Senate Hearing 106-858 From the U S Government Publishing Office S Hrg 106-858 CRITICAL INFORMATION INFRASTRUCTURE PROTECTION THE THREAT IS REAL HEARING before the SUBCOMMITTEE ON TECHNOLOGY TERRORISM AND GOVERNMENT INFORMATION of the COMMITTEE ON THE JUDICIARY UNITED STATES SENATE ONE HUNDRED SIXTH CONGRESS FIRST SESSION on EXAMINING THE PROTECTION EFFORTS BEING MADE AGAINST FOREIGN-BASED THREATS TO UNITED STATES CRITICAL COMPUTER INFRASTRUCTURE __________ OCTOBER 6 1999 __________ Serial No J-106-53 __________ Printed for the use of the Committee on the Judiciary __________ 68-563 U S GOVERNMENT PRINTING OFFICE WASHINGTON 2001 COMMITTEE ON THE JUDICIARY ORRIN G HATCH Utah Chairman STROM THURMOND South Carolina CHARLES E GRASSLEY Iowa ARLEN SPECTER Pennsylvania JON KYL Arizona MIKE DeWINE Ohio JOHN ASHCROFT Missouri SPENCER ABRAHAM Michigan JEFF SESSIONS Alabama BOB SMITH New Hampshire PATRICK J LEAHY Vermont EDWARD M KENNEDY Massachusetts JOSEPH R BIDEN Jr Delaware HERBERT KOHL Wisconsin DIANNE FEINSTEIN California RUSSELL D FEINGOLD Wisconsin ROBERT G TORRICELLI New Jersey CHARLES E SCHUMER New York Manus Cooney Chief Counsel and Staff Director Bruce A Cohen Minority Chief Counsel ______ Subcommittee on Technology Terrorism and Government Information JON KYL Arizona Chairman ORRIN G HATCH Utah CHARLES E GRASSLEY Iowa MIKE DeWINE Ohio DIANNE FEINSTEIN California JOSEPH R BIDEN Jr Delaware HERBERT KOHL Wisconsin Stephen Higgins Chief Counsel and Staff Director Neil Quinter Minority Chief Counsel and Staff Director ii C O N T E N T S ---------STATEMENTS OF COMMITTEE MEMBERS Page Kyl Hon Jon U S Senator from the State of Arizona Feinstein Hon Dianne U S Senator from the State of California 1 4 CHRONOLOGICAL LIST OF WITNESSES Statement of Hon Robert F Bennett a U S Senator From the State of Utah Panel consisting of John S Tritak director Critical Infrastructure Assurance Office Washington DC and Michael A Vatis director National Infrastructure Protection Center Washington DC 5 6 Statement of Jack L Brock Jr director Government-Wide and Defense Information Systems Accounting and Information Management Division U S General Accounting Office Washington DC accompanied by Jean L Boltz Prepared statement of Richard C Schaeffer Jr director Infrastructure and Information Assurance Office of the Assistant Secretary of Defense 35 56 ALPHABETICAL LIST AND MATERIAL SUBMITTED Bennett Hon Robert F Testimony Brock Jack L Jr Testimony Prepared statement Schaeffer Richard C Jr Prepared statement Tritak John S Testimony Prepared statement Vatis Michael A Testimony Prepared statement 5 35 44 56 6 9 CRITICAL INFORMATION INFRASTRUCTURE PROTECTION THE THREAT IS REAL 14 18 ---------WEDNESDAY OCTOBER 6 1999 U S Senate Subcommittee on Technology Terrorism and Government Information Committee on the Judiciary Washington DC The committee met pursuant to notice at 10 01 a m in room SD-226 Dirksen Senate Office Building Hon Jon Kyl chairman of the subcommittee presiding Also present Senators Feinstein and Bennett ex officio OPENING STATEMENT OF HON JON KYL A U S SENATOR FROM THE STATE OF ARIZONA Senator Kyl The hearing before the Senate Judiciary Committee Subcommittee on Technology Terrorism and Government Information will please come to order Today's hearing is on the subject of the critical information infrastructure and protection of the infrastructure and the threat thereto Our panelists this morning we will have two panels and on the first panel we have Mr John S Tritak who is Director of the Critical Information Assurance Office in Washington and Mr Michael Vatis the Director of the National Infrastructure Protection Center here The second panel will be Mr Jack Brock Director of Information Management Issues at the General Accounting Office I appreciate the attendance of the witnesses here I am informed that other members of the subcommittee will be arriving but in view of the schedules of everyone concerned I am going to begin the hearing right on time and we will move forward from there Let me first of all make a brief opening statement and then call upon our two witnesses to make an opening statement after which we will have a series of questions At our hearing today we are going to examine a growing public policy concern the threat of hostile attack on our Nation's critical information infrastructure and the adequacy of the Federal Government's response to this threat This is the fourth public hearing that our subcommittee has held on the topic in the last 2 years and given the importance of the subject it will not be our last The President's top advisors recently issued a report on preserving America's privacy and security in cyberspace As the report points out the enormous success the United States has enjoyed over the past century was due in part to the ability of our Nation and its leaders to deal with the latest technological trends in a way that enhanced the security and prosperity of successive generations of Americans At critical junctures in our history wise government policies with regard to innovative technology have resulted in unprecedented success During the industrial age the arrival of World War II signaled an urgent need for increased production and scientific advances The success of America's war effort in defeating fascism rested largely on the strength of our industrial might and the successful collaboration between our government and industry We not only protected America's security but also vaulted the U S economy to unprecedented heights in the postwar period Today the industrial age has become the information age and computers facilitate the instant exchange of vast amounts of data and ideas Who would have predicted just a few decades ago that a small Defense Department research effort would result in the creation of the Internet and revolutionize our society As we approach the dawn of the new millennium America again faces a time of pivotal change Information technology presents both an opportunity and a threat to our society which is increasingly dependent upon computers and communications equipment what we call our critical information infrastructure As most Americans have learned recently with the preparations for Y2K to make sure there are no major disruptions in services virtually every key service is dependent upon computers from electric power grids to phone systems to air traffic control water and sewer service medical devices banking and the list goes on and on Unfortunately very few of these critical computer networks were designed with good security measures The changes in our society also must be viewed in context with America's changing geopolitical role in the post-Cold War world The United States is the world's only superpower and our armed forces enjoy technological superiority on the battlefield Nations and terrorist groups that are hostile to our interests are increasingly choosing not to confront our strengths directly that is by trying to field fleets of advanced fighter planes or ships on par with ours but rather are seeking to exploit our vulnerabilities looking hard for an Achilles heel According to the National Security Agency over 100 countries are working on information warfare techniques One recent case illustrates the danger of this threat According to Newsweek magazine computer systems at the Defense and Energy Departments have been the subject of a sustained computer hacking effort from Russia These attacks have resulted in the loss of vast quantities of data possibly including classified naval codes and information on missile guidance systems These computer attacks have reportedly been very subtle For example the London Sunday Times interviewed an engineer at the Space and Naval Warfare Systems Command in San Diego CA who described being alerted to a problem when a computer print job took an unusually long time According to the Times To his amazement monitoring tools showed that the file had been removed from the printing queue and transmitted to an Internet server in Moscow before being sent back to San Diego '' And there are other troubling examples of computer attacks by U S citizens that demonstrate our weaknesses in this area For example one group dubbed the Phonemasters'' by the FBI manipulated computers that route telephone calls These hackers reportedly gained access to telephone networks of companies like AT T British Telecom GTE Sprint MCI WorldCom and Southwestern Bell At times these hackers were able to eavesdrop on phone calls compromise databases and redirect communications at will according to press accounts In addition they apparently had access to portions of the nation's power grid and air traffic control systems and hacked their way into a digital cache of unpublished phone numbers at the White House In one prank this group even succeeded in forwarding FBI phone lines to sex-chat lines in Germany Moldavia and Hong Kong resulting in the FBI being billed $200 000 for these calls These calls would be amusing if the stakes were not so high Given a more malicious intent hackers in our country or those working for terrorist groups of the military services of nations hostile to the United States could do far greater damage to our critical information infrastructure resulting in what some have termed an electronic Pearl Harbor '' We have been fortunate that the United States has escaped serious harm thus far but our luck is likely to run out unless we take aggressive steps to tighten these gaps As Winston Churchill once observed in history the terrible ifs' accumulate '' At today's hearing we will explore how our government has approached this problem as well as how its efforts might be improved We will also discuss whether new legislation is required and we will explore the impact of the government's cyber-protection efforts on the privacy of American citizens Our witnesses are ideally suited to address these issues Mr John Tritak Director of the Critical Information Assurance Office is responsible for the development of an integrated national plan to address the threats to our critical infrastructure He will be followed by Michael Vatis the Director of the National Infrastructure Protection Center an interagency organization that is charged with leading the Federal Government's efforts to detect prevent investigate and respond to cyber attacks on U S critical infrastructures And on our second and final panel Mr Jack Brock Director of Government Information Systems at the GAO will testify about the type of vulnerabilities to cyber attacks that exist in computer networks operated by Federal agencies that the GAO has identified during annual audits and the status and effectiveness of the government's effort to reduce these vulnerabilities It is my great pleasure to turn first to Senator Dianne Feinstein of California and then to Robert Bennett of Utah two of the real experts in the U S Senate on this subject Senator Feinstein is the ranking member of this subcommittee She and I have been working for a long time concerned about the protection the necessity of protecting our Nation's critical infrastructure Senator Bennett not even a member of this committee has such an interest in this subject that as chairman of the special Y2K Committee here in the Senate he has taken an interest in what we are doing and what others in the Congress are doing to deal with this issue It is largely to his credit through the Y2K Committee chairmanship that a lot of this information has been brought to light to the American public at large So I am really pleased that Senator Bennett is here with us as well Senator Feinstein STATEMENT OF HON DIANNE FEINSTEIN A U S SENATOR FROM THE STATE OF CALIFORNIA Senator Feinstein Thanks very much Mr Chairman I think you know how much I enjoy working with you and I want to thank you for your leadership on this subject I think I probably do not qualify as an expert I think my colleague Senator Bennett probably does But I think I do qualify as someone that believes that this area is one of the most critical and crucial areas we now face how to address the serious and increasing threats to our national infrastructure The advent of a new technology age in which we now live has brought America certainly great prosperity California my State has benefitted immensely from these developments Powerful computers now control our electricity our phone service our plane traffic our national defense and they have moved us forward much more quickly than anyone ever could have imagined We can plan our physical infrastructure more efficiently We can test prototype aircraft on a computer screen without ever spending a dime on construction We can allocate resources more efficiently and at a lower cost than ever before And the power of a new global communication network has taken people from the ends of the earth and brought them together almost as if they were next-door neighbors Amazing Ten years ago sending a message through the mail from Cairo to California would take weeks Now that simple message can be sent with a simple stroke of a key and accomplished in the blink of an eye That power the power of instant inexpensive communication across mountains oceans and international boundaries has opened up vast potential for global cooperation and a truly borderless economy But and here is the but with that power also comes extraordinary danger Just like an e-mail from friend to friend can travel over the ocean and across national boundaries in a split second so can a computer virus or a casual hacker attack or a foreign cyber terrorist As a result this Nation faces serious challenges in the coming months and years We must learn to balance the benefits of global interconnectivity with the need to protect our vital information our defense our infrastructure About a dozen countries have information warfare programs They include Libya Iraq and Iran Foreign intelligence services routinely break into American public and private sector computers mapping power grids to find weak links and leaving trap doors at virtually every U S military base Last year two California high school sophomores were among a group suspected of penetrating and compromising at least 11 sensitive computer systems and military installations and dozens of systems at other government facilities including Federal laboratories that perform nuclear weapons research These children were just looking for some excitement and guess what they found it But imagine if they had been out to do real damage Imagine if they had been employed by a hostile foreign government Because of the interrelated nature of our critical infrastructure systems today's terrorist has the potential to do with a keyboard what in the last world war might have taken a squadron of bombers to accomplish At stake are not only the information systems upon which we rely but the electric power grid the public switch communications network the air traffic control system the banking system rail transport oil and gas distribution networks and a host of other networks on which our national security and our way of life today depend We have begun to address this threat Presidential Decision Directive 63 issued last year identifies critical infrastructure protection as a national security priority and commits us to effectively protect our critical infrastructures within 5 years But the time table established by Public Directive 63 is already slipping A national report was due to Congress last December As of today we have still not seen it I look forward to examining today what our government has done to protect our critical infrastructure and what more can be done This Congress and this subcommittee has a clear responsibility to do what it takes to protect this Nation from the threat of cyber terrorism and from the enormous risks that come hand in hand with the advances in technology that have given us so much over the last few years So thank you Mr Chairman for your leadership and for scheduling this hearing and your very serious attention to this issue Senator Kyl Thank you for a fine statement Senator Feinstein Now I would like to turn to Senator Robert Bennett for any comments he may have STATEMENT OF HON ROBERT F BENNETT A U S SENATOR FROM THE STATE OF UTAH Senator Bennett Thank you Mr Chairman I appreciate your courtesy in allowing me to come where non-lawyers usually do not appear I understand Senator Feinstein is not a lawyer and that---Senator Feinstein I am not a lawyer Senator Kyl Now you guys quit bragging Laughter Senator Bennett That demonstrates how open-minded you are on this committee I think you are having the first of what will be a long series of hearings This is an issue which we are only barely beginning to understand but I think ultimately the next President whomever he or she may be will find that the challenge of information warfare will be the number one national security issue of the next administration I recently went to an office where they had drawn a map of the new world Whenever you think of military threats you start out with the geography and you draw the map and the various sides This was a map of the Internet and it did not look like any map you or I have ever seen before It looked like an abstract painting I wanted to take it down and put it in my office The world geologically is billions of years old The world electronically is 10 years old or less And the one thing that was striking about this map is that there were no oceans on it When we talk about the U S militarily we talk about the sanctuary of North America between two oceans and on this new map of the new world there were no oceans and no sanctuary Mr Chairman you and Senator Feinstein have summarized this very well in your statements The reason I think this hearing is important is because we do not have in our present governmental structure a neat pigeon hole in which to put this particular threat For example if somebody does the kinds of things that Senator Feinstein was describing is that a military attack on our national security and therefore the responsibility of the Defense Department or is that a violation of private property rights and therefore an issue for law enforcement or does it become both And where do the responsibilities lie for the Defense Department to protect us from foreign attack and from the Justice Department to protect us from intrusions Inevitably in this new world those intrusions will merge Foreign efforts to destroy us cripple us do us harm will very clearly merge with domestic capabilities to break in We have already seen the example of a foreign agent who hired some American teenage hackers and as Senator Feinstein said they were out for the thrills and experience but their mentor had a much more malicious purpose in mind I think the Judiciary Committee is the logical place to be holding these kinds of hearings I have talked with Senator Roberts who plans to be holding hearings in the Armed Services Committee and we of course have held some hearings on this in the Senate Special Committee on the Year 2000 Some of your witnesses here today have already testified before that committee So as I say I think this is the first of what will be a series of hearings Ultimately I think the issue must come before the Senate leadership and the House leadership to say where appropriately within the legislative structure does the responsibility lie for oversight and coordination of this very very important challenge So I congratulate you on your hearings and I am very grateful for your willingness to allow me to participate Senator Kyl Thank you very much Senator Bennett Now to our panel Mr John Tritak you will lead off and then Michael Vatis PANEL CONSISTING OF JOHN S TRITAK DIRECTOR CRITICAL INFRASTRUCTURE ASSURANCE OFFICE WASHINGTON DC AND MICHAEL A VATIS DIRECTOR NATIONAL INFRASTRUCTURE PROTECTION CENTER WASHINGTON DC STATEMENT OF JOHN S TRITAK Mr Tritak Thank you Senator Kyl Senator Feinstein Senator Bennett It is truly an honor to be here today to discuss the challenges facing our Nation in the area of critical infrastructure protection and the efforts being undertaken by the administration to address those challenges I intend to keep my opening remarks very brief and ask that my written statement be entered into the record Senator Kyl All of the statements will be admitted without objection Mr Tritak Thank you sir America has long relied on complex systems or critical infrastructures to assure the delivery of services vital to its national security economic prosperity and social well-being These infrastructures include telecommunications electric power oil and gas delivery and storage banking and finance transportation and vital human services and government services The information age has fundamentally altered the nature and extent of our reliance on these infrastructures Our government our economy our society indeed our individual lives are becoming increasingly dependent on an ever-expanding system of networks of computers and information systems The increasing dependence on computer control networks combined with the growing interdependence of our Nation's critical infrastructures together present a new kind of vulnerability especially to deliberate attack The threats posed to our critical infrastructures are real and growing The nature of these threats and the potential risks they pose to the Nation's infrastructures will be addressed by Mr Vatis of the National Infrastructure Protection Center PDD 63 was issued in May 1998 to take up the unique challenges posed by these threats I say unique because the risks posed to our critical infrastructures present a challenge that is really unique in our history as this may very well be the first time a national security challenge cannot be solved by the government alone Indeed 90 percent of the infrastructures that we are concerned about are privately owned and operated This is why PDD 63 stresses the importance of establishing public-private partnerships and why the President has designated lead agencies in the Federal Government to work as liaisons with the respective sectors to build those partnerships PDD 63 also recognizes the traditional areas of national defense foreign affairs intelligence and law enforcement and that they are fundamental to protection of our infrastructures inherent in the domain of government and stipulates that sector coordinators be designated for these areas from the associated government agencies Shortly the administration will publish the first version of a plan to implement PDD 63 The draft is in the final stages of interagency clearance so I cannot go into a great deal of detail on its content However I can highlight the themes that are captured in the plan as well as what is contained in PDD 63 First is a continuing commitment to protecting those infrastructures that are necessary in order to perform national defense and intelligence missions I believe you have submitted for the record the statement by Mr Richard Schaeffer of the Office of the Secretary of Defense who lays out in great detail what efforts are being undertaken in that regard to protect those infrastructures Second is a need for the U S Government to serve as a model in critical infrastructure protection Recognizing that maybe most of the critical infrastructures of our country are privately owned it is very difficult for the government to call upon private industry to take up the challenge posed by PDD 63 unless it has its own house in order With that in mind the President charges the Federal Government to do what it needs to do to ensure that its critical infrastructures are protected against intentional attack Third and finally there is a need to establish the partnerships between private industry and the government on the one hand and to encourage information sharing arrangements first and foremost within industries themselves and ultimately between industry and government Those partnerships at various levels we believe will secure our Nation's infrastructures over the long term and that a collaborative effort will ensure that creative solutions are developed to meeting the challenges of the future I would like to conclude my remarks very briefly by highlighting some of the key programs that are likely to appear in a national plan as they are deemed sufficiently important by the administration to request accelerated funding in the fiscal year 1999 budget amendment which is before you at the moment The first of these supports an aggressive government-wide implementation of a Federal computer security requirements program The proposal requests $5 million to establish a permanent 15-member expert review team that would assist government agencies in identifying vulnerabilities plan secure systems and to implement critical infrastructure protection plans The Critical Infrastructure Assurance Office under PDD 63 is to assist agencies in identifying critical systems and their own dependencies and we will be working and supporting the expert review team in that effort Second the administration requests $8 4 million to establish a Federal intrusion detection monitoring system to secure Federal Government computer systems A couple of key points I would like to make about that briefly given the amount of coverage that has been given to this issue in the press First this is meant to cover civilian government agencies only This is not meant to be wired into the private sector or to include private industries in some fraud monitoring system It provides a centralized capability to analyze anomalous activities that agencies may detect through the use of their monitoring systems Fourth any Federal intrusion detection monitoring system that is developed will be fully consistent with existing privacy laws No additional authorization has been given to the government in order to implement this program Finally in cases where activity suggests criminal intent and criminal activity those and only those pieces of information will be going to law enforcement as appropriate under existing laws The third request is for approximately $17 million for the recruitment training and retention of Federal information technology managers and officers The purpose of this program is to ensure that the Federal Government if it is to act as a model has the capabilities to protect its information infrastructures against malicious intent and activity Four $7 million are requested for ongoing efforts to secure government-to-government communications through the establishment of public key infrastructures Fifth and finally $2 million is being requested to support two pilot programs to foster information sharing arrangements between State and local governments and private industry I would like to thank you for having me here today and I welcome any questions you may have Senator Kyl Thank you very much The prepared statement of Mr Tritak follows PREPARED STATEMENT OF JOHN S TRITAK Mr Chairman Madame Ranking Member members of the Subcommittee ladies and gentlemen it is an honor to appear before you here today to discuss the challenges facing our Nation in the area of critical infrastructure protection This Subcommittee has shown exceptional leadership on these issues and I am grateful for the opportunity to work closely with you and the Congress to find ways to advance infrastructure assurance for all Americans We all recognize that no viable solutions will be discovered or implemented without the executive and legislative branches working together for our national good I INTRODUCTION America has long depended on a complex of systems--or critical infrastructures--to assure the delivery of services vital to its national defense economic prosperity and social well-being These infrastructures include telecommunications electric power oil and gas delivery and storage banking and finance transportation and vital human and government services The information age has fundamentally altered the nature and extent of our dependency on these infrastructures Increasingly our government economy and society are being connected together into an ever expanding and interdependent digital nervous system of computers and information systems With this interdependence comes new vulnerabilities One person with a computer a modem and a telephone line anywhere in the world can potentially break into sensitive government files shut down an airport's air traffic control system or cause a power outage in an entire region The threats posed to our critical infrastructures by hackers terrorists criminal organizations and foreign governments are real and growing The nature of these threats will be addressed by Mr Vatis of the National Infrastructure Protection Center NIPC Before I discuss the initiatives the Administration is undertaking to secure our nation's critical infrastructures I would like to discuss the historical context within which PDD-63 arose In the early 1990's events such as the 1995 bombing of the Murrah Federal Building in Oklahoma City demonstrated that the federal government needed to address new types of threats and vulnerabilities-many of which the nation was unprepared to defend against In response to this tragedy and other events the Administration formed an inter-agency working group to examine the nature of the threat our vulnerabilities and possible long-term solutions for this aspect of our national security The Critical Infrastructure Working Group CIWG chaired by then Deputy Attorney General Jamie Gorelick and including representatives from the Defense Intelligence and national security communities identified both physical and cyber threats and recommended formation of a Presidential Commission to address more thoroughly many of these growing concerns In July 1996 in response to the CIWG recommendation President Clinton signed Executive Order 13010 establishing the President's Commission on Critical Infrastructure Protection PCCIP or the Commission After examining infrastructure issues for over a year the Commission issued its report Critical Foundations Protecting America's Infrastructures drawing at least four significant conclusions First critical infrastructure protection is central to our national defense including national security and national economic power Second growing complexity and interdependence between critical infrastructures may create increased possibility that rather minor and routine disturbances can cascade into national security emergencies Third vulnerabilities are increasing steadily and the means to exploit weaknesses are readily available practical measures and mechanisms the commission argued must be urgently undertaken before we are confronted with a national crisis and Fourth laying a foundation for security will depend on new forms of cooperation with the private sector which owns and operates many of these critical infrastructure facilities II PDD-63--OVERVIEW After releasing the PCCIP report the Administration worked to incorporate these and other recommendations into Presidential Decision Directive 63 which was issued in May 1998 Most importantly PDD-63 recognizes the need for a Public-Private Partnership to face these critical issues The directive specifies sectors of the national infrastructure primarily in the private sector that provide critical services or functions It designates lead agencies in the Federal Government to work as liaisons with their respective sectors to build partnerships PDD-63 additionally recognizes that the traditional areas of national defense foreign affairs intelligence and law enforcement are fundamental to infrastructure protection are inherently the domain of the government and stipulates that sector coordinators be designated for these areas from the associated government agencies PDD-63 established the position of National Coordinator for Security Infrastructure Protection and Counter Terrorism to orchestrate these efforts The PDD lays out specific tasks that must be accomplished time lines for doing so and organizations for carrying out these missions Key amongst them are the National Infrastructure Protection Center NIPC Directed by Mr Vatis and the National Plan Coordination Staff--now called the Critical Infrastructure Assurance Office CIAO --which I have the honor of directing PDD-63 focuses the nation's efforts on aspects of critical and immediate importance--and I emphasize that these must be the efforts of the whole nation for success will come only from the efforts of the private sector state and local governments and the Federal Government working together in an integrated and cooperative manner Our efforts fall in three broad categories A Defense and intelligence components The first is the Federal Government agencies involved in defense and intelligence efforts The armed forces and intelligence agencies have requirements and systems that are unique to their special role This has long been recognized in law in the way we structure these organizations and in our national philosophy Their efforts are as would be expected from the sensitive and well established nature of their mission much further along in achieving critical infrastructure protection than those of the other parts of the Federal Government In many ways they have set the example for other agencies' efforts and they currently share their experiences and advise on how the rest of the government might proceed Their contribution has been very important in shaping the policy and programmatic reality the rest of the government is currently trying to establish Mr Richard Schaeffer Director of the Information and Infrastructure Assurance Office for the Defense Department has submitted a statement for the record on this and other matters so in cause of brevity I will refer you to it and cover their efforts no further B Government as model The second category of effort can be called Government as a Model '' We often say that more than 90 percent of our critical infrastructures are neither owned nor operated by the Federal Government Partnerships with the private sector and State and Local Governments are therefore not just needed but are the fundamental aspect of critical infrastructure protection Yet the President rightly challenged the Federal Government in PDD-63 to serve as a model for critical infrastructure protection--to put our own house in order first As such the Administration has focused what might appear to be a disproportionate amount of our effort early in the process on doing this by establishing a coordinated and integrated approach across the Federal Government Federal Computer Security Requirements and Government Infrastructure Dependencies One component of this effort supports aggressive government-wide implementation of federal computer security requirements Thus in support of PDD-63 the President forwarded to Congress a request for a fiscal year 2000 budget amendment that would enhance computer security and critical infrastructure protection in the Federal Government This proposal would fund a permanent 15-member team at the Department of Commerce's National Institute of Standards and Technology NIST responsible for helping Agencies identify vulnerabilities plan secure systems and implement Critical Infrastructure Protection Plans The budget amendment would also establish an operational fund at NIST for computer security projects among Federal Agencies including independent vulnerability assessments computer intrusion drills and emergency funds to cover security fixes for systems identified to have unacceptable security risks Among others the Director of the team would consult with the Office of Management and Budget and the National Security Council on the team's plan to protect and enhance computer security for Federal Agencies Under PDD-63 the President directed the CIAO to coordinate analyses of the U S Government's own dependencies on critical infrastructures Many of the critical infrastructures that support our nation's defense and security are shared by multiple agencies Even within government then critical infrastructure outages may cascade and unduly impair delivery of critical services The CIAO is coordinating an interagency effort to develop a more sophisticated identification of critical nodes and systems and their impact on national security government-wide These efforts will support the work of the ERT in identifying vulnerabilities of the government's computer infrastructures planning secure computer systems and implementing computer security plans This research when complete will provide important information to maximize national security research and development budgeting and for implementing Federal computer security requirements and critical infrastructure planning within each agency Federal Intrusion Detection Network FIDNET PDD-63 marshals resources to improve interagency cooperation in detecting and in responding to computer intrusions into civilian government critical infrastructure nodes To support this effort the Administration recently sent to Congress a fiscal year 2000 Budget Amendment to create a centralized intrusion detection and response capability in the General Services Administration GSA Through the use of additional staff and enhanced technology Federal Agencies will improve upon their abilities to detect computer attacks and unauthorized intrusions share attack warnings and related information across agencies and respond to attacks This amendment would provide GSA funds to pay for additional technology and personnel dedicated to intrusion detection and response The additional personnel would improve Federal Agencies' ability to detect attacks analyze data and communicate attack information more swiftly building on the existing Federal Computer Incident Response Capability FedCIRC The additional technology in the form of stateof-the-art intrusion detection systems would ensure a consistent capability in Agencies to protect critical systems The program--much like a centralized burglar alarm system--would operate within legal requirements and Government policy concerning privacy civil liberties and promoting confidence in users of Federal civilian computer systems Attack and intrusion information would be gathered and analyzed by Agency experts Only data on system anomalies would be forward to GSA for further analysis Neither the Federal Bureau of Investigation nor other law enforcement entities would receive information about the computer attacks and intrusions--except under long-standing legal rules and where an Agency determines there is sufficient indication of illegal conduct Also private entities will not be wired to the FIDNet--no private sector entity is part of this civilian government program In short FIDNet will be run by the GSA not the FBI will not monitor any private networks or email traffic will confer no new authorities on any government agency and will be fully consistent with privacy law and practice Education and Training One of the nation's important shortcomings in our efforts to protect our critical infrastructures is a shortage of skilled information technology IT personnel Within the subset of information systems security personnel the shortage is acute Within the Federal Government the lack of skilled information systems security personnel amounts to a crisis This shortfall of workers reflects a scarcity of university graduate and undergraduate information security programs In attacking this problem we will leverage the initial efforts made by the Defense Department National Security Agency and some Federal Agencies The Federal Cyber Services FCS training and education initiative introduces five programs to help solve the Federal IT security personnel problem The Completion of an Office of Personnel Management IT occupational study This study will help identify the number of IT security positions in the Federal Government and the training and certification requirements for these positions The development of Center s for Information Technology Excellence CITE These Centers will train and certify current Federal IT security personnel and maintain their skill levels throughout their careers It will leverage the significant progress made by the Defense Department and other federal agencies on this issue The creation of a Scholarship for Service SFS program to recruit and educate the next generation of Federal IT security workers and managers This program will fund up to 300 students per year in their pursuit of undergraduate or graduate degrees in the IT security field In return the students will serve in the Federal IT workforce for a fixed period following graduation The program will also have a meaningful summer work and internship element An important part of the SFS program is the need to identify universities for participation in the program and assist in the development of IT security faculty and laboratories at these universities The development of a high school recruitment and training initiative This program would identify promising high school students for participation in summer work and internship programs that would lead to certification to Federal IT workforce standards and possible future employment This effort will also examine possible programs to promote computer security awareness in secondary and high school classrooms The development and implementation of a Federal INFOSEC awareness curriculum This awareness effort is aimed at ensuring the entire Federal workforce is developing computer security literacy It will leverage several outstanding existing federal agency awareness programs Research and Development A key component to our ability to protect our critical infrastructures now and in the future is a robust research and development plan The interagency Critical Infrastructure Coordination Group CICG has created a process to identify technology requirements in support of the Plan Chaired by the Office of Science and Technology Policy OSTP the Research and Development Sub-Group works with Agencies and the private sector to gain agreement on requirements and priorities for information security research and development coordinate among Federal Departments and Agencies to ensure the requirements are met within departmental research budgets and to prevent waste or duplication among departmental efforts communicate with private sector and academic researchers to prevent Federally funded R D from duplicating prior ongoing or planned programs in the private sector or academia and identify areas where market forces are not creating sufficient or adequate research efforts in information security technology That process begun in 1998 led to the Administration budget request for fiscal year 2000 of $500 million for critical infrastructure protection research Among the priorities identified by the process are technology to support large-scale networks of intrusion detection monitors artificial intelligence and other methods to identify malicious code trap doors in operating system code methodologies to contain stop or eject intruders and to mitigate damage or restore information-processing services in the event of an attack or disaster technologies to increase network reliability system survivability and the robustness of critical infrastructure components and systems as well as the critical infrastructures themselves and technologies to model infrastructure responses to attacks or failures identify interdependencies and their implications and locate key vulnerable nodes components or systems C Public-private partnership Thirdly and as discussed above one of the most important components of PDD-63 implementation is the development of collaborative partnerships among and between the private sector state and local governments and the Federal Government The importance of this effort cannot be overstated and is made clear by considering just a few scenarios If the natural gas delivery system you rely on for heat and cooking fails in January due to an attack on the computer systems that direct its operations you will take small comfort in fact that the Federal Government has a critical infrastructure protection plan in place In fact all our efforts to put the Federal Government's house in order and to serve as a model for industry will be of little service if our government information systems are impossible to break into but the electrical power that they operate on is shut down by malicious actions of a foreign government The list of examples goes on and on and none of these systems is owned or operated by the Federal Government These vignettes put the situation in perspective--we are faced with a fascinating and challenging problem This is the first time I am aware of in our national history that by creating policy and expending resources the Federal Government cannot alone solve a national security problem So what are we doing about it If by we'' you understand the government'' then the answer must necessarily be unsatisfactory--because the government alone cannot protect the nation's infrastructures But if by we'' you understand the nation''--the Federal Government in a coordinated and integrated effort with state and local government industry academia and other concerned groups--then I am happy to report that we have made a good beginning and are developing a strong future Just last Friday Treasury Secretary Summers announced the formation of the Financial Sector Information Sharing and Analysis Center-- ISAC'' for short ISAC's are private sector owned and operated entities that serve as focal points for their associated sector of the economy Because they are defined individually by their member organizations they will not all be identical They are however all to be the coordinating and analyzing body for cyber attacks on their specific sector I want to emphasize that these ISAC's are neither set up nor supervised by the Federal Government although the Federal Government will assist these critical sectors in setting up their ISAC through the Sector Liaisons if asked The government will share what information we can on cyber attacks with the ISAC's to help them protect their sector and we will encourage them to share appropriately sanitized information with us to help us protect government agencies and functions But this sharing from ISAC's to government will be on an entirely voluntary basis both in amount of information and the level of detail No requirement exists or will exist that mandates information sharing While these ISAC's would work within the sectors of the economy that own and operate critical infrastructure as stipulated in PDD-63 this is not intended to be limiting Other sectors or groupings within industry could establish ISAC's and we would assist them in this Furthermore practically every aspect of our nation relies on critical infrastructures This makes CIP a fundamentally important issue for not just those companies that own and operate critical infrastructure but also for those that rely on it to do business They can and must have a voice in this public private partnership Recently the President issued an Executive Order establishing a National Infrastructure Assurance Council NIAC This Presidential advisory body will be comprised of leaders from the Private Sector State and Local governments and the Federal Government It will examine key aspects of critical infrastructure assurance and report to the President The final indispensable members of this partnership are state and local governments They have the fundamentally important roles of providing and regulating many if not most essential services They are the front line forces in the event of disasters or attacks on infrastructures Some have moved quite far in their critical infrastructure protection efforts--New Mexico for example under the direction of Dr Dan O'Neil has a very strong and growing critical infrastructure protection partnership with key private sector entities Furthermore we have long had strong relationships with state and local governments on specific issues related to critical infrastructure protection such as state and local emergency management organizations with FEMA and state and local law enforcement agencies through the FBI and other national law enforcement agencies This area is one in which much work remains to be done and I look forward to working with each Congressional Delegation as we define the issues and solutions III CONCLUSION In conclusion much has been done since PDD-63 was issued in 1998 My staff and I are committed to building on this promising beginning coordinating the government's efforts into an integrated holistic program for critical infrastructure protection under the direction of the National Coordinator for Security Infrastructure Protection and Counter-Terrorism We have much work left to do and I look forward to with the members of this committee indeed with the Congress as a whole as we wrestle with this developing field and implement solutions I look forward to your questions Senator Kyl Mr Vatis STATEMENT OF MICHAEL A VATIS Mr Vatis Mr Chairman Senator Feinstein and Senator Bennett thank you very much for inviting me here this morning to speak with you about critical infrastructure protection You three have really been leaders in the Congress in recognizing the importance of these issues and the urgency of dealing with the new cyber threat that we face now in the information age and so it is a privilege to share our perspective with you all coming from the NIPC I think your statements your three statements have really laid out the issue quite nicely in terms of the threats that we face and why our vulnerabilities are so great in this area so I think I would like to focus my brief oral remarks on our perspective on the threats and how we are approaching them and attempting to deal with them Much of the news media accounts on this issue focus on hacks into government websites and some private sector websites and while those are criminal acts and they are not unimportant they are not really where the main threat lies The main threat lies in the potential for foreign nation states foreign actors and also domestic actors to hack into the critical computer networks that control our Nation's vital infrastructures the services that are essential to the basic functioning of our economy and are essential to our national security such as the telecommunications network the electrical power grid government operations other energy systems banking and finance et cetera Those are what we refer to as our critical infrastructures and those are the things that we are focused on protecting from attack Mr Chairman you mentioned recent media accounts of a significant series of intrusions into Department of Defense and other government agency networks This is a matter that we have been looking into for over a year now and it points up for those who needed yet another wake-up call the serious vulnerabilities that we are trying to deal with and the serious threats that we are facing not 5 or 10 years in the future but today These are threats to our national security that we must confront now because it is already happening As you mentioned Mr Chairman the greatest potential threat comes from foreign state actors who might choose to engage in information warfare against the United States because they realize that they cannot take us on in conventional military terms and would seek to go after what they perceive as our Achilles heel as you put it which is our reliance on information technology more than any other country to control our critical operations Information warfare is not the only threat There is also a threat from foreign nation states engaged in cyber espionage using remote access that is afforded by the interconnectivity of the Internet and our telecommunications systems to access sensitive government information or sensitive private sector information essentially engaged in industrial or economic espionage to steal secrets to advantage their own indigenous industries at the expense of our own American private sector These are threats again that are not just future threats but they are threats that we must deal with right now On the non-state side there are a variety of bad actors who can engage in similar types of intrusions for different purposes but essentially using very similar if not the same techniques We have seen terrorist groups beginning to acquire both the equipment and the expertise to use information technology as a weapon For some time now we have seen terrorist groups using the Internet and other forms of information technology to raise funds to spread propaganda and to communicate securely using encryption More recently we have begun to see terrorists now focusing on using those same set of technologies as a weapon We have seen the Internet Black Tigers associated with the Tamil Tigers engage in a denial of service attack on e-mail servers of Sri Lankan government embassies We also have concerns that Aum Shinrikyo the Japanese terrorist group that launched the deadly sarin gas attack in Tokyo beginning to think about using its expertise in computers and in networks as a possible weapon to direct against Japanese or U S interests And there are reports that traditional terrorist groups such as the IRA have thought about using these same sorts of tools as weapons against their intended targets All of these factors really portend the possibility and likelihood of a serious cyber terrorist attack directed against U S interests but right now we are already seeing criminal groups using these tools not necessarily to disrupt systems but to steal money which is what criminal groups are basically all about We have had the example that is now 5 years old of a Russian organized crime group headquartered in St Petersburg using the same types of techniques to break into the Citibank cash management system and start transferring over $10 million to their own accounts Fortunately Citibank contacted the FBI early on and Citibank was able to stem its losses at approximately $400 000 All of the members of the group were apprehended and eventually prosecuted But we still face that similar problem from criminal groups The Phonemasters case that you mentioned Mr Chairman is just another example of a group that does not fit our common definition of an organized crime group but it was a group it was organized and it engaged in serious criminal activity So I think we need to open our minds to some new paradigms out there of organized crime people who are perhaps younger than our typical vision of organized crime groups but are taking advantage of these new technologies to engage in serious fraud schemes serious theft schemes and other types of criminal conspiracies But we have also seen individuals posing a serious threat In the last year alone we have seen at least three very serious viruses or worms the Melissa virus the Explore zip worm the Chernobyl virus wreak serious havoc on the private sector some estimates going into the hundreds of millions of dollars of damage caused to private companies from the disruption caused by these viruses We have also seen what we call recreational hackers cause serious harm individuals who may be engaged in hacking just for the thrill of it as Senator Feinstein said or for bragging rights in the hacker community because they are a competitive bunch who like to show that they are better than the other guy But they can have very serious consequences in their hacks It is not just benign fun as it is sometimes portrayed to be We had an example a couple of years ago of a teenager in Massachusetts who hacked into the then-NYNEX now Bell Atlantic telephone system and shut down telecommunications in the Worcester MA area for several thousand users What he did not intend was that he also disrupted communications to the local airport and prevented incoming airplanes from communicating with the tower and from turning on the runway lights That could have obviously had very serious impacts on the safety of people using that airport He also had the effect of shutting down communications of local police and rescue services So even things that might seem relatively benign can have very serious impacts on our public safety The final category of individuals is probably the most common and that is the disgruntled insider an employee or former employee at a company who abuses his knowledge and access to a system to cause disruption by causing the system to crash because he is angry at his employer by stealing sensitive information and giving it to a competitor or altering information We have countless examples of these types of instances and that is probably the category that the private sector is most concerned about Fifty-five percent of respondents in a recent poll by the Computer Security Institute and the FBI said that they had insider problems insiders accessing their systems and doing bad things So there is an incredibly broad array of threats in the cyber area that we have to deal with and one of the difficulties in this area that distinguishes it qualitatively from the physical world is that when you first notice that you have an intrusion you do not know what you are dealing with You do not know if it is a disgruntled insider if it is an organized crime group if it is a terrorist a foreign intelligence agency or a nation state planting the seeds for future destructive attacks And as a result because you do not know how to deal with it in the government it is not clear who should have responsibility as Senator Bennett said because it is not clear what you are dealing with If we knew it were a nation state engaged in preparing the battlefield for an information warfare attack then clearly a military response might be called for But if we do not know that going in it is hard to assign responsibility In the Solar Sunrise case that I think all three of you alluded to from February 1998 it looked at first blush like it might be an instance of information warfare attack by the Iraqi government because we were deploying troops to the Gulf at the time and some of the attacks seemed to be coming through Internet service providers in the Gulf region Upon investigation however we determined that the intrusions were carried out by several teenagers two in California and several more in Israel So what looked like a possible information warfare attack ended up being recreational hackers who were hacking for the thrill of it As a result of that difficulty of knowing what you are dealing with who is doing it how are they getting in why are they doing it what systems are they affecting and where are they coming from the response that the Federal Government took in PDD 63 was to create an interagency center at the NIPC located at the FBI but with representatives from all of the agencies who have a role to play depending on what we determine we are confronting So we have representatives at senior levels at analytical levels and on the investigative side as well from the Department of Defense from the intelligence community from other Federal law enforcement agencies until recently from State and local law enforcement and eventually we hope to have representatives from the private sector brought in as well So as we investigate a case and can make determinations about who is doing what to us we can have quick hand-off to the appropriate agencies that have responsibility But the reason for putting the NIPC under the auspices of the FBI is because to make those determinations we need to gather information from the victim sites from some of the intermediate sites that might have been attacked on the way to the ultimate victim and the only way legally we can gather that information is pursuant to law enforcement investigative authorities or in some more narrow circumstances counterintelligence authorities if we know going in that this is a nation state-sponsored attack But once we gather that information using those legal authorities the ultimate response and the ultimate responsibility for dealing with it will depend on the facts and at that point other agencies would have a more direct role to play be it a military response a diplomatic response an intelligence response or a law enforcement response Let me just say finally since I have used up all my time and more that we are looking at Y2K as yet another example of how we need to coordinate particularly on the information sharing side Our responsibility at the NIPC is not to deal with service outages caused by the millennium bug and the inability of computers to recognize the date change Our focus is just as it is every day is on dealing with malicious criminal attacks intrusions or viruses that people use to attack systems We do not have any concrete information indicating that any foreign group or domestic group is planning on engaging in these sorts of attacks specifically around Y2K but we are preparing for that eventuality because of the distinct possibility that people might see as an opportunity to engage in those sorts of attacks So in our field offices across the country and here at FBI headquarters the NIPC is preparing a contingency plan to deal with those sorts of attacks and we have been communicating very closely with the rest of the Federal community with State and local governments and with the new Information Coordination Center at the White House which is dealing with the Y2K problem overall and focusing on sharing information about the state of critical systems during the rollover period That concludes my somewhat lengthier remarks that I had intended but I hope that gave you some insight into how we approach the problem Senator Kyl Thank you very much Mr Vatis The prepared statement of Mr Vatis follows PREPARED STATEMENT OF MICHAEL A VATIS INTRODUCTION Mr Chairman Senator Feinstein and Members of the Committee Thank you for inviting me here today to discuss critical infrastructure protection issues Mr Chairman you and this committee have been leaders in recognizing the importance of these issues and the urgency of addressing the new threats to our national security in the Information Age and I welcome this opportunity to share our perspectives with you today As you know the Federal Government is developing its capabilities for dealing with threats to our nation's infrastructures Presidential Decision Directive-63 set in motion an unprecedented effort to protect our nation's critical infrastructures which the PDD defined as those physical and cyber-based systems essential to the minimum operations of the economy and government '' Critical infrastructures include telecommunications energy banking and finance transportation water systems and emergency services both public and private The PDD formally designated the National Infrastructure Protection Center NIPC to have a central operational role in the government's effort The Center works closely with the National Coordinator for Security Infrastructure Protection and Counter-terrorism the Department of Defense DOD the U S Intelligence Community USIC other federal agencies and the private sector to protect our critical infrastructures My statement will cover the spectrum of threats we are facing and the status of the NIPC and its activities SPECTRUM OF THREATS The news media is filled with examples of intrusions into government and private sector computer networks Politically motivated hackers have been attacking numerous U S Government websites including the Senate's Deputy Secretary of Defense John Hamre reported in February that DOD is detecting 80 to 100 potential hacking events daily '' We have had several damaging computer viruses this year including the Melissa Macro Virus the Explore Zip Worm and the CIH Chernobyl Virus Computer Economics Inc a California firm estimates that damage in the first two quarters of 1999 from viruses has topped $7 billion The FBI's case load for computer hacking and network intrusion cases has doubled each of the last two years Currently we have over 800 pending investigations In its 1999 survey the Computer Security Institute estimated the total financial losses by the 163 businesses it surveyed from computer security breaches at $123 7 million This includes everything from theft of proprietary data to denial of service on networks E-commerce has become so important that firms including Sedgwick Group PLC in cooperation with IBM Lloyds of London and Network Risk Management Services are now offering hacker insurance '' Sensitive intrusions In the past few years we have seen a series of intrusions into numerous Department of Defense computer networks as well as networks of other federal agencies universities and private sector entities Intruders have successfully accessed U S Government networks and took large amounts of unclassified but sensitive information In investigating these cases the NIPC has been coordinating with FBI Field Offices the Department of Defense and other government agencies as circumstances require But it is important that the Congress and the American public understand the very real threat that we are facing in the cyber realm not just in the future but now Information warfare Perhaps the greatest potential threat to our national security is the prospect of information warfare'' by foreign militaries against our critical infrastructures We know that several foreign nations are already developing information warfare doctrine programs and capabilities for use against each other and the United States or other nations Foreign nations are developing information warfare programs because they see that they cannot defeat the United States in a headto-head military encounter and they believe that information operations are a way to strike at what they perceive as America's Achilles Heel-our reliance on information technology to control critical government and private sector systems For example two Chinese military officers recently published a book that called for the use of unconventional measures including the propagation of computer viruses to counterbalance the military power of the United States In addition during the recent conflict in Yugoslavia hackers sympathetic to Serbia electronically ping'' attacked NATO web servers And Russian as well as other individuals supporting the Serbs attacked websites in NATO countries including the United States using virus-infected e-mail and hacking attempts Over 100 entities in the United States received these e-mails Several British organizations lost files and databases These attacks did not cause any disruption of the military effort and the attacked entities quickly recovered But such attacks are portents of much more serious attacks that we can expect foreign adversaries to attempt in future conflicts Foreign intelligence services Foreign intelligence services have adapted to using cyber tools as part of their information gathering and espionage tradecraft In a case dubbed the Cuckoo's Egg '' between 1986 and 1989 a ring of West German hackers penetrated numerous military scientific and industry computers in the United States Western Europe and Japan stealing passwords programs and other information which they sold to the Soviet KGB Significantly this was over a decade ago--ancient history in Internet years While I cannot go into specifics about the situation today in an open hearing it is clear that foreign intelligence services increasingly view computer intrusions as a useful tool for acquiring sensitive U S government and private sector information Terrorists Terrorists are known to use information technology and the Internet to formulate plans raise funds spread propaganda and to communicate securely For example convicted terrorist Ramzi Yousef the mastermind of the World Trade Center bombing stored detailed plans to destroy United States airliners on encrypted files on his laptop computer Moreover some groups have already used cyber attacks to inflict damage on their enemies' information systems For example a group calling itself the Internet Black Tigers conducted a successful denial of service'' attack on servers of Sri Lankan government embassies Italian sympathizers of the Mexican Zapatista rebels attacked web pages of Mexican financial institutions And a Canadian government report indicates that the Irish Republican Army has considered the use of information operations against British interests We are also concerned that Aum Shinrikyo which launched the deadly Sarin gas attack in the Tokyo subway system could use its growing expertise in computer manufacturing and Internet technology to develop cyber terrorism'' weapons for use against Japanese and U S interests Thus while we have yet to see a significant instance of cyber terrorism'' with widespread disruption of critical infrastructures all of these facts portend the use of cyber attacks by terrorists to cause pain to targeted governments or civilian populations by disrupting critical systems Criminal groups We are also beginning to see the increased use of cyber intrusions by criminal groups who attack systems for purposes of monetary gain For example in 1994 the U S Secret Service uncovered a $50 million phone card scam that abused the accounts of AT T MCI and Sprint customers In addition in 1994-95 an organized crime group headquartered in St Petersburg Russia transferred $10 4 million from Citibank into accounts all over the world After surveillance and investigation by the FBI's New York field office all but $400 000 of the funds were recovered In another case Carlos Felipe Salgado Jr gained unauthorized access to several Internet Service Providers in California and stole 100 000 credit card numbers with a combined limit of over $1 billion The FBI arrested him in the San Francisco International Airport when he tried to sell the credit card numbers to a cooperating witness for $260 000 With the expansion of electronic commerce we expect to see an increase in hacking by organized crime as the new frontier for large-scale theft Just two weeks ago two members of a group dubbed the Phonemasters'' were sentenced after their conviction for theft and possession of unauthorized access devices 18 USC Sec 1029 and unauthorized access to a federal interest computer 18 USC Sec 1030 The Phonemasters'' are an international group of criminals who penetrated the computer systems of MCI Sprint AT T Equifax and even the FBI's National Crime Information Center NCIC Under judicially approved electronic surveillance orders the FBI's Dallas Field Office made use of new data intercept technology to monitor the calling activity and modem pulses of one of the suspects Calvin Cantrell Mr Cantrell downloaded thousands of Sprint calling card numbers which he sold to a Canadian individual who passed them on to someone in Ohio These numbers made their way to an individual in Switzerland and eventually ended up in the hands of organized crime groups in Italy Mr Cantrell was sentenced to two years as a result of his guilty plea while one of his associates Cory Lindsay was sentenced to 41 months The Phonemasters'' activities should serve as a wake up call for corporate security Their methods included dumpster diving'' to gather old phone books and technical manuals for systems They then used this information to trick employees into giving up their logon and password information The group then used this information to break into victim systems It is important to remember that often cyber crimes'' are facilitated by old fashioned guile such as calling employees and tricking them into giving up passwords Good cyber security'' practices must therefore address personnel security and social engineering'' in addition to instituting electronic security measures Virus writers Virus writers are posing an increasingly serious threat to networks and systems worldwide As noted above we have had several damaging computer viruses this year including the Melissa Macro Virus the Explore Zip worm and the CIH Chernobyl Virus The NIPC frequently sends out warnings regarding particularly dangerous viruses Earlier this year we reacted quickly to the spread of the Melissa Macro Virus While there are dozens of viruses released every day the speedy propagation of Melissa and its effects on networks caused us great concern Within hours of learning about the virus on Friday March 26 1999 we had coordinated with key cyber response components of DOD and the Computer Emergency Response Team CERT at CarnegieMellon University Our Watch operation went into 24-hour posture and sent out warning messages to federal agencies state and local law enforcement FBI Field Offices and the private sector Because the virus affected systems throughout the public we also took the unusual step of issuing a public warning through the FBI's Public Affairs Office and on our website These steps helped mitigate the damage by alerting computer users of the virus and of protective steps they could take On the investigative side the NIPC acted as a central point of contact for the Field Offices who worked leads on the case A tip received by the New Jersey State Police from America Online and their follow-up investigation with the FBI's Newark Field Office led to the April 1 1999 arrest of David L Smith Search warrants were executed in New Jersey by the New Jersey State Police and FBI Special Agents from the Newark Field Office Just in the last few weeks we have seen reports on the Suppl Word Macro virus the toadie exe virus and the W97M Thurs A or Thursday virus This last virus has already infected over 5 000 machines according to news reports and deletes files on victim's hard drives The payload of the virus is triggered on 12-13 and disables the macro virus protection in Word 97 We are also concerned with the propagation of a Trojan Horse called Back Orifice 2000 which allows malicious actors to monitor or tamper with computers undetected by the users Virus writers are not often broken out as a threat category and yet they often do more damage to networks than hackers do The prevalence of computer viruses reminds us that we all have to be very careful about the attachments we open and we all must be sure to keep our anti-virus software up-to-date Hactivism Recently we have seen a rise in what has been dubbed hacktivism''--politically motivated attacks on publicly accessible web pages or e-mail servers These groups and individuals overload email servers and hack into web sites to send a political message While these attacks generally have not altered operating systems or networks they still damage services and deny the public access to websites containing valuable information and infringe on others' right to communicate One such group is called the Electronic Disturbance Theater '' which promotes civil disobedience on-line in support of its political agenda regarding the Zapatista movement in Mexico and other issues This past spring they called for worldwide electronic civil disobedience and have taken what they term protest actions'' against White House and Department of Defense servers Supporters of Kevin Mitnick recently convicted of numerous computer security offenses hacked into the Senate webpage and defaced it in May and June of this past year The Internet has enabled new forms of political gathering and information sharing for those who want to advance social causes that is good for our democracy But illegal activities that disrupt email servers deface web-sites and prevent the public from accessing information on U S government and private sector web sites should be regarded as criminal acts that deny others their First Amendment rights to communicate rather than as an acceptable form of protest Recreational'' hackers Virtually every day we see a report about recreational hackers '' or crackers '' who crack into networks for the thrill of the challenge or for bragging rights in the hacker community While remote cracking once required a fair amount of skill or computer knowledge the recreational hacker can now download attack scripts and protocols from the World Wide Web and launch them against victim sites Thus while attack tools have become more sophisticated they have also become easier to use These types of hacks are very numerous and may appear on their face to be benign But they can have serious consequences A well-known example of this involved a juvenile who hacked into the NYNEX now Bell Atlantic telephone system that serviced the Worcester Massachusetts area using his personal computer and modem The hacker shut down telephone service to 600 customers in the local community The resulting disruption affected all local police and fire 911 services as well as the ability of incoming aircraft to activate the runway lights at the Worcester airport Telephone service was out at the airport tower for six hours The U S Secret Service investigation of this case also brought to light a vulnerability in 22 000 telephone switches nationwide that could be taken down with four keystrokes Because he was a juvenile however the hacker was sentenced to only two years probation and 250 hours of community service and was forced to forfeit the computer equipment used to hack into the phone system and reimburse the phone company for $5 000 This case demonstrated that an attack against our critical communications hubs can have cascading effects on several infrastructures In this case transportation emergency services and telecommunications were disrupted It also showed that widespread disruption could be caused by a single person from his or her home computer Insider threat The disgruntled insider is a principal source of computer crimes Insiders do not need a great deal of knowledge about computer intrusions because their knowledge of victim systems often allows them to gain unrestricted access to cause damage to the system or to steal system data The 1999 Computer Security Institute FBI report notes that 55 percent of respondents reported malicious activity by insiders There are many cases in the public domain involving disgruntled insiders For example Shakuntla Devi Singla used her insider knowledge and another employee's password and logon identification to delete data from a U S Coast Guard personnel database system It took 115 agency employees over 1 800 hours to recover and reenter the lost data Ms Singla was convicted and sentenced to five months in prison five months home detention and ordered to pay $35 000 in restitution In another case a former Forbes employee named George Parente hacked got into Forbes systems using another employee's password and login identification and crashed over half of Forbes' computer network servers and erased all of the data on each of the crashed services The data could not be restored The losses to Forbes were reportedly over $100 000 Identifying the intruder One major difficulty that distinguishes cyber threats from physical threats is determining who is attacking your system why how and from where This difficulty stems from the ease with which individuals can hide or disguise their tracks by manipulating logs and directing their attacks through networks in many countries before hitting their ultimate target The now well known Solar Sunrise'' case illustrates this point Solar Sunrise was a multi-agency investigation which occurred while the NIPC was being established of intrusions into more than 500 military civilian government and private sector computer systems in the United States during February and March 1998 The intrusions occurred during the build-up of United States military personnel in the Persian Gulf in response to tension with Iraq over United Nations weapons inspections The intruders penetrated at least 200 unclassified U S military computer systems including seven Air Force bases and four Navy installations Department of Energy National Laboratories NASA sites and university sites Agencies involved in the investigation included the FBI DOD NASA Defense Information Systems Agency AFOSI and the Department of Justice The timing of the intrusions and links to some Internet Service Providers in the Gulf region caused many to believe that Iraq was behind the intrusions The investigation however revealed that two juveniles in Cloverdale California and several individuals in Israel were the culprits Solar Sunrise thus demonstrated to the interagency community how difficult it is to identify an intruder until facts are gathered in an investigation and why assumptions cannot be made until sufficient facts are available It also vividly demonstrated the vulnerabilities that exist in our networks if these individuals were able to assume root access'' to DOD systems it is not difficult to imagine what hostile adversaries with greater skills and resources would be able to do Finally Solar Sunrise demonstrated the need for interagency coordination by the NIPC Special threat Y2K malicious activity The main concern with the Y2K rollover is of course the possibility of widespread service outages caused by the millennium date problem in older computer systems The President's Y2K Council has done an excellent job in helping the nation prepare for the rollover event Given our overall mission under PDD 63 the NIPC's role with regard to Y2K will be to maintain real-time awareness of intentional cyber threats or incidents that might take place around the transition to 2000 disseminate warnings to the appropriate government and private sector parties and coordinate the government's response to such incidents We are not responsible for dealing with system outages caused by the millennium bug Because of the possibility that there might be an increase in malicious activity around January 1 2000 we have formulated contingency plans both for NIPC Headquarters and the FBI Field Offices We are presently augmenting our existing relationships and information-sharing mechanisms with relevant entities in the federal government such as the Information Coordination Center ICC state and local governments private industry and the CERT FIRST community Information will come to us from a variety of places including FBI field offices and Legal Attaches overseas as well as the ICC FBI field offices are also tasked to establish Y2K plans for their regions of responsibility In essence all of the activities that we will undertake during the rollover period are ones we perform everyday The difference is that we will be prepared to conduct them at an increased tempo to deal with any incidents occurring during the Y2K rollover There is one potential problem associated with Y2K that causes us special concern--the possibility that malicious actors foreign or domestic could use the Y2K remediation process to install malicious code in the remediated'' software Thousands of companies across the United States and around the world are busy having their source code reviewed to ensure that they are Y2K compliant '' Those who are doing the Y2K remediation are almost always contractors who are given the status of a trusted insider with broad authority to review and make changes to the source code that runs information systems These contractors could undetected do any of the following to compromise systems Install Trap Doors By installing trap doors intruders can later gain access to a system through an opening that they have created and then exploit or attack the system Obtain Root Access'' Given their level of access remediation companies can gain the same extensive privileges as the system administrator allowing them to steal or alter information or engage in a denial of service'' attack on the system Implant Malicious Code By implanting malicious code someone could place a logic bomb or a time-delayed virus in a system that will later disrupt it A malicious actor could also implant a program to compromise passwords or other aspects of system security Map Systems By mapping systems as a trusted insider a contractor can gain valuable information to sell to economic competitors or even foreign intelligence agencies Systems can be compromised for any number of purposes including foreign intelligence activities information warfare industrial espionage terrorism or organized crime And since any vulnerabilities that are implanted will persist as long as the software is in place this is a problem that will last well beyond January 1 2000 Companies and government agencies therefore need to determine how they will deal with this potential Post-Y2K problem'' on their critical systems We have little concrete evidence so far of vendors' planting malicious code during remediation But the threat is such that companies should take every precaution possible Of course checking the remediation work to make sure that no malicious code was implanted in a system is no easy matter If reviewing the millions of lines of code at issue were simple there would be little need for Y2K contractors in the first place Nevertheless given the vulnerabilities that could be implanted in critical systems it is imperative that the client companies do as much as possible to check the background of the companies doing their remediation work oversee the remediation process closely and review new code as closely as possible and remove any extraneous code Further companies should test for trap doors and other known vulnerabilities to cracking Companies can also use red teams'' to try to crack the software and further determine if trap doors exist STATUS OF THE NIPC The NIPC is an interagency Center located at the FBI Created in 1998 the NIPC serves as the focal point for the government's efforts to warn of and respond to cyber intrusions In PDD-63 the President directed that the NIPC serve as a national critical infrastructure threat assessment warning vulnerability and law enforcement investigation and response entity '' The PDD further states that the mission of the NIPC will include providing timely warnings of intentional threats comprehensive analyses and law enforcement investigation and response '' Thus the PDD places the NIPC at the core of the government's warning investigation and response system for threats to or attacks on the nation's critical infrastructures The NIPC is the focal point for gathering information on threats to the infrastructures as well as facilitating and coordinating the Federal Government's response to an incident '' The PDD further specifies that the NIPC should include elements responsible for warning analysis computer investigation coordinating emergency response training outreach and development and application of technical tools '' The NIPC has a vital role in collecting and disseminating information from all relevant sources The PDD directs the NIPC to sanitize law enforcement and intelligence information for inclusion into analyses and reports that it will provide in appropriate form to relevant federal state and local agencies the relevant owners and operators of critical infrastructures and to any private sector information sharing and analysis entity '' The NIPC is also charged with issuing attack warnings or alerts to increases in threat condition to any private sector information sharing and analysis entity and to the owners and operators '' In order to perform its role the NIPC is continuing to establish a network of relationships with a wide range of entities in both the government and the private sector The PDD provides for this in several ways First it states that the Center will include representatives from the FBI U S Secret Service and other investigators experienced in computer crimes and infrastructure protection as well as representatives detailed from the Department of Defense Intelligence Community and Lead Agencies '' 1 Second pursuant to the PDD the NIPC has electronic links to the rest of the government in order to facilitate the sharing of information and the timely issuance of warnings Third the PDD directs all executive departments and agencies to share with the NIPC information about threats and warning of attacks and actual attacks on critical government and private sector infrastructures to the extent permitted by law '' By bringing other agencies directly into the Center and building direct communication linkages the Center provides a means of coordinating the government's cyber expertise and ensuring full sharing of information consistent with applicable laws and regulations -------------------------------------------------------------------------- 1 The Lead Agencies are Commerce for information and communications Treasury for banking and finance EPA for water supply Transportation for aviation highways mass transit pipelines rail and waterborne commerce Justice FBI for emergency law enforcement services Federal Emergency Management Agency for emergency fire service and continuity of government Health and Human Services for public health services The Lead Agencies for special functions are State for foreign affairs CIA for intelligence Defense for national defense and Justice FBI for law enforcement and internal security The NIPC is performing the lead agency and special functions roles specified for Justice FBI'' in the PDD --------------------------------------------------------------------------To accomplish its goals under the PDD the NIPC is organized into three sections The Computer Investigations and Operations Section CIOS is the operational and response arm of the Center It program manages computer intrusion investigations conducted by FBI Field Offices throughout the country provides subject matter experts equipment and technical support to cyber investigators in federal state and local government agencies involved in critical infrastructure protection and provides a cyber emergency response capability to help resolve a cyber incident The Analysis and Warning Section AWS serves as the indications and warning'' arm of the NIPC The AWS reviews numerous government and private sector databases media and other sources daily to disseminate information that is relevant to any aspect of NIPC's mission including the gathering of indications of a possible attack It provides analytical support during computer intrusion investigations performs analyses of infrastructure risks and threat trends and produces current analytic products for the national security and law enforcement communities the owners-operators of the critical infrastructures and the computer network managers who protect their systems It also distributes tactical warnings alerts and advisories to all the relevant partners informing them of exploited vulnerabilities and threats The Training Outreach and Strategy Section TOSS coordinates the training and continuing education of cyber investigators within the FBI Field Offices and other federal state and local law enforcement agencies It also coordinates our liaison with private sector companies state and local governments other government agencies and the FBI's Field Offices In addition this section manages our collection and cataloguing of information concerning key assets''--i e critical individual components within each infrastructure sector such as specific power grids telecommunications switch nodes or financial systems--across the country To facilitate our ability to investigate and respond to attacks the FBI has created the National Infrastructure Protection and Computer Intrusion NIPCI Program in the 56 FBI Field Offices across the country Under this program managed by the NIPC at FBIHQ NIPCI'' squads consisting of at least seven agents have been created in 10 Field Offices Washington D C New York San Francisco Chicago Dallas Los Angeles Atlanta Charlotte Boston and Seattle For fiscal year 2000 we intend to reallocate our existing field agent compliment to create six additional squads in Baltimore Houston Miami Newark New Orleans and San Diego Because of resource constraints the other field offices have only 1-5 agents dedicated to working NIPCIP matters The NIPC's mission clearly requires the involvement and expertise of many agencies other than the FBI This is why the NIPC though housed at the FBI is an interagency center that brings together personnel from all the relevant agencies In addition to our 79 FBI employees the NIPC currently has 28 representatives from DOD including the military services and component agencies the CIA DOE NASA the State Department as well as federal law enforcement including the U S Secret Service the U S Postal Service and until recently the Oregon State Police The NIPC is in the process of seeking additional representatives from State and local law enforcement But clearly we cannot rely on government personnel alone Much of the technical expertise needed for our mission resides in the private sector Accordingly we rely on contractors to provide technical and other assistance We are also in the process of arranging for private sector representatives to serve in the Center full time In particular the Attorney General and the Information Technology Association of America ITAA announced in April that the ITAA would detail personnel to the NIPC as part of a Cybercitizens Partnership'' between the government and the information technology IT industry Information technology industry representatives serving in the NIPC would enhance our technical expertise and our understanding of the information and communications infrastructure NIPC activities The NIPC's operations can be divided into three categories protection detection and response Protection Our role in protecting infrastructures against cyber intrusions is not to advise the private sector on what hardware or software to use or to act as their systems administrator Rather our role is to provide information about threats ongoing incidents and exploited vulnerabilities so that government and private sector system administrators can take the appropriate protective measures The NIPC is developing a variety of products to inform the private sector and other government agencies of threats including warnings alerts and advisories the Infrastructure Protection Digest Critical Infrastructure Developments CyberNotes and topical electronic reports These products are designed for tiered distribution to both government and private sector entities consistent with applicable law and the need to protect intelligence sources and methods and law enforcement investigations For example the Infrastructure Protection Digest is a quarterly publication providing analyses and information on critical infrastructure issues The Digest provides analytical insights into major trends and events affecting the nation's critical infrastructures It is usually published in both classified and unclassified formats and reaches national security and civilian government agency officials as well as infrastructure owners Critical Infrastructure Developments is distributed bi-weekly to private sector entities It contains analyses of recent trends incidents or events concerning critical infrastructure protection CyberNotes is another NIPC publication designed to provide security and information system professionals with timely information on cyber vulnerabilities hacker exploit scripts hacker trends virus information and critical infrastructure-related best practices It is published twice a month on our website and disseminated in hard copy to government and private sector audiences The NIPC in conjunction with the private sector has also developed an initiative called InfraGard'' to expand direct contacts with the private sector infrastructure owners and operators and to share information about cyber intrusions and exploited vulnerabilities with the goal of increasing protection of critical infrastructures The initiative encourages the exchange of information by government and private sector members through the formation of local InfraGard chapters within the jurisdiction of each of the 56 FBI Field Offices The initiative includes an intrusion alert network using encrypted email a secure website and local chapter activities A critical component of InfraGard is the ability of industry to provide information on intrusions to the NIPC and the local FBI Field Office using secure communications in both a detailed and a sanitized'' format The local FBI Field Offices can if appropriate use the detailed version to initiate an investigation while the NIPC can analyze that information in conjunction with law enforcement intelligence open source or other industry information to determine if the intrusion is part of a broader attack on numerous sites The NIPC can simultaneously use the sanitized version to inform other members of the intrusion without compromising the confidentiality of the reporting company InfraGard also provides us with a regular secure method of providing additional security related to information to the private sector based on information we obtained from law enforcement investigations and other sources InfraGard has recently been expanded to a total of 21 FBI Field Offices The program will be expanded to the rest of the country later this year Under PDD-63 the NIPC also serves as the U S governments Lead Agency'' for the Emergency Law Enforcement Services Sector As Sector Liaison for law enforcement the NIPC and a Sector Coordinator'' committee representing state and local law enforcement are formulating a plan to reduce the vulnerabilities of state and local law enforcement to cyber attack and are developing methods and procedures to share information within the sector The NIPC and the FBI Field Offices are also working with the State and local law enforcement agencies to raise awareness with regard to vulnerabilities in this sector Detection Given the ubiquitous vulnerabilities in existing Commercial Offthe-Shelf COTS software intrusions into critical systems are inevitable for the foreseeable future Thus detection of these intrusions is critical if the U S Government and critical infrastructure owners and operators are going to be able to respond To improve our detection capabilities we first need to ensure that we are fully collecting sharing and analyzing all extant information from all relevant sources It is often the case that intrusions can be discerned simply by collecting bits of information from various sources conversely if we don't collate these pieces of information for analysis we might not detect the intrusions at all Thus the NIPC's role in collecting information from all sources and performing analysis in itself aids the role of detection The NIPC is currently concentrating on developing and implementing reliable mechanisms for receiving processing analyzing and storing information provided by government and private sector entities This information is being used by NIPC analysts to develop tactical and strategic warning indicators of cyber threats and attacks The NIPC and North American Energy Reliability Council NERC have established an industry-based Electric Power Working Group to develop tactical warning indicators and information sharing procedures for the electric power sector The NIPC also has developed mechanisms to share cyber incident information with both government agencies and private companies in the telecommunications sector In the long-term our indications and warning efforts will require participation by the Intelligence Community DOD the sector lead agencies other government agencies federal State and local law enforcement and the private sector owners and operators of the infrastructures Another initiative that will aid in the detection of network intrusions is the Federal Intrusion Detection Network'' FIDNet'' a National Security Council initiative that would be managed by the General Services Administration Many agencies already have their own intrusion detection systems FIDNet will enhance agencies' cyber security by linking their intrusion detection systems together so that suspicious patterns of activity can be detected and alerts issued across agencies The goal of FIDNet is to detect intrusions in the federal civilian agencies' critical computer systems Contrary to recent press reports FIDNet will not extend to private sector systems To do this critical network event data will be captured and analyzed so that patterns can be established and in the event of an attack warnings issued FIDNet will be the civilian agency counterpart for the automated detection system currently deployed across Department of Defense systems FIDNet under current plans will consist of the following sensors at key network nodes a centrally managed GSA facility the Federal Intrusion Detection Analysis Center FIDAC to analyze the technical data from the nodes and secure storage and dissemination of collected information The NIPC will receive reports from the FIDAC when there is evidence of a possible federal crime such as a violation of 18 U S C Sec 1030 Using all-source information the Center would then analyze intrusions and other significant incidents to implement response efforts and support and inform national security decision-makers FIDNet-derived information would also be combined with all-source reporting available to the NIPC to produce analysis and warning products which will be distributed to government private sector companies and the public as appropriate Response The NIPC's and the FBI's role in response principally consists of investigating intrusions to identify the responsible party and issuing warnings to affected entities so that they can take appropriate protective steps As discussed earlier in the cyber world determining what is happening during a suspected intrusion is difficult particularly in the early stages An incident could be a system probe to find vulnerabilities or entry points an intrusion to steal or alter data or plant sniffers or malicious code or an attack to disrupt or deny service The cyber crime scene is totally different from a crime scene in the physical world in that it is dynamic--it grows contracts and can change shape Determining whether an intrusion is even occurring can often be difficult in the cyber world and usually a determination cannot be made until after an investigation is initiated In the physical world by contrast one can see instantly if a building has been bombed or an airliner brought down Further the tools used to perpetrate a cyber terrorist attack can be the same ones used for other cyber intrusions simple hacking foreign intelligence gathering organized crime activity to steal data etc making identification and attribution more difficult The perpetrators could be teenagers criminal hackers electronic protestors terrorists foreign intelligence services or foreign military In order to attribute an attack FBI Field Offices can gather information from within the United States using either criminal investigative or foreign counter-intelligence authorities depending on the circumstances This information is necessary not only to identify the perpetrator but also to determine the size and nature of the intrusion how many systems are affected what techniques are being used and what the purpose of the intrusions is--disruption espionage theft of money etc Relevant information also could come from the U S Intelligence Community if the attack is from a foreign source other U S government agency information state and local law enforcement private sector contacts the media other open sources or foreign law enforcement contacts The NIPC's role is to coordinate and collect this information On the warning side if we determine an intrusion is imminent or underway the Watch and Warning Unit is responsible for formulating warnings alerts or advisories and quickly disseminating them to all appropriate parties If we determine an attack is underway we can issue warnings using an array of mechanisms and send out sanitized and unsanitized warnings to the appropriate parties in the government and the private sector so they can take immediate protective steps The Center has issued 22 warnings alerts or advisories between January 4 and September 22 1999 Two other NIPC initiatives are directed to improving our response capabilities First to respond appropriately our field investigators need the proper training Training FBI and other agencies' investigators is critical if we hope to keep pace with the rapidly changing technology and be able to respond quickly and effectively to computer intrusions The NIPC has been very active in training These training efforts will help keep us at the cutting edge of law enforcement and national security in the 21st Century The Center provided training to 314 attendees in fiscal year 1998 In fiscal year 1999 over 383 FBI Agents state and local law enforcement representatives and representatives from other government agencies have taken FBI-sponsored courses on computer intrusions and network analysis the workings of the energy and telecommunications key assets and other relevant topics Second our Key Asset Initiative KAI facilitates response to threats and intrusion incidents by building liaison and communication links with the owners and operators of individual companies in the critical infrastructure sectors and enabling contingency planning The KAI began in the 1980's and focused on physical vulnerabilities to terrorism Under the NIPC the KAI has been reinvigorated and expanded to focus on cyber vulnerabilities as well The KAI initially will involve determining which assets are key within the jurisdiction of each FBI Field Office and obtaining 24-hour points of contact at each asset in cases of emergency Eventually if future resources permit the initiative will include the development of contingency plans to respond to attacks on each asset exercises to test response plans and modeling to determine the effects of an attack on particular assets FBI Field Offices will be responsible for developing a list of the assets within their respective jurisdictions while the NIPC will maintain the national database The KAI is being developed in coordination with DOD and other agencies CONCLUSION While the NIPC has accomplished much over the last year in building the first national-level operational capability to respond to cyber intrusions much work remains We have learned from cases that successful network investigation is highly dependent on expert investigators and analysts with state of the art equipment and training We have begun to build that capability both in the FBI Field Offices and at NIPC Headquarters but we have much work ahead if we are to build our resources and capability to keep pace with the changing technology and growing threat environment and be capable of responding to several major incidents at once We have also demonstrated how much can be accomplished when agencies work together share information and coordinate their activities as much as legally permissible But on this score too more can be done to achieve the interagency and public-private partnerships called for by PDD-63 We need to ensure that all relevant agencies are sharing information about threats and incidents with the NIPC and devoting personnel and other resources to the Center so that we can continue to build a truly interagency national'' center Finally we must work with Congress to make sure that policy makers understand the threats we face in the Information Age and what measures are necessary to secure our Nation against them I look forward to working with the Members and Staff of this Committee to address these vitally important issues Thank you Senator Kyl It is my understanding that with the exception of one paragraph the draft statement that had not previously been cleared is the statement that you have submitted for the record today is that right Mr Vatis What we brought this morning is the final statement yes sir Senator Kyl And that statement since Mr Vatis did not recount in detail all of the examples of things that had been dealt with or are being dealt with I might just reiterate just to highlight a couple one estimate of damage from the 80 to 100 events daily detected is in the first two quarters of 1999 a loss or damage from these viruses over $7 billion This is not a minor matter Then the other examples of foreign sources interfering with the Kosovo operation the foreign intelligence services with information sold to the Soviet KGB terrorist activity the criminal groups which you have mentioned the Phonemasters case which I mentioned and a variety of other situations but there was one item that I referred to from open source material I believe it was Newsweek magazine Can you say anything on the record about that particular ongoing event and can you identify it by its code name Mr Vatis The article called it Moonlight Maze and that is in fact our name for an investigation that we have been conducting for over a year into a series of widespread intrusions into Department of Defense other Federal Government agency and private sector computer networks About the furthest I can go is to say that the intrusions appear to originate in Russia We have been coordinating an investigation that has involved numerous Federal agencies as well as international counterparts but the intrusions have resulted in the taking of or the theft of unclassified and it is important to stress that it is unclassified but still sensitive information about essentially defense technical research matters Senator Kyl Thank you very much I think none of us underestimates the seriousness of the issue but I think it is important that hearings like this convey to the public as much information as can possibly be conveyed about the threat so that the public will be supportive of the efforts of the government and the private sector to deal with it and also so that they will appreciate the law enforcement tension that you identified and I am going to get more into that in a minute to try to put everybody's mind at ease with respect to how the investigations are proceeding and how privacy is being protected Mr Tritak let me ask you the PDD was issued back in May 1998 and I think the 180-day time frame which mandated that the plans be developed was probably unrealistic at the time But it has now been over a year and we still do not--well let me ask you A have plans been completed and B if not why not and C when we might expect that the initial operating capability which was supposed to be by November 2000 will in fact be achieved Mr Tritak Yes Senator Let me say that the plan is in its final stages of interagency review and clearance It is our strong hope that it will be issued later this month or early next month So I think recognizing that as you have indicated I think when the initial goal of 180 days was made the complexity of the task at hand perhaps was not quite as well appreciated as it became in the course of developing it But let me say a couple of words about that because I think it is important to understand that we are talking about rather an unprecedented process of engaging some 24 agencies in addressing an issue that everyone recognizes is important How one goes about it especially given budgetary realities is something that is open to serious consideration and debate sometimes very spirited debate I think that is a good thing because this is a big issue and you want the benefit of very careful thought given by a wide range of experts within the government on this matter Now when the plan does come out it is probably best to think of it as an invitation to a dialogue rather than a final product to be embraced and accepted thumbs up thumbs down That is mainly because the main focus of the national plan is on the Federal Government's efforts I think the rationale for taking this approach is if we are going to engage the private sector and ask them to support the efforts that are needed to protect our critical infrastructures the government has to show a level of seriousness in getting its own house in order So what you are going to see for the most part in the first version is the Federal Government's initial attempt at developing a plan that it will implement and pursue in the ends and goals of PDD 63 It is hoped that once this is issued it will be very quickly followed by a broader dialogue with private sector interest groups particularly in the privacy area but also members of Congress and their staffs because we cannot consider something to be a national plan without engaging the Nation in this dialogue It affects everyone importantly So in answer to your question it is coming out very soon and we are hoping that it will be again the later part of this month the early part of next month Senator Kyl Thank you This is not the time to be critical I really was simply focusing on the questions that Senator Feinstein raised at the end of her statement and I think we all want to work constructively toward the result I can remember former Senator Sam Nunn and I testifying about this and I have forgotten now when that was but clearly he has not been around for a while This has been going on for a long time and we have had to prod some people within the administration for quite a while to get going here Again I am not being critical of you or the people who are working hard on this As you point out it is a hard job But in view of the kind of threats that have been mentioned here I do not think we can say too often that we have got to get on with this and put these plans in place Just very quickly because I do not want to take any more time here you testified that this program would operate within legal requirements and government policy concerning privacy civil liberties and promoting confidence in users of the Federal civilian computer systems that neither the FBI nor other law enforcement entities would receive information about computer attacks and intrusions except under longstanding legal rules and where an agency determines there is sufficient indication of illegal conduct that private entities will not be wired to the FIDNet no private sector entity is a part of the civilian government program and that it will be run by GSA not the FBI It will not monitor any private networks or e-mail traffic and confer no new authorities on any government agencies and will be fully consistent with privacy law and practice right Mr Tritak Right Senator Kyl I think that is an important point to get across to folks that we are dealing with a very significant national security issue here and as Senator Bennett pointed out there will be times when it may be unclear to us but it moves into a law enforcement requirement but that in no event will any policies or rules be changed which obviously that is a concern of this committee because we understand that the U S Constitution would prevent any inhibitions on privacy rights in any event I just want to try to help put people's mind at ease that everyone is very cognizant of that the people in charge of putting the plan together some of the people in charge of oversight here and we will continue to keep our eye on that Senator Feinstein Senator Feinstein Thanks very much Mr Chairman Mr Vatis in your testimony you mentioned and Senator Kyl I think referred to it that the DOD has reported 80 to 100 hacker attempts every day Do you know how many of these attempts succeed Mr Vatis I do not have exact numbers Senator on how many succeed There is a whole range of effects of possible attacks Sometimes they are just pings that attempt to probe a system Sometimes they get in successfully but then do not do anything And sometimes they get in and then they do things such as remove information or---Senator Feinstein Then let me ask you the next question which you probably do know the answer to What kind of damage if any is occurring Mr Vatis In general Senator Feinstein Yes or as specific as you feel you can Mr Vatis It depends on the case Generally what we see is people looking around and sometimes taking information on the unclassified networks There have not been many instances where damage has been done to the systems The primary concern in most of these cases is with unauthorized illegitimate access to information that though unclassified is sensitive military information Senator Feinstein You said there have not been many occasions when significant damage has been done but has some damage been done Mr Vatis I am sure there are instances where somebody has done damage I do not have any specific recent examples to bring to you Senator Feinstein You mentioned Operation Moonlight Maze In that operation has there been any penetration of classified systems Mr Vatis I should not get into that area in this setting Senator Feinstein I would be interested perhaps in a classified setting if you might be able to indicate that I think those are key questions Senator Kyl Excuse me I might mention we had a briefing established yesterday by Dick Clark Senator Feinstein I could not attend Senator Kyl Well none of us could and therefore it was cancelled but we will do it We will reschedule it when everyone can attend and we will do that Senator Feinstein If we could discuss this in that briefing I think that would be---Senator Bennett If I may Senator we have had a briefing on that in the Y2K Committee I agree with the witness these are classified matters but I agree with you in pursuing them because they are very important Senator Feinstein I was recently told that there are certain computer software available for free on the Internet that allows a person to install what amounts to an undetectable trap door on another person's computer As long as that computer remains hooked up to the Internet the hacker can then read the target's e-mails see every password move the mouse erase files from the computer and even shut it down all without detection or recourse I understand that some of the software is commercially available and beneficial for internal company use but it also seems to me that some people are clearly trying to teach people how to infiltrate outside computers and do some real harm Are you aware of this kind of software Mr Vatis Yes we are There are several instances of that One recent piece of software that fit that description is something called Back Orifice 2000 which was released at the recent DeathCom hackers' conference in Las Vegas which permits an external user to gain unauthorized access and do things to another person's system along the lines that you mentioned This is something we are aware of We have actually issued several advisories to both government agencies and the private sector about that particular tool But these types of tools hacking tools pop up daily and there are new tools I am sure you will hear from Rich Pathea about more specifics on those types of things But the one you mentioned if I think that is the one you are referring to is one we are very well aware of and have issued warnings on Senator Feinstein Are there any commercial systems available that can pierce classified systems Mr Vatis The protection of the classified systems is mainly a matter of controlling the access It is not that they are impenetrable per se Beyond that I really do not want to get into that area of the classified systems Senator Feinstein If this could be another area Mr Chairman that we could discuss because there is--and you and I have both been involved in the encryption area and there is this strong feeling in the industry about protecting privacy with which I think we both agree Now here we are with systems commercially being devised to pierce that and to sabotage that very same privacy and put these on the open market I think that raises a very real question that what would be appropriate regulation by the government if any of systems that pierce the privacy and really can sabotage a system Do you have any suggestions as to what can be done to ensure that teenage hackers or others do not simply leave such trap doors or computer programs on the computers they penetrate Mr Vatis A lot of the security measures that we would recommend are really rather basic and it is a question of devoting sufficient resources and attention to those basic security measures Careful perimeter security design of a network augmented by careful personnel security policies because oftentimes the beginning of a successful intrusion is social engineering and getting passwords or log-in information by calling up a user and pretending to be someone who forgot his password for instance The use of smart cards and tokens one-time passwords would also be a successful way to implement security and updating virus detection software and also implementing the latest patches that are made available are all basic security practices that are too often neglected Senator Feinstein Are those protections in place in all I will not use the word highly secure systems but all key government systems today Mr Vatis Basic security policies are in place across the government to effect that sort of security Where the breakdown sometimes occurs is in the implementation The Solar Sunrise case is another good example of that The vulnerabilities that the teenagers took advantage of were ones that were known throughout the network community the system administrator community and in fact patches were available to fix those vulnerabilities The problem was that the patches had not been implemented across the DOD systems So the policies exist but it is the implementation that is the difficult part Senator Feinstein What about the private systems airlines railroads telephones power systems Mr Vatis The difficulty there as Mr Tritak referred to is that these are privately owned systems over which the government has very little directive authority or regulatory authority Much of the private sector is beginning to pay more attention to security and the need to have good security practices to spend money on effective security because they are beginning to see that poor security will have a deleterious impact on the bottom line But it is still a problem in the rest of the private sector of getting the decision makers the corporate decision makers to focus enough attention and resources on that type of security Senator Feinstein Let me ask this question Of these kinds of systems and I am speaking about the big systems what would you say the level today of vulnerability is low vulnerability medium vulnerability or high vulnerability Mr Vatis As a general matter I would have to say it is high I think there are significant vulnerabilities in these critical systems that not only can be taken advantage of but are being taken advantage of We have not seen what some people have referred to as the electronic Pearl Harbor where somebody has used those vulnerabilities to engage in a massive destructive attack But just the examples that we have discussed this morning should be sufficient to indicate to people and to demonstrate that these significant vulnerabilities do exist If teenagers can gain the type of access to the types of systems that we have seen just in the last couple of years those instances in themselves should demonstrate the level of vulnerability Senator Feinstein We had one situation in San Francisco at a PG E it seemed to me plant where everything got shut down So what you are saying is in the private sector in terms of the civilian infrastructure today there is a very high vulnerability and that the private sector has not responded significantly to use available technology to quell that vulnerability Mr Vatis It is a mixed bag but I think in general when we are talking about those critical infrastructures there are significant vulnerabilities that do exist and that is one of the reasons that we have been trying to engage in information sharing about the vulnerabilities about the threats to make people aware in the private sector of where the vulnerabilities lie what types they are and also what the threats are that might take advantage of those vulnerabilities But again we should not act as though the private sector does not have its act together but the government does because I think as Mr Tritak said and as the next panel will get into there are also significant vulnerabilities in the government So I think the Nation as a whole both the private sector and the public sector needs to face up to this and deal with these vulnerabilities Senator Feinstein Thanks very much Mr Chairman Senator Kyl Thank you I think particularly important is the fact you brought out that the efforts here are not invasive of privacy but rather are important in order to protect people's privacy That is very important Senator Bennett Senator Bennett Thank you Mr Chairman In July you both testified before the Y2K Committee and there were no clear answers as to what cyber reconstitution was We talked about that at that time Can you tell me now in the case of either a Y2K failure or an IW event where there is an actual attack to try to shut something down how the United States would facilitate cyber reconstitution in other words bring a system back up This is for either one Mr Vatis I think my answer would still be the same as in July which is that reconstitution of private systems at least for the first part of the answer the responsibility resides first and foremost with the private sector but the assistance to the private sector is the responsibility of the lead agency under PDD 63 to provide the expertise and any assistance that we can offer Then the consequence management for disruption providing emergency generators for instance in the event of an attack on the electrical power system would be the responsibility of FEMA Senator Bennett Yes Well the FEMA example is the obvious one You have a disaster whether it is a tornado in Salt Lake City or an earthquake in California or a hurricane off the coast of Florida and here is a government agency that steps in after the fact to try to help rebuild the essential infrastructure I just asked the question in order to keep the issue alive recognizing that we do not have those kinds of answers but we need to keep focusing on this because if somebody does succeed in shutting us down we ought to have some sort of electronic FEMA in place that can say all right we were not able to prevent it but we can reconstitute the service relatively quickly Senator Feinstein talked in terms of success Just a quick editorial comment My concern and that is shared by a lot of the folks with whom I have spoken over this particular odyssey has to do with people who get in undetected Success is when you can stop it at some level But is there a level where people have gotten in gotten the information they want and gotten out without our knowing it Not to sound like a Tom Clancy novel but the last one I read that described how a Russian submarine had tracked an American submarine without the Americans realizing it I think there is some indication that there may be some of that that not necessarily the teenage hackers but nation states have gotten into our computers gotten the information they were looking for and left and most frighteningly maybe left behind a trap door that would allow them to do that undetected wherever they are I make that point simply to underscore once again we are living in a new world We are living where there is no sanctuary We are not hiding behind our oceans Our potential enemies are indeed in our bowels if you will and it becomes very important for us to just start thinking that way as we look for remediation It is my experience that when you talk to people in industry about this issue you get the same kind of response we initially got with respect to Y2K That is hey it is not really a problem and our IT people will handle it and it will all go away We will get it under control It was not until we got the attention of the CEO as well as the CIO that we got significant progress in industry When I talk to industry leaders they all say oh we have firewalls We have spent the money We have firewalls My sense is that these firewalls have never really been tested the way the firewalls of the Defense Department for example have been tested The Defense Department is a whole lot harder than a lot of people realize I have now spent enough time going around to Defense Department installations to discover that But I am not sure how hard some of the private institutions are Do either of you have a sense of how effective the firewalls are in private industry compared to the government Mr Vatis I think it varies tremendously whether they even have firewalls first of all and second of all how good the firewalls are and then third whether the firewall and other security measures are actually implemented properly But no firewall is impenetrable and I think sometimes people have a false sense of security As you indicated merely from the fact that their IT guys assure them that they have a firewall they think as a result that they are totally secure and that is a false sense of security Senator Bennett I do not want to get across the line into classified information but let me posit this as a hypothetical Suppose a U S Government red team were formed and offered to make an attempt to get into certain industry areas just as an exercise How do you think industry officials would react to that Mr Vatis I think some of them would actually welcome that kind of assistance in testing their systems and others might be averse to it because they would not want to know the answer Senator Bennett How about government agencies outside of the Defense Department Say for example the Department of Energy that has responsibility for our nuclear weapons was told OK that is wonderful that you have all of these protections Now we are going to try to penetrate you Do you think the Secretary of Energy should cooperate with that effort Mr Vatis Absolutely I think red-teaming is an important part of any set of security measures because the only way to know whether your security measures are adequate is to test them So I think that is a critical thing Senator Bennett Thank you Mr Chairman Senator Kyl Thank you Senator Feinstein Senator Feinstein Let me just thank you for being up-front and forthright with this I think it is really important and I appreciate the fact that you speak directly It is my understanding that at least 22 of the largest Federal agencies have significant computer weaknesses either because they do not know how to fix the problem or because they do not realize the problem exists The GAO report gives some examples In May 1999 NASA computer-based controls were successfully penetrated on several mission-critical systems In August 1999 serious weaknesses in DOD's information security continued to provide both hackers and hundreds of thousands of authorized users the opportunity to modify steal inappropriately disclose and destroy sensitive DOD data I mean that is a month ago In July 1999 GAO reported the Department of Agriculture's national finance center had serious access control weaknesses And in October 1999 which is now we report that the Department of Veterans Affairs systems continue to be vulnerable to unauthorized access and they point out one VA insurance center 265 users who had not been authorized access had the ability to read write and delete information related to insurance awards Have these been remedied These 22 agencies have their weaknesses been remedied Mr Vatis I do not know the answer to that question Senator Feinstein Mr Tritak Mr Tritak I do not know the answer to that question either Senator Feinstein Our next panelist does Good Perhaps they can answer it I look forward to it Maybe that is a good segue Senator Kyl Thank you very much We would really appreciate your responses because as we have mentioned here this will be just one in a continuum of hearings We obviously will want to get a report about the timing on the completion of the plans and on the operations capability and time frames We will want to have you come back and report that to us I am looking forward Mr Vatis to perhaps even getting into just two or three specific kinds of cases one attack on our defense or security infrastructure one financial attack to steal money and then perhaps another one either an insider attack or a terrorist kind of attack I think it would be very interesting to have you get into detail about--just take two or three or four case studies and walk through them and talk about the three or four different kinds of intrusion that can take place and how it does without getting into too much how-to obviously I believe that as Senator Bennett said this does sound a little bit like Tom Clancy but it is a reality and people are fascinated by it If they can come to be fascinated by it they can come to be concerned about it and then we can help Mr Tritak and others get their job done on a timely basis I thank both of you for being here very much and would like to call the next witness now Jack Brock We will get started and if we have to be interrupted we will but I would at least like to begin the testimony Mr Brock as I said is with GAO He is the Director of the Government-Wide and Defense Information Systems Accounting and Information Management Division and will testify specifically to what GAO has found with respect to government vulnerabilities and hope to be able to answer the questions that Senator Feinstein got into Senator Feinstein I did not mean to jump his testimony STATEMENT OF JACK L BROCK JR DIRECTOR GOVERNMENT-WIDE AND DEFENSE INFORMATION SYSTEMS ACCOUNTING AND INFORMATION MANAGEMENT DIVISION U S GENERAL ACCOUNTING OFFICE WASHINGTON DC ACCOMPANIED BY JEAN L BOLTZ Mr Brock I hope so With your permission Mr Chairman I would like to have Ms Boltz---Senator Kyl We welcome Jean Boltz on the panel as well Mr Brock Thank you Senator Kyl Thank you Go ahead Mr Brock I appreciate very much Ms Feinstein your summarizing the most interesting part of my statement and you did it very effectively I think the first two witnesses as well as the opening statements Mr Chairman of you and Ms Feinstein and Senator Bennett very effectively talked about that there is a real threat that there are real opportunities with connectivity and that these opportunities are wonderful They offer incredible advances in the way we do business the way we communicate and the future opportunities are even greater and we do not want to lose that advantage Almost ironically though these same opportunities offer new ways of disrupting the national infrastructure and that is what the purpose of your hearing is today I want to focus primarily on the Federal portion of that We have reported that 22 of the largest Federal agencies have significant weaknesses and our statement details several examples We could have gone on page after page after page of examples were it NASA at VA at although we did not list it in here the Financial Management Service the Department of Agriculture agencies that have billion dollar portfolios agencies that protect the national defense we have broken into In breaking into these agencies and doing our penetration testing we could have done severe damage to the systems we could have done severe damage to the information that was contained in those systems and we could have denied access by the agencies to that information We obviously did not do so but the risk is there The vulnerabilities are there To get to your point and I will just answer your question now have the agencies repaired these holes Yes and no At the individual problem level they have taken immediate action All of them have been very responsive However it is like having a bad roof on your house and you are continually having leaks and you put up a shingle here and a shingle there and pretty soon you have sort of shingled over the house but you are still having the leaks These agencies need a whole new roof It is not just a question of fixing the vulnerabilities we find When we go back to agencies--at DOD we were there 2 years ago We just issued our second report last month At VA we were there a couple of years ago We just issued our report These agencies had taken good strides in fixing the vulnerabilities we identified before but there were new vulnerabilities that cropped up We believe that at many agencies computer security is a bottoms-up type of affair that the real problem needs to be owned as Senator Bennett said by the top management and if top management does not own the problem if they do not provide the resources if they do not assign the accountability then computer security is more likely a catch-as-catch-can affair We have been looking at computer security for several years and we find the same problem every time--poor access controls poor system controls poor management controls and we were just beginning to repeat ourselves A couple years ago we started work on what we called best practices or leading practices where we went to a number of organizations that had good computer security programs and almost uniformly these organizations had one a central point of control someone that was clearly accountable for information security That person was always accountable to the chief executive officer or the chief operating officer There was a real assessment of the risk that that organization faced in terms of defining threats vulnerabilities and the value of the information that the organization had These organizations then developed policies and procedures and processes that allowed them to be responsive to those risks Next they made people well aware of what their roles and responsibilities were and made sure that those were accountable for monitoring and maintaining control over the processes and applying them And then lastly there was independent assessment of the organization's performance and this is a continuous cycle It is not a one-time thing that stops It goes on and on and on We think that if agencies did this that in fact they could eliminate many of the weaknesses that they have right now Our report has been endorsed by the CIO Council It has been endorsed by many individual agencies I think the level of effort though goes to endorsement and we have not seen a lot of real positive action on implementing the broad management reforms that need to take place I would like to talk a little bit though about PDD 63 and the current environment that is going on We see this as a real opportunity that there is now a discussion at a national level about issues that could have a significant impact a positive impact on the ability not only of Federal agencies but also the ability of the entire infrastructure to provide better assurance that vulnerabilities will be closed up We have identified seven topics though that we think need to be addressed in the discussion in order for things to move forward First of all is clearly defined roles and responsibilities Under the current law there are a lot of agencies that have some set of responsibilities and duties It is not always clear what these are and it is not always clear that they are being implemented PDD 63 has also introduced a number of new organizations and many of these organizations and processes are immature and have not found their way yet So it is unclear how they are going to relate and interrelate and it is unclear about what sort of impact they can have on agencies and on the private infrastructure So it is important that as the debate unfolds that roles and responsibilities be clearly defined that authorities and accountability be clearly defined Second we see a need for specific risk-based standards Right now most of the guidance is very general For example NIST issues guidance saying that users should be authenticated Well that can mean anything from a four-digit password to your thumbprint We believe that agencies need more specific guidance on how to identify risk how to categorize these risks and then have standards that are tailored to addressing these risks We think there should be routine evaluations of agency performance that we need to measure If you cannot measure what you are doing if you cannot report on the success the failures the opportunities missed the opportunities gained then it is really impossible to see what the lessons learned and what you need to do The CFO Act is a good example of this where there are now independent audits of agencies' financial statements and as a result of that agencies have made incredible strides in improving their financial management operations over the past 5 years We think similar opportunities exist with computer security Next executive branch and Congressional oversight Senator Bennett has been instrumental in the Senate in terms of providing very rigorous oversight over Y2K issues Just as importantly though most of the individual committees that have oversight over individual agencies have also had hearings and not just one hearing but multiple hearings The same thing is true on the House side The same thing is true in the executive branch where the oversight over Y2K has been notably more rigorous than it has been on computer security issues As a result of this many of the hurdles have been overcome by the constant pressure of the spotlight being shone on the issue identification of things that need to be done and solutions reached So a continuation of that type of executive branch and Congressional oversight and leadership is important in this area as well The next area is adequate technical expertise If you do not have the right kind of people you are not going to come up with the right kind of solutions and this is a problem We have an executive council of independent CIO's in the private sector They are telling us that a system administrator that is well qualified can make about $150 000 in the private sector That is not true in the public sector There is inadequate training There are just not enough people sometimes to go around If this problem is not addressed then regardless of the policies and procedures and the good work that goes into it if you do not have the technical resources to carry it out you still will not be able to reach success The next area is adequate funding The most positive response we got to our publication last week on critical infrastructure protection comprehensive strategy control and year 2000 experiences we pointed out in that report that there was funding for Y2K fixes that the funding was made available not only with the agencies directly in their budgets but also in the emergency supplemental fund that there was a relatively good assurance that the funds would be available That is not always true on computer security On the other hand because of the relatively low level of some agencies in terms of their abilities to effectively deal with the problem you do not also want to paper it over with money You need to make sure that if agencies have more funds that they are also prepared to spend them wisely Incident response and coordination and again talking about the Federal Government there is no real requirement to report incidents As a real matter within some agencies we find that even within the agency they do not report incidents if they are aware of it Certainly agencies are not uniformly reporting them to FedCIRC housed at GSA and as a result opportunities are missed to learn from what agencies are experiencing opportunities within the agency and opportunities among the agencies We think that if these seven issues come up for serious discussion and resolution during the discussion of the national plan and then placed on top of a renewed infrastructure within the agencies that solutions are available to improve computer security within the government There is no panacea There is no magic bullet There is no assurance that problems will be completely eliminated but we think there is lots of opportunity for improvement Mr Chairman that concludes my statement and Ms Boltz and I would be happy to answer any questions you might have Senator Kyl Thank you There are other important hearings going on today but I think what you have said here while I know it has been in the public domain before maybe has not been focused on and I think it is important that I repeat just a little bit of it and have you comment on it You are basically saying that through your audits the GAO audits you found that our government--I am quoting now-- is not adequately protecting critical Federal operations and assets from computer-based attacks '' You go on to say that the audits show that 22 of the largest Federal agencies have significant computer security weaknesses right Mr Brock That is correct Senator Kyl You further say that reports issued over the last 5 years describe persistent computer security weaknesses that place Federal operations such as national defense law enforcement air traffic control and benefit payments at risk of disruption as well as fraud and inappropriate disbursements I think is the word or disclosures Mr Brock Yes sir Senator Kyl Specific incidents you mention just this year you successfully penetrated several mission-critical systems of NASA Just in August of this year you reported weaknesses in DOD's system that provide people the opportunity to modify steal inappropriately disclose or destroy sensitive DOD data You talked about the fact that DOD functions including weapons and supercomputer research as well as others have already been adversely affected by system attacks or fraud Mr Brock That is correct Senator Kyl See those are very important disclosures that are important for the public to appreciate and I do not believe that the message has gotten out yet I am told that you have to repeat something 6 times before it takes hold Maybe that is true in the Senate I am not sure about the public generally But I think it is important that the results of this GAO work be conveyed to the public in order to help generate the support for the financial systems that is needed as well as the other reforms that you pointed out can be accomplished Let me ask you whether you can say whether in these attacks by GAO you were able to gain access to classified information Mr Brock We were focusing our penetration test on sensitive but unclassified systems Senator Kyl OK Mr Brock The last thing I ever want to see is a headline in the morning saying GAO Brings Down Critical Systems '' Senator Kyl Yes Why has it taken so long for PDD 63 to get off the ground You mentioned that there has been no real action on the broad reforms that are necessary and we heard testimony earlier that you heard about the delays of well over a year in getting this plan off the ground Why is it taking so long Mr Brock I think there are a couple of reasons First of all let me say that I think the concept behind PDD-63 is long overdue However you are starting from an environment where there was not a lot of consensus over what needed to be done and how it should be done and I think that part of the delay has been in building that consensus I think part of the delay as well is one of the requirements of PDD 63 is for each of the agencies to develop a plan It has taken a long time to develop those plans and it is taking a long time to get them in the kind of shape because they are also starting from ground zero So part of it is trying to bring some people together that may have some different agendas I think that is important to do that Part of it I am sure is logistics and part of it has been I believe the inability of some agencies to respond with the kind of material that was required by PDD 63 Senator Kyl Let me add just two more things First of all this subcommittee will continue to explore in particular any legislative action that might be necessary We can generate that as an ongoing committee of the Senate The Y2K Committee of course does not do that but they point out problems and then we can take it from there So we will continue to focus on that and if there are any legislative suggestions that you want to bring to our attention that become apparent or the need for which becomes apparent as a result of your auditing I hope you will just consider this an open request to do that But second I am going to quote one statement you conclude your statement with that weaknesses continue to surface because agencies have not implemented a management framework for overseeing information security on an agency-wide and ongoing basis Because of that I am going to recommend to the chairman of the Government Operations Committee which would have a different kind of oversight jurisdiction to review your audits very carefully prioritize them in some way to identify those that seem most behind and to begin bringing them in agency by agency to ask very specific and very hard questions using the information from your audits to bring to light some of the deficiencies Obviously the goal here is not to point fingers but as you pointed out to get on with the fixes that have to be put into place Do you have any other comment about what we could do to help advance this all in addition of course to helping to provide the resources that you identified earlier Mr Brock I think the constant spotlight the questions the suggestion you had for the committee to bring the individual agencies up I mean that imposes a level of accountability that forces action It forces the top management within those agencies to say here is an issue that Congress is interested in I need to elevate my own interest As I said that was very successful in Y2K and I think it can be successful in computer security as well Senator Kyl Whether we do that in this subcommittee or if another full committee takes that oversight we will expect to maybe check back with you in a few months maybe sometime midyear next year and have you give an honest straightforward unvarnished evaluation of how our government agencies are doing Mr Brock We will do so sir Senator Kyl Thank you Senator Feinstein Senator Feinstein Thanks Mr Chairman You know Mr Brock first of all again your report is very straightforward and I appreciate that very much But we have all heard the same adage you cannot squeeze blood out of a turnip In many respects the Federal Government is a turnip in this respect You pointed out the differential in salaries The private sector goes out they get the most experienced personnel their cutting-edge software all the rest I question whether we really have the expertise to do what is necessary I read your conclusions and your suggestions in your report but the one thing where this is really lacking is how do you get that kind of cutting-edge technical knowledge that departments can go to and say here I know we have a problem Do something about it It seems to me we lack that Now whether it can be contracted out for in the private sector whether the government has to put together some specific area and really bring together the brightest and the best across the nation to do this I do not know But it seems to me that you can go to someone and say look you have got a big problem and they can look at it and they may not even know how to remedy it or even have the people that can make the suggestions that were adequate You spoke about a new roof I do not think you are going to get a new roof unless we can reach out in an unprecedented way Mr Brock I agree with you Senator There are sort of two aspects of that One of the things that I believe that the national plan is contemplating on proposing are initiatives in terms of increasing skills and abilities sponsoring more research and development in the area training people providing opportunities People have been looking at salary differentials and ways of addressing that So looking at ways of bringing on skills either by improving the skills on board or attracting new people that is one issue Contracting out under proper controls is an issue Many of the weaknesses that we identified though are almost no cost When we go into agencies for example--and these are real examples--and we find the schematic for their network topology on the website and we find on another website an open discussion of the weaknesses they have over some of their controls it is like a bank saying here is our building plan and here is our guard schedule and here are the guards that have bullets and here are the guards that do not I mean there are some basics like that that just require basic attention The other big area that is really again very basic is that many of our penetration tests are done through password guessing We have these programs that just generate password after password after password and people are very lax in changing their passwords They use overly simplistic passwords This is one of the reasons we were calling for different standards for risk For some types of information a simple four- or five- or six-digit password probably is not enough You need another level of protection So there are a lot of basic things and some agencies have made remarkable progress in terms of addressing this within more of a comprehensive management perspective where they are improving their information management across the board For example when we have looked at controls at the Federal Reserve they are very well done They also have a very good Y2K program They also have a very good information management program We have had some negative reports about IRS and its computer security Recent reports have indicated they have been making real progress and also and I do not think it is coincidental we have also noted that they made real progress in the way they manage their big systems development efforts as well So management attention is the most critical factor but I would agree with you that providing the availability of resources is a thorny issue and it may be one of these areas Mr Chairman where some sort of legislative alternatives may need to be looked at Senator Feinstein In your report you mention that the examples that I mentioned and Senator Kyl went over more thoroughly are just examples of weaknesses I would like to ask for the full list of weaknesses that you found Then second I would like to ask you to go back in one month and repeat this and see if those weaknesses have been remedied I will bet you they have not I will bet you 25 cents they have not That will be my request and I will put that in writing to you as well But I would like to see the full list rather than just the examples if I might of the 22 departments Mr Brock OK We can provide you with an overview of each of the 22 and details to support them as well Senator Feinstein Thank you very much Thanks Mr Chairman Senator Kyl Senator Feinstein by the way I will see your bet and raise you but we will not convey it on the Internet How is that Senator Feinstein All right Senator Kyl We probably should consider writing a letter to the President and perhaps the Director of the OMB to encourage them as they begin thinking about the new budget that they will be preparing for submission to the Congress next year that they be very alert to the requests of the different agencies for the financial resources to accomplish all of these objectives so that it is not a matter of after the fact that they are all focusing on their needs early on they put those needs down and the President is fully cognizant of them when he submits his budget to us Senator Feinstein May I make one suggestion Senator Kyl Absolutely Senator Feinstein The prior speakers brought out that there was no requirement to report incidents There should be a requirement to report incidents Senator Kyl Mr Brock you alluded to that as well Do these agencies just not have an interagency protocol Mr Brock It is really unclear to me whether it is a matter of choice that they do not report or just a simple matter of omission But most of them or many of them do not report incidents Jean do you have anything to add to that Ms Boltz Yes In many cases there is really not a commonly accepted definition of what an incident is It can be just a probe it can be an attack an actual intrusion which may or may not cause damage So there are really no rules about what to report to whom and to when Senator Kyl I agree with Senator Feinstein This is the kind of thing where there has got to be a consistent policy and if it cannot be done through the plan--I think the first thing would be to see if we can get them to put that in the plan for sure If not then legislation would be perhaps appropriate But as Senator Bennett has pointed out before come January 1 who is to know what it is The computer goes down Well was it because of Y2K Was it because somebody was taking advantage of Y2K Was it because there is just an effort to disrupt or maybe was that the result of something more intrusive So you cannot know for sure and that is why what I think Senator Feinstein's point is all of these incidents need to be reported and then we can sort out later what the problem is Senator Feinstein Could we write a letter formally from us to Mr Tritak and ask that this be included in the plan Senator Kyl I think that is a good suggestion Senator Feinstein And we could put some specifics into that request Senator Kyl And we might even call upon Mr Brock and Ms Boltz to help us formulate that Senator Feinstein Yes Senator Kyl I really appreciate your being here today The prepared statement of Mr Brock follows GRAPHIC TIFF OMITTED T8563 001 GRAPHIC TIFF OMITTED T8563 002 GRAPHIC TIFF OMITTED T8563 003 GRAPHIC TIFF OMITTED T8563 004 GRAPHIC TIFF OMITTED T8563 005 GRAPHIC TIFF OMITTED T8563 006 GRAPHIC TIFF OMITTED T8563 007 GRAPHIC TIFF OMITTED T8563 008 GRAPHIC TIFF OMITTED T8563 009 GRAPHIC TIFF OMITTED T8563 010 GRAPHIC TIFF OMITTED T8563 011 GRAPHIC TIFF OMITTED T8563 012 Senator Kyl I also want to note that Mr Richard Schaeffer Director of Infrastructure and Information Assurance Office of the Assistant Secretary of Defense has submitted a written statement which will be included in the record His statement comments on DOD's role and responsibility relative to the PDD 63 and the national plan The prepared statement of Mr Schaeffer follows PREPARED STATEMENT OF RICHARD C SCHAEFFER JR DIRECTOR INFRASTRUCTURE AND INFORMATION ASSURANCE OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE INTRODUCTION Information Superiority is essential to our capability to meet the challenges of the 21st Century It is a key enabler of Joint Vision 2010 and its four fundamental operational concepts of dominant maneuver precision engagement full dimensional protection and focused logistics This is because each of these concepts demands that we obtain process distribute and protect critical information in a timely manner while preventing our adversaries from doing the same Without Information Superiority we will very simply not be able to achieve the goals established by the Department in Joint Vision 2010 Information technology has provided us with a means to gain a military advantage over our adversaries while actually reducing our force structure These technologies have made precision strike and focused logistics possible They allow us to attack targets surgically with fewer munitions albeit more expensive ones and manage our logistics requirements more efficiently so we can move forces much farther and faster--and sustain them--than we have ever been able to do before Similarly information systems are essential to the situational awareness needed to achieve dominant maneuver and full dimensional protection But our dependence on these systems and their presence in every aspect of our operations has made us very vulnerable should they be disrupted The same technologies we can use to such advantage are becoming available to our adversaries And because they are relatively inexpensive and accessible the range of adversaries that potentially can cause great disruption has broadened considerably We no longer have the luxury of focusing our defense as we once did mainly on our peer competitors We now have to establish defenses that will defeat attacks by major adversaries as well as by the terrorist hacker and disenchanted insider--and the latter is a significant challenge In the past much of our defensive efforts focused on protecting our offensive capabilities Now we also have to protect an extensive DOD information infrastructure--virtually all of which depend on commercial communications networks--as well as the other critical Defense infrastructures it supports We simply cannot conduct and sustain offensive operations without these critical infrastructures I am not especially concerned about our ability to develop and employ the information technologies needed to achieve the strike maneuver and other offensive goals of Joint Vision 2010 I am very concerned about our ability to defend the information systems that make actual offensive operations possible Not too long ago we focused primarily on the confidentiality'' aspects of our information systems can we keep something secret Today we must address a much broader concept that we call Information Assurance ' This includes not only confidentiality of information but also the integrity of the data bases from which it's drawn the availability of the infrastructure to deliver the message our ability to identify and authenticate those who are using our networks and non-repudiation features to keep people from reneging on electronic contracts These five factors confidentiality integrity availability identification and authentication and non-repudiation constitute information assurance or IA Over the past two years we have initiated a number of efforts to improve the overall information assurance posture of the Department We established a Defense-wide Information Assurance Program DIAP to bring a comprehensive IA approach to this almost overwhelming challenge of building and sustaining a secure information infrastructure Since 1997 we have conducted a number of exercises and experienced real world events that have emphasized to all of us in DOD that our information systems are interconnected and hence interdependent This means that we conduct our daily operations in a shared-risk environment underscoring the need for all organizations connecting to a network to thoroughly understand the risks that exist prior to operating in that environment Each organization must know in advance whether they can accept manage or adequately mitigate risks that have been accepted by others before connecting to a network ELIGIBLE RECEIVER in June 1997 was the first large-scale exercise designed to test our ability to respond to an attack on our information infrastructure Designed to test DOD planning and crisis-action capabilities it also evaluated our ability to work with other branches of government to respond to an attack on our National Infrastructures ELIGIBLE RECEIVER revealed significant vulnerabilities in our information systems and the interdependence of the defense and national information infrastructures It showed that we had little capability to detect or assess cyber attacks and that our indications and warning'' process for cyber events was totally inadequate A few months later in early 1998 we experienced a series of attacks that targeted DOD network Domain Name Servers exploiting a well-known vulnerability in the Solaris Operating System Known as SOLAR SUNRISE these attacks were widespread systematic and showed a pattern that indicated they might be the preparation for a coordinated attack on the Defense Information Infrastructure The attacks targeted key parts of Defense Networks at a time we were preparing for possible military operations in Southwest Asia SOLAR SUNRISE validated the findings from ELIGIBLE RECEIVER and helped focus the legal issues surrounding cyber attacks Because of the world situation it was a high interest incident that significantly increased pressure for a quick response It also validated the need to establish a standing response team The ELIGIBLE RECEIVER SOLAR SUNRISE experience resulted in a number of defensive actions being taken Specifically we have Increased our situational awareness by establishing a 24hour watch Established positive control over the identification and repair of information systems at risk--SOLAR SUNRISE could have been prevented had available patches been in place in certain computer operating systems Installed intrusion detection systems on key system nodes Expanded computer emergency response teams to perform alerts critical triage and repair Developed contingency plans to mitigate the degradation or loss of networks Improved our ability to analyze data rapidly and assess attacks Established a close working relationship with the National Infrastructure Protection Center NIPC teaming with law enforcement agencies and developed procedures to share information with the private sector Increased red team'' exercises to test our systems and improve our operational readiness Dependence on interconnected information systems and networks will only increase as we move into the 21st Century and towards Joint Vision 2010 We cannot eliminate this networked dependence '' so we have to meet the challenges of Computer Network Defense even as we change our systems to make them less susceptible to attack Defending a computer network is a significant challenge and the challenge is increasing daily Actually it is a set of very significant technical challenges and associated legal and social issues There are significant technical problems with characterizing and attributing attacks in complex networks that have no real borders And as we develop technical solutions we inevitably find ourselves immersed in a host of policy and legal issues--law enforcement versus national security interests domestic versus foreign intelligence--while trying to work significant operational problems requiring the most urgent attention To address the operational response problem in a coherent and integrated manner the DOD activated a Joint Task Force for Computer Network Defense JTF-CND Established in December 1998 it is directly responsible to the Secretary of Defense The Joint Task Force is in conjunction with the CINC's Services and Agencies responsible for coordinating and directing the defense of DOD computer systems and computer networks Its mission includes the coordination of DOD defensive actions with non-DOD government agencies and appropriate private organizations This is a major first step in restructuring the Command and Control regime in the Department to address the crucial importance of computer network defense in both our war fighting and business operations The task force is based in Washington to provide interagency access and leverage established relationships with the Federal Bureau of Investigation FBI Central Intelligence Agency CIA Defense Intelligence Agency DIA and the National Security Agency NSA It provides a single accessible DOD point of contact with the NIPC And it is co-located with the Defense Information Systems Agency DISA so that it can leverage their technical and operational capabilities their network management center an established 24 hour operations center and regional operations centers with CINC liaison This co-location also facilitates coordination with the National Communications System As of October 1 1999 the United States Space Command was assigned responsibility for computer network defense CND with JTF-CND reporting directly to this unified command It is important to understand that we will always have to deal with a network of interconnected and interdependent information infrastructures that serve an ever-expanding set of interrelated communities We cannot avoid this global interaction And we DOD and the U S Government will have relatively little effect on its evolution We must take advantage of it understand its perils and design an appropriate level of security into our systems and procedures We have to learn to adapt our security practices to the evolving global environment At the same time we must be ever vigilant to a world that is an increasingly dangerous place As we've improved our ability to monitor network activities the number of probes intrusions and cyber events we can observe continues to increase We are now detecting 80 to 100 events daily Of these approximately 10 each day require detailed investigation Such investigations are carried out by many of the same people we rely on to keep our networks operational so there are limits on the resources we have to work with We also must recognize that the interconnected nature of the information infrastructure and the increasing availability and sophistication of hacker tools places at risk immediately any information that is not properly secured We are increasingly concerned about those who have legitimate access to our networks--the trusted insider This is consistent with industry experience which reports significant losses from disgruntled or dishonest employees We have taken significant steps to increase our internal security and security awareness but again vigilance is the watchword Internet exploitation operations can be executed remotely from any country They can be completely anonymous done in real time and automatically There are extraordinary resources available to the data miner '' Our own red team'' assessment last year of DOD information available on the Internet revealed some very sensitive material We recently completed a major examination of all the information the Department has on its web pages and have instituted stringent procedures to insure that classified or sensitive material alone or in aggregate is not inadvertently accessible The Secretary has also instituted a policy to insure that every individual in the DOD with access to Top Secret or a specially controlled access category or compartment make an oral attestation that they will conform to the conditions and responsibilities imposed by that access We are using this as a means to reinforce to DOD personnel the significance of the responsibilities associated with access to this information We also recognize that our dependence on the information infrastructure extends to our other critical infrastructures as well We have reorganized within OSD to bring information assurance and critical infrastructure protection together under a single Director We have developed and are now implementing our Critical Infrastructure Protection plan The Defense Department is serious about protecting its critical infrastructures We have provided a comprehensive chapter to the national plan outlining how DOD will meet our defense mission e g facilities equipment determining the critical assets identifying their associated vulnerabilities recognizing interdependencies and taking measures to protect them I would like to outline the two major concepts on how Critical Infrastructure Protection CIP will be addressed within and outside DOD To examine critical infrastructure CI issues within DOD we will have representatives some full time some part time from each of the defense infrastructure sectors--financial transportation public works Defense Information Infrastructure Command Control Communications DII C3 Intelligence Sensors Reconnaissance ISR health affairs personnel emergency preparedness space and logistics--that will work together to discuss common infrastructure concerns They will identify critical nodes and networks nationally and internationally that the DOD depends upon to execute successful military operations They will assess the vulnerability of such nodes and networks to physical and or cyber attack and make recommendations to enhance their security The infrastructure providers--the private sector--are indispensable in our execution of military operations This brings me to my second point--how we reach outside DOD PDD 63 calls for a partnership with the private sector Along with others in government we are exploring with industry the best concepts on how we share or partner'' information with the private sector Private sector involvement is crucial throughout the continuum of the Defense infrastructure but we are working with industry to determine government and private sector companies will exchange information e g classified business confidential and the means to which it should be shared documented and updated routinely At the DOD installation level we are exploring information-sharing concepts on two fronts First we need to ensure that the government and private sector representatives e g the installation commander and staff with the local railroad owner --our first line defenders--jointly respond to the needs identified in the planning assessments Second these government and private sector representatives will need to work with state local and county governments as to determining what their installations need in order to support their missions Our goal is the establishment of an information-sharing model that allows for a continuous and credible information flow from the installation level to senior levels in government to include the National Information Protection Center NIPC So where do we go from here What is the way ahead There is no simple or single solution Our strategy is based on a multidimensional approach We must have trained and disciplined personnel We must improve our operations And we must be innovative technologically We have to recognize that information technology is vitally important to all the DOD critical infrastructures And we must implement this strategy through a comprehensive coherent and integrated Defense-wide infrastructure and information assurance program Some steps we are taking include Employing a defense in depth security model and changing our basic approach to network architecture A major effort is underway to fundamentally restructure the Defense Information Infrastructure into a Global Networked Information Enterprise GNIE --a new concept of how the Department will meet its information needs Moving toward a robust DOD Public Key Infrastructure PKI that can bring public key cryptography to bear to help provide the required range of assurance and data integrity services as well as permitting segregation of the networks into communities of interest This will allow us to limit the extent of the damage an intruder can inflict Increasing our deployment of more sophisticated intrusion detection and monitoring technology Continuing to build strategic partnerships with industry to foster an open security framework and development of security enabled products Investing our R D dollars in developing highly assured products and systems and for real-time monitoring data collection analysis and visualization In addition the JTF-CND is working toward full operational capability FOC and we are expanding our CINC Service and Agency Computer Emergency Response Teams We are instituting a real-time network monitoring and reporting structure We have established positive control through our Information Assurance Vulnerability Alert or IAVA process We are establishing a continuous vulnerability analysis and assessment program and are increasing our red team assessment capability We have made significant improvements in our ability to perform long-term trend analysis thereby identifying certain types of sophisticated attacks We are increasing our efforts to promote information assurance training and awareness We are looking closely at certification and retention issues for personnel performing key functions--the system administrators and system maintainers And we are examining an expanded use of military reserves Substantial progress has been made but we must always think of it as a journey not a destination As new technology is created new attacks will be developed and new countermeasures must be adopted There is a lot more that has to be done in virtually every area that I've mentioned today But only by recognizing this challenge and facing it head on can we realize the military potential afforded by achieving Information Superiority Senator Kyl I invite anyone else who would like to submit a statement for this record to do so One of the best things I think we can do is to make the record here and then get that out to the public I appreciate the work that you are doing with GAO Keep it up We will be calling upon you again If there is not anything further then this hearing will be adjourned Whereupon at 11 40 a m the subcommittee was adjourned
OCR of the Document
View the Document >>