[Congressional Record: June 11, 2008 (House)]
[Page H5280-H5287]
RESOLUTION RAISING A QUESTION OF THE PRIVILEGES OF THE HOUSE
Mr. WOLF. Madam Speaker, pursuant to rule IX, I rise to notify the
House of my intention to offer a resolution as a question of the
privileges of the House.
The form of my resolution is as follows:
Directing the Chief Administrative Officer and the Sergeant
At Arms of the House of Representatives to take timely action
to ensure that all Members, committees, and offices of the
House are alerted of the dangers of electronic attacks on the
computers and information systems used in carrying out their
official duties and are fully briefed on how to protect
themselves, their official records, and their communications
from electronic security breaches.
Understanding that the Clerk will finish the rest of the resolution,
I ask unanimous consent that it be considered as read.
The SPEAKER pro tempore. Without objection, the reading is dispensed
with.
There was no objection.
Mr. WOLF. Madam Speaker, I call up the resolution just noticed.
The SPEAKER pro tempore. The Clerk will report the resolution.
The Clerk read as follows:
H. Res. 1263
Whereas beginning in August 2006, several of the computers
used by Congressman Frank R. Wolf, a Representative from the
Commonwealth of Virginia, in carrying out his official and
representational duties were compromised by an outside
source;
Whereas the Chief Administrative Officer of the House of
Representatives, acting through House Information Resources
(HIR), alerted Congressman Wolf to this incident and cleaned
and returned the compromised computers to the Congressman's
office;
Whereas since this attack, it has been discovered that
computers in the offices of other Members, as well as in the
office of at least one committee of the House, have been
similarly compromised;
Whereas in subsequent meetings with HIR and officials from
the Federal Bureau of Investigation, the outside source
responsible for these incidents was revealed to be located in
the People's Republic of China;
Whereas according to HIR, when Members use Blackberry
devices or cell phones while traveling overseas, especially
in nations in which access to information is tightly
controlled by the government, they are at risk of having
their conversations or other personal information recorded or
collected without authorization;
Whereas HIR, the FBI, and the House Security Office briefed
the affected offices on the security breaches that have
occurred, and have done a good job in attempting to protect
other offices of the House from similar threats; and
Whereas it is nevertheless not clear that all Members,
committees, and other offices of the House are aware of the
existing threats against the security and confidentiality of
the electronic records of their offices or their overseas
electronic communications, nor is it clear that Members and
other House personnel have been fully briefed on how to
protect themselves, their official records, and their
communications from electronic security breaches: Now,
therefore, be it
Resolved, That the Chief Administrative Officer and the
Sergeant at Arms of the House of Representatives, in
consultation with the Director of the Federal Bureau of
Investigation, should take timely action to ensure that all
Members, committees, and offices of the House are alerted of
the dangers of electronic attacks on the computers and
information systems used in carrying out their official
duties and are fully briefed on how to protect themselves,
their official records, and their communications from
electronic security breaches.
The SPEAKER pro tempore. The resolution qualifies.
[[Page H5281]]
Pursuant to the rule, the gentleman from Virginia (Mr. Wolf) and the
gentlewoman from California (Ms. Zoe Lofgren) each will control 30
minutes.
The Chair recognizes the gentleman from Virginia.
Mr. WOLF. I yield myself such time as I may consume.
(Mr. WOLF asked and was given permission to revise and extend his
remarks.)
Mr. WOLF. Madam Speaker, in August 2006, four of the computers in my
personal office were compromised by an outside source. This source
first hacked into the computer of my Foreign Policy and Human Rights
staff person, then the computers of my Chief of Staff, my Legislative
Director and my Judiciary Committee staff. On these computers was
information about all the case work I've done on behalf of political
dissidents and human rights activists around the world. That kind of
information, as well, everything else on my computer, e-mails, memos,
correspondence and district case work, was open for outside eyes to
see.
I'm aware that the computers in the offices of several other Members
of the Congress were similarly compromised, as well as a major
committee, the Foreign Affairs Committee. That means the computers in
the House Foreign Affairs Committee have been compromised. It is
logical to assume that critical and sensitive information about U.S.
foreign policy and the work of Congress to help people who are
suffering around the world, was also open to view from those official
computers.
In subsequent meetings with the House Information Resources and the
FBI, it was revealed that the outside sources responsible for this
attack came from within the People's Republic of China. Just so it's
understood, they acknowledged that this attack came from within the
People's Republic of China.
The cyber attacks permitted the source to probe our computers to
evaluate our systems defenses and to view and copy information. My
suspicion is some say that I perhaps was targeted by the Chinese
sources because of the history of speaking out about China's abysmal,
very abysmal human rights record.
My offices' computers were cleaned and returned to me by House
Information Resources, but ever since this happened, I've been deeply
concerned that this institution, the institution of the United States
Congress, is definitely not adequately aware of or protected from these
types of threats.
I've also learned that this threat exists not only here in the
Capitol complex, but also when Members travel overseas. I've been told
that, particularly in countries in which access to information is
tightly controlled by the government, Members are at risk of having
their conversations and information recorded or stolen from their cell
phones and Blackberry devices. That means, when a Member of the House,
the Senate or the administration goes abroad, goes to China,
everything, and if they use their cell phone or they use their
Blackberry, it's being recorded by the Chinese government. And I don't
believe any Member of the Congress has been told of that.
As I've shared my office experience with other Members, it has become
clear to me that many Members and committees of other offices in the
House do not fully understand the extent of the threat against the
security of their offices and how to protect themselves.
I have no information to confirm this, but it would be realistic that
the Senate may also be at risk.
The committees in both Chambers on Government Reform, Intelligence,
the Judiciary Committee, the Armed Services and the Homeland Security
should have hearings on this issue. This is an issue that must have
public hearings, as well as closed door and private hearings.
That is why, Madam Speaker, I'm here today on the House floor. I'm
speaking out about the threat of cyber attacks from China and other
countries on the entire U.S. government, including our military,
because of my deep concern about maintaining the security and the
integrity of our government.
According to a report from the Congressional Service, and I quote,
``U.S. counterintelligence officials reportedly have stated that about
140 different foreign intelligence organizations regularly attempt to
hack into the computer systems of U.S. government agencies and U.S.
companies.''
{time} 1715
This happens with alarming frequency, according to a recent Business
Week article entitled ``The New E-spionage Threat.'' This article
states that U.S. Government agencies reported almost 13,000 cyber
security incidents in fiscal year 2007, triple the number from just 2
years earlier.
The May 31 cover story of the National Journal, the respected
National Journal, says, ``The Chinese Cyber-Invasion,'' and every
Member should read it, titled the ``Chinese Cyber-Invasion'' reported,
``Electronic devices by the U.S. Commerce Secretary Carlos Gutierrez
and his party during a December 2007 visit to China were invaded using
spyware that could steal information.'' Gutierrez was in China with a
high-level delegation to discuss trade-related issues.
Now, this Congress said it's concerned about trade-related issues
with China, and that's why he was there, such as intellectual property
rights, consumer product safety, and market access. The Associated
Press also reported on the breach. Why did we learn about this in the
press instead of from our own government officials? Did our government
do anything about this attack? Did they get information from Secretary
Gutierrez that could be used against American business in negotiation
of trade agreements?
China, in particular, is actively engaged in espionage against the
United States. I recently had the opportunity to read, and I hope every
Member of the Congress has read, the U.S.-China Economic Security
Review Commission's classified report--it is in the House Intel
Committee--to the Congress and found the report's conclusions to be
very alarming. The report addresses China's activities in the areas of
espionage, cyber warfare, and arms proliferation. I strongly urge all
Members of the House to read this report as it gives a clear picture of
the threat that China poses, the threat, and in their words, that China
poses to our national security.
In fact, the Pentagon's 2008 annual report to Congress stated that
``in the past year, numerous computer networks around the world,
including those owned by the U.S. Government, were subject to
intrusions that appear to have originated within the People's Republic
of China.''
According to the Business Week article in 2007, the U.S. Government
launched a classified operation called Byzantine Foothold to combat
sophisticated new attacks that were compromising sensitive information
at the State Department and a defense contractor, such as Boeing, the
source of which U.S. officials allege is China.
The Business Week article states that computer attacks have targeted
sensitive information on the Internet works of at least several Federal
agencies: the Defense Department, the State Department, the Energy
Department, the Commerce Department, the Health and Human Services
Department, and the Agriculture Department, and the Treasury
Department. Defense contractors Boeing, Lockheed Martin, General
Electric, Raytheon, and General Dynamics have also been targeted.
Despite everything we read in the press, our intelligence and law
enforcement, national security, and diplomatic corps remain hesitant to
speak out on the problem. Perhaps they are afraid that talking about
the problem will reveal our vulnerability. In fact, I have been urged
not to speak out about this threat. But our adversaries already know we
are vulnerable. Pretending that we are not vulnerable is a mistake.
As a Nation, we must decide when we are going to start considering
this type of activity a threat to our national security and the men and
women who serve in the Armed Forces, a threat that we must confront and
which we must protect ourselves.
Madam Speaker, the apparent lack of national urgency to address this
problem only gives those who wish us harm an extra advantage.
The Government Accounting Office reported in 2007 that no
comprehensive strategy exists yet to coordinate improvements of
computer security across the Federal Government in the private sector.
[[Page H5282]]
I strongly believe that the appropriate officials, including those of
the Department of Homeland Security and the FBI, should brief all
Members of Congress in a closed session regarding threats from China
and other countries against security of House technology including our
computers, BlackBerry devices, and phones. There must be a session
where any Member who is interested has the opportunity to get briefed
by the FBI and the Department of Homeland Security and others.
The potential for massive and coordinated cyber attacks against the
United States is no longer a futuristic problem. We must prepare
ourselves now and develop procedures for responding to this threat.
Members need to know how best to protect themselves, their staff, and
their official business from these threats. I have experienced this
threat firsthand, as have others in the Congress, and are deeply
worried that this institution, the United States Congress, is not
adequately protected.
Congress should take the lead in protecting our government and indeed
our country from the threat posed by cyber espionage activities.
James Lewis, the director of the Technology and Public Policy Program
at the Center for Strategic and International Studies remarked last
year in testimony before the House committee on Homeland Security that
``If gangs of foreigners broke into the State or Commerce Department
and carried off dozens of file cabinets, there would be a crisis. When
the same thing happens in cyberspace, we shrug it off as another of
those annoying computer glitches we must live with.''
The apparent complacency in both the private and public sectors
toward this threat is astonishing. We must know about the threat. We
must speak out about how to protect ourselves and form a comprehensive
strategy with which to respond.
Stephen Spoonamore, a CEO of a cyber security firm called Cybrinth,
put the matter succinctly in the National Journal article. He said,
``By not talking openly about this, they are making truly a dangerous
national security problem worse . . . Secrecy in this matter benefits
no one. Our Nation's intellectual capital, industrial secrets, economic
security are under daily and withering attack. The oceans that surround
us are no protection from sophisticated hackers, working at the speed
of light on behalf of nation-states and mafias.''
We must cease, Madam Speaker, this Congress must cease, the
administration must cease denying the scope and scale and risk of the
issue. And he goes on to say a growing number of his peers ``believe
that our Nation is in grave and growing danger.''
Mr. Spoonamore is right. We are making this dangerous national
security problem worse by not discussing it openly. I believe this
institution, as my resolution states, should get the facts, and armed
with these facts, should take the necessary action to protect the
safety and integrity of the House.
In 1789, Madam Speaker, British Parliament member William
Wilberforce, speaking to his colleagues about the slave trade, said,
``having heard all of this, you may choose to look the other way, but
you can never again say you do not know.''
This Congress on both sides of the aisle and people in the
administration can never again, can never again say you do not know;
and the American people should ask their Members of Congress, Do you
know and what are you going to do about it.
We cannot afford to look the other way when foreign sources are
threatening to compromise our government institutions, our economy, our
very way of life through cyber espionage. We cannot sit by and watch. I
urge the adoption of the resolution.
I reserve the balance of my time.
Ms. ZOE LOFGREN of California. Madam Speaker, I yield myself such
time as I may consume.
I will note that I have had a chance to discuss this resolution with
Congressman Wolf. At the conclusion of our discussion, we will refer
this resolution to the House Administration Committee where we will do
the appropriate follow-up, and I personally plan to keep in touch with
the author of the resolution so that the concerns that he has are fully
addressed.
I will just note that when the new majority was elected to the House
and I was then appointed to the House Administration Committee, one of
the first things I did was to ask to be briefed on our cyber security
situation in the House. And I did receive that report. Certainly some
things had been done. But more, in my judgment, needed to be done, and
we have followed through on that.
I will say that both the Speaker and Leader Boehner have met with the
House computer security officials and were told that the sophisticated
technology that we do have in place is going to prevent and detect
intrusions, but it depends on Members doing what they need to do to
work within our security environment.
We have security system programs in place that safeguard against
unauthorized system access and disclosure of data, system controls that
are in place to identify, verify trace authorized and unauthorized user
activity, and to prevent unauthorized modification or destruction of
House data.
Chairman Brady has ordered an immediate implementation of additional
protections. He's also directed House personnel to work with the FBI
and other security agencies to ensure that necessary steps are taken to
safeguard House systems. These improvements will help ensure that House
network and data remains protected from harm.
In addition to these efforts, the House has instituted a working-
smarter series, and we have had actually briefings for staff in the
congressional offices asking those staff in Member offices to come in
and become aware of the cyber security steps that they need to take in
each Member's office. I don't know that every Member has had full staff
participation in that, and in discussing this with Mr. Wolf, it would
be my intention, perhaps working with Mr. Langevin who is chairing the
Homeland Security Subcommittee on Cyber Security, to ask the Democratic
caucus and the Republican conference to meet and to highlight this
issue so Members will know.
I mean, some Members know all about it, and apparently some Members
didn't know enough about it; and I'll take that admission very
seriously.
What more do we need to do? Well, we have sophisticated firewalls in
place today that monitor all incoming network traffic. We have an
intrusion-detection system, and we have multiple anti-virus and spyware
programs. That's important because you want redundancy and overlap. You
don't want to rely on just one system. We also have--you may have seen
in some of the hallways--teams monitoring wireless systems. It's a kind
of antenna they're waving around. They're trying to detect unauthorized
wireless setups that are a potential problem for our security.
What further can we do?
Well, we have tried to insist that Members use more vigorous passport
protection schemes. And one of the things we're looking at is instead
of asking Members, forcing Members to do that. Now we get pushback when
Members are told what to do in their individual offices, but I think
that's one of the things that we need to talk about.
Another thing we're looking at, and this was an issue in the
intrusion mentioned a minute ago, is whether we're updating our virus
software and whether the patches to this software have been uploaded.
And Members don't do it. A lot of times Members just neglect to do it.
If you don't put the patches in, you're just bare. So we're thinking
about maybe centralizing that function. Again, some Members may not
like that, but you've got it one way or the other. I mean, you can't be
concerned about intrusion if we don't take the steps necessary to
actually protect ourselves.
We also are looking at additional encryption efforts, enhancing our
real-time monitoring by the security office, and potentially
implementing a digital rights management scheme.
Now, I just want to talk a little bit about Member responsibility.
If Members are going to access Web sites in China, you're engaging in
risky behavior, and it may be necessary for some Members who are
monitoring human rights to do that. I accept that. But it is not a good
idea to visit a Web site in China with the computer that's networked
with all of your sensitive data on board because if you do, you're
going to get malware, and you are
[[Page H5283]]
going to lose your data to whoever has put that malware on the site.
So I would strongly suggest, and this is a teachable moment, that if
Members feel a need to monitor Web sites in China and other countries,
that they get a laptop, get an air card, don't put any other sensitive
data on it and monitor to your heart's content, but don't leave
yourself vulnerable to your data being removed.
{time} 1730
No doubt there are root kits, there are bot nets that are going to be
infecting your computer and potentially even turning them into zombie
computers. Additional things that we want to look at is data leakage
protection and some security assessments which is actually going
underway right now.
Just a word on cyber security generally, which Mr. Wolf has
mentioned. In the 108th Congress, I had one of the best experiences in
my congressional career of serving with Mac Thornberry who chaired the
Cyber Security Subcommittee. I was the ranking member, and we worked
really hard that Congress together. I think it was the only
subcommittee, the end of the Congress, we didn't have majority report
and a minority report. We had one report that reflected both of our
views, and the view was that the Federal Government was way behind in
what we needed to do on cyber security.
I remain a member of the Homeland Security Committee. I serve under
Mr. Langevin's chairmanship on the committee with cyber security
jurisdiction. We have had many, many public hearings, in addition to
classified briefings, on the real deficiencies in our cyber security
environment in the Federal Government, and I will tell you, I am
frustrated to this very moment that so little has been done to keep us
safer. Frankly, the House of Representatives has much more robust cyber
security than the Department of Homeland Security. That's kind of a
chilling thought, but unfortunately, it is true.
So, at this point, I recognize the gentleman's concern. I certainly
plan on working with you, and I also want to make sure that each and
every Member of this House understands the environment, what their
responsibilities are, what their staffs' responsibilities are,
understand what we've done as an institution, and what the tradeoffs
are going forward in terms of even more vigorous protection.
With that, I reserve the balance of my time.
Mr. WOLF. Before I yield the gentleman 5 minutes, I would say this is
bigger than just the House, though. The computers of the House have
been violated and when Members go abroad, but also, it deals with
people in the administration.
And so I think there need to be public hearings by the Armed Services
Committee and by the Judiciary Committee. This Congress is never
reluctant to hold a hearing on different things. This is a major issue
so it must be broader than just the House Administration Committee.
I yield 5 minutes to the gentleman from New Jersey.
Mr. SMITH of New Jersey. I thank my good friend for yielding.
Madam Speaker, in December of 2006 and then again in March of 2007,
my Human Rights Subcommittee's computers were attacked by a virus that,
in HIR's words, ``intended to take control of the computers.'' At that
time, the IT professionals cleaned the computers and informed my staff
that the attacks seemed to come from the People's Republic of China.
They said it came through or from a Chinese IP address. The attackers
hacked into files related to China. These contained legislative
proposals directly related to Beijing, including the Global Online
Freedom Act, e-mails with human rights groups regarding strategy,
information on hearings on China--I chaired more than 25 hearings on
human rights abuses in China--and the names of Chinese dissidents.
While this absolutely doesn't prove that Beijing was behind the attack,
it raises very serious concern that it was.
Like Mr. Wolf, I too speak out often against the systematic abuse of
human rights by the Chinese Communist government, whether it be
religious persecution, the systematic use of torture, the total absence
of labor rights, press freedom or free speech, and since 1979, the
pervasive use of forced abortion to implement the barbaric one-child-
per-couple policy, the gravest violation of women's and children's
rights ever. So I was deeply concerned that the perpetrators of these
crimes searched the China files on my computers.
It is now coming to light, Madam Speaker, that some other Members may
as well have been attacked, and more needs to be done to combat this
danger. So I thank my friend for offering this very important
resolution.
Madam Speaker, cyber attacks on Congress are only a small, but not
insignificant, part of a much larger pattern of attacks to which the
executive branch, the Pentagon, and American business is the chief
target. I want to recommend, as my colleague Mr. Wolf did a moment ago,
``The Chinese Cyber-Invasion,'' an eye-opening feature article that
recently appeared in the National Journal. There we learn that some of
our top cyber security experts believe that Chinese hackers have
already shown that they can hack down our power grid. The experts
believe that the Chinese hackers have caused power blackouts in the
U.S. One blackout in 2003 was the largest in U.S. history and affected
some 50 million people.
Chinese hackers and cyber warriors are mapping U.S. government and
commercial networks at a rate that in the last 18 months has increased
exponentially. A high-level ODNI official has referred to ``a kind of
cyber militia . . . coming in volumes that are just staggering,'' he
said. The same official said that what makes the Chinese hackers stand
out ``is the pervasive and relentless nature of the attacks.''
Madam Speaker, with enormous aid, comfort and scads of one-of-a-kind
technological assistance from U.S. companies, including Microsoft,
Cisco, Google and Yahoo, the Chinese Government has achieved a huge
qualitative capability to suppress freedom of speech on the Internet at
home and to wage cyber warfare abroad.
Two years ago, I chaired the first congressional hearing on this
unseemly, dangerous partnership, an alliance that enables the Chinese
secret police to find, arrest, incarcerate, and torture religious
believers and pro-democracy activists in China. Google, for its part,
has become the de facto center for China's ubiquitous anti-American,
anti-Tibetan, anti-religious propaganda machine, while Cisco has made
the dreaded Chinese secret police among the most effective in the
world.
I have introduced the Global Online Freedom Act, which has cleared
all three committees of jurisdiction and is ready for floor action, and
I, again, respectfully ask the leadership to bring it to the floor to
combat this ever-worsening threat. For the Chinese people, it will make
the prospect of freedom and democracy more achievable. For Chinese
dissidents, it's a matter of survival, and for us, it may inhibit the
transfer of technologies that we must prevent from falling into the
hands of the enemies of fundamental human rights.
Mr. Wolf's resolution is a wake-up call, and it alerts us to take
more effective action and thwart disruption and the theft of sensitive
data. I strongly support the resolution.
Ms. ZOE LOFGREN of California. Madam Speaker, I would like to yield
to the chairman of the subcommittee with jurisdiction over cyber
security on the House Homeland Security Committee, Mr. Langevin, 5
minutes.
(Mr. LANGEVIN asked and was given permission to revise and extend his
remarks.)
Mr. LANGEVIN. I want to thank the gentlelady for yielding, and I also
want to thank the gentleman from Virginia for bringing this serious
issue to light.
As chairman of the Subcommittee on Emerging Threats, Cybersecurity,
and Science and Technology, I have spent much of the 110th Congress
focused on issues of information security. In fact, my subcommittee has
held eight hearings and conducted investigations into dozens of cyber
security issues. And while I believe we have made some real progress in
the last year or so, we still have a lot of work ahead of us.
I fully agree with Director of National Intelligence, Mike McConnell,
when he says that cyber security is the most significant national
security issue facing the Nation today, and it's easy to understand
why.
We rely on computers in every aspect of our lives, from our banking
systems
[[Page H5284]]
and our electric grid, to our military and the functions of our
Government. And whether we realize it or not, each of us is dependent
on the effective functioning of computers. For many years, these
systems were largely closed to the outside world, but in the Internet
age, this is no longer true.
In the history of the world, never have so many people had so much
access to ideas, knowledge, and skills. Unfortunately, never before
have so many people also possessed the capability to cause such
catastrophic economic and physical harm to the United States.
Now, this is not a hypothetical threat. In 2007, Vice Chairman of the
Joint Chiefs of Staff James Cartwright told Congress that ``America is
under widespread attack in cyberspace.'' And though we have not seen
the massive denial of service attacks that the Nation of Estonia
experienced last year, the Federal Government and the private sector
have been the victims over the last decade of an extensive and
deliberate espionage campaign that has had a significant impact upon
our Nation.
As Major General William Lord stated publicly last year, ``China has
downloaded 10 to 20 terabytes''--again 10 to 20 terabytes--``of data
from the DOD's unclassified network.'' That's the equivalent of almost
half of the Library of Congress.
American businesses, too, have been dramatically affected. One
estimate suggests that our companies lose an estimated $70 billion each
year due to cyber crime, and individual citizens are far from immune
either. Electronic identity theft affects, as you know, millions of us
every year.
There are a variety of motives for these attacks, but the result is
clear: the weakening security and economic stability of our country.
National security is a nonpartisan issue, and we must all work together
to commit the resources and the manpower necessary to respond to this
threat.
The situation raised by Congressman Wolf today illustrates that while
the House of Representatives has strong information protections in
place, cyber security threats pose a challenge to computer systems
everywhere, and it is an ever-evolving and dynamic threat. And we need
to do all we can to stay out in front of it and ahead of it.
Now, I'm pleased that the House leadership takes this issue very
seriously and is taking action to ensure that House systems are
properly secured, and I especially commend House Administration
Chairman Bob Brady for directing the Chief Administration Officer to
immediately adopt additional protections for House computers.
I also want to commend the gentlelady from California (Ms. Zoe
Lofgren) for her due diligence and passion about cyber security as
well, and I certainly appreciate the working relationship, good working
relationship, that she and I have together.
I am ready to do anything I can to help ensure that our House
information systems are as secure as possible. Recognizing that this
issue is much larger than the House of Representatives, I am also
committed to addressing the broader issues of cyber security across the
Federal domain and the national critical infrastructure.
I look forward to working with my colleagues to ensure that our
Federal Government is educated and prepared at all levels to thwart
cyber attacks and protect the integrity of our networks.
Mr. WOLF. I recognize the gentleman from Illinois (Mr. Kirk), a
member of the Appropriations Committee whose computer was also stripped
from someone in China, for 1\1/2\ minutes.
Mr. KIRK. I want to thank the gentleman from Virginia for this
resolution.
In my judgment, most Members of Congress are quite naive about the
security of their offices against an expert cyber attack from a foreign
intelligence service.
With regards to China, these types of attack are uniquely damaging to
the U.S.-China relationship. While the resolution before us concerns
breaches in the security of House computers, we can assume that the
Senate is also under attack.
The message we would send to China is that such a cyber attack on the
Congress poses unique dangers to the long-term relationship of China
and the United States. We all know that a Member of Congress will soon
be sworn in as a President of the United States in just 7 months. To
the senior leaders overseas that may direct such a cyber attack against
congressional offices, I would ask, What are you thinking? The
intelligence gained would pale in comparison to the damage directly
done to U.S.-China relations.
House Information Systems should dramatically upgrade the protection
of U.S. computers, especially in the House, and offer Members secure
Blackberries to protect against that unique vulnerability. We should
also review other security procedures that should lead the Congress
especially to increase the protection of the White House, the Defense
Department, and the State Department.
I want to commend my colleague Mr. Wolf for bringing this to the
attention of the House and especially the attention of the American
people.
Ms. ZOE LOFGREN of California. Madam Speaker, just a couple of
comments.
In terms of protecting ourselves, I can't emphasize enough, it is
important for all of us to take steps to secure ourselves.
I had an opportunity to take a look. We keep track of this, the
intrusions. I took April by example. The origin of the intrusion in
April, the country that originated the largest number of intrusions
into the House, the United States of America.
{time} 1745
And China wasn't second. So yes, there are intrusions coming from
China, from Russia, from European countries, from our own country, and
we'd better take precautions to protect our data.
You can't protect a BlackBerry. If you take your BlackBerry
overseas--I just thought everyone knew this--and download something,
you are opening yourselves up to a vulnerability. Now, we can take a
snapshot of where your BlackBerry is before you go and see if it's been
compromised while you're gone, but if you're not secure in your
activities, you're not secure in your activities.
And so I take very seriously what you're saying, which is that not
every Member understands this. We have to change that, and I'm going to
be active in playing my part to change that.
Mr. SMITH of New Jersey. Will the gentlewoman yield?
Ms. ZOE LOFGREN of California. I will yield to the gentleman.
Mr. SMITH of New Jersey. I appreciate my friend for yielding.
One of the concerns is, while they may be terrorists or homegrown,
we're talking about and we are very concerned about is that this is the
Government of the People's Republic of China and their enablers, people
who are part of a network, that is very much focused on trying to wreak
havoc and to glean information about dissidents, about legislative
strategy, and about what we know about what's going on----
Ms. ZOE LOFGREN of California. Reclaiming my time, let me just note
that obviously we don't want sensitive information from the government
to be in the hands where it can be compromised. We're not arguing that.
I'm just pointing out that if Members use a computer in their office
that's networked to visit a Web site in China, you can bet--you're
asking for some malware to be put on your computer, and it's going to
take everything that is accessible to the other computers in your
network. And so you shouldn't do that.
When I travel with my laptop, and I sometimes do, you know, I never
hook that laptop into the network of the House. In fact, it's against
the rules to do so. And I don't do it because that would compromise the
computer network. And so I would just note that the Homeland Security
Committee has been very vigorous over the past 5 or 6 years that I'm
aware of, I mean, we don't need a wake-up call, we've been yelling
``fire'' for half a decade and we haven't really been heard by those
who have responsibility in the administration to act. However, we are
moving forward in terms of systems in the House.
What I'm hearing from you, Mr. Wolf, and others, is that Members'
level of information is quite variable on this, and we will take that
seriously and do an effort of outreach on that.
[[Page H5285]]
Madam Speaker, I reserve the balance of my time.
Mr. WOLF. Madam Speaker, I recognize the gentleman from Virginia (Mr.
Forbes) for 2 minutes.
Mr. FORBES. Thank you, Congressman Wolf.
Madam Speaker, I rise in support of the privileged resolution offered
by my good friend from Virginia, but I just want to make clear of one
thing. This is not just about computers in the House of
Representatives. This is about computers and information technologies
all across the country.
China is among the most aggressive countries spying on the United
States. The FBI has stated that China is and will continue to be
America's greatest counterintelligence problem during the next 10 to 15
years.
FBI Director Mueller has testified before House committees that
China's intelligence collection in the U.S. is substantial and ongoing.
The extent of Chinese espionage operations targeting the United States
should worry every single Member that we have here.
And Madam Speaker, the reason it's so important is they don't use the
same techniques that a lot of countries do, they use a much wider
scope. And we understand that economic and industrial espionage cost
American businesses nearly $60 billion in 2005.
Director Mueller has stated that China has established more than
3,000 front companies in the United States whose purpose is to conduct
espionage on Americans. And America's national security, intellectual
property secrets, trade secrets, and infrastructure secrets are all at
considerable risk.
If you look at your own computers, and not just the illegal access,
but next to the United States, the largest number of hits that my
computer has in my office is from China; 14,000 hits. I guarantee you I
don't have many constituents that are residing in Beijing, but it could
have something to do with the fact that I serve on the Armed Services
Committee and chair the China Caucus.
Let me give you two other examples. Chi Mak was a Chinese spy who
worked for a United States defense contractor. In 2005, an FBI wiretap
caught him discussing how to smuggle an encrypted computer disk to
China that had intelligence information that could potentially
jeopardize the U.S. Navy.
Secondly, we had Katrina Leung, which public sources have indicated
operated as a double agent for China and the United States and
contaminated probably two decades worth of U.S. intelligence relating
to China as well as crippling the FBI's Chinese counterintelligence
program.
She accessed such sensitive intelligence through entrapment of a
senior FBI agent. Both examples illustrate serious threats to America's
security, and they're the ones we know about from public sources.
I have introduced H.R. 3806, the SPIES Act, to help strengthen
penalties against these serious foreign espionage threats. We cannot
continue to fight today's espionage threats with yesterday's laws. Yet
while we continue to name post office after post office in this body we
can't find the time to consider this legislation.
Mister Speaker, we must be mindful of the dangers of dismissing a
known, ongoing security threat. Turning a blind eye will not address
this issue, and I appreciate my colleague for calling our attention to
this important issue that affects the House of Representatives and the
country at large. I fully support the resolution and urge my colleagues
to do the same.
Ms. ZOE LOFGREN of California. Madam Speaker, I would just note, the
thrust of the gentleman's resolution has to do with the House, which is
why I'm addressing the House computers. On the other hand, I've been
concerned for a long time about cyber security in the Federal
Government, in the DOD, in the Homeland Security Department, and
frankly, in the private sector. And it is very spotty.
I just wanted to make a correction. I was briefed on the National
Journal story. What happened on the nuclear power plant issue, it was
not an attack. It was someone who was uploading some software onto a
computer that he did not realize was networked, and it was inconsistent
with other software. And actually it didn't work as designed because
the control system shut it down.
Having said that, I have said in public--so I don't mind saying it
here again today--that we have cyber security vulnerabilities,
especially SCADA systems that were installed years ago before we were
thinking about security. We have not paid enough attention to that
either in the private sector or the public sector.
We have had FERC before the Committee on Homeland Security on several
occasions urging them to force utilities to take the steps they need to
preserve their networks, and they say two things: One, they don't have
enough authority; and two, they don't want any more authority. So we've
said this is an emergency situation, and we're not getting an emergency
response attitude from the agencies with authority.
That is certainly something that other committees may want to look
at. I'm just familiar with the efforts that I've been involved in, and
they've been substantial, although, regrettably, not yet successful.
I would just like to stand up a little bit for our IT guys here in
the House. It was our IT guys who discovered that your computers had
been infected and notified you. And it's bad that they were infected,
but it's part of the price you pay when you use a network computer to
visit a potentially dangerous Web site. But they cleaned it up and
responded promptly, and I think they deserve credit for letting that
system work.
And just a final note on hits from China. That's not the same as an
attack. And we keep track of the hits we have on our Web site. I mean,
I get hits on my Web site from all over the world. I don't know why
people in other countries come and visit my Web site, but it's not an
attack, it's that they're looking at information that I have made
publicly available.
What we are concerned about is attempted intrusions, and there are
many of those in an astoundingly small successful effort. This is a
constant battle. As the hackers become more sophisticated, our defenses
need to become more sophisticated, and it never ends. That's why the
effort to improve our patches in our security needs to happen every
single day. There needs to be continuous monitoring of our systems. And
it has to be all of us. This has to be a team. And every Member needs
to take responsibility for this, along with the government itself.
Madam Speaker, I reserve the balance of my time.
Mr. WOLF. Madam Speaker, may I inquire as to how much time I have
remaining?
The SPEAKER pro tempore. The gentleman from Virginia has 9 minutes
remaining.
Mr. WOLF. Madam Speaker, I yield 4 minutes to the gentleman from
Michigan, the ranking member on the Intelligence Committee, Mr.
Hoekstra.
Mr. HOEKSTRA. I thank my colleague.
One of the jobs that I have here in the Congress is to serve as the
ranking member on the Intelligence Committee, also having served as the
chairman on the Intelligence Committee.
Today I rise in support of Congressman Wolf's privileged resolution
on cyber security to salute him for his efforts to educate this House
and the American public about the growing threat to U.S. commerce, our
national security, and the privacy of the American people.
Unfortunately, some on the other side have attempted to scare the
American people into thinking that the gravest threat to their privacy
comes from our Nation's hardworking intelligence professionals. That's
absolutely not true. Mr. Wolf, in this resolution today, reminds us
that the real threat to America's privacy and the safety of Americans
comes not from within, but from those who would do us harm from
overseas.
Mr. Wolf had the misfortune to personally experience this fact when
computers in his office were compromised by hackers from China, the
Chinese, in 2006. I agree with my friend from Virginia that his office
computers probably were targeted because of his long record of speaking
out against human rights violations in China.
While I can't discuss the specifics of what we know, I can tell you
that the leadership of this Congress, Republicans and Democrats, are
well aware of the cyber espionage threat that exists. But what has this
Congress done? Instead of working to modernize and strengthen our
Nation's surveillance capabilities, the Democratic leadership
[[Page H5286]]
of this Congress has sought to tie the process down in bureaucracy, in
red tape. Some have sought to vilify the intelligence professionals we
ask to form the first line of our Nation's defense.
And in some cases, instead of talking about the threat to America's
privacy posed by foreign cyber espionage and hackers, they instead
point the finger of accusation at our intelligence professionals and
innocent patriotic businesses that may at this point be helping to
protect the Nation, the very same intelligence professionals and
businesses we may turn to to help protect our Nation from the cyber
threat.
The threats we face are real. These are not just simple viruses,
these are sophisticated attacks on a new electronic battlefield. They
jeopardize America's security--politically, economically, and
militarily. It's a global problem with multiple threats. Some of my
colleagues have talked about earlier, there has been reports about what
Russia did in Estonia. We know what countries have done against the
United States.
So Congress does need to face this and face this issue very
seriously. Congress needs to ask tough questions about trade and
technology deals involving Chinese finance and businesses. One of the
things that we know, while my colleague brings up China in this
instance, and the Chinese, we know that it is a global threat. But
specifically about China the message is very, very clear, consistently
over and over the Chinese cheat.
We also need to focus on the real threats our Nation faces, not those
imagined for partisan gain. And most importantly, and most urgently,
again, to make sure that our intelligence professionals on the front
lines have the tools that they need to keep us safe and to attack this
cyber threat, this Congress needs to pass the Senate FISA bill now.
Because this law not only affects how we track the radical jihadists
who threaten us, it will also impact how we confront the cyber threat
as well.
This is a very sophisticated problem, it is a very serious problem. I
congratulate my colleague for bringing it forward. This is an issue
that I believe we can work on a bipartisan basis. We need to work on a
bipartisan basis. But we need to do first things first, and the first
thing we need to do now is get FISA passed, and do it soon.
Mr. WOLF. Madam Speaker, I recognize the gentleman from Michigan (Mr.
Ehlers) for 2 minutes.
Mr. EHLERS. I thank the gentleman from Virginia for yielding, and I
especially thank him for bringing this issue to the floor.
I also thank my colleague from California, who works with me on the
House Administration committee, for her very perceptive comments on
this problem.
I would just like to add a little historical insight. I was asked by
the new Speaker, Newt Gingrich, some years ago--in 1995 to be exact--to
take charge of setting up the new computer system for the House of
Representatives. It was a formidable task. And one issue I emphasized
over and over was the need for adequate security.
{time} 1800
We did the best we could at that time. And I was very proud for a
number of years that although the White House got hacked, the Pentagon
got hacked, the Senate got hacked, we did not get hacked. Those days
are over. And every Member of this House of Representatives has to
recognize that.
This is going to involve, first of all, the best possible technology
fix. There's no question about it. But there's another aspect that was
mentioned by my colleague from California, and that is training Members
and staff on how to deal with this threat and this danger. That is not
easy.
When I computerized the House, I had to educate my colleagues about
computers. It was hopeless. I eventually taught computer classes myself
to my colleagues to try to get them interested and to begin using
computers. We are going to have to be that direct, that formidable and
persistent in ensuring that our colleagues and all our employees
understand the threat and that they learn how to deal with the threat
and especially learn how to prevent incursions by the actions that they
take with their computers and the way they handle their equipment.
This is a major issue. I will pledge, as my colleague from California
does, that we will attempt our best to address this on the House
Administration Committee, and we will certainly do everything possible
to solve it. But it is going to require the vigilance of every employee
of the House of Representatives and the Senate for that matter.
Ms. ZOE LOFGREN of California. I will just say that I appreciate Mr.
Ehlers' comments. As he has, I have introduced many Members to the
concept of the Internet. Luckily that is no longer as necessary today
as it was at one time. But some of our colleagues are real white-out-
on-the-screen folks, and we need to bring them forward to the modern
era.
But you are right. It is not just the Members. As I have mentioned to
Mr. Wolf, I have made a commitment that I intend to follow through to
ask the Republican Conference and also the Democratic Caucus to appear,
not just by myself, but with top-level experts, to explain to Members
their responsibilities and vulnerabilities for them when they travel
abroad with mobile devices as well as their desktops in their office
and how to preserve their network. And it's not just for the staff. I
mean how many of us have made clear to the summer interns that if they
have their laptop, and they're on a peer-to-peer network for whatever
reason at home, and then they plug that laptop into the House network,
I might add in violation of our rules, that they have introduced a
vulnerability to our system? I don't know how many of us have given
that little tutorial to these wonderful young people, but all of us
should.
So I think this has been a helpful resolution, Mr. Wolf, because it
has opened my eyes to the need to get Members to pay more attention.
And I am going to play the most positive role I can to make sure that
happens. But it is also going to take the cooperation of the Members
themselves, because if this is not taken seriously, it won't happen.
I reserve the balance of my time.
Mr. WOLF. How much time do I have left, Mr. Speaker?
The SPEAKER pro tempore (Mr. McNulty). The gentleman from Virginia
has 3 minutes remaining.
Mr. WOLF. I thank the gentlelady for her agreement. I think we have
to, one, read the National Journal. This is a very respected magazine.
And this is a serious problem. Up until now, it has been neglected by
many in the administration and many in Congress.
Secondly, I think the American people are ahead of this Congress. And
quite frankly on this issue with China, I think they are ahead of the
administration. They are ahead of the administration on human rights,
religious freedom, persecution and bad goods coming in from China. This
Congress and this administration ought to wake up.
Thirdly, people are not anxious to talk about this in the Congress,
nor are they anxious to talk about it in the administration. They are
not anxious to talk about it. There was an effort to have me not go
ahead with this using different techniques and different ideas. And we
complied. We worked with the majority every way we can.
I want to say this. I will not let this issue rest. I may not be the
fastest person in this institution. But I am as dogged as anyone. And I
expect the leadership, I expect the leadership to deal with this not
just by the House Administration Committee, I expect the leadership to
deal with this on the Armed Services Committee. I expect the leadership
to deal with this with regard to the House Intelligence Committee. I
expect the Government Operations, has the Government Operations
Committee ever been reluctant to hold a hearing on anything? And the
answer is ``no.'' They must deal with this issue. And I tell the
gentlelady, who has been very good, and I thank her for that, that if
this is not resolved, I will be down here on the floor. I will rework
this resolution. It will be a privileged resolution. And the next time
there will be a vote on this. And then the American people, the
American people can see how aggressive this administration and this
Congress will be on a major national security issue and the issues of
religious freedom and persecution. Keep in mind that 35 Catholic
[[Page H5287]]
bishops are in jail in China. Two hundred Protestant pastors are in
jail in China. They have plundered the Tibetans, and they're
persecuting the Uighurs. This is not a government that is very
friendly. And also they are the leading supporter of genocide in
Darfur.
With that, knowing this will be dealt with, I reserve the balance of
my time.
Ms. ZOE LOFGREN of California. Mr. Speaker, I just want to say that I
serve on three committees. I serve on the House Administration
Committee. And I am here today in that capacity. I serve on the
Homeland Security Committee where I have participated in I would say
dozens of hearings on cybersecurity at least over the years. And I
serve on the House Judiciary Committee where we have had, we have a
little bit of jurisdiction, but we have actually worked pretty hard on
our spyware issues and cybersecurity issues. We have paid attention to
that.
I know that the Armed Services Committee has also paid attention to
the whole issue of cyber warfare and cybersecurity. The Intelligence
Committee isn't allowed to tell the rest of us mere mortals who don't
serve what they have done, but I certainly hope they are taking this
seriously and believe that they are.
I know that the gentleman has the right to close. I would just say
that I would like to provide to Mr. Wolf the material from the many,
many hearings that we have had. I think that he would value seeing what
we have done so far. And also it would be valuable to him to see what
remains to be done.
As I said earlier, we have been yelling, actually yelling about this.
We have, as a Nation, tremendous vulnerabilities. And you can't always
know. You can detect, unless it is spoofed, where an intrusion is
coming from. You can't always say who has initiated that intrusion. But
I will tell you, these intrusions and hackers are coming from all over
the world with all kinds of intentions. And we all ought to take all of
this very seriously. And we have failed, I think, to do all of the
things that we could have done.
We have worked with the private sector. And at this point, the
private sector is so wary of the Department of Homeland Security that
there is a reluctance, actually, to work with the department because
the information provided to the department will be so insecure. So we
have a long ways to go.
I am glad that the gentleman has a strong interest in this. I wish
that every Member had a strong interest in it. And maybe after we are
through having these presentations to the Republican Conference and the
Democratic Caucus, we will have a higher level of Member interest. And
maybe instead of just our few voices in the wilderness here in the
House, Mr. Ehlers, Mr. Langevin, myself and Mr. Thornberry, who have
been working on this for so many years, will have more voices, and
maybe we will have a better response. I certainly hope so.
I yield back the balance of my time.
Mr. WOLF. Mr. Speaker, I yield back the balance of my time.
Motion to Refer Offered by Ms. Zoe Lofgren of California
Ms. ZOE LOFGREN of California. Mr. Speaker, I have a motion at the
desk.
The SPEAKER pro tempore. The Clerk will report the motion.
The Clerk read as follows:
Ms. Zoe Lofgren of California moves that the House refer
the resolution to the Committee on House Administration.
The SPEAKER pro tempore. Without objection, the previous question is
ordered on the motion to refer.
There was no objection.
The SPEAKER pro tempore. The question is on the motion to refer.
The motion was agreed to.
A motion to reconsider was laid on the table.
____________________