so they try to gto the next guy Then if somebody is really targeted government information or trying to target information in the private sector I think it would be extremely difficult to prevent and that is why management is so important to really encourage systems administrators and the users of these computer systems maybe to do some sort of rewards prora or if information is breached under their control there should be some punishment I have not really' given it that much thought but for the human element I think it is still in the same state and I believe there have been some technological improvements but the Internet do not forget the Internet started out as the ARPANET which was pretty much academia government agencies and universities sharing information and the protocols were not developed with security in mind They were developed to allow these in dividuals or these companies to share information and to co-work on projects and now everybody is scrambling because of the e-cornmerce to build security on to p of a weak foundation Maybe what should be considered is building a strong foundation Senator LIEBERMAN Well said I am struck by your emphasis on the human element as the weak link in this computer security chain and it conforms to other information we have heard that the so-called cultural factors in some cases just plain negligence or inattention by people in charge of computers leads to most of the problems in security that we have Let me ask one last question and then yield to my colleagues In the question of security as we think about computer security as it affects our national security we naturally thin of defense But I have read some material that makes I think the good point that a hostile group or Nation wanting to do harm to the United States might not only go after traditional defense targets but might try to incapacitate power grids for instance public utility grids or trans ortation information systems or even stock or commodities marTo the best of your knowledge and experience would you say that those essential but non-defense systems are probably as vul nerable as you have described systems to be general Mr MITNICK e If you have the resources of a foreign government what woulT stop a foreign government from putting operatives to work in the companies to develop the hardware and software that is utilized by these groups or the power grid transportation and these things of nation al importance an d put some te of back doors or some type of flaw in the operating system or the software applications that allows them to have access I mean they can go to those extremes and they have the resources to do it Senator LIEBERMAN Your answer leads me to just ask one last question You have talked about the prominent role of what you have described as social engineering which is to manipulate unwitting employees I know it is hard to state a percentage on this but would you guess that most hacking is being done in that way-by the manipulation of the cultural weaknesses the human weaknesses And to that extent how much does hacking depend on suc- cesaful human penetration of a system as opposed to technological penetration of a system without any assistance from anybody inside with the assistance from inside coming either knowledgeably that is by somebody who has been placed in there or just unwittingly bya egli ent employee 9r MMCK n my experience most of my hacking involved the social engineering exploitations but I think that moist of the hacking out there is really the weaknesses that are exploited in the operating systems and the software applications because if you go on the Internet you can simply connect to computer sites that basi-4 ally have scripts of the exploit scripts so anyoy that has access to a computer and modem could download these exploits and exploit these vulnerabilities that are in the operating systems developed by the software manufacturers That is why I brought out the point that I think it is important for the software manufacturers to be committed to thoroughly testing their software to avoid these security flaws from being released to the marketplace Senator LIEBERMAN It is a very important point Mr MITNICK And maybe government and private industry if these companies are not committed to it is maybe going with another company Senator LIEBERMAN Thanks Mr Mitnick You have been very helpful I think you have turned your unfortunate experience in the past into some very constructive support this morning Thank you Mr MITNICK Thank you for having me Chairman THOMPSON How much time did you actually serve Mr MITNICK Fift-nine months and 7 days Senator LIEBERMAN Five years Chairman THOMPSON Fifty-nine months Mr MITNICK I do not know how many minutes or hours Chairman THOMPSON Well you know if instead you had raised millions of dollars for political campaigns you would have gotten probation Laughter Senator Collins OPENING STATEMENT OF SENATOR COLLINS Senator COLLINS How can I follow that Mr Chairman Chairman THOMPSON You had better choose your excitement more carefulfly in the future Mr MrrN'CK I think that is a good idea Senator COLLINS Mr Chairman I want to first commend you and Senator Lieberman for holding this hearing to highlight the pervasive vulnerability of our private sector and government cornputer systems Mr Mitnick I was struck by your emphasis as was Senator Lieberman on the human element involved because I think we often think of computer security in terms of technological safeguards or the physical security of the computers in restricting access Yet your experience as well as the recent revelations ab ut the former CIAbirectr's carelessness with his home computer suggest that we may be overlooking what is the most important factor which is the human element -17 In general do you think there is a lack of awareness of the risks of the human element both in the private sector and in the public sector I am particularly thinkinggofat the higher levels of corporations and government agencies I think training tends to occur at the lower levels and yet the risk may be just as high at the higher levels Could you comment on that Mr MITNICK I think the greater risk is at the lower levels I do want to make a point When you order a pizza how they verify that you are the one that ordered it is by calling you on the telephone to verify that that is you ' Well you have got to really look at the big picture and because there is a false reliance placed on telecommunications systems such as the public telephone network which is easily exploitable So for instance if I were to call you at your-what I did is offer to do a demonstration today if the government would give me immunity but there was not any time But anyway what somebody y could actually do is if they have access to the telephone switch they could actually manipulate it so you can call back a legitimate number that you think you are calling to verify the authenticity of the request but that number has been rerouted to the attacker So because of the reliance on faxes on voice mail on telephones in general to verify the legitimacy and that is easily exploitable that is what makes it so easy to exploit the human element Senator COLLINS How easy is it for a computer hacker to use work done by others-I am told it is called an attack script-in order to hack into a computer Would such a person even have to really understand how the computer code was written in an attack script in order to use it to hack into a system Mr MITNICK Not really If there is a shell script or a script is written where they just run it and it gives them the super-user administrator privileges they really do not or system Privileges ave to know how it is working and wbat is unfortunate you have a lot of people out there that have access to those scripts that really do not know what they are doing so if they get into a computer and obtain system administrator-level privileges they could easily destroy information or damage the computer by trial and error and without realizing what they are doing because they do not have the knowledge or the experience on that particular type of computer system So it is concerning Senator COLLINS Another issue that you raised earlier was that when the Internet was in the early stages of development the emphasis was on sharing information accessibility openness free exchange of ideas The emphasis was not on security and that has made us vulnerable in some ways Do you think that is also a problem with the growth of e-commerce that there has been insufficient attention given to security that the emphasis has been on accessibility ease of use making it easy for people to make purchases Do you think the private sector has been a little bit slow in turning its attention an d investing in the security of its systems Mr MITNICK Well unfortunately because I was unavailable for the last 5 years and e-commerce just started after I was sent away I was not really able to keep up with it But today everybody is reluctant to use their credit card over the Internet because they think somebody is going to get their credit card number and de- fraud them I think that there is a loss of confidence in usigthe Internet es ecialyWith doing financial transactions because mostly you hear alut these media reports of these people being able to circumvent security so easily What is interesting is people will go into a restaurant and will hand their credit card number to a waiter or waitress and they have no problem with that but they are afraid to type their number onto the Internet because they figure it could- be captured which is a possibility but I think what is interesting is I think there is limited liabilty if someone were to obtain your card and use it without permission There is maybe a $50 to $100 liability Maybe security systehis have to be created that would raise the level of confidence that the public has in using the Internet for ecommerce Senator COLLINS Thank you Mr Mitnick I just want to wish you well as you go on with your life You clearly have a great deal of talent and intelligence and it seems-to me as we have been discussing that you paid a pretty heavy price for your crime and I wish you well Mr MITNICK Thank you veryn much The prepared statement of Senator Collins follows J PREPARED STATEMENT OF SENATOR COLLINS Mr Chairman I apprecite the work you and Senator Lieberman have done on the important topic o h security of the computer system of the Federal Government The Internet offers unprecedented openness and accessibility Those same attributes make it vulnerable to attacks by unauthorized users The pervasive vulnerability of our computer systems raises the specter of malicious attacks by terrorists rather than simply the relatively benign intrusions of teenagers As one expert in computer seurity recently stated The Not changes the nature of crime You don't need skills to be an attacker If you are going to make counterfeit bills or burglarize a building you need certain abilities On the Net you download an attack script and click here m The sophistication of computers has been matched by the opportunity for malicious activity based on information obtained through the Internet In my view this creates an Increased ability for a greater number of people to threaten government W e hve an excellent group of individuals on the panels today who can share their view of what the government can do to better protect it computer system I look forward to their testimony Chairman THOMPSON Thank you very much Senator Edwards OPENING STATEMENT OF SENATOR EDWARDS Senator EDWARDS Thank iou Mr Chairman Good morning Mr Mitnicl Mr MiTNICK Good morning Senator EDWARDS I am from North Carolina and actually live in Raleigh and I remember vividlyMr MITNICK I have been there Laughter Senator EDWARDS You were big news for a long time in Raleigh I remember it very well Let me ask you about a couple of things In answering one of Senator Lieberman's questions about why you got involved in hacking to begin with I was listeningto the words you were using and they sounded very much to me like a description of addictive behavior Do you believe that addictive behavior is involved with folks who are habitually involved in hacking like you were Mr MrrruCK I am not sure I would -consider it addictive behavior It was just an activity I was intensely intc-rested and focused on because ever since I was a young boy I was interested in telecommunications and computers and that was just my calling just like somebody is very interested in sports and every day they go out and practice I am not sure that you can i eally equate it to like a physical addiction But then again I am i ot a health services professional so I would not know Senator EDWARDS No I understand But did you feel like you yourself were addicted to this hacking behavior Mr MITNICK I enjoyed it I would say it wati a distinct preoccupation but I do not think I could label it as an addiction per se Senator EDWARDS Did you ever try to stop Mr MITNICK I did stop for a while and then at that time that I was not engaging in tht behavior the Department of Justice specifically the F BI sent this informant to target me and basically I got hooked back into computer hacking because of the enticements that this fellow that they sent to target me enticed me back into that arena Senator EDWARDS What advice would you give to other hackers or probably more importantly potential hackers Mr MITNICK That is hard to say I would have to really think about that I do not encourage any activity which maliciously destroys alters or damages computer information Breaking into computer systems is wrong Nowadays which was not possible for me when I was younger computer systems are now more affordable and if somebody wants to hack they can buy their own computer system and hack the operating system and learn the vulnerabilities on their own system without affecting anybody else with the potential for causing any type of hapm So what I would suggest is if people are interested in the hacking aspect of computers tey can do it with their own systems and not intrude upon and violate other peraonal or corporations' privacy or government Senator EDWARDS Do you think it is possible to use things like click stream data to identify people who are least potentially going toMr MITNIcK Excuse me to use what Senator EDWARDS Click stream data Do you know what that is Mr MITNICK No Senator EDWARDS OK Do you think there is some way to identify people who are likely to become engaged in hacking just based upon their patterns of behavior in using their computer systems Mr MITNICK I do not know Senator EDWARDS You said in your testimony and maybe someone has asked you this and I did not hear it that in 20 years of experience in circumventing information security measures you have been able to successfuly compromise all systems save one Mr MITNICK That is true Senator EDWARDS VWch one 20 Mr MITNCK It was a computer system run by an individual and this computer was at his home and it was in the U K in England and I was unable to circumvent the security on that system because I did not have control of BT which was British Telecom Senator EDWARDS So there is nothing about the security system itself that gives us a lesson on how we can make systems more secure Mr MITNICK See a real important point is the more people that have access to a computer system the easier it is to penetrate because-well of course for the social engineering exloit like in government or in large corporations it is very easy 1ut the less people that have access to the computer system the less vulnerable it is and in this particular instance it was one person and it was his home machine so it was extremely difficult and this person was very very sar on computer security issues In fact this indi-e vidual is the one that found security vulnerabilities in the VMS operating system which was manufactured by Digital Equipment Corporation and why I targeted this individual was to basically find and obtain all the security flaws that he discovered in the operating system because my goal was obtaining information on all- security vulnerabilities so I would be effective at being able to compromise any system that I chose to compromise Senator EDWARDS One last thing In North Carolina we have a company called Red Hat M r MITNICK Linux Senator EDWARDS Yes They have been as you know very successful I had a meeting a few weeks ago with Bob Young who is the founder of that company and I was just curious whether youand based on my discussions with him I had some feeling that there was at least the potential for these open source software systems to be more secure Do you have any views about that Mr MITNICK Yes I think th at is true the reason being is they are open for inspection by the public at large and in so doing just like with systems that utilize encryption I think those security flaws could be readily identified and published and fixed rather than in a proprietary system where it is not open to the public and then you maybe have the individuals that find these holes do not report them and they use them to exploit vulnerabiities and access computer systems without anyone knowing the better or without detection Senator EDWARDS Thank you very much Good luck to you Chairman THOMPSON Thank you very much Mr Mitnick You have been very very helpful to us Good luck to you Mr MITNICK Thank you Chairman THoMPSON Thanks for being with us today Mr MiTm cK It is an honor to be here todd Chairman THOMPSON I would like to introduce our second panel Jack Brock Director of Governmentwide and Defense Information Systems at GAO who is responsible for most of the work done by the GAO for this Committee over the last few years Also on the panel is Roberta Gross the Inspector General for NASA who has done much work in the area of computer security and eve has a special investigative unit on computer crimes so thank you for being with us 21 We always take more time with our first panel whether it is one witness or 10 We are going to have to be out of here in-about an hour so as far as we are concerned and the panels are concerned let us keep that in mind and do what we can Mr Brock do you have any opening comments to make TESTIMONY OF JACK L BROCK JR ' DIRECTOR GOVERN- MENTWIDE AND DEFENSE INFORMATION SYSTEMS AC COUNTING AND INFORMATION MANAGEMENT DIVISION U S GENERAL ACCOUNTING OFFICE Mr BROOK Yes sir I could actually spend my entire time reading you a list of the reports that we have done on computer security many of these for your Committee Chairman THOMPSON Could you summarize all that Mr BROOK Absolutely Chairman THOMPSON Would you say there is a bunch Mr BROOK There are a lot Chairman THOMPSON All right Mr BROOK Unlike Mr Mitnick when we go into agencies we are doing so with the full knowledge and authorization of the agencies we go in A long time ago when we did cornp uter security work we examined agencies' controls and we would comment on those controls and we would say the controls are inadequate and the agency would say well no they are adequate so we disagree with you A few years ago we started doing our own testing of the controls We do not call it hairking we call it penetration testing We have been uniformly successful in getting into agencies The reports that we have done for your Committee over the past few years at NASA State DOD and the IRS indicate that typically agencies have very poorwhich controls EPA we have just released a report on a couple of weeks ago we went in through their firewall which offered virtually no protection We had access to their mainframe computer center which had almost no controls set up and we were able to wander around the agency almost at will It was not really difficult At another agency where the firewall offered better protection we did what Mr Mitnick was referri ng to as social engineeringL We simply call people and say I am Joe Blow I am the system a mmistrator Here is my telephone number Call me back We are having a problem with your account Give me your password and you can ca this number and check it It is amazing how many people just call you right back and give you the password If that does not work you just gain access to the building and walk around and you find computers that are open You find the computer monitors with the password in a sticky on it It is not very to get access So difficult as we have gone to agency after agency after agency the specific weaknesses are usually technical There is a technical reason that we are gettingin The software has a hole in it The firewall is not very good It8i not very rigorous Password protection is weak or whatever 1The prepared statement of Mr Brock appears in the Appendix on page 65 We frankly after doing many of these and we are doing the same report over and over we izaid there has got to be a better way of doingothis and at your request we looked at agencies or at organza onstihat have good computer security and there we found that good management attention to the problem is the secret It is muhlike ifyou have a house and you have wood rot and peopie come in and they say well you have got a problem and you patch it over with a little putty you still -have that underlying weakness We found when we were goin into agencies and pointing out specific computer weaknesses that these weaknesses would be corrected They would patch it But the underlying causes the poor management the lack of management attention the lack of bud get all of these things realy did not fix the underlying problem So it was like sticking your finger in the dike You would plug up one hole and another hole would spring out somewhere else and things would leak through That is the condition we find at agencies and we find it consistently One of the things that your bill does is it changes the direction of the computer security legislative framework The Computer Security Act is inherently flawed in that it is built on a system-bysystem basis It starts with the premise that computer security can be fixed at the system level when really it needs to start at the management level I would like to briefly go over a few features in your bill that we think are very commendable and we would encourage that if legislation is being considered that these items be kt of all it incorporates the best practices that we found at leading organizations in other words those management practices that agencies or organizations undertok to in fact provide a secure framework throughout their organization Second your bill requires a risk-based approach to be implemented by agency program managers and technical specialists let talk about this a little bit If you do not know what your me riskjust is and risk is a function of the vulnerability of the system a function of the threat to the system and a function of the value of the information of the process that that system controls If you do not understand your risk you are not goin to put in the right kind of controls you are not going to have th e right kind ftaining ou are not going to have the right kind of testing Rarely do we fid agencies that do a good job at determining the risk they face and ag without determining the risk you are not going to know w at sort of controls need to be put into place Third your bill provides for an independent audit and we think that is an absolute must An independent audit gives 0MB oversight committees such as yourself ad agencies themselves an opportunity to see how well do controls work how well do training policies work how well are they doing as a management entity in terms of providing good computer security over our information resources Finally it also eliminates the distinction between national security and non-national security systems Right now there is a dividactually gone to some agencies and talked to hive WecoT ing puter security and they say we do not have any about themline classified information Therefore computer security is not an issue with us And by havin that distinction between national security and non-national security we think that in many agencies it creates a barrier to having an effective agency-wide security program If I could just indulge you for a moment more we would ike to talk about a couple of features that we think you should consider The first of those and you alluded to this in your opening remarks is that we believe there should be mandatory standards put into place and that these standards should be in two parts The first part would be a standard set of data classifications which would be used by all agencies for example risk levels ranging rmoet whatever and that data would bedcassified in one oftese risk elements ranging from things that you did not care that much about information that was not particularly sensitive was not particularly vulnerable all the way to national security information In turn this would lead to a set of mandatory control requirements that would set minimum requirements for each of these data classifications We believe if this were instituted across the government it would improve the ability of the government to enforce computer security it would improve the ability of managers to provide a minimal lvel of support for their agency it would permit better targeting of resources and it would improve the ability of the independent auditors to do a good job Fin ally we think there is also a need for stronger central guidance I think the lessons learned from Y2K is that a strong central hand in this case John Koskinen really can provide much needed oversight and impetus to agencies in 'terms of making sure that they are following good practices making sure that budget submissions are responsive and in general providing the leadership that seems to be lacking in computer security That is my brief statement and I would ask you Mr Chairman that my full statement be included in the record Chairman THOMPSON All statements will be made a part of the record Thank you very much Chairman THOMPSON Ms Gross thank you TESTIMONY OF ROBERTA L GROSS ' INSPECTOR GENERAL NATIONAL AERONAUTICS AND SPACE ADMINISTRATION Ms GROSS Good morning Thank you very much for inviting me here to testify on the act I am here in a double capacity I am here as the NASA Inspector General I also head a task foce that is loigat this bill on behalf of the Inspector Generals and so I will weave in some remarks that will reflect some of the community remarks This is a world of limited budgets We all know that And in making decisions agencies have to decide-Mr Brock pointed that out-they have to figure out what is the risk to their systems Obviously in an agency like NASA you are going to give a different kind of security to the public website than you would for example to protecting the astronauts on the space shuttle So you have to make these risk benefits and that requirement is a key element of this act IThe prepared statment of bMu Gross appears in the Appendix on page 7 1 But there is a complication to agencies making vestments in IT security I think if you look at the Y2K issue the problem of the change of the year for the computers once it was a success headlines were this was maybe a hype and we spent too much money Well if it was not a success there would have been a different set of headlines So investment in IT security is very difficult for agencies to make because if its security is working you do not get headlines But boy when it does not work you git headlines I think recent events about the hackers attacking different systems it makes headlines But agencies do not see the visibility of IT security until it fails I would draw your attention to the success of the Y2K coordinated efforts I think it provides a model that is reflected in your bill about how to ap proach IT security It was at the highest level supported and eveyboy p lugged in You had the President 0MB agency heads the ClOs GAO an d the 1Gs as well as the Congress in its exercise of oversight and the focus worked We entered the new millennium with minimal Y2K problems This act asks many of the same players to have the same sus tained focus and that is key a sustained focus It was easy for Y2K because it started rolling around and everybody started really focusing on it But computer security is an ongoing effort and I think it will be very helpful for this Committee and other committees with oversight to keep that sustained focus We NASA QIG support the placement of the focus of 0MB the Deputy Director having oversight I think it gives a high level attention Also the Deputy Director has a unique vantage point The Deputy Director serves as the chair for the IG councils the CFO the chief financial officer councils the 010 councils and also the president management councils that is the very senior level executives that head up the agencies And so you have a person at a high level that is able to coordinate all these different councils for a government-wide focus and I think that was a good selection You also make the heads of agencies to be accountable Heads of agencies occupy bully pulpits They are able to set the priorities of their agencies Use the Y2K example I can remember Dan Goldin saying I am being held accountable and we are not going to fail He had the bully pulpit and everybody heard So this is enlisting again the heads of agencies and you need to hold the agency heads accountable because they can change a culture of I do not care or we are just scientists or we just want information how does it impact me So that is a very important feature In terms of the-CIOs we had a discussion with the IG working groups Many in the working groups view these CIOs as not having resources not having staff not having budget Some even characterize their CIOs as paper tigers So this act gives a lot of responsibility to the CIOs and it is going to be important for 0MB and for this Committee and other committees to make sure that those CIOs have the authority and the resources to do what this act is expecting I would use the example of NASA We have repeatedly made criticisms of the way that NASA establishes the 010 He is doing the best he can but he has no budget or little budget he has almost no staff and NASA has decentralized the CIOs at each of the 25 centers and there are ten NASA centers They the center CI0s do not report to him He does not control their budget He does not do their evaluation The centers can give the CI0s collateral duties or they can decide what grade level the 0I0 should be an SES a 15 or a 14 If they do not agree who do theyirreport to They report to th centers not to the 010 the head 050 That decentralization and fragmentation impedes ITi security To further compound that problem at NASA they have bifurcated not bifurcated they have given each of the centers various tasks In Glenn in Ohio the Glenn Center does training In Ames in California that is the center of excellence for IT security You go to Marshall and that is the center for the firewalls and on and on Each center is a little center of excellence and none of those people report to the 010 He does speak with them They do collaborate They do have telecons But is it any wonder that it takes a long time for NASA to get any policies and procedures We have had reports pointing out instances where this decentralization and fragmentation that whole kind of structure in and of itself weakens IT security and we have more to say on that in my testimony the written testimony I want to get to the part of the act that has to do with the Inspector Generals In terms of the QIG working goup we did have a problem with the act narrowly defining the independent external auditor Under the act if the 1GB do not do the work an external auditor can be hired but we thought that that implies a financial orientation and it should be any qualified external entity and that is just a wording change But one of the things that the QIG working group commented on was they welcomed the act's tasking They think you cannot be doing the high-risk work that agencies are facing without doing the review work but the IGs will have to recruit train and retain a good cadre of professionals That is going to require the support of the agencies and 0MB and the Congress in supporting their budgets In my written testimony I went through how for the past 4 years I have been recruiting a cadre of people in the audit arena and in the criminal investigative arena as well as my inspectors and that has taken time and these are a high-paid qualified group They are worth it They are definitely worth it But it does take time and it does take money and this group Congress has got to be supporting the budget that goes with that The last detail that I want to address is the section that talks about law enforcement authorities The act requires that security incidents be reported to law enforcement officials but it does not define that term Where an QIG has a computer crimes division then the agency system administrators need to report security incidents to and work closely with the IG special agents so that the agency ends up preserving evidence maintaining chain of custody and that'-you have the documents that you need and the materials that you need so that you can have a co it case The Department of Justice has madelclear in writings and in its actions that it is not just the FBI that does the criminal investigations on computer intrusions and in my written testimony I have a letter referred to a letter by Scott Oh arney who was then the former head of the Department of Justice Computer Crimes and Intellectual Property Division where he talks about other agencies that do and have the authority for computer crimes-Secret Service Air Force audit and their investigative service as well as NASA's Insetr General But I think that is very important for this oversight Committee to understand that Obviously the Presidential Directive PDD-63 established the NIPO the National Infrastructure Protection Center so that you can have the critical infrastructure reviews and investigations done by the FBI But there are thousands of intrusions each year and every intrusion is not against the critical infrastructure indeed at NSspace does not even make the critical infrastructure It is very important then that NASA have a good Inspector General's computer crimes unit to have a group that has a focus on NASA as the victim It is important that this Congress support the efforts of Inspector Generals to have a computer crimes unit It takes training It takes training people You have to have a very qualified cadre of people But if you recall the Inspector General Act was to have the synergism of audits and investigations so that if you are doing an investigation and you see internal control problems you also tell your auditor so that they can do a system-wide look-see That synergism is very important and it is very important that the Inspector Ge neral communities have computer crimes units so that the IGs can make sure that they protect the victim agencies In sum I think you have the framework for a very good act It has an oversight capacity which I think is very important and it also enlists the players that need to be there-OMB heads of agencies ad CIOs Thank you veryuch Chairman THOMPSON Thankyouvery much You were invited to come because of the innovative approaches that you have at NASA and you remind us how important the IGs are in this whole process so thank you very much for what you are doing and your helpful testimony Mr Brock let me address a few questions to you The thing that jumps out at me first when I start to look at this in February 1997 the GAO had a series of reports to Congress and things were so bad that this security problem was put on the high-risk list at that time Late in that same year 1997 the CI10 Councl which is of course under the 0MB delineated it as a top priority On March 31 1998 the GAO filed another report on the consolidated financial statements and that report pointed out widespread deficiencies in terms of information security Then again in September 1998 of course we have this report entitled Serious Weaknesses Place Critical Federal Operations and Assets at Risk I do not know how much more pointed you could be than that It is really outrageous that the Federal Government in an area of this sensitivitycanrot do more faster Since at least 1997 it has been years since we have known-at least-ince we have known about the seriousness of this problem We get report after report after report If I were you guys I would wonder why you are even in business and whether or not we pay any attention to you or not This last report still points out serious deficiencies still do not have any management in the system and we are still extremely vulnerable and it makes you wonder what in the world it takes to get anybody's attention I look back at the current law and wonder what are we doing to help the process Are we overlaying an already complex process 7 see we have given 0MB responsibilities before We have given agencies responsibilities before Are we just telling them again to do it and we really mean it this time or what are we really doing I am playing devil's advocate with our own bill here I guess but are we really doing something hero that is different from all of these other acts the Coinp uter Security Act the Clinger-Cohen Act Paperwork Aeduction Act on and on and on the Privacy Act I mean you have a dozen pieces of legislation tibat in some way deal with this overall problem so our solution is another piece of legisla am very skeptical generally of that problem Now tion I doI not want to waste my time or yours on this unless we are really doing something that for the first time can have some accountability Until people are held accountable until somebody is fired or somebody loses some money or somebody is embarrassed more than we have been able to so far nothing is going to change It looks to me like we have a chance here maybe of having some accountability With the Results Act and everything everybody is talking about measurements and measuring results and accountability from those results I do not know whether we mean it or not yet but we are all talking about it now and now we are bringing it to this problem measurable outputs and things like that Firs t of all is my assessment off base If not why has it taken so long to do anything and are we in our bill really doing anything that has a decent chance of makiiig a difference Mr BROOK First Mr Chairman as chairman of our oversight committee I hope you were not really serious about wondering why we are in business Laughter Chairman THOMPSON Well I would have to ask the same thing about ourselves would I not Mr BROOK I agree with your basic premise It is a shame that you have to have a bill to mandate good management I mean clearly it is not a crime now to have good management in agencies that said we are going to do things the right way But clearly the reports that we have done Ifor your Committee over the past few years have indicated agencies are not doing the things the right way that something is broken and that attention needs to be paid to this I think the features you have in the bill that many of these features are the kinds of things that are designed to pick things up by the nape of the neck and shake and grab attention The independent assessments every year are a mechanism where you can identify weaknesses where you can identify where accountability should lie and where it has not been exercised and where it gives the administration as well as the Congress an opportunity to take corrective action and that is the next step Pointing out the weaknesses pointing out the management deficiencies is one thing and then taking the next step to exercise that accountability is something that would still remain to be done Chairman THOMPSON - I take it that you feel that we need to be more specific in establishing standards 28 Mr BRoOK Yes sir Chairman THOMPSON Than the bill as currently drafted Mr BROCK Yes Chairman THOMPSON And we need to delineate what with regard to risk levels a requirement that they be considered or we tell em how to consider it or how specific should we get on the mandatory requirements in determining risk level and also how specific in the mandatory minimum requirements I guess you might say in addressing those levels Obviously we cannot deal with all that here today butMr BROCK Your bill starts off in the right direction on that by requiring agencies to do a risk-based assessment But once they do the assessment they need to be able to categorize that We have this level of risih or we have this risk level What category should that be in How risky is it Chairman THOMPSON That is really kind of management 101 is it not Mr BROCK Basically Chairman THOMPSON I guess they do need to be told to do that Mr BROCK Basically but if you had it consistent across the agencies it would be much easier to have guidance that could be more easily developed and more easily taught and trained But then the next step if you are at a certain risk level what are the minimum things you should do in terms of authentication in terms of encryption or in terms of independent testing to make sure that you are meeting those levels of control Chairman THOMPSON So it would be a mistake to let each individual agency determine what it needed to do to address these be- cause they have not shown any indication that they have the capability or the motivation to do thiat is that correct Mr BROCK Yes I think it isChairman THOMPSON You said it would be much easier to have minimum good standards that would apply to any agency Mr BROOK Right I think it is appropriate for eac agency to determine -Its risk that it faces but then if you had the common standards I think just the very process of developing those common standards would really create a rich dialogue and go a long ways towards improving a shared understanding among agencies about what some of the good features of computer security should be Chairman THOMPSON And third you mentioned some stronger central guidance Obviously 0MB has not been doing its job They have responsibility here N1w their major objection to your report I understand was that you are focusing too much on our responsib it at OMA and they either do not think they have that or want it Thy aponting to the agencies and the agencies I am sure are pointing to somebody else So here we go with 0MB again which causes some people to say we need a new information security czar because maybe 0MB inherently if the allocation of their resources and what is going on over there maybe-they are not the right ones to be bird-dogging this They sure have not done a good job9 of It so far a What are we doing that is going to improve that situation I understand that we cannot even tell- where the money that we appro- priate is supposed to 0go for maybe it is not line item but it is sup posed to go for security enhancement You cannot even find it We do not know how it is being spent in terms of information security is that true Mr BROOK That is correct We have trouble determining how is spent within each agency on cornp uter security I1 monyross much think Ms in her statement when she talked about the similarities between the Y2K problem and how top managers within each agency felt accountable and I think one of the reasons they felt accountable was really the strong role that the central manager in this case Mr Kosinen made in making sure they understooA they were being held accountable $ We do not have that situation on computer security I think it should be closely examined as to whether there should bo a computer security czar though and separate that from a 010 that would have responsibilities for other aspects for information management We have rarely gone to a good organization that had good computer security and we found out when we go there that they also have other good information management practices It is part and parcel We have never gone to a place that had poor information management where they had poor lifecycle management poor systems development efforts poor software acquisition processes and had good computer security It all runs tgether Therefore I would be reluctant to suggest tat you separate comfrom the other aspects of informaton management security pter year Next the QIRA reauthorization will be coming up andyo will have an opportunity at that time as well to examine the T perwork Reduction Act the Olinger-Cohen Act as well and I think these are good questions to also bring up at that time Chairman THOMPSON We are looking forward to that but we are not vesting responsibility there in this bill We are bringing it to a little higher level than that but thank you very much Senator Lieberman Senator LIEBERMAN Thanks Mr Chairman Thanks to both of you I think your testimony both written and here today has been really very direct and very helpful and you are both obviously quite knowledgeable The Chairman has covered some of the areas I had an interest in so I will be fairly brief I take it that you agree not only with what Mr Mitnick said but what I have learned generally in my reading here that a lot of the problems of computer security are cultural which is to say human correct Mr BROCK Yes Senator LIEBERMAN Beyond management which obviously is critical and at the heart of this let me just ask you to speak a little bit more about the question of whether there should be consequences if a Federal employee fails -to foll6w proper procedures relating to computer security Or on the other end whether there ought to be consequences for exemplary behavior with regard to computer security Mr BROOK Yes I would agree with that The problem we have though and some Federal agencies are going to that accountability is always at the technical level Well we have had a break-in we have had a failure it must be the guys in the computer room's 63-639 00-2 30 fault or we would not have had this And for specific weaknesses that might well be true but the accountability typically does not extend upwards into management where an atmosphere has been created or budget resources have not been appropriated or whatever and those individuals also need to assume their share of the accountability n oto In the private sector we found verydfnt ik mechanisms for measuring accountable ty for measuring performance aganst that accountability and holding individuals responsible whether they be system administrators or the system process owners Senator LIEBERMAN How are they held responsible in the private sector Mr BROCK In one good example we have managers have to define the risk Along with the technical people they agree upon the vulnerabilities and the threats They then have to allocate money and resources to providing an appropriate level of protection and they sign off on that At the end ofthe year the independent audit comes in and first of all determines did you in fact appropriately determine the risk and are you appropriately protecting those to the level you agreed upon In some cases we found good examples where they made a business decision not to provide a level of protection but it was a business decision and it was examined and agreed upon by the board And in some cases I believe that people were fired when they failed to meet the terms of their contract Senator LIEBERMAN Ms Gross do you want to add anything about individual accountability here Ms GROSS Yes I think what you have to do is first implement a training programSenator LIEBERMAN Right Ms GROSS continuing Because this i1 s very much a cultural thing I mean NASA you go to for example the Goddard Space Center and its scientists its engineers they are collegial They are talking with universities and they are interested in their earth science programs and they do not think about security It is not until for example you will tell a scientist who is collecting data and working on a journal article if somebody takes your information through the computer and publishes that information a year ahead of you or 6 months ahead of you do you care Oh they all of a sudden-it comes home that it actually does impact them Senator LIEBERMAN Sure Ms GROSS And I think the GAO audit on NASA pointed out they did not have a training program They still do not They are still getting it together and trying to work out what should be the training program partially because they did not have appropriate Security standards so how can you develop your training program But meanwhile you have to have systems administrators trained They expect to have it in 2001 You cannot wait until 2001 You have got to have systems administrators held accountable in some ways So the issue on accountability is a lot more complex than just saying you have got to be accountable and we are going to take action ZO the other hand on very simple no-cost low-cost things that the agency can do they should be held accountable They are supposed to banner their systems both for law enforcement and for downstream liability it is supposed to say this is a government computer you are accessing a government computer so the hacker knows he is trespassing He cannot say oh I was just surfin was looking for America On-Line and look wiiat I got I got NA So bannering is simple but it does not happen In that case if a system administrator is not going to banner the computer we just take away the computer They cannot do their science Nhat you can hold for simple no-cost low-cost which we have identified and we can continue to identify You can hold them accountable because it makes the agency safer right away On the other hand for some of the major accountabilities you have to have risk assessments and you also have to then make sure that your systems administrators and that is not insignificant numbers are trained and let me explain why I am saying it is not an insignificant number For example the Goddard Space Center they said how many of you think that you are system administrators in other words you have basically root access and have super controls of the computer Nine hundred people need a basic training and an advanced trainigso that they can be sstems administrators and in many of those cases it is a collatera duty They are not security specialists they are scientists but they have a very powerful computer system that networks with other systems so they need training So I am trying to put it in a context because you can say OK we are going to hold people accountable and we should have very powerful consequences I think that definitely agencies can start immediately no cost low cost There is no reason why agencies cannot be bannering their computers That is nothing new Senator LIEBERMAN Right I Ms GROSS There is no reason why people cannot be using pass- words that are a little more difficult than the dictionary I mean the security office gives instructions on how to have better passwords All those things you can start holding people accountable for and I think what you end up having to 'have is your 010 makiga range of things that we expect tomorrow or next week and these are the other things we are going to phase in but it takes attention and again you start with the bully pulpit of the head of the agency You Congress all have the bully pulpit also and that is important but the agency does too Senator LIEBERMAN Right I think the intention of the billthough it does more than this--is to raise up computer security as a priority consideration of Federal agencies and of individual Federal employees who have responsibility Let me ask a last question of you Mr Brock I am sure you know that the President proposed a Federal Intrusion Detection Network FIDNet to monitor patterns of intrusions in the Federal systems which is supposed to be housed at GSA's Federal Computer Incident Response Capability office Mr BROCK Yes Senator LIEBERMAN In your testimony you mentioned the need to improve the government's ability to respond to attacks on computer systems so my question is just to build a bit on whether we need a stronger Central Incident Response Center whether the President's idea and location is the ri ght one Mr BROOK Well those all go together Senator LIEBERMAN Right Mr BROOK We do believe that incident response is important and that intrusionl detection is important A specific criticism we had of the President's plan was the fact that it focused so much on intrusion detection you began to get the impression that that was the primary means they had of improving the government's or the Federal Government's computer security program Senator LIEBERMAN You mean as opposed to all the other managementMr BROOK As opposed to prevention for example Senator LIEBERMAN Prevention right Mr BROCK One agency that we have gone to at EPA they did a pretty good job of reporting and recording their intrusions They did a very bad job of d-oing anything to prevent those intrusions or in analyzing those intrusions in order to take corrective action So intrusion detection is important It is important to share that information with other agencies so that you can learn from it So to that point we strongly support sharing the information We would strongly support some sort of incident response capability so that you could take action but it needs to be part an dp arcel of on entire program and should not be the primary or the only focus of such a program Senator LIEBERMAN Thanks very much Thank you both That was very helpful Chairman THOMPSON Thank you very much We could spend a lot of time with the both of you You have been very help tday and we will continue to work together on this We appreciate your contribution to this and your fine work Mr BROOK Thank you Ms GROSS Before I go I would like to just incorporate into the record my full written testimony Chairman THOMPSON Absolutely All statements will be made a part of the record Ms GROSS And both Senators I would like to leave for you all we have done a Clearing Information From Your Computers Hard Drive pamphlet Mr Mitnick was saying how easy it is at the lowest levels to end up having intrusions This is when you excess your computer and you get a nice new super computer and you think you have deleted all your files and what happens is a lot of your information that you think is very sensitive is going out to schools to prisons etc We have some on the desk and I certainly draw this to yur attention Thank you Chairman THOMPSON Thank you very much On our third panel we are fortunate to have Ken Watson Manager of Critical Infrastructure Protection at Cisco Systems Inc and James Adams who is the CEO and co-founder of iDEFENSE Both of these gentlemen are known in the industry as experts on the issues related to information protection and security Gentlemen thank you very much for being with us here today Mr- Watson do you have an opening statement to make 33 TES iONY OF KENNETH WATSON 1LMANAGER CRITICAL INFRASTRUCTURE PROTECTION CISCO SYSTEMS INC Mr WATSON Thank youA Chairman Thompson Ranking Member Lieberman and distingws ed Members who aehere I appreciate the opportunity to speak to you about network security best practices The last 8 years of my 23 years in the Marine Corps I spent helping to draft policy and doctrine for information warfare and taking joint teams and conducting information operations to integate those into other military operations When I retired I went work for WheelGrouprCopration where I managed our security consulting team We would do legal contracted security posture assessments in corporate networks and provide them reports of their vulnerabilities When Cisco acquired WheelGroup f transitioned to critical infrastructure protection and that is my role now at Cisco That team just recently conducted a 6-month studyovunr abilities in corporate networks and I -have put together the top three to five vulnerabilities that were discovered in every area as the last two pages of my written testimony and it is just a table of what are the vulnea6ilities and how do you fix them It is important to note that the way this team works it does not use anything like social engineering or other things that might cross the bounds into becoming illegal activities They concentrate on working at the keyboard only and finding technical vulnerabilities and that is it It is kind of interesting that they are continually successful in penetrating external defenses about 75 percent of the time but once inside they are about 100 percent successful in gaining unauthorized access between machines inside a network and that would be true for government or private sector networks Cisco systems is serious about network security and about its implications for critical infrastructures on which this and other developed nations depend Few can argue that the Internet is changing every aspect of our lives Internet economy is creating a level playing field for companies countries and individuals around the world In the 21st Century the big will no longer outperform the small Rather the fast will beat the slow So how do you decide on a best practices solution I would like to offer a smle way to organize network security technologies and practices and talk a little bit about what Cisco has seen in customer networks Our model is not reinventing the wheel but it is what we call the security wheel and it talks to five general areas where you can group technologies and practices and it is a management model Good security must be based on policy Employees must know what they can and cannot do with company systems or government systems and that they will be held accountable by whoever is the boss the CIO or whoever is accountable and those people should be accountable also The policy must also be risk-based so I am in concurrence with a lot of what you have already heard today I to preparesatement of Mr Watson appear in the Appendix on paoe 83 After setting appropriate policies a company or organization must methodically consider security as a part an integrated part of normal network operations This could be as simple as configuring routers to not accept unauthorized addresses or services or as complex as installing firewall s intrusion detection systems authentication and encrypted virtual private networks A basic tenet of military combat engineers is that an unobserved obstacle will eventually be breached and that is also true for networks Hackers will eventually figure a way around or through static defenses The number and frequency of computer attacks is constantly on the rise There are no vacation periods As such a critical part of the security wheel is to 'Monitor the network intrusion detection and other monitoring devices so that you have 24 by 7 visibility into what is going on inside and outside the network The next stop is testing the network Organizations that scan their networks regularly updating electronic network maps determining what hosts and services are running and cataloging vulnerabilities and they should also bring in experts for independent network security posture audits once or twice a year to provide a more thorough assessment of vulnerability tisjust like cleaning your teeth We brush our teeth every day Those are like your internal own network scans And you go to the dentist once or twice a year and get an independent outside observation It may be painful but you get a lot of good out of it in the longf run Finally there needs to be a feedback loop in every best practice System administrators must be empowered to make improvements Senior management has to be held accountable for network security Those involved in day-to-day operations must have their attention If you were to ask me what is the most important step to do right now I would give you two answers one for the short-term and one for the long-term In the short-term the best thing I think any company or organization can do is to conduct a security posture assessment along with a risk assessment to establish a baseline Without measuring where you are you cannot possibly figure out where you need to go For the long term the best thing we can do together is to close the alarming skills gap The requirement for highly skilled security specialists is increasing faster than all the training programs combined can produce qualified candidates Universities are having difficulty attracting both professors and students The government is also having a hard time retaining skilled security professionals We in the private sector are building and maintaining state-of-the-art security traning programs and we are collaborating with education institutions and training partners to provide a wide base for delivrYke are also helping the Office of Personnel Management to identifyr knowledge skills abilities and ongoing training requirements and career management and mentoring ideas for a Federal IT security workforce This human resources issue is by far the most critical information security problem we face in the long term and the solution must be based on government industry and academic collaboration Corporate network perimeters are blurring That is also true for the lines between government and industry The Internet knows no boundaries and we are all in this together We are very enthusiastic about the new Partnership for Critical Infrastructure Securiya olntryoranzaio1o some 120 companies from across the country dedicated to improving the network security of our critical infrastructures As we further build the relationship between the public and private sectors we hope the great spirit of copration currently led by the Department of Commerce and the Critical Infrastructure Assurance Office will continue We believe that confidence in e-commerce is increasing Thirtyeight new web pages are being added to the World Wide Web every second Our job all of us all of our job s to raise the bar of security overall worldwide so that we can empower our citizens and customers to take full advantage of the Internet economy in the Internet century Thank you very much I will be glad to answer any questions Chairman THOMPSON Thank you very much Mr Adams TESTIMONY OF JAMES ADAMS 1 CHIEF EXCUTIVE OFFICER INFRASTRUCTURE DEFENSE INC Mr ADAMS Chairman Thompson Ranking Member Lieberman thank you very much for including me on this distinguished panel By way of brief back ound my company iDEFENSE provides intelligence-driven products-A ally reports consulting and certification-that allow clients to mitigate or avoid computer network information and Internet asset attacks before they occur As an example iDEFENSE began warning its clients about the possibility of distributed denial of service attacks the kind of hacker activity that is capturing headlines currently around the world back in October and November of last y ear At the outset I would like to commend you and your staff for crafting such thoughtful and badly needed liegislation in the area of computer security for the Federal Government We are currently in the midst of a revolution the information revolution which calls for dramatic and bold steps in the area of securing cyberspace It is in this context that your bill takes a crucial step forward by shaking out the current culture of lethargy and inertia gripping the Federal Government With a proposal to put teeth into the QMB's oversight of computer security issues this bill is a solid step in the right dieton Why does this matter Few revolutions are accomplished without bloodshed Already as-we plunge headlong and terribly' ill1repred into the knowledge age we are beginning to receive te iMtia casualty reports from the front line of the technology revolution and to witness firsthand the cyber threats that if allowed to fully mature could'cause horrendous damage The recent denial of service attacks were mere pinpricks8 on the body of e-commerce Consider instead that some 30 countries have aggressive offensive information warfare programs and all of them have America firmly in their sights Consider too that if you buy I1The prepared statement of Mr Adams appears in the Appendix on pipe 88 36 a piece of hardware or software from several countries among them some of our allies there is real concern that you will be buying doctored equipment that will siphon cop ies of all material that passes across that hardware or software back to the country of manufacture The hacker today is not just the stereotypical computer geek with a grudge against the world The hacker today is much more likely to be in the employ of a government or big business or organized crime and the hackers of tomorrow will be all of that and the disenfranchised of the 21st Century who will resort to the virtual space to commit acts of terrorism far more effective than anything we have seen in the 20th Century The government in all its stateliness continues to move forward as if the revolution is not hapn being Seven months ago my company won a major contract wiha government agency to deliver urgently needed intelligence The money was allocated the faperwork done Yet it remains mired in the bureaucratic hel from which apparently it cannot be extricated Laughter J Another government agency is trying to revolutionize its procurement processes to keep up with the pace of the revolution They are proudly talking about reducing procurement times down to under 2 years In other words by the time new equipment is in place the revolution has already moved on 8 Internet years In my company if I cannot have a revolutionary new system in place within 90 days Ido not want it The Thompson-Lieberman legislation is a good first step to try and control and drive the process that will bring the government up to speed with this revolution I believe however that to effectively cope with the technology revolution this proposal must be strengthened What is needed is an outside entity with real power to implement drastic change in the way government approaches technology and the underlying security of its systems Currently jurisdictional wrangling procurement problems and a slew of other issues are seriously hampering the government's ability to 'Ihe Thompson-Lieberman bill provides a framework to begin sorting through this mess However what is needed most is a person or an entity that will draw on skill sets in many areas that will overlap that of the CIOs CFOs CSO and most of the other officers or entities that currently exist Let us give this person the title of Chief of Business Assurance or perhaps the Office of Business Assurance to relate it directly to the Federal Government The OBA's task would be to continuously gather and synthesize infrastructure-related trends and events to intelliently evaluate the technological context within which the organization operates to identify and assess potential threats and then to suggest defensive action or viewed from the positive side to assess the technological revolution's opportunities and propose effective offensive strategies The OBA must be a totally independent organization with real teeth and real power There is much in common between government and industry when it comes to the challenges and the opportunities that the technology revolution poses Both sectors face a common threat Both factors share common goals for the well-being of America and 37 her people Both employ technologies that are in essence identical and -both must work together to protect each other I leave you with this thought In the near term you will see total transformations of the way business and government is conducted internally and externally A failure to change to meet these new challenges is to risk the destruction that all revolutions bring in their wake Proactive action is the route to survival We have heard a great deal in recent months about the potential of a digital divide developing between the computer haves and the computer have-nots I believe there is another difpital divide that is growing between the American Government and its citizens If this Committee's efforts do not move forward in changing this culture of inertia there is real danger that the digital divide that exists between government and the private sector will only widen We cannot afford a situation where the governed feel that their government is out of touch and increasingly irrelevant to their lives By stepping up to the plate and tackling computer security with an innovative bold approach the Thompson-Lieberman bill significantly boosts the chances of reversing the current bureaucratic approach to a very dynamic problem Thank you again for the honor of a ppearing before you Chairman THOMPSON Thank you Mr Adams Very well said You heard me mention I am sure a while ago about all of the reports and assessments and so forth over the last 2 or 3 Vyears pointing this out Now in addition to all of that we have the President's fist version of the National Plan for Information Systems Protection The plan discusses the need to make the government a model for cyber protection As I look at it I see few concrete proposals as to how to do that As you know I am mindful of these overlays and these impressions that we tyto leave sometimes that we are doing something when we are really not Where does this plan fit into the solution to what we are talking about here today Mr ADAMS Well I would just say a couple things about that First the plan was 7 months late It is not a plan it is an invitation to dialogue a very different thing If you asked those who were involved in the formulation of the plan the will tell you that it was a business as usual government at work nightmare Every meeting 100 people would turn up They would talk about not what was good for the Nation but what was good for their existing equities The result was a bureaucratic compromise which is the document that you see that raises some interesting points But a plan will actually emerge I would guess a year from now longer Meanwhile we all march on It requires I think more than that and where the action will have to come from and the leadership will come from is exactly right here It is not going to come from the Federal Goverrnent as we know it because it is a revolution and governments do not become revolutionaries They naturally evolve which is a great strength in a democracy But in the middle of a revolution it is actually a threat and a challenge to us that we need to step up to try and meet Chairman 17HOMPSON So we are trying to do something very tough but very necessary is what you are saying an Mr ADAms Absolutely and the great thing I think that you are doing is saying yes this fleeds to be done The very difficult thing for you as you were rightly articulating earlier is how to force what needs to be done to actually occur because you say to the 0MB an inert bureaucracy in its own right you have to force other organizations to change True but how exactly and typically it does not work like that If you look at what the CIA is doing to try and embrace the revolution they formed an outside organization INCUTEL that is driving technology revolution into the organization and pushing% change from without to within and to expect or ask organizations that are comfortable with business as usual to say no no no revolutionize they will not do it Imposition of change is the only way it will occur and it will be resisted but the consequence of not doing it can he very veryerious and you can already see how relevant doe anybody in Silicon Valley think the government is-not at all Mr WATSON If I might add a commentChairman THOMPSON Yes go ahead Mr WATSON Mr Chairman the plan is not a complete plan yet but at leastChairman THOMPSON We are relevant in terms of the harm we can do them and how we can mess things up From a positive standpont it is a very good question Excuse me Go ahead Mr ATSON But at least there was enough foresight in the Critical Infrastructure Assurance Office to at least get a p lan started and it is an invitation to a dialogue They have asked industry to help complete this plan add our perspective bring in a phy sicadi- mension look at the international aspects that are not in the current plan I look forward V working with the Partnership the big P' Partnership that we just launched to help make that come to pass Chairman THOMPSON It has taken' 3 years since this all has been on the high-risk list and now when we cannot even take a baby step we are trdlking about flying an airplane and international and all these other high-sounding things which may eventually come about when China be-comes a full democracy Let me explore you obviously feel like we have to have some kind of an outside entity You refer to the OBA Where does this individual fit into the process What kind of entity are you talking about Who is this person How is this person selected Who are they accountable to Take it it is not within 0MB is what you have got in mind Have you thought that through to that extent Mr ADAms I think 0MB has got a long and traditional role in oversight and it does that job and has done so for a long time It would be possible %ohave something sitting outside of 0MB but working within the Federal Government structure but with a rather different mandate If you look at the way industry sets up revolutionary change it does so by-Steve Jobs and Apple is a good example Put them in a different building you set them outside the culture you put a pirate flag on the roof they develop their own language an d culture and they come ui with new and creative ideas o 39 What we see at the moment is the traditional organization says wwil go to the traditional places the traditional consulting cornpne They are use to forming committees pnchin button A report in 6 months Everybody think about it and roducing pdoes not doaanything Meanwhile the people who really are making this revolution occur are the very different organizations that are the dot-corn companies and there needs to be some mechanism for allowing them to have input into change So I would envisage something whorQ you Congress would mandate and budget a group that would have the ability and the authority to impose change Now there is a thought1 to impose and if you do not do it you will be held accountable in a culture remember where many of the things that government has traditionally thought of as its own self To take Cisco for example they have 26 000 employees They have three people in the whole organization doing expense accountin Now in the government you have hundreds anddth ousands or hoever many people doing the process that can be outsourced So we need to think about this and how can we make government efficient relevant fast moving changing dynamic and I do not believe that it can be done imposing internal solutions Processes and all of those things need to come from outsidetechnology people and processes They will not be able to meet the technology because they cannot procure it fast enough They cannot hire the people because they cannot afford them We cannot and we are paying much more money And you will niot have the processes because you need to impose them in a constantly dynamic way So those three things wflfhave to come from outside and the only place that can mandate it I think is Congress which will enforce it enforce a different structure a different way of thinking Chairman THOMPSON Thank you senator Lieberman Senator LIEBERMAN Thanks Again thanks to both of you I think Mr Chairman we have had really excellent witnesses today Mr Mitnick earlier made the allegation that part of the problem here though as you know he focused on the human management problem is that there is such competition particularly among software manufacturers to get the product out to the market quickly that they are not spending sufficient time to deal with potential security flaws in that software In fact you have actually gone one step to the other side really stunningly or to me fascinatingly in saying that some foreign manufacturers may in fact be putting I do not know whether you would call it a virus or something in the system that allows it to divert information back to them to be more easily hacked Let me ask you to go at both parts of that First whether Mitnick has a point that manufacturers are not spending sufficient time dealing with systems to stop security problems before they put their products on the market Mr ADAM Well we clearly know that that is correct The rush to market speed is of the essence You clearly do not waste time They are able to get away with that partly because we are all rushigforward with the revolution and absorbing it as fast as we can and partly because there is not any training there is not any process and people are not security aware 40 If there was as Jack Brock was talking about earlier A-minimum benchmark above which you have to be then there would become a market-drven demand I am not going to buy this software because it at simply does not meet my minimum standard but I Will buy this because it does So there will be a market-driven enforcer that would say if you do not raise your standards to become more security aware you are out of business Senator LIEBERMAN Yes In other words people who are doing it may advertise that as an attribute for instanceMr ADAms Absolutely Senator LIEBERMAN continuing Market it and then hopefully you drive the market Mr ADAms My security is better than his security soSenator LIEBERMAN So you should buy mine Mr ADAMS Exactly right Senator LIEBERMAN Do you want to respond Mr Watson Mr WATSON Yes sir We do see market pressure to provide more secure products and that is why we do provide a whole range of them and everyone else is getting into that game too Senator LIEBERMAN Right So that is happening now Mr WATSON U is happening No 1 demand from the market is speeding quality of service No 2 is security and that may switch We do not know There is a great enabler that security brings to freedom of use of the Internet economy Senator LIEBERMAN Say a little more about this other part of it the other side that some foreign manufacturers are putting in gaps vulnerabilities in the syfitem that they can then penetrate Is that being done by them for private gain or is it being done by their governments or what is happening Mr ADAMS If you look at the way to take just 2 China and France see the opportunity of the virtual space they see this as no different from the terrestrial environment and there is a blurring unlike in the United States between the public and private sector So what the Nation does it does on behalf of the private sector It was striking when I was in Moscow a couple of years ago talking to their intelligence people and their sort of security folks in the prime minister's office They were obsessed by what they felt were American attacks in the virtual space So any equipment they bought from overseas computer software hardware they felt had bugs of one kind or another planted in it senator LIEBERMAN That U S manufacturers had put in it Mr ADAms Yes Now I have no idea whether that is true or not What we do know is that other countries are very aggressively indeed contacting the United States both with their impregnated devices' of one kind or another and attacking through the virtual space The challenge that we have is that we still see the front line as a Nation as soldier sailor airman marine our border The front line actually is the private sector because as you were rightly saying earlier who is going to attack a soldier You are actually going to attack the power grid or the telecom or you are going to steal the national intellectual property and how easy it is because we do not actually understand the threat The awareness among CEOs or CINs in the private sector and indeed in the public sector is lamentable and yet the threat and the way the America's technological advantage and the fact that we are the most wired Nation in the world is being exploited on a daily basis is a national outrage and yet here we are Senator LIEBERMAN Is there any way for a purchaser of a software system with a bug in it to determine that there is a bug in it as they use it Mr ADAMS You can but it is very difficult It is rather-I would say that there needs to be some way of a dialogue taking place between the traditional defendors of the nation-state the intelligence community the early warning systemSenator LIEBERMAN Ri ght Mr ADAms continuingJ And those that are in the front line and need to be defended There is intelligence There is information There are things that you can do but the degree of sharing of that knowledge is very very limited indeed currently Senator LIEBERMAN One of the things that strikes me and you referred to it in a way is that not only woul d a hostile power or group think about striking at purely private systems but governmental systems and military systems even use private communication lines to convey information so that there is vulnerability in different ways So what you just said is very important There is more electronic interdependence of public sector and private sector than we generally acknowledge an d therefore a true solution to this security problem really has to be joint Mr ADAms That is right and if you think about how we traditionally see the nation-state we see it as the government and the private sector goes on and does its thing and helps the nation-state when war breaks out In the virtual space war is going to be a constant It is no different if you like to th way we were with terrorism in the early 1970s when Congress would have hearings about bombings and assassinations and the bombers and assassins could choose the time and place and the target We were very undefended We did not understand the problem This is very similar to that except the targeting has changed The methods- have changed We are moving everythng to the virtual space and the same actors are out there It is just that we do not yet understand how to manage it and it will be a comprehensive thing There is no single fix It is a series of things some of them being done by Cisco with some of the excellent things that they make some of them being done with the public-private partnership some of them being driven by leadership that is going to come from peple like yourselves Senator LIEBERMAN Very interesting As you both know but I think a lot of people out there do not know it was the Federal Government certainy through DARPA and the Defense Department that did some of the initial work that led to the Internet and to the whole information revolution Now of course we have fallen behind certainly in this computer secrt part of it behind the private sector that we in government gave birth to or spawned Do you have any ideas for what we Might do to help government both be a stimulator an incentivizer -of more sohisticated computer security technology Or in a broader sense thnking perhaps 42 idealistically what government can do to be a model itself which it is not now for computer security Mr ADAms If I can give you one statistic first 20 years ago 70 percent of all technology development was funded one way or another in America by the American Government Today that is under 5 percent So in a single generation you had an absolute transfer of energy drive and power from public to private So what that says is that there needs to be-the public sector is never going to be a model It cannot move fast enough It is never going to be a zero-sum game You are never going to get rid of the problem You are only going to be able to effectively manage it So it is how to incorporate the private how to see that the solution is outside and bring it in rather than thinking about it being inside and imposing it out and it is a very different way of thinking and a very radical way of thinking for government in its whole because government in its whole tenl to think that I am the answer and in ths case that is not it Senator LIEBERMAN I also serve on the Armed Services Committee While this is not the perfect model and it is the minority of what ha pens there is a lot more willingness to buy off-the-shelf today In act so me of our major defense systems are being built in a way tat allows patstobe pulled out and the newest parts from the private sector to be put in over time and maybe that is a model for computer security as well Mr Watson do you want to respond Mr WATSON Yes sir First or all it is true that the Internet knows no boundaries There are no more perimeters no more borders It is all cyberspace Two things though Industry tends to develop things at Internet speed and move a lot faster than most governments can move Since industry owns and operates most of the infrastructures on which the government both private government and the infrastructures that we run depend It is our responsibility to do our part to develop solutions and we are doing that Also in our studies we have discovered that you can spend a lot of time stud ing the threat but it is a lot more profitable to look at vulnerable ities and solve those to raise the bar of security So that is the direction that we are taking We are looking at vulnerabilities and addressing those That is why it is important to do security posture assessments risk assessments to look at where youareand to know what you can fix at zero or little cost as the NIASA IG said Two provisions of the S 1993 bill I think are really important One is that it does include security as an integrated part component of each agency's business model- and it emphasizes training as essential That is a multi-faceted problem Training security specialists is something we need to do and training everybody in the awareness problem and how users can better exercise security is important Senator LIEBERMAN Should we be building on the DARPA model Although again maybe the private sector is zooming so far ahead that we do not have to do that But there are certain areas in which over time we have found that because of market pressures the private sector may not invest enough in research and de- 43 veloprnent and so the government gets involved to do that Is this an area where we ought to be targeting more Federal money in R D and computer security breakthroughs Mr WATSON Before we will know the answer to that it is izpportant to have some kind of a clearinghouse and finding out what industry is doing what academia is doing what the government could target its money so it is not duplicating efforts And I think the vehicle that we have in place right now it is just a beginning is the Partnership for Critical Infrastructure Security anrmaybe the POIS recommendation for the Institute for Information Infrastructure Protection might be able to be that clearinghouse Senator LIEBERMAN Senator LIEBERMAN aih Mr ADAMS I also think though that the way of-you take the DARPA model- Right Mr ADAMS continuingi You speak to folks at DARPA nc N as you I am sure know they focus not so much on inventing the new but integrating what is there a different thing Private industry is moving very very rapidly disco invests more money in thinking about new stuff-on securing the Web than the government could ever really get together Senator LIEBERMAN So maybe there is not a need for us to do it if the market is driving 'it Mr ADAMS But may be there is a different way of doing it I mean what is there that the Federal Government can do to influence the outcome for the Nation Education is fundamentally importat We go home at night we unlock the door We leave in the morning we turn on the burglar alarm we look the door we make sure the windows are shut and so on Nobody is being trained in these elementary things There is an enormous amount that could be done in education in schools in universities in funding programs seed money that would ensure the security of the NRation going forward into this century rather than looking at well we have put in a spot of money here but instead thinking about this in a national context What is the best for the Nation as a whole that we the Federal Government can facilitate because the private sector is continuing again to drive this revolution So education is extremely important Awareness is extremely important And this is a major national security issue so there are things that can be done from the Federal down to the local level Senator LIEBERMAN Thank you both You have been excellent witnesses I appreciate your time Mr WATSON Thank you Chairman THOMPSON Could I ask just very briefly how would you sell that from a national security standpoint We talk about educating the young peop le and bridging the gap between the rich and the poor and all hat but how would you articulate the necessity to do that from a national security standpoint These are kids They are obviously going to use it in the short-term for things other than that But from a long-term national benefit are -there not going to be just specialists that do that sort of thing For the masses it is certainly beneficial and maybe necessary but does it really have to do with national security Mr ADAMS I would not posture it quite like that Let me give you a brief anecdote I was in a meeting about national security American national security a little while ago talking about future threats 5 to 10 years There was general agreement that China is a very significant threat to the United States At that same meeting one of America's leading high-technology companies they had one of their senior officers there and he was describing how they have had to make an investment decision about a new technology product that they are making a new next step in the revolution Thi is an American company Where do we the place where there is a customer base where we go tolabor go0 haveWe cheap and we have a high number of engineers Where do they build their new factory China National security is irrelevant So the argument is not national security The argument is what is going to be the resource for America in this century Answer trained and qualified people who can manage and master the revolution As part of that as part of that education process just as you get trained in sanitation or good health practices so you get trained in good security practices It is part of being trained as an information specialist Chairman THOMPSON In order to remain in a leadership position in the global economy you have to maintain the productivity and therefore maintain your technological advantages and-r therefore you have to have the educational background Mr ADAMS Exactly and that is something that the government can absolutely influence the outcome of Chairman THOMPSON What kind of group was this that you said you just attended Mr ADAMS I would have to talk to you about that outside Chairman THOMPSON All right Mr WATSON I would suggest incentives to collaborate with the private sector Cisco networking academies are in all 50 States and 25 foreign countries We are adding security modules into that training We build security training syllabuses and training partners deliver that training We would view Federal requirements for security training as a market pressure and we would develop products and services to meet that demand Chairman THOMPSON Mr Watson in your background with regard to information warfare do you subscribe to the notion I have heard some say that it is almost for sure that in any future military attack one industrialized country against another that it would probably be preceded by a cyber attack Mr WATSON I would say that was possible and maybe even likel Chairman THOMPSON What would you think Mr Adams Mr ADAMS I would say that most countries that have an information warfare capability see that as a precursor to full-scale war and indeed the full-scale war itself may occur in the virtual space The interesting thing its that while America has a capability in this area the lawyers have not yet decided what is war in the virtual space So we may be attacked and in serious trouble before we can do anything about it 45 Chairman THOMPSON One final thing Senator Lieberman and you mentioned the shift of capability from the government to the private sector and now we are hero in our legislation trying to decide what government should be doing first of all about itself and managing itself You heard the GAO testimony about the government needing to decide minimum standards I am wondering what is going on in the private sector out here How is that going to interface with what we are trying to do Should the government be setting standards for itself minimum standards and as it is purchasing the hardware software servicing and all from the outside or should these be private standards determined by the private sector that we incorporate Do you see what I am trying to get at How does that interrelate Mr ADAMS I think there are two different things that you are addressing What we have at the moment as this revolution has unfolded is a multitude of stand ards-h ardw are software different in America different in Britain different in France all over the world Yes it is a common arena as Ken was saying earlier and for the government or governments more likely the World Trade Organization to agree on a common standard is completely unrealistic I think It would take years and just will not happen More likely will be if you go back to the housing probl uis at the beginning of this century in the United States a tremendous amount of poor housing that were in very bad shape Nobody could agree what to do about it but when the insurance industry said OK here is a minimum standard or elise you do not get insurance If yo do not have insurance you cannot have a mortgage Lo and behold the standards raised up and the standards of housing went up with it The market drove the solution in other words and I think exactly the same thing will happen here There has been lots of talk about minimum risk standards and that needs to be applied Two things will drive it One will be down value chains You are going to do business with me you need to be affirmed at this risk level of some kind or another certified at this risk level and if you do not then I am noL- going to do business with you And the second will be the insurance industry which will say if you are going to be insured with me just like if I issue you with a house insurance policy you get 10 percent off for this burglar alarm 15 percent off if you are connected to the police station so it will be a similar thing in the virtual space So those two market factors will drive it Chairman THOMPSON So instead of the government requiring certain standards of private industry private industry would be requiring certain standards from the government Mr ADAMS Exactly Mr WATSON And we are already working in that direction We are o ilgewth beinn f the insurance and audit industries to develop standards T-here are no standards across the board for security posture assessments or penetration tests or white-hat hacking or whatever you want to call it If you ask two companies to give you an assessment of your security you will get two com- pletely different answers because they are based on different standards There is no standard training program for netv ork security engi neers to certify that someone has the skill required to do that kind of atn assessment There are no standard ratings for security in a network How would you do that anyway It would be an instantaneous security state bu how would you say if you have a firewall you haveand one level of standard If you have a firewall intrusion detection remote monitoring you meet another security stand- ard that could be insurable Those are the kinds of questions that we need to address Chairman THOMPSON Well you know the GAO has these befit practices and so forth Do we not have any minimal standards without being so minimal that they are meaningless Mr WATSON They are just not defined yet Mr ADAms And there is no common language we all speak-it sounds similar but we all interpret it differently and you can give yourself a tick in the box which actually you are nowhere near where you should be Chairman THOMPSON Thank you very very much We appre- ciate it Senator LIEBERMAN Thank you Chairman THOMPSON The record will remain open for 1 week after the close of the hearing We are adjourned Whereupon at 12 50 p m the Committee was adjourned A PP EN DI X ftwp Steet Of UVLA Kitaick Honorable Chairperson ThomVon Disingished Sentors AMd Members o1 the Conunitt4te My name is Kevin MitnckI apear before you tWay to discvia your ef ot to create tegialation that wiW0ess the luur ecurity and retiabibty of inormatin systems owned and operate by or on behai o the federal governmnt I am pgisAnaly self-aught My hobby as an adolescet consisted of studying methods ta' tjcs anm MOOaaie used to crcwumvent computer serity and to learn more about how CooIput systems and talecommuftcation systeuis work IM I95 Ieduated cum laud in Coutputer Systems an Programming from atechnical college in LoAs Arq #4 California and went on to P am# %plt a poet-grduate project in das r aomw secunty applictions that ra on top of acomputers peratN sysarn Tat pwt-padat prjet ay have been one of the suasM ersople o1tr the hbdcor the so admWatrators realized I w a hadlag intothel computers in ways that they comldnl prevent an so they aske me to dein security enhArcements that would stop odv urauoiz aces Have 20 yeiaa empans dreurnvening infcwumatort security meaasv wcano that I have surves1ully oompru Id all systems that I targeted for unauthorized acess report one I have two year experietwe asa private investigator a my responalalities indudwdsave locatirq people en d hi asset u in sodal a inemng trque My expczienc a Msesc at accusin Mnobtain i foroaton korn computer systems 6M drew national attention when I obtane user nantuals for the COSMOS computer sysems Computer Systems for Mainhraie Operations used by Pacific UeLl Ten years later the novel Cybespuink was published in 1991 which purported to I a1ruo co ofmy actions that resuted in my waet on federal dwrges in 196 One authof that novel went on to writes imilarly fictionlakl Irepcwrs Abo'u a fo ofh theo York Timms including acover story that appeared July 4 1W9i That largely fictitious story labeled me without measn jusaifcatiooN or proof as the worldss most wanted cyberciiminal Subsequent median repo distorted that daimff into th fas daim that Iv wa th fis oaken the FBls Ten Most Wanted- lift That hime exaggerationi was mos recently repeated durin my appearance on OChts burden o Proof program on February 10 2M0 MicdeeWNWt of the Associated Pross usweard this msus with the FBI and FBI seprese tatives denied ever Lnd uding me on tei -Ten MostWanted' List I have gained unuthorlimd access to com puter systems at some of the lagSt corporait ona the planet and have v Lccessfuy penetrated somne of the rrot resiient computer systems ever developed I have used bot tedmicai a non-tednica means to obtain the source code to Various operating systems and tae mmunications devices to study their vulnrmabibbtes and their irne woecUVL After MY arrest in 1995 1spent years as a pretrial detainee without benefit of bai abail Fobkay K W V-bNtt SeWO 47 0 $WNW Oa Aftft COMNIM Pops I d 5 48 hearing and without the ability to sce the avidcim against ma cocibirjed wnhumtancos which are w xcodented in U S history according to the research of my defense team in March of 19991 pled guilty to wire fraud and computer fraud I was sentenced to 68 months in federal prison with 3 years supervised release The supervised release restrictions imposed on me are the most restrictive conditions ever imposed On An individual in U S fed ra COUrt gainacCOrding to the research of my defense team The conditicins of supervised release include but are not limited to a complete prohibition on the posslon or use for any purpose of the following ccll phones computers any computer oftware programs computer peripheral or support equipmtnt personal information assistants modems anything capable of acusinS computer networks and any other electron equipment presently available or new tachndog that becomes available that can be converted to or has as Its fwin the abiit to act as acomputer system or to access Acomputer system computer network or telecmuiations network In addition to these atardinaqy oxx dions I am prohibited from actin$ as aconsultant or advisor to individuals or groups enVragd in tiny computer-related activity I am also prohibited frcxn access4jg computers computer networks or othe forms of wireless communications myself or through third partie I was released from fede a prison on January 21 200 just 6 weeks a I served 59 rfonths and 7 days after earning 180 days of tim off for good behavior I am permitted to own aland line telephone Computer Systems and Their Vulnerabilities The goal of inormation security is to protect the integrity cofldcriiality availabilty and Imcoto to the Wnormatjon Secure information isprotected aganst tampering dclurand sabotage 71-a practic of information security reduces the risk associated with loss of tutin the integrity at he Wnormation Information security Iscomrised of four primary toisphysical security network security computer ysemssecurity and personnel security Each of thes four topics dumeves a complete book it not several books to fully document them My presentation today is intended to provide abrief overview of thefe topics and to present my recommendations for the manner in which the Committee may rate effective legislation I Physical Security 1 1 Uncontrolled physical access to computer system and computer networks dramatically increase the likelihood that the system can and %willsuffer unauthorized access 1 1 1 Hardware Security -- Febvy 2 2000 K Mtr k $La smv l w% O'r G aim CommJ te Pop 2of 4 49 Computers may be locked in rooms or buildings with guards wc'riy c ndcypher controt ed doors The greatest risk to infomiatixn security in apparently secure hardware environments isrepresented by employees or impostors Who apear to possess author tion to the secured space 1 1 2 DatsaSecurity Many goverment agencies require formal backup procedures to tnw r against data loss Equally strngnt equtmints must be in place to ensure the intei nty and security of those backup files Intruders Who cannot pin access to secure data but who obtain unauthorized access to data backups suaccesslully compromise any security measures that may be in pace and with much less risk of detection 2I Network Security 2 1 Stand-alone computers art less vulnerable tn computers that are connected to any Waid Computers cwretd to neworks typically offer a higher incidence of mu aion or inappropriately enabled services t0a coinputers that are not connected tony network The hierarchy of network insecurity is as foiows - Stand-alone computer - least vulnerable - Computer connected to a LAN or local area network - more vulnerable -Computer and a LAN accessible via dial-up - even Lflmr vulnmrble - Computer and LAN connected to Internet - most vulnerable of all sietwork of 2 1 1 Unenarypted Network Comuicationh Llnericypted network comunications pemit anyone 'With physical access to the network to use software to monitor all information traveling over the network even though it's intened for someone else Once a network tap is installed intruders can mordtor al network traffic and izatuil software that enables them to capture or sniff passwords from network tranasissiuns 2 1 2 Dial-in Access Dial-in access increases vulnerabilities by opening up an access point to anyone who can access ordinary telephone ines off site access increases the risk of intruders gairting access to the network by increasing the accessibility of the network and the remote computer 3 Computer Systemr Security 3 1 Computer systems that are not connected to any network present the most secure computing environment pcxssie However even abrief review of standalone computer systems reveals many ways they may be ccxnprouutsed3 Operating Sys toms The operating systems control the functons of the computer how information is stored how memory is managed and how information is displayed --ir's the master propra of the machine At its core the opcrating system is a group of discrete software programs that have F W Uaq 29 2000 K UJ kk $lhlffl to Ser W Go' Affaki Camvt Pape 3S 50 bee assembled into Alarger program containing millions of lines of code L-argeModern day Operatingsystms cnnot be thorouNy tested for security anoUMeOr Iholes which represent COPPOrtUnitie$ fOr unauthorized acms 3 1 2 Rogue Software Protrains Rogue software applications can be ilntaied surrepttiously or with the unwitting p another These pmrogas can Install a-back door which usually consists of prosranumln of Instructions that di ablbsc uvesecuity sott'n in an operating system ad that enable 8 future Oct witho it dtectio some ba door program even WSo the passwords used to gaini access to the cunproinised system c r stems for future use by the intruder 3 1 3 Ineffective Passwords Computer users often choose passwords that are in the dictionary or that have persorws re e'eWan are quite predictable Static Or unchan paswyords represent another easy method 10r breQachin8 acomputer system- once apassword isCOMP viU514 the user systembaminrators have no way of knowing the password isknown to an intruder and tOe Dynamic pessWords4 or non- dictionry passwords are probleatic for mny users who wri te them down and keep them near ther computer for easy acces - their own or anyone who breaches physical security of the computer Installation 3 1 4 Uninstalled Software Updaktes Out-fdatG system software containing known security pWolems presents an eay target to an intruder Systems adnidstrators cannot keep systems updated as aresut of work overload competing Priorities or ipytcewice The weakcneses of systems arn publiid aM outadat systems tptcfy Offer w G- wn vu nwamiUdes for access 3 1 5 Default Ialations Default Installations of some operating systems disable many of the built-in security features in given OPerting systm n addition ysem administrators untintenuonaijy miscomlgure systems or include unnecessay services that may lead to unauthUte d acess Againthes Weaknesses Are widely publized within the computing couununity and default or MiSCOnfigured installtions Present an easy target 4 Persortnel Socuxity 4 1 The Most Complex element in jirdojtion'security is the people who use the systems in which the information reside Weaknesme in personel security negate the effort and cost of the Other thre tpe of security physical network and Computer system security 4 1 1 Social Engineering Social enginteein or ap is defined as gaining intelligence deception Employees are trained to Mhelf W andto do what they are told inthrough the workplace The skilled social enginee will use these traits to his or her advantage as they seek to gain ifr t that will enable them to achieve tlerojetvs F Ouu29 K Mtrk mewotto10BerWOMGOvnAffaim con % e Pap 4018e 51 4 1 EMU Attachiments Ema attachments may be sent with covert code embedded within Upon receiving the emaiJ most people will launch the attachment which coni lower the security setting on the target machine without the use's knowledge The likelihood of a successful instaltion using this method can be increased by foliow n up the email submittal with a telephone call to prompt the person to Oon the attachment Information Security Exploits Information security expoits are the methods tactics and strategies used to breach the integrity cmfilentality availabilty or acces conrl of information Discovery of conprmnise ifrmation security has se veral consequences the most important of which is the decline in the level of trust associated with the ccwNipronused inforrmation ar systems dtha contan that infosmation Examples of typical smiuty exploits fWlow 5 Physical Security Explits 5 1 Data Backup Exploit Using deception ot sheor bravado the intruder can walk into the off site backup storage facility Adask for the physical data backup by pretending to be from acertain agency The intruder can claim that particular backup ispecesey to perform adata restoration Once an intruder has phycal possession of the data the Untruder can work with the data as tough he possese superuler or System dninistratx prxivilges 4 S 2 Physical Access Exploit I an ititruder gans physcal accs to acomputer and isable to reboot it the intruder can gan complete control of the system and bypass All security measure An extremely powerful exploit but one that exposes the intruder to great personal risk because they're physically preset on the premises 5 3 Network Physical Acoess Exploit Physical access to a network enables an intruder to install a tap on the network cable which can be used to eavesdrop on all network traffic Eavesdropping enables the intruder to capture paswords as the travel over the network which wil1 enable full access to the machines whose passwords are coanPromiised 6 Network Security Explits 6 1 Network software exists that probes ccrniputes for weaknesses Once one system weaknesses are revealed and the system is comprcunise the intruder can install software called sniffet software that compromises all systems on the network Following that an intruder can install software that logs the passwords used to access that compromisedl machine User routinely use the same or similar passwords across multiple machirvw thus once one password for one machine isobtained then multiple machines can be compromised FoW4 Wy 2M wvmGO K krk Smisortto PIQS c Afkv 52 see t Personnel Seturity Exploits' x 7 Computer System Exploits 7 1 Vilneabilites in programs e g the UNIX program sendmal canl be exploited to gain remote access to the target computer Many system programs contain bugs tht enable the n ht Whic sinteried in order intruder to trickthe softwunto Wavgna way Ourt to gain wuauthoized access rights even thouh the application isApurt of the oerating system of the computer 7 2 A misconfiguzed installation on acomputer in operation at the Raleigh News and Observer a papa in Raleigh North Carolina demonstrates the problenvitic aspect of system nisconfXurbon Using the UNIX program 'Funger which cables one to identify the user that are curretly loggd into acomputer system I created auser name on the computer system I control eD user name IAssgned myself matched exactly the user name that existed on the target host The misconfigured system was set to 'trust any computer'on the network which Mef the entire network open for unauthorized acces 8 Personnel Secusity Exploits 8 1 SociaJ Engineering - Involvos trickcing or persuading people to reveal information or to take certain actions at the behest of the intruder My work asapuivate Invadtgator relied heavily on my Wit s in socal engineering In my successful efforts to social eqniee my way into Motoirola I used a three-level socal engineering attack to bypass the information security measures then in use Frst I was able to convijice Motorola operations employee to provide me on repeated occasions the pass code on thoix secwlty access device as well as the tatic PIN The reamo this was so extiaordinary is that the pass code on their acces device chi rged every 60 secon i vory time I wanted to gain unauthorized access I had to call the Operations Center end ask for the password in effect for that minute The second level involved convincing the employee to enable en count for my use on one of theis machines a M thtiWd level involved convincing me of the engineers who was already entitled to iacces one of the computers to give me his password I overcame that engineer s vigorourv5rluctance to provide the password by convincing him that I was aMotorola employee and that I WAS looking At Aforni that documented the password ftht he used to access his personal workstation on Motorola's network -- despite the fact that he never filled out any such farmi Once gained acces to that machne I obtained Telnet access to the target machine access which I had sought all along 8 2 Voice Mail and Fax Exploit This expit relies on convincing an employee at alarge company to enable avoice mailbox the intruder would call the people who administer the voice miaboxes for the tage company and request a mailbox The pretext would be that the intruder works for a different division FeWwy 29 2000 r MW S a WW 10 SO G yfAff %COMM BK Poa ala 53 and would like to retrieve messages without malting atoll calL Onceth4 intruder h a acess to the voice mail system the intruder would call thie reeptionst -erement himself as an employee of the companY and ask that they take messages for hirnlast but not lou t the intruder would request the fax number and ask tha incoming taxes be held for pidcup This sets the suag for the call to the targetdivson of the company At this point the intruder would call the target division to initiate the fax explit with the goal of obtaining the targeted confidential cinp Jy information During that call the intruder would identify himselI as an employee of thie division whose voice mail and fax systems have Just been cmxpunised he would cie tine voice mua box in support of his identity and would social engineer the target employ into faxing the target information to the compromised fax number located at on e of their ther offices Now the intruder would call the'receptiontist tell the receptionist that he's in a business meeting and ask that the receptionis fax the confidantial material %o the hotel The itruder Picks up the fax containing confidential informnationi at the secondary fax which cannot be trmiced beck to eithe the intruder or thne targeted company I used this exploit to successfully compromise A7Is protected network access points routinely ATT had learned that a system had been compromised by unauthorized entry at a central network access point called'-DataKit They imposed network access passwords on all mis an used Datalits to Inhibit unauthorized access 1 contacted oto h nnjr tn0 secretary tofx me the password that enabled access tora the Fax Explidt to cciwi Dauiit that controlled dial-up acces to AT worldwide computer network 9 Reca mridations The Voice Mail anid Fax Exploit demonstrates the most important element in my testimony today that verification inechanisms are the weak link In information sectuity and voice mail and fax are the tools used to verify the authenticity of the credentials presented by someone asking physical network or computer systems access The rnithods that will most effectively nimize the ability of intruders to compromise Wiotmati security are con prihonsive use training and education Enacting poLicies and procedures simply wont suffice Even with oversight the policies and procedures may n-ot be effective my aocss to Motorota Nokia AlT Sun de 1 nded upon the willingness of people to bypass polities anid procedures that were in place for yeazn before I compromised them succesfully The corporate security measures that I breached were created by sonme of the best and brightest in the business some of wvhomn may even have been consulted by the commnittee as you drafted your legislation Senate Bill Si 993 S1993 is represents a good first step toward the goal of increasing information security on computer systems have several recommendlati ons that I hope will increase the effectiveness of your bill -governm enlt VFtb'uuy 29 00 K M rkk StAtarnet 10Senalm GOVTI flAtalguCO Mnl Ppgs7o1 54 I Each Agency perform a thorough risk assessment of the a sets they want to protect 2 Perform a cost-benefit analysis 1to determine whether the price to protect thoue systems represents real value 3 Implement poIicies procedures standrd and guidelines consistent with the risk assessment and cost benefit anayses Enplo e training to recognize sophisticated social engineeriN attacks is of paramount importance 4 After implementing the policies poedureS standads and guidelzs create an audit and oversight program that measure compliance throughout the affected government agencies The frequncy of those audits ought to be determined consistent with the Mission of a particular Sency the more valuable the data the mom frequent the audit process 5 Create a numeric 'tust rarking' that quantifies and swnnulrzes the results of the audit and oversight programs described above The numeric trust rarnizg' would provide at-aglance ranking - a report ca4d if youj will - of the characteristics that corise the four major categories defined above phyllcal netwwlc computer systems and personneL 6 Effective audit procedures - implemented from the top down - must be part of an appropiate system of rewards and consequences in order to motivate system administrators personnel mnagers and govertnent employees to maintain effective information security consstent with the goals of this committee Conclusion Obviously a brief presentation such asthe one I've made toay cannot convey adequately the mxeasures needed to implement effective information security measures l'm happy to answer any questions that mnay have been left unanswered for any members of the Cominmttev 2000 29 2000 FObr ry 29 F Wwy K Mkri k Stasenfft k Serets GoVil Afta gIComanI popSdcO 16 55 USUM ISBtats OemeralAcomt gOffift GAD Tesdmony Before the Committee on Gomenital Affib U S Senate Fm Reabow mIDommy Uwq e 4at 105a 3 7- ft manh 21 m INFORMATION SECURITY Comments on the Proposed Government Information Security Act of 1999 0 w tofJwk L rk'ockJr Dlret 0ovwrx ko n Dde wd GA GAWV-AIND-00-107 bfxa BYM r C Mr Qiamian and Members ofthe Commniue Ilam pleased to be hems to discuss S 1993 the Government Information Security Act of 1999 which seeks to strengthen irtfoimaslo seUInty pacft sthuugbou the fedWWal gVernnrbeL Such efforts s ncessay and criticaL Ott wok has shown tWhAlmost all gOVeruMWa gecift ame plagued by poor compxte security Recent events such as the denial of service attacks lA month indicate the damag that can occur when an organization's computer security defenses an' breached However Mr Chuinnan let me emphiasiz that the potential for mrese nrgm disrupdon is sgnicsnt As I stated in rewen testimony our naions cmuter-based infraitutuat at increaang risk of sevem' disruption The dramatic increase of computer interconnectivity while beneficial Inmany ways has provided pathways among systems tha if not properly secured can be used to gain unuhorized access to dau an operates from remote locations Oovalmi wit officials we imceasingly worried about attacks from individuals mod groups wi th malicious Intentions such as terrorists and nations engagin in information warfare 1 S 1993 provides opportunities to address this problem It updates the legal framework that supports federal information secure tyrequirtments and addresses widespread federal information security weakneses In particular the bill provides for a risk-based approach to information security and independent annual audits of security controls moreover it approaches security from a govenwmtwide perspetive takin steps to accommodate The significantly varying information security needs of both national security and civilian ageny operations 'CjidcJli fmzw uPnwwtwLon Ccriwiws on the Nxawnl Plan ofo noon Synou Protection UAO T AADf-OO-72 Pebruiy 1 2000 Mr Chaiman I would like to discus bow these proposals cm lead to vAbtantia improvements tn federal Wncy pufortmrc e In ackruing computer security is es to addition I would like to raise two additional -cs -the need for better-defined control standards and centralized na -hAut if addrassd could further strenthen security practce and oversight Thes two conocus ntslt farthe atwtio as the Commnittee move ahead with its work in this area Improvements in ageny information security practices am sorely needed Our October 1999 analysis of our own and inspector general adts found that 22 of the largwt fedeal agencies were not adequately protecting critical federal operatons-wxd asset from computer-based attacks 2 ighlighting attention to this problem over the peAs 12 months was the disruption of operations at some government agencies caused by the Melissa computer virus as well as a series of federal web site break-ins As in paut analyses we concluded that addressing this widesprad and persistent problem would require significant management attention and action within individual agencies as well as increased coordination and oversight at the governmentwide level Our most recent individual agency review of the Environental Protection Agency EPA corroborated our governmentwide anaysiS 3 Overall we found that EPA's computer systems CaiicaJ M4wfrasr v Proecroit Comprehawe rralqy Cain Draw on Year 2000 Expedimces OAOIAD Ifomadi Secuiy Furdamemml Weaknam Place EPA Data ad Operations at RIAk OAWfFAIMD-0O97 Februay 17 2000% an and the oWeatons that Mey on thee systems were highly vulnerable to tampering disruption and misuse EPA's own records identified several serious computer incidents in the lant 2 yew that resulted Indamage and disnutoon to agency operations Moreover our tests of computer based controls concluded that computer operating systans and the agencywide computer network that support most of EPA's missxIorlated ad financial operations were riddled with security weknessI EPA Iscurrently taking significant steps to address then weaknesses However resolving EPA's infcvmato security problem will retluire substantial ongoing management attention since security program planning and maaeetto date have largely - been apaper exercise doing lite to substntvely Identify evaluate and mitigate risks to the agency's data and system Any fixes made by EPA to address specific control weaknesses will be temporary until thes underlying management issues are addressed EPA Is not unique Within the post 12 month we have identified significant amagement weaknesses and control deficiencies at anumber of agencies that effiectively undermine the integrity of their computer security operations In August 1999 we reported' that pervasive weaknesses in Department of Defense information security continue to provide both hackers and hundreds of thousands of authorized users the opportnity to modify steA inappropriately disclose and destroy sensitive DOD data Among other things these weaknesses impaired DOD's ability to control physical and electronic access to its systems and data ensure that software running 'DOD In ormwon Secu'rly Serious WaJustIj onlaw so Place Dvfoue Opewram at i 107 Ausust 26 1999 OAO AIMD 99 V 59 ad its systems isiropeslY uthoz44d to ed an4 functoning as lntwed4 and resuine opendtons in the event of adisease In May 1999 we reported' tht as paut o our tests of the National Aeronautics and Space AdminItstaion's NASA computer-based controls we successfully penetraed several mission-critical system including one responsible for calculating detailed positioning data for each orbiting spacraft and another that processes and distibutes the scientific data received from thwe spaecrft Having obtained access we could have disrupted ongoing commd and control opeatons and modified or destroyed system software and data In August 1999 an independent accounting firm reported' that the Departumt of State's mainframe computers for domestic operations were vulnerable to unauthorized accss Consequently other system which process data using these computers could also be vulnerable A yea earler in May 1998 we reported' that our teats at State demonstrated that its computer system and the information they maintained were very susceptible to hackers terrorists or other unauthorized individuals seeking to damage State operatons or reap financial gain by exploiting the department's information security weaknesses Mformasiow Secariy Many NASM Missim-Critical System Face Serious Risks OACYAIMfl 99-47 May 20 1999 'Asidi of the Departmen of tau 1997 ad 1998 PrincoWa Financial Stwemenu Leonard 0 Birnbaum and Company LLP Augus 9 1999 'Compsuer Security Pervasive Seriou Weaknesmes Jeopardite Stae Department Operiiori aA0 AM98 14S May I5C 1998 60 1n October I99 we reponod' that serious weaknesses placed sensitive information belonging to the Depatment of Veterans Affatirs VA oftrisk of Inadvertent or dsiibersae misuse fraudulent use 1mprope dsclosume or destruction possibly occuring without detection Such findings were prticury troublesom since VA collects and maintains sensitive medical record and benfit payment information for veterans and family members and is responsible for tens of billions of dollars of benefit payments annually Although the nature of operations and related risks at these and othe agencies Vary then' are striking similaritis Inthe specific type$ Of weakSnese reported The following siX MLE Of maaeet and general control weaknesses ame repeatedly highlighted in our reviews Enti Seusf PrgrmPtwmnng and Maaagemensi Each oa ilzaton needs a set of management procedures and an organizational framework for identifying and assessing risks deciding what policies and controls arm need periodically evaluating the effectiveness of these policies and controls and acting to address any identified weaknesses These are the fundamental activities that allow an organization to manage its information security risks cost effectively rather than reacting to individual problems ad hoc only after a violation has been detected or an audit finding has been reported Despite the importance of this aspec of an information security program we continue to find that poor security planning and management is the rule rather than the exception Most agencies do not develop security plans for major systems based on risk have not formally documented 'Inormaioui Sysem The Stau of Com puter Secauy at til Depont of Veterwu Affain OAO AIMD-OO-OS October 4 1999 61 aecurity policies and haoe not implenmntd programs for testing and evaluating t effectiveness of the controls they rely on Awnm Ceawols Acoms controls limit or detetw aprpit access to computer resowves dama equipment and facilities thereby protecting thes resowves against unauthorized modification lows and disclosure They include physical proteictions such as gates and guuids as well as logical controls which are contrls built into software that 1 require User to auhniaethemselves through passwords or other Identifiers and 2 limit the files and other resouces that an authenticated user can access and the actions that he or she can execute In many of our reviews we have found that managers do not identify or document acces needs for individual users or groups and as a result they provide overly broad access privilge to very larg groups of usem Additionally we often find that users share accounts and passwords or post passwords in plain view making it impossible to trac specific trunsctions or modifications to an individual Unfortunately as areslt of these and oth e m control weaknesse auditors conducting penetration tests of agency systems are almost always successfu in gaining unauthorized access that would allow Intruders to read modify or delete data for whatever purposes they had in mind Applicaton Software Development and Chanige Controls Application software development and change controls prevent unauthorized software progwams or modifications to programs from being implemented Without them individuals can surreptitiously modify software programs to include processing step or features that could-later be exploited for personal gain or sabotage In many of our audits we find that 1 testing procedures are undisciplined and do not ensure that implemented software operates as intended 2 8 63-639 00-3 62 iinplenwntatdon procedures do not enswm that only xxthorized software Isused and 3 acceas to software S program libares is inadaqutey controled iuou 4fD iin Segrtion of Wles refersito the police procedures an organizational structre that help aenr that one Indvldual cannot independently conrol all key aspect of a process or computer-related operation and theeby conduct unauthorized actons or gain unauthorized scces to assets or records without detection For example one computer program should not be allowed to independently write tent and approve program changes We commonly find that computer programmers and operators ame autoized to perform a wide variety of duties thus providing them the ability to Indepexndty modify circumvent and disable system mecrity features Similary we have also identified problems relaWdto transction processing where all user of afinancial Iaag ietsystem can indpendently perform all of the sep needed to initiate and complete apayment System Software Cefo W System software controls limit and monitor sces to the powerful programs nd senitive files asociated with the computer systems opema e g operating systems system utilities security software and databae management systems If controls in this area are inadequate unauthorized individuals might use system software to circumvent security contPOIR to read modify or delete critical or sensitive information and programs Such weaknesses seriously diminish the reliability of information produced by all of the applications supported by the computer system and increase the risk of fraud sabotage and inappropriate disclosures Our reviews Frequently identify systems with 63 inufcety restrcWe wccss which makes it possible for knowledgeable individuals to disable or circumvent controls in awide variety of ways Se CoxisiutyCeistIpLr Service ciminity controls ensure that critical operations can continue when unepecte events occu such as atpoary power Mee accidental loss of files even a umo disaster such as a fire For this reason an agency should have 1 proceure in plso to proec informaton resources and minimize the risk of unplanned interruptions and 2 a plan to recover critical operations should internptions occur At many of the agencies we have reviewed we have fowid that plans and proceidures are incomplete because operations and supportng resources had not been fully analyzed to determine which were most critical and would need to be restored frt In addtion disaster recovery plan are Mfen not fully tested to identify their weaknesses As aresult many agencies have inadeuate assurance that they can recover operational capability in atimely orderly manner after adisruptive attack Unfommuntely in addressing these problems agencies often react to individual audit findings as they are repored rather than addressing the systemic causes of control weaknesses-namely poor agency secutity planning and management S 1993 recognize that this approach is unworkable in today's environment 64 S IM9 PROPOSA CAN LA DIO MMMAN RUR MAA S 199 starts with tE basdc premise that computer security can only work within agency if a strong management framework is in place The bill in fact incorporawe the basic tenets of good security managemnt found in our report on security prccs of eading oranizations prepard at your request in 1998 ' The 1 411 propose improvements in three signficant areas e following a risk-based approach to information security performing independent annual audits of security controls and approaching security from nigovernmentwide perspective taking Into account the varying information security needs of both national security and civilian agency operations If effectively implemnted these proposes should help federal agencies improve their information security practices aind considerably strengthen executive branch and congressional oversight The first improvement ame would require a risk management approach to be implemented jointly by agency program managers and technical specialists Instituting such an approach is important since agencies have generally done a very poor job of evaluating their information security risks and implementing appropriate controls Moreover our studies of public and I 10numcion Security Mwwmaeu'I Leamin Fnmm LbdinS Organlzaioeu GAO AIM 9-1 May 1998 1 65r privatebestpractices have shown that effective seckrity program -mng etrqi implanenng a process th provides for assessing in atlon security toppuoerinsand aset an idn gfinm mods for protection selecting and implemntng controls that modt tse needs proing awareess of risks and responsibilities and implementing a program for routinely testing and evaluating policy and control effectiveness The key to this process isrecognizing that inforrmation secwliy is not atechnical matter of locking down systems but rather amanagment problem tha eur nemnhgnwW security risks to program opertions and assets and enuring that appropriate steps are tame to mitigate these risks us it Ishighly appropriate that S 1993 requires a risk management approach that incorporates thewe elements The second proposed improvement ame isthe requiremnt for an annual independent audit of each ageny information security program Individually as well as collectively these audits can provide much needed information for improved oversight by the Office of Management and Budget 0M B and the Congress Our years of auditing agency security programs have shown thatilndlepe ndent tests and evaluations are essential to verifying the effectiveness of computerbased controls Audits can also evaluate agency Implementation of management initiatives thus promoting management accountability Moreover ta annual independent evaluation of agency information security programs will help drive reform because it will spotlight both the obstacles 66 and progress toward improving information security much like the financial statement audits required by the Chief Ficial Officers Act of I99 Agency financial systems am already subjecied to such evaluations as part of their annual financial statemait audits However I would like to note that for agencies with significant nonfi nancial operations such as the departments of Defentse and Justice the requirement for annual Independent information security audits would place a significant new burden on existing audit capabilities Accordingly making these audits effective will require ensuring tha agency Inspectors general have sufficient resources to eithe perform or contract for the needed work Third S 199 takes a govemnietwide approach to information security by accommodating a wide range of information security needs and applying requirements to all agencies including those engaged in national security Under current law distinctions between national security systems and all other government systems have tended to frustrate efforts to establish govemmnentwide standards and to share information security best practices S 1993 should help eliminate these distinctions and ensure the development of common approaches across government for the protection of similar risks regardless of the agencies involved This is important because the information security needs of-civilian agency operations and those of national security operatons have converged in recent years In the past when sensitive information was more likely to be maintained on paper or in stand-alone computers the main concern was data confidentiality especially as it pertained to classified national security data Now virtually all agencies rely on interconnected computers to maintain information and carry 67 out Owop mN ig an essential to thei missons While tde confidentiality needs of thos dam vUy ill asacles must be concened eiou tMtegit an th ev Ut of their systems and data It is lmpostkw for all agencies to undeatand then various types of risks and take apropriate steps to mmanae he X Q3M 3 AROFl72ffQL1 While S 199 would update the cwrent legislative framewotk for con utcr samtwity two Important considerations not addresed in the WVl-the need for bete-defined security control standard and the need to clarify and strengthen leadership for Informaion security across government-are critical to strengthening security practices and oversight I would like to discuss these In more detail as they complement the goals of S 1993 and could significantly enhance Its provisions Pin there is aneed for bette-defined security control standards Currntly agencies have wide discretion in deciding what omputer security controls to implemet and the level of rigor with which they enorce these controls However as mentioned earlier our audt work has shown that agencies have generally done a poor job of evaluating risks and implementing effective controls Momever these adts have shown that agencies need more specific guidance on the controls that we appropriste for t differet types of Information that must be protected Curren 0MB and National Insttute of Standards and Technology 141ST- guidance is-not 12 68 deailed enog to ensure th a gncie aremaking approprlatejuidgments in this arend that they ame protecting tto same types of data conistently throughout the federal community Mome specific guidance could be developed in two parts A sot of data classifications that could be used by all fedeal agencies to categorize the criticality and sensitivity Of the data they generate and maintain Thb classifications could range from noncritical publicly available information requiring arelatively low level of protection to highly sensitive and critical information that requires an extmely high level of protection Intermediate classifications could cover a range of financial and other important and sensitive data that require significant protection but not at the very highest levels It would be important for these data classifications to be clearly defined and accompanied by guidelines regarding the types of data that would fall into Wah classification 9 A set of minimum mandatory control requirements for each classification Such control requirements could cover issues such as t the strngt of system user authentication techniques e g passwords smart cards and biometrics for each classification 2 appropriate types of cryptographic tools for each classification and 3 the frequency and rigor of testing appropriate for each classification We believe that requiring the development of these standards particularly with minimum mandatory control requirements is the most important addition that could be made to your legislation More precisely defined standards will provide common measures that can guide 69 spacdes in drftlpg needed controls md lnqmve the conmAlsony end value of wAtdts and Second theme is aneed for strong centralized leadership for information securty saws sovmzneo Under corrmat law responsility for guidance and oversht of spicy infonnation security isdivied mmg anumber of spncims Inclodbng 0MB NEST the OmmWa Ser ces Admnlwsramo GSA sad the Natioal Security Apocy Othe oo 6lz1co ase also becoming involved duz6ugh the amItnInstratIon's critical infrestnucture protecton Iiiativa Incltdng the Department of Justice sad heCOWtca Inriatnacture Assrance Office While SO e coordination bs occurring overall this has resulied i aprolfeation of organixatons with overlapping oversight wsd asistance responsibilities Lacking isaam$on voice of leadership and aclea understanding of roles ad rewponsiblilles Having sumo g centralized leadership has been critical to addressing other govemnmentwlde managmentchallenges Per example vigos supoutrorn official at the highest levels of government was nessary to prompt attention and acton to resolving the Year 2000 problern Similarly foreeul centralized leadership was essential to pressing agencies to invest Inand accomlish basic managernet refoms madated by the Chief Finacia Officers Act To achieve similar results in informaton security th federal government must have the support of top leader and mome clearly defined roles for those organizations tha support governmactwide Initiaives We believe serious consideration should be given in your legislation to clarify the roles of organizations resonsible for governmnlwide information security efforts for exampe -v 70 the mkls ofWMD NWS and GSA and to cmeaw a national Cief Information Offima to xpvlde higher visiilty and morm effective cental lederaip oi information security In conclusion we support S 19IM It provides ingredients essntial to reforming agmny information security practices and goverumeniwide overnight In particulr it recognizes the highly networked natmr of the federal computing environment it calls for a more compehensive ulsk-basod framework toward Information security management and it provides for annua independent audits of security prom s mBasically the bill provides a better 1managemet framework for addressing information security iwme and provides a mechanism for independently checking how thos issues arm being addressed As w13 not d this objectve could be further strengthened by requhzlzS better-defined security eonuol standards and strngthening governmentwide lcaderhip Mr Chairman and Members or the Committee this concludes my testimony We look forwaftj woriag with the Committee to advance the issues discussed today as well as to address our technical comments which we have provided separately I would be happy to answer any questions you may have 511184 Statemtent of ROBERTA L GROSS Inspetor Geneal NATIONAL AERONAUTICS AND SPACE ADMINISTRATION Before the Senate Committee on Governmnwtall MA %I Mr Chairman and members of the Commitee I thank you for the opportunity to be here today to discus S 1993 the Government Information Security Act of 1999 My testmonvy generally will be bsdon the audt reviews and olinald kWestigetloons performed by the NASA Office of Inspector Genera 01 3 This work provdes insight Into NASA's Informatio technology IM security program I also head a legislative working group reviewing S 1993 comprised of 01 3 representatives from both the President's and Executive Councils on Integrity anid Efficency PCIE ECIE The group has received Input from 24 members of these Councils These representatives by and large agree that the S 1993 Isa very positive step Inhighlighting the Importance of centraized oversight and coordination Inresponding to risks and threats to ITsecurity I WIIl also offer comments raised by this group Introduction At Its most exbeme the Interoperalilty of networks has made both our nation's and our agencies' critical infrastructures more vulnerable to Intrusion and destruction Consider NASA OIG's recent press release reporting on ajoint computer crimes investigation by the NASA 01 3 Compue Crimes Division CCD the Defense Criminal Investlgativ Service the Federal Bureau of Investigation the U S Department of the Interior Office of Inspector General and the Immigration-and Naturalization Service Office of Investigations On February 23 2000 Ikenna Ifflh was charged Ina three-count criminal Information filled InU S District Court InBoston Ifflh obtained unauthorized 'EXWJUve Order No 12M0 Integrt and Mdkency InFederal Progranu May 111 1992 establish the POIE and ECIE These Councils are dcaired by the Dqxuty Director for Maniagement of the Mefk Of Managemipent and Buidget OMB and are comprised of Federal agenq' Inspectors Geneal 165 We4 nie mog to Ident revew and disams area of weakness and vulnerablilties to fr A4 waste and abuse I Federal po gro m access to a dial-up Internet account On Apr1l 10-11 1999 1171h used that account to compromise a Defense Logistics Agency OLA computer In Columbus OH Using the DLA computer Ifflh Illegally accessed acomputer owned by the Zebra Marketing Onilne Service ZMOS InSeattle WA and through his allegedly reckless actions damaged that computer and caused a significant loss of revenue to ZMOS On May 6 1999 Ifflh Illegally accessed a computer located at the Goddard Space Flight Center GSFC InGreenbelt MD and used his access to Install a sniffer program to review and capture login names and passwords transmitted on the GSFC network Iffih then used the GSFC computer to Illegally access and modify deface a Department of the Interior web server on May 31 1999 On August 25 1999 a search warrant was executed at Jffih's residence and the subsequent forensic examination of Ifflh's personal computer revealed that Iffh had obtained unauthorized access to multiple computers owned and operated by Northeastern University NEU Boston MA and was In possession of personal identifying Information on over 9 000 Individuals associated with NEU Other recent headlines have made clear the vulnerability of our networked systems to malicious hackers No one can doubt that securing Information from theft manipulation denial of service attacks and alteration will be an Important factor In shaping future Federal planning and Investment of Information resources However determining how much security Isenough Isultimately amatter of judgment In a world of limited budgets and competing programmatic and Infrastructure priorities each agency must determine the most critical programs and the proper security for the systems supporting those programs For example NASA's mission Includes Inspiring the public through human exploration of space The Space Shutte NASA's reusable space launch vehicle piloted and staffed by Its astronauts and principal investigators Isa key component of human space exploration The shuttle program Including research projects conducted aboard the shuttle Involves elaborate network connectivity between the NASA centers and private Industries universities and foreign nations NASA also provides public web sites to inform the public about bt role Inthe human exploration of space Obviously the level of security needed to protect NASA public web sites isnot the same as that needed to ensure astronaut safety aboard the Space Shuttle Further complicating network security planning Isthat payback from the Investment InInformation security Isuncertain Just recall discussions Inthe media as to whether-the Y2K 2 effort was hype However headlines would have been far on February 4 1998 fte President Issued Executive Order 13073 Year 2000 Conversion ' stating that because of a design feature inm-any elecronic system some computer systems and othe electronic devices may misinterpret the date change to the year 2000 This flaw was labeled the 'Y2K problem because Itcould caus systems to compute erroneously or simpl not run 73 dferent If the Government's '2K efforts had failed IT security failures also make head Today's hearing reflects this Comnmittee's recogniton of the importance of planning a national coordinated approach to IT security While it Isessential that the debate continue over the precise Implementation of acomprehensive plan S 1993 provides a good framework Moreover S 1993 contemplates that agencies will receive approprite funding and personnel author IT security will niot happen without appropriate funding and acore capability of skilled personnel Nevertheless there are current existing resources for effective controls ranging from guidnce set forth In0MB Circular A-131P to Vie General Accounting Office's GAO various best pratices guides as well as the framework set forth In several recently enacted laws e g ainger-cohen Act 4 In addition the Chief Information Offcers Cb s Indivdually and through their CIO Council have been studying and making recommen-dations inthis arena Also variou Inspectors General IGs have been active Inproviding recommendations through their revIews audits and computer crimes Investigations One only needs to look through recent IGsemiannual reports submitted to Congress to see the extnsive activity by IGs In tilsarena In the case of the NASA0OIG Irefer youtaour home paweat b LLayw aha gw fLoM gIgLba for the most recent semiannual report as well as the full text of audits reviews and press releases of criminal Investigations Inthe ITsecurity arena Discussion of So 1993 The proposed Act places responsibility on accountability of and coordination by some of the same players who made the ' 2K readiness effort successful 0MB the agency heads the Cbs GAO and the IGs In addition because of the Issues raised by Information security the Act also assigns specific roles to the Departments of Justice and Commerce GSA and law enforcement entitles '0MB circular A-130 cals for a plan for adquate security of each general support system and major application as part of the organic' inInformation resource management planning procs The security plan shall be consistent wOt guidance issued by the National Institfte of Standards and Technology NIST Independent Acec and-comment on the security plan shall be solicied prior to the plan's rmplementation Asummary of the security plans shal be Incorporated Into the strategic Information resources management plan required by the Paperwork Reduction Act 44 U S C Chapter 3S andSeto 9 b of the circular 4 The Cllnger-Cohen Act of 1996 has establshed within Federa agencies the corporate framework for management of information resources niduding both government Infomation and Information techology The establisment of Chief Information Oflcrs was singularly one of the most posiiv steps taken to focusattention on the management of Iformation Importanfty the Act called for a comprehensive Information technlogy archftecur that provies the Untrated framework for both existn and newly acquhWe hardware and software SUccesfatY2K Coordinated Efforts Provides a Model for Similar Approach to IT Security It Isworthwhile t o briefly look at the mobilization of the Federal government In addressing the Y2K problem That effort highlights what agencies can accomplish when there Issufficient priority placed on an Initiative by the President 0MB agency heads the Cd0s GAO IGs as well as the Congress Inthe exercise of bt oversight authority The Y2K readiness effort forced the government Into strategic management of Its Information resources Determined to avert potential catastrophic collapse of critical infrastructures the Federal state and local governments as well as the private sector attempted to Identify the mission cultIcailty of Individual systems only to find such distinctions blurred by network Interdependencies End-toend testing performed to assess Y2K readiness became a time-consuming enterprise Indefining the boundaries of networked environments As the new millennium approached the Federal government focused Increased attention on the problem The President appointed a Special Assistant John Kosinen Chair of the President's Council on Year 2000 Conversion the Congress Initiated focussed oversght on agencies' readiness 0MB required department and agency heads to submit detailed reports agency heads made clear the mandate to their staffs to place this effort as a high priority and IGs and the GAO devoted substantial resources and efforts to help ensure that their agencies were going to be ready when the date changed The focus worked We entered the new millennium with minimal Y2K problems As discussed below S 1993 also assigns responsibilities to these same players as well as additional entities and gives each a responsibility for the success of Information security Roles Set Forth InS 1993 Qnttf The proposed bill gives wide latitude to 0MB to take any authorized actions Including Involvng the budget or appropriations management process to enforce agency accountability for Information resources 0MB will be required specifically to oversee and develop policies principles standards and guidelines for the handling of Federal Information and Information resources and to use Its budgetary authority to enforce the accountability of the agency heads for Information resources management and Investments Of course 0MB generally has these budgetary and policy authorities and has provided agencies considerable guidance e g 0MB Circular A-130 However the explicit requirements emphasize the Importance the Congress places on this effort It re-emphasizes the mandate for 0MB to hold agency heads accountable to Implement Information security and Investment4 securities Further the Deputy Director for Management of 0MB to whom the Director may delegate the responsibilities under this proposed legislation has a 75 uniue vantage point to coordinate efforts acros the government by virtue of his her role as Chir of the President's Management Council PMC 5 the PCIE ECIE ChWe Financial Officer' and CIO Councils Initiatives Planning responsibility at the Deputy Director level emphasize to agency heads the Importance placed on this Initiative by the Congress Hind of Aancles The agency heads occupy the bully pulpit They set the priorities of the Federal government by their personal Involvement It happened In the Y2K effot It needs to happen Inthe IT security effort This Involvement means far more than Issuing a memo or series of memos T1he agency heads have to make clear that the current agency cultures which permit very simple and avoidable vulnerabilities to occur and reoccur are no longer acceptable Agency heads also have to ensure that their agency has sufficient trained personnel a key requirement of the Act Under the proposed Act agency heads Involvement extends to ensuring key ofiials the CIO and senior program managers perform their substantive responsibilities QQu The Act assigns considerable responsibility to CIOs for developing and maintaining agency Information security programs Including assisting senior program managers Intheir responsibilities The PCIE ECIE working group noted that It would be helpful Ifthe Act or legislative history provides greater guidance on the senior program manager function since that term Isnot defined Inthe proposed Act or existing legislation Some agencies might view the position as a very senior high level official others as the Individual Incharge of a specific program e g Shutde Program Requirements of the bill alone however will not ensure the ClOs' success Most participants Inthe PCIE ECIE working group felt that agency CIOs lacked the leverage and control of resources necessary to successfully develop Implement and evaluate their agencies' Information security programs Some even expressed the opinion that their agencies' CIOs were at best paper tigers The proposed bill contemplates and the group supports givng teeth to the position in order to ensure CIO responsibilities are effectively carried out Congress will have to maintain oversight of the agencies' empowerment of their CIOs 5 Presklent's mermandumn October 1 1993 reprinted at 5iFR S2393 establisi-ed the President's Management Council PMC The Pt4C consists of the Chi d Operat Officer of all Federal depatents and the largest agencies The PMC proves leadersilp for the most kIportant Government-wide reforms 'Pursuan to 31 USC Section 90 Chief Financial Ofices are appointed or designated for majo Federal agencies and are responsible for agency policies guidelines and procedures for budget aNd financial management functionts 76 At NAMA the OJG has repeatedly recommended increased authority for the CIO The Agency CO has a limited staff and extremely limited budget usually funds are provided for certain one time only NASA-wide purchases The 10 Centers each have their own CIOs who collaborate wlth but do not report to the NASA CO The Center C s each report to their Center's management who define their budgets write their performance evaluations and allocate their staff positions At some Centers IT security resides Inthe security office at other centers It resides Inthe CIO's office In the past we have been critical of this organizational approach to security by consensus because It results Indelayed Issuance and Implementation of policies and procedures Compounding this organizational stnctre NASA has Intentionally decentralized the CO responsibility for IT security designating different centers as the Centers of Excellence M for specific functions Ames Research Center California for IT security Kennedy Space Center Florida for one component of Communications Security COMSEC 7 Central Office of Records for the safeguard and control of COMSEC material' with overall COMSEC management maintained within the Security Management Office at Headquarters Goddard Space Mlight Center Maryland for network Indident response Glenn Research Center Ohio for IT security training and Marshall Space Flight Center Alabama for firewalls We question the effectiveness of decentralizing and fragmenting these functions Consider for example NASA's designation of Ames as the Center of Excellence for IT security Ames personnel can and do conduct research Into technology solutions for various IT vulnerabilities Moreover Ames coordinates with the Center dlOs at a minimum during weeldy telecons and extensive exchange of email communications These are all Important practices However this assignment of responsibility to Ames reduces NASA's ability to efficienitly and effectively utilize the enormous resources for IT security concentrated Inthe Washington DC metropolitan area For example the following offices are all located InWashington DC or Its environs NASA the CC as well as the Security Office Incharge of dassifled Information policies and procedures NASA OIG Computer Crimes Divsion forensics and media analysis NASA IT Security Council - quarterly meetings occur at Headquarters where NASA-wide Issues Impacting the funding staffing and other IT - YOOMSEC generally encompasses secure measures and control taken to deny unauthorized persons Information delved from telecommunications and ensures the authenticity of suchtelecommunications Communicaton security Includes crypto-seri transmission security emission security and physical security of OMSEC materil For example COMSEC measures are applied to protect the command and control communlcatlilnks with the space shuttle COMSEC Central Ofie of Records COR the NASA ODR provides centralized management an control of all OMSEC materia held by NASA OMSEC accounts NASA CDR rsponsibilities Indude establishing and dosing COMSEC accounts and establishIng or approving accounting procedures foracoDunts under Its cognizance A 77 security Issues are discussed the Ames IT Security manager travels from Ames to atten this meeting or Isconnected by telecon NASA's Automated Systems Incident Responise Capability NASIRC National Security Counsel CA NIST Departnmt of Defense Joint Task Force - Computer Network Defense JTF-CND Department of Justice DOJ Computer Crimes and Intellectual Property Section DO unit Incharge of prosecuting network crimes National Infrastructure Protection Center NIPC ' The NASA IT Security Manager could benefit by establishing close personal contacts with staff at the above listed agencies Inorder to stay current Intheir assessments of vulnerablities standards and best practices ' 0 Inthe NASA OIG we spend considerable time networking with these agencies to gain proficiency InIT security The proposed legislation requiting the CIO to designate a senior agency Information Security Officer will not address this decentralization at NASA The Act does not require this position to report to the CIO nor that this position be located Inthe aO's office -- From our past work we have seen very concrete examples where the decentralized structure weakened NASA's IT security posture For example NASA dlescoped the funding and responsibility NASIRC a widely respected network Incident response center by fragmenting responsibility for Its oversight at two centers Ames the Center of Excellence for UT security and Goddard the Center of Excellence for response The Goddard Contracting Officer and Contracting Officer Technical Representative COTR performed oversight Moreover Centers differed widely In reporting Intrusions to NASIRC The absence of full reporting Impacted the ability of the NASIRC to connect the dots to see the pattern of Intrusions and thereby perhaps to diser the Intent of the hackers and to prepare proper advice and warnings to the NASA Centers The failure to report Incidents also materially Impacted on the ability of NASA QIG Computer Crimes Divsion CCD to be able to discern the pattern of criminal Intent Identify those conducting malicious attacks against NASA's systems Because of these Issues 'my Inspections unit conducted an assessment and made 11 recommendations to strengthen NASIRC Management concurred and we will conduct follow-up to ensure recommendations are fully implemented %Sepage 15-17 for a discussion of thoe IJPc's role InIT security 14ortww It's been our experiece that It Isextremely diftiult for Government to recut and retain highl skille computer professionals Inthe Ames area due to Its high cost of ing and proxnity to CaUomleias SlIcon Valley San 3ose 78 lrIs mnam Ifis S 1993 provides for responsibility of the IGs appointed under the IGAct of 1978 5 U S C App to perform annual evaluations and tests of the agenceS omnpilance with the ITsecurity requirements of the Act Alternatively an Independent auditor as determined by the IGof the agency can perform the annual evaluation requirements The PCIE ECIE working group recommended that the Act apply to all IGs As wrttten Presidentially appointed IGs created after t original Act of 1978 e g the IGat Department of Justice would not be Included nor would any ECIE IGs The proposed change would also ensure that the IGof the agency would be the selecting offcial for the Independent evaluator Inall Instances not the head of the agency The working group also commented that the outside reviewer should not be narrowly defined as an Independent external auditor implying a financial orientation but Instead be any qualified external entity The PCIE ECIE working group discussed the Issue of the resources required for performing the annual review To place their comments Incontext I think ItIs Instructve for the Committee to understand the OIGs' experience with the Chief Financial Offcer CFO audits The financial audit reports were annual and could be Performed by the OIG or by an Independent external auditor Inorder to meet their requirements under the CFO Act the OIGs dedicated substantial staff and budget In NASA's case the Agency and 0MB supported staffing Increases approximately 10 additional auditors during the period the OIG performed the audit Both the Agency and OMB's funding support and the CFO's substaritiaI engagement enabled NASA to be one of the first Federal agencies to receive an unqualified opinion Once NASA received two unqualified opinions from the NASA OIG the Agency continued to support the CFO audit requirements by funding the external Independent audit contract selected by the 01G The OIG continued to dedicate staff to perform oversight of the contract Including the assurance that the Independent audit met generally accepted government auditing standards Similarly the annual report envisioned by the S 1993 will require substantial personnel and budget commitment by each agencies' 1G Inthe case of the NASA OIG Information technology IT security has been one of the highest priorities of my office The OIG currently has a robust program of criminal Investigation Inspection and audit activity focusing on protecting NASA's Information resources and aggressively pursuing felonious Intrusions resulting from hostile attack on NASA Information systems At the outset of my tenure I was personally committed to building an UT audit evaluation and Investigation IT security capability because of NASAs extensive dependence on network systems- in order to create the IT capabilities I used vacancies created Inother program areas The Computer Crimes Division CC is small but smart and efficient Beca use I have recruited skilled staff for the computer crimes unit the are usually at high grades the are worth It The creation of t IT audit unit consisted of recruiting a handful of auditors and evaluators with some IT familiarity and training In-house auditors over the last four years They began with very simple audits and received targeted training prior to each audit They are now demonstrating Increased skills so they are able to perform more complexc audits The office has made numerous recommendations to Improve NASA's Incident response capabilities and to protect sensitive technologies and other Information from unautrized a es For example during an Inspection we uncovered security weaknesses2Involving date remaining on transferred and excessed personal computer ' I have described the NASA OIG resource commitment so that the Committee will have a context to appreciate the comments on resources of the PCIE ECIE working group The reviews contemplated by S 1993 will require recruiting training and retaining a skilled set of personnel to perform the functions envisioned by the Act The ability to perform the audits will be an evolvng process That also was the case for the CFO audits Nevertheless the Investment InIT capability Iswell worth while for the oversight the IGs can provide and so should be supported by the agencies 0MB and the Congress through appropriate funding iaIMEnoment Autbogrjiia The Act provides that the CIO shall establish procedures for detecting reporting and responding to security Incidents Including notifying and consulting with law enforcement officials and other offices and autoities It also provides for notifying and consulting with an office designated by the Administrator of General Services within the General Services Administration 13 I want to address the CIO's requirements for urespgridng and for notifylg IaW enforcement officials The Act needs to make clear that the responsibility for 1As part of their effclency and eonomny the CMD form prtnershlps for tool development and share resources with entities such as the Department of Defense Computer Forensics Laboratory OCR D $ mission Uiduds provkig digita evidence processing analysis and diagnostics for DOD airminal fraud and counterintelligence Investigations operations and programs We hope to continue fbomkV partneships with other In sudh areas as training 14My office has published an Instructional brochure on property clearing data frm hard drives which I have previously provided for your information and use This pamphlet was widly disrbuted toughout NASA and the IG community fte PCIEJECE working group could not comnmenit about the GSA provisions because we were unsure whi offices set fort inS 1M9 would perform the functions and responsibilities 80 1'mpodng to security Incidents does not InducMd nvestigatlngO the Incidents Program offcias by necessity have to perform some preflmkiar' review Inorder to determine appropriate steps to protect critical system and mainrtin operation and further analysis when they suspect potential crimes However systems administrators are not law enforcement Investigators The Investigative role Is reserved for special agents trained Inevidence collection chalnof-custody Issue and other legal Msues Impacting admissibly of evidence and court presentations The Act Issilent as to what entities are meant by law enforcement oftkals3 Where an OIG has established a computer crimes divsion 14 then the agency system adminIstrators need to report to the IGspecial agents It Iscrucial for the system admInistrators to work Inclose cooperation with special agets who can suggest alternatives to preserving evidence while mlnlmizng Impact on operations Of course OIG special agents are not the only law enforcement officials Involved In Investigations of cyber crime Presidential Decislin Directive P1 1 63 addresses the protection of critical Infrastructures that Include physical and cybeir-based systems essential to the minimum operations of the economy and the government As part of the protection of the nation's critical Infrastructure P1 063 establishes the National Infrastructure Protection Center NIPC to among other duties serve as a national critial bold Inthe original threat assessment warning vulnerability and law enforcement Investigation and response entity3 The NIPCs role for critical Infrastructure protection only reinforces the key role of Inspectors General to conduct Investigation of agecy network crimes OIGs because of their audit Inspection and Investigative activity are able to make key lInkages about criminal activty and the need for better Internal controls Intheir agencies The legislative history of the IG Act makes this linkage one of the key reasons for creating OIGs 15 surprilngty more Inspector General are establishing computers crime units as dhefr agencies are more and more turning to e-commerce to conduct business solct grants and contracis and to purchase supplies Investigators M11 no longer be able to rely on the papertrail to identify their suspect They must be able to retrieve evidence sOred in a computer and know how to property seize a computer used Inthe commission of atim 14 15ft IGAct specifcaffy provides tha the OM ce of Inspactor General were ratd to Conduct aind supervse Investigations relating to the Agency program and operations 6of the Agency Sec 2 0 to conduct supervise and coordinate audits and Investigations relatng to the program and operations o the Agency Sec 4 aXI and Incarryng out t duties and responsibites established under this AMt each Inspector General shall report xpetousiy to the Attorney Genera whenever the Inspector Generail has reasonable grounds to believe thee has been a violaton of Federal aliminal laW Sec 4 d 81 MTe OIGI proidsa sile a point Ineach major agency for the effort to deal with fraud abuse and waste Infederal expenditures and programs Without that focal point the linkage between auditing and Investigating is likely to be Ineffective Additionally this type of coordination and leadership strengthens cooperation between the agency and the Department of Justice in Investigating and prosecuting fraud cases The Department testified emphatically that those agencies which have been effective co-partners with the department have been those with viable offices of Inspector General Senate report no 95-1071 pp 2681-2682 The Department of Justice has made clear that It does not contemplate that only the FBI has the authority to Investigate or track computer offenses Scott Charney former Chief Computer Crime and Inteliectua Property Section Department of Justice wrote a letter dated February 1 1997 to then Chair-Nominee of the PresIdenr's Commission on Critical Infrastructure Protection Mr Charney stated Second I must correct the Impression that Oat thec FOderal level only the FBI and the Department of Justice have the authority to inve4stiqate or track such attacks computer offenses Since 1984 when Congress p %ssed the first computer crime statute the U S Secret Service has had explicit jurisdiction over some kinds of computer crimes along with the Federal Bun'tau of Investigation which has general jurisdiction Inthis area See 18 L S C Sec 1030 d In addition many Federal agencies have crIn'ali nvestig itors with the training and the mission to InvestIgate computer crimes directed o'gah St their own agencies Some of these organizations like the U S Air Force Office of Special Investigations and the NASA Inspector Generai have been ieau'crs Inthis field As stated previously IGspecial agents work closely with the Attorney General The Department of Justice attorneys will function as the honest broker providing the proper coordination where IGs need to be working closely with the NIPC The NIPCs focus Iscritical Infrastructure But there are thousands and thousands of daily Intrusions The NIPC does not Investigate all of the thousands of agency Intrusions because they are not all against the criticalIinfrastructure OIG special agents are the chief Investigators for their victim agencies The Act or report language should emphasize the Important role of IGs Inprotecting their victim agencies 82 CONCLUSION In summary the Act Importantly recognizes that ITsecurity Isone of the most important Issues Inshaping future Federal planning and InvestrnenL By highlighting OMSs role the Act recognizes that IT planning does not stop at the doorstop of any focusing on the roles of the agency heads and Cbs the Act makes t agency ByV clear that each agency must be far more vigilant and Involved than current practices The IGcommunity has already been Involved InITsecurity oversight and criminal Investigation of network Intrusions S 1993 provides an even greater role This task will require IGcommitment of staff' and other resources The agencies 0MB and Congress need to provide the leadership and budgetary support for all the key players the Act enlists to defend the nation's netwprk systems 12 Before the Senate Governmental Affairs Committee Protecting Federal Systems from Cyber Attack Mear 2 2000 Testimony of Kenneth Watson Cisco Systems Inc Manager Critical Infrastructure Protection Chairman Thompson Ranking Member Liebernu distinguished members of the Seate I appreciate the opportunity to speak with you today about network security best practices Cisco Systems is serious about network security and about its implications for the critical infrastructures on which this and other developed nations depend Cisco predicted that the Internet would change the way we work live play and learn Just four years ago this was considered abold statement but today few would argue that the Internet is changing every aspect of our lives The Internet economy is creating a level playing field for companies countries and individuals around the world Inthe 2 1 century the big will no longer outperform the small rather the fast will beat the slow The Internet was originally built to share information among scientists and other resarchers in a trusted academic environment No one considered the need for information security or that its commercialization would proceed as rapidly as it has Over the last 10 or 15 year we have gradually become dependent on networks not only for conducting electronic business but also for delivery of vital goods and services like electricity communications water oil and gas as well as controlling transportation and financial transactions Network security solutions are equally applicable to both fth private sector and government networks While network protocols vulnerabilities countermeasures and best practices are common regardless of business sector function or mission no two companies or federal departments will have the same requirements or optimum solutions at any given time And those requirements and solutions will change over time So how do you decide on a best practices solution Many companies have their own solutions and in fact the Federal Chief Information Officers Council is conducting a study to investigate best practices for federal departments and agencies I would like to offer a simple way to organize network security technologies and practices and talk a little about what Cisco has see in customer networks There are many ways to organize security technologies and activities-it's important to choose one and then carry it out Here is ours-it's called the Security Wheel CA s MANA0E and 1 s MOTOR RAPRtOVE SIM RESOND 4 TMS Figure 1 The Security Wheel Good security must be based on policy One of our teams was out installing an intrusion dctectioai system and the company CEO wanted alist of the top ten web sites visited by his employees He was also in thepces of buying a second T-lI line because of his company's increasing demand for bandwidth We showed him that the top seven or so weren't related to his company's business-in fact they were to sports scores porn sites etc He was furious and wanted names Hads will roll We advised him that the list represented amajority of his company and he would do better to establish a simple web use policy He sent amemo to all employees showing the top ten list and statng that browsing the web with company computers for non-businessrelated use would be restricted to before and after business hours and during lunch This told his employees two things he could see what they were doing and he cared Almost instantly his nee4 for a second TI vanished After setting appropriate policies a company or organiaton must methodically consider security as part of normal network operations This could be as simple as configuring routers to not accept unauthorized addresses or services or as complex as installing firewalls intrusion detection systems centralized authentication servers and encrypted virtual private networks A basic tenet of military combat engineers isthat an unobserved obstacle will eventually be breached The same is true innuetworks Hackers will eventually figure out a way through or around static defenses The number and frquency of computer attacksitconstantly on the rise -thereare no vacation periods As such a critical part of the security wheel isto monitor one's network inratructure and then respond to attempted or successful attacks The next stop on the wheel is testing a network Organizations should scan their own networks regularly updating electronic network maps determining what hosts and services are running and cataloging vulnerabilities They should also bring in expert to conduct independent network security posture audits once or twice ayear to provide a more thorough assement of vulnerabiities and to get independent outside recommendations regarding countermeasures security patches and other improvements Finaly there must be a feedback loop in every best practice System administrators must be empowered to make improvements Senior management must be held accountable for network security and those involved in the day-to-day operations must have their attention Only by collecting and managing appropriate network security data through audit logs intrusion 85 asid response systems and network scanscan management make intelligent decisions wa improve the network's security detcon If you were to ask me what the most important stop Is I would give you two answers one for the short tamn and one for the long term In the short kterm the best thing any company or government entity can do is to conduct a security posture assessment along with a risk assessment to establish abaseline security state Without measuring where you are you can t Possibly figure out where to go or how to get there Last week's Issue of Inormation Week Includes a report from our security consulting team on vulnerabilities we have seen while conducting security posture assessments in custog er networks We grouped vulnerabilities into three categories denial of service reconnaissance and access Denial of service vulnerabilities allow an outsider to block normal network traffic to a server Reconnaissance vulnerabilities permit an attacker to gather information that may prove useful to a future attack Access vulnerabilities allow attackers to alter or manipulate data in a network I've attached some suggestions to this testimony for identif 'in and remedying the most common vulnerabilities which apply to any network public or private For the lon ite the best thing we can do together is to close the alarming skills gap The requirement folhighty skilled security specialists is increasing faster than all the training programs combined can produce qualified candidates Universities are having difficulty attracting both professors and students The government is also having a hard time retaining skilled security specialists We in the private sector are building and maintaining state-of-the-art security training programs and we're collaborating with education institutions and training partners to provide a wide base for delivery We're ilso helping the Office of Personnel Management to identify knowledge skijs and abilities dngolng training requirements and career management and mentoring ideas for a FederalIT security workforce This human resources Issue Isby far the most critical Information security problem we face and the solution must be based on government industry and academic collaboration This commitke recently proposed new legislation to strengthen federal network security S 1993 Two provisions of this bill closely parallel what we in industry have been saying for some time security must be promoted as an integral component of each agency's business operations and information technology security training is essential to the success of any network security improvement program Each department and agency should execute its own programs based on tailored mission and risk analyses Corporate network perimeters are blurring That's also true for the lines between government and industry The Internet knows no boundaries and were all in this together We are very enthusiastic about the new Partnership for Critical Infrastructure Security a voluntary organization of some 120 companies from across the country dedicated to improving the network security of our critical infrastructures Already we have seen early fruits of this effort 210 key executives attended a planning retreat here to begin to address interdependency vulnerabilities information sharing awareness and outreach legislative ond regulatory issues research and development and workforce development As we further build the relationship between the public and private sectors we hope the great spirit of cooperation led by the Department of Commerce and the Critical Infrastructure Assurance Office will continue We will continue to work together to raise the bar of security overall worldwide so that we can empower our citizens and customers to take full advantage of the Internet economy in the Internet century I would be glad to take any questions 5 p' a an Top Iutorut Estana4 and Inftanet Interal Vtalnwabiltk and Recommended Flts This table outlim sthe vulunbilltles most often eountee by the Cisco Secur Consult Services teams over the la ix onths The 'tlnerbilities and their r emeded fixes are applicable to any public or private Internet Protocol networiL A Denial of Service Oudaed wecessu y network services such D ieeices as the are not typically as who chargen sy s netatat W 9J Remote buffer oveuflow In the ntot bootpDul Ineto bot ccssf r service Internet Bootp is a DHCP sub-service and there is no reasn to run this service with access from the Internet ___________________ Remote bufer oveRfow InFTP networkservice Update FTP server software to current release apply security patches enhance monitoring PoRtmapper providR RXsub-service Information R ad-i @ SM newokii Disallow aoces to the RPC portmapper from the Internet Update SMTP server softwaren to current release apply security patches enhance monitoring ___________________ NFS-network servicallows remote users t obtain info on export SMa RPC network service ____ _______ ___ service from the Internet ___ Use configuraton cntrol on the web server apply vendor patches remove sample pages Cold Fusion web servers _____ ____ - Restrict access to the NFS server from the Internet Disable the servce dalowF access to the staWd _____ enhance monitorig ____ i Access Weak user authenticaton default accounts Routinewaudting of user selected passwvords password sftrenth policy common accounts Joe accounts null SMI mal rlayUpdate Annmu Ffacs ___ ___ ___ ___ SMTP Pipe From NM mPPivt cmity strinhange _______ _______ ___ SMTP srer software to current release apply security patches enhance monitoring Update FTP server software to current rele-me disable anonymous apply security patches eance monitoring pdate SMTI'sre software to curret reease apply security patches enhance monitoring SNMP community names to something non-ituitive disble access the SNMP from the hntenet 87 2 intranet 6UdZ iiiunnecssary network servces suc as echo charges qsysW netatat FMP pasv _______________________ Remote buffR overflow in Gh Woop network service ___ -Disable servces as thejy are not typically Meuired Update PTM server sofwr to current release enhance monitoin secus Diale boot Inoreuired apply vendor pcen ____ _____ ____ ance monitoring Updte1 server software to current release Reoe buffer overflow Gn FTP network apply security patches enhance monitoring service 1B Reconnaissance Update RC portznapper software apply RFC Portniapper provides RPC sub-service Meudit patches enhance monitoring information Disable the finger network service apply Finger provides usenaze fiformation security patches enhance monitoring Update SM77P server software to current -SMWfl'network servces verify and exad release apply security patches enhance ______________________________monitodug DIi sblete service apply vendor security Statd RPC network service ___________________________vendor Chag NMPcommunty names to something non-intuitive disable access the SNMP public community string from the Internet _____________________SNMP C Access Routine auditing of user selected passwords Weak user authentication default accounts password strength policy common accounts Joe accounts null Update SMTP server software to current release apply security patches enhance monitoring Updat SMTP server software to current release apply security patches enhance STPil regy-I SMTP Pipe From ___monitoring -MPPieT Upate SMTP server software to current releaseeapply security patches enhance ____________________monitoring SNMP Private community string _____________________________SNMP Change SNMP community names to something non-intuitive disable access the from the Internet 88 TESTIMONY OF JAMES ADAMS CHIEF EXECUTIVE OFFICER INFRASt RUCTURE DEFENSE INCO COMMITTEE ON GOVERNMENTAL AFFAIRS UNITED STATES SENATE MARCH 212000P Intou ction Chairman Thompson Ranking Member Lelberman members of the Committee good morning and thank you for lnckdilng me on this distnguished panel My name is3ames Adams and I am the CEO of Infrastructure Defense Inc IDEFENSE By way or brief background IDEFENSE provides IntelIgence-drtve products - deity reports consultin and certification - that allow cents to mitgate or avoid computer network Internet and Informastion asset attack before they occur As an example IDEFENSE began warning Its clients about the possibility of Distributed Denial of Service attacks - the kinds of hacker activIty that Iscurrently capturing headlines across the globe - back InOctober and November of last year - At the outset I wart to commend Senators Thompson and Uebennan and their respective staff for crafing such thoughtful and badly needed legislation Inthe area of computer security for the federal government We are curenty Inthe mids of a revolution the Information Revolution which calls for drama i and bold step Inthe area of securing cyberspace The old ways of doing business dlont work any more t IsInthi context that the Thompson-LUeberman bill takes acrucial step forward B y shaking up the current cuture of lehargy and Inertia gripping the federal government with aproposal to putk teeth Into the OMB's oversight of computer security Issues this bill Isasolid step Inthe right direction Why does this matter Few revolutions are accomplished wthout bloodshed Ready as we plunge headlong and terribly NI-pepared Into the Knowledge Age we are beginning to receive the Initial casualty reports from the front lines of the technology revolution and to witness first-hand the cyberthreats that If alowed to fully mature could cause horrendous damage to society 4 89 The ongoing campaign of Denial of Service attacks Include some of the household names of ecommerce - Microsoft Yahoo e ay Amazon oom CNN ZDNet and E Trade Comparative newcomer Buy com was attacked on the day of Its Initial Public Offering and other smaller firms such as Datek Online Holdings Corp experienced problems which are probably related to the attack Targeted sites receive hits on theirseavers of up to one Gigabyte of data per second and are unavailable to the general public for anywhere from 30 minutes to several hours Fromn the headlines you would think that these attacks suggested the end of the cyberworid as we know ft Nothing could be further from the truth These were mere plnpricks on the body of e-commerce Consider Instead that some 30 countries have aggressive offensive Information Warfare programs and all of them have America firmly Intheir sights Consider to that If you buy a piece of hardware or software from several countries among them some of our allies there Is real concern that you will be buying doctored equipment that will siphon copies of all material that passes across that hardware or software back to the country of manufacture The hacker today Isn't just the stereotypical computer geek with a grudge against the world because he can't get a date And not every hack that Issuccsfully pulled off Isas sophomoric as say a recent Incident when the self-styled Masters of Downloading hacked Into the official U S Senate Wo-b site and replaced Its front page with a message proclaiming Screw You Guys The hacker today is much more likely to be Inthe employ of a government of big business or organized crime And the hackers of tomorrow will be all of that and the disenfranchised of the 2 11t century who will resort to the virtual space to commit act of terrorism far more effective than anything we've seen from the Armalte or the Semtex bomb Inthe 20th century Consider the band of Russian hackers who over the past two years have siphoned off an enormous amount of research and development secrets from U S corporate and government entities Inan operation codenamed Moonlght Maze by American Intelligence The value of this stolen Information Is Inthe tens of mlilons-perhaps hundreds of millions-of dollars there's really no way to tell The information was shipped over the Internet to Moscow for sale to the highest bidder Fortunately this threat was detected by aU S govemmdnt agency Unfortunately that Information was not passed on to the private Institutions that It might have helped Among government and Industry alike an understanding of the critical Infrastructure's threat environment Is barely In Its Infancy All of these attacks mistakes and plain acts of God need to be studied very carefully Because they define the threat front that Isdriving right through our very fragile economic governmental and corporate armor These are the kind of problems we-jolntly the public and private sectors-facie In the technology revohition So the big question Is who Isgoing to solve these problems The government Private Industry Or the two working together Or are the problems going to be solved at all How has government responded so far Well there has been the usual President's Commission and then the Principal's Working Group then the bureaucratic compromise that nobody really wanted and then the National Plan which arrived seven months late and wasn't a plan at all but an Invitation to have more discusions Meanwhile the government In all its stateliness continues to move forward as Ifthe Revolution Is not happening Seven months ago my company won a major contract with a government agency to deliver urgently needed Intelligence The moneywas allocated the paperwork done Yet It remains mired Inthe bureaucratic hell from which 90 apparently It cannot be extricated Meanwhile that same government agency isunder cyber attack each and every day This Isnot a revoution This Is business as usual Mother government agency Istrying to revolutionize Its Procurement processes to keep up with the Pace of the revolution They are proudly talking about reducing procurement times down to under two years In other words by the time new equipment isin place the revolution has already moved on eight Internet years In my company If I can't have a revolutionary new system nnplace withn 90days Idon't wantit What this means to me Isthat the threat Isgrowing rapidly that a largely Inert government has so Mr been unable to meet the challenge and that more must be done And this does matter because there Ismore at stake here than simply whether a new computer works or does not whether a web site Is hacked or not At stake Isthe relationship between the governed and their government Ina democracy High stakes Indeed So I welcome the Thompson-Leiberman legislation as a good first step Inthe Senate efforts to ty and control and drive the process that wlibhing the government up tospeed with the revolution I believe however that to effectively cope with the technology revolution fth proposal must be strengthened a great deal To fix the problems that afflict our body politic and our body corporate will require far more than Band-Aids We're not talking casts and splints or even organ transplants What we're talking about Is leaving the old body and moving Into a new one We are talking-I am talking-about beginning to make changes Inour cultural political and'economlc processes and Institutions of such magnitude that they will dwarf even those that accompanied the Industrial revolution What Is needed Isan outsde entity - with real power - to Implement drastic change Inthe way government approaches technology and the underlying security of Its systems Currently Jurisdictional wrangling procurement problems and a slew of other Issues are seriously hampering governments ability to stay current with the rapid pace of the Information Revolution The Thompsoti-U eberman bill provides a framework to begin sorting through this mess However what Isneeded most Is a person or an entity that will draw on skill sets In many areas wil overlap that of the CIO CFO CSO and most of the other officers or entitles Let's give this new person the title of Chief of Business Assurance Or perhaps the Office of Business Assurance to relate It directly to the federal government This new acronym should be the response to the current need In some ways It Ismirrored by the debate that started at the beginning of the Informnatio nRevolution that led to the appoIntmnent of Chief Information Officers Inmany companies and within government But Business Assurance Is more than security more than technology and more than a combination of the two It Is an understanding of the whole environment and what that means for a business or a public sector operation fle OBA's task would be to continuously gather and synthesize Infrastructure-related trends and events to Intelligently evaluate the technological context witin which the organization operates to Identify and asss potential threats and then to suggest defense action Or viewed from the positive side to assess the technological revolution's opportunities and propose effective offensive strategies The Office of Business Assurance must be a totally Independent organL'ation with real teeth and power within government Those organizations that have the foresight to create and properly 91 staff this position will be Immeasurably better equipped to handle the tial wave of change that is just now beginning to break over our government Industry ecnomy and culture TheeIs much Incommon between government and Industry when It comes to the challngeand the oppotunftie-tt the technology revolution poses Both sectors face a common threat that ranges from vandial hackers and bard-mcrimtinals to foreign agents and natural disasters Both sectors share common goals for the well being of America and her people Both employ technologies that are Inessence Identical And both must work together to protect each other My company infrastructure Defense pioneers an approach to Infrastructure protection that Is aimed chiefly at the private sector Many of the prnciples however-value-chain analysis for example and threat analyss-are directly transferable to governent organizations The two sectors are not that far apart With common problems and common goals there are opportunities for common solutions One of the most Important I believe-one that Is too new to have been embraced by either the private or public setop-i4s the need for every organization to Incorporate a risk-mitigation process Asecond priority Isto build a comprehensive Information sharing system across all sectors on cyberthreats and countermeasures We cannot afford to allow Important Information to grow stagnant within particular public or private enUtles The rapid pace of technological change necessitates a correspondingly robust response mechanism I ur g this Committee to champion this Important Issue as the federal response to the growing cyberthreat isconstructed Conclusion I leave you with this thought You will see total transformations of the way business and government Isconducted Internally and externally Afailure to change to meet these new challenges Is to risk the destruction that all revolutions bring in their wake Proactive action Isthe rote to survival We have heard a great deal Inrecent months about the potential of a digital divide that Is developing between the computer haves and the computer have nots I believe there Is another digital dMde that Isgrowing between the American government and Its citizens If this Committee's efforts do not move forward in changing the culture of Inertia there is real danger that fth digital divide M that exists between the government and the private sector will only widen We cannot afford a situation where the governed feel that their government Isout of touch and Increasingly Irrelevant to their lives By stepping up to the plate and tacling computer security with an innovatIve bold approach the Thompson-lUeberman bill significantly boosts the chances of reversing the current bureaucratic approach to a dynamic problem Again thank you for the honor of appearing before the Committee today _ r 92 U 106TH CONGRESS ISTSEON S 1993 To reftwm Government information security by strengthening information security practices throughout the Federal Government IN THE SENATE OF THE UNITED STATES NOVBMBER 19 1999 Mr THOwsoN for himself and 31r IAznLL N introduced the following bill which was read twice and rtfened to the Committee on Govern mental Mfairs A BIL To reform Government information security by strengthening information security practices throughout the Federal Government 1 Be it enacted b y the Senate and House of Reprnsenta- 2 tMw o f the United StatenofAmerica in Congress assembled SECTON i SHORT TI ra _3 4 Th Act may be cited as the Government Informa- 5 tion Security Act of 19 99 6 7 8 SEC 2 COORDINATION OF FEDERAL INFORMATION POL r ICY Chapter 35 of title 44 United States Code is amende d byin erting at the end the folbi g p 93f 2 1 SUBCHAPTER 11-DMFRMATION SECURITY 2 '118581 Purpose 3 Tho purposes of this subchapter ame to 4 1 provide a comprehensive frmework for es- 5 tablihn and ensuring-the effectiveness of controls 6 over inomton reourcem that support Federal op- 7 erations and mue 8 2 WA recognize the highly networked nature 9 of the Federal computing environment including the 10 need for Federal Government intaroperability and in 11 the implementation of improved security manage- 12 ment measures assure that opportunities for inter- 13 operability are not adversely affected - and 14 B provide effective governmentwide manage- 15 ment and oversight of the related information secu- 16 rity risks includn coordination of information se- 17 curity efforts throughout the civilian national secu- 18 rity and law enforcement communities 19 3 provide for development and maintenance 20 ofmimu 21 formation and ifraon systems and 4 provide a mechanism for improved over- 22 controls required to protect Federal in- 23 sight of Federal agency information security pro- 24 grms 63-639 00-4 94 3 2 9 a Except as provided under subsection b die 3 definitions under sectiotL3502 shall apply to this sub4 chapter 5 Mb As used in this subchapter the term 'information 6 technology' has the meaning given that term in section 7 5002 of the Clinger-Cohen Act of 1996 40 U S C 1401 8 13 33 Authority and function of the Director 9 11 a 1 Consistent with subchapter 1 the Director 10 shall establish governmentwide policies for the manage11I ment of programs that support the cost-effective security 12 of Federal information systems by promoting security as 13 an integral component of each agency' business oper14 ations 15 16 17 2 Policies under this subsection shall A befodon continuing risk management cyce that recognizes the need to 1dni asess and understand risk - 18 19 20 and W determine security needs commensu-4 21 rate with the level ofrisk- 22 B implement controls that adequately ad- 23 24 25 dressathe risk o 0 promote continuing awarenen of information security risk - M6 4 1 2 D wno uao monitor anid evaluate poliqw and 3 M control effectiveness of information secu- 4 rity practices S 11 b The authority under subsection a includes the 6 authority to-7 1 oversee and develop policies principles 8 standards and guidelines tor the handling of Fed- 9 oral information and information resource to imn- 10 prove the efficiency and effectiveness of govern- I1I mental operations include principles policies and 12 guidelines for the implementation of agency respon- 13 tsibilities under applicable law for ensuring the pri- 14 vacy confidentiality and security of Federal infor- 15 mation 16 2 consistent with the standards and guide- 17 lines promulgated under section 5131 of the Clinger- 18 Cohen Act of 1996 40 U S C 1441 and sections 19 5 and 6 of the Computer Security Act of 1987 40 20 U S C 759 note Public Law 100-235 101 Stat 21 1729 require Federal ageneies to identify and af- 22 ford security protections commensurate with the risk 23 and mantde of the harm resulting from the loss 24 misuse or unauthorized access to or modification of a Is M 96 1 5 in ruiation collected or maintained by or on behalf 2 of an agency 3 3 direct the heads of agencies to coordinate 4 such agencies and coordinate with industry to-- 5 A identify use and share beat security 6 practices and 7 B develop voluntary consensus-based 8 standards for security controls in a manner 9 consistent with section 2 b 13 of the National 10 Institute of Standards and Technology Act 16 11 U S C 272 b 13 12 4 oversee the development and inplemnenta- 13 tion of atandards and guidelines relating to security 14 controls for Federal computer systems by the See- 15 retary of Commerce through the National Institute 16 of Standards and Te -hnology under section 5131 of 17 the Clinger-Cohen Act of 1996 40 U S C 1441 18 and section 20 of 1he National Institute of Stand- 19 ards and Technologyt Act 15 U S C 278g-3 20 21 5 oversee and cootdinate compliance with this section in a manner consistent with- 22 A sections 552 and 552a of title 5 23 B sections 20 and 21 of the National 24 Institute of Standards and Technology Act 15 25 U S C 278g-3 and 278g-4 018 i 97 6 n motion 5131 of the Clinger-Cohen 1 2 Act of 1996 40 UASC 1441 3 D actions 5and 6of the Computer Se- 4 curity Act of 1987 40 U S C 759 note Public 5 Law 100-235 101 Stat 1729 and E 6 related information management 7 lam NW 8 6 take any authorize action that the Die 9 tor considers appropriate including any action in- 10 volving the budgetary process or appropriations I1I management process to enforce accountability of the 12 head of an agency for information resources man- 13 agement and for the investments made by the agen 14 cy in information tchnology including- 15 A recommending a reduction or an in- 16 crease in any amount for information resources 17 that the head of the agency propose for the 18 budget submitted to Congress under seton 19 1105 a of title 31 20 B reducing or otherwise adjusting ap portionments and reapportionment of appro- N 21 22 priations for information resources and 23 C using other authorized administrative 24 controls over appropriations to restrict the 25 availability of funds for information resources aim I 98 1 7 a The authority under this section may be dele- 2 gated only to the Deputy Director for Management of the 3 Office of Managzement and Budget 4 1'#8SIGN Federa agency re 5 subllties a The head of each agency shall- 6 1 be responsible for-- 7 A adequately protecting the integrity 8 confidentiality and aviability of information 9 and information systems supporting agency op- 10 erations and assets and I1I B developing and implementing infor- 12 nation security policies procedures and control 13 techniques sufficent to afford security protec- 14 tions commensurate with the risk and mag- 15 nitude of the harm resulting from unauthorized 16 disclosure disruption modification or destruc- 17 tion of information collected or maintained by 18 or for the agency 19 2 ensure that each senior program 20 manager is responsible for- 21 A assessing the information security 22 risk associated with the operations and assets 23 of such manager a lBS is 99 1 8 B determining the levels of information 2 secuurity appropriate to protect the operations 3 and assets of such manager and 4 0 periodically testing and evaluating in- 5 formation security controls and techniques 6 3 delegate to the agency Chief Information 7 Officer established inder section 3506 or a comn- 8 parable official in an agency not covered by such 9 section the authority to administer all functions 10 under this subchapter including-- 11I A designating a senior agency informas- 12 twon security officer 13 B developing and maintainin an agen- 14 cywide information security program as re- 15 quired under subsection b 16 I 0 ensuring that the agency effectively 17 implements and maintains information security 18 Policies procedures and control techniques 19 D training and overseeing personnel 20 with significant responsibilities for information 21 security with respect to such responsibilities 22 and 23 I E asiisting senior program managers 24 concerning responsibilities under paragraph 2 6 iws Is 100 1 9 4 ensure that the agency has trained per- 2 sonnel sufficient to assist the agency in complying 3 with the requirements of tisB subchapter and related 4 policies procedures standards and guidelines and 5 5 ensure that the agency Chief Information 6 Offcer in coordination with senior program man- 7 agers periodically- 8 A i evaluates the effectiveness of the 9 agency information security program including testing control techniques and 10 ii I1I implements appropriate remedial ac- tions based on that evaluation and 12 B reports to the agency head on- 13 NOi the results of such tests and eval- 14 uations and 15 16 iH the progress of remedial actions 17 b 1 Each agency shall develop and implement an 18 agencywide information security program to provide infor19 mation security for the operations and assets of the agen20 cy including information security provided or managed by 21 another agency 22 2 Each program under this subsection shaU 23 include- 101 10 I A periodicauessmmenta of information secu- 2 rity risks that coider internal aiid external threats 3 to- M 4 5 the integrity confidentiality and Availability of systems and ii data supporting critical operations 6 7 and ast 8 B Policies and procedures that -- re- 9 M are based the risk asssmn 10 quired wider paagrapl 1 that cost-efeetively 11 reduce information security risks to an aocpt- 12 able leve and W ensure compliance with-- 13 1 th reqrements of thissub- 14 is chapter 16 MII policies and procedures as may be prescribed by the Director and 17 UMl 18 any other applicable require- ments 19 C secuity awaree s rinn to inform per- 20 sonnel of- 21 22 i inforiunation security risksassociated with personnel activities and 23 4 im s 102 1 11 responsiilities of personnel in comn- 2 plying with agency policies and procedures de- 3 signed to reduce such risks 4 D i periodic management testing and eval- 5 uation of the effectiveness of information security 6 policies and procedure and ii a process for ensuring remedial action to 7 address any deficiencies and 8 I E procedures for detecting reporting and 9 10 responding to security incidents includingmitigating risks associated with such III M 12 inidents before substantial damage occurs 13 ii' notilring and consulting with law en- 14 forernent officials and other offices and au- 15 thorities and 16 iii notifing and consulting with an of- 17 floe designated by the Adminisftrator of General 18 Services within the General Services Admainis- 19 tration 20 3 Each program under th subsection is subject 21 to the approval of the Direcor and is required to bere22 viewed at least annually by agency program officials in 23 consultation with the Chief Information Officer 4siswis 103 1 12 6 1 Bach agenc shall e aznn the adequacy and 2 effectiveness of nfrain security policies procedures 3 and practIoss in plans and reports relating to- 4 A annual agency budgets 5 B information resource management under 6 the Paperwork Reduction Act of 1995 44 U S C 7 101 notee 8 11 C program performance under sections 1105 9 and 1115 through 1119 of title 31 and sections 10 2801 through 2805 of title 39 and 11 D financial management under- 12 i chapter 9 of title 31 United States 13 Code and the Chief Financial Officers Act of 14 1990 31 U s c 501 note Public Law 101- 15 576 and the ameiidnients made by that Act 16 Wi the Federal Financial Management 17 Improvement Act of 1996 31 U S C 3512 18 note and the amendments made by that Act 19 and 20 Nii the internal controls conducted under 21 22 section 3512 of title 31 2 Any deficiency in a policy procedure or practice 23 identified under paragraph 1 shall be reported as a ma24 WeiW weakness in reporting required under the applicable 25 provision of law under paragraph 1 as IM 104 13 1 18585 Annual independent evaluation 2 a 1 Each year each agency shall have an inde- 3 pendent evaluation performed of the information secrity 4 program and practices of that agency 5 2 Each evaluation under this section shall 6 include-7 A an assessment of compliance with- 8 i the requirements of this subchapter and 9 10 Wi rated information security policies 11 procedures standards and guidelines and 12 B tests of the effectiveness of information 13 security control techniques 14 b 1 For agencies with Inspectors General ap- 15 pointed under the Inspector General Act of 1978 5 16 U S C App annual evaluations required under this sec17 tion shall be performed by the Inspector General or by 18 an independent external auditor as determined by the In19' spector General of the agency 20 2 For any agency to which paragraph 1 does not 21 apply the head of the agency shall contract with an ide22 pendent external auditor to perform the evaluation 23 3 An evaluation of agency information security 24 programs and practices performed by the Comptroller 25 General may be in lieu of the evaluation required under 26 this section 08 1SM Is 105 1 14 a Not later than Narh1 201 and every Nkd 2 1 thereafter the remuita of an evaluation required under 3 this section shall be submitted to the Director 4 d Each year the Comptwiler General shall- 5 1 review the evaluations required under this 6 section and other information security evaluation re- 7 sults and 8 9 t0 2 report to Congress regarding the adequacy of agency information programs and practice e Agencies and auditors shall take appropriate ac- 11I tions to ensure the protection of information the disclo12 sum of which may adversely Affect informal4on security 13 Such protections shall be commensurate with the risk and 14 comply with all applicable laws 15 sic Rw 5 oN8IBIrrm 0F CEuRAIN AOKNCIES 16 a DEPARTMENT OF CO3ERCE -The Secretary of 17 Commerce through the National Institute of Standards 18 and Technology and with technical assistance from the 19 National Security Agency shall20 1 develop issue review and update standards 21 and guidance for the security of information in Fed- 22 eral computer systems including development of 23 methods and techniques for security systems and 24 validation programs 4 in$ i 106 15 2 develop issue view 1 and update guidelines 2 for training in computer security awareness and ac- 3 cepted computer security practices with assistne 4 from the Office of Personniel Management 5 3 provide agencies with guidance for security 6 7 planning to assist in the development of applications and system security plans for such agencies 4 8 4 provide guidance and assistance to agencies 9 10 concerning cost -effective controls when inter- connec ixg with other systems and 11 5 evaluate information technologies to assess 12 security vulnerabilities and alert Federal agencies of 13 such vulxierabiiities 14 b DEPARTMENT op JUSTJC -The Department of 15 Justice shall review and update guidance to agencies on16 1 legal remedies regarding security incidents 17 and way to report to and work with law enforce- 18 ment agencies concerning such incidents and 19 2 permitted uses of security techniques and 20 technologies 21 c GENERAL SERVICES ADMINISTRATION -The 22 General Services Administration shall23 1 review and update General Services Admin- 24 istration guidance to agencies on addressing security 00Smis 107 16 1 consideration whenacurn 2 nolor and information tech- 2 assist aece in the acquisition of cotet 3 ecurity products services and incident re- 4 feted 5 pneCapabilities 6 d OFFICE OF PERSONNEL MIAflAOEsmz4T -ThO 7 Office of Personnel Management shall8 1 review and update Office of Personnel Man- 9 agement regulations concerning computer security 10 training for Federal civilan employees and 2 assist the Departmnent of Commerce in up- 11 guidelines for training in 12 dating and maintann 13 computer security awareness and computer security 14 beat practices ETS G 15 maC 4 TEmCNIAL ANm CONMN waAMENm 16 a IN GENERAL -Chapte 35 of title 44 United 17 States Code is amended 1 in the table of sections- 18 A by inserting after the chapter heading 19 the Hoaowing 20 8UBCIIAPTBR I-PEDRRALe INFORMATION POLICY and 21 B by inserting after the item relating to 22 section 3520 thie following 23 suBHAPTER nFRMmATION SEcuRmT 38681 PurpowM 6aow 108 17 3632 Defnl pw SM3 ActhoAV t nenUons of the MDircor 8684 PeW pney reonsbiimu f t ihAtW01e 86536 Annual ipbndq 1 and 2 2 by inserting before section 3601 the fol- 3 lowing- 4 SUBCHAPTER I-FEDERAL INFORMATION 5 POLICY 6 b REFERENCES To CUAJoIER ' 35 --Chapter 35 of 7 title 44 United States Code is amended 1 in section 3501- 8 9 A in the matter preceding paragraph 1 10 by striing chapter and inserting sub- 11 chapter and B in paragraph 11 by striking chap 12 13 ter and inserting subchapter 14 2 in section 3502 in the matter preceding 15 paragraph 1 by striking chapter and inserting 16 subchapter 3 in section 3503 in subseetion b by'strik- 17 18 ing chapter and inserting subchapter 4 in section 3504- 19 A in subsection a 2 by striking chap- 20 ter and inserting subchapter 21 B in subsection d 2 22 by striking chapter and inserting subchapter and 23 amoo t ' 109 18 1 0 in subscton f' 1 by striking chap 2 ter and inserting subchapterer 3 5 in section 3505- 4 A in subsection a in the matter pre- 5 ceding paragraph 1 by striking chapter l 6 and inetn subchapter 7 B in subsection a 2 by striking chapap 8 ter and insertin subchapter and 9 0 in subsection a 3 B iii by striking 10 chapter and inserting subchapter 11 6 'in section 3506- 12 A in subsection a 1 B by striking 13 chapter and inserting subchapter 14 B in subsection a 2 A by striking 15 chapter and inserting 'subchapter 16 0 in subsection a 2 B by striking 17 chapter and inserting subchapter 18 D in subsection a 3 - 19 i in the first sentence by striking 20 chapter and inserting subchapter and 21 ii in the second sentence by striking 22 catr 23 E in subsection b 4 by striking chap- 24 and inserti subcfhapter tsr and inerin subalchater on 11W m 110 19 F in suscin by striking chlap 1 2 ter to ' and istng subchapter to l and 3 G in subseton o 1 A 4 chapter and inserting subchapter 5 7 in section 3607-t 6 by striking A in subsetion e 3 B by striking 7 chapter and inetn subchapter 8 B in subsection h 2 B by striking 9 chapter and inserting subchapter 10 0 in subsection h 3 by striking chapap 11 ter and inserting subcolhapter 12 D in subsection j 1 A i by striking 13 chapter and inserting 'subchapter 14 R in subsection 0j 1 B by striking 15 chapter and inserting 'subchapter and 16 F in subsection j 2 by striking chap 17 ter I and inserin subchapter 18 8 in section 3509 by striking chapter and 19 inserting subchapter 20 9 in section 852- 21 A in subsection a by strikidng cater 22 if and inserting subchapter if ' and 23 B in subsection a 1 by striking lchap- 24 ter and inserting subchapterter 25 10 in section 3514as in$ is III 20 1 A in subsection a 1 A by striking Ichater and inserting subchapter and 2 3 B in subsection a 2 A ii by striking 4 chapter and inserting subchapter each 5 place it appears 6 11 in section 3515 by striking chapter and inserting subchapter 7 12 in section 3516 b'y striking chapter and 8 inserting 'subchapter 9 13 in section 3517 b by striking chapter 10 I1I and inserting subchapter 12 14 in section 3518- 13 A in subsection a by striking chap- 14 ter and inserting subchapter each place it 15 appears B in subsection b by striking chap- 16 ter and inserting subchapter - 17 0 in subsection c 1 by striking chap 18 ter and inserting subchiapter 19 D in subsection c 2 by strikn chap- 20 ter and inserting subchapter - 21 H in subsection' d by striking chap- 22 ter and inserting subchapter and 23 F in subsection e by striking chap- 24 ter and inserting subchapter and 25 8 isW1 112 21 15 in section 3520 bystMiing IehAapter l and 1 2 inserting ucatr 3 smc zwwrx DATh 4 This Act and the amendments made by ths Act ahal 5 take effect 30 das after the date of ectn 6 Act 0 of IM of this P - - - - - 113 G WWmU% sDO 1WUKaaptatDtOtR March31 200 The Honorable Daniel X Akaica Committee on Governmental Affaire United States Sectate Subjct foaln8 dzEuern uan oann htBw Dear Senator Akaka This letter responds to the March61 2000 letter from ML Hannah Sistare Staf Director and Counsel of the Senate Commurittee on Governmental Affairs requestig on your behalf that we answer several follow-up questions related to our March 2 2000 testimony ' DuMin that testimony we discumsd the proposal in S 1993 the Government Wnormation Security Act of 199 which seeks to strengthen information security practices throughout the tederal government Your questions along with our responses follow Question J Should we be concerned that nationalsecurity programsma y become more vulnerable as a result of what S 19P3 would do Answer S 1993 does not limit the extent to which agencies can protect their computer-supported operations including those related to national security Conversely the bil emphasize the importance of recognizin that highl critical and sensitive data and operations merit a higher level of security than those that are les critical and sensitive S 1993 would place responsibility for determining what levels of protection are approprae for the various types of data and operations in the hands of agency program mantagers AB a result managers of classifed programs would be responsible for determining how to protect their classifid data in accordance with their agencies' policies Yn esence S 1993 provides a generic framework for improving 'Wnfuuitlcm SecW Comamwa on Lb PnroodGovenuntnt hLnOnwio Secdty Ac t f X GAO -AIMD-MI0l7 Mwdh 2 WOO 114 1 agecy magement of information securt ard oversight of agiency practice S uch a framework can berefit all agwicy p106maboth clambWed and ui fled-by helping to emire that controls commerate with risk are Implemented effectively Question La How can we eswww under 1993 hat both clamtfled aWndnCIassMfid Inlbnaton syatenmwill be adequatelyprots cied Arnwer S 9I3 provides for artalc-based approach to Information security that requiresagecy manager to determine what levels of protection are appropriate and ensures that such protections arm effectively Implement -Underthis approach clasified systems would continue to be subject to security requirements applicable wnder existing agency policies unless agencies determined that such requirements and related policies needed to be modified Qu6 tlon L b Won'I there be a tendency to focus on cliied aystenv%perhaps ulowlnrg down the pub ics access to undlalflec Information Answer S I99 recognimestha for security on size does not AtfItVl Accordingly the level of public access allowed would vary depending on the sensitivity of the Informnation in question Disclosure of some unclassified Information is prohibited by Law such as sensitive taxpayer Inrmaton The protection of government Information from unauthorized access is Important due to national security and privacy concerns Ensuring adequate protection of the dMa In no way affects the right of citizens to access public Inormation through mechanisms such as the Freedom Of Inforation Act which was established to provide them access S 1993's focus on risk nanagenient isdesigned to accommodate all levels of d0aa sensitivity Question 2 Have we historically provided adequate guidance overiSght and funding to each executive department to enable them to effectivelyaddres current day vulnerabllita --orIs that the crux of the pro blenm Answer While guidance oversight and funding have been provided they have not kept pace with the quickly evolving computing environment over the last decade In addition audits have shown that agencies have done a poor job of implementing existing guidance S 199 seeks to update and improve guidance to agencies and Improve oversight by requiring annual evaluations of agency security programs Question 2 a Is the current situation so dire tha sedoua consideration of a national Chief information Officer CIO isa logical step to take at this time Page 2 115 Answer Yea As I ntidonsd in my testmony Wnmson opetemis at most federal aged are h1Wi4vulnble to attvck and misuse 1 and there M a need for stuiger more c aurlid leadership Inthis area A federal 010 could help oordinagency securit ctMtles and facilate solutions for commoA problems Concwmtlny a federal 20 coud bent other aspects of Information technology management such as Ststae c punningmanaing system investmen anad software development ItIsWimprat that all of tieme aspects of information technology managementIncluding information security be managed under acohesive straeg Please contact me at 202 512-0240 f you have sany questJonL I can also be reached by e-mal at brock almdftaosov Sincerely yours Director Oovernmentwide and Defense Informaton Systems 611967 Page 3 116 V Neft AOMMA06 W o'A rN A ---qv YhRDC Z346-OO0W 31 W I Me Hannah Sistare Staff Director and Counsel United States Senate Committee on Governmental Affairs Washington DC 20510-6250 Dear Ms Sistare Enclosed is our response to the additional questions posed by Senator Akalca from the March 2 2000 hearing entitled Cyber Attack Is the Government Safer Our office is committed to improving information security and adequately protecting NASA information technology resources Because vulnerabilities to command and control operations of spacecraft arm of great concern to the NASA Office of Inspector General we have Issued several reports related to command and control issues We also have issued many reports on other NASA information security vulnerabilities I would be glad to provide you briefings on these matters at your convenience If you or your staff have any questions or need additional information regarding our response please contact me at 202 358-1220 or Mr Alan Lamoreaux 10 Executive Offcer at 202 358-2061 Sincerely Roberta L Gross Inspector General Enclosure 'p 117 NATIONAL AERONAUTICS SPACE ADMSTRA77ON M ROBERTA GROSS INSEC'OR GENERAL 8MM Senae 1 9hLN 1K M I oft amanmotoLMAo March L20M Ruaft Bsckgr uud The following quote is ftrm the May 1999 OAO Information Security Reort entitled NM W SZ Fa M2a With nohig more than hdim inio-W publicly available Internet acom we performed penetration testing at one of NASA's 10 field centers simulating outside attackers Out tost team was able to systemastically penetrate system Involved Intwo mission critical ftnictions 1 supporting the commndW and control of spacecrft and 2 processing and distributing scientific data returned fitm space 11a systm supporting the command and control of spacecafl were involved in determining and verlif ing a variety of detailed spaccraft positioning data such as ocbital attitude the precise orietaton of a spaecraft with respect to the earh and other orbit Information used in planning spacecraft maneuvers anid establishing and maintaining communications with ground controllers Question 1 Are spacecraft command and control systems clasifled national security syste Answer The spacecraft command and control system amc considered classified national security systems only if the mission contains a classified payload or if the mission involves classified national security information In addition command and control systems are classified if the information from the misson is used to augment national security operations in the event of a national emnergency Question 2 What was the reas for such poor controls over such a critical - Answer system The controls and procedures in place to protect the critical systems were weak in part due to the absence of a robust information security program which lacks adequate policies and procedures adequatey qualified information secwity professionals appropriate program funding for security and effective enforcement and follow-up to ensure compliance with applicable fedeal regulations 118 Quat m3 Have thespribim b-oa B W Answev Apecy-wid cifits amww ewsy to address Uw poblems but signifCant probiumls emabn wce rcgsp to quilons 2 would wtc tht t peaetmtioo testing sddressed in theGAO repo iIvolved ground-based camp aunded command sad control It did tot lhIude radioftequny bm asdpecc omftmandin8 Rdo frequemy boned eCOMAf co -un-ug Werequhaadequate ud caton regardless of whether the milnIs unionAl secity related Or purely comriaL In this ares NASA bas not effeti vely Impemnted policy roifria #Morved commuicutions secwtity tcehnques be applied to NASA up O' C CM 119 Cisge ITereu AuwIMTX 717$9 Phon S$I249-5055 Fax- $11 2404506 hOJAWV WW XWf March 31 2000 Chairman Nred Thompson Senator Joseph Utbeeman Committee on Jovernmental Affairs United Stau Senate Washington DC 20510-6250 Dear Senators 'hompson Uebennan Thank you for the opportunity to offer additional information pertinent to the March 2 2000 hearing entitled OCyber Attack Isthe Governmeunt Safe I hope the following adequately answers the cornittee's question as posed by Senator Akska QunQ Many believe that the private sector should and must take the predominant role in resolving the cyber network security problem Do you shame this view and do ypu forese the overall problem improving or getting worse as technology evolves 8LEQffS Cisco believes that t private sector should take the predominant tole in resolving network cyber security challenges However the private sector needs and hopes to partner closely with government combining our strengths and leveraging our core competencies to achieve network scurity And separate and spart ftrm industry efforts the government clearly has responsibility for protecing government computers and networks from attack We are confident that working together we can collectively a drkm the challenges as technology evolves We believe that this public-private partnership is the most effective response to potential attacks In the private sector incentives must be put into place to encourage all network administrators to deploy security technologies to protect themnselvs and their customers from hacker attacks In the public sector we arm grateful that the Feda Bureau of Investigation has devoted significant resources to investigating the recent denial of service attacks and we hope the perpetrators will be prosecuted to the fullest extlent of the law We also encourage the federal government to serve as v model for private industry by equipping its own computer networks with the best security measures possible 1 Tht Pd page Seetor Should Lead Rforts o Address Cyber Serity Challengc Going forward it is clearly up to the private sector to assume the lead role in network security Private sector leadersip makes sense for several reasons not the least of which Isthat the vast majority of networks are built owned and operated by private industry Market forces driv us to develop solutions 120 qukly with the aim of continued rous delivery o goods aid servioee In addition the private sector brings several core coripetecies to bear specfically Murt- iven soltions O peuot a eaetse Robust lavesunent Inresearch and development The abIy to respond quickly to chang mrkt requirements e StW o he-attraining vad caton progrw lmkwty-drivyen standards Private indtry has Indeed begun stepping up to the plate injust the past few weeks Amredy each of the private Infrastru cturn sectors is organzing to adkeas concerns rased by Presdential Decision Direcive 63 and the National Plan for Information System Protection Version 1 0 incooperation with their government sector liaisons The new Paritnership for Critical Infrastructure Security is addresing vzosssecto concerns while providing a vehicle for private sector Input into the national planning proesm and to the National Inrstructure Assuranc Council as it develops advice for the President We In the Partnership hope to momn fully Involve government leaders the privacy community and academia and srn tang stp to do so Meanwhile we have Identified broad areas of mutual cometi to both government and the private sector and arm planning on a formal organization with defined support And liaison relationship to e Apedite out work 2 The Prigae Suctr # dgod lAnt to Penner MiMl QgevnUuen to Sc urer Netgork Por the private sector to succeed however it will need a strong and engaged partner in government Government brings several unique capabilities to the Partnrsmhip Including The ability to offer incentives for market-duven solutions beyond what due diligence And masct pressure can provide 9 Power to remove barrers to infonwatlon sharng e g liability e Access to threat information for a better understanding of risk A bully pulpit from which to wage a national education program 9 The ability to coordinate a national research and development agenda Sharing of Information on thrais and effective response between privae sector and government will be critical to our suiccs 3 Sawge by t IwAaa0 Rffeet gaf GepewaMen Nedg TaeS Rf WssHA t fo Us Own SerNMs Government will need to take the leading role with respect to protecting government systems particularly military and national security networks Government system arc uniquely attracive targets to hackers and contain uniquely critical data In edition the government must defend against third parties jackingn its powerful networks to attack other We concur with the objectives stated by this Committee - the federal governmental should strive to serve as a model for private industry by equipping Its own computer networks with the best security measure possible 121 While aubwitrn probem may increase I behieve thai in the long kem we can dranazcAtly improve the sate of network security by working together To adnasho tern chalkoges data-dive mainaga edcsionu can effect change Security postre assessments can not only provide baseline acunity jseg of department agency and company netwotk s they can serve as awarenesa vcdiiclcs for sailor management Inthw Wonterm must Invest In anational education and trairnS program and conduct basic and applied sewilymraearvh Industry adcadea can build network security taning programs but must collaborate with the goveSinen on training requirtments and standards Coordinating university network security syllabi ro-ta 1nlng federal and private secor employees and promoting corpoate training programs should become a top agenda item Building a reliable sure next generation Internet is possible if we nicet researet challenges together New technologies like malicious code detection mobile agents and senior tehnolics ovar P could expedite long-term solutions We won't know what combinations ame needed until we invest in and conduct this research together I believe the Partnership for Cyitical lnfrastncture Sccwity repreents a puta beginning to the public private colaboration neddto fully resolve out common infrasotriure assurance problm I look forward to working more closely %ith govemmnril acakrua and othe industry paners as we empower our citizens and customers to lake full advantage of the Iniernet economy inthe Inicroct century Please contact me at S312 378 1112 or e-mail kwatwgn cise com if you have additional questions Sincerely Ken Watson Cisco Systems Inc
OCR of the Document
View the Document >>