THE PRESIDENT’S NATIONAL SECURITY TELECOMMUNICATIONS ADVISORY COMMITTEE NSTAC Report to the President on International Communications August 16 2007 President’s National Security Telecommunications Advisory Committee TABLE OF CONTENTS EXECUTIVE SUMMARY ES-I 1 0 INTRODUCTION 1 1 1 Background 1 1 2 Charge 2 1 3 Process 2 2 0 NS EP COMMUNICATIONS THE NGN AND THE THREAT ENVIRONMENT4 2 1 NS EP Communications 4 2 2 The NGN 5 2 3 The Threat Environment 5 3 0 POLICY ISSUES 8 3 1 Legal Policy Framework and Analytic Process 8 4 0 OPERATIONAL ISSUES 12 4 1 Domestic and International Collaboration on NS EP and Incident Response 12 4 2 Current Collaboration Landscape 12 4 3 United States Government to Industry Collaboration 13 4 4 Industry’s Global Collaboration 14 5 0 FINDINGS 16 6 0 RECOMMENDATIONS 17 APPENDIX A PARTICIPANT LIST A-1 APPENDIX B ACRONYM LIST B-1 APPENDIX C GLOSSARY OF KEY TERMS C-1 APPENDIX D INTERNATIONAL POLICY INSTRUMENTS MATRIX D-1 APPENDIX E BRIEFINGS LISTING E-1 APPENDIX F OPERATIONS BACKGROUND F-1 NSTAC Report to the President on International Communications i President’s National Security Telecommunications Advisory Committee EXECUTIVE SUMMARY As society moves into the 21st century globalization1 is taking place at an increasing rate This trend is engaging a much richer spectrum of countries as interdependent producer-partners supply the products and services needed to fuel economic growth Among the most important enabler of this global economic growth is the communications network which the owners and operators of the Public Network PN supply and maintain This internationally connected global communications infrastructure2—a grid of voice video and data services devices and networks—is fueling the rapid growth of international products and services The daily internal operations of nation-states are also dependent on reliable services across the global communication infrastructure In this sense each nation-state has interests similar to functions that U S national security and emergency preparedness NS EP programs perform As international economies grow those nation-states that enable and enforce stable legal frameworks become more important on a global economic level Global communications depend on a reliable and sustainable global infrastructure operating across national borders in the face of natural disasters and man-made threats On a national scale large regional disruptions such as the September 11 2001 attacks and Hurricane Katrina were addressed through existing government and industry partner frameworks On an international scale however large natural and man-made threats pose new and more insidious potential for business and government disruptions exacerbated by the absence of broadly endorsed collaboration and response international frameworks During the period of this President’s National Security Telecommunications Advisory Committee NSTAC study two significant regionalized communications outages have occurred affecting the global communications infrastructure On December 26 2006 a 7 1magnitude earthquake struck off Taiwan’s southern coast damaging undersea fiber-optic telephone cables and severely disrupting telecommunications in a wide area Taiwan’s largest telephone company Chunghwa Telecom Company reported that the damage disrupted 98 percent of Taiwan’s communications with Malaysia Singapore Thailand and Hong Kong 3 The extensive infrastructure damage that this earthquake caused resulted in communications disruptions for several weeks while the undersea cables were being repaired More recently the Baltic nation of Estonia battled what has been characterized by the press as a full-scale cyber attack that started on April 27 2007 As denial-of-service attack protocols flooded Estonian government and private computer systems with up to a million times more data 1 2 3 Globalization is the integration of people companies and governments of different nations driven by international trade and investment and aided by information technology The “global communications infrastructure” is a vast system of distributed interconnected and international networks broader than the “Public Network ” including what many call the Next Generation Network NGN This infrastructure includes both traditional information technology and communications components and will logically and broadly consist of applications and devices that deliver services the services provided to users some by the network and some external to it and the underlying transport networks The term “global communications infrastructure” is used to emphasize the breadth of coverage of these networks “Asia Communications Hit by Quake ” BBC News December 27 2006 NSTAC Report to the President on International Communications ES-1 President’s National Security Telecommunications Advisory Committee than normal Estonian officials had to cut off or limit Internet traffic originating from international locations Estonia which has been a full member of the North Atlantic Treaty Organization NATO since 2002 requested assistance from NATO member countries As NATO and U S cyber experts rushed to support Estonia the international community witnessed many known forms of cyber attack 4 Such significant natural and man-made threats discussed herein coupled with an increase in global interdependency further underscore the worldwide reliance on the global communications infrastructure Prior to the occurrence of the two events noted above the NSTAC initiated this examination of the current international NS EP communications environment to— • Evaluate the present U S operational strategies policies and frameworks for international collaboration and • Prepare recommendations to the President to promote U S NS EP interests in emerging international network security efforts In conducting this examination NSTAC received documents reports and briefings from industry and Government that covered a wide range of topics from subject matter experts SME in policy development international relations operational control such as cyber incident response standards and protocol development intelligence and internationally significant infrastructure In addition representatives from several U S Government agencies including Department of Homeland Security DHS Department of Defense and Department of State offered input throughout the development of this report Of particular value was the participation of senior government representatives from relevant Canadian and U K government agencies As part of this study the NSTAC reviewed international network infrastructure incident response policies and legal frameworks that define or influence how U S infrastructure operators interact with foreign governments or foreign operators The NSTAC developed an inventory of instruments that make up this framework to better describe the current policy environment This inventory which has been updated throughout the course of this inquiry is included as Appendix D Findings • 4 The rapidly evolving global communications infrastructure is increasingly interconnected through a system of systems that provides global services and connectivity A global workforce including those in non-allied nations operates and maintains the infrastructure “Cyber Assaults on Estonia Typify a New Battle Tactic ” Washington Post May 19 2007 http www washingtonpost com wp-dyn content article 2007 05 18 AR2007051802122_pf html ES-2 NSTAC Report to the President on International Communications President’s National Security Telecommunications Advisory Committee • As a result of globalization the U S NS EP communities government operations allies many key businesses and their global business partners are increasingly dependent on the availability of global communications and related services • Cross-sector dependencies and interdependencies such as between telecommunications and electric power create additional complexities amplifying the difficulties of mitigation and effective repair when broad-scale disruptions occur • Cyber threats to global infrastructures may originate from international sources beyond the jurisdiction of U S and allied authorities • – Attacks originating outside the territorial United States raise increasing concerns about the security and availability of domestic NS EP communications and the global communications on which many key U S functions and economic interests rely – The sophistication and reach of the global communications infrastructure increase the complexity of the threat whereas the adversary’s barrier to entry is low as a result of anonymity connectivity and widespread availability of tools for creating disruptions The U S Government’s international NS EP strategies policies and operational response frameworks are not sufficient to keep pace with globalization and technological convergence of PNs and private sector networks nor do they adequately include private sector participation in these processes Recommendations Recognizing NS EP communications’ evolving dependence on and interdependence with global infrastructures and to enhance the resiliency of the global communications infrastructure the NSTAC recommends that the President in accordance with responsibilities and existing mechanisms established by Executive Order 12472 Assignment of National Security and Emergency Preparedness Telecommunications Functions direct the following • Task DHS to coordinate international planning and development with the appropriate Federal Agencies for adoption of a global framework incorporating operational protocols and response strategies The framework must accomplish the following − Address physical and cyber events that would disrupt the availability of critical global infrastructure services − Ensure private sector participation in developing the framework to leverage extensive expertise and existing relationships − Support the use of identity management solutions that address NS EP requirements for normal operations and all-hazards crisis response NSTAC Report to the President on International Communications ES-3 President’s National Security Telecommunications Advisory Committee − Examine with the help of private sector partners existing U S laws and policies that could prevent service providers and other stakeholders from taking the necessary proactive measures to restore service and prevent harm to NS EP users for government essential operations during a crisis • ES-4 In the interim task Federal Agencies to expand relationships and response coordination using formal and reciprocal agreements with Allied governments to include participation from selected international service providers and other stakeholders into existing joint U S Government and private-sector response and coordination processes and entities such as the U S Computer Emergency Readiness Team and the National Coordinating Center NSTAC Report to the President on International Communications President’s National Security Telecommunications Advisory Committee 1 0 INTRODUCTION 1 1 Background The U S communications infrastructure once controlled by industry stewards with close Government relationships is now dispersed throughout numerous companies and organizations spanning the information and communications technology ICT 5 industries This global communications infrastructure 6 a term characterizing the global Internet Protocol IP -based converging networks and devices that enable voice video data and other broadband and mobile multimedia services is quickly supplanting the traditional Public Switched Telecommunications Network PSTN This technological convergence is being mirrored by a period of policy convergence requiring adjustments in existing government and industry approaches to the environment in which these networks and dependent services operate At the same time foreign management and ownership of portions of the global communications infrastructure is increasing 7 Policies and organizational mechanisms that address security risks and incident management in the global network community are essential components to addressing these challenges As this technological and policy convergence continues the U S communications infrastructure faces several issues and concerns that will uniquely affect national security and emergency preparedness NS EP 8 communications Communications now transit international borders without hindrance as the Public Network PN becomes increasingly interconnected with networks worldwide moving toward the ad hoc development of a global seamless network This global interconnectivity brings with it inherent risks information passes over parts of the network within and outside the United States diverse in security architecture and management This is particularly an issue in some foreign network segments and infrastructures which may be more vulnerable to intrusion deliberate disruption or accidental damage With this converged global network additional operational security concerns related to access and remediation following system disruption have emerged 5 Although Homeland Security Presidential Directive-7 bifurcates the U S ICT industry into telecommunications and information technology ICT is the internationally accepted terminology for the combined industries and is used in this report to describe the converged technology environment 6 The “global communications infrastructure” is a vast system of distributed interconnected and international networks broader than the “Public Network ” including what many call the Next Generation Network NGN This infrastructure includes traditional information technology and communications components and will logically and broadly consist of applications and devices that deliver services the services provided to users some by the network and some external to it and the underlying transport networks The term “global communications infrastructure” is used to emphasize the breadth of coverage of these networks 7 As reported in the European Telecommunications Standards Institute Report the October 2006 European Union Cyber-Security Report and the European Union Proposal the identification and designation of European Critical Infrastructure and the assessment of the need to improve their protection http ec europa eu justice_home doc_centre terrorism protection docs com_2006_787_en pdf and http ec europa eu justice_home doc_centre terrorism protection docs com_2006_787_en pdf 8 “NS EP communications” is the domain of interest of the NSTAC and its advisory activities We acknowledge that the concepts of NS EP and NGN are evolving Section 2 contains a more detailed discussion of these concepts NSTAC Report to the President on International Communications 1 President’s National Security Telecommunications Advisory Committee Previous reports have recommended that the President’s National Security Telecommunications Advisory Committee NSTAC expand its attention beyond domestic issues to encompass international matters to continue the protection and promotion of NS EP communications with industry government collaboration 9 1 2 Charge As a result of international NS EP communications concerns voiced at the NSTAC XXIX Meeting the NSTAC began the examination of current international incident management and operational protocols in addition to the policy frameworks related to the use of NS EP services over the global communications infrastructure These policy and operational issue areas are particularly critical in light of the following • Expanding U S Government-initiated collaboration with key allies and global trading partners • International nature of the network provider and threat environment surrounding cyber incidents and • Increasing threat to and dependency on internationally significant infrastructure operated by various foreign entities The objectives of this NSTAC report are as follows 1 3 • Evaluate the present U S operational strategies policies and frameworks for international collaboration and • Prepare recommendations to the President to promote U S NS EP interests in emerging international network security efforts Process The NSTAC received briefings and material from industry and Government subject matter experts SME in policy development international relations operational control such as cyber incident response standards and protocol development intelligence and internationally significant infrastructure Briefings covered wide-ranging topics including the Department of Homeland Security DHS National Communications System’s NCS and National Cyber Security Division’s NCSD international activities the Department of State’s DOS international communications coordination activities the private sector role within military-tomilitary relationships the present interagency DHS and Department of Defense DOD NS EP engagements and other direct NS EP engagements with foreign governments and the U S 9 Reports include The NSTAC Report to the President on Next Generation Networks 2006 The NSTAC Report to the President on the National Coordinating Center 2006 The NSTAC Report to the President on Telecommunications and Electric Power Interdependencies The Implications of Long-Term Outages 2006 The NSTAC Financial Services Task Force Report 2004 and The NSTAC Satellite Task Force Report 2004 2 NSTAC Report to the President on International Communications President’s National Security Telecommunications Advisory Committee Canadian telecommunications and electric power bilateral relationship 10 In addition to reviewing these specific briefings representatives from several U S Government agencies including DHS DOD and DOS participated in the development of this report Of particular value was the significant continuing participation of senior government representatives from relevant Canadian and U K government security agencies 11 As part of this study the NSTAC reviewed international network infrastructure incident response policies and legal frameworks that define or influence how U S infrastructure operators interact with foreign governments or foreign operators The NSTAC developed an inventory of instruments that make up this framework to better describe the policy environment this inventory has been updated throughout the course of this inquiry 12 10 Appendix E contains a complete listing of briefings Appendix A provides a complete list of participants and Appendix B contains an acronym index 12 Appendix D contains the latest version of the inventory 11 NSTAC Report to the President on International Communications 3 President’s National Security Telecommunications Advisory Committee 2 0 NS EP COMMUNICATIONS THE NGN AND THE THREAT ENVIRONMENT This section describes the evolving NS EP communications threat environment over the global communications infrastructure including the NGN and provides reference to the range of definitions and analyses of NS EP and the NGN for this report 13 2 1 NS EP Communications Historically the “national security” component of NS EP communications drew on the communications industry’s support of warfighting intelligence-gathering and other national security intelligence community missions Likewise the “emergency preparedness” component of NS EP was understood to incorporate recovery from domestic natural disasters such as hurricanes and earthquakes 14 More recently with the advances in technology and ever more global connectivity man-made physical and cyber threats to the communication networks come from ever wider communities and threat vectors those exercising terrorism of the sort evidenced during the September 11 2001 attacks as an instrument of international policy are also likely to join in these efforts 15 Similarly the ICT sector’s emergency disaster response is no longer limited to domestic incidents Consequently U S interests charged with supporting NS EP communications services now must be able to deploy those services globally The concept of national security has evolved through numerous institutional redefinitions in recent years 16 The NSTAC has acknowledged an expanding view of national security as it affects global communications infrastructure network security and availability in several reports including the NSTAC Financial Services Report and Report to the President on Next Generation Networks The NSTAC continues to examine relevant NS EP terminology 17 13 Appendix C provides a Glossary of Key Terms Note however that as a result of the major restructuring of the telecommunications industry pursuant to the 1982 Consent Decree the National Research Council in its 1988 report Growing Vulnerability of the Public Switched Networks Implications for National Security Emergency Preparedness recommended the establishment of “Software Security Measures” Recommendation 8 “to protect the public network from penetration by hostile users especially with regard to harmful manipulation of any software embedded within the public networks ” 15 The NSTAC also observes that in the face of Hurricanes Katrina and Rita the tsunamis and other natural disasters a similar evolution has occurred in understanding the EP component of NS EP communications This evolution has directly affected providers of EP communications services 16 For example the Phase II Report of the United States Commission on National Security 21st Century 2000 also known as the Hart Rudman Commission 17 Although numerous discussions have taken place regarding the term “NS EP telecommunications ” which is defined in FCC rules and regulations and 47-CFR 216 there is no universally accepted definition of “NS EP communications ” In addition Homeland Security Presidential Directive 7 calls for the Executive Office of the President to review NS EP communications policy This pending review will presumably discuss and may authoritatively define NS EP communications 14 4 NSTAC Report to the President on International Communications President’s National Security Telecommunications Advisory Committee 2 2 The NGN The term NGN has often been used interchangeably with “converging networks ” However the NSTAC previously described the NGN as an evolving concept from a rhetorical and technological perspective as follows 18 The NGN will logically consist of applications that deliver services the services provided to users and the underlying transport networks … The NGN itself is a capability that will enable many services and applications Some services will be provided by the network and some will be external to it but depend upon it NGN user-centric services will be delivered over various networks some of which like private customer premises networks and mesh networks lie outside the wide scope of the PN However there is no single universally accepted definition of the NGN … The term NGN is not intended to represent any single configuration or architecture Instead it represents the set of converged networks emphasis added … expected to arise that will transparently carry many types of data and communications and allow delivery of services and applications that are not coupled to the underlying network However it is possible to note several key NGN elements or attributes over which there is little if any dispute 19 In this report the term “global communications infrastructure” is used rather than “NGN” to emphasize breadth of coverage of these networks and to facilitate understanding by the reader who may have a particular definition or architecture in mind for the NGN 2 3 The Threat Environment The NSTAC acknowledges that network incident response is an integral part of overall incident response practices 20 The NSTAC also recognizes the potential gravity of cyber-based impacts on other critical infrastructures and agrees that these critical infrastructure CI interdependencies 21 which the NSTAC has previously addressed at the domestic level should be addressed at the international level in an integrated manner The global communications infrastructure consists of “physical” components such as switches storage devices and transmission mediums cable and satellite and “logical” components including control software protocols and applications Threats and disruptions to the NS EP communications infrastructure can be man-made whether intentional or accidental or natural and affect physical and logical elements 22 The approach to operational response must therefore 18 The NSTAC’s Report to the President on Next Generation Networks March 28 2006 Ibid p 4 20 See also the National Incident Management System and its component National Response Plan under revision by DHS as of this writing 21 Interdependencies are recognized as physical technical and human factors related 22 The Cyber Storm Exercise conducted in September 2006 demonstrated the impact of a blended physical-cyber attack For more information refer to “Fact Sheet Cyber Storm Exercise ” DHS Website September 13 2006 http www dhs gov xnews releases pr_1158340980371 shtm accessed April 25 2007 19 NSTAC Report to the President on International Communications 5 President’s National Security Telecommunications Advisory Committee be all hazards capable of responding to physical logical and blended impairments There is cause for concern that infrastructure attacks in the future may be perpetrated to a greater extent by nation states and organized terrorists who have developed intensive military computer attack capabilities and who target U S economic interests as well as critical infrastructure private industry assets and national security It is therefore no coincidence that communications assets are among the first targets hit in military engagements 23 Recent natural and man-made events highlight the international implications for NS EP On December 26 2006 a magnitude 7 1 earthquake struck off Taiwan’s southern coast damaging undersea fiber-optic telephone cables and severely disrupting telecommunications in a wide area Taiwan’s largest telephone company Chunghwa Telecom Company reported that the damage disrupted 98 percent of Taiwan’s communications with Malaysia Singapore Thailand and Hong Kong 24 Although the undersea cables required several weeks of repair resulting in extensive infrastructure damage the duration of communications disruptions were minimized as traffic was rerouted as a result of international industry cooperation The Baltic nation of Estonia battled what has been characterized as a full-scale cyber war that started on April 27 2007 As denial-of-service attack protocols flooded Estonian government and private computer systems with up to a million times more data than normal Estonian officials had to cut off or limit Internet traffic originating from international locations Estonia has been a full member of the North Atlantic Treaty Organization NATO since 2002 and requested assistance from NATO25 member countries As NATO and U S cyber experts rushed to support Estonia the international community witnessed many known forms of cyber attack 26 Although these incidents demonstrate the effectiveness of existing industry cooperation mechanisms they also illustrate the increasing need for international coordination to respond to incidents because the scope and magnitude of future threats remains unknown Network attacks or incidents originating outside the territorial United States raise increasing concerns about the security and availability of domestic NS EP communications and an effective response requires improvements in international collaboration Recent publicly reported international attacks on U S government agencies—from Moonlight Maze through Titan Rain27—illustrate the changing 23 Brief by OSD-NII staff June 9 2006 “Asia Communications Hit by Quake ” BBC News December 27 2006 25 For more information on the NATO response see NATO News Release NATO to Strengthen Protection Against Cyber Attacks ” June 14 2007 http www nato int docu update 2007 06-june e0614b html 26 “Cyber Assaults on Estonia Typify a New Battle Tactic ” Washington Post May 19 2007 http www washingtonpost com wp-dyn content article 2007 05 18 AR2007051802122_pf html 27 The threat profile is rising as threats increasingly encompass international dimensions with a substantial portion of attacks arising from or passing through locations outside of the United States Additional attacks such as the DNS distributed denial of service attacks in January 2006 and February 2007 further illustrate the increasing threat profile This citation was informed by subject matter expert interviews as well as the following sources Graham Bradley “Hackers Attack Via Chinese Websites U S Agencies’ Networks Are Among Targets ” The Washington Post August 25 2005 p A1 “Security Bytes Chinese Websites Attack U S Government Networks ” SearchSecurity com August 25 2005 http searchsecurity techtarget com originalContent 0 289142 sid14_gci1119270 00 html 24 6 NSTAC Report to the President on International Communications President’s National Security Telecommunications Advisory Committee threat environment and the need for international response Such attacks require the development of network defense strategies that are costly and continuous U S industry members responsible for operating in such environments and investing in appropriate defenses globally will benefit from consistent and reliable policy approaches designed to address an international framework for network security The global community will in turn benefit from an available reliable and defensible information infrastructure The international community’s current approach to network security institutional interdependencies and risk varies widely This variance in approach is also true with respect to incident response mechanisms U S industry is inherently international—NSTAC member companies have international operations and work with foreign governments and multinational companies on key issues affecting NS EP communications These companies have welldeveloped incident response processes as do many governments and national or regional response organizations such as computer security incident response teams CERT Much international coordination on incident response remains ad hoc however It is difficult to predict with certainty whether the collection of incident response mechanisms in place will be sufficient if a serious international incident occurs especially as the time available to respond continues to decrease The continuing absence of a coordinated scalable international structure for response that includes all relevant stakeholders undercuts efforts to develop systemic solutions and responses to ensure NS EP communications on the global communications infrastructure Stewart Joe “Myfip Intellectual Property Theft Worm Analysis ” Secure Works August 16 2005 http www secureworks com research threats myfip Thornburg Nathan “The Invasion of the Chinese Cyberspies ” Time August 29 2005 NSTAC Report to the President on International Communications 7 President’s National Security Telecommunications Advisory Committee 3 0 POLICY ISSUES 3 1 Legal Policy Framework and Analytic Process One component of the NSTAC charge for this study was a review of the elements of the existing legal framework and international policies that direct or affect the way private-sector entities interact with foreign governments or foreign critical infrastructure operators The existing legal framework examined consisted of treaties conventions bilateral dialogues Mutual Recognition Agreements Federal Trade Agreements memoranda of operations national plans and other legal instruments 28 The NSTAC determined that significant gaps exist between the policies that govern and mechanisms that enable international incident response and information sharing and the reality of the threat environment and converging global network The review also revealed that an increasing level of effort among governments non-governmental organizations standards bodies and industry groups outside the United States is directed at the same set of concerns regarding government and industry capacity and collaboration to prevent report respond and recover from insults to the global information network complex 29 Global communications infrastructure policy has no single locus of responsibility in the United States instead it is distributed across numerous government agencies Moreover private industry ownership and control of the majority of critical network assets means that “policy” is in many instances derived not from Government but from private practices and arrangements among owners and operators Our review of existing worldwide policy documents indicates that the international community has already begun to address the need for increased international cooperation As with our own policy assertions several documents outline frameworks for improved international coordination The National Strategy to Secure Cyberspace charges DOS to enhance cooperation among international parties In this capacity DOS collaborates with other agencies including DHS and the Department of Justice DOJ to increase international cyberspace security cooperation by working with existing international organizations to establish a “culture of security ” According to The National Strategy to Secure Cyberspace DOS will lead Federal efforts to enhance international cyberspace security cooperation Initiatives are as follows 1 develop secure networks in tandem with international partners and private industry owners and operators 2 secure North American cyberspace by working closely with Mexico and Canada 3 further secure interdependent sectors by reviewing common networks affecting sectors such as telecommunications energy and finance 4 encourage international partners and organizations to develop watch and warning systems and 5 promote laws and procedures outlined in the Council of Europe Convention on Cybercrime 30 28 A matrix of many existing instruments that make up the international legal and policy framework was developed to analyze this environment Appendix D provides the latest version of this matrix 29 Directive 2006 24 EC of the European Parliament and of the Council of 15 March 2006 International Telecommunication Union’s “Final Acts of the Plenipotentiary Conference ” Antalya 2006 30 The National Strategy to Secure Cyberspace “Priority V National Security and International Cyberspace Security Cooperation ” February 2003 pp 50–52 8 NSTAC Report to the President on International Communications President’s National Security Telecommunications Advisory Committee The National Response Plan NRP in the “International Coordination Support Annex ” 31 provides further detail on DOS’ role in supporting international preparedness protection and mitigation efforts related to cyber critical infrastructure protection CIP and works particularly closely with DHS and other Federal Agencies on physical and cyber-CIP efforts In addition DOS works on behalf of the U S Government to facilitate “communication with foreign governments and multilateral organizations that can assist and or support immediate attribution mitigation efforts ” This effort is occurring in conjunction with Emergency Support Function ESF #2 ESF#2 is outlined in the NRP as being responsible for 1 coordination with telecommunications industry 2 restoration and repair of telecommunications infrastructure and 3 protection restoration and sustainment of national cyber and information technology IT resources The NSTAC’s Next Generation Networks Task Force Report determined that “identity management is a crucial underpinning of NS EP communications over the global communications infrastructure which is likely to provide open access to a broad array of communications data and services and interconnect an increasing number of users processes and devices ”32 Further the NGN Task Force Report recommended that “the President should direct the Office of Management and Budget the Department of Commerce DOC and DHS to work with the private sector in partnership to develop a federated interoperable survivable and effective identity management framework for the NGN …”33 It also recommended that the President “direct DHS the Department of State and DOC including National Institute of Standards and Technology and the National Telecommunications and Information Administration to engage actively with and coordinate among appropriate domestic and international entities to ensure that relevant policy frameworks support NGN NS EP capabilities ”34 Clearly given the need for globally accepted solutions in the NGN identity management is just as crucial for NS EP in frameworks developed for the international environment as it is at the national level From the analysis of the global communications policy environment several principles emerged • There is a growing consensus that adequate cyber defense can occur only through international cooperation • The modern world cannot effectively operate without a global communications network therefore a major interruption of such a network is inherently an NS EP issue • U S national homeland and economic security supported by NS EP communications is dependent on the inviolable continuity of service of a network that has become irrevocably international 31 DHS’ NRP December 2004 p INT-6 Please note that as this report was finalized the NRP was under revision 32 The NSTAC’s Report to the President on Next Generation Networks March 28 2006 p 15 33 Ibid p 13 34 Ibid p 9 NSTAC Report to the President on International Communications 9 President’s National Security Telecommunications Advisory Committee • Cooperative information exchange between countries and service providers is essential and trusted relationships need to be established through diverse mechanisms • Government-to-government interaction is in practice the rare exception in global communications incident response rather than the rule it typically occurs in only the most serious of situations If response escalation beyond preexisting lower level standard operating procedures becomes necessary responders will typically follow preexisting rules of engagement and will take into account the existing international legal framework acknowledging the following – Preexisting private-sector business relationships often provide a basis for continued collaboration in spite of a hostile international political environment – Operational responses typically proceed at the least complex level of private sector engagement capable of addressing the issues At this level governments are rarely involved in response mechanisms – If the U S Government becomes involved it will need to extend its contacts beyond normal trusted relationships in certain circumstances An appropriate U S network security strategy must involve efforts to shape the international environment in the following ways to reduce the risk to critical U S and global information infrastructures • Pursuing interagency coordinated bilateral multilateral and international initiatives that combine to enhance the U S and international partners’ ability to not only deter detect identify and prosecute perpetrators of an attack but also prevent respond to and mitigate its consequences • Developing and facilitating cooperative public-private sector operational strategies designed to ensure the survivability and reliability of globally interdependent systems critical to U S interests whatever the potential source of failure or compromise 35 These efforts should be consistent with other extant U S doctrine articulated in for example the “Critical Priorities for Cyberspace Security ” as outlined in the National Strategy to Secure Cyberspace and should underpin ensuing global communications infrastructure policy efforts 36 The U S Government has historically been a strong advocate for NS EP requirements Discussions on network security and CIP policy and practice are currently moving forward within several multilateral organizations 37 These important multilateral initiatives should 35 DOS International Critiqua Infrastructure Protection 2006 Including the National Strategy to Secure Cyberspace National Infrastructure Protection Plan and Information Technology Sector Specific Plan 37 Including the North Atlantic Treaty Organization NATO the Group of Eight G8 the Organization of American States OAS the Organization for Economic Co-operation and Development OECD the International Telecommunication Union ITU the Asia-Pacific Economic Cooperation APEC and others 36 10 NSTAC Report to the President on International Communications President’s National Security Telecommunications Advisory Committee address NS EP communications issues and any such efforts should be informed by private sector SMEs NSTAC Report to the President on International Communications 11 President’s National Security Telecommunications Advisory Committee 4 0 OPERATIONAL ISSUES The NSTAC observes that fundamental operational requirements for access security and power are the same whether an incident is domestic or international In responding to any incident a network operator must inform its stakeholder or customer mitigate harm initiate recovery measures and otherwise continue to collaborate with relevant infrastructure partners Successful response depends on not only prior development of operational plans procedures relationships and information paths but also trained personnel who are the product of enabling agreements and perfecting exercises with domestic and foreign stakeholders and governments 38 4 1 Domestic and International Collaboration on NS EP and Incident Response The expanding global interconnection of networks using common communication protocols its use of shared services and the fact that foreign providers own and operate many of these interconnected networks adds new complexity for all those involved in assuring that the NS EP telecommunication needs of the U S Federal Government are met These factors along with the broader use and dependency on these networks for other critical national and international functions further underscore the need for an effective international capability that can respond to disruptions affecting global networks As stated in Presidential Executive Order EO 12472 emphasis on establishing robust international collaborative mechanisms is essential to achieving and maintaining effective responsive capabilities that not only enhance situational awareness and NS EP incident response but also provide additional support when needed for burden sharing troubleshooting and other operational issues Existing policy collaboration is insufficient limited policy collaboration exists in few areas However international collaboration in key areas developed under a more formal protocol would advance strategic IT and communications NS EP preparedness efforts Such protocols would help mitigate the effects on the network and would enhance response efforts during and after an incident Moreover it would ease continuity of operations and promote the rapid recovery of operations 4 2 Current Collaboration Landscape As set out in Homeland Security Presidential Directives HSPD 5 and 7 DHS retains much of the responsibility for U S Government policy direction in network security 39 Within DHS the NCS and NCSD are involved in U S Government efforts on international NS EP in the communications and IT sectors as follows National Communications System Operationally the NCS’ National Coordinating Center NCC is increasingly involved in international NS EP communications issues Most notably communications officials from the government of Canada participate in biweekly video teleconferences with the NCC to share 38 39 Appendix F presents background information about operational capabilities Other agencies have network security collaboration duties but this section focuses primarily on DHS’ efforts 12 NSTAC Report to the President on International Communications President’s National Security Telecommunications Advisory Committee information about ongoing concerns Officials from Industry Canada also have been assigned to the NCC Watch for 2-week periods to observe operations and share best practices National Cyber Security Division NCSD maintains relationships with key allies abroad by sharing information products and collaborating on issues of mutual concern in cooperation with DOS NCSD has also established arrangements with the allied countries of Australia Canada New Zealand and the United Kingdom to address strategic issues of common concern and to establish regular communication and collaboration between computer security incident response teams to build situational awareness and coordinate incident response when needed 40 NCSD also maintains lessformalized relationships with other foreign countries Coordinated Training Exercises and Incident Response To contribute to IT and communications NS EP collaborative efforts effectively similar international relationships must be created to ensure the international community has adequate collaboration between government and industry to enable information sharing cooperation and effective incident response Preparation and planning based on prior policy agreement and predetermined delegations of roles and responsibilities are essential to effective operational incident response 41 4 3 United States Government to Industry Collaboration Private sector owners and operators have worked closely with the NCS since its creation in 1963 This relationship was further enhanced when the NCC was established in 1984 The NCC serves as a joint industry-Government operations center with a clear mission of advancing NS EP information sharing and coordination Following the issuance of Presidential Decision Directive PDD 63 a series of Information Sharing and Analysis Centers ISAC was established to facilitate industry-government collaboration on critical infrastructure protection 42 Among these centers is an ISAC for telecommunications which works closely with the NCS’ NCC and an IT ISAC which works closely with NCSD’s US-CERT 43 Per HSPD-7 the U S Government also urged the creation of sector coordinating councils SCC among the critical infrastructure sectors to increase industry- 40 41 42 43 NCSD US-CERT is collaborating with 14 other countries in an informal arrangement to develop an International Watch and Warning Network IWWN Launched in 2004 the IWWN uses a secure portal for around-theclock communications needs and holds annual conferences and workshops to build collaboration with government policy bodies incident response teams and law enforcement entities in the 15 countries including the United States In this case the collaboration currently occurs without a formalized long-term arrangement or information sharing agreement such as a memorandum of understanding MOU in the military and intelligence areas Australia Canada New Zealand and the United Kingdom participated in Cyber Storm I and Cyber Storm II will include participation from government and private sector representatives from these countries PDD-63 is available at http www fas org irp offdocs pdd pdd-63 htm see also the ISAC Council Website at http www isaccouncil org about for more information See the Communications ISAC Website at http www ncs gov ncc main html and the IT ISAC Website at https www it-isac org for more information NSTAC Report to the President on International Communications 13 President’s National Security Telecommunications Advisory Committee Government cooperation on policy SCCs have been established in most of the critical infrastructures including IT and communications 44 An example of this collaboration can be seen in the Estonia denial of service attack On May 2 2007 Estonia requested assistance through NATO DOD contacted the US-CERT which coordinated a response with the NCC Forum of Incident Response and Security Teams FIRST and North American Network Operations Group NANOG community 45 4 4 Industry’s Global Collaboration The interconnected and interdependent nature of networks has fostered crucial information sharing and cooperative response and recovery relationships among global service providers for decades Because one service provider network problem nearly always affects other network provider-owned and –operated networks the community has a longstanding tradition of cooperation and trust—even in today’s highly competitive business environment ISACs facilitate information sharing within and among critical sectors such as IT and communications Because many companies operate globally with a strong presence in other countries their interaction with those governments and in the case of foreign companies in the United States occurs on two levels The first level is when a company provides services to the government of that country or to critical infrastructure members within that country In these cases operational response efforts occur as the result of service level agreements or customer service obligations The second level is when a company is operating in a country but is called on to assist in an incident outside any formal business arrangements In both cases companies assist and work directly with their customers in some instances they collaborate with government entities to respond to an incident and restore services In working cooperatively industry has identified several areas in which government support and assistance are critical While responding to domestic incidents industry has determined that establishing government-accepted credentials for critical service providers is key Infrastructure providers also may need for the U S Government to facilitate physical access and when requested to provide security for these service providers during or immediately following an incident In addition the communications and IT sectors realize that their networks rely on power to function therefore their work must be closely aligned with that of the power energy companies to address this critical interdependency 46 ISACs in the telecommunications and IT sectors CERTs including US-CERT and DOD’s joint task force global network operations 44 See the IT-ISAC Website at https www it-isac org for more information US-CERT briefing to NSTAC June 5 2007 46 Recent European documents addressing the availability and robustness of electronic communications infrastructures such as the Availability and Robustness of Electronic Communications Infrastructures February 2007 have noted issues associated with “ad hoc” nature of infrastructure protection issues namely “The concept of sharing critical infrastructure information is not new to the communications industry in Europe In fact the study team’s judgment is that some of the best processes reside in parts of Europe However on the whole the practice is largely underutilized as an instrument for infrastructure protection This leaves European communications networks avoidably less robust For the most part information sharing that does take place is ad hoc and occurs informally—the linkage can be easily broken with the absence of one key person ” 45 14 NSTAC Report to the President on International Communications President’s National Security Telecommunications Advisory Committee JTF-GNO private bodies and commercial interests all provide a steady stream of data regarding the condition of the network threats being mounted against it 47 and tools for defending against or mitigating the impact of insults 47 Government and NSTAC NSIE An Assessment of the Risk to the Security of the Public Network April 2005 NSTAC Report to the President on International Communications 15 President’s National Security Telecommunications Advisory Committee 5 0 FINDINGS Based on numerous SME briefings and extensive research into international communications policy and operational issues the NSTAC presents several findings concerning the international NS EP communications environment • The rapidly evolving global communications infrastructure is increasingly interconnected through a system of systems that provides global services and connectivity A global workforce including those in non-allied nations operates and maintains the infrastructure • As a result of globalization the U S NS EP communities government operations allies many key businesses and their global business partners are increasingly dependent on the availability of global communications and related services • Cross-sector dependencies and interdependencies such as between telecommunications and electric power create additional complexities amplifying the difficulties of mitigation and effective repair when broad-scale disruptions occur • Cyber threats to global infrastructures may originate from international sources beyond the jurisdiction of U S and allied authorities • 16 – Attacks originating outside the territorial United States raise increasing concerns about the security and availability of domestic NS EP communications and the global communications on which many key U S functions and economic interests rely – The sophistication and reach of the global communications infrastructure increase the complexity of the threat whereas the adversary’s barrier to entry is low as a result of anonymity connectivity and widespread availability of tools for creating disruptions The U S Government’s international NS EP strategies policies and operational response frameworks are not sufficient to keep pace with globalization and technological convergence of PNs and private sector networks nor do they adequately include private sector participation in these processes NSTAC Report to the President on International Communications President’s National Security Telecommunications Advisory Committee 6 0 RECOMMENDATIONS Recognizing NS EP communications’ evolving dependence on and interdependence with global infrastructures and to enhance the resiliency of the global communications infrastructure the NSTAC recommends that the President in accordance with responsibilities and existing mechanisms established by EO 12472 Assignment of National Security and Emergency Preparedness Telecommunications Functions direct the following • Task DHS to coordinate international planning and development with the appropriate Federal Agencies for adoption of a global framework incorporating operational protocols and response strategies The framework must accomplish the following − Address physical and cyber events that would disrupt the availability of critical global infrastructure services − Ensure private sector participation in developing the framework to leverage extensive expertise and existing relationships − Support the use of identity management solutions that address NS EP requirements for normal operations and all-hazards crisis response − Examine with the help of private sector partners existing U S laws and policies that could prevent service providers and other stakeholders from taking the necessary proactive measures to restore service and prevent harm to NS EP users for government essential operations during a crisis • In the interim task Federal Agencies to expand relationships and response coordination using formal and reciprocal agreements with Allied governments to include participation from selected international service providers and other stakeholders into existing joint U S Government and private-sector response and coordination processes and entities such as the US-CERT and NCC NSTAC Report to the President on International Communications 17 APPENDIX A PARTICIPANT LIST TASK FORCE MEMBERS GOVERNMENT PERSONNEL AND OTHER WORKING GROUP PARTICIPANTS President’s National Security Telecommunications Advisory Committee APPENDIX A Participant List NSTAC Members Government Personnel and Other Working Group Participants MEMBER COMPANY PARTICIPANTS VeriSign Incorporated Science Applications International Corporation AT T Incorporated Bank of America Corporation BellSouth Corporation Boeing Company Computer Sciences Corporation Juniper Networks Incorporated Microsoft Corporation Nortel Networks Corporation Qwest Communications International Incorporated Raytheon Company Sprint Nextel Corporation Telcordia Technologies Incorporated Unisys Corporation Verizon Communications Incorporated Mr Michael Aisenberg Esq CoChair Dr Marvin Langston Co-Chair Ms Rosemary Leffler Co-Chair Mr Roger Callahan Mr David Barron Mr Robert Steele Mr Guy Copeland Mr Robert Dix Mr Phil Reitinger Esq Dr Jack Edwards Mr Kushal Jain Mr Frank Newell Mr John Stogoski Ms Louise Tucker Esq Mr Shawn Anderson Mr James Bean OTHER WORKING GROUP PARTICIPANTS British Embassy to the United States Edison Electric Institute George Washington University Independent Electricity System Operator Canada Industry Canada Microsoft Corporation Qwest Communications International Incorporated Science Applications International Corporation Sprint Nextel Corporation Symantec Corporation Telcordia Technologies Incorporated UK Centre for the Protection of National Infrastructure VeriSign Incorporated Dr Phil Budden Mr Larry Brown Esq Dr Jack Oslund Mr Stuart Brindley Ms Maggie Lackey Mr Robert Leafloor Mr Paul Nicholas Ms Katherine Condello Mr Hank Kluepfel Ms Allison Growney Mr Wesley Higaki Mr Bob Lesnewich Ms Judy Baker Mr Mike Corcoran Mr Anthony Rutkowski Esq NSTAC Report to the President on International Communications A-1 President’s National Security Telecommunications Advisory Committee U S GOVERNMENT PERSONNEL Central Intelligence Agency Department of Homeland Security Department of Commerce Department of Defense Department of State Federal Communications Commission Federal Reserve Board A-2 Mr Tom Donahue Ms Kathy Blasco Mr Kelvin Coleman Ms Liesyl Franz Mr David Delaney Mr Charles Lancaster Mr Thad Odderstol Mr Andrew Purdy Esq Ms Jordana Siegel Ms Christina Watson Mr Will Williams Mr Dan Hurley Mr Thomas Dickinson Mr Mark Hall Mr Andrew Kimble Mr David Chinn Ms Michelle Markoff Mr Richard Hovey Mr Chuck Madine NSTAC Report to the President on International Communications APPENDIX ACRONYM LIST President’s National Security Telecommunications Advisory Committee APPENDIX B Acronym List APEC BIAC CCIPS CCPC CI KR CEPTAG CERT CI CIP CONOPS CPNI CSCPCC CVE DACS DHS DOC DOD DOJ DOS EO ESF ETSI EU FCC FIRST G8 HSARPA HSPD IATAC ICT IP ISAC IT ITAA ITU IWWN JCG JTF-GNO MLAT MNC Asia-Pacific Economic Cooperation Business and Industry Advisory Committee Computer Crimes and Intellectual Property Section Civil Communications Planning Committee Critical Infrastructure and Key Resource Civil Emergency Planning Telecommunications Advisory Group Computer Emergency Readiness Team Critical Infrastructure Critical Infrastructure Protection Concept of Operations UK Centre for Protection of National infrastructure Communications Systems and Cybersecurity Policy Coordinating Common Vulnerabilities and Exposures Data and Analysis Center for Software Department of Homeland Security Department of Commerce Department of Defense Department of Justice Department of State Executive Order Emergency Support Function European Telecommunications Standards Institute European Union Federal Communications Commission Forum of Incident Response and Security Teams Group of Eight Homeland Security Advanced Research Projects Agency Homeland Security Presidential Directive Information Assurance Technology Analysis Center Information and Communication Technology Internet Protocol Information Sharing and Analysis Center Information Technology Information Technology Association of America International Telecommunication Union International Watch and Warning Network Joint Contact Group Joint Task Force – Global Network Operations Mutual Legal Assistance Treaty Multinational Corporation NSTAC Report to the President on International Communications B-1 President’s National Security Telecommunications Advisory Committee MOA MOU NANOG NATO NCC NCS NCSD NGN NGO NII NIMS NIPP NRP NS EP NSIE NSTAC OAS OECD PDD PN PSTN SCC SME SPP SPSG TEL TOPOFF TTCP WPISP WTPF UN B-2 Memoranda of Agreement Memoranda of Understanding North American Network Operations Group North Atlantic Treaty Organization National Coordinating Center National Communications System National Cyber Security Division Next Generation Networks Non-Governmental Organization National Information Infrastructure National Incident Management System National Infrastructure Protection Plan National Response Plan National Security and Emergency Preparedness Network Security Information Exchange President’s National Security Telecommunications Advisory Committee Organization of American States Organization for Economic Cooperation and Development Presidential Decision Directive Public Network Public Switched Telecommunications Network Sector Coordinating Council Subject Matter Expert Security and Prosperity Partnership Security and Prosperity Steering Group Telecommunications and Information Technology Top Officials Technical Cooperation Program Working Party on Information Security and Privacy World Telecommunication Policy Forum United Nations NSTAC Report to the President on International Communications APPENDIX GLOSSARY OF KEY TERMS President’s National Security Telecommunications Advisory Committee APPENDIX C Glossary of Key Terms All-Hazards An approach for prevention protection preparedness response and recovery that addresses a full range of threats and hazards including domestic terrorist attacks natural and manmade disasters accidental disruptions and other emergencies Source National Infrastructure Protection Plan Department of Homeland Security 2006 Information and Communications Technologies ICT Although Homeland Security Presidential Directive-7 bifurcates the U S ICT industry into telecommunications and information technology ICT is the internationally accepted terminology for the combined industries and will be used in this report to describe the converged technology environment Next Generation Networks NGN The NGN will logically consist of applications that deliver services the services provided to users and the underlying transport networks … The NGN itself is a capability that will enable many services and applications Some services will be provided by the network and some will be external to it but depend on it NGN user-centric services will be delivered over various networks some of which like private customer premises networks and mesh networks lie outside the wide scope of the PN However there is no single universally accepted definition of the NGN exists … The term NGN is not intended to represent any single configuration or architecture Instead it represents the set of converged networks … expected to arise that will transparently carry many types of data and communications and allow delivery of services and applications that are not coupled to the underlying network However it is possible to note several key NGN elements or attributes over which there is little if any dispute Source NSTAC Report to the President on Next Generation Networks March 28 2006 National Security and Emergency Preparedness NS EP Communications Although the expression “NS EP telecommunications” is defined in Federal Communications Commission rules and regulations see 47-CFR 216 there is no single universally accepted definition of NS EP communications NSTAC Report to the President on International Communications C-1 APPENDIX INTERNATIONAL POLICY INSTRUMENTS MATRIX President’s National Security Telecommunications Advisory Committee APPENDIX D International Policy Instruments Matrix Instrument Summary Treaties Multilateral Agreement Council of Europe Convention on Cybercrime http conventions coe int Treaty EN Treati es Html 185 htm Mutual Legal Assistance in Criminal Matters Treaties http travel state gov law info judicial judi cial_690 html Treaties in Force A List of Treaties and Other International Agreements of the United States in Force on January 1 2006 http www state gov s l treaty treaties 200 6 • Multilateral treaty binds parties to cooperation in the investigation and prosecution of computer network crimes and physical-world crimes involving electronic evidence and can provide timely extradition for computer network based crimes covered under the treaty • The treaty 1 requires parties to establish certain substantive offenses in computer crime 2 requires parties to adopt domestic procedural laws to investigate computer crimes and 3 provides a solid basis for international law enforcement cooperation in combating crime committed through computer systems • United States became a full party on September 29 2006 • Other signatory states include the United Kingdom Canada Germany Japan France and Italy Other ratified states include France and the Netherlands Of the 43 countries that have signed the treaty 21 have completed the ratification process • U S law conformed to the Treaty even before ratification so the United States needs no new laws • “Since the first U S bilateral Mutual Legal Assistance Treaty MLAT entered into force with Switzerland in 1977 our MLATs have become increasingly important They seek to improve the effectiveness of judicial assistance and to regularize and facilitate its procedures Each country designates a central authority generally the two Justice Departments for direct communication The treaties include the power to summon witnesses compel the production of documents and other real evidence issue search warrants and serve process ” http www state gov • Office of the Legal Adviser United States Department of State DOS 1979 Radio Regulations Geneva 1983 Revision Mobile Services 1985 Revision Geostationary Orbit 1987 Revision Mobile Services 1988 Revision Geostationary Orbit NSTAC Report to the President on International Communications D-1 President’s National Security Telecommunications Advisory Committee Instrument Summary Statute and Regulation Communications Assistance For Law Enforcement Act http www askcalea net • Sec 1005 Cooperation of equipment manufacturers and providers of telecommunications support services • Sec 1008 Payment of costs of telecommunications carriers to comply with capability requirements Espionage Act of 1917 http frwebgate3 access gpo gov cgibin waisgate cgi WAISdocID 9286969814 0 0 0 WAISaction retrieve • Makes it illegal for a person to share information with the purpose of interfering or infringing on U S Armed Forces operations or successes and makes it illegal to promote the success of the U S ’ enemies Computer Fraud and Abuse CFA Act http www4 law cornell edu uscode html u scode18 usc_sec_18_00001030----000 html • Whoever causes “damage affecting a computer system used by or for a government entity in furtherance of the administration of justice national defense or national security” can be punished under the CFA Act • The CFAA includes numerous broad provisions • Section 305 c —the President may provided he determines it to be consistent with and in the interest of national security authorize a foreign government under such terms and conditions as he may prescribe to construct and operate at the seat of government of the United States a low-power radio station in the fixed service at or near the site of the embassy or legation of such foreign government for transmission of its messages to points outside the United States • Section 706 c —Upon proclamation by the President that there exists war or a threat of war or a state of public peril or disaster or other national emergency or in order to preserve the neutrality of the United States the President if he deems it necessary in the interest of national security or defense may suspend or amend for such time as he may see fit the rules and regulations applicable to any or all stations or devices capable of emitting electromagnetic radiations within the jurisdiction of the United States d the President can 1 suspend or amend the rules and regulations applicable to any or all facilities or stations for wire communication within the jurisdiction of the United States as prescribed by the Commission 2 cause the closing of any facility or station for wire communication and the removal there from of its apparatus and equipment or 3 authorize the use or control of any such facility or station and its apparatus and equipment by any department of the Government under such regulations as he may prescribe upon just compensation to the owners Subchapter III ‘‘ 2 recognize the highly networked nature of the current Federal computing environment and provide effective government wide management and oversight of the related information security risks including coordination of information security efforts throughout the civilian ” Communications Act of 1934 www fcc gov Reports 1934new pdf Federal Information Security Management Act of 2002 Executive Order Presidential Directive National Strategy Document Homeland Security Presidential Directive HSPD -7 Critical Infrastructure Identification Prioritization and Protection Section 22 a http www whitehouse gov news releases D-2 • “DOS in conjunction with DHS and the Departments of Justice Commerce Defense and other appropriate agencies will work with foreign governments and international organizations to strengthen the protection of U S critical infrastructure and other key elements ” NSTAC Report to the President on International Communications President’s National Security Telecommunications Advisory Committee Instrument 2003 12 20031217-5 html National Strategy for Homeland Security http www whitehouse gov homeland boo k The National Strategy for The Physical Protection of Critical Infrastructures and Key Assets http www whitehouse gov pcipb physical html The National Strategy to Secure Cyberspace http www whitehouse gov pcipb Summary • HSPD-7 superseded Presidential Decision Directive PDD 63 “There shall be a plan to expand cooperation on critical infrastructure protection with like-minded and friendly nations international organizations and multinational corporations ” http www fas org irp offdocs pdd-63 htm • “Partner with the international community to protect our transnational infrastructure ” p 35 Text specifically mentions a U S energy system as part of an interconnected system with Mexico and Canada and b “joint steering committees with Canada and Mexico to improve the security of critical physical and cyber infrastructure ” • “Expand protection of transnational critical infrastructures” p 60 • “Improve cooperation in response to attacks ” p 61 Reference to the U S Government expanding exercise and training activities with Canada • “Foster international security cooperation” p 13 “In a world characterized by complex interdependencies international cooperation is a key component of our protective scheme ” • “Conduct critical infrastructure protection planning with our international partners ” p 24 Reference is made to Canadian and Mexican partners • “Priority V “National Security and International Cyberspace Security Cooperation” p 4 Reference to cross border cyber attacks • Threat and Vulnerability a Five Level Problem “Level 5 Global” p 8 Reference to “a planetary information grid of systems” and “internationally shared standards ” National Plan National Response Plan NRP As of May 25 2006 http www dhs gov xprepresp committees editorial_0566 shtm National Infrastructure Protection Plan NIPP As of 2006 http www dhs gov xprevprot programs ed itorial_0827 shtm • The NRP provides an all-hazards approach that incorporates best practices from a wide variety of first responders including fire rescue emergency management law enforcement public works and emergency medical services for responding to natural and manmade disasters The NRP Base Plan and 15 annexes or Emergency Support Functions ESF Provide protocols for departments and agencies at all government levels Federal State local and tribal and for private sector partners ESF# 2 applies to the Communications sector and ESF#12 applies to the Energy sector • Need to protect systems and networks operating across or near borders with Canada and Mexico pp 13–14 • “Canada and Mexico Critical Infrastructure and Key Resource CI KR interconnectivity between the U S and its immediate neighbors makes the border virtually transparent ” Electricity is mentioned but not telecommunications as crossing borders with Canada and Mexico “as a routine component of commerce and infrastructure operations ” p 56 • “The NIPP addresses international CI KR protection including inter-dependencies and the vulnerability of threats that originate outside the country … The NIPP also provides tools to assess international vulnerabilities and NSTAC Report to the President on International Communications D-3 President’s National Security Telecommunications Advisory Committee Instrument Sector Specific Plans for Energy Communications and Information Technology IT Summary interdependencies that complement long-standing agreements with Canada and Mexico…” p 125 • “Sector specific plans SSP are required to include international considerations as an integral part of each sector’s planning process rather than instituting a separate layer of planning Some international aspects of CI KR protection require additional overarching or cross sector emphasis ” including… Protection of physical assets located on near or extending across the borders with Canada and Mexico that require cooperation with and or planning and resource allocation among neighboring countries States bordering on these countries and affected local and tribal governments ” pp 125–126 of the NIPP Multinational MOU Resolution Commitments Strategy United National General Assembly Resolution 56 121 http daccessods un org TMP 2925134 html and 55 63 http www apectelwg org esecurityTG UN-ResFinalRep20020501 doc The Technical Cooperation Program TTCP MOU Combined Joint Multilateral Master Military Information Exchange MOU AUSCANNZUKUS IA CND MOU Executive Summaries of DOD Militaryto-Military Relationships International CND Coordination Working Group ICCWG Terms of Reference location https livelink bah com livelink livelink func ll objId 7343822 objAction Op en Asia-Pacific Economic Cooperation TEL Cyber Security Strategy http www apec org apec apec_groups wo rking_groups telecommunications_a nd_information html • “Combating the criminal misuse of information technologies ” •AUSCANNZUKUS nations represented by various military fora known as the Multifora - Air and Space Interoperability Council - American British Canadian and Australian Armies - AUSCANNZUKUS Naval C4 - Combined Communications Electronics Board - Multinational Interoperability Council - Multilateral Interoperability Program - The Technical Cooperation Program •Includes Defense Departments of Australia Canada UK New Zealand and United States •High-Level and Long-Standing Defense MOU •Includes Defense Departments of Australia Canada UK New Zealand and United States • Information Assurance Computer Network Defense CND MOU and Terms of Reference which establish the ICCWG •Includes Defense Departments of Australia Canada UK New Zealand and United States • The APEC Cyber Security Strategy encompasses a set of “measures to protect business and consumers from cybercrime and the strengthen consumer trust in the use of ecommerce ” Single Agency MOU Bilateral Agreement D-4 NSTAC Report to the President on International Communications President’s National Security Telecommunications Advisory Committee Instrument Summary Executive Summaries of DOD Militaryto-Military Relationships International Computer Network Defense Coordination Working Group Terms of Reference location https livelink bah com livelink livelink fu nc ll objId 7343822 objAction Open • AUSCANNZUKUS nations represented by various military fora known as the multifora -Air and Space Interoperability Council -American British Canadian and Australian Armies -AUSCANNZUKUS Naval C4 -Combined Communications Electronics Board -Multinational Interoperability Council -Multilateral Interoperability Program -The Technical Cooperation Program • To “facilitate the provision of services to from and within the United States and Argentina via commercial satellites… and to establish the conditions relating to the use in both countries of satellites licensed by the United States or Argentina ” Federal Communications Commission FCC —Agreement Between the Government of the United States of America and the Government of the Argentine Republic Concerning the Provision of Satellite Facilities and the Transmission and Reception of Signals to and From Satellites for the Provision of Satellite Services to Users in the United States of America and the Republic of Argentina http www fcc gov ib sand agree others ht ml FCC—Various agreements with Canada radio and TV broadcast non-broadcast satellite and by frequency band http www fcc gov ib sand agree welcome html FCC—Various agreements with Mexico radio and TV broadcast non-broadcast satellite and by frequency band http www fcc gov ib sand agree welcome html Bilateral Meetings • DHS in cooperation with State and other Federal agencies engages in bilateral discussions with close allies and others to further international cyber security awareness and policy development as well as incident response team informationsharing and capacity-building objectives • Major Bilaterals with Australia Canada Japan •Other bilaterals include Hungary Netherlands Romania Sweden Taiwan UK Nigeria Norway Tunisia Rwanda Departmental Policy Agency Letter National Cyber Security Division NCSD Cyber Storm After Action Report Internet Corporation for Assigned Names and Numbers http www icann org Bylaws and Articles of Incorporation • The first full-scale government-led cyber security exercise to examine response coordination and recovery mechanisms to a simulated cyber-event within international Federal State and local governments in conjunction with the private sector • “An internationally organized nonprofit corporation that has responsibility for Internet Protocol address space allocation protocol identifier assignment generic and country code TopLevel Domain name system management and root server system management functions These services were originally performed under U S Government contract by the Internet Assigned Numbers Authority and other entities ” NSTAC Report to the President on International Communications D-5 President’s National Security Telecommunications Advisory Committee Instrument Summary International Standard Accredited Voluntary Standards Body European Telecommunications Standards Institute ETSI Directive 2006 24 EC of European Parliament and the Council of 15 March 2006 http europa eu int eurlex lex LexUriServ site en oj 2006 l_105 l_ 10520060413en00540063 pdf • Industry and law enforcement began cooperating through ETSI to develop data retention global stored data handover specifications Industry Policy Statement IT-Information Sharing Analysis Centers ISACs Concept of Operations Document www ncs gov nstac reports 2006 NSTAC_ XXIX_Reports_082206 pdf Communications SSP • “Sets out an operational mission statement defining the roles and relationships for the IT ISAC within the information technology sector within the larger infrastructure community and between the sector and relevant agencies of Government and other institutions” • The NIPP and its complementary Sector-Specific Plans SSP provide a consistent unifying structure for integrating both existing and future CI KR protection efforts Other Industry Instruments IT-SSP Draft Version Available at ITISAC Website https www it-isac org United States Computer Emergency Readiness Team US CERT http www us-cert gov Forum for Incident Response and Security Teams FIRST http www first org President’s National Security Telecommunications Advisory Committee NSTAC Legislative and Regulatory Task Force Report Penalties for Internet Attacks and Cyber Crime http www ncs gov nstac reports 2003 LR TF%20Cyber%20Crime%20Report pdf • The IT-SSP highlights the need for the sector to identify assess and manage risks to the infrastructure and its international dependencies • US CERT “is a partnership between DHS and the public and private sectors Established in 2003 to protect the Nation’s Internet infrastructure US-CERT coordinates defense against and responses to cyber attacks across the Nation • “FIRST brings together a variety of computer security incident response teams from government commercial and educational organizations FIRST aims to foster cooperation and coordination in incident prevention to stimulate rapid reaction to incidents and to promote information sharing among members and the community at large ” • Work with international counterparts and through multilateral bodies to encourage other nations to enact substantive and procedural laws adopt data preservation provisions dedicate well-trained and well-equipped personnel to combat cyber crime encourage better cooperation among nations for locating and identifying cyber criminals and designate a 24-hour point of contact on such matters for urgent cross-border investigations Other Instruments Working Group of Key Allies AUSCANZUKUS Joint Contact Group JCG D-6 •Working Group of key allies is made up of Australia Canada New Zealand United Kingdom and United States • Ongoing bilateral between the U S and the U K on homeland security issues managed at the Deputy Secretary level in DHS • Established in June 2003 by DHS to provide a common platform to share knowledge and good practice on joint security issues such as protecting borders transport security and scientific technological advances • The Cyber Security Work stream was developed in 2004 • Cyber Security was on the agenda for the first time in June 2006 • Collaborating on the CIIP directory and exercises including NSTAC Report to the President on International Communications President’s National Security Telecommunications Advisory Committee Instrument IWWN Security and Prosperity Partnership of North America SPP Organization of Economic Cooperation and Development OECD Working Party on Information Security and Privacy WPISP Summary Cyber Storm • Leveraging ongoing efforts of international watch and warning network IWWN and group of key allies • Priority V of the National Strategy to Secure Cyberspace calls for the establishment of an “…international network capable of receiving assessing and disseminating this information globally Such a network can build on the capabilities of nongovernmental institutions such as the Forum of Incident Response and Security Teams ” • Coordinates cross-functional engagement of government cyber security policymakers managers of computer security incident response teams with national responsibility and law enforcement representatives with responsibility for cyber crime • Reflects an arrangement among countries to establish a community and a mechanism for collaboration on CIIP • DHS NCSD co-hosted the IWWN Conference in October 2004 and June 2006 which marked the launch of the IWWN portal • Planning for IWWN Conference in May 2007 • Working to enhance portal content and use for collaboration •Participating states include Australia Canada Finland France Germany Hungary Japan Italy the Netherlands New Zealand Norway Sweden Switzerland United Kingdom and United States • U S Government Presidential initiative managed at the Secretary level in DHS • Launched in March of 2005 as a trilateral effort to increase security and enhance prosperity among the United States Canada and Mexico through greater cooperation and information sharing • Cyber security falls largely within Goal 9 of the SPP which serves to “Develop and implement a common approach to critical infrastructure protection and response to cross-border terrorist incidents and as applicable natural disasters” • U S Delegation led by the Department of State’s Economic Bureau includes participation from DHS Federal Trade Commission Commerce Department of Justice and the private sector • The WPISP composed of 30 countries develops policy options by addressing information security and privacy as complementary issues at the core of our digital activities and by maintaining an active network of experts from government business and civil society • Continuing to leverage work ongoing in other forums such as Asia-Pacific Economic Cooperation Telecommunications and Information Technology Working Group APEC TEL bilaterals and the International Telecommunications Union ITU • The private sector is represented in the OECD by the Business and Industry Advisory Committee BIAC to the OECD Each BIAC member organization designates national experts to BIAC committees The U S BIAC Affiliate United States Council for International Business NSTAC Report to the President on International Communications D-7 President’s National Security Telecommunications Advisory Committee Instrument Asia Pacific Economic Cooperation Telecommunications and Information Working Group ITU-Development Study Group 1 ITU Final Acts of the Plenipotentiary Conference Antalya 2006 D-8 Summary • The APEC TEL is a working group of APEC that addresses various telecommunications and IT issues relevant to the Asia Pacific region • APEC TEL has 21 members including the United States APEC members are referred to as “economies” rather than “countries” to reflect APEC’s economic goals and avoid political sensitivity concerning the autonomy of governments • In 2002 the APEC developed and released the APEC Cyber Security Strategy In 2005 the APEC TEL developed a strategy to ensure a “Trusted Secure and Sustainable Online Environment ” which encourages actions to further cyber security efforts of member economies • Cyber security issues have been elevated recently to necessitate a cyber-specific steering group for which DHS NCSD serves as Deputy Convener for the Security and Prosperity Steering Group in APEC TEL • APEC TEL meets biannually and is hosted by volunteer economies on a rotating basis a different economy hosts each TEL meeting • APEC TEL regularly hosts workshops on specific topics for member economies e g CSIRT development series Malware Workshop •21 member economies include the following Australia Brunei Darussalam Canada Chile China Hong Kong China Indonesia Japan Republic of Korea Malaysia Mexico New Zealand Papua New Guinea Peru the Philippines Russian Federation Singapore Chinese Taipei Thailand Viet Nam United States • International organization within the United Nations System where governments and the private sector coordinate global telecom networks and services • DHS and the State Department participate in ITU-D Study Group 1 which is currently reviewing Question 22 on securing information and communication networks—best practices for developing a culture of cyber security The U S Government is proposing a report on recommended “best practices” for cyber security • The U S Government looks to the U S private sector to engage in the ITU by participating in public private delegation preparation meetings and by participation on the official U S Delegation to the relevant Study Group meetings • Many private sector companies from countries across the world are ITU members more information is available at http www itu int home • Includes representation from 190 member states worldwide It also has more than 600 private sector members and associates that make up the world’s major telecommunication operators equipment manufacturers funding bodies research and development organizations as well as international and regional telecommunication organizations • The Plenipotentiary Conference is the top policymaking body of the ITU This ITU conference decided 1 to convene the fourth World Telecommunication Policy Forum WTPF in Geneva in the first quarter of 2009 to discuss and exchange views … 2 NSTAC Report to the President on International Communications President’s National Security Telecommunications Advisory Committee Instrument Organization of American States OAS Organization of American States OAS AG RES 2004 XXXIV-O 04 Tampere Convention on the Provision of Telecommunication Resources for Disaster Mitigation and Relief Operations http www reliefweb int telecoms tampere icet98-e htm Joint Report by the Data and Analysis Center for Software DACS and the Information Assurance Technology Analysis Center IATAC on Software Assurance Through Secure Software Engineering Safety and Security Extensions for Integrated Capability Maturity Models www faa gov ipg news finalReport htm U S Canada Civil Emergency Planning Telecommunications Advisory Group Summary that the fourth WTPF shall draw up a report and if possible opinions for consideration by ITU Member States and Sector Members and relevant ITU meetings and 3 that arrangements for the fourth WTPF shall be in accordance with applicable Council decisions for such fora • The OAS brings together the countries of the Western Hemisphere to strengthen cooperation and advance common interests U S Government agencies including DHS participate in the Inter-American Committee on Counter Terrorism CICTE which addresses cyber security U S agencies also participate in the Ministers of Justice or Attorney Generals of the Americas REMJA and InterAmerican Telecommunication Commission CITEL • The U S Government leads the CICTE and REMJA initiatives and has been a driver for cyber security •Member States include Antigua and Barbuda Argentina the Bahamas Belize Bolivia Brazil Canada Chile Columbia Costa Rica Dominica Dominican Republic Ecuador El Salvador Grenada Guatemala Guyana Haiti Honduras Jamaica Mexico Nicaragua Panama Paraguay Peru Saint Kitts and Nevis Saint Lucia Saint Vincent and the Grenadines Suriname Trinidad and Tobago United States Uruguay and Venezuela Adoption of a Comprehensive Inter-American Strategy to Combat Threats to Cybersecurity A Multidimensional and Multidisciplinary Approach to Creating a Culture of Cybersecurity • Not yet ratified by the U S Senate but in force internationally as of January 8 2005 • The report covers methods tools and best practices It points to resources such as Build Security In DACS and IATAC are information analysis centers operating under the Defense Technical Information Center • Joint report by the Federal Aviation Administration and the Department of Defense to identify best safety and security practices in software engineering • The NCS has a strong and well established working relationship with Canada currently embodied in the U S Canada Civil Emergency Planning Telecommunications Advisory Group CEPTAG • The CEPTAG created in 1988 provides a forum for addressing shared communications concerns and for facilitating cross-border cooperation and mutual assistance in the event of an emergency • Canadian representation is provided through Industry Canada which is the lead department for developing maintaining and facilitating emergency telecommunications policies and programs NSTAC Report to the President on International Communications D-9 President’s National Security Telecommunications Advisory Committee Instrument NCS Industry Canada Standard Operating Procedures SOP TTCP Beginner’s Guide Air Force Cyberspace Command ITU’s NGN-GSI Draft Document on NGN Identity Management Security Combined Communications Electronics Board http www jcs mil j6 cceb Common Vulnerabilities and Exposures Standards CVE http cve mitre org about D-10 Summary • The last CEPTAG meeting occurred in Ottawa Canada in September 2006 with extensive discussions between representatives of the NCS and Industry Canada Agenda topics included pandemics and modeling and analysis • The NCS and Industry Canada are working to establish and exercise an SOP to facilitate cross-border coordination • SOP 303 can be used to coordinate cellular service disruption around shared assets such as bridges and tunnels • SOP 304 is designed to expedite the transport of personnel material and equipment across the U S Canada border as part of a disaster response operation This new command is a significant step in protecting the service’s data while detecting adversary data and then denying disrupting and destroying the source or transmission of that information The cyberspace force will draw on the knowledge and talents across all Air Force commands in addition to the capabilities already housed in the 8th Air Force including command and control electronic warfare net warfare and surveillance and reconnaissance per Air Force Print News article Provides a framework for identity management based on the NGN Functional Requirements and Architecture Release 2 The IdM framework is applicable to all NGN entities such as service providers network providers network elements users and user’s equipment • A five-nation Australia Canada New Zealand United Kingdom and United States joint military communicationselectronics C-E organization whose mission is the coordination of any military C-E matter that a member nation refers to it CVE is a list or dictionary that provides common names for publicly known information security vulnerabilities and exposures Using a common name makes it easier to share data across separate databases and tools that until now were not easily integrated This makes CVE the key to information sharing If a report from one of the user’s security tools incorporates CVE names the user may then quickly and accurately access fix information in one or more separate CVE-compatible databases to remediate this problem NSTAC Report to the President on International Communications APPENDIX BRIEFINGS LISTING President’s National Security Telecommunications Advisory Committee APPENDIX E Briefings Listing Briefer Computer Emergency Readiness Team CERT CC Computer Sciences Corporation Department of Commerce National Telecommunications and Information Administration Department of Defense DOD National Information Infrastructure NII Department of Homeland Security DHS National Cyber Security Division NCSD Department of Justice DOJ Computer Crime and Intellectual Property Section Department of State DOS DHS National Communications System NCS DHS NCS DHS NCSD DOD Joint Task Force—Global Network Operations STRATCOM DOD NII DOD NII Computer Network Defense DOS DOS Edison Electric Independent Electricity System Operator—Canada Information Technology Association of America ITAA Microsoft Microsoft Topic CERT International Program Research and Design Exchange 2006 Overview Cyber Security and Critical Infrastructure Protection CIP Framework for National Action International Information Assurance Program IIAP NCSD International Affairs Program Overview United States Activities to Improve Cybercrime Legislation and Investigate Capacities DOS Overview of International Telecommunications Union ITU Industry Involvement in the ITU Standards Development Process Security Implications of Next Generation Networks U S Canada Telecommunications Bilateral Relationship NCSD International Affairs Briefing Information Sharing Partners Private Sector Role in Military to Military Relationships Information Sharing Partners International Critical Infrastructure Protection DOS Four Track Plan Overview Discussion Overview of Final Report on the Implementation of the Task Force Recommendations U S -Canada Power Systems Outage Task Force Electricity Industry—Government Relationships US and Canada ITAA Activities in International Cyber Security Outreach National Information Assurance Partnership Common Criteria Testing Program Overview Overview of National Strategy to Secure Cyberspace NSTAC Report to the President on International Communications E-1 President’s National Security Telecommunications Advisory Committee Briefer VeriSign VeriSign iDefense E-2 Topic Priority V Network Security and Forensics Industry Global Cooperation iDefense Cooperation and Collaboration Overview NSTAC Report to the President on International Communications APPENDIX OPERATIONS BACKGROUND President’s National Security Telecommunications Advisory Committee APPENDIX F Operations Background National Communications System The National Communications System NCS was established by Executive Order EO 12472 Assignment of National Security and Emergency Preparedness Telecommunications Functions EO 12472 requires the Executive Agent of the President who is currently the Secretary of Homeland Security to designate a “Manager of the NCS” to ensure that the NCS conducts unified planning and operations to coordinate the development and maintenance of an effective and responsive capability for meeting the Federal Government’s domestic and international national security and emergency preparedness telecommunications needs Some formal capabilities exist today for industry and the U S Government to share information about the telecommunications infrastructure through various existing mechanisms The same applies to industry’s ability to share information among various industries and for the U S Government to share information with foreign governments Currently some groups have operational capabilities that can respond to all hazard type incidents affecting networks including incidents involving physical damage that can create cyber consequences Other collaboration occurs on more of an ad hoc basis as relationships have developed in discrete business areas and as new global collaborative business arrangements continue to emerge Information Sharing In today’s global environment information technology IT and communications networks connect people companies and governments seamlessly across international borders From communications satellites to undersea cables to cell towers operating near borders the communications and IT industries are inherently international The borderless nature of this network allows incidents to spread quickly from country to country Given the increasing reliance on the communications and IT sectors a need exists for governments and private industry to establish trust relationships with international partners in order to enhance situational awareness build national security and emergency preparedness NS EP capabilities establish incident response mechanisms and when needed and feasible create mechanisms for burden sharing troubleshooting and other operational issues that may arise To address these issues industry and government have developed mechanisms to share information about the communications and IT infrastructure These mechanisms involve government-to-government government-to-industry and industry-to-industry and several mechanisms can respond to all-hazard type network impacting incidents including incidents involving physical damage with cyber consequences NSTAC Report to the President on International Communications F-1 President’s National Security Telecommunications Advisory Committee Within the Department of Homeland Security DHS the NCS and the National Cyber Security Division NCSD are involved in U S Government efforts on international NS EP in the Communications and IT Sectors In cooperation with DHS and the Department of State DOS the NCS actively assesses the work of multilateral organizations such as the United Nations UN the European Union EU the Organization of American States OAS and the Organization for Asia-Pacific Economic Cooperation APEC The NCS also works closely with the International Telecommunication Union ITU an organization within the United Nations in which governments and the private sector collaborate to standardize and regulate international radio and telecommunications The NCS has a working bilateral relationship with their Canadian counterparts on NS EP and critical infrastructure protection issues The United States and Canadian governments created the Civil Emergency Planning Telecommunications Advisory Group CEPTAG in 1988 to address shared communications concerns as well as to facilitate cross-border cooperation and mutual assistance in the event of an emergency The NCS NCSD and the Homeland Security Advanced Research Projects Agency HSARPA also have well-developed bilateral relationship with their United Kingdom counterparts pursued primarily through DHS’ Joint Contact Group JCG a DHS-wide agreement for cooperation in science technology and research and development matters The principal NCS task under the JCG is to develop government-togovernment priority routing capability for emergency communications The NCS is also involved in implementing the U S Mexico Canada Security and Prosperity Partnership SPP The SPP was launched in 2005 as a dual binational effort to increase security and enhance prosperity in North America The NCS leads several SPP initiatives as part of the larger effort to develop and implement a common approach to critical infrastructure protection and plans for response to cross-border terrorist incidents and natural disasters The NCS also represents the U S Government within the North Atlantic Treaty Organization’s NATO Civil Communications Planning Committee CCPC The CCPC works to assess existing and future civil postal and telecom systems networks and other resources relative to civil emergency planning and critical infrastructure protection in response to natural and man-made disasters Officials from Industry Canada have also been detailed to the NCC Watch for 2-week periods to observe operations and share best practice information DHS’ NCSD works directly with several international organizations to raise awareness increase outreach opportunities and as part of its effort to create a culture of cyber security This includes contributing to the previously mentioned SSP of North America and the Joint Contact Group with the United Kingdom as well as working through multilateral organizations including the International Telecommunication Union the Security and Prosperity Steering Group of the Asia Pacific Economic Cooperation Telecommunications and Information Working Group APEC TEL the Organization for Economic Cooperation and Development OECD and the Organization of American States The Department of Justice’s DOJ Computer Crimes and Intellectual Property Section CCIPS has been organizing cybercrime programs for the past several years Though CCIPS predates the United States’ signing of the Convention on Cybercrime in 2001 CCIPS has since been F-2 NSTAC Report to the President on International Communications President’s National Security Telecommunications Advisory Committee “assist ing states in amending their legislation to meet Convention standards not American law and to train new law enforcement officials including investigators prosecutors and judges in cybercrime-related issues ”48 CCIPS international work extends beyond the G-8 countries as CCIPS has provided cybercrime training and guidance to nations worldwide In 2003 CCIPS led a U S delegation that provided legislative drafting training to countries in the Middles East and North Africa In 2003 CCIPS again focused its attention on the continent of Africa leading two cybercrime workshops for the Law Enforcement Academy Currently CCIPS is engaged with APEC providing training for prosecutors and judges Finally CCIPS has provided confidential review of pending cybercrime statutes for several countries around the globe As response and recovery plans have emerged domestically NCS and NCSD have worked to involve international partners in DHS efforts to train personnel and exercise the plans This has included Canadian Mexican and the United Kingdom participation in the biannual Top Officials TOPOFF exercise as well as the NCSD-sponsored Cyber Storm I and forthcoming Cyber Storm II Through these exercises NCS and NCSD have established contacts shared best practices and lessons learned and have ensured that the NCC and US-CERT understand the opportunities and challenges to working with international partners In addition the NCS leveraged these government-to-government and government-to-industry relationships during the response to Hurricane Katrina Because of the overwhelming effects of the disaster the NCS worked with private industry to facilitate the entry of communicationsrelated personnel goods and equipment from Canada into the United States to assist with the response The NCS has also worked to assist Canada during ice storms the Northeast blackout and other natural disasters during the past decade Industry collaboration across traditional borders occurs intercompany for multinational corporations and intra-company through customer and partner relationships through established incident response processes and incident by incident An exception is the work of the Forum for Incident Response Security Teams FIRST organization which is a private sector global forum for those involved in incident response security efforts Primarily an international networking forum for incident response teams through an annual conference FIRST provides a resource for connections to other incident response teams either government industry company or academic Governments continue to work on these issues internationally For example Meridian is an annual international conference that provides an opportunity for governments to discuss how they can work together to protect critical infrastructures exploring the benefits and opportunities of cooperation between government and the private sector and among governments internationally as well as best practices from around the world The discussions all occur in a confidential environment to foster an open dialogue 49 48 49 “United States Activities to Improve Cybercrime Legislation and Investigative Capacities ” March 20 2006 Meridian 2006 Website http www meridian2006 org index php page 1 accessed April 4 2007 NSTAC Report to the President on International Communications F-3
OCR of the Document
View the Document >>