STATEMENT OF
GLENN K. DAVIDSON
EXECUTIVE VICE PRESIDENT
OF THE COMPUTER & COMMUNICATIONS INDUSTRY ASSOCIATION
TO THE
SUBCOMMITTEE ON TECHNOLOGY OF THE COMMITTEE ON SCIENCE
U.S. HOUSE OF REPRESENTATIVES
ON
THE REPORT AND RECOMMENDATIONS OF
THE PRESIDENT'S COMMISSION ON CRITICAL INFRASTRUCTURE PROTECTION
NOVEMBER 6, 1997
Chairwoman Morella, Ranking Member Gordon, Members of the Subcommittee;
I am Glenn Davidson, Executive Vice President of CCIA, the Computer &
Communications Industry Association. Thank you for the privilege and honor
of appearing before you today to discuss the work and recommendations of the
President's Commission on Critical Infrastructure Protection.
CCIA, as you may know, is an association of computer and communications
companies, including hardware manufacturers, software developers,
communications equipment manufacturers, telecommunications and online service
providers, systems integrators, third-party vendors, and others.
We have followed closely the work of the Commission since its establishment
in July of 1996 and, at times, have had occasion to exchange ideas with the
Commission. In fact, its former chairman, the distinguished Tom Marsh, spoke
at a meeting of the Association last June.
Let me say, right from the start that we, at CCIA, fully understand and
identify with the need to guard against any attacks capable of disabling our
Nation's first-rate infrastructure – systems absolutely vital to the normal
functioning of our government and economy. We recognize that in today's
information age, such attacks can be more than just physical, and that the
dangers of "techno-terrorism" are real.
But we understand neither the basis for the Commission's sweeping
recommendations nor the reason its work and report are shrouded in secrecy
-- especially when the Commission readily admits it has no evidence of an
imminent cyber threat. In the report's transmittal letter, General Marsh
says, and I quote, "We found no evidence of an impending cyber attack which
would have a debilitating effect on the nation's critical infrastructures."
Why is it that the National Research Council can make some very important
decisions concerning information security -- in its report on cryptography --
without its work or report being classified? Why is the Commission hiding
behind the mantle of classified information?
Allow me to suggest that if the public, generally, and industry,
specifically, are to accept the Commission's recommendations --
recommendations calling for public awareness and eduation, information
sharing, legal reforms, and the development and deployment of potentially
quite-costly cyber-threat counter-measures -- then it must provide more than
anecdotal evidence. It must come forward with its threat assessment so it
may be discussed, debated, and understood by the public.
Allow me now to turn to the Commission's report and the recommendations we
have concerns about.
Encryption
The report calls for the immediate and universal implementation of various
protection tools – including firewalls, password controls, authentication
mechanisms and action logs – to guard against cyber attacks. On this we
couldn't agree more.
However, the report fails to advocate the use of the strongest available
encryption, perhaps the most effective means to individuals and companies to
secure communications and protect digital files against fraud, white-collar
crime, economic espionage, and even terrorism.
Despite its 178-page length, the report devotes nary a page to the subject of
encryption. It states, on page 74, that the "establishment of trustworthy
key management infrastructures is the only way to enable encryption on a
large scale and most include the development of approriate standards for
interoperability on a global scale." Call it what you will ... key
management, key recovery or key escrow, but industry will tell you that such
a system cannot work on a large scale. Just ask the National Research
Council, which came to the same conclusion.
Later, the report urges the Administration to "... promote efforts to plan
for the implementation of a KMI [or key mangement infrastructure] that
supports lawful key recovery on an international basis." We already know
that international adoption of key recovery will not happen, as the OECD
rejected the Administration's proposal earlier this year.
So, why does the government continue to push key recovery. Is the
government looking for an electronic trap-door to our information networks?
Cost Burden
The report also calls for the "development and deployment of ways to prevent
attacks, mitigate damage, quickly recover services and eventually
reconstitute infrastructure." However, there is no discussion about who will
bear the cost of doing this. Is government going to pay for "ruggedizing"
our critical infrastructures to suit its national security and law
enforcement objectives. Or are the providers and users going to be the ones
that pay?
Even before the report was submitted, it was clear which way the Commission
was leaning on this subject – it assumed that industry would have to pick up
most of the tab. At a September 24 briefing he had in New York for banking
and securities industry technologists, General Marsh stated that "some of the
recommendations might be too costly for industry alone." He added: "At a
minimum, therefore, we assume joint financing by government and industry."
We, in industry, have long understood the need for information security and
network reliability. Providers and operators of public-switched networks
have long established redundant networks in the event of natural and even
man-made catastrophes. And providers of private-switched networks have done
much the same – at the request or insistence of their clients. We have also
developed and utilized firewalls, password control, encryption technology and
other security tools to protect the integrity of our systems.
However, if our Nation's security and law enforcement agencies desire a
higher level of security and reliability of our systems and networks, then
they should be the ones to pay for it. The cost of the difference between
what we provide our customers and what the government wants should be borne
by the government.
It is here that I must take issue with an underlying premise of the report.
In its Forward, the report says that the "National defense is no longer the
exclusive preserve of government ...." I ask you: Since when is the
Nation's defense the responsibility ... in full or in part ... that of the
business community's?
Later, on page 19, the report goes on to say that "Shared threats demand a
shared response, built from increased partnership between government and the
owners and operators of our infrastructure." For me, the phrase "shared
response" is code for: You, too, are going to pay!
CCIA believes that requiring American industry to bear the cost of building
such super-rugged infrastructure security upgrades would constitute an
excessive financial burden that would blunt the competitive edge of American
industry.
Information Sharing
The report calls for industry to share information – with each other as well
as with the government – about the vulnerabilities of our infrastructures,
and even about incidents of penetration.
While we, at CCIA, are not opposed in principle to sharing such information,
it's putting this principle into practice that concerns us. Somehow, I doubt
the sharing of information between government and industry would be two-way.
If the government purposefully or inadvertently released information about
network vulnerabilities and security breaches, clients and customers could
sue providers and operators for damages, claiming that these firms knew that
vulnerabilities existed and insufficient steps were taken to prevent them.
We, in industry, would need protection from such frivolous lawsuits.
Furthermore, if a major foreign partner cannot be assured of confidentiality
in certain important dealings with an American partner – in other words, if
such dealings are an open book to the U.S. Government – nothing prevents that
major client from turning to a Japanese corporation that can keep its secrets
secret. In today's global economy, these concerns are not hypothetical –
they are real.
The Commission also recommends the modification of our Nation's antitrust
laws, so that companies would be free to share information with each other
and our government. To my knowledge, industry is not asking for safe harbor
from our antitrust laws. Allow me to suggest that were it not for the U.S.
government's vigorous enforcement of our antitrust laws, the dynamic,
innovative, entrepreneurial and competitive computer and communications
industry that we know today – and enjoy the fruits thereof – would not even
exist. Our laws are certainly flexible enough to allow for some information
exchanges for mutually beneficial purposes.
Legal Initiatives
The report makes broad-brush reference to changes in other laws. Such
changes it argues, would be necessary to protect our infrastructure. Well,
candidly, some of the envisioned changes bother us.
On page 98, the report calls for sponsoring "legislative activities leading
to a finding that certain critical infrastructures are instrumentalities of
interstate commerce." If this means federal regulation of the Internet and
the World Wide Web, we must object."
Organizing the "Partnership"
The report also discusses the need to create a national infrastructure
organizational structure to develop industry cooperation and information
sharing. In discussing the roles of various new "infrastructure-related
organizations," the report, on page 49, suggests that Sectors' Lead Agencies
would be charged with drafting new legislation and regulations as required
and propose the use of federal incentives to faciliate private investment in
assurance programs." I ask you, is this the beginning of a new regulatory
structure and establishment of agencies that will dictate to industry what
information it must provide and what it must do to protect infrastructures
from attack?
Conclusion
I will conclude by suggesting that we address this matter at a slower, more
reasoned pace. Let's release the Commission's full report and allow it to be
publicly discussed and debated. If General Marsh really wants to see
"buy-in" from all sectors, as the report suggests on page 65, then the
American people need and deserve to understand the threat assessment so they
may appreciate and accommodate the changes in actions that are envisioned
here.
And let's allow our Nation's fundamental principles of individual and
economic liberties dictate how and where we proceed.
We can protect the complex infrastructures that we are all so proud of,
without doing anything that can impose debilitating strictures on American
corporations.
Thank you very much for your time….
November 4, 1997
The Honorable Constance A. Morella
Chairwoman, Subcommittee on Technology
Committee on Science
U.S. House of Representatives
Rayburn House Office Building, Room 2320
Washington, D.C. 20515-6301
Dear Chairwoman Morella:
To the best of my knowledge, the Computer & Communications Industry
Association -- the organization with which I am affiliated and on whose
behalf I am appearing before your committee on Thursday, November 6 -- has
neither received a grant nor a contract from the federal government during
the past two fiscal years.
Sincerely,
(original is signed)
Glenn K. Davidson
Executive Vice President
Biographical Sketch of Glenn K. Davidson
Glenn K. Davidson is Executive Vice President, Chief Operating Officer, and
Corporate Secretary for the Computer & Communications Industry Association.
Better known as CCIA, the association’s membership includes computer
hardware manufacturers, software developers, communications equipment
manufacturers, telecommunications and on-line service providers, re-sellers,
systems integrators, and other firms in related business ventures. These
firms are represented in the Association by their most senior corporate
officials. (For more information about CCIA, please consult its Web site at
http://www.ccianet.org.)
Mr. Davidson first joined CCIA in 1985, but left in 1990 to work in the
Administration of then-Virginia Governor L. Douglas Wilder. He served
successively as the Governor’s representative in Washington, D.C., as
Director of the Virginia Liaison Office; as his press secretary and
communications director; and finally as his chief of staff and transition
director. Mr. Davidson returned to CCIA in 1995.
Prior to joining CCIA, Mr. Davidson was employed by a professional services
firm, providing strategic planning and analysis support to such diverse
clients as the Gas Research Institute and the U.S. Departments of Defense and
Energy. He also worked as an aide to several Congressmen and a Congressional
Committee.
Mr. Davidson earned a bachelor’s degree in international studies from The
American University as well as a master’s degree in science, technology and
public policy from George Washington University.