COMPUTER SECURITY: ARE WE PREPARED FOR CYBERWAR?
=======================================================================
HEARING
before the
SUBCOMMITTEE ON GOVERNMENT MANAGEMENT,
INFORMATION, AND TECHNOLOGY
of the
COMMITTEE ON
GOVERNMENT REFORM
HOUSE OF REPRESENTATIVES
ONE HUNDRED SIXTH CONGRESS
SECOND SESSION
__________
MARCH 9, 2000
__________
Serial No. 106-160
__________
Printed for the use of the Committee on Government Reform
Available via the World Wide Web: http://www.gpo.gov/congress/house
http://www.house.gov/reform
______
U.S. GOVERNMENT PRINTING OFFICE
67-018 CC WASHINGTON : 2000
COMMITTEE ON GOVERNMENT REFORM
DAN BURTON, Indiana, Chairman
BENJAMIN A. GILMAN, New York HENRY A. WAXMAN, California
CONSTANCE A. MORELLA, Maryland TOM LANTOS, California
CHRISTOPHER SHAYS, Connecticut ROBERT E. WISE, Jr., West Virginia
ILEANA ROS-LEHTINEN, Florida MAJOR R. OWENS, New York
JOHN M. McHUGH, New York EDOLPHUS TOWNS, New York
STEPHEN HORN, California PAUL E. KANJORSKI, Pennsylvania
JOHN L. MICA, Florida PATSY T. MINK, Hawaii
THOMAS M. DAVIS, Virginia CAROLYN B. MALONEY, New York
DAVID M. McINTOSH, Indiana ELEANOR HOLMES NORTON, Washington,
MARK E. SOUDER, Indiana DC
JOE SCARBOROUGH, Florida CHAKA FATTAH, Pennsylvania
STEVEN C. LaTOURETTE, Ohio ELIJAH E. CUMMINGS, Maryland
MARSHALL ``MARK'' SANFORD, South DENNIS J. KUCINICH, Ohio
Carolina ROD R. BLAGOJEVICH, Illinois
BOB BARR, Georgia DANNY K. DAVIS, Illinois
DAN MILLER, Florida JOHN F. TIERNEY, Massachusetts
ASA HUTCHINSON, Arkansas JIM TURNER, Texas
LEE TERRY, Nebraska THOMAS H. ALLEN, Maine
JUDY BIGGERT, Illinois HAROLD E. FORD, Jr., Tennessee
GREG WALDEN, Oregon JANICE D. SCHAKOWSKY, Illinois
DOUG OSE, California ------
PAUL RYAN, Wisconsin BERNARD SANDERS, Vermont
HELEN CHENOWETH-HAGE, Idaho (Independent)
DAVID VITTER, Louisiana
Kevin Binger, Staff Director
Daniel R. Moll, Deputy Staff Director
David A. Kass, Deputy Counsel and Parliamentarian
Lisa Smith Arafune, Chief Clerk
Phil Schiliro, Minority Staff Director
------
Subcommittee on Government Management, Information, and Technology
STEPHEN HORN, California, Chairman
JUDY BIGGERT, Illinois JIM TURNER, Texas
THOMAS M. DAVIS, Virginia PAUL E. KANJORSKI, Pennsylvania
GREG WALDEN, Oregon MAJOR R. OWENS, New York
DOUG OSE, California PATSY T. MINK, Hawaii
PAUL RYAN, Wisconsin CAROLYN B. MALONEY, New York
Ex Officio
DAN BURTON, Indiana HENRY A. WAXMAN, California
J. Russell George, Staff Director and Chief Counsel
Bonnie Heald, Director of Communications
Bryan Sisk, Clerk
Trey Henderson, Minority Professional Staff Member
C O N T E N T S
----------
Page
Hearing held on March 9, 2000.................................... 1
Statement of:
Gerretson, Jim, director of operations, Information
Assurance, ACS Defense, Inc.; Mark Rasch, senior vice
president and legal counsel, Global Integrity Corp.; and
James Adams, chief executive officer, iDEFENSE............. 161
Tritak, John, Director, Critical Infrastructure Assurance
Office, Department of Commerce; John Gilligan, Chief
Information Officer, Department of Energy, and co-chair,
Security, Privacy, and Critical Infrastructure Committee,
CIO Council; Karen Brown, Deputy Director, National
Institute of Standards and Technology, Department of
Commerce; and Rich Pethia, director, Computer Emergency
Response Team Coordination Centers, Software Engineering
Institute, Carnegie Mellon University...................... 5
Letters, statements, et cetera, submitted for the record by:
Adams, James, chief executive officer, iDEFENSE, prepared
statement of............................................... 186
Biggert, Hon. Judy, a Representative in Congress from the
State of Illinois, chart on computer security management
key players................................................ 196
Brown, Karen, Deputy Director, National Institute of
Standards and Technology, Department of Commerce, prepared
statement of............................................... 38
Gerretson, Jim, director of operations, Information
Assurance, ACS Defense, Inc., prepared statement of........ 165
Gilligan, John, Chief Information Officer, Department of
Energy, and co-chair, Security, Privacy, and Critical
Infrastructure Committee, CIO Council:
Information concerning initiatives and activities........ 22
Prepared statement of.................................... 26
Horn, Hon. Stephen, a Representative in Congress from the
State of California:
Followup questions and responses......................... 159
Prepared statement of.................................... 3
Pethia, Rich, director, Computer Emergency Response Team
Coordination Centers, Software Engineering Institute,
Carnegie Mellon University, prepared statement of.......... 46
Rasch, Mark, senior vice president and legal counsel, Global
Integrity Corp., prepared statement of..................... 173
Tritak, John, Director, Critical Infrastructure Assurance
Office, Department of Commerce, prepared statement of...... 9
Turner, Hon. Jim, a Representative in Congress from the State
of Texas, prepared statement of............................ 152
COMPUTER SECURITY: ARE WE PREPARED FOR CYBERWAR?
----------
THURSDAY, MARCH 9, 2000
House of Representatives,
Subcommittee on Government Management, Information,
and Technology,
Committee on Government Reform,
Washington, DC.
The subcommittee met, pursuant to notice, at 10 a.m., in
room 2247, Rayburn House Office Building, Steve Horn (chairman
of the subcommittee) presiding.
Present: Representatives Biggert, Walden, and Turner.
Staff present: J. Russell George, staff director and chief
clerk; Matt Ryan, senior policy administrator; Bonnie Heald,
director of communications; Bryan Sisk, clerk; Ryan McKee,
staff assistant; Trey Henderson, minority professional staff
member; and Jean Gosa, minority staff assistant.
Mr. Horn. The hearing of the House Subcommittee on
Government Management, Information, and Technology will come to
order. Earlier this year, the Nation successfully met its first
technological challenge of the new millennium, Y2K. Although
the time, labor, and $100 billion cost for this effort, private
and public, we learned much from this experience. Those lessons
will be especially important now as we turn to the second
technological challenge of the new year, computer security.
We are here today to learn. In April 1996, this
subcommittee held a similar information hearing on the year
2000 computer problem. Our questions will be many of the same
questions we asked in that hearing 4 years ago. We want to know
the dimension and scope of these cyber attacks. We want to know
what efforts are being undertaken toward solving the problem,
and we want to know what the Federal Government is doing to
address this problem.
Since the early 1990's, the worldwide use of computers and
computer networks has skyrocketed. The Internet has
revolutionized the way governments, nations, and individuals
communicate, and the way to conduct business. The Internet and
electronic mail are now available 24 hours a day to anyone with
a desktop computer, a modem, and a telephone line. Yet, without
rigorous efforts to protect the sensitive information contained
in these computer systems, many of the Nation's essential
services, telecommunications, power distribution, national
defense, and so on down the line are vulnerable to cyber
attacks.
Over the last few weeks, several of the Nation's most
viable Internet websites have fallen prey to ``denial-of-
service computer attacks.'' Although these attacks disrupt
essential business services, they only scratch the surface of
cyber attacks that may be taking place in other highly
integrated computer networks.
Our first panel of witnesses today will discuss the
vulnerability of the Nation's vital computer systems and the
Government's efforts to protect them. Our second panel, from
the private sector, will demonstrate how easy it is to invade
or hack a computer system, and what organizations can do to
protect these systems. We welcome each of you and we look
forward to your testimony.
If you will stand and raise your right hands, we will swear
you in.
[Witnesses sworn.]
Mr. Horn. The clerk will note that all four witnesses
affirmed the oath. We will start with Mr. Tritak, Director of
Critical Infrastructure Assurance Office, Department of
Commerce. Mr. Tritak. I might say, the way we work here, once I
announce you, your full statement is automatically put in the
record.
The staff has read it and when we have had a chance, we
read it. We then want you, if you could, to summarize it in 5
minutes. Do not read it, whatever you do, but give us from your
heart what this problem is. That is what we are interested.
When you are all done, we will then have questions, 5 minutes
on each side when those Members come here. We will try to get a
rounding out of what the testimony is.
So, Mr. Tritak, you are first.
[The prepared statement of Hon. Stephen Horn follows:]
[GRAPHIC] [TIFF OMITTED] T7018.001
[GRAPHIC] [TIFF OMITTED] T7018.002
STATEMENT OF JOHN TRITAK, DIRECTOR, CRITICAL INFRASTRUCTURE
ASSURANCE OFFICE, DEPARTMENT OF COMMERCE; JOHN GILLIGAN, CHIEF
INFORMATION OFFICER, DEPARTMENT OF ENERGY, AND CO-CHAIR,
SECURITY, PRIVACY, AND CRITICAL INFRASTRUCTURE COMMITTEE, CIO
COUNCIL; KAREN BROWN, DEPUTY DIRECTOR, NATIONAL INSTITUTE OF
STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE; AND RICH
PETHIA, DIRECTOR, COMPUTER EMERGENCY RESPONSE TEAM COORDINATION
CENTERS, SOFTWARE ENGINEERING INSTITUTE, CARNEGIE MELLON
UNIVERSITY
Mr. Tritak. Thank you very much, Mr. Chairman.
I am grateful for this opportunity to appear before you
today to begin a dialog with you and your committee on the
issues relating to critical infrastructure assurance and
computer security. In the way of talking about infrastructure,
one of them I want to mention is that my slides just showed up.
If you do not mind, I would like to just put them up before
you.
Mr. Horn. Sure. Keep talking. They can put them up.
Mr. Tritak. In any event, Mr. Chairman, Americans have long
depended on delivery of essential services over the Nation's
critical infrastructures. The need to assure the delivery of
these services against significant disruptions has been a
concern of infrastructures, owners, and operators for as long
as there have been electric power plants, telecommunications
systems, airlines, railroads, banking, and financial services.
In other words, critical infrastructure assurance itself is not
new.
What is new is the increasing reliance on information
technology and computer networks to operate those
infrastructures. This growing reliance introduces new
complexities, interdependencies, and potentially
vulnerabilities. The threat that individuals, groups, and
nation states are seeking to identify and exploit these
vulnerabilities is real and growing.
[Chart shown.]
Mr. Tritak. In recognition of this, President Clinton
issued PDD-63 establishing the protection of the Nation's
infrastructures as a national security priority. As you can see
from the chart, Mr. Chairman, PDD-63 sets forth an ambitious
goal. It calls for a national capability by 2003 to protect our
critical infrastructure from intentional attacks that could
significantly diminish the Federal Government's ability to
perform essential national security missions and to ensure
general public health and safety, State and local government's
ability to maintain order, and to deliver minimal essential
services to the public.
Three, the private sector's ability to ensure the orderly
functioning of the economy and the delivery of essential
telecommunications, energy, financial, and transportation
services. The important conclusion of PDD-63 is that critical
infrastructure assurance is a shared responsibility. With 90
percent of the Nation's infrastructures being privately owned
and operated, the Federal Government alone cannot guarantee its
protection.
In response to the issuance of PDD-63, the Federal
Government had to organize itself in order to meet the
challenges posed by this unique national security challenge. A
national coordinator for security, infrastructure protection,
and counter-terrorism was created to oversee national policy
development and implementation, as well as to advise the
President and national security advisor on the same.
My Office of Critical Infrastructure Assurance Office was
created to coordinate policy development for the national plan,
to assist agencies in analyzing their critical infrastructure
dependencies, and to coordinate national education and
awareness efforts. The National Infrastructure Protection
Center was created at the FBI to serve as a threat assessment
center, focusing on threat warnings, vulnerabilities, and law
enforcement.
For each infrastructure sector that could be a target for
infrastructure cyber or physical attacks, a single government
department or agency was established as a lead agency for
working directly with representatives from private industry.
[Chart shown.]
Mr. Tritak. Earlier this year, President Clinton issued the
first version of the national plan. Displayed before you is the
cover. It says a lot about what the plan is and is not. First,
the plan focuses on the cyber dimensions for securing critical
infrastructures and underscore the new challenges posed by the
information age. That is not to say that physical
infrastructure protection is no longer important. It is.
Future versions of the plan will reflect that importance.
In fact, the plan is designated 1.0 and subtitled, An
Invitation to a Dialogue For a Good Reason. It is very much a
work in progress. It concentrates on the Federal Government's
efforts in infrastructure protection. The plan acknowledges
that this is not enough. We must work closely with industry and
include them in the national planning process.
We must also deal with the fact that there is an
international dimension to national information assurance, as
well as a domestic one. Of course, we must work closely with
you in the Congress to ensure that your concerns, ideas, and
interests are reflected in subsequent versions of the plan.
[Chart shown.]
Mr. Tritak. To meet the goal of PDD-63, the national plan
establishes 10 programs for achieving three broad objectives.
First, steps must be taken to identify the key elements and
systems that constitute our critical infrastructures. Their
vulnerability to attack must be assessed and plans must be
developed to address those vulnerabilities.
In so preparing, we hope to prevent attacks from reaching
their target in the first place. Next, should such attacks
occur, we must develop a means to identify, assess, and warn
about them in a timely manner. The attacks must then be
contained. Disrupted services must be restored and affected
systems must be reconstituted.
Finally, we must lay a strong foundation upon which to
create and support the Nation's commitment to achieving the
first two objectives. These include coordinated research and
development, training, and employing information security
experts, raising awareness, and, where appropriate, identify
potential legal or legislative reforms.
[Chart shown.]
Mr. Tritak. The President requested $2 billion for critical
infrastructure protection in his fiscal year 2001 budget
request. This represents a 15 percent increase over fiscal year
2000 funding. Of this, 85 percent supports protection of agency
infrastructures; 72 percent goes to supporting critical
infrastructure efforts within the national security agencies.
Our President proposes a number of key initiatives in his
budget request. I will just highlight a few. The Federal Cyber
Service Initiative seeks to redress the shortage of information
security expertise in the Federal Government. This shortfall
reflects the scarcity of college-level programs in information
security. It also reflects the inability of the Government to
compete for highly skilled workers in this area.
Our goal is to recruit, train, and retain a cadre of IT
specialists for Federal service. The Federal Intrusion
Detection Network will serve as a centralized burglar alarm
system for critical computer systems within civilian government
agencies. Intrusion Detection Systems will be installed and
operated by the civilian agencies. Alarm data indicating
anomalous computer activity will be sent through the agency, by
the agency to the GSA for further analysis.
Only if there is evidence of criminal behavior will data be
sent to the NIPC and law enforcement. FIDNet will not monitor
any private network traffic. It will comply with all existing
privacy laws. The Partnership for Critical Infrastructure
Security attempts to build on the efforts already underway
between government and industry.
It seeks to bring the individual sectors together to
encourage a cross-sectoral dialog as a common concern, such as
the growing interdependencies among the infrastructure owners
and operators. The Partnership also provides a form for
infrastructure owners and operators to engage other interested
stakeholders, including the audit community, insurance
community, Wall Street, and the investment community, and of
course mainstream businesses who are the ultimate consumers of
infrastructure services.
Now, the partnership is dedicated to the belief that once
industry recognizes a business case for action, economic self-
interest in the market can go a long way toward addressing the
challenges of infrastructure assurance. That is not to say that
self-interest in the market alone can solve these problems,
because they cannot. Where they cannot, and what national
security interests of their country requires, the Federal
Government must step in to address any gaps and vulnerabilities
that may exist.
Last month, over 200 representatives of more than 120
companies began to organize their participation in this
Partnership. I think the Partnership represents a good step in
not only addressing issues of common concern, but also for
industry to take a lead in addressing the problems that
confront us today. When you have good partnership between
industry and government, we are better able to identify and
define our respective roles so that where there
are gaps, where the market cannot address a problem of concern
to the Nation, we can fill that gap.
Given the limited time, Mr. Chairman, I am going to
conclude my remarks here and I look forward to your questions.
[The prepared statement of Mr. Tritak follows:]
[GRAPHIC] [TIFF OMITTED] T7018.003
[GRAPHIC] [TIFF OMITTED] T7018.004
[GRAPHIC] [TIFF OMITTED] T7018.005
[GRAPHIC] [TIFF OMITTED] T7018.006
[GRAPHIC] [TIFF OMITTED] T7018.007
[GRAPHIC] [TIFF OMITTED] T7018.008
[GRAPHIC] [TIFF OMITTED] T7018.009
[GRAPHIC] [TIFF OMITTED] T7018.010
[GRAPHIC] [TIFF OMITTED] T7018.011
[GRAPHIC] [TIFF OMITTED] T7018.012
[GRAPHIC] [TIFF OMITTED] T7018.013
Mr. Horn. Thank you very much. I would appreciate it at
this point in the record if you would submit the national plan
for the record. So, without objection, it will be put right
after this point.
We now go the next gentleman who is very familiar to this
committee. You are doing a fine job. Mr. John Gilligan, Chief
Information Officer, Department of Energy, and Co-Chair,
Security, Privacy, and Critical Infrastructure Committee of the
Chief Information Officer Council. Mr. Gilligan.
Mr. Gilligan. Thank you, Chairman Horn.
As you noted, I come before the committee speaking in both
my role as Chief Information Officer of the Department of
Energy and as well the Co-Chair of the Federal CIO Council
Security, Privacy, and Critical Infrastructure Committee. As I
prepared for this testimony, I gave a lot of thought to what I
viewed were the two critical issues that I face as a Federal
CIO. I would like to spend a moment addressing these issues for
you.
Up-front, let me tell you that my biggest issues are not
technology challenges. The primary challenge is educating and
convincing line management that computers and networks, as well
as the information they possess and process, should be treated
and managed as mission-essential and strategic organization
resources. Let me illustrate my point with an example.
Last summer, at one of the Department of Energy
laboratories we conducted a security audit. The laboratory was
evidenced as having the best firewall within the Department,
very good security policies, and adequate protection of our
classified systems. However, that same organization had a
number of instances of what I refer to as no-brainer security
weaknesses. For example, there were a number of computer
systems that had software configurations that were years out of
date.
In this case, they were not taking advantage of dozens of
patches that had fielded to upgrade the security of those
systems over the years. In addition, there were a number of
systems where their passwords, including system administrator
passwords were easily guessed, or in some cases even used the
term ``password.'' These and other weaknesses provided relative
ease of a potential hacker to break into the laboratory's
unclassified computer system.
As I evaluated this apparent paradox, the same organization
having both the best and the worst security practices, the root
issue became clear to me. The organization was not focusing on
information technology as an overall laboratory resource,
rather only sub-sets of the systems and networks were being
pro-actively managed. Most of the unclassified computers were
procured and operated as work center or personal resources.
I have found similar dichotomy at a number of other daily
sites. The problem at this lab was not the absence of sound
security policies or lack of security technology knowledge, but
the fact that management of computers had become highly
decentralized and, in many cases, was a personal task. I found
that the number of system administrators approached the number
of laboratory employees.
The security audit findings highlighted to the laboratory
director and senior management that they had fundamental
problems with information technology management. The solution
required a fundamental change in how computers, networks were
purchased, installed, and operated. I firmly believe that this
is the most significant and pervasive problem facing Federal
agency CIOs.
A second challenge I face is working with Federal managers
in the Department of Energy in determining how much security is
enough. That is, how much is adequate? In the past, primary
security focus was on the protection of national security
information, classified systems, and more easily controlled
mainframe computers. Adequate security was defined by security
gurus, in most cases, with much input from line management, and
defined, in most cases, in absolute terms.
Today, we use computers for a wide variety of missions
where it is not cost effective or appropriate to apply the same
protection mechanism or security policies in all cases. We have
information relating to national security. Personnel data and
business operations must be protected to ensure
confidentiality. On the other hand, we have public websites
where we want to protect the integrity of the information. In
addition, there are mission impact and perception factors which
influence what is adequate, as well as rapidly changing
threats, missions, and technologies.
Federal security policies require an assessment of risk to
guide management decisions on what is adequate. Sounds easy. I
would submit that it is not. The Federal Government is also
held to a very high standard and one that continues to change
and become more stringent over time. In my testimony, I have
included some status updates within the Department of Energy on
our recent security activities. I will not detail them here.
I would like to, however, turn for a few minutes to the
work of the CIO Security, Privacy, and Critical Infrastructure
Protection Committee, which I co-chair with Roger Baker, CIO of
the Department of Commerce, and Fernando Robano, CIO of the
Department of State. Our committee is developing a set of
products that we believe will augment and accelerate
improvements in implementing adequate levels of protection in
assuring appropriate privacy of Federal information and
systems.
I would like to submit for the record a brief summary of
our committee activities.
[The information referred to follows:]
[GRAPHIC] [TIFF OMITTED] T7018.014
[GRAPHIC] [TIFF OMITTED] T7018.015
Mr. Gilligan. I would also like to highlight a few of the
committee's efforts. Our project to develop and Information
Technology Security Maturity Framework is intended to help
guide agencies and senior government officials in establishing
and maturing an effective cyber security program. Following the
example of the successful Software Capability Maturity
Framework developed by Carnegie Mellon University, the
Information Technology Security Maturity Framework recommends
the building block approach to security.
Emphasis is placed at lower levels on critical foundation
activities, such as documented policy, and clearly defined
assigned responsibilities, as well as robust training and
security assessment of progress. I have brought a display that
summarizes the six levels of security maturity described in the
draft framework. The Security Committee believes that all
agencies should be working toward achievement of level 2 in the
near term.
This level describes what is called a documented security
program. It is based on policy and guidance from the General
Accounting Office, the Office of Management and Budget, and the
National Institute for Standards and Technology. The committee
is working to develop specific evaluation criteria, a checklist
guide that could be used for level 2, as well as further
definition of level 3.
We have invited the Software Engineering Institute and the
General Accounting Office to participate in the refinement of
the framework. The committee also has initiatives in the
development of a tool that will allow us to identify and make
available the Federal agency's best security practices. We are
developing sample agency policies and guidelines dealing with
security and privacy.
We are working to accelerate the use of so-called public
key encryption. We are working with the Information Technology
Association of America in the development of security solution
benchmarks, linked to common electronic services such as
financial track statues with the public, benefit inquiries over
the web, and electronic submission of contractor pricing
proposals.
I would like to conclude my remarks with some
recommendations from my perspective as co-chair of the
Security, Privacy, Critical Infrastructure Committee. The first
two recommendations deal with funding for security. First, I
recommend that organizations specifically identify and analyze
their expenditures in cyber security. In this regard, I suggest
that we work with the government and industry to establish and
refine benchmarks against which line managers can assess
whether their investment is comparable to similar
organizations.
Work by the Gardner Group suggests that a reasonable range
for cyber security spending is somewhere between 1 and 5
percent of an organization's spending for information
technology. Second, I would recommend consideration of
increased funding for a set of governmentwide security
initiatives that are focused not on multi-year research or
product development, but on short-term immediate operational
benefits for Federal agencies.
I note that most of our CIO Council cyber security efforts
are focused toward ongoing operational support. Furthermore, I
recommend that we continue to tightly tie our cyber security
efforts with other initiatives to improve overall management of
information technology resources from an enterprise
perspective.
Finally, I suggest that we continue to focus our education
efforts toward government managers. I believe managers need to
know how to make risk tradeoffs. What they need is greater
awareness of their responsibility in managing information
technology as a strategic resource, as well as simple
benchmarks and metrics, such as funding levels and a maturity
framework, against which they can evaluate organization-
specific risks, as well as the progress of their cyber security
programs.
This concludes my testimony. I look forward to your
questions.
[The prepared statement of Mr. Gilligan follows:]
[GRAPHIC] [TIFF OMITTED] T7018.016
[GRAPHIC] [TIFF OMITTED] T7018.017
[GRAPHIC] [TIFF OMITTED] T7018.018
[GRAPHIC] [TIFF OMITTED] T7018.019
[GRAPHIC] [TIFF OMITTED] T7018.020
[GRAPHIC] [TIFF OMITTED] T7018.021
[GRAPHIC] [TIFF OMITTED] T7018.022
[GRAPHIC] [TIFF OMITTED] T7018.023
[GRAPHIC] [TIFF OMITTED] T7018.024
Mr. Horn. Thank you very much, Mr. Gilligan.
Our next witness is Ms. Karen Brown, the Deputy Director,
National Institute of Standards and Technology, otherwise known
as NIST. With the Weather Bureau there, I wonder why we cannot
be MIST? Anyhow, the Department of Commerce. Thank you for
coming.
Ms. Brown. Thank you.
Thank you Mr. Chairman and members of this subcommittee for
the invitation to speak to you today about computer security
issues. Computer security continues to be an ongoing and
challenging problem that demands the attention of the Congress,
the executive branch, industry, academia, and the public.
Computer security is not a narrow technical concern.
The explosive growth in electronic commerce highlights the
Nation's ever-increasing dependence upon the secure and
reliable operation of our computer systems. Computer security
has a vital influence on our economic health and our Nation's
security, and we commend the committee for your focus on this
security. Today, I would like to address NIST computer security
activities that contribute to improving computer security for
the Federal Government and the private sector.
I would also like to briefly describe for you our proposed
new program activities for next year. Under NIST statutory
responsibilities, we develop standards and guidelines for
agencies to help protect their sensitive, unclassified
information systems. In meeting the needs of our customers in
both the public and private sector, we work closely with
industry, Federal agencies, testing organizations, standards
groups, academia, and private sector users.
As awareness of the need for security grows, more secure
products will be demanded in the marketplace. Addressing
security will also help ensure that electronic commerce growth
is not limited because of security concern. What does NIST do
specifically? To meet these responsibilities in customer needs,
we first work to improve the awareness of the need for computer
security, which is an ongoing effort.
Additionally, we research new technologies and their
security implications. We work to develop security standards
and specifications to help users specify security needs, and
establish minimum security requirements for Federal systems. We
develop and manage security testing programs in cooperation
with the private sector to enable users to have confidence that
a product meets a security specification.
We also produce security guidance to promote security
planning and secured system operations in administration. I
will briefly discuss the need and benefits of each. First,
there is a need for timely, relevant, and easily assessable
information to raise awareness about risk, vulnerabilities, and
requirements for protection of information systems. This is
particularly true for new and rapidly emerging technologies
which are being delivered with such speed in the Internet age.
We host and sponsor information sharing among security
educators, the Federal Security Program Managers' Forum, and
industry. We seek advice from our external advisory board of
computer experts. We meet regularly with members of the Federal
computer security community, including the Chief Information
Officer of the Security Committee, and the Critical Information
Assurance Office.
We actively support information sharing through our
conferences, workshops, webpages, publications, and bulletins.
A second need is for research on information technology
vulnerabilities and cost effective security. When we identify
new technologies that could potentially influence our customer
security practices, we research these technologies and their
potential vulnerabilities.
We also work to find ways to apply new technologies in a
secure manner. The solutions we develop are made available to
both public and private users. Research helps us to find more
cost effective ways to implement and address security
requirements. The third is the need for standards and for ways
to test that standards are properly implemented on products.
For example, cryptographic algorithms and techniques are
essential for protecting sensitive data and electronic
transition.
NIST has long been active in developing Federal
Cryptographic Standards and working in cooperation with private
sector voluntary standards organizations in this area. We are
currently leading a public program to develop the Advanced
Encryption Standard [AES], which will serve 21st Century
Security needs. Another aspect of our standards activity
concerns public key and key management infrastructures.
We have been actively involved in working with industry and
the Federal Government to promote the security and inter-
operability of such infrastructures. Standards help users to
know what security specifications may be appropriate for their
needs. Testing complements this by helping users have
confidence that security standards and specifications are
correctly implemented in the products they buy.
Testing also helps reduce the potential vulnerabilities
that products contain that could be used to attack systems. For
over 5 years, we have led the Cryptographic Module Validation
Program, which has now validated about 90 modules, with another
50 expected this year. This successful program utilizes private
sector accredited laboratories to conduct security conformance
testing of cryptographic modules against the Federal standard
we developed and maintain. Many of these activities are being
done in cooperation with the Defense Department's National
Security Agency in our National Information Assurance
Partnership.
The goal is to enable product developers to get their
products tested easily and voluntarily, and for users to have
access to information about test products. Under this program,
we have also led the development of an international mutual
recognition arrangement, whereby the results of testing in the
United States are recognized by our international partners,
thus reducing costs to the industry.
Advice and technical assistance for both government
organizations and private sector is the fourth need. While I
have given you a few examples of NIST work, I obviously have
not covered everything. I want to emphasize there is still much
more to be done.
Please keep in mind that approximately $6 million of direct
congressional funding supports both our Federal and industry
computer security responsibilities. This is plainly not enough.
Thank you.
[The prepared statement of Ms. Brown follows:]
[GRAPHIC] [TIFF OMITTED] T7018.025
[GRAPHIC] [TIFF OMITTED] T7018.026
[GRAPHIC] [TIFF OMITTED] T7018.027
[GRAPHIC] [TIFF OMITTED] T7018.028
[GRAPHIC] [TIFF OMITTED] T7018.029
Mr. Horn. Thank you very much. That was very helpful
testimony. We now go to our last witness on this panel. I must
say, Mr. Pethia, everywhere I talked and saw people in the last
3 weeks putting this panel together, the first magic word was
Carnegie Mellon. So, we are glad to have you come here. We hope
to visit your campus sometime. You can show us around.
Mr. Rich Pethia is the director, Computer Emergency
Response Team Coordination Centers, Software Engineering
Institute at Carnegie Mellon University in Pittsburgh.
Mr. Pethia. Mr. Chairman and members of the subcommittee, I
would like to thank you for the opportunity to come and talk to
you today about computer security. Today, I would like to
describe a number of the trends that impact security on the
Internet. I will illustrate the results of those trends and
then outline some steps that I think will help us all
effectively manage the increasing risk of damage from cyber
attacks.
My perspective comes from the work that we do with the CERT
Coordination Center. The Center is charted to respond to
security emergencies on the Internet, and to work with both
technology producers and technology users to facilitate
response to major security problems. Since 1988, we have
handled over 24,000 separate security incidents, and analyzed
more than 1,500 separate computer vulnerabilities.
The current state of Internet security is cause for
concern. The vulnerabilities associated with technology used on
the Internet put government, business, and individuals at risk.
Security is influenced by many factors. An organization that
wishes to improve its security has to deal with a lot of
issues. First of all, the Internet itself is growing at an
amazing rate.
As the technology is being distributed, so is the
management of that technology. System administration and
management often fall upon people who do not have the training,
skills, resources, or interest needed to operate their system
securely. This problem is about to get worse. Now that we have
direct Internet connection to homes, schools, libraries, and
other venues that do not have training and security staff.
These always-on rarely protected systems will allow
attackers to continue to add new systems to their arsenal of
captured weapons. Intruder tools are becoming increasingly
sophisticated and also becoming increasingly user-friendly and
widely available. This technology is evolving like any other.
Sophisticated developers of intruder programs package their
tools in user-friendly forms and make them widely available. As
a result, even unsophisticated intruders can use them.
On the technology side, when vendors release patches or
upgrades to solve security problems, organizations' systems
often are not upgraded. The job may be too time consuming, too
complex, or just too low a priority for the system
administration or staff to handle. There is little evidence of
improvement in the security features of most products. Today,
we continue to receive new vulnerability reports in second
generation and third generation products.
Developers are not devoting sufficient effort to apply
lessons learned about the sources of vulnerabilities and doing
the engineering work necessary to remove them. Finally,
engineering for ease of use is not being matched by engineering
for ease of secure administration. Today, we would all find it
ludicrous to safely operate and drive an automobile, a person
would have to be a master mechanic.
Yet, today we expect our computer users and novice system
administrators to have detailed technical knowledge of all the
intricacies and nuances of the technology. We are simply
developing technology that is not fit for use in today's
environment. Because of these and other factors, organizations
and individuals who are using the Internet become vulnerable to
various kinds of cyber attack, including the denial-of-service
attacks that were widely publicized in February.
The key point about this attack, this attack type, is that
although an organization may be able to harden its own systems
to help prevent having its systems used as a part of a
distributed attack vehicle, there is essentially nothing a site
can do with currently available technology to prevent becoming
a victim of these coordinated denial-of-service attacks.
The best an organization can do today is get ready to
respond and have its response capabilities in place, should it
ever become the victim of one of these attacks. These attacks
work by having intruders compromise vulnerable systems. They
collect these vulnerable systems into aggregated attack
networks. These networks act in unison to attack a single
victim.
The network can be activated remotely at a later site by a
master computer. Communication between the master and the
networks is encrypted, often making it difficult to locate the
master. Once activated, these tools proceed on their own. They
are rapidly evolving. Individual nodes in the attack network
can be automatically reprogrammed to change the type of attack
so that it becomes increasingly difficult to build defenses
against this technology.
Clearly, we have entered a new era in the Internet, where
the power of the Internet itself is now being used to attack
people who are connected to it. At the CERT, we constantly
monitor trends and watch for new attacks and tools. We became
aware of this new form of denial-of-service attack in late
August, early September 1999. Denial-of-service attacks are not
new.
These kinds of attacks have been around since 1994, with
significant increases in 1996 and 1998. By the end of
September, it was evident that this was a new form of attack.
It was something we had never seen before. We called together a
workshop of 30 international experts who came together for 2
days in Pittsburgh and produced a paper that explains the
threat posed by these intruder tools, as well as guidance to
organizations about how to protect themselves and be prepared,
and how to be ready to respond.
This paper, along with other advisories, were issued to the
community in December. We have had a series of communications
out to the Internet community. The problem is serious. It is
complex. A combination of approaches must be used to reduce the
risks associated with this ever-increasing dependence on the
Internet. First of all, we need better ability to collect,
analyze, and disseminate information on assurance issues.
A lot of what we do today is reactive. We see a problem. We
analyze it. We understand what just happened. That is no longer
adequate. New forms of attack are now happening at Internet
speed, both automated attacks, like these distributed denial-
of-service attacks, as well as new forms of viruses, such as
Melissa that showed up in March of this year.
Today, we need to find analysis methods that build a
predictive early warning capability. We need to be able to
understand what is going to happen before it happens, which
means we need new ways of analysis. In addition, better
attention paid to collecting information. There has been a lot
of discussion and debate about instrumenting networks to
collect data to watch the traffic on the network to anticipate
what the problems might be.
Certainly, there is a need to be concerned about privacy,
but we have to find some way to balance our need to collect
information about the operation of networks with our need to
keep individual transactions and user's activities private.
Until we get a better view into what is happening on our
networks, we are going to have a very difficult time defending
against new forms of attack.
Third, we need to invest in better education and training
to raise the level of security and security awareness. In
particular, we need to focus on bringing the understanding of
security issues to senior and middle management in government,
as well as in industry. Until there is management commitment,
and management commitment of resource to solve this problem,
little is going to happen. Part of that includes encouraging
the development of comprehensive security programs with well-
defined responsibilities for managers, users, and system
administrators.
Finally, all of this is only going to help us mitigate the
problem, stem the flow of quality that we are having. It will
not solve the problem. In order to get ahead of this problem,
we need to support research and development activities that
will lead to a new generation of technology on the Internet and
other broad-scale networks. Systems that are easier to secure,
systems that do not require so much constant attention, systems
that do not repeat the vulnerabilities of the past, the long-
term solution is better technology.
That is going to take years. Until we get there, we need
better management approaches. Thank you.
[The prepared statement of Mr. Pethia follows:]
[GRAPHIC] [TIFF OMITTED] T7018.030
[GRAPHIC] [TIFF OMITTED] T7018.031
[GRAPHIC] [TIFF OMITTED] T7018.032
[GRAPHIC] [TIFF OMITTED] T7018.033
[GRAPHIC] [TIFF OMITTED] T7018.034
[GRAPHIC] [TIFF OMITTED] T7018.035
[GRAPHIC] [TIFF OMITTED] T7018.036
[GRAPHIC] [TIFF OMITTED] T7018.037
[GRAPHIC] [TIFF OMITTED] T7018.038
[GRAPHIC] [TIFF OMITTED] T7018.039
[GRAPHIC] [TIFF OMITTED] T7018.040
[GRAPHIC] [TIFF OMITTED] T7018.041
[GRAPHIC] [TIFF OMITTED] T7018.042
[GRAPHIC] [TIFF OMITTED] T7018.043
[GRAPHIC] [TIFF OMITTED] T7018.044
[GRAPHIC] [TIFF OMITTED] T7018.045
[GRAPHIC] [TIFF OMITTED] T7018.046
[GRAPHIC] [TIFF OMITTED] T7018.047
[GRAPHIC] [TIFF OMITTED] T7018.048
[GRAPHIC] [TIFF OMITTED] T7018.049
[GRAPHIC] [TIFF OMITTED] T7018.050
[GRAPHIC] [TIFF OMITTED] T7018.051
[GRAPHIC] [TIFF OMITTED] T7018.052
[GRAPHIC] [TIFF OMITTED] T7018.053
[GRAPHIC] [TIFF OMITTED] T7018.054
[GRAPHIC] [TIFF OMITTED] T7018.055
[GRAPHIC] [TIFF OMITTED] T7018.056
[GRAPHIC] [TIFF OMITTED] T7018.057
[GRAPHIC] [TIFF OMITTED] T7018.058
[GRAPHIC] [TIFF OMITTED] T7018.059
[GRAPHIC] [TIFF OMITTED] T7018.060
[GRAPHIC] [TIFF OMITTED] T7018.061
[GRAPHIC] [TIFF OMITTED] T7018.062
[GRAPHIC] [TIFF OMITTED] T7018.063
[GRAPHIC] [TIFF OMITTED] T7018.064
[GRAPHIC] [TIFF OMITTED] T7018.065
[GRAPHIC] [TIFF OMITTED] T7018.066
[GRAPHIC] [TIFF OMITTED] T7018.067
[GRAPHIC] [TIFF OMITTED] T7018.068
[GRAPHIC] [TIFF OMITTED] T7018.069
[GRAPHIC] [TIFF OMITTED] T7018.070
[GRAPHIC] [TIFF OMITTED] T7018.071
[GRAPHIC] [TIFF OMITTED] T7018.072
[GRAPHIC] [TIFF OMITTED] T7018.073
[GRAPHIC] [TIFF OMITTED] T7018.074
[GRAPHIC] [TIFF OMITTED] T7018.075
[GRAPHIC] [TIFF OMITTED] T7018.076
[GRAPHIC] [TIFF OMITTED] T7018.077
[GRAPHIC] [TIFF OMITTED] T7018.078
[GRAPHIC] [TIFF OMITTED] T7018.079
[GRAPHIC] [TIFF OMITTED] T7018.080
[GRAPHIC] [TIFF OMITTED] T7018.081
[GRAPHIC] [TIFF OMITTED] T7018.082
[GRAPHIC] [TIFF OMITTED] T7018.083
[GRAPHIC] [TIFF OMITTED] T7018.084
[GRAPHIC] [TIFF OMITTED] T7018.085
[GRAPHIC] [TIFF OMITTED] T7018.086
[GRAPHIC] [TIFF OMITTED] T7018.087
[GRAPHIC] [TIFF OMITTED] T7018.088
[GRAPHIC] [TIFF OMITTED] T7018.089
[GRAPHIC] [TIFF OMITTED] T7018.090
[GRAPHIC] [TIFF OMITTED] T7018.091
[GRAPHIC] [TIFF OMITTED] T7018.092
[GRAPHIC] [TIFF OMITTED] T7018.093
[GRAPHIC] [TIFF OMITTED] T7018.094
[GRAPHIC] [TIFF OMITTED] T7018.095
[GRAPHIC] [TIFF OMITTED] T7018.096
[GRAPHIC] [TIFF OMITTED] T7018.097
[GRAPHIC] [TIFF OMITTED] T7018.098
[GRAPHIC] [TIFF OMITTED] T7018.099
[GRAPHIC] [TIFF OMITTED] T7018.100
[GRAPHIC] [TIFF OMITTED] T7018.101
[GRAPHIC] [TIFF OMITTED] T7018.102
[GRAPHIC] [TIFF OMITTED] T7018.103
[GRAPHIC] [TIFF OMITTED] T7018.104
[GRAPHIC] [TIFF OMITTED] T7018.105
[GRAPHIC] [TIFF OMITTED] T7018.106
[GRAPHIC] [TIFF OMITTED] T7018.107
[GRAPHIC] [TIFF OMITTED] T7018.108
[GRAPHIC] [TIFF OMITTED] T7018.109
[GRAPHIC] [TIFF OMITTED] T7018.110
[GRAPHIC] [TIFF OMITTED] T7018.111
[GRAPHIC] [TIFF OMITTED] T7018.112
[GRAPHIC] [TIFF OMITTED] T7018.113
[GRAPHIC] [TIFF OMITTED] T7018.114
[GRAPHIC] [TIFF OMITTED] T7018.115
[GRAPHIC] [TIFF OMITTED] T7018.116
[GRAPHIC] [TIFF OMITTED] T7018.117
[GRAPHIC] [TIFF OMITTED] T7018.118
[GRAPHIC] [TIFF OMITTED] T7018.119
[GRAPHIC] [TIFF OMITTED] T7018.120
[GRAPHIC] [TIFF OMITTED] T7018.121
[GRAPHIC] [TIFF OMITTED] T7018.122
[GRAPHIC] [TIFF OMITTED] T7018.123
[GRAPHIC] [TIFF OMITTED] T7018.124
[GRAPHIC] [TIFF OMITTED] T7018.125
[GRAPHIC] [TIFF OMITTED] T7018.126
[GRAPHIC] [TIFF OMITTED] T7018.127
[GRAPHIC] [TIFF OMITTED] T7018.128
[GRAPHIC] [TIFF OMITTED] T7018.129
[GRAPHIC] [TIFF OMITTED] T7018.130
Mr. Horn. Thank you very much.
We will now go to questioning. It will be 5 minutes to a
side. We will get everybody in here in three rounds, if you
need them.
[Pause.]
Mr. Horn. This looks like a vote.
What I want to do is start on one issue. Then I will yield
to Mr. Turner. As I listened to the comment about maybe we need
a tzar in this area, usually my spinal column starts wiggling.
As a student of Russian history, I keep wondering what happened
to a lot of tzars and who is Rasputin in this operation? So, I
guess I would ask, is the Koskinen model a good one for this?
Now, with the Koskinen model, then when Mrs. Maloney and I
wrote the President, then talked to him and said, look, you
have got to get somebody to coordinate this effort. Some were
waving the flag for a tzar. I was not. The way it worked out,
one, the President picked a person that he had known before he
was President and had trust in.
No. 2, we made him assistant to the President, which is the
highest rank you can have in the White House hierarchy. No. 3,
he was not in OMB. He was housed near there. The President had
him and the President spread the word to the Cabinet that this
is serious business, when they finally got around to it.
No. 4, they called on each of the Deputy Secretaries that
really run departments and obviously involved the Chief
Information Officers, who are the people we ought to be
spending the time to be the managers they are supposed to be of
communications and information in their particular agencies.
So, I guess I would simply like to get the feeling of you as to
whether that was a successful model that we could also apply to
computer security and not have some tzar in OMB.
Of course, as you know, I am trying to split the management
part out of OMB. It might well roost there, but the fact is the
model I think worked the way it did. I do not know if any of
you want to take that and say, hey, there is another way to
look at this. Go ahead. Mr. Gilligan.
Mr. Gilligan. Sir, let me give you some perspectives. I
think the model with the particular individual, John Koskinen,
worked extremely well. I think there were a number of factors
that made it work well, one of which was the personal
characteristics and strength of John Koskinen. I think there
were also some other factors that made it effective. That was
the urgency and the immediacy of Y2K heightened the interest
across the board.
There was a need and a willing acceptance of someone to
help lead the effort across government and across really the
country. It is not clear to me that an exact parallel to that
would work as effectively in computer security. I know that
there has been some frustration, and there continues to be at
all levels, with our difficulty of pulling together across-
government activities in this area.
So, it is clear that we need to emphasize and we need to
work in that area. Obviously it is something the CIO Council is
trying to address, and yet we realize that we have limited
abilities as well. So, while I would not specifically endorse
the exact model, I think we need to continue to look for some
way to better leverage our across-government efforts in this
area as a part of our solution.
Mr. Horn. Any other thoughts on this? Mr. Tritak.
Mr. Tritak. I would agree with those comments.
Mr. Horn. So, you would like that model?
Mr. Tritak. I think what is intriguing about the Koskinen
and the Y2K effort generally is, in many respects, the Y2K was
your first critical infrastructure challenge to the United
States. It had a lot of things going for it. First of all,
there was a recognition. In fact, industry actually led the
way. The government took a little while to get onboard.
There was an acknowledgment of what the challenge was.
There was a known problem. The people rallied for it. I think
that when you look at the Koskinen model, it is important to
look at what the factors of success were. You have identified
quite a few of them. He was viewed as having the authority. He
worked very closely with the Cabinet. The Cabinet knew that
when he walked into the room, who he was, and what he stood
for.
We certainly cannot under-emphasize the importance of a
leadership and view it as someone who is speaking with
authority on behalf of the President; especially when you are
talking about across-agency issues, which critical
infrastructure really is all about. If you look at the way this
has evolved, there was a time probably when the Computer
Security Act was actually passed where you could talk about a
computer system within an agency. It was that agency's system.
Now, you are looking more at an interconnected set of
systems. You have to ensure, in terms of the government as a
whole providing a service to the Nation, that you have strong
links across government agencies, as well as within them, so
that you do not create weak links in the chain. Now, with that
said, I think that we have to look very closely about how the
challenges, as ongoing, differ from the Y2K experience before
you talk about institutionalizing a new position.
I think certainly some of the ingredients that you
indicated bear close scrutiny and attention on that. In fact,
you could make the case that, that kind of leadership becomes
even more essential in some regards when the known threats are
not as immediate, but you know they are out there and they
could happen at any time as opposed to a date-specific.
Mr. Horn. Any other comments on this?
I will yield 5 minutes to the gentleman from Texas. If you
would like, we could recess now to go vote, and then come back,
and then start with your 5 minutes. Is that OK with you?
Mr. Turner. That is fine.
Mr. Horn. OK. We are going to be in recess then for 20
minutes so we can get these two votes.
[Recess.]
Mr. Horn. This subcommittee will be in order. We will
proceed with the questioning. It is 5 minutes for Mr. Turner,
the ranking member from Texas.
Mr. Turner. Thank you, Mr. Chairman.
I appreciated your comments. I really get the impression
that what you were saying to us is that there is a lot of work
that has got to be done in the area of new technology before we
will ever have any hope of really having a secure Internet. I
guess I was kind of curious as to what types of things you are
talking about? We made the comparison a minute ago to the Y2K
problem.
To me, what we are talking about today dwarfs the Y2K
problem. In that arena, we had a date certain we were working
toward. We knew if we made it past that date, we had succeeded.
The government was able to provide a coordinating role for both
the public and the private sector. This challenge seems to be
so much greater. When you say we need better technologies, what
kinds of things are we talking about?
Mr. Pethia. First of all, the driving factor behind my
belief is that more and more devices attached to Internet are
going to become consumer items. I think we are already there
with personal computers. We are almost there, even with some
devices like routers and fire walls, when you think about
having these things installed in libraries, in doctors'
offices, and in places where you would not expect to find
someone with a degree in computer science.
That is going to continue. We are going to have all kinds
of devices at home. We are going to have hand-held portable
units. We are going to have cell phones connected, as we
already do, into the Internet. So, from one perspective what we
need to do is to make security much simpler than it is today.
You can configure a very secure personal computer, be it a Unix
box or a Microsoft Windows box.
All of the mechanics are there to do that, but it is not
easy. It takes a lot of understanding and a lot of knowledge.
Not only do you have to get it right the first time, you have
to keep it that way over time as you add new applications into
your personal computer. So, if you think back to the 1960's
when all computers were hard to use in all kinds of ways, the
industry responded very well with a lot of research and
development in easy-to-use, in fact ease of use was the buzz
word for the industry back then.
We need the same effort today, in terms of security
controls and security mechanisms. Bring those controls and
mechanisms to the point where the average user could use them.
I think that is sort of a near-term, by ``near-term'' I mean a
2- to 3-year effort that could show some results, significant
results, major results in that period of time.
Mr. Turner. I forget the name of the group or company that
is certifying whether something is secure or not. I read about
it somewhere. Is that the kind of thing that would motivate the
private sector to be sure they develop their products in a way
that they can be secure?
Mr. Pethia. I think that kind of thing will certainly help.
I think the tension is going to be between the length of time
it takes to do the evaluations and the market forces that keep
driving new products. Very often, the situation of doing an
exhaustive evaluation takes time. By the time you are through
with that evaluation, the marketplace has already moved on to
the next generation of products. I think we have to struggle
with that issue.
Mr. Turner. That seems to be one of my greater concerns
because this field moves so fast. It is always the private
sector that is moving forward. We had some government effort
over there, though it is not in one place right now. It seems
that the government effort, even if we consolidate it, is
always going to be a step behind what is really going on in the
private sector.
So, it is forcing you to try to think of private sector
incentives to try to make this all happen. I cannot get it in
my mind that the government is going to be able to keep up with
it.
Mr. Pethia. I think the private sector interest is rising.
I think as more and more damage happens on the Internet, people
are going to begin to understand that investing in security is
something they are going to need to do in order to keep their
businesses operational. So, I think that is happening. I see a
big increase in private sector interest today, over just a year
ago. That trend has been going on for several years.
I think the marketplace, in my opinion, has become
complacent. The marketplace is currently accepting whatever the
vendors produce. I think an awareness campaign and an
understanding that technology can be changed; technology does
not have to be the way it is today is something that would help
move, first of all, the consumer to a better understanding of
the kind of quality the consumer should expect from a product.
Then finally, the technology producers, as they begin to
see a marketplace for that new product, to begin to produce.
There is a place where I think government campaigns focused on
broad-scale awareness, understanding, helping the consumer,
both in government and outside government, understand that
technology possibilities exist beyond what we have available to
us today, I think, would go a long way to spur that kind of
effort.
Mr. Turner. Is it a reasonable suggestion to think in terms
of a second Internet? After all, we are even getting to the
point where much of what takes place can even be done in a
wireless mode. Is there a reason to consider that there could
be more than one Internet? That there are secure Internets so
that we can solve some of our national security type problems
and others in a way that we know that we are protected?
Me. Pethia. Certainly, I think there are some needs for
high security in some applications where those networks and
systems will remain isolated and should remain isolated from
the broad Internet. I think the last 10 years of history has
told us that the Internet is going to continue to evolve. It is
going to continue to lure people because of the broad
connectivity that is available over th
[106th Congres
because of the dramatic lower cost of operating on this huge
network where everybody shares the expense.
I think the economics are going to continue to push most
organizations toward the Internet. I think the challenge as to
rather than trying to isolate from the Internet, the question
is how do we go about fixing the Internet so that we can all
enjoy the level of security that we need?
Mr. Turner. Your effort at Carnegie Mellon, through the
Computer Emergency Response Team, seems to me to be an
excellent private sector initiative. Do you think government is
capable of duplicating that or will it be best left to efforts
like yours?
Mr. Pethia. I think it is going to take a combination of
efforts. There are within the government a number of computer
emergency response teams in the DOD, in the Department of
Energy, and in some of the other agencies. There is the FedCIRC
activity which we actually participate in. So, I think there is
a large government effort there. One of the advantages that I
think we have is that in addition to the reactive work that we
do, we are also housed in a research university.
So, in the private sector where you can have these kinds of
reactive capabilities to help us understand what the problem
is, but also marry with that a research and development
capability we can move toward solution. That, I think, is a
good combination. So, there perhaps is a way where government
can team with organizations in the private sector, with the
government doing some of the response reactive work, ensuring
that they have close working relationships with technology
researchers so that the researchers really understand what the
real problems are.
Mr. Turner. Thank you, Mr. Chairman.
[The prepared statement of Hon. Jim Turner follows:]
[GRAPHIC] [TIFF OMITTED] T7018.131
[GRAPHIC] [TIFF OMITTED] T7018.132
[GRAPHIC] [TIFF OMITTED] T7018.133
[GRAPHIC] [TIFF OMITTED] T7018.134
Mr. Horn. I thank the gentleman.
Now, I yield to the gentlewoman, the vice chairman from
Illinois, Mrs. Biggert to question the witnesses for 5 minutes.
Mrs. Biggert. Thank you, Mr. Chairman.
If I could ask unanimous consent to include my opening
statement.
Mr. Horn. Without objection, it will be so ordered as read
at the beginning, after Mr. Turner's opening remarks.
Mrs. Biggert. Thank you.
This is a question for all of you. What is the real threat
from cyber terrorists to the Federal agencies' mission critical
systems? I know that is a broad question, but how does the
administration's recently released National Plan for
Information Systems Protection address the plans to mitigate
these terrorist threats? I think when we were talking about
Y2K, we had our mission critical systems. I think that was what
was really addressed there. First of all, is there a threat
from the terrorists?
Mr. Tritak. Well, I think the national plan makes clear
that the threats posed by cyber terrorists as well as nation
states is growing. I would urge you, if you have not already,
to get a briefing by Mr. Michael Vaddis at the National
Infrastructure Protection Center who could give you a lot more
detail, an appropriate level of detail than I can get into. One
of the reasons for PDD-63 stemmed from a Presidential
commission which asked the question, what are the new threats
to the Nation? The cold war is over. It is unlikely that anyone
would be foolish enough again to take on the United States with
armed forces. So, what are they?
That question was initially prompted, of course, by a
number of events that were happening in the mid-1990's, the
Towers' bombing, Oklahoma City. What is going on here? The
recommendation of that commission was to say that the critical
infrastructure of this country are increasingly becoming
vulnerable to types of attacks that could be delivered over the
information super highway.
Why? Because as was indicated earlier, traditional
infrastructures are increasingly relying on computer networks,
not only to receive e-mail, but actually perform operational
functions of their business. As you move further and further
into deregulation, the need to cut your costs to make the
margins up, you are going to be relying more and more on
information technologies to perform functions which
traditionally may have been performed by manual labor for
example.
Also, in the past, if a computer operational system went
down, say in the electric power industry, they have ways of
shifting over to manual type responses in order to keep the
flow of services going. Now, over the long-term, more and more
of those primary functions are performed by information
technology, and if those systems are then networked either
through the Internet or some wide area network systems, the
potential for someone being able to get in and cause damage
increases.
Now, I am glad you also mentioned the critical systems
because this is a very important thing about critical
infrastructure assurance. What we are concerned about are those
systems within our critical infrastructures which, if
disrupted, could cause immediate and significant harm to the
Nation's security, its economy, or the health and welfare of
its people. If someone means to do harm, they are going to want
to leverage their efforts to find weak links in the chain.
So, one of the purposes of the effort that is outlined in
the national plan is to begin to raise this issue with industry
to make clear that this is more than just a hacking problem.
Frankly, they deal with that now. They know that they are being
hacked. Their websites are being looked at. The idea that if
more and more of their business relies on information
technology, for example, banking and finance, e-commerce, where
the very nature of the revenue stream turns on information
technologies. This is a different problem.
The same thing within the Federal Government. There was a
time when you could talk about a computer system within the
Federal Government and it was the agency's system. It was
insular. It was self-contained. Now, like everywhere else, you
are getting inter-connectivity between agencies. They are
depending on different services, both within government as well
as outside of government.
This inter-dependency is one of the newer challenges. An
agency can get their security concerns right, but if they are
dependent upon systems which do not have their security right,
that is where the vulnerability lies. Your types of attacks
which, again, Mr. Vaddis will be in a better position to talk
to you about this, they are looking for the weak links. They
are not simply going to willy-nilly take on any piece of the
information infrastructure. They are going to look for where
the highest value payoff is going to come from.
Mr. Gilligan. I think Mr. Tritak has done a good job of
summarizing the significance of the threat and many of the
characteristics that contribute to it. I would only add a
couple of thoughts. One, I think it is not just linkages
between agencies, but linkages within sites and within agencies
where you find I think unknowingly our interconnection.
We are just about intermeshed in our network connectivity
among systems that we have the same vulnerabilities. I think
second, we really, in my view, have kind of two tiers of
threat. Unfortunately, a lot of our emphasis and visibility is
on what I will call the lower tier, which is a very
unsophisticated, but today, because of the vulnerabilities, is
ineffective and gets a lot of visibility.
Now, I think there is one that is much more sophisticated.
We only get glimpses of it. In many cases, that is something we
do not share a lot of insight. It is almost masked. That is, we
are seeing some of these lower sophistication threats. That is
what we are focusing a lot of attention. I think we need to
because you need to dampen those out of the system before you
can really start to focus and then get the protection that you
need to address the more sophisticated attack.
Ms. Brown. Well, I think both gentlemen have done a really
good job. I would only add that I think one of the key
challenges is not just today's problem, but the ongoing
problem. There is new software every month. There are new
systems every month. So, there is not a single fix, as in the
Y2K, as Mr. Turner and everyone has talked about. There was a
single crisis. There was a single thing that we had to fix.
This is going to be an ongoing problem, and ever more
difficult in many ways to stay on top of as we become more and
more global. So, we need to look at what can we do today, but
also on the more fundamental things to make our systems
fundamentally secure. How do we design the systems and how do
we design the software so it is not up to the user to fix and
put the patches, which will always be there? Somehow, how do we
fundamentally make the system more robust?
Mr. Pethia. I am building briefly on Mr. Gilligan's
remarks; this idea of two tiers of threat. At the lowest level,
and one of my big concerns, and the reason that I am advocating
for increased emphasis on analysis, capability, and data
collection is that the low-level threat, the amount of noise
generated by that threat is now so huge. We literally get 50
new incidents reported to us every day. We are only 1 of 90
emergency response teams, as well as a number of government
agencies who focus on this issue.
There is so much activity out on the network today. It is
very difficult to pull out from all of that noise the one or
two key things that you really need to pay attention to. In
order to stay ahead of this problem, I think we are going to
need to become much more sophisticated in the way we collect
and analyze incidents data. So we can look for those key
indicators that there is something really significant going.
Mrs. Biggert. Thank you. Thank you, Mr. Chairman.
Mr. Horn. Thank you. May I suggest that if we have some
additional questions, that we have a time problem here. A
number of us are involved in things that just go every 15
minutes, starting at around 12:05 p.m. So, if you do not mind,
we would like to submit some of these questions, I know that I
have, to you. Take your time, but we would love to have them in
the record at this point, your best thoughts, if that is OK
with you.
[The information referred to follows:]
[GRAPHIC] [TIFF OMITTED] T7018.135
[GRAPHIC] [TIFF OMITTED] T7018.136
Ms. Brown. Thank you very much for the opportunity.
Mr. Horn. Well, we thank you. The chart here I particularly
want your comments. That is our question 5, for the majority. I
think you have it. Now, this was prepared by counsel, Mr. Ryan.
He is 100 percent Irish. I am only 50 percent Irish. It is not
even St. Patrick's Day. I look at that. I looked for Jesse
Jackson on the floor. It looks like the Rainbow Coalition. He
is serious about this and we are.
So, we would like your best shot at it, in terms of all of
these organizations and how they can work on computer security
issues. The key question still remains on who is coordinating
this operation? Are there various ways, given the private
sector, the Federal sector, the State sector, the local sector,
the non-profit sector? So, if you would struggle a little with
that, we would appreciate it.
Well, thank you very much for coming. We will now swear in
the next panel.
Mr. Horn. We have Mr. Jim Gerretson, Director of
Operations, Information, Assurance, ACS Defense, Inc.; Mr. Mark
Rasch, senior vice president and legal counsel, Global
Integrity Corp.; and Mr. James Adams, chief executive officer,
iDEFENSE.
Gentlemen if you will just stand and raise your right-
hands.
[Witnesses sworn.]
Mr. Horn. The clerk will note all three witnesses affirmed.
We will begin, Mr. Gerretson with you. It will be 5 minutes for
a summary. We are going to have to stick to that. We all have
your papers. If you were not in the room, they automatically go
in at this point in full. If you can give us a summary, and
then we would like to have some questions before noon. Then we
are going to have to break.
So, Mr. Gerretson, it is all yours.
STATEMENTS OF JIM GERRETSON, DIRECTOR OF OPERATIONS,
INFORMATION ASSURANCE, ACS DEFENSE, INC.; MARK RASCH, SENIOR
VICE PRESIDENT AND LEGAL COUNSEL, GLOBAL INTEGRITY CORP.; AND
JAMES ADAMS, CHIEF EXECUTIVE OFFICER, iDEFENSE
Mr. Gerretson. Mr. Chairman and members of the committee,
thank you for giving me the honor of testifying today. I am
here today to give you a brief presentation on hacking. We
believe that in order to start to fix your systems and
networks, that you have to understand the enemy, and hackers
really are the enemy. The following presentation will take you
briefly through what we call the hacker protocol and
demonstrate just some of the tools and techniques used by
hackers to gain access to your systems.
All of the tools that you are going to see today are freely
available on the Internet or you can go to a local computer
show on a weekend and, for $10 per CD, buy a full CD of
different types of hacks. The current data base that we have
contains over 3 gigabytes of data. What you see on the screen
before you is what we call the hacker protocol. Different
people may use different terms, but professional hackers in
nation states that implement hacking as warfare do follow the
same concepts.
The thing that is important to recognize here is this is
highly structured in its approach and in its planning. A good
hack, for better or for worse, is invariably a well-thought-
out, well-executed operation.
Mr. Horn. I might add on that very useful chart that, that
will be placed in the record at this point, without objection.
All other charts will be put in appropriately where they have
been used by the witness or the staff. So, all of those charts
will go in the final hearing report.
Mr. Gerretson. Thank you, sir.
[Slide shown.]
Mr. Gerretson. The first phase of the hacking protocol is
intelligence gathering. This is primarily an espionage
operation. There are many facets to it. Social engineering is a
large part. I may act as a user calling up a help desk and say
I have forgotten my password. Help desks are setup to be very
helpful. They will frequently say, the default password is, or
your network is. So, I get a lot of information that way.
Open source materials such as newspapers, prospectuses, and
library magazine articles are also a wonderful way of getting
information. You hear the term a lot, but ``dumpster diving''
is also a very popular way of getting information on your
system.
[Slide shown.]
Mr. Gerretson. Once we have done the intelligence
gathering, the next step is to do reconnaissance. Again, to
define the target. Your domain host is the name of your
computer system on the network. I want to know what I have got,
see if I can attack it, and how I can attack it. This is what
we are going to show you. It is a freely available program
called NMAP. We are going to take that information that we have
gathered and scan your network to determine what is there. The
program that we are using is called Ping Sweep.
[Slide shown.]
Mr. Gerretson. In simple terms, my computer is going out to
your network and saying, hello, are you there? Your computers
are coming back and saying, yes, I am. What you see here, with
these being listed, are computer targets that have come back
and said, I am here. What we have now done is identified a
target set. We are not wasting our time.
[Slide shown.]
Mr. Gerretson. The next slide, we are going to take one of
those targets that we have identified and go and look for
additional information. What we are trying to do is find out
what services are open, as you see, I am pointing out. These
are all considered services on a computer. This one, for
example, is finger, which we will talk about in a second.
What we are doing is finding a means to attack your system.
We are also going to go out to try to find out the operating
system that your computer is running which is again identified.
Once we have this information, we can now go and do specific
probes. What we are going to do is take that information and
look for a way to get into your system.
[Slide shown.]
Mr. Gerretson. This presentation that we are going to show
you now is one of the tools called Finger. It is an information
gathering tool, you are seeing it used in a way it was never
intended to be used. In order to attack and control the system,
you need three things. You need a valid user name. You need a
valid password, and you need a host address from the computer
system that is allowed to talk to you.
If you look across here, as I am highlighting ``student
one,'' I now have a valid ID and I now have a valid computer
system that I am talking from. I have two of the three items
that I need to attack this system.
[Slide shown.]
Mr. Gerretson. This next scan, web servers as we are all
aware, are a wonderful target for attack. It used to be that in
order to do the attack, I had to know all of the systems and
all of the vulnerabilities. Now, I have a tool that will run it
for me automatically. It requires very little work on my part.
It identifies the server type that is running and will simply
go out and scan all of the CGI weaknesses on this web system. I
do not even have to know what these systems are now.
I do not have to know what these vulnerabilities are. It
just tells me it finds one. I go out to my tool kit, pull in
this particular attack and away I go. Once we do that, we are
trying to get a toehold on the system. This is basically I just
get into your box any way I can. I cannot control the data. I
do not need it, but I am on it and it gives me the next step.
[Slide shown.]
Mr. Gerretson. The next step is to go from just being a
user into what we call the root or administrator level of the
system then we really do own this box. I am going to skip this
example.
[Slide shown.]
Mr. Gerretson. We are going to go and actually break into
this system and take it over. It acts as a user system. What
this program does is it shows us actually going in and doing an
attack on the system that in a matter of about 15 seconds turns
us into the root administrator of the box, simply from being a
user. Once we have gotten control of the system, there are a
lot things we can do.
We could kill this box. We could take the information. But
what we do want to do is use it again later. So, we are going
to hide our track. We do not want people to know we are there.
We can do that by deleting files or modifying log files. We are
going to show you a quick example of how we just simply modify
a log file.
[Slide shown.]
Mr. Gerretson. This is a program called Wipe. We have a
user account. We are called ``Reacher.'' We get into the
system. If the system administrator were to check his logs, he
would say, why is this guy here. But we have gone and wiped it.
We are no longer there. We are now invisible to the person that
runs this machine.
[Slide shown.]
Mr. Gerretson. We can put Trojans on the system. A Trojan
is a program that will look like something that is a valid
program that is supposed to be there, but in effect it is a
program that does a lot of bad things. In this brief example,
listen. We can record every keystroke you type on the system.
We can turn on your sound system. So, if you have a microphone,
we can record everything that is said in the area, and you will
never know what happened.
[Slide shown.]
Mr. Gerretson. Now, sounds bad and it gets worse. I will
make a bold statement that if you are connected to the network,
and if I have enough time and want to make the effort, I can
hack you. The only sure fire way to protect your system is to
disconnect it from the network. Take out your floppy. Take out
your CD and then lock it up in a secure room. Anything short of
that, eventually it can be had.
It sounds pretty bad, but there is hope. It is not all bad;
just mostly bad. The first thing is you have to have a
vulnerability assessment. You have to know what your security
posture is. Second, we believe in the defense-in-depth
approach. It is vital. There is no single solution to make your
system secure. You have to have layered approachs that
complement each other.
The next thing, training is the key. As the earlier
witnesses said, there are good people out there, but they just
do not understand security. One of the key things to recognize
is the solution that works today may not work in 6 months. You
will never have a final solution. You are constantly
reassessing.
Thank you for your time.
[The prepared statement of Mr. Gerretson follows:]
[GRAPHIC] [TIFF OMITTED] T7018.137
[GRAPHIC] [TIFF OMITTED] T7018.138
[GRAPHIC] [TIFF OMITTED] T7018.139
[GRAPHIC] [TIFF OMITTED] T7018.140
[GRAPHIC] [TIFF OMITTED] T7018.141
[GRAPHIC] [TIFF OMITTED] T7018.142
Mr. Horn. Thank you very much.
We now have our second witness, Mr. Mark Rasch, who is the
senior vice president and Legal Counsel for the Global
Integrity Corp. Perhaps you would like to tell us a little bit
about the corporation.
Mr. Rasch. Yes, thank you, Mr. Chairman.
I work for Global Integrity Corp. It is a company that does
information security consulting work for the private sector.
So, our clients tend to be things like banks, insurance
companies, Fortune 100 companies that take the problem of
information protection. Notice I used the term ``information
protection'' and not computer security. They take that problem
seriously.
What we are trying to protect here is not the computers
themselves, but the information that is contained on those
computers. So, the perspective that I bring is what the private
sector sees as the problem and what the private sector is
trying to do itself to try to solve the problem. One of the
things we noticed is that the Commerce Department issued a
report in the last couple of days that indicates that U.S.
retail e-commerce sales for the fourth quarter of 1999, that is
October through December, was about $5.3 billion.
What has happened is this Internet that we created 20 years
ago is being asked to do something that it was never designed
to do. That is to support a national economy; to support a
national infrastructure that it was never designed to do. So,
what happens is we have this distributed computer network,
which was essentially unsecured. All of the security to that
network is essentially added afterwards.
That is being designed now and being asked to protect the
critical infrastructure. The attacks that we saw a few weeks
ago against Yahoo, Ebay, and others also demonstrated another
problem. As a lawyer, this is one that concerns me much more
than what concerned me about the year 2000 bug problem, from a
litigation standpoint. That is that we are only as secure as
everybody else on the Internet.
As the previous panel discussed, these are targets of
opportunity. People attack systems because they can get in.
They attack the ones that they feel that they can get into.
Also, the fact that even if you have done stuff to harden your
system, people will break into other people's systems and use
those to attack you. So, what we have is a serious looming
litigation problem, or what we would call downstream liability.
If you are attacked by somebody and the attack is coming
from another corporation that did not secure the systems, and
you go to your lawyer and ask, can we sue, which is always the
dumbest question to ask a lawyer because the answer is always
yes. The question is who are you going to sue, the 17- or 18-
year-old hacker, if they are ever identified, or the
corporation from whom you are attacked?
So, the idea of a worldwide web that is dependent upon the
security of everybody else creates targets of opportunities,
not just for hackers, but for lawyers as well. One of the
problems also that we have seen is a massive increase, not only
in the use of the Internet and the use of the Internet for
electronic commerce, but of these types of criminal activity.
For example, from 1998 to 1999, theft of intellectual
property increased from 15 percent. Unauthorized access by
hackers from inside is up 28 percent. Insider abuse to the
Internet is up 17 percent. System penetration by external
parties increased 32 percent. Why is this happening? The first
reason is that attack technologies are becoming very easy to
use. So, as Mr. Gerretson just showed, you can go to any hacker
convention, pick up a copy of this disk, put it in your
machine, and knowing no more than a lawyer, which is a fairly
low standard I would say, put this in your machine and launch
an attack on any computer on the Internet.
You do not need to know a lot. It is point and click and
you are in. So, the tools are getting easier to use. They are
becoming more widely available. In addition, with the growth of
the Internet, you have tens of thousands and probably of
millions of insecure computers out there that are used as
targets of opportunity and methods of attack. The software is
becoming increasingly complex and much more difficult to
secure.
Software manufactures who are building this software are
trying to design it to be functional. If you are coming out
with a new word processing program or you are trying to come
out with a new operating system, and you are under competitive
pressures to get it out to market, you want to make sure that
it is functional. Until companies demand security and the
government demands security as an integral part of
functionality, I do not think the manufacturers are going to
ship these things as being at least more secure.
So, these are some of the problems. What is the private
sector doing? Well, speaking just for Global integrity, we are
doing two things working with the financial services industry,
which I think is a model for both the government and for other
private sector enterprises. One of them is something called the
BITS Laboratory that we are working with the Banking Industry
Technology Secretariat and a consortium of banks.
What they are doing is they are developing a series of
security standards. We at Global, are testing computer
products, hardware, software, and other types of products,
against the security criteria. The idea is that the marketplace
then will say, for example, banks will say unless your software
had been tested against these criteria, we will not buy it.
Unless it is pre-configured to be in a secured manner, we will
not buy it.
So, we are using the marketplace as a method of trying to
ensure security. The second thing is the Financial Services
Information Sharing and Analysis Center [FSISA]. This is
something that we are doing. Financial services industries,
banks, insurance companies, and the like have a secure method
of sharing information amongst themselves about attacks and
vulnerabilities.
Let us face it, they do not want to tell people that they
have been attacked, but they are happy to share information
among themselves, if that will lead to more security. These are
some of the models that are currently in place. We need to do
more in the private sector and in the government sector to help
secure the infrastructure.
Thank you.
[The prepared statement of Mr. Rasch follows:]
[GRAPHIC] [TIFF OMITTED] T7018.143
[GRAPHIC] [TIFF OMITTED] T7018.144
[GRAPHIC] [TIFF OMITTED] T7018.145
[GRAPHIC] [TIFF OMITTED] T7018.146
[GRAPHIC] [TIFF OMITTED] T7018.147
[GRAPHIC] [TIFF OMITTED] T7018.148
[GRAPHIC] [TIFF OMITTED] T7018.149
[GRAPHIC] [TIFF OMITTED] T7018.150
[GRAPHIC] [TIFF OMITTED] T7018.151
[GRAPHIC] [TIFF OMITTED] T7018.152
[GRAPHIC] [TIFF OMITTED] T7018.153
Mr. Horn. Thank you very much.
Our next witness and the last one on this panel is Mr.
James Adams, chief executive officer of iDEFENSE.
Mr. Adams. Chairman Horn and members of the committee, I
want to thank you very much for inviting me here today. Few
revolutions are accomplished without bloodshed. Already as we
plunge headlong into the knowledge age, we are beginning to
receive the initial casualty reports from the front lines of
the technology revolution.
From the headlines, you would think that the recent denial-
of-service attacks were the beginning of the end of cyber world
as we know it. Nothing could be further from the truth. These
were mere in-breaks on the audio-V commerce. Consider instead
that some 30 countries have aggressive, offensive information
warfare programs. All of them have America firmly in their
sights.
Consider too that if you buy a piece of hardware or
software from several countries, among them, some of our
allies, there is real concern that you will be buying doctored
equipment. It will syphon copies of all material that passes
across that hardware or software back to the country of
manufacture.
The hacker today is not just the stereo-typical computer
geek with a grudge against the world. The serious hacker today
is much more likely to be in the employ of government, big
business, or organized crime. Consider the band of Russian
hackers who, over the past 2 years, have syphoned off an
enormous amount of research and development secrets from United
States corporate and government entities in an operation code
named Moonlight Mays television.
I would like to focus on this nexus between the public and
private sectors, and on the government's efforts to respond to
the growing threat. A couple of illustrations to begin; 20
years ago, some 70 percent of all technology development was
funded by the public sector. Today, that figure is under 5
percent. In other words, in the course of one generation, every
government agency should have changed how it does business.
Has that happened? No. Looking ahead for that same 20-year
period, we will see the following. The ordinary computer that
you have on your desk will have the computing capacity of the
human brain. At the same time, research offers the possibility
of our ability to manufacture perfectly the human body. So, in
the course of a generation, our view of life, death, family,
society, and culture, the bed rocks of our way of life down
this century will have changed forever.
Is government or the private sector thinking and planning
for such fundamental change? No. One further point; the pace of
the revolution is accelerating rapidly. Yet, the pace of change
within government seems to be exactly the same today as it was
10 years ago. How has the government responded so far? Well,
there has been the usual President's Commission and then the
Principal's Working Group, then the bureaucratic compromise
that nobody really wanted, and then the national plan which
arrived 7 months late and was not a plan at all, but an
invitation to further discussion.
[Chart shown.]
Mr. Adams. These two charts that I brought today illustrate
the current chaos. What you see is a totally disorganized
organization chart. One that, if it were in the private sector,
would be a sign of eminent bankruptcy. You see no clear
leadership. You see duplication of efforts; the waste of
billions of dollars of taxpayers' money, and the struggle by
stovepipe agencies to retain power, influence, and money.
In other words, there is no coherent strategy and the
tactics are not about winning a war, but about preserving turf.
There are, of course, some notable exceptions to this. You have
heard from one of them today, John Tritak. What is needed today
is an outside entity with real power to implement drastic
change in the way government approaches technology and the
underlying security of its systems.
What is needed most is a personal entity that would draw on
skill sets in many areas that will overlap those of the CIO,
CFO, or CSO, and most of the other officers or entities in any
organization. Let us give this new person the title of chief of
business assurance. He or she would be in charge of the Office
of Business Assurance. Business assurance is more than
security, more than technology, and more than a combination of
the two.
It is an understanding of the whole environment and what
that means for a business or a public sector operation. The
CBA's task would be to continuously gather and synthesize
infrastructure-related trends and events to intelligently
evaluate the technological context within which the
organization operates, to identify and assess potential
threats, and then to suggest defense action.
Viewed from the positive side, to assess the technological
revolutions' opportunities and propose effective offensive
strategies. The Office of Business Assurance must be a totally
independent organization with real teeth and real power within
government. There is much in common between government and
industry when it comes to the challenges and the opportunities
that the technology revolution poses.
Both sectors face a common threat. Both sectors share
common goals. Both employ technologies that are, in essence,
identical. Both must work together to protect each other. I
will leave you with this thought. You will employee total
transformations of the way business and government is conducted
internally and externally going forward. We have heard a great
deal in recent months about the potential of a digital divide
that is developing between the computer-haves and the computer-
have-nots.
I believe there is another digital divide that is growing
between the American Government and its citizens. If this
committee's efforts do not move forward in changing this
culture inertia, there is real danger that the digital divide
that exist between the government and the private sector will
only widen. We cannot afford a situation where the governed
feel that their government is out of touch and increasingly
irrelevant to their lives.
Thank you.
[The prepared statement of Mr. Adams follows:]
[GRAPHIC] [TIFF OMITTED] T7018.154
[GRAPHIC] [TIFF OMITTED] T7018.155
[GRAPHIC] [TIFF OMITTED] T7018.156
[GRAPHIC] [TIFF OMITTED] T7018.157
[GRAPHIC] [TIFF OMITTED] T7018.158
Mr. Horn. Thank you. All three of you have made some really
excellent suggestions. Let me start some of this query. Let me
note that, Mr. Rasch, you were very active before you took your
current job. You were a trial attorney with the Fraud Section
of the Criminal Division of the U.S. Department of Justice. You
left the Department in 1991. You were the sole attorney in the
Computer Crime Unit. That was on a part-time basis.
The Computer Crime and Intellectual Property Section of the
Department of Justice today consist of 18 attorneys. The
Internet consisted of perhaps 60,000 computers. Then you have
made some very thoughtful things. Let me pursue this. I turned
to Mr. Ryan, the counsel to the subcommittee, when you were
testifying. I said, let us draft a bill that would make this
simply illegal.
Now, how does the Justice Department, what does it use to
be able to get after hackers now? What laws? Do you need new
legislation which would ban them and get those out of here?
Mr. Rasch, the principal statute that exist to prosecute
Federal computer crimes is 18 U.S.C. Section 1030, which is the
Federal computer crimes statute. That focuses on activities.
For example, intentionally accessing a computer without
authorization or disrupting authorized access to a computer.
So, for example, the recent attacks and the denial-of-service
attacks squarely come within the ambit of that statute and are
being aggressively investigated and could be prosecuted under
that.
Mr. Horn. Is there any first amendment concerns on this?
Mr. Rasch. Probably not. This is action and not speech.
Although just as burning down a building may be an expression,
it is certainly is not a protected expression. There are some
first amendment concerns in the area of encryption and some
legislation. There is some case law on the question of whether
or not software itself acts as a form of expression. That
relates to these type of hacker tools.
The dissemination of hacker tools themselves; whether or
not that type of dissemination is criminal. There are really
two separate statutes that could be used there. One is the
Digital Millennium Copyright Act which passed last year, which
is right now being used in a civil lawsuit against the people
who attempted to reverse-engineer the DVD codes to allow them
to pirate software and things like that.
So far, it has withstood a challenge on Constitutional
grounds. The second one would be 18 U.S.C. Section 1029 which
makes it illegal to disseminate what are called access devices,
which could be such things as passwords and things like that.
Mr. Horn. Any comments on those?
Mr. Adams. I think you raise an interesting, Chairman. I
would just make this in addition to what Mark was saying. There
has been a great deal of focus on law enforcement. Of course,
law enforcement has a prominent role to play in this. The speed
of the revolution is such that, that is very much after the
fact, obviously. An event has occurred. We failed and therefore
we have to do something about it.
By the time somebody is caught and prosecuted, the
revolution has moved several steps forward. So, we need to
think about what does the prevention look like in the globally
virtual environment in which we find ourselves. Then if that
fails, of course you need something to follow that up. The
first step has to be a much more comprehensive approach to
prevention, warning, intentions, good intelligence, and so on.
Mr. Horn. At this point, I am going to turn the Chair over
to the vice chairwoman, Mrs. Biggert, the gentle woman from
Illinois. I, unfortunately, have other commitments that I have
got to do. I want Mr. Turner and Mrs. Biggert to get all of the
questions out that they can. So, thank you particularly for
functioning and coming here.
Mrs. Biggert [presiding]. Mr. Turner, you are recognized
for questions.
Mr. Turner. Mr. Adams, you were showing us your two charts
here, which I guess were designed to display the multitude of
efforts within various Federal agencies to deal with
information system security. Rather than look at that as a
failed effort, I guess it shows that every agency is struggling
to try to keep up with the problem.
There are obviously some things that we ought to do to
consolidate the effort. This battle is so dependent upon
technical expertise. One of the battlefields where we should be
fighting on is to figure out how to train people to work for
the good guys. There are probably people within these Federal
agencies that are noted to be outstanding technical experts
that do good work in trying to find solutions and trying to
make the systems secure.
Are we going to be constantly behind the curve in terms of
what government does? I think it is probably difficult to
attract the best and the brightest to the public sector. I am
sure that Global Integrity and others of the world are going to
be reaching out and trying to pay the salaries necessary to
attract the people who could really create the defensive
mechanisms you need.
Mr. Adams. I think those are very good points. We clearly
face a very difficult dilemma. The government is at the front
line here, as is the private sector. The private sector, my
largest number of recruits come from government agencies. The
private sector is hiring the best and the brightest and moving
forward very quickly. Clearly, there needs to be a relationship
between the public and private sector. Look, for example, at
what the CIA is doing to try and keep itself up to speed with
the pace of technology change.
It is doing that by establishing essentially a venture
capital arm that is the interface between the public and
private sector. So, you have that on the one hand; different
ways of doing it. On the other hand, something that the Federal
Government can do dramatically different is push education into
the system, so that what we are doing is seeding the next
generation and the generation after that to keep itself up to
speed.
The Federal Government is going to be an enabler. It is not
going to be able to mandate very much. This revolution is
occurring outside of its orbit. So, it can do a lot of things
to influence it. It needs to, I think, do that more creatively
so that it is seeding the population. We have tremendous
shortages of skills at the moment in the whole area of
computers, and computer security, information security, and so
on.
So, how to tackle that more creatively and aggressively is
going to be a very important issue which is partly where it all
comes back to leadership. You need to have a more creative and
push-through process than we have at the moment.
Mr. Turner. If you were to have a free hand at creating an
entity that would do that, what would it look like?
Mr. Adams. Well, I think what the lesson we have learned in
this revolution from the private sector is that if you take an
old economy company and you try and transition it to the new
economy, this will largely fail. What you have to do is do the
Apple Computer model. You setup a new building, different
people, and put a pirate flag on the roof. They developed a
culture and they forced something else into the system, which
is why this idea of a Business Assurance, some sort of entity
that sits outside of the Federal Government that is able to
communicate effectively with the private sector and with the
public sector and force through change.
What those charts illustrate is, as you rightly say, lots
of people try to fix it. These are people of good will, by and
large. They are unable to move collectively aggressively
enough. They are falling further and further behind in the
revolution, which is this disconnect. It is very dangerous in a
democracy. So, if you can have a way of driving through change,
something with real power, the Koskinen model, but with muscle,
not just please will you all sit around the table.
If you do not do this, you will be held accountable for
failure. That is something where there is an opportunity
perhaps because it is the private sector that has the expertise
and the energy. That is going to continue to be the case. That
is just going to be a fact of life. So, much better to try and
figure out a way to bridge that gulf, rather than say, well, we
can actually fix it all ourselves. It is all about a
partnership between the private and the public sector, making
that work and then driving it into the public sector.
That is the trick for you all to try and come up with a way
of creating something very muscular that will force change,
rather than saying, well, let us get around to it in another
couple of years. Too late.
Mr. Turner. Although we obviously have to let the CIA do
their own thing, would that kind of model work for the rest of
government?
Mr. Adams. I think it is too early to say at the agency.
Clearly, what we know is that they are bringing some
interesting technology back into the system. The problem comes
then is this is a voluntary exercise. We found this really cool
stuff. We think you should use it. Can the culture be forced to
change? The CIA is a very inert bureaucracy like a lot of
government agencies. Will that drive it through?
I think it is an interesting model in creating the place
for dialog, but it is a difficult challenge. For example, there
is a government agency that is currently revising its ways of
procuring things, trying to keep on the front of technology. It
feels that it is making a big step forward by doing changes in
2 years; design and implementation in a couple of years. My
company is not into design and implementation in 90 days. I
cannot afford to do it because I am losing market share.
So, how do you change that culture to a place which is much
more reflective of what is happening in the private sector? It
is a very difficult challenge. It has to, I think, have
somebody. You are talking about very big picture stuff here;
billions, and billions, and billions of dollars, where you have
a single entity that says you do this my way or it is not going
to happen; so forcing it.
This is very counter-culture to the way governments
traditionally work. One of the great strengths of democracy and
the great strength of government entities is that they slowly
evolve. They move forward to match a pace. Well, in a
revolution that is very hard because you cannot afford to
evolve in the same way. You have to either become a
revolutionary or you get swept away. We have seen examples of
that throughout history.
That is why this is both a dangerous and a very challenging
time; dangerous because it can threaten the institutions that
provide stability, but a tremendous opportunity for America as
the leading Nation in the world to move with the revolution,
embrace it, and drive it forward. The government and the
private sector have to come together somehow to make that so.
Mr. Turner. Thank you.
Mrs. Biggert. Thank you. Mr. Gerretson and probably Mr.
Rasch, how vulnerable are home computer users? You mentioned
that the whole Internet is only as secure as the most
vulnerable link. Then after that, if after they surf the web
and turn off their modems, are there still risks to the system?
Mr. Gerretson. I will take the first shot at that. The
first answer is if you are on a dial-up modem, you are
vulnerable while you are connected. Cable modems and DSL are
widely becoming available now. They are always on. I run a
private network at my house. I have a firewall. Every night I
have probably six to eight of what I call drive by shootings
where somebody comes and just tries out my system to see if
they can get a hold of it.
The answer is they are very vulnerable. There is very
little protection on them because it sits on there. Without
that firewall, I probably would have been one of what they call
the zombie machines attacking Yahoo and would have never known
it. As the cable modems and the DSLs get more and more
ubiquitously available, it is a huge problem.
Mr. Rasch. I would mirror that. We did a study at Global
where we left a cable modem on at a home PC and simply tested
it to see how many times, without a firewall deliberately, to
test to see how many times it was attempted to be attacked. We
found that in 1 month, almost 6,000 attempted attacks on a home
PC.
What was interesting about that study, however, was the
fact that these attacks were coming from Eastern Europe, from
Africa, from Asia, as well as from the United States. So, these
are coordinated concerted attacks on any computer that they can
find on the Internet. That would include home PCs in the
always-on mode; particularly, those on DSL connections or cable
models.
Mrs. Biggert. So, in theory, these really then could lead
you into, let us say, a Federal agency through those computers?
Mr. Rasch. Absolutely.
Mr. Gerretson. That is right.
Mrs. Biggert. OK. Then we talked in the first hearing about
this chart with the yellow bubbles at the top and sides
representing the executive branch, and then those organizations
that also have a stake-hold in the Federal computer security.
[The information referred to follows:]
[GRAPHIC] [TIFF OMITTED] T7018.159
Mrs. Biggert. So, to me, it looks very similar to your
chart, Mr. Adams. The problem is that we have kind of a blank
in the middle. So, would you all agree that we need an outside
coordinator to be in control of this to coordinate all of our
efforts?
Mr. Gerretson. Well, ma'am, I would say that my first
question when I saw this chart and I was talking to Mr. Ryan
about this is, who is coordinating the coordinators? It seems
to be somewhat disorganized. I would like to make one little
statement about that. The one advantage that the Federal
Government has is that they know they are screwed up. We do a
lot of commercial work.
If you get outside of the IA Groups, they do not even know
they are in trouble. So, yes, you are lagging behind, in some
cases, but, at least you know you are lagging behind. That is
kind of contrary in view, but there are advantages to what you
are doing. This is a problem.
Mr. Rasch. What I see as the problem is a definition of
function. What we really need somebody to do is to say, not so
much just coordinate the efforts, but say, alright, testing.
That is NIST. For developing new technologies, that is somebody
else. Basically, not so much coordinating, but defining who has
what roles. One of the things that happened with the
development of the Computer Emergency Response Team at Carnegie
Mellon, the CERT Team, it was a wonderful idea, and remains a
wonderful idea, and works very well.
Now, we have dozens, and dozens, and dozens of computer
emergency response teams. The problem with that is it is like
living in a town that has 20 different 911 numbers. So, you run
into a problem of who are you going to call. So, you need to
really define the functions first and then decide who is going
to coordinate between and among those functions.
Mrs. Biggert. This has been very interesting. Obviously,
you have heard the bells. We have another vote. So, I think
that we will have to adjourn at this time. We will be having
several more hearings. I know that we will be pursuing this
more in-depth. I agree with you that we are behind and we need
to look at this problem. I think that this has been a great
start for this committee. So, I really appreciate you all
participating and look forward to asking more questions of you,
I am sure, in the future when we get into this.
So, without more, this committee hearing is adjourned.
[Whereupon, at 12:05 p.m., the subcommittee was adjourned.]