[House Hearing, 113 Congress] [From the U.S. Government Publishing Office] CYBER SIDE-EFFECTS: HOW SECURE IS THE PERSONAL INFORMATION ENTERED INTO THE FLAWED HEALTHCARE.GOV? ======================================================================= HEARING before the COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED THIRTEENTH CONGRESS FIRST SESSION __________ NOVEMBER 13, 2013 __________ Serial No. 113-41 __________ Printed for the use of the Committee on Homeland Security [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] Available via the World Wide Web: http://www.gpo.gov/fdsys/ __________ U.S. GOVERNMENT PRINTING OFFICE 87-371 PDF WASHINGTON : 2014 ______________________________________________________________________ For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2250 Mail: Stop SSOP, Washington, DC 20402-0001 COMMITTEE ON HOMELAND SECURITY Michael T. McCaul, Texas, Chairman Lamar Smith, Texas Bennie G. Thompson, Mississippi Peter T. King, New York Loretta Sanchez, California Mike Rogers, Alabama Sheila Jackson Lee, Texas Paul C. Broun, Georgia Yvette D. Clarke, New York Candice S. Miller, Michigan, Vice Brian Higgins, New York Chair Cedric L. Richmond, Louisiana Patrick Meehan, Pennsylvania William R. Keating, Massachusetts Jeff Duncan, South Carolina Ron Barber, Arizona Tom Marino, Pennsylvania Dondald M. Payne, Jr., New Jersey Jason Chaffetz, Utah Beto O'Rourke, Texas Steven M. Palazzo, Mississippi Tulsi Gabbard, Hawaii Lou Barletta, Pennsylvania Filemon Vela, Texas Chris Stewart, Utah Steven A. Horsford, Nevada Richard Hudson, North Carolina Eric Swalwell, California Steve Daines, Montana Susan W. Brooks, Indiana Scott Perry, Pennsylvania Mark Sanford, South Carolina Greg Hill, Chief of Staff Michael Geffroy, Deputy Chief of Staff/Chief Counsel Michael S. Twinchek, Chief Clerk I. Lanier Avant, Minority Staff Director C O N T E N T S ---------- Page STATEMENTS The Honorable Michael T. McCaul, a Representative in Congress From the State of Texas, and Chairman, Committee on Homeland Security....................................................... 1 The Honorable Bennie G. Thompson, a Representative in Congress From the State of Mississippi, and Ranking Member, Committee on Homeland Security: Oral Statement................................................. 4 Prepared Statement............................................. 5 The Honorable Sheila Jackson Lee, a Representative in Congress From the State of Texas: Prepared Statement............................................. 7 WITNESSES Panel I Ms. Roberta ``Bobby'' Stempfley, Acting Assistant Secretary, Office of Cybersecurity and Communications, U.S. Department of Homeland Security: Oral Statement................................................. 11 Prepared Statement............................................. 13 Ms. Soraya Correa, Associate Director, Enterprise Services Directorate, U.S. Citizenship and Immigration Services, U.S. Department of Homeland Security: Oral Statement................................................. 15 Prepared Statement............................................. 17 Panel II Mr. Luke Chung, President, FMS, Inc.: Oral Statement................................................. 60 Prepared Statement............................................. 61 Mr. Waylon W. Krush, Chief Executive Officer, Lunarline, Inc.: Oral Statement................................................. 73 Prepared Statement............................................. 75 FOR THE RECORD The Honorable Jeff Duncan, a Representative in Congress From the State of South Carolina: Memo........................................................... 27 Article, ``Midlands Man Has Personal Information Compromised on healthcare.gov''............................................. 38 CYBER SIDE-EFFECTS: HOW SECURE IS THE PERSONAL INFORMATION ENTERED INTO THE FLAWED HEALTHCARE.GOV? ---------- Wednesday, November 13, 2013 U.S. House of Representatives, Committee on Homeland Security, Washington, DC. The committee met, pursuant to call, at 10:11 a.m., in Room 311, Cannon House Office Building, Hon. Michael T. McCaul [Chairman of the committee] presiding. Present: Representatives McCaul, Miller, Meehan, Duncan, Barletta, Stewart, Hudson, Daines, Brooks, Perry, Sanford, Thompson, Sanchez, Jackson Lee, Clarke, Richmond, Barber, Payne, O'Rourke, and Horsford. Chairman McCaul. The Committee on Homeland Security will come to order. The committee is meeting today to examine the security of HealthCare.gov and the protection of private information of the American people. I now recognize myself for an opening statement. This hearing is part of our on-going oversight of the roll- out of the Patient Protection and Affordable Care Act, also known as Obamacare. Today's hearing follows two subcommittee hearings held by my good friend, Chairman Pat Meehan on the security of the data hub and health care exchanges. I would note that in those two hearings the Centers for Medicare and Medicaid Services, or CMS, repeatedly assured this committee that the systems would be both functional and secure. Those assurances ring hollow in light of the disastrous roll-out of HealthCare.gov. We are concerned that the security of the system is as flawed as its functionality. The Department of Homeland Security has two roles in the implementation of Obamacare. The first is to verify the immigration status of applicants. We look forward to hearing more about how the system works from Ms. Correa of USCIS, who is with us here today. The second role DHS plays in Obamacare is overseeing the security of Federal civilian networks. We will have some slides up to demonstrate that. [The information follows:] [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] Chairman McCaul. According to the Department's website, DHS is responsible for overseeing the protection of the dot.gov domain. That being the case, I think it would surprise many Americans to know that DHS had effectively no input into the security of HealthCare.gov, despite it being, arguably, the most significant Federal Government website ever created. To be clear, DHS has not participated in any meaningful way in developing, monitoring, or ensuring the security of HealthCare.gov, the health exchanges, or the Federal Data Services Hub. The only contact between DHS and CMS consisted of two e-mails and one phone call. Departments and agencies are responsible for setting up their own cybersecurity systems. But because of statutory limitations, DHS can only recommend policies and offer assistance on a voluntary basis. In this case, CMS never asked DHS for advice, technical assistance, or even a threat briefing. It is with this limited oversight that the same people at CMS who told us the system would work are telling us now that it is secure. The reason this concerns me is that if customers are able to log on to HealthCare.gov they are required to enter vast amounts of personal identifiable information about themselves and their family members. This information includes their name, addresses, date of birth, Social Security number, citizenship, immigration status, employer information, veteran status, household income, requests for a religious exemption, current health status such as whether or not the applicant is pregnant or has a disability, among other things. While the administration and some of my colleagues across the aisle point out that the Data Services Hub does not store this information, it is important to note that the State exchanges and the Federal exchange servicing 34 States store and keep that information for up to 10 years. All this information is a tempting target for hackers, identity thieves, and other malicious actors. We already have reported cases of hacks, fraudulent websites, and documented security vulnerabilities in the system. We are also concerned that the so-called ``navigators,'' charged with helping people enroll in Obamacare are not subjected to background checks. This will undoubtedly result in cases of fraud and identity theft, most of which we won't even know about for months. In fact, just yesterday we received reports of navigators in my home State of Texas encouraging applicants to lie in order to get information--or to get higher insurance subsidies. Even if a system worked properly, the centralization of so much personal data would create security concerns. But in this case, HealthCare.gov is so flawed these concerns are even greater. Mr. Luke Chung will testify to shed some light on the technical problems with HealthCare.gov and how those affect security, and I look forward to his testimony. Moving forward, we believe it is vital for the Federal Government to use every asset it has, including DHS, to secure its networks and ensure the security of Americans' most sensitive personal data. As such, DHS needs to have not just the responsibility but, more importantly, the tools and authorities it needs to secure the dot.gov domain. Our committee is currently working on legislation to address this by codifying the DHS cyber mission. We look forward to working with the Ranking Member and other Members of the committee as we move that bill through the legislative process. With that, the Chairman now recognizes the Ranking Member, the gentleman from Mississippi, Mr. Thompson, for any statement he may have. Mr. Thompson. Thank you very much, Mr. Chairman. Thank you for holding today's hearing. I also want to thank the witnesses for also appearing today. Understand that this hearing will discuss the Department of Homeland Security's role in the Affordable Care Act. The role played by DHS is two-fold. First, the Department is responsible for verifying that anyone who applies for benefits under the ACA is a citizen or legal resident. This function required by the ACA is very similar to the information required under E- Verify. The Department performs this function thousands of times each day, and transmits the information to any Government agency or employer that needs it. I am sure we all remember the beginning of the E-Verify program. Just a few years ago, my friends on the other side of the aisle sought to expand E-Verify. At that time, many critics believed E-Verify was a deeply-flawed program that relied on inaccurate Government databases and added unnecessary costs to businesses. We called attention to flaws in the computer systems and databases that E-Verify relied upon. The deficiencies in those systems were fixed. Today, E-Verify has become an ordinary part of the verification process used by businesses and governments to assure that people are eligible to work in the United States. I do not recall efforts to repeal E-Verify because of its faults. The ``save'' system used in the ACA functions is much the same way as E-Verify. It seems that my colleagues have expressed concerns about the other role DHS plays in the implementation of ACA. Those concerns have been examined at two subcommittee hearings in this committee. Based on those hearings, we know that DHS did not have any role in the planning or implementing the HealthCare.gov website. Some of my colleagues have indicated that DHS should assure the safety and security of the personal information placed on HealthCare.gov. While this is an interesting proposition, there is no law requiring that DHS play such a role. DHS has few responsibilities in the cyber area. First, DHS is responsible for observing, reporting, and acting upon threats to the Federal computer network system. Second, DHS is responsible for assuring that all fellow agencies are in compliance with FISMA, the Federal law that establishes benchmarks and standards for computer system security within the Federal Government. In sum, DHS is responsible for assuring that HHS followed the correct protocols in establishing the system. DHS would be ready to respond if the system were hacked. But DHS does not have an on- going role with the security of the HealthCare.gov system. If my colleagues believed DHS oversight would be beneficial in assuring the privacy and security of the information contained in the HealthCare.gov system, I would suggest that we explore that option. But I am not aware of any law that suggests that the role for DHS, and I do not believe that consideration of such a role is a purpose of today's hearing. It seems that the purpose of today's hearing is to raise concern about the protection of the privacy and security of personal information. Several committees in the House of Representatives have had hearings on this same topic. Although it is my understanding that DHS has a very small role in assuring the privacy and security of a website established by another agency, I look forward to hearing from the witnesses called here today. Finally, Mr. Chairman, I do not think that the discussion today can ignore the fact that this website was put together using over 50 contractors. As we know from the committee's recent mark-up of a bill on the Cybersecurity Workforce, the Federal Government is woefully deficient in hiring and retaining cyber professionals. The oversight conducted by this committee over several years has found one IT system after another that has failed to perform or failed to be completed after millions of dollars have been spent. The list of computer failures is as long, and stretches through a few administrations. The list include SBInet, Emerge, Ramp, and several other IT solutions that did not have names and did not work, but did cost a great deal of money. I am not here to point the finger at DHS. I am certain that DHS is not the only Federal entity that has been plagued by the failure of computer contracts to deliver as promised. So, Mr. Chairman, while I look forward to the discussion today I hope that at some point we can light a candle instead of continuing to curse the darkness. Those of us in Congress need to come to grips with the notion that computers are not going away, and we must take proactive steps to assure that some office or agency is the repository of cyber expertise and knowledge. That agency must be able to advise other agencies on everything from drafting a solicitation for a computer system to oversight of the installation of the system. It must be the Federal IT help desk and information library. We need to think about new approaches that will save money and work for the American people. Or we can keep doing what we have been doing: Spending money, making mistakes, wondering what went wrong, and trying to figure out who to blame. Mr. Chairman, the people deserve a Government that stays open, works together, solves problems, and spends money wisely. I think this is the perfect time to show that we are that Government. With that, I yield back. [The statement of Ranking Member Thompson follows:] Statement of Ranking Member Bennie G. Thompson November 13, 2013 I understand that this hearing will discuss the Department of Homeland Security's role in the Affordable Care Act. The role played by DHS is two-fold. First, the Department is responsible for verifying that anyone who applies for benefits under the ACA is a citizen or legal resident. This function, required by the ACA, is very similar to the information required under E-Verify. The Department performs this function thousands of times each day and transmits the information to any Government agency or employer that needs it. I am sure we all remember the beginning of the E-Verify program. Just a few years ago, my friends on the other side of the aisle sought to expand E-Verify. At that time, many critics believed E-Verify was a deeply-flawed program that relied on inaccurate Government databases and added unnecessary costs to businesses. We called attention to flaws in the computer systems and databases that E-Verify relied upon. The deficiencies in those systems were fixed. Today, E-Verify has become an ordinary part of the verification process used by businesses and governments to assure that people are eligible to work in the United States. I do not recall efforts to repeal E-Verify because of its faults. The SAVE system, used in the ACA, functions in much the same way as E-Verify. It seems that my colleagues have expressed concerns about the other role DHS plays in the implementation of the ACA. Those concerns have been examined at two subcommittee hearings in this committee. Based on those hearings, we know that DHS did not have any role in the planning or implementing the HealthCare.gov website. Some of my colleagues have indicated that DHS should assure the safety and security of the personal information placed on HealthCare.gov. While this is an interesting proposition, there is no law requiring that DHS play such a role. DHS has a few responsibilities in the cyber area. First, DHS is responsible for observing, reporting, and acting upon threats to the Federal computer network system. Second, DHS is responsible for assuring that all Federal agencies are in compliance with FISMA--the Federal law that establishes benchmarks and standards for computer system security within the Federal Government. In sum, DHS is responsible for assuring that HHS followed the correct protocols in establishing the system and DHS would be ready to respond if the system were hacked. But DHS does not have an on-going role with the security of the HealthCare.gov system. If my colleagues believe DHS oversight would be beneficial in assuring the privacy and security of the information contained in the HealthCare.gov system, I would suggest that we explore that option. But I am not aware of any law that suggests that role for DHS, and I do not believe the consideration of such a role is the purpose of today's hearing. It seems that the purpose of today's hearing is to raise concerns about the protection of the privacy and security of personal information. Several committees in the House of Representatives have had hearings on this same topic. Although it is my understanding that DHS has a very small role in assuring the privacy and security of a website established by another agency, I look forward to hearing from the witnesses called here today. Finally, Mr. Chairman, I do not think that the discussion today can ignore the fact that this website was put together using over 50 contractors. As we know from this committee's recent mark-up of a bill on the cybersecurity workforce, the Federal Government is woefully deficient in hiring and retaining cyber professionals. The oversight conducted by this committee over several years has found one IT system after another that has failed to perform or failed to be completed after millions of dollars have been spent. The list of computer failures is long and stretches through a few administrations. The list includes--SBI, Emerge, RAMP--and several other IT solutions that did not have names, did not work, but did cost a great deal of money. I am not here to point a finger at DHS. I am certain that DHS is not the only Federal entity that has been plagued by the failure of computer contracts to deliver what was promised. So Mr. Chairman, while I look forward to the discussion today, I hope that at some point we can light a candle instead of continuing to curse the darkness. Those of us in Congress need to come to grips with the notion that computers are not going away and we must take proactive steps to assure that some office or agency is the repository of cyber expertise and knowledge. That agency must be able to advise other agencies on everything from drafting a solicitation for a computer system to oversight of the installation of the system. It must be the Federal IT help desk and information library. We need to think about a new approach that will save money and work for the American people. Or we can keep doing what we have been doing-- spending money, making mistakes, wondering what went wrong, and trying to figure out who to blame. Mr. Chairman, the people deserve a Government that stays open, works together, solves problems, and spends money wisely. I think this is the perfect time to show that we are that Government. Chairman McCaul. I thank the Ranking Member. I also want to thank the Ranking Member for his cooperation in holding this important hearing, as well. Other Members of the committee are reminded that opening statements may be submitted for the record. [The statement of Hon. Jackson Lee follows:] Statement of Hon. Sheila Jackson Lee November 13, 2013 Chairman McCaul, and Ranking Member Thompson, I thank you for this opportunity to take testimony on cybersecurity as it relates to Federal health insurance exchange. I welcome today's witnesses:Ms. Roberta Stempfley, acting assistant secretary, Office of Cybersecurity and Communications, U.S. Department of Homeland Security; Ms. Soraya Correa, associate director, Enterprise Services Directorate, U.S. Citizenship and Immigration Services, U.S. Department of Homeland Security; Mr. Luke Chung, president, FMS, Inc. and Mr. Waylon Krush, chief executive officer, Lunarline, Inc. I thank the witnesses for their contribution to committee's understanding regarding the nature of cybersecurity as it relates to personal information. Today, the House Committee on Homeland Security is holding a hearing to learn about privacy threats regarding the security of personal information provided by visitors to the Federal Health Exchange Marketplace HealthCare.gov. As a senior member of the House Judiciary Committee, privacy protection has been a prominent concern in the protection of women's rights, voting rights, and labor rights. Today a number of voting rights are under threat because of abusive requirements that undermine privacy rights of voters by requiring that they produce documents proving citizenship, identity, and residency regardless of whether they have an established history of voting or are first-time voters. Privacy is central to the health and strength of many other rights that we enjoy. Specifically, the First, Fourth, and Fifth Amendments to the Constitution rests on a foundation of privacy protection that allow us to speak as we wish, associate with other, and hold our own beliefs free of fear or threats. So the topic of today's hearing is of great concern to me. There cannot be privacy without security, although we can have security without privacy. The digital information age requires that Federal agencies must have cybersecurity for any system that collects, retains, or uses personal information. Privacy protection and cybersecurity are linked in the work I have done on the topic of privacy. The ability to control who, when, why, and how someone else can gain access to personal information requires security. For this reason attention to this issue is central to my strong support for the Federal Health Insurance Market Place found at HealthCare.gov. In May 2006, the Department of Veterans Affairs had a real privacy medical information data breach when a contract worker took home medical information for 26.5 million people. We are not here today to talk about a data breach of the affordable care website, because they are not storing medical information nor are they storing the information registered on forms. I know this for a fact and not for dramatic effect--I went in search of the facts regarding the website and what problems it was experiencing. I found that there was not a problem with security of the website. There was a problem with capacity and usability of the website and these issues became more complex after launch because the site could not be down more than a few hours each day. There would be real problems if the Obamacare web registration site collected sensitive personal information on people registering for health care, but it does not collect sensitive personal information. Sensitive personal information is the type found in taxpayer histories collected over the life time of a person by the IRS. A conversation with a doctor in the examination room is an exchange of highly sensitive personal information. There are no records other than the doctor's notes and that information is not sent to the Federal Government to be stored and maintained for the entire life of a person nor should it be. Most Americans who have take the time to visit the site and look at the information requested know that there is no highly sensitive or sensitive information collected for registering for health insurance. The real irony of today's hearing is why the registration process for health insurance seeks any personal information. If my friends on the other side of the aisle had not been so over concerned about the verification of income or proof of citizenship then the need to collect a social security number, date of birth, income, place of employment could have been eliminated. The whole process would have worked like every other thing you get a tax exemption for annually. A tax break for mortgage or student loan interest only requires a letter being sent to you for tax records to be sent to tax preparers and in the event of a the rear request for proof of deduction qualification. I hope that my colleagues on my right will take note that when they insist that a voter must prove citizenship and residency it requires the provision of more personal information which should concern them as much as what is being done at their behest to those seeking health insurance. When I look at the level of concern you would think that they have held 45 votes to do away with the Affordable Care Act and not one vote to make changes that would address issues that would make it easier to get health insurance. In fact, we are scheduled to have the 46th vote later this week--no help from the Majority just another effort to peck away at the law that they could not end by any other means. I would offer that if there was no political effort to make something out of the website roll-out there would be an effort to focus negative attention on the toll-free number and if there was nothing negative to say about that aspect of the new law then they would find fault with the application assistance centers. We are in the midst of a search for a problem that will justify all of the political and financial effort put into stopping a law that the public needs and as people register and share their experience will turn all of this into familiar ground. The years following the passage of Medicare Part D were rough, because of problems that were fixed with the passage of Obamacare. There is little if any threat to privacy by cyber threats because of the data practices implemented by the Department of Health and Human Services. This system is not storing highly sensitive or even sensitive personal information and the personal information it is collecting is not stored. What is being collected is personal information of the type found on a credit application to purchase any product e.g. date of birth, place of work, social security number, income level, and marital status. The information is checked as required by my colleagues on the other side of the aisle and is then discarded. First, the most important rule for cybersecurity is following the example of the professionals who work in this fast-paced area: Truth comes before beauty. The truth is that there is no computer system that is 100% secure from hostile cyber attacks, natural disasters, structural failures, or human errors. Second, the internet is a rough neighborhood--the best we can do is to design the best systems possible, provide the resources necessary to follow through on good designs, and ignore the politics of the moment. The most dangerous threats to cybersecurity care very little about anyone's political party. They may care very much about your nation of origin. Third, cybersecurity is not about the 14-year-old with a laptop, but the botnet attack from a coordinated effort that brings to the discussion significant threats to networks. There is no evidence that nothing occurred that would suggest that the website experienced anything of this nature. I understand that the interest of many Members in this hearing regarding the health information exchanges may focus on the name of the system, but it is important to note that regardless of the Federal system it is the personal information collected, stored, or used that should be our focus. Digital records management was of such grave concern to Members of Congress following investigations into the disclosures that then- President Nixon had used his high office to seek out means to cause harm to careers, reputations, and political enemies that the Church Committee conducted extensive hearings on the abuse of power that had occurred. Due to the revelations of the Church Committee a series of laws were passed by Congress to protect the privacy of Americans and a number of reviews looked specifically at Federal Government use of computers to manage the personal information of citizens. In 1973, a report ``Records, Computers, and the Rights of Citizens'' was produced by the former Federal Department of Health Education and Welfare (HEW), which today exists as two agencies--one of which is the Department of Health and Human Services (HHS). This fact is significant for the topic of today's hearing because Health and Human Services is chiefly responsible for why the United States became the first nation in the world to draft a Federal privacy statute. The agency's role in drafting the world's first Code of Fair Information practice for automated personal data systems places them at the forefront of identifying the important role that computing would play in meeting the needs of a fast-growing Nation, while also recognizing the potential for technology's threat to privacy. The Code of Fair Information Practices adopted by HEW is based on five principles: There must be no personal data record-keeping systems whose very existence is secret. There must be a way for a person to find out what information about the person is in a record and how it is used. There must be a way for a person to prevent information about the person that was obtained for one purpose from being used or made available for other purposes without the person's consent. There must be a way for a person to correct or amend a record of identifiable information about the person. Any organization creating, maintaining, using, or disseminating records of identifiable personal data must assure the reliability of the data for their intended use and must take precautions to prevent misuses of the data. This ground-breaking work informs and guides our hearing today and I want to acknowledge the hard work of the Federal employees at the Department of Health and Human Services who were given little in the way of support or encouragement by the majority of the House in accomplishing a task that was monumental and historic. Privacy is defined by law. The definition of privacy can be captured under five categories: Physical intrusion, e.g. entering into personal space without permission like someone's home; information intrusion, e.g. accessing documents or information without permission; proprietary intrusion, e.g. using someone's image or name for advertising purposes; associational intrusion, e.g. NAACP v. Alabama where the Alabama sought the State NAACP membership list; and decisional intrusions, e.g. someone interfering with a woman's personal medical decision making or deciding who can and cannot be married. The issue of cybersecurity and the Federal and State health insurance exchanges are important and for this reason it is important to provide the American public with accurate and reliable information. The most important information regarding the Federal health insurance exchange is that it does not violate any of the Code of Fair Information Principles that is central to privacy. There is no secret database; actually there is no database at all. There is a data collection requirement to meet the demands of the House Majority that no person who is not a citizen could gain insurance through the exchange and the second condition that anyone receiving assistance be proven to qualify for that assistance prior to it being provided. To be honest, if the Majority had not been so insistent on these two conditions the number of questions on the registration form could have been greatly reduced. The form used for registration does not collect sensitive personal information--it collects personal information. Sensitive personal information would be of the type found on individual taxes, which are by law held in secret by the IRS, no matter what someone may say publically about their taxes and the agency--true or not true the agency can never disclose the tax records of taxpayers. So when we speak of the types and degrees of personal information it is important to know that personal information, sensitive personal information, and highly sensitive personal information are degrees that should be recognized. The health exchanges were only intended and the Federal exchange designed to collect personal information of the nature required by Congress to meet the obligations under the law. Highly-sensitive personal information would be the type exchanged between a doctor and patient none of which would ever be in this system. This is not to say that cybersecurity is not an issue, any time personal information on citizens is collected by the Federal Government it is an issue that Congress should address by making sure that only what is needed is collected and only retained as long as necessary for a specific purpose. HHS only collected what was necessary, used it for the purpose of the collection, and promptly discarded that data so no database or system of records was created. This is the most privacy-centric system this committee may have the pleasure of discussing in a cybersecurity- focused hearing. The data practices should be adopted by other agencies that may collect too much, keep more than they need, and use information far outside the scope of the original collection. The Federal Health Exchange data is only used to do a ``handshake'' with data in other networks that can authenticate or verify the accuracy of the information provided. This is done in such a way that no data is exchanged with the agency providing the input that the information is accurate. In computing a checksum a mathematical equation is applied to data which produces an answer that will match the same information found in another system. This is just one way of checking information without knowing what the data is and this is the school of thought that informed HHS in developing this system. The Centers for Medicare and Medicaid Management found within HHS could provide a more detailed reply on the topic of data security in the Federal health information exchange. I ask that the Chairman and Ranking Members both write to the committee of jurisdiction and seek information they may better inform our committee on the details regarding security and the Federal Exchange. I appreciate the human factors and usability issues with the website, which are being addressed as we meet today. I would suggest that with the new-found interest of the Majority in the customer and user experience that they would focus on redirecting the funding that has be appropriated that would have gone to the States that opted out of the Medicaid expansion be redirected to the Federal. I am particularly interested in hearing the testimony of the witnesses before the committee who have background and training to speak on the topic of cybersecurity. Federal cybersecurity is guided by the Federal Information Security Management Act (FISMA). The National Institute of Standards and Technology develop the guidance on FISMA and the Office of Management and Budget provides oversight to assure agencies are meeting the objectives. Our Nation must continue to improve in the area of cybersecurity and the best approach is build it with the best knowledge we have and provide continuous monitoring. President Reagan said it best following the Challenger disaster-- the shuttle program is one of the Nation's most significant engineering marvels--that after 25 years of space flight, the Nation had grown so used to it that we forgot how recent the Nation had begun to explore space through human missions. He said that the future does not belong to the fainthearted; it belongs to the brave. He said something that is very important that I will always remember: ``We don't keep secrets and cover things up. We do it all up front and in public. That's the way freedom is, and we wouldn't change it for a minute.'' This was a very public event, but we will get through it and for the rough start we will learn more than we would have without it and be the better for it. The first U.S. space station slid out of orbit and broke apart upon reentry into the atmosphere. It failed, but its failure meant that the next time we built a space station is a better space station. The Swine Flu vaccine miscalculation during the Ford administration, which led to the vaccination of thousands of elderly people for a flu that did not arrive meant that more people died from the vaccine than Swine Flu that year. The lack of enough Flu vaccine during the George W. Bush administration meant that while nations around the globe had sufficient vaccine for that flu season, we had not ordered enough to meet our Nation's needs. Like anything in life, there will be rough starts, mistakes, and outright deceptions about the facts. Our strength is in not giving in to the naysayers or negative message peddlers. This may not be in the playbook, but if we lose our edge for taking on the hardest challenges because they are too hard then we have lost something that is truly uniquely American. I am looking forward to today's discussion and hearing from our witnesses. Thank you. Chairman McCaul. We are pleased to have two panels of distinguished witnesses with us today to discuss this important topic. I will introduce the first panel. Ms. Roberta Stempfley is the acting assistant secretary of the Office of Cybersecurity and Communications at the Department of Homeland Security. In this role, she plays a leading role developing the strategic direction for CS&C and its five divisions. She previously served as the deputy assistant secretary to CS&C and as director of the National Cybersecurity Division. We thank you for being here today. Next we have Ms. Correa. She is the associate director of the Enterprise Services Directorate at U.S. Citizenship and Immigration Services. She has over 30 years of experience in procurement, Federal assistance, and program management. Before serving in her current role she was deputy associate director for the management directorate, and was responsible for delivering key management and infrastructure structure services to support the USCIS mission. We thank you for being here, as well. I would like to point out, though, that at this time neither of our witnesses submitted written testimony to the committee before their appearance today, apparently due to their inability to get testimony cleared by the White House. The administration had nearly 2 weeks to provide this testimony, and has been in the habit of providing their testimony after the deadline. Frankly, I expect better, and look forward to receiving testimony on a timely basis as we move forward in this committee. I ask that the witnesses provide their full written statement as soon as it is available so it will appear in the record. My understanding is that Ms. Stempfley has an oral statement she would like to give, so the Chairman now recognizes her for 5 minutes. STATEMENT OF ROBERTA ``BOBBY'' STEMPFLEY, ACTING ASSISTANT SECRETARY, OFFICE OF CYBERSECURITY AND COMMUNICATIONS, U.S. DEPARTMENT OF HOMELAND SECURITY Ms. Stempfley. Thank you, sir. I truly appreciate the opportunity to provide this opening statement, oral statement. Chairman McCaul, Ranking Member Thompson, and Members of the committee, I appreciate the opportunity to discuss the Department of Homeland Security's efforts to improve cybersecurity posture and capabilities of civilian Federal agencies. DHS is the lead for securing and defining Federal civilian unclassified information technology systems and networks against cyber intrusions or disruptions and enhancing cybersecurity among critical infrastructure partners. To this end, DHS ensures maximum coordination and partnership with Federal and private stakeholders, while keeping a steady focus on safeguarding the public's privacy, confidentiality, civil rights, and civil liberties. Within DHS's National Protection and Programs Directorate, the Office of Cybersecurity and Communications focuses on managing risk to the communications and information technology infrastructures and the sectors that depend on them, as well as enabling timely response and recovery to incidents affecting critical infrastructure including Government systems. Additionally, DHS is in the process of setting up critical programs Federal-wide in order to be able to detect and respond to incidents and vulnerabilities, and consolidate traffic, reducing the surface area of possible threat vectors. With the committee and Congress' support in passing FISMA authorities, DHS and the dot.gov can help to ensure our civilian infrastructure is secured while, at the same time, reducing cost and increasing efficiency with which we are able to work with our agency partners. CS&C executes its mission by supporting 24/7 information sharing, analysis, and incident response, as well as facilitating interoperable emergency communications, advancing technology solutions for private- and public-sector partners, providing tools and capabilities to ensure the security of Federal civilian Executive branch networks, and engaging in strategic-level coordination for the Department with private- sector organizations on cybersecurity and communications issues. While DHS leads this National effort under the Federal Information Security Management Act regulations, agency heads are responsible for providing information security protections commensurate with the risk and magnitude of harm resulting from unauthorized access, use, disclosure, disruption, modification, or destruction of information or information systems within their agencies or operated on behalf of their agency by a contracted entity. Agency heads are provided the flexibility and authority to delegate those responsibilities to the agency chief investment officer in order to ensure compliance with requirements outlined in FISMA and the associated memoranda and directives. These authorities are inclusive of programs to assess, inform, and report on agency status and capabilities relative to FISMA guidance. While each Federal department and agency retains primary responsibility for securing and defining its own networks and critical information infrastructure, DHS leads efforts in planning and implementing strategic management of information security practices across the Federal enterprise. The Department provides assistance by collecting and reporting information regarding cyber posture and risks, disseminating cyber alert and warning information to promote protection against cyber threats and the resolution of vulnerabilities, coordinating with partners and customers to attain shared cyber situational awareness, and providing response and recovery support to agencies upon their request. Traditionally, due to current authorities, DHS must be asked by Federal departments and agencies to provide this direct support of independent department and agency responsibilities. Constantly evolving and sophisticated cyber threats challenge the cybersecurity of the Nation's critical infrastructure and its civilian government system. DHS' responsibility in the breadth of cybersecurity activities and our statutory authorities have not kept up with the rapidly- evolving changes in the cyber environment. While DHS works diligently with our partner agencies and organizations to provide for a secure cyber environment, this often hinders the Department's ability to execute this mission. The administration has requested legislation to clarify authority, to deploy capabilities such as EINSTEIN across the Federal civilian networks, and to provide operational assistance under OMB's oversight of Federal information technology network security efforts under FISMA, among other things. We thank this committee for this focus on these important areas. DHS is committed to reducing increasingly sophisticated and damaging risks to Federal departments and agencies and critical infrastructure. We continue to leverage our partnerships inside and outside Government to enhance security and resilience of our Federal networks while incorporating the privacy and civil liberty safeguards into all aspects of what we do at the Department. Thank you, sir. [The prepared statement of Ms. Stempfley follows:] Prepared Statement of Roberta ``Bobby'' Stempfley November 13, 2013 introduction Overview of the Mission Chairman McCaul, Ranking Member Thompson, and Members of the committee, I appreciate the opportunity to discuss the Department of Homeland Security's (DHS's) efforts to improve the cybersecurity posture and capabilities of civilian Federal agencies. Government computer networks and systems contain information on National security, law enforcement, and other sensitive data. It is paramount that the Government protects all information from theft and protects networks and systems from attacks while continually providing essential services to the public. DHS is the lead for securing and defending Federal civilian unclassified information technology systems and networks against cyber intrusions or disruptions and enhancing cybersecurity among critical infrastructure partners. To this end, DHS ensures maximum coordination and partnership with Federal and private-sector stakeholders while keeping a steady focus on safeguarding the public's privacy, confidentiality, civil rights, and civil liberties. Within DHS's National Protection and Programs Directorate (NPPD), the Office of Cybersecurity and Communications (CS&C) focuses on managing risk to the communications and information technology infrastructures and the sectors that depend upon them, as well as enabling timely response and recovery to incidents affecting critical infrastructure, including Government systems. CS&C executes its mission by supporting 247 information sharing, analysis, and incident response as well as facilitating interoperable emergency communications and advancing technology solutions for private- and public-sector partners. We also provide tools and capabilities to ensure the security of Federal civilian Executive branch networks and engaging in strategic-level coordination for the Department with private-sector organizations on cybersecurity and communications issues. Roles and Responsibilities While DHS leads the National effort to secure Federal civilian networks, agency heads are responsible for providing information security protections commensurate with the risk and magnitude of the harm resulting from unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems within their agency or operated on behalf of their agency by a contracted entity in accordance with Federal Information Security Management Act (FISMA) regulations. Agency heads are provided the flexibility and authority to delegate those responsibilities to the agency's Chief Information Officer (CIO) in order to ensure compliance with the requirements outlined within FISMA and the associated memoranda and directives. These authorities are inclusive of programs to assess, inform, and report on the agencies' status and capabilities relative to FISMA guidance. Although each Federal department and agency retains primary responsibility for securing and defending its own networks and critical information infrastructure, DHS leads efforts in planning and implementing strategic management of information security practices across the Federal departments and agencies. The Department provides assistance to departments and agencies by collecting and reporting agency information regarding cybersecurity posture and risks, disseminating cyber alert and warning information to promote protection against cyber threats and the resolution of vulnerabilities, coordinating with partners and customers to attain shared cyber situational awareness, and providing response and recovery support to agencies upon their request. Pursuant to current authorities, DHS must be asked by the Federal departments and agencies to provide the aforementioned direct support. The Department focuses its support to Federal networks through the following activities: FISMA.--The Office of Management and Budget (OMB) has delegated operational responsibilities for Federal civilian cybersecurity to DHS, which established the Department as the lead in promoting and reporting on the cybersecurity posture of Federal civilian Executive branch networks. FISMA requires program officials, and the head of each agency, to mitigate cybersecurity risks based upon its particular requirements. The Department monitors and reports agency status in ensuring the effective implementation of this guidance. Continuous Diagnostics and Mitigation (CDM).--The CDM program focuses FISMA security metrics on those having a direct impact on Federal civilian departments' and agencies' cybersecurity. By empowering Federal civilian agency CIOs and Chief Information Security Officers (CISO) with situational awareness into their risk posture and with on-going insight into the effectiveness of security controls, CDM will provide these partners with resources necessary to identify and fix the worst cybersecurity problems first. While this program is in its early stages, we are working in conjunction with Congress to clarify authorities and make CDM fully operational with increased proactive protection of the websites in the .gov domain. National Cybersecurity Protection System.--Operationally known as EINSTEIN, this program protects Federal civilian Executive branch networks by providing improved situational awareness of cyber threats as well as identification and prevention of malicious cyber activity. While the Department of Health and Human Services (HHS) recently signed a Memorandum of Agreement (MOA) for all EINSTEIN services, HHS is only covered at this point by EINSTEIN 1. EINSTEIN 1, facilitates identification and response to cyber threats and attacks which further enables improvements to network cybersecurity. DHS continues to engage HHS on deployment of other cybersecurity measures based on discussions regarding statutory prohibitions on certain disclosures. DHS Services DHS offers additional capabilities and services to assist Federal agencies and stakeholders based upon their cybersecurity status and requirements. The Department engages agency CIOs and CISOs through a variety of mechanisms including information-sharing forums as well as directly through the National Cybersecurity and Communications Integration Center (NCCIC) \1\ in response to a specific problem/issue or identified threat. These include: \1\ The NCCIC, a 247 cyber situational awareness, incident response, and management center, is a National nexus of cyber and communications integration for the Federal Government, intelligence community, and law enforcement. --------------------------------------------------------------------------- Assessing security posture and recommending improvements.-- Upon agency request, DHS conducts Risk and Vulnerability Assessments to identify potential risks in specific operational networks systems or applications and recommends mitigations. Providing technical assistance.--DHS may provide direct technical assistance to agencies. For example, by assessing agency compliance and progress in aggregating agencies' network traffic into Trusted Internet Connections, DHS limits access and protects the perimeter of agency networks. Incident response.--During or following a cybersecurity incident, DHS may provide response capabilities that can aid in mitigation and recovery. Through the NCCIC, DHS further disseminates information on potential or active cybersecurity threats and vulnerabilities analysis to public- and private- sector partners. When requested by an affected agency, DHS provides incident response through the United States Computer Emergency Readiness Team or the Industrial Control Systems- Cyber Emergency Response Team. DHS Interactions With HHS DHS works to inform, educate, and increase the cybersecurity capacity of all civilian Federal departments and agencies and has interacted with HHS in the same manner as with all other Federal entities by making available its portfolio of capabilities and services. Although still in the acquisition process, DHS and HHS have entered into a MOA for CDM program while working diligently on the implementation of additional EINSTEIN capabilities. MOA's are a common step taken by DHS as we work to support the cybersecurity needs of our Federal partners, and this MOA is only the latest out of many that have been previously agreed to. On August 28, 2013 the Deputy Chief Security Officer of HHS's Center for Medicare and Medicaid Services (CMS) initiated a discussion with DHS regarding services that DHS might be able to provide in relation to Affordable Care Act (ACA) systems. Consistent with DHS practice, and similar to actions taken to support a number of other agencies, the Department entered into a general conversation with CMS to refine the request and determine what might be appropriate to meet its needs. Based upon the outcomes of that conversation, further discussions were held and, to date, as DHS does for all Federal partners, DHS has provided descriptions of specific capabilities and services to CMS for its consideration. CS&C has not yet received a specific request from CMS relative to the ACA systems, and has not provided technical assistance to CMS relative to ACA Systems. conclusion Constantly evolving and sophisticated cyber threats challenge the cybersecurity of the Nation's critical infrastructure and its civilian government systems. DHS is responsible for a large breadth of cybersecurity activities, yet lacks explicit statutory authority to perform these duties. While DHS works diligently with our partner agencies and organizations to provide for a secure cyber environment, this often hinders the Department's ability to fulfill its mission. The administration has requested legislation to clarify its authority to deploy EINSTEIN across Federal civilian networks and to provide operational assistance to OMB's oversight of Federal information technology network security efforts under FISMA, among other things. Despite this statutory ambiguity, DHS is committed to reducing risks to Federal departments and agencies and critical infrastructure. We will continue to leverage our partnerships inside and outside of Government to enhance the security and resilience of our Federal networks while incorporating privacy and civil liberties safeguards into all aspects of what we do. Thank you again for the opportunity to provide this information and I look forward to your questions. Chairman McCaul. Thank you for your testimony. The Chairman now recognizes Ms. Correa for 5 minutes for an opening statement. STATEMENT OF SORAYA CORREA, ASSOCIATE DIRECTOR, ENTERPRISE SERVICES DIRECTORATE, U.S. CITIZENSHIP AND IMMIGRATION SERVICES, U.S. DEPARTMENT OF HOMELAND SECURITY Ms. Correa. Good morning. Chairman McCaul, Ranking Member Thompson, and Members of the committee, I appreciate the opportunity to discuss our shared goals of supporting Government agencies to ensure that only authorized applicants receive public benefits. As the associate director for the Enterprise Services Directorate of the U.S. Citizenship and Immigration Services, I am responsible for overseeing the agency's verification programs. The Patient Protection and Affordable Care Act of 2010, or the ACA, limits eligibility to enroll in a qualified health plan to citizens, nationals, or those otherwise lawfully present in the United States. The law directs the Department of Health and Human Services to check applicant eligibility against the Department of Homeland Security data if the applicant does not attest that he or she is a U.S. citizen or if the Social Security Administration cannot verify the applicant's claim of U.S. citizenship. The Systematic Alien Verification for Entitlements Program, or SAVE, responds to queries it receives through the hub, a system established by the Centers for Medicare and Medicaid services to help process ACA applications. SAVE provides the HHS hub with immigration status information and information on naturalized and derived citizens on behalf of DHS. SAVE is a service that helps Federal, State, and local benefit-issuing agencies, institutions, and licensing agencies to determine the immigration status of benefit applicants so that only those applicants entitled to benefits receive them. SAVE does not determine whether applicants are eligible for a specific benefit or license. The benefit- granting agency makes that determination. SAVE uses an on-line system that checks a benefit applicant's immigration status information against over 100 million Federal records. Agencies that do not have access to an automated system may submit a paper verification request form. SAVE is available in all 50 States. It has been providing immigration status information to public benefit-granting agencies for over 25 years. SAVE has more than 1,060 customer agencies, including the Social Security Administration and most States' departments of motor vehicles. In fiscal year 2013, the SAVE program received over 14 million queries in our system. Before accessing SAVE, user agencies must sign an agreement with USCIS that details the terms and conditions of their use of SAVE. The SAVE verification process requires up to three steps: Initial verification, additional verify, and third-step verification. For initial verification, a user agency submits a status verification request and the system provides the applicant's immigration status information. If SAVE is not able to verify an individual's immigration status on initial verification, the benefit-granting agency is prompted to submit the query to the additional verification step. When initiating additional verification, a user agency may also submit additional information to USCIS using the SAVE system. Because this additional verification requires a manual review of available databases the SAVE response time ranges from 3 to 5 Federal working days. If SAVE is not able to verify an individual's immigration status at this stage the agency is prompted to submit the query for third-step verification. To accomplish the third-step verification the user agency must provide USCIS with legible photocopies of both sides of the applicant's immigration documentation. Registered agencies may submit this information electronically or manually. SAVE response time for the third- step verification is generally 10 to 20 Federal working days. If immigration status still cannot be confirmed, benefit- granting agencies may refer applicants to a local USCIS office to correct or update their records. USCIS and HHS entered into a computer-matching agreement for ACA verifications and tested the web service's connection between SAVE and the HHS hub, including testing of case-specific queries and overall functionality. After all testing was successfully completed, HHS was granted access to SAVE to meet the October 1 implementation date. SAVE is responding to all properly-submitted queries. As of November 10, 2013 there have been 91,011 hug-generated queries, with an average of 1.31 seconds for initial verification responses. It is important to note that this figure is not a proxy for the number of individuals about whom HHS has submitted queries to SAVE because there are often multiple queries per applicant. Moreover, this figure is not a proxy for the number of people who have applied for health care coverage under the ACA because only a small percentage of such applicants require the submission of queries to SAVE. To help facilitate immigration status verification for HHS and other agencies under the ACA, USCIS introduced several program enhancements which are not available to all customer agencies. Registered agencies may not receive grant date and sponsorship information for select statuses on initial second- and third-step verification. Previously, agencies has to submit manual forms to request that data. USCIS also introduced an optional auto second-step feature which allows SAVE to automatically send queries to additional verification if the initial step is unable to verify the applicant's immigration status. This eases burden on the user agencies, and makes the case resolution process more efficient. Additionally, in April 2013 we launched a scan-and-upload feature that enables agencies to electronically attach scanned copies of immigration documents to queries. Since the inception of the SAVE program, USCIS has provided benefit-granting Government agencies a reliable method to verify an applicant's immigration status and to ensure that only authorized applicants receive public benefits. On behalf of all of my colleagues at USCIS, I am grateful for the opportunity to speak to you today about the SAVE program. [The prepared statement of Ms. Correa follows:] Prepared Statement of Soraya Correa November 13, 2013 introduction Chairman McCaul, Ranking Member Thompson, and Members of the committee, I appreciate the opportunity to discuss our shared goals of supporting Government agencies to ensure that only authorized applicants receive public benefits. My name is Soraya Correa, associate director for the Enterprise Services Directorate. I am responsible for overseeing verification programs at U.S. Citizenship and Immigration Services (USCIS). The Patient Protection and Affordable Care Act of 2010 (ACA) limits eligibility to enroll in a qualified health plan through the State and Federal exchanges established under the ACA to citizens, nationals, or those otherwise ``lawfully present'' in the United States. The law directs the Department of Health and Human Services (HHS) to check applicant eligibility against Department of Homeland Security (DHS) data if the applicant does not attest that he or she is a U.S. Citizen, or if the Social Security Administration (SSA) cannot verify the applicant's claim of U.S. Citizenship. The Systematic Alien Verification for Entitlements (SAVE) Program\1\ responds to queries and provides HHS, through the ``Hub'' established by the Centers for Medicare and Medicaid Services, with immigration status information as well as information regarding naturalized and derived citizens on behalf of DHS. --------------------------------------------------------------------------- \1\ SAVE is a service that helps Federal, State, and local benefit- issuing agencies, institutions, and licensing agencies determine the immigration status of benefit applicants so only those applicants entitled to benefits receive them. SAVE does not determine whether applicants are eligible for a specific benefit or license; the benefit- granting agency makes that determination. SAVE uses an on-line system that checks a benefit applicant's immigration status information against over 100 million Federal records. Agencies that do not have access to an automated system may submit a paper verification request. SAVE is available in all 50 States. It has been providing immigration status information to public benefit granting agencies for over 25 years. SAVE has more than 1,060 customer agencies, including the Social Security Administration and most State departments of motor vehicles. The SAVE Program received over 14 million verification requests in fiscal year 2013. --------------------------------------------------------------------------- SAVE Access and Verification Process Before accessing SAVE, user agencies must sign a Memorandum of Agreement (MOA) or a Computer Matching Agreement (CMA) with USCIS that details the terms and conditions of their use of SAVE. The SAVE verification process requires up to three steps: (1) Initial Verification, (2) Additional Verification, and (3) Third-Step Verification. For initial verification, a user agency submits a status verification request and the system provides the applicant's immigration status information. If SAVE is not able to verify an individual's immigration status on initial verification, the benefit granting agency is prompted to submit the query to the additional verification step. During additional verification, a user agency may also submit additional information, such as a maiden name or additional immigration document numbers, to USCIS using the SAVE system. SAVE response time for additional verification, which includes manual review of available databases, ranges from 3-5 Federal working days. If SAVE is not able to verify an individual's immigration status at this stage, the agency is prompted to submit the query for third-step verification. The user agency must forward a completed Document Verification Request form, with legible photocopies of both sides of the applicant's immigration documentation to USCIS for third-step verification. Registered agencies may submit this information electronically or manually. SAVE response times for third-step verification is generally 10-20 Federal working days. If immigration status still cannot be confirmed, benefit-granting agencies may refer applicants to a local USCIS office to correct or update their record. preparations for aca USCIS and HHS entered into a CMA to authorize HHS to use the SAVE program for ACA verification. In preparation for the ACA open enrollment period, USCIS and HHS tested the web services connection between SAVE and the HHS ``Hub'' that the Exchanges uses to submit queries to SAVE and other partner agencies. The testing included checks on both case-specific queries and overall functionality. After all testing was successfully completed in the weeks leading up to open enrollment, HHS was granted access to SAVE to meet the October 1 ACA exchanges implementation date. As of November 10, 2013, there have been 91,011 Hub-generated initial queries with an average of 1.31 seconds for initial electronic SAVE responses. It is important to note that this figure is not a proxy for the number of individuals about whom HHS has submitted queries to SAVE because there are often multiple SAVE queries per applicant. Moreover, this figure is not a proxy for the number of people who have applied for health care coverage under the ACA because only a small percentage of such applications require the submission of queries to SAVE. SAVE is responding to all properly-submitted queries. Program Enhancements To help facilitate immigration status verification for HHS and other agencies under the ACA, USCIS designated more than 30 additional staff to ACA cases and has introduced several program enhancements. Authorized agencies may now receive grant date and sponsorship information for select statuses on initial, second, and third-step verification. Previously, agencies had to submit multiple forms to determine when an applicant was granted status, and sponsorship information was not available on initial verification. USCIS also recently introduced an ``auto second step'' feature, which allows SAVE to automatically send cases to additional verification if the initial step requests additional verification. This enhancement decreases agency user burden, ensures that additional verification cases are referred to the second step, and makes the case resolution process more efficient. Additionally, in April 2013, the SAVE Program launched a scan-and-upload feature that enables agencies to electronically attach scanned copies of immigration documents to cases. Cases with a scanned copy of the immigration document do not require submission of a paper form. conclusion Since the inception of the SAVE Program, USCIS has provided benefit-granting Government agencies a reliable method to verify an applicant's immigration status to ensure that only authorized applicants receive public benefits. On behalf of all of my colleagues at USCIS, I am grateful for the opportunity to speak to you today about the SAVE program. Chairman McCaul. Thank you, Ms. Correa. The Chairman now recognizes himself for 5 minutes for questions. Let me just say at the outset, there have been many Members of Congress on both sides of the aisle who have called for a delay in the implementation of Obamacare for many reasons. But I would think, first and foremost, we have a website that doesn't work. It seems to me it ought to be delayed until that website is functional. But more importantly to me and, I think, many Americans, it should be delayed until we can receive assurances from this administration that these websites are secure because of the personal data that is being put into them, into the exchanges. We are talking about Social Security numbers, names, addresses, e-mail addresses. You know, we are talking about health information, which is perhaps the most private of all information; certainly information that no American wants a hacker to get access to, to exploit for other purposes. I am personally concerned about the security of this website, and I haven't had the assurances that it is secure. Imagine a hacker getting this personal identifying information and exploiting it for personal gain. We see identity theft happen all the time, and yet we have this information being plugged into this exchange that I believe is not secure. I believe the American people deserve better. So my first question is to Ms. Stempfley. How many cyber attacks have there been on the HealthCare.gov system? Ms. Stempfley. So thank you for the question. As I commented in my opening statement, the awareness DHS has of cyber attacks that are on-going comes from a multitude of sources. One is Department and agency reports specifically of things that they have identified. We have had a handful of reports from the Department of Health & Human Services--a number of about 16, as my memory recalls. But I will get a specific number for you. As well as identification of threat information either provided to us from intelligence sources or from other mechanisms. We are aware of one open-source action attempting to perpetrate a denial-of-service attack against a HealthCare.gov site that has been successful. Chairman McCaul. So there has been a denial-of-service attack on health care. Ms. Stempfley. There was the attempt of one. Chairman McCaul. Attempt. Ms. Stempfley. But it has not been successful. Chairman McCaul. Of course, a denial-of-service attack has the capability to shut down websites. Ms. Stempfley. The goal of a denial-of-service attack, sir, would, yes, be to deny the access to that information. Chairman McCaul. You know, on the Homeland Security web page it talks about one of your primary missions. That is to oversee the security of the dot.gov domain. Did anyone at HHS-- did Secretary Sibelius or anyone at HHS--ever--and involved in this website, and in this roll-out--ever contact DHS about the security of HealthCare.gov? Ms. Stempfley. Again, as I mentioned, the roles and responsibilities between DHS and departments and agencies are split. Departments and agency leadership has principle responsibility for building, operating, and securing their capabilities. The HHS CIO is a member of the CIO Council. Their SISO is a member of the SISO exchanges. We regularly communicate about threat in those forums. We were approached-- we regularly communicate about threat and engagement and capabilities in those forums, and we have had limited exchange, specifically with HHS on this. Chairman McCaul. Well, the extent of the conversations that I have seen between HHS and the Department of Homeland Security are two e-mails and one phone call regarding the security of this website. Is that correct? Ms. Stempfley. It is not typical for a Department or agency, as they are building a specific application, to involve DHS as they build any specific application. So that is an unusual activity at that level. We regularly engage at the Department level. Chairman McCaul. So is the Department essentially defaulting to HHS and Secretary Sibelius for the security of the HealthCare.gov website? Ms. Stempfley. As indicated, sir, under FISMA and current guidance, Department and agency leadership are responsible for securing specific applications under the broad guidance provided by DHS. Chairman McCaul. I believe the oversight of this committee--that you should play a greater role. As your mission statement, you know, accurately says, correctly states that you have the primary responsibility. Do you know what the compliance rate is of HHS with respect to Government cybersecurity standards? Ms. Stempfley. We have engaged with HHS around compliance against the trusted internet connection activity, and we are in the process of collecting the figures for fiscal year 2013 for FISMA. The FISMA report is traditionally provided to the Hill in February. Chairman McCaul. Well, perhaps I can educate you. It is 50 percent. It is a 50 percent compliance rate. Their score card is 50 percent, and we are defaulting our cybersecurity--the security of Americans' most personal, private data to the Secretary of HHS. I find that unacceptable. Do you realize that 50 percent is the second-lowest score in the Federal Government when it comes to a report card on cybersecurity in the Federal Government? Ms. Stempfley. I believe, sir, that the scores you are speaking of are the FISMA report from fiscal year 2012 that came forward. Yes, you are accurately representing the scores of HHS in that situation. One of the things you will also see is that HHS has one of the top scores in the implementation of PIV cards, the two-factor authentication. So what is normal for a department is that they will have a range of reporting in that situation. In some instances they will be above average, and in other instances they will be---- Chairman McCaul. But do you find it acceptable that you are defaulting to HHS for cybersecurity, when they have a 50 percent compliance record that is the second-lowest in the Federal Government? Ms. Stempfley. Sir, as your opening statement indicated, we are operating under the current set of authorities and---- Chairman McCaul. Well, I hope the Ranking Member will work with me to change that. Because I think you are the department with this expertise, not HHS. I believe you are the one with the--again, the background to fix this. I will just close with this. There was a letter from the CMS administrator to the Ranking Member that basically assured him that they would be following industry best practices and that this website would be secure. I believe that that did not happen. With that, the Chairman now recognizes the Ranking Member. Mr. Thompson. Thank you very much, Mr. Chairman. Ms. Correa, in verifying whether or not people who want to participate in the Affordable Care Act are legal or illegal, has that posed a problem for your agency? Ms. Correa. Thank you for the question. No, we have not encountered any issues. As I indicated in my opening statement, we establish the connection between the hub and our SAVE system. We tested that functionality and it is working as expected. Mr. Thompson. So those 91,000 queries to ACA have been met without any problem. Ms. Correa. They have processed in the manner that they are supposed to process through the SAVE system. Mr. Thompson. Thank---- Ms. Correa. So in other words, they will come through for initial verification. If we, for some reason, cannot confirm that immigration status, then we prompt them to refer to second step, and so on. So it is functioning as expected. Mr. Thompson. Thank you. Ms. Stempfley, with respect to the potential for hacking or whatever, do you have any knowledge about the number of attempts that are made daily on the Federal system? Ms. Stempfley. Sir, just to give you an order of magnitude, in fiscal year 2013 we processed more than 13,800--138,000, excuse me, 138,000 reports to U.S. sort-of attempts against both Federal Government and critical infrastructure systems. So the multitude is fairly substantial. Mr. Thompson. So 138,000 attempts is a big number. Ms. Stempfley. It is, sir. Mr. Thompson. To your knowledge, have we met the defense requirement to not allow those attempts to be successful? Do we have any kind of---- Ms. Stempfley. I am happy to provide for you, sir, as a response for the record the number of successful compromises that may have occurred. I don't have that number in my brain at the moment. Mr. Thompson. Please provide that to the committee, if you would. With respect to the dot.gov domain and its responsibilities that you have, are you presently carrying that dot.gov domain oversight out? Ms. Stempfley. Yes, sir. Mr. Thompson. Now, with respect to the HealthCare.gov domain, can you, for the committee, share the difference in oversight on that? Ms. Stempfley. If I understand your question, sir, we provide for example, for FISMA, we provide details to departments and agencies about how to report their compliance with FISMA both in terms of how to specifically answer the FISMA questions and measures, and how frequently to provide those updates so that we can produce the annual report and assessment that is delivered to the Hill in February. Mr. Thompson. Explain to the committee the FISMA requirement; what FISMA is and what is required. Ms. Stempfley. Certainly. So FISMA lays out a broad set of requirements for departments and agencies to secure their applications and systems. It empowers Department leadership to make local risk decisions about when something may--when a decision about what may need to be--what may be appropriate for a system or application needs to be looked at. You take into account the risk environment that the system operates in. Is it operating inside the department, or is it a heavily-connected system. Is it containing, for example, intellectual property information or something of that sort. So you are empowered-- the departments and agencies are empowered to make those local risk decisions. It requires things such as training of all of your workforce against cybersecurity activity, assurance of accreditation decisions made, and number of systems and applications operating under a range of accreditation decisions. Mr. Thompson. To your knowledge, in the HealthCare.gov review, have you provided that training to the individuals with the responsibility for looking at that? Ms. Stempfley. Again, sir, each department and agency is responsible for providing that training, for ensuring that training is received in there. Then that is reported through the annual report to the Department of Homeland Security, the compliance measures associated with that. So it isn't a--it is not typical for the Department of Homeland Security to provide specific training to a department. Mr. Thompson. But they report the training to you. Ms. Stempfley. They do. They---- Mr. Thompson. You put it in a report. Ms. Stempfley. We do. At the end of the year, we are--as I indicated, we are in the midst of collecting the fiscal year 2013 data, and the FISMA report is traditionally handed to the Hill in February. Mr. Thompson. Thank you. Ms. Stempfley. You are welcome. Mr. Thompson. I yield back. Chairman McCaul. I thank the Ranking Member. The Chairman will recognize other Members for 5 minutes for questions, in accordance with out committee rules. I plan to recognize Members who were present at the start of the hearing by seniority on the committee. Those coming in after the hearing will be recognized in order of arrival. The Chairman now recognizes the Chairman of the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies, who has held two previous hearings on this issue, Mr. Meehan. Mr. Meehan. I thank you, Mr. Chairman. I thank you, Secretary Stempfley, for your continued work in this area. You know, I am just gonna follow on the question with regard to your being consulted, and giving to the agencies the ability for them to outline the security for their systems. Now, I would suggest to you--and would you not agree--that this is perhaps some of the most important information that is being collected by the Government today: The private identifying information on Americans who are applying, oftentimes giving intimate details about their families, and otherwise to the Government? Ms. Stempfley. So the--certainly, the Federal Government, through a range of departments, has information about---- Mr. Meehan. Well, I mean, the PII is significant information, is it not, Ms. Stempfley? Ms. Stempfley. PII is certainly important, sir. Mr. Meehan. The Department itself lays out the qualifications. So here I hold in my hand what was created by HHS for the health insurance marketplace, the navigators' standard operating procedures manual. To the best of our review, the only security information developed is to make sure that you don't leave copies of things out on copiers. But under this manual, as was stated by the Secretary herself, it is possible that a felon may be a navigator. Should there have been guidelines to do security checks on the backgrounds of people who will be in privity of communication with the very applicants? Some of those navigators, under the Secretary's own admission, may be felons? Ms. Stempfley. Sir, respectfully, I believe that question is best addressed to the Department of Health & Human Services. I am in an area outside---- Mr. Meehan. I would like to ask but we don't get them in front of us. I am grateful for your--the--I want to follow up on this other issue, as well, with regard to the compliance with FISMA. Now, we have had quite a go-around, as the Chairman has stated, with representatives before us from HHS. The requirement under FISMA to do the appropriate testing, then to then make sure that they correct any problems that they see. Then, ultimately, give an authorization. As you know, the inspector general themselves, the Department of Inspector General, released a report in late summer suggesting that there was no window. That the only certification, according to their schedule, was going to happen the day before the operation of the website. Then suddenly, voila! In the middle of the summer, HHS purportedly made these huge leaps, in which they were able to suddenly certify the security of the system. Now, how is it that they would have been able to go from the period in which they were being--the IG was concerned they weren't even going to be able to meet the deadline until the day before, and suddenly there was tremendous security steps taken by an agency that hadn't done anything for 3 years? Ms. Stempfley. Sir, the Department of Homeland Security is not generally engaged as a specific application is built or operated. You are asking me a question that I couldn't possibly know the answer to. Mr. Meehan. Okay. Well, one of the things, as the HHS inspector general's report itself says, that the security controls and security testing notwithstanding, they may--the authorizing official may grant security authorization with the knowledge that there are still risks that have not been fully addressed at the time of authorization. Is it possible that this was granted with the recognition that there were still risks, significant risks, that had not been addressed at the time of the authorization? Ms. Stempfley. The terms of FISMA enable Department leadership to delegate the responsibility for risk assessment and risk acceptance to lower levels. So it is certainly feasible that in that delegation that is---- Mr. Meehan. So who is making the determination, then, on the most significant information, the biggest collection of privately-identifying information, that will be collected by the Government anywhere in its history? That is not my words; that is the testimony of others. This is being delegated to people we don't even know? Ms. Stempfley. Sir, I don't--one of the things that FISMA does not require is awareness of who the accrediting officials are to the Department of Homeland Security. So I am not aware of who the accrediting---- Mr. Meehan. So who made the decisions, in other words? We don't know who is making the decisions to authorize the ability to suggest that they have complied with FISMA, when the inspector general themselves said it was going to be unlikely that they could before the start? Ms. Stempfley. Again, respectfully, sir, that question is best addressed to the Department of Health & Human Services. Mr. Meehan. I think my time is expired. Thank you, Mr. Chairman. Chairman McCaul. I thank the gentleman. I appreciate the point that these ``navigators,'' that navigate people, the American people, through this system, this website, don't undergo a background check. So the idea that convicted felons could be responsible for this is just unconscionable. With that, the Chairman now recognizes Ms. Sanchez, from California. Ms. Sanchez. Thank you, Mr. Chairman. Thank you, ladies, for being before us today and trying to shed some light on what I believe is an important topic. We need to ensure that we safeguard the information of Americans. So I appreciate the work that you do. When I look at everything that is under your directorates, et cetera it is pretty amazing. So I have a question. I am trying to come from a more general standpoint because, in a lot of ways, I am a layperson to the technical issues of securing somebody's identity, et cetera. But can you tell us, in general, across the Government networks that we have, what type of operational, administrative, technical, and physical safeguards are implemented to ensure confidentiality, integrity, and availability of PII and to prevent unauthorized or inappropriate access, use, or disclosure of PII? How does that compare to, for example, HIPAA security standards in place that protect the electronic health information that we have from a medical standpoint? Ms. Stempfley. Thank you. I appreciate the opportunity. I am personally not familiar with HIPAA in great detail, so I will---- Ms. Sanchez. Well, it is one of our standards that we try, supposedly, to uphold so that people don't figure out---- Ms. Stempfley. Absolutely. Ms. Sanchez [continuing]. What has been going on with---- Ms. Stempfley. I am happy to talk about the kinds of administrative procedurals and technical controls that are part of the Federal enterprise security---- Ms. Sanchez. Super. In layman's terms, please. Ms. Stempfley. I will do my best. So one of the most foundational things that is necessary for a viable security program is a set of operational processes and operational responsibility assignments and policy activities. Including things such as ensuring that all users receive annual training for their individual security awareness as a part of their receiving their log-in. That log-ins and passwords are effective. For example, we are in the process of migrating to two-factor authentication, that is a PIV card for log-in. So it is something more than just your password. You have to have something and know something in order to gain access. As well as the employment of procedures for understanding where your system--what systems you have, where they are, what assets are--what pieces of software are running on them. Then we have been on a long engagement under the Comprehensive National Cyber Security Initiative to create defendable boundaries around the Federal enterprise and to put in place a series of capabilities at those boundaries for better protection and defense. If you think about it in terms of a community, it is becoming a gated community and one that is focused on securing. You have a set of activities that have to happen for the individuals in the homes, for the homes themselves, and then for the community as a whole. That is a good allegory for laymen, you know, in layman's terms for the kinds of efforts that departments and agencies have to undertake in order to secure their systems and the broad networks that all these activities operate on. It includes--and I am actually very grateful to this committee and the Members on it for their commitment to capabilities such as the continuous diagnostics and mitigation effort, which we began more than a year ago and are in the process of releasing the contract for providing specific tools and capabilities for departments and agencies to put on their systems and assets. HHS has agreed to be an early adopter of such a capability to include intrusion detection and preventing capabilities that are provided at that boundary level. Ms. Sanchez. Great. I guess I would just say, you know, I always figure, on this committee, when we are looking at cybersecurity in particular, that the weakest link is an individual. So we can protect as much as we want, but, you know, it is what is going on. I remember a few years ago, when our system here within the House was being hacked. It turned out that it was because Members were taking their personal devices overseas and they were being hacked. So one of the rules we put in was that you either don't take your personal device, you switch out to a dumb device to get some of your e-mails. Or when you land you take out your battery, you know, from your thing, et cetera. Of course, my staff had dumbed me down on my device when I landed, but I saw all my other colleagues turning on their devices. I said, ``Oh, do you have a dumb device?'' They didn't even understand the policy. I looked at them, and I said, ``You guys, you know the new policy is take out your battery and you can't use your BlackBerry here because, you know, they are getting into our system here.'' They all looked at me and said, ``Oh,'' they said, ``we weren't aware of that policy.'' I said, ``Well, yes, it is a policy because Frank Wolf and others have, you know, they have gotten into our system.'' To which case they all turned around and started looking at their e-mails. Chairman McCaul. [Off mike.] Ms. Sanchez. So--no, it is true, Mr. Chairman. The other day I was flying back to California. I am on a plane, a colleague--for some reason, my PDA dropped someplace. One of my colleagues picked it up. She said to me, ``Oh, you know, I was gonna take a look.'' I said, ``Well, I am password-protected.'' She looked at me, and I said, ``Well, aren't you password- protected on your device?'' She looked at me and she goes, ``No, it would slow me down.'' So we can, you know, we try, and do try. Thank you for the work that you do is, I guess, what I am saying. Thank you, Mr. Chairman. Chairman McCaul. Thank you. The Chairman now recognizes the gentleman from South Carolina, Mr. Duncan. Mr. Duncan. Thank you, Mr. Chairman. I am proud to participate in No Shave November to raise awareness of men's health, specifically prostate cancer and cancer in general. I do so in honor and memory of the late South Carolina State representative, my good friend, David Umphlett, who passed away in 2011. Mr. Chairman, it is crystal clear to me that the Obama administration has put politics over the security of Americans' personal information. President Obama and Secretary Sibelius and other senior officials accepted an excessive amount of risk to Americans' information, all so this flawed website could go forward to meet the Democrats' political agenda. I have a memo from September 3, 2013, less than a month before the launch of the HealthCare.gov website from chief information officer of the Center of Medicare and Medicaid Services, Tony Trenkle. I would like to enter this into the record. Chairman McCaul. Without objection, so ordered. [The information follows:] [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] Mr. Duncan. Thank you. Approving authorization to operate the system underlying the Obamacare health exchanges. Trenkle states the risk to CMS information systems resulting from the operation of the FFM, or Obamacare--FFM stands for Federal Facilitated Marketplaces--information systems is acceptable. But the memo then goes on to say page after page, describing enormous risk to Americans' personal information. Page 2 discusses, ``malicious macros, the threat and risk potential is limitless.'' Page 3: ``No evidence of functional testing processes and procedures being adequate to identify functional problems resulting in non-functional code being deployed.'' Page 4: ``Many FFM controls documented in the security controls section of CFACS have an effectiveness of not satisfied. Security controls are not documented as being fully implemented.'' It goes on: ``Ineffective controls do not appropriately protect the confidentiality, integrity, and availability of data, and present a risk to the CMS enterprise.'' These show serious concerns in the security of the Obamacare exchanges. It makes clear that Obamacare represents a clear and present danger to Americans' personal information. How could anyone with a technology background assess that with all this that the risk was acceptable to move forward? Which they did, and launched a website October 1. Why weren't security officials in DHS and HHS and others sounding the alarm about the concerns raised by Mr. Trenkle? Is it in any way conceivable that these issues could be solved by the end of this month? That is a rhetorical question. We may get back with any conclusion. Mr. Chairman, I find it quite convenient that, in 2 days, Mr. Trenkle has decided to cut and run from HHS and go into the private sector; not to be accountable to the oversight functions of Congress anymore. The American people deserve accountability for the threat this administration has allowed to our personal information. I would like to also share an article from South Carolina, a Columbia, South Carolina gentleman, an attorney. Went onto the HealthCare.gov website to browse for cheaper insurance for him and his wife. He entered in his information, just as you would normally do. A few days later, he had someone call him from North Carolina. He says, ``I believe, somehow, the ACA health care website has sent me your information. That is what it looks like to me,'' Mr. Judson Hadley said, a North Carolina resident, who could access Tom's information on HealthCare.gov. I think there is a problem with the wrong information going to the wrong place. Now, the article goes on to say that Mr. Hadley just entered into the website to try to shop for insurance for himself and he was sent this gentleman from South Carolina's personal information. He actually went to another link and clicked on it, and actually had a PDF that he could print out on his computer of all of this gentleman's information. These are serious flaws. This wasn't a hacker, this wasn't someone trying to intentionally access Americans' private information. This was information sent to a third party by HealthCare.gov. This website has serious problems. Americans are relying on this Government to get it right. So I go back to the question that I had asked rhetorically a minute ago: Is it any way conceivable these issues could be solved, Ms. Stempfley, by the end of this month? Ms. Stempfley. Again, sir, I respectfully submit that that question is best asked to the Department of Health & Human Services. Mr. Duncan. Are you aware of Mr. Trenkle's memo? Have you seen that? Ms. Stempfley. I believe I saw that this morning, sir. Mr. Duncan. Okay. Well, it will be entered into the record. Mr. Chairman, thank you for having this hearing. Americans expect us to get it right. If not, let's delay Obamacare implementation until the Government can assure Americans that their private information will not be stolen by a third party and their identity be taken that could cause serious financial harm to them and their families. With that, I yield back. Chairman McCaul. I thank the gentleman for his insight. The Chairman now recognizes the gentleman from New Jersey, Mr. Payne. Mr. Payne. Thank you, Mr. Chairman. Ms. Stempfley and Ms. Correa, I appreciate your being here today and your testimony. From my understanding, the Federal data service hub is not a database or a repository for personally identifying information or for health care records in general. Is that correct? Ms. Stempfley. Sir, I am not personally familiar with the architecture of HealthCare.gov. Mr. Payne. Ms. Correa. Ms. Correa. I am not familiar with their--I don't know exactly what their architecture is. My understanding, it is not. It is just a conduit for passing information. Mr. Payne. That is my understanding, as well. I think that needs to be clarified. You know, again, from my understanding, this hub will just be used to determine someone's eligibility to participate in the exchange, enroll in a plan, receive a tax credit, and determine whether someone is entitled to an exemption only. Is that your understanding? Ms. Correa. From the accounts that I have read, yes, that is my understanding. That it is a help to process information. Mr. Payne. Okay. Let's see. Can you describe how the Federal agencies like HHS, DHS, the IRS, and Social Security Administration are coordinating with one another and with insurance carriers to share information, and how is that information being protected? Ms. Correa. I can speak to the agreements that we enter into--``we,'' as in USCIS enter into--with our partner agencies who have the databases that we go out and look at. We enter into some form of an agreement, either a memorandum of agreement or a computer matching agreement--that is the agreement that we entered into with HHS--and we also have what are called ``service-level'' agreements. Service-level agreements typically talk about performance in terms of when we go out and query a database what kind of response times we can expect. So those are the kinds of agreements that we enter into. Again, I do want to emphasize that our SAVE program doesn't download information from those databases. We merely go out, ping those databases for information, obtain the immigration status and the class of admission, and provide that information back to the inquiring agency. Mr. Payne. Okay. It is--you know, it--do Federal agencies often share personal identifiable information for the purposes like processing Social Security claims? How is that information protected? You know, is the same approach being used for those enrolling in these exchanges? Ms. Stempfley. Sir, unfortunately, it is atypical for the Department to engage at a system level in that perspective. Although one of the requirements under--for example, under FISMA, is an interconnection agreement which is put in place between two systems that are--articulates the security requirements that both parties must be subject to. Mr. Payne. Okay. One last question. You know, as you ladies know, the changes are being made to HealthCare.gov to make it run better. What steps are being taken in coordination with these changes to ensure that personally identifiable information is still protected? Ms. Stempfley. Sir, again, I think, respectfully, that question is best directed to the Department of Health & Human Services. Mr. Payne. Okay. Well, with that, Mr. Chairman, I will yield back. Chairman McCaul. The Chairman will now recognize the gentleman from Pennsylvania, Mr. Perry. Mr. Perry. Thank you, Mr. Chairman. Thank you, ladies, for being here. Just looking for your overall assessment, because I think we--at least I, as a Member, and I think many of my constituents, members of Citizens of America--are concerned, wondering who is responsible. So I am looking for your broad knowledge of the system. To where does an American whose information has been compromised, to whom does that person seek redress? Is there an individual, is there an agency? What is the mechanism to be made whole once your information is compromised and who knows what it is used for? If there someone that you know of, is there any agency? Where do Americans go when it goes bad, if it goes bad? Ms. Stempfley. As a normal--sort of in the normal course of events across the Federal enterprise, if a citizen experiences an issue with a Federal application, typically the first place they go is that application's support desk or support function. That is generally escalated to security operation centers inside the organization, and then further escalated to the Department of Homeland Security for visibility and for response functions. Mr. Perry. So it would be the Homeland Security--it would be the---- Ms. Stempfley. Department of Health & Human Services. Generally, it is the support function for whatever that application might be. Mr. Perry. Would they be able to seek financial remuneration for, you know, some kind of grievance? Or if their identity was taken and their accounts were emptied and their lives were destroyed from a digital standpoint would they be-- is that where they would go? Ms. Stempfley. I am sorry, sir, that is not an area of expertise of mine about--in the redress areas. I will be happy to take the question---- Mr. Perry. Okay, appreciate it. Ms. Correa, do you know? Okay. Ms. Correa. I do not. Mr. Perry. Ms. Correa, I appreciate you being here. It provides a unique opportunity. If you can explain CIS's role in identifying somebody who comes here illegally to access our services and tries to sign up on the exchange, what is the role there of CIS in identifying that person? What is the process? Ms. Correa. Thank you for your question and the opportunity to clarify how the process works. The benefit-granting agency is the organization that determines the eligibility of whether an individual is eligible for a particular benefit. They come to us through the--in this case, the Affordable Care Act, through the hub. They come to us, they provide us with information such as their alien number, their I-94 number, their name, their date of birth, et cetera. That is the data that we use to go out and verify the immigration status of the individual. The SAVE responds with the immigration status information as well as the class of administration--if it is able to confirm the immigration status based on the information presented. However, any decision on the eligibility for benefits is made at the benefit-granting agency level. In other words, USCIS does not make that determination. Mr. Perry. Okay. Do you know, if you can tell me, how long that process takes? I am looking, just so you understand, in the context of the administration has on numerous occasions said that the process should take about 25 minutes to sign up. So all that, in my mind, has to occur, right, before you can sign up? This is all in the span of 25 minutes. Is that--do you have any idea of the time that that process takes? Ms. Correa. I would like to clarify that the sign-up process is happening outside of this SAVE process. That sign-up process is before the exchange comes through the hub, to us, for a SAVE query. So I wouldn't know how long that process would take. What I can share with you is our response times, as I mentioned, in our testimony. From the moment we receive a query, either in the initial verification step or in the subsequent steps, how long that takes. But I couldn't talk about how long does it really take to sign up. Mr. Perry. Just for the record, again, what is your time frame? Ms. Correa. Sure. Our average response time in the initial query is about 3 to 5 seconds. On the ACA, right now, the queries that we are getting through we are seeing about 1.31 seconds response times. Mr. Perry. Okay. Ms. Correa. For the second step, it takes about 3 to 5 Federal working days. For the third step, which is the more complex steps, it takes about 10 to 20 Federal working days. Mr. Perry. Okay. So is that--am I to take it to mean as far as you can tell that somebody that is here illegally that maybe came just to sign up for benefits could do that, and be involved in--could go through the exchange and sign up for benefits, and receive a plan, before they could be identified as being here illegally? Ms. Correa. Let me clarify that someone who is here illegally, who is undocumented---- Mr. Perry. Right. Ms. Correa [continuing]. Is not likely to be able to come through the hub with a query. Because the benefit-granting agency, when an individual attests that they are either not a U.S. citizen or--if an individual attests that they are not a U.S. citizen they have to present their documentation as to what their status is. Mr. Perry. Right. Ms. Correa. That is the information that the benefit- granting agency would enter into the system--or the individual would have to enter that information if they are entering directly--to come through for a query. So an undocumented individual wouldn't have that information and wouldn't be able to be the subject of a query. Mr. Perry. Thank you. I see my time is expired, and I yield back. Chairman McCaul. I thank the gentleman. Mr. Duncan referred to an article during his questioning that he would like to make part of the record. I would like to ask unanimous consent that it be made a part of the record. Ms. Jackson Lee. Will the gentleman yield? Chairman McCaul. The Chairman yields to the gentlelady. Ms. Jackson Lee. I am sorry. I did not hear what the document was. Would you just repeat for the record what the document was? Chairman McCaul. It had to deal with a gentleman from, I believe, North Carolina that tried to sign up for Obamacare and got information back regarding another gentleman from South Carolina, very personal information, that has been widely reported. Ms. Jackson Lee. So it is a newspaper article? Chairman McCaul. Correct. Ms. Jackson Lee. I thank the gentleman. I yield. Chairman McCaul. Okay. Without objection, so ordered. [The information follows:] Article Submitted For the Record by Hon. Jeff Duncan midlands man has personal information compromised on healthcare.gov Posted: Nov 03, 2013 6:22 PM EST Updated: Nov 04, 2013 4:04 PM EST By Meaghan Norman COLUMBIA, SC (WIS).--About a month ago, attorney Tom Dougall logged on to healthcare.gov to browse for cheaper insurance for him and his wife. On Friday, the last thing he expected to hear on his voicemail was a man from North Carolina who says he can access all of Tom's personal information. Dougall says he thought it was a scam until he realized his privacy had been breached. ``I believe somehow the ACA, the Healthcare website has sent me your information, is what it looks like,'' said Justin Hadley, a North Carolina resident who could access Tom's information on healthcare.gov. ``I think there's a problem with the wrong information getting to the wrong people.'' In a telephone interview, Hadley said he simply put in his username and password when Dougall's information appeared. ``The next page that came up was a page that prompted that I have a marketplace eligibility information to download. And that's when I clicked download and Mr. Dougall's information came up in a PDF document,'' said Hadley. At first, Dougall didn't know what to think. ``We received a phone call from a gentleman named Justin in North Carolina who informed me that he had gone on the healthcare.gov website and when he logged in under his log in and password, he received a document of all of my and my wife's personal information,'' Dougall said. Dougall said he thought it was a ploy. ``Initially I was concerned because I didn't know if this was some guy who was scamming me or if in fact this was a guy who really had my personal information,'' he said. Hadley even provided proof, documents containing Tom's personal information and screen shots of the website. ``And you can see that he's actually signed in as Justin and it tells him he has notices about his marketplace eligibility and to download those and when he downloads it, the next screen shot shows him my personal information,'' Dougall said. Dougall said now Hadley cannot sign up for the coverage he needs because he's been blocked by Tom's personal information. ``I'm assuming I'm going to have to pay the penalty or tax or whatever they're calling it now for not having health insurance next year,'' said Hadley. ``We're told constantly that it's a secure system and it's not, obviously,'' Dougall said. Having lived through one security breach in the State of South Carolina with the Department of Revenue, Dougall wonders what would happen if a professional hacker tried to log on. ``I tried to call healthcare.gov last night and they have no procedure whatsoever to handle security breaches,'' he said. ``All they can do is try to sell you a policy.'' Dougall has also contacted his Congressmen. He says he's calling the Department of Health and Human Services directly on Monday. ``They're so concerned with trying to fix the problems they currently have that they refuse to acknowledge or won't acknowledge that there's been a major breach,'' Dougall said. In the mean time, Dougall does not know how to secure his information. ``I think there's a problem with the wrong information getting to the wrong people,'' Dougall said. We reached out the U.S. Department of Health and Human Services, they responded via email Sunday afternoon asking for more information about what happened to Tom and Justin. Late Sunday, an HHS official said a security team is working to fix the issue. ``We are aware of this issue and it is on our punch list of fixes, scheduled to be addressed in the very near future.'' They added consumers can call the toll-free number or access the on-line chat tool that is available 24/7. Chairman McCaul. The Chairman now recognizes the gentleman from Texas, Mr. O'Rourke. Mr. O'Rourke. Thank you, Mr. Chairman. Thank you for holding this hearing. The implementation of the Affordable Care Act, thus far, has been deeply disappointing. Most obviously, the roll-out of the website has been a disaster. I want to work to make sure that we fix those problems that we have identified. I want to make sure that we make this law work. It is, after all, the law of the land. It has been tested several times, and tested at the level of the Supreme Court. The Government was effectively shut down, in part, in dispute and debate over this. I think politically, legislatively, that has been resolved. Now we need to make sure that it works. Again, the implementation so far has been disappointing. But I want to work with Members from both sides to fix those problems that we have identified, and there are many, and make this work. I think about the 200,000 El Pasoans that I represent who are currently uninsured. Who, because of their lack of insurance, are gonna have worse health outcomes than they otherwise would. Who, because they don't have insurance, when they do get care, the rest of us are subsidizing that care in a very ineffective, inefficient, and costly manner. So I want to make sure that this law works. I think its goals and intentions are noble. I think it is perfectable. So I want to make sure that we are focused on that. In today's hearing, we are looking at cybersecurity threats and problems. Some of the questions resolved around--or revolved around a tax on HealthCare.gov. Denial of service attacks, hacking attempts, attempts to gain access, or entry, illegally. I am assuming, and correct me if I am wrong, that every single Government web asset is attacked, perhaps on a daily or a minute-by-minute basis. Is that correct? Ms. Stempfley. Certainly, sir. The internet itself, where we operate in this environment, is one that contains a multitude of threats. The Federal Government websites and Federal Government systems are subject to the same environment and these same threats. Mr. O'Rourke. So the existence of threats, proof that attacks have taken place, do not prove the system is vulnerable. Or, from your answer to the previous question from the Chairman, do not establish that you have concerns about the security of that system. Is that correct? Ms. Stempfley. Certainly, sir. The existence of threats does not increase the vulnerability that the systems might be-- -- Mr. O'Rourke. Have you seen anything, thus far--you know, a month-and-a-half in--that would give you concern about threats that might be realized, or vulnerabilities that might be exploited that have not been addressed so far by the administration or HHS? Ms. Stempfley. The position that the Department of Homeland Security exists is in both awareness and in reporting has only provided limited information, at this point. As I said earlier, we received about 16 reports from HHS that are under investigation, and one open-source report about a denial of service. Mr. O'Rourke. In thinking about the VA, and the fact that the VA is trying to move to a much more web- and digital-based sharing of service records and medical records for former servicemembers, anything that we can learn from the success or failures in those VA programs that are sharing very sensitive information? In some case, I realize that information has been compromised. Anything we can learn, or what lessons have we learned, that we are able to apply to what we are doing now with HealthCare.gov? Ms. Stempfley. So I believe I mentioned that the HHS CIO as well as the VA CIO are members of the CIO council and of the CISO forums. Those are--the CISO forum specifically is one that we in DHS run to ensure that we have an avenue for that sharing of current activity and lessons learned in engagement. There is a series of best practice documents and actions that are published by DHS that are an amalgamation of all of that learning and that are available. Mr. O'Rourke. Do you know, specifically, if the VA has shared that information from their best practices and what they have learned from failures within that system? Ms. Stempfley. I could not speak to a VA-to-HHS-specific conversation. But we have the aggregation of all of those in a published format so the departments and agencies can gain access to that around the clock. Mr. O'Rourke. Ms. Correa, let me ask you a question. In El Paso, there are bound to be many mixed-status families amongst those 200,000 uninsured people that I represent in our community. Walk me through what happens when you have a U.S. citizen child to a parent who has undocumented status currently. How will they use that system? How will you use that information if you learn that that parent is here in an undocumented fashion? Ms. Correa. As I mentioned before--thank you for your question, but as I mentioned before, what we would see is the information about that child that they are applying for a particular benefit. So the benefit-granting agency would be entering that information. That is the only information that we would be processing through the query. If the undocumented parent were trying to apply for a benefit, if they don't have documentation, then we wouldn't see that query because there would be no information to enter into the system. Mr. O'Rourke. With the Chairman's indulgence, if I could just ask a quick question. Ms. Correa. Sure---- Mr. O'Rourke. If you somehow through this system, HealthCare.gov, learn that the parent is here illegally, would you act on that information, and how would you act on that information? Ms. Correa. I would like to confirm my answer on this, but we do not rely on that information. Because, again, we only see a fragment of data. So there is nothing that we would do with that information at this time. Mr. O'Rourke. Okay, thank you. Thank you, Mr. Chairman. Chairman McCaul. Gentleman. The gentlelady from Michigan, Mrs. Miller, is recognized. Mrs. Miller. Thank you, Mr. Chairman. I certainly thank you for calling this very important hearing on this issue. My question to the two of you--and I appreciate your attendance here today--as I have listened to the questions from my other colleagues, it is certainly clear from your answers and your testimony that the Department of Homeland Security has not been intimately involved in protecting the security of the most personal and most private information of American citizens through the HealthCare.gov website. That that responsibility rests, as you kept testifying, solely--at this point, solely with the Department of Health & Human Services. Many times, you said that question should be asked of them, not of you. So my question to you, then, would be: Do you play a role in determining acceptable risk when the Department of Homeland Security--not the other departments or the Department of HHS, but the Department of Homeland Security--do you play a role in determining what is acceptable risk when the Department of Homeland Security launches--when you launch, that--your department launches a new website within the Department? Mr. Duncan was reading off a list of serious risks that the HHS had identified before the launch of the HealthCare.gov. If the Department of Homeland Security would have identified those kinds of risks, similar risks, before you launched a website for the DHS--not one of the other departments, your department--would you have found that risk acceptable, and would you have advocated the launch of that website? Ms. Stempfley. In the Department of Homeland Security, the right principle risk acceptance official is the chief information officer, and that is an organization roughly parallel to mine. We have a strong engagement with the chief information officer through a series of information exchanges. It is not typical, even in the Department of Homeland Security, for that risk official to reach out to us on specific systems or applications as they go forward. We engage with them through the same broad conversations as we go forward. For the information technology systems that we operate as I pointed out, things like the continuous diagnostics and mitigation program and the intrusion detection programs like EINSTEIN, which I am grateful to this committee for its support of--we are responsive to the CIO in detailing the compliance actions forward and ensuring compliance with security standards that are set. So there is a---- Mrs. Miller. But would you have raised any question at all? I mean, I understand you don't want to answer any questions about HHS. But now you can't even answer a question about your own Department. Although you say typically you talk back and forth, typically---- Ms. Stempfley. For---- Mrs. Miller. I mean, typically you can't even raise a red flag? Ms. Stempfley. For the magnitude of the numbers of applications that we are talking about, ma'am, are substantial. For example, in HHS, in their FISMA 2012 report, they reported 10,648 individual applications. So within any specific one it is difficult to go in great detail. For the application---- Mrs. Miller. So typically, since I have a limited amount of time--typically you can't even raise those questions, right? Typically? Ms. Stempfley. Typically, under the current authority and landscape, that is a true statement. Mrs. Miller. Okay. Well, that is an interesting answer. I appreciate your candor. You can't raise a question if you have those kinds of problems. Could you, then--shifting gears just for a moment, I wanted to pick on something the Chairman mentioned at the outset. Typically, the Congress has oversight responsibilities. Typically, when we have hearings like this, typically--for hundreds of years, typically we get testimony from the witnesses typically at a deadline. Now in this case, for whatever reason, we did not get-- whether you were unwilling or unable to give us your testimony. I mean, as a Member of Congress, trying to typically do my job, I am trying to read the information the day before, the night before, whatever so that I can be prepared, typically. But in this case, we couldn't get your testimony before the hearing. Now, I don't know if that is typical for you or your Department not to respond on the deadline. Usually we do get it. The Chairman mentioned perhaps it is because the White House wouldn't allow you, in this case, to give us the information. Could you expand for me, at least, why that was-- you were not able, you were unable or unwilling, to give us your testimony to meet the deadline which is a typical situation? Ms. Stempfley. It certainly is--I am a believer of being prepared myself, and so it is certainly a goal of all of ours to ensure that we provide information in as rapid a manner as possible to individuals. In my office we work very hard to ensure that we are responsive and within the controls and constraints that we operate under. So I am pleased that you were willing to have us here to speak, even though the testimony did not arrive to you in time. So thank you for that. I am not familiar with all of the steps between here and arriving on your door to speak to this specific event. I am happy to go back and get you an answer. Mrs. Miller. Thank you. Mr. Chairman, we are apparently not going to get any answers out of these witnesses, so I appreciate that. Appreciate the time. Thank you. Chairman McCaul. I appreciate the gentlelady's questioning. I--as the Chairman of this committee, I would like to know, did you prepare an opening statement? Ms. Stempfley. Yes, sir. Chairman McCaul. That opening statement was not delivered to this committee. Is that correct? Ms. Stempfley. I believe I--you mean an oral statement or a written statement? Chairman McCaul. We--well, we did not have your written opening statement. Ms. Stempfley. I believe that---- Chairman McCaul. Until 9 o'clock this morning. Ms. Stempfley. Yes, until this morning. I believe that is a true statement--5 copies---- Chairman McCaul. So it was held up by somebody, correct? Ms. Stempfley. Again, sir, I---- Chairman McCaul. I see you have to refer to counsel. But can you tell the Chairman? Ms. Stempfley. There is a process for---- Chairman McCaul. Of course there is. But when did you finish your draft of your opening statement? Ms. Stempfley. Thursday? Thursday? Chairman McCaul. So Thursday, and here we are today---- Ms. Stempfley. Yes, sir. Chairman McCaul [continuing]. You know, many days later. Who approved your statement? Ms. Stempfley. Who approved my statement? Chairman McCaul. Correct. Ms. Stempfley. It goes through a series of--the gentleman who understands the process better than I do. I submit it to the Department, and the Department submits it forward. Chairman McCaul. Okay. Ms. Stempfley. I am not sure--I don't have a name of who approved it. Chairman McCaul. You do not know who held up your statement. Ms. Stempfley. I don't know, sir. Chairman McCaul. Okay. I would like to know who did, and why. Because as Mrs. Miller stated, this is not typical. Ms. Stempfley. I understand. Chairman McCaul. In fact, extraordinary. I personally think it is due to the sensitivity of this issue. I would like to know whether the White House did hold this statement up. With that, the Chairman now recognizes the gentleman from Nevada, Mr. Horsford. Mr. Horsford. Thank you, Mr. Chairman. I will try to be brief. I want to fist associate myself with the comments of the Ranking Member and several other Members of the committee who, like myself listening to my constituents, am concerned about where things stand with the roll-out of the Affordable Care Act website and the ability for my constituents and constituents across the country to effectively access and shop for plans that are available. Fortunately, in the State of Nevada, our Governor, despite being opposed to the law, worked with the legislature to implement a State exchange. So we are better off than many States that have--continuing to oppose the implementation of the laws, as required. I am a bit perplexed by some of the comments that have been made this morning by my colleagues on the other side that are so outraged by the glitches and the fact that there are security concerns with HealthCare.gov. Particularly because, as a Member of the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies, we have had many, many, many hearings about the vulnerabilities of personal identifiable information in the private sector, as well. There are financial institutions, there are private health care companies that do not do a good job of protecting that information in the private sector. So if we could just work together, the two sides, to identify those challenges, and work towards solving them in both the public and private sector, then I think the public would be better off. But unfortunately, we have things like the House Republican playbook that helped to disseminate information for how people shouldn't navigate the system effectively and, instead, just bring the negative information forward. So I want to just ask our panel a couple of questions. First, Ms. Stempfley, thank you very much for being here. I know you have testified several times before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies before. To the best of your knowledge, are the HIPAA privacy and security standards applicable to the exchanges and the data service hub? Ms. Stempfley. Sir, as I believe I said, I am not a HIPAA expert. So I would be happy to find one to answer that question for you, but you are certainly on the edges of my personal knowledge. Mr. Horsford. From my understanding, obviously the HIPAA rules as established set Federal standards to protect individually identifiable health information. That is a Federal requirement. Ms. Stempfley. Yes. Mr. Horsford. Correct? Ms. Stempfley. Yes. Mr. Horsford. The Department of Homeland Security is required to meet those Federal privacy and security standards, correct? Ms. Stempfley. As with HHSB, yes, sir. Mr. Horsford. So how do you go about doing that within your Department? Ms. Stempfley. Forgive me, sir. Can you ask the question one more time? Mr. Horsford. How does the Department of Homeland Security go about ensuring Federal privacy and security standards apply under HIPAA? Ms. Stempfley. Thank you. Great, thank you. So I--in my office in DHS, we don't actually operate systems who contain that kind of information. So I can speak in general terms about the kinds of requirements we would operate under, and assume that the HIPAA requirements would be similar in that situation. So we are required to submit forward a package of evidence demonstrating our compliance with each of these requirements to the accrediting official. Then the accrediting official reviews that package of evidence to determine that--to demonstrate that we have, in fact, provided that compliance as they are making their accrediting decision. Mr. Horsford. Does the same apply for immigration? Ms. Correa. Yes, sir, that is correct. From a system-owner standpoint, that is the process that we follow. We submit the package of information. It goes to the accreditation official, which normally resides within the chief information officer's office, and they do the accrediting of the system. Mr. Horsford. One last question in my concluding time allowed. The issue around the breach procedures. When there is a breach, what is the requirement in Federal law for the notification of the individual and States if the breach reached a certain number of individuals? Ms. Stempfley. So, certainly, one of the things that we have been talking about with the subcommittee, sir, is that there is not a single Federal breach require--Federal law associated with data breach requirements. That there is a multitude of State laws that are out there. So I appreciate your raising this issue that I know we have spoken of. When it comes to Federal systems, if personally identifiable information is, in fact--there has been a breach of personally identifiable information, Department and agency leadership are responsible for making a determination of the scope of that breach and for reporting that to the Department of Homeland Security. We also through the annual report forwarded both to OMB and to--and in the FISMA report. Mr. Horsford. Thank you, Mr. Chairman. Chairman McCaul. The Chairman recognizes the gentleman from Utah, Mr. Stewart. Mr. Stewart. Thank you, Mr. Chairman. I am gonna go quickly. There is a lot I want to cover. I want to come back to a couple comments that have been made previous, and then--to the witnesses. To Mr. Horsford, I appreciate your comments about trying to work together. I would remind the committee that that is what we were trying to do. That is why we asked the administration for a delay. But the President assured us again and again and again, he promised the American people we are ready. That is why he refused to work with us on any kind of a delay. Of course, we found out now that that is not the case. I want to come back to--just very quickly, about your opening--not your opening comment, but your opening statements. Did anyone ever advise either of you that they were not going to submit those statements to the committee? Ms. Stempfley. No, sir. I believe it was the 5th of November when I was asked to speak in front of this committee, and no one has advised that they weren't gonna be provided. Mr. Stewart. So---- Ms. Stempfley. It was just a number of days between the 5th of November and the---- Mr. Stewart. Okay. So last Thursday you prepared your opening statements. You passed those up the line. No one ever asked you to revise them, no one ever indicated any problems with them. They just disappeared and no one ever saw them, including the committee, until this morning. Is that right? Ms. Stempfley. Sir, a number of grammatical errors were identified and corrected---- Mr. Stewart. But nothing substantial. Ms. Stempfley [continuing]. In the course of it. But no, there was no---- Mr. Stewart. They didn't come to you say this is unacceptable, we can't submit this the way it is. Ms. Stempfley. There was--I am trying to remember what it started and what it looked like when I got it back. But it was effectively--it was written and it was sort of choppy and smoothed out. But there were no changes. Mr. Stewart. Okay. So as far as you know, your opening statements were acceptable. Okay. But, apparently, someone concluded they were not because they were not submitted to the committee. Ms. Stempfley. Sir, I would not--respectfully, sir, I believe it was just a matter of between the 5th of November and the 13th of November---- Mr. Stewart. Okay. Ms. Stempfley [continuing]. Going through the set of processes. It wasn't a---- Mr. Stewart. Well, perhaps. Although I think there may be others who would say that it was more than just that. But let me move on, if I could. You are both Federal employees, and you both will stay on the Federal Employee Health Benefits program. Is that right? Yes. You are not gonna move to the exchanges. Of course, both of you realize that I will, Members of the committee will, all of our staff will. In fact, tens of millions of Americans are gonna be forced to move onto the exchanges beginning, you know, January 1, where they will be forced, in order to do that, to provide very, very private information. The President won't move onto the exchanges, will he? No. No, of course he won't. Neither will any of his Cabinet, neither will Kathleen Sibelius, Secretary of HHS. Knowing that, do you understand and can you help the American people understand why we are more concerned, apparently, about the security of our private information? I am speaking now not for myself or my staff. I am speaking for tens of millions of Americans. What would you say to them who are concerned about their security, knowing that they have to do something that the administration and the Cabinet and the Secretary will not have to do? That is, join the exchanges and provide this type of private information. What could you say to them to make them feel better about that? Ms. Stempfley. Sir, I have 20 years in the Federal Government, and much of that focused on ensuring that cybersecurity is important to the American public and important to the people who build and operate applications, whether it be in critical infrastructure or in the Federal Government. It has been a passion of mine for a number of years. It is one of the reasons why I am in the job I am in. Mr. Stewart. Yes. Knowing your background there, and knowing it is your passion and that you have 20 years' of experience, it must be incredibly concerning to you to see some of the failures that--and some of the inherent weaknesses that are apparent within this website. Does that--is that true? Does that bother you, knowing that it is not as secure as it should be? Ms. Stempfley. I believe the environment that we all operate in today and the dependence on information technology and our critical infrastructure and in other places, it is certainly an area of focus and concern. I am not personally familiar with all of the specifics in health care--in this HHS application. So I am, unfortunately, not in a position to---- Mr. Stewart. Let me ask--let me finish with this last thing. DHS, 99 percent compliant with the FISMA standards, with the Federal Information and Secretary Management Act--99 percent. HHS, 50 percent compliant. Yet HHS did not seek out any council and expertise, any briefings or guidance from DHS in implementing and designing the security around their web page. Any explanation for why they wouldn't seek guidance from DHS, knowing that they were experts on this and that HHS was not? Ms. Stempfley. As I believe I said--that as we make departments and agencies aware of the capabilities that the Department has it is incumbent upon them to pick the best time in the operational life cycle of their systems and applications for the engagement. I---- Mr. Stewart. Okay. I wish they had done that previous to the portals being open, and not after the fact. But I am out of time, and Mr. Chairman thank you for the hearing. I yield back. Chairman McCaul. I thank the gentleman. The gentleman from Arizona, Mr. Barber, is recognized. Mr. Barber. Thank you, Mr. Chairman. I thank you for having this hearing. Also, thank you to the witnesses for your work as well as for being here today. I think it has been said, but I certainly agree that the roll-out of the Affordable Care Act has been--the website, in particular, has been just a disaster. I think all of us find it totally unacceptable that we would be in this position. While the ACA offers many benefits to millions of Americans, I have repeatedly said that there are provisions that need to be fixed, there are unintended consequences that need to be dealt with. We need to move on that, I think, in a bipartisan manner in this Congress. Now we come to a potential new problem. We don't know the magnitude of it because it is early days. Obviously, since so many people have not been able to get on the website we really don't know yet how much personal information might be at risk. Americans are putting data in, in order to even begin the process, that is very sensitive information. I do share the Chairman's concern that the Department of Health & Human Services has a very poor record of cybersecurity, generally speaking. Now, of course, more information than ever before is gonna be available through their system. I think the American people, generally speaking, are very concerned about their privacy on a number of levels. I mean, we can go into other areas--we won't today--but this is a new area of concern. So having said that, I really believe that unless we can give some assurances that the privacy of information in HealthCare.gov is adequately protected it will undermine the American people's confidence in that system and they may choose not even to explore their benefits that are available on that website, when it gets fixed. So having said that, Mr. Stempfley, your office is responsible for maintaining the security, reliability, and resilience of our Nation's cyber and communications infrastructure. This oversight and general maintenance obviously pertains to our critical infrastructure. But it also pertains to the security of Federal Governments' cyber networks, which interface with the private sector and with individual users to access Federal Government websites. I would agree--I hope you would agree, we must be vigilant in monitoring and upgrading our systems, and design them to be as ironclad and as impenetrable as possible, particularly those systems that house sensitive user data such as HealthCare.gov. Now, having said that, Ms. Stempfley, could you talk, in very specific ways, about the steps that your office has taken to ensure that data that is inputted by American people into the HealthCare.gov network, how it has been protected or will be protected, and how have your actions been informed by the attempted incursions that you talked about earlier? Ms. Stempfley. Sir, the Department of Homeland Security's engagement with the Department of Health & Human Services has been about general threat information provision of best practices and a requirement of compliance reporting. We have provided a verification that Health and Human Services has complied with as domain name security. That is a set of technologies that translate internet addresses, the machine- readable information, to human-readable; so when you type www.google.com the internet knows how to translate that. So we have been able to assure--provide verification that have complied with that level of security in their environment, as well. However, we have not been in a specific architectural conversation with the Department of Health & Human Services on this application. Mr. Barber. Have you had any discussions with Health and Human Services subsequent to identifying, as you said, perhaps 16 incursions, actual or attempted? Ms. Stempfley. We have had an operational conversation between their security operation center and our US-CERT about these particular activities. As I pointed out, these are under investigation. These reports came in in the November 6, 7, and 8 time frame. So there is a period of time where we have to go through a verification and determination. Mr. Barber. Yes, I appreciate that you have to check in to make sure that you have some--you can verify what is really going on. But I would urge you, obviously, to speed up that process. Because if and when the website is fully operational-- and we are told it will be operational by December--I would expect we will see many more and we need to be prepared for that. I guess my final question is: What plans do you have for on-going monitoring of the security of the website? Ms. Stempfley. I appreciate the question, sir. A set of capabilities that the Department provides, including one you may know of, is EINSTEIN intrusion detection capabilities, the Center for Medicare and Medicaid Services will be moving its applications behind in the second quarter of calendar year 2013. HHS has been active in attempting to get behind this capability, but had to work through some specific statutory language that was in their statutes. Given that I know this committee has been supportive of, we have been trying to work to get some positive authorization language for these CHS programs that would have shortened that time frame. Additionally, they have agreed to be an early adopter of the continuous diagnostics and mitigation capability. So we are anxious to get that provided to them. The contract is due to be released today or tomorrow for the acquisition of those capabilities. Mr. Barber. Thank you for the extra time, Mr. Chairman. I yield back. Chairman McCaul. Yes, let me thank the gentleman for raising one issue. That is, you know, EINSTEIN has been around for awhile. It seems to me that it should have been applied to this website and to HHS. I think anything we can do to expedite that would certainly be in the best interest of the United States. So with that, the Chairman now recognizes the gentleman from Montana, Mr. Daines. Mr. Daines. Thank you, Mr. Chairman. I spent 20 years in the private sector prior to coming up to Congress. In fact, the last 12 years, an executive with a cloud computing company. Publicly-traded; we took the company public, Oracle acquired us. So the point is, I have worked in the enterprise space with very, very large organizations from around the world and understand the importance, certainly, of privacy as well as reliability. As a taxpayer, I think it is outrageous as I have seen what has happened here, where we have taken $500 million--by some estimates--to what this project costs--taken out of the pockets of hard-working taxpayers into a system that has failed. The numbers are astounding from the benchmarking. Facebook-- Facebook was operational for 6 years and didn't hit the $500 million mark. Twitter, operational for 5 years, $360 million operational investment. Instagram, $57 million investment. LinkedIn and Spotify didn't even get to the $300 million mark in operational. So there will be a lot of questions, certainly, about the cost and benefits, and value for the taxpayer. That is not why we are here, but I want to pivot over here to the issue of security. CBS News reported Monday evening that Mr. Chao, who was the chief project manager of HealthCare.gov, testified last week for 9 hours. CBS is reporting that there was a memo that went out 27 days prior to the launch of the website, on September 3, that said--and this was given to senior officials at CMS--there were two high-risk issues that were redacted for security reasons. The memo--I see counsel here is giving advice--the memo said the threat and the risk potential is limitless. Sir, I want to make sure she hears the question. The risk and the risk potential, the threat is limitless. It said CMS said the deadlines to fix these were around mid-2014 and early 2015 to address them. In fact, Mr. Chao testified to these security gaps. By the way, when they said ``high-risk,'' what high-risk means is, according to Federal guidelines--``the vulnerability could be expected to have a severe or catastrophic adverse effect on organizational operations, assets, or individuals.'' Mr. Chao testified that security gaps, as reported by CBS here, could lead to identity theft, unauthorized access, and misrouted data. As somebody who had to serve large organizations, people would have been fired, the company would have gone under--our company--had we launched a website with these kinds of errors. I understand about risk management and so forth. But it seems that we leaned in to launch--the Federal Government did--knowing that there were high-risk security issues. Now, as you mentioned in your written testimony, the DHS is the lead for securing and defining Federal civilian unclassified information technology systems and networks against attacks. First, what, if anything, did you recommend as far as policies to CMS and the folks who are running the project here for the HealthCare.gov? Ms. Stempfley. As we engage with chief information officers in the SISOs, we provide a range of information; from general threat briefings, which we provide to the CIO council on a regular basis, to best-practice activities as well as information about FISMA compliance as they go forward. We provide this at a Department level and to participants in the CIO forum and SISO forum. There has not been a specific interaction about--focused on this particular site. Mr. Daines. So if, indeed, what CBS reported here and Mr. Chao's testimony last week before a committee--if, indeed, there was limitless potential, as I quote the report, for security risks, knowing this would you have rolled out the HealthCare.gov site on October 1, 2013? Ms. Stempfley. Sir, I am not aware of all of the information that goes into that went into that. Mr. Daines. But my question is, if you knew that. As somebody who has the lead here of 20 years' experience, and if I quote your written testimony here, you have the lead for securing and defining Federal and civilian unclassified information, knowing there was limitless potential for security risks, as reported, would you have rolled out, would you have pushed the button to say ``go'' on October 1, 2013? Ms. Stempfley. Respectfully, sir, I have been an accrediting official before. These are very difficult decisions that you make as a part of it, and I couldn't speak to a---- Mr. Daines. But with all due respect, you are the assistant secretary---- Ms. Stempfley. I am---- Mr. Daines. Leadership is about the buck has to stop somewhere. Would you have made that decision, knowing there were limitless risks, if the report is correct? Ms. Stempfley. Respectfully, sir, I can't answer a theoretical in this situation. There is a multitude of information that goes into it. The amount of risk that a particular site operates under is certainly one vector or one input point. Mr. Daines. All right. Well, I will conclude. The irony, perhaps, in this is that the failure of the website launch on Obamacare may indeed have been the best safeguard for the American people to protect their personal privacy, given the risks now that are being identified in this launch. That is the irony. Because if the American people were prohibited to have, what, six people sign up the first day perhaps that is protecting the American people because they didn't have a chance to enter it in the first place. Yield back. Chairman McCaul. I thank the gentleman. The gentleman from--Mr. Richmond is recruited, from Louisiana. Mr. Richmond. Mr. Chairman, I guess this hearing is appropriate, and I guess the title is appropriate. It reminds me of the same show, same one-trick pony, that we keep hearing over and over again. The question or concern that I have is that, you know, this is a self-fulfilling prophecy. We keep talking about how bad Obamacare is. We talk about the fact that--discourage everyone that it is not safe. When they don't enroll, some of us will declare victory and take glee in the fact that people don't have health insurance. At the same time, we run around proclaiming ourselves to be the Christian Right. So I guess my frustration is that there are many things that we could come together and do. We tried last year to come together and pass a cybersecurity bill that was bipartisan. What happened when it was time to mark up that bill and pass it to the floor? The Republican leadership came back and said it went too far, and Republicans had to sit in the room and gut their own cybersecurity bill. Which never made it to the floor, which we never passed. We sit here today to talk about cybersecurity and how much confidence we should have in HealthCare.gov, when we lack confidence in many areas of cybersecurity, which we have done nothing about, we have not passed a bill. Chairman McCaul. Will the gentleman yield? Mr. Richmond. I certainly will. Chairman McCaul. We have conducted over 300 meetings with the private sector. You are referring to last Congress, before I assumed the Chairmanship. I am fully committed to marking up a cybersecurity bill. It is obviously very complex. I want to do it the right way. I appreciate the work that Ms. Stempfley does in terms of cybersecurity. So know that that is just--as the border security passed in a bipartisan way, I am fully committed to doing that work in a bipartisan way. I yield back. Mr. Richmond. Mr. Chairman, I believe you. I believe that Chairman King wanted to do it also. But it was--and we marked it up in a bipartisan way, and the Republican leadership gutted it. It still didn't make it to the floor. I just say that in the fact that I think that we should all have one purpose. That should be to try to make this a success. Whether you agreed with it or not, it is the law of the land. Let's try to get people health care, get people healthier, and all of those things. Because that is what my interpretation of what we should be doing. See, and I am not defending the launch. The launch was deplorable. However, what real leadership does is acknowledge that it is deplorable, and fix it. So the question would become when we feel that the website is safer are we going to have another meeting to let the people know that we feel it is safe and encourage them to enroll? I would suggest that the answer would be no because we want to keep that fear out there to reduce the number of people that enroll. So my question would be, to Ms. Stempfley and to Ms. Correa, basically the title of the committee, which I hope you can give a short answer, but: Just how secure is the information? Do you have faith in the security of the information that people input into the website? Ms. Correa. I will give Ms. Stempfley a short break. Thank you for your question. I really couldn't answer that question. Because, as I have indicated from our discussion, what we see is the information that is submitted through the hub to ask for the immigration status of a particular applicant. So I couldn't really talk to the front end of the process. Thank you. Ms. Stempfley. The America public gives the Government its information in a variety of places and sources. Certainly, in my experience with SISOs, the information security officers throughout the Federal enterprise, they are committed to the obligation that they have in securing these systems and applications. I am not familiar with the specific security features of the 10,000 applications that HHS operates, for example, nor am I familiar with the specific security features of the tens of thousands and hundreds of thousands of applications across the Federal enterprise. But I do know that in the Department of Homeland Security and with the SISOs that I work on a regular basis they are all--feel passionately about their obligation to protect this information that the America public gives the Government. Mr. Richmond. With the knowledge and expertise that you have in this arena--and you do it every day, and subject-matter expertise--two-part question: Would you enter your information into the exchange, the web portal? If not, would you do it at the end of the month? At what point do you feel it is ready for you to input your information? Ms. Stempfley. So I, like all of us, put our information in a variety of systems and applications, whether it be my bank, whether it be HHS. I have family information in the HHS system because I am also a taxpayer. I do that, recognizing that whenever I give my information to someone else, under any circumstances, there is a--you know, there is a potential of it being at risk. Whether it be, again, my bank or my electric company or a Federal enterprise. But I do it because I believe the benefit of doing so outweighs whatever that risk might be. Mr. Richmond. Thank you, Mr. Chairman. I yield back. Chairman McCaul. I thank the gentleman. The Chairman recognizes Mr. Hudson, from North Carolina. Mr. Hudson. Thank you, Mr. Chairman. I want to thank you for having this hearing today on this very important topic. You know, I go home every weekend, I travel my district, I talk to my constituents as much as possible. I have been inundated with calls and mail from my constituents who are deeply concerned about the implementation of the Affordable Care Act. Lately, the news reports about this implementation have focused on the website. As my colleague said, it has been a disaster. A lot of attention has been focused on the premium increases. North Carolina has been hit harder than most States. Women in our State can expect their rates to triple; men can expect them to quadruple, on average. So a lot of attention has been given to that problem. Then we have heard a lot about loss of coverage. I was talking to a husband in Rockingham the other day whose wife has an acute illness. Their doctors told them that under the Affordable Care Act he is no longer gonna offer them care. So these are huge problems. But I think what has been lost in all this are these issues, this important issue, of security of our private information. I mean, we have an unprecedented collection of data that the Government is undertaking now of personal information. It is unprecedented that the Government will be collecting these types of information through one process. So it is important that we talk about this and we examine the issues here. I am disappointed that our--I appreciate your all being here, I appreciate the job you do. It is disappointing, though, that DHS doesn't--isn't able to answer questions about this website. That DHS doesn't have a working understanding of how the security parameters of this website were set up. It is deeply troubling to me that HHS, CMS hasn't asked the folks who are the experts in this--Secretary Stempfley's organization--to help with this implementation. Why wouldn't you go to the experts when you have got a huge problem? Especially when one of the architects of this website said, ``that there is limitless potential for security risks.'' These are the folks building the website, have said this is a huge problem. Yet they are not asking people who are experts at this how to help them. So I appreciate you being here, Ms. Stempfley, and I am--again, I appreciate the work you do. I am just sorry you weren't more involved in this because the American people deserve every effort we have as a Government to protect them. So I will focus my questions on a different topic related to this: Ms. Correa, one of our colleagues earlier asked the question what happens if we run a query about someone's citizenship, and we determine that they are here illegally, or an undocumented person. Would you tell me what happens at that point? Is any action taken, any enforcement action on that individual? Ms. Correa. Thank you for your question, sir. Again, as I mentioned before, the way the process works is, an individual who presents themselves to a benefit agency, a benefit-granting agency, has to present the information, documentation, on their status. Whether they are a citizenship or they attest, if you will, in their application as to whether or not they are a citizen. If they are not a citizen, then the information is processed as a query. Mr. Hudson. If I can interrupt real quick. So it is up to their own word as to whether they are a citizen or not? Self-- -- Ms. Correa. They are--when they apply for a benefit, they are filling out a form. On that form they typically attest what their status is, whether---- Mr. Hudson. So if they choose to mislead and say they are, there is no---- Ms. Correa. If the agency, the benefit-granting agency, would then, if they attest that they are not a citizen or the Social Security Administration cannot confirm that they are a citizen, would then request their information and process a query through SAVE. SAVE would then go out and ping our databases to identify what the immigration status of that individual is. Typically, our response is either to give what the immigration status is, or if we cannot confirm the immigration status, then we prompt the agency to go through the additional verification steps. As I described, the second step they could provide additional information, other documentation, or other names that the individual may have used. Mr. Hudson. So at the end of the process, if you determine you can't verify they are a citizen, what happens then? Ms. Correa. At that point, what we notify the agency to do is to tell this applicant to schedule an appointment with USCIS. We give them the pertinent information to come in and see us. Because there could still be an error in their record. So what we do is try to have an appointment with them, come visit one of our adjudication officers who would then look at their data and look up their information in the records database. From a SAVE standpoint, we don't take any further action. In other words, we cannot change an individual's record. We do not tamper with the record at all whatsoever. We refer them to one of our adjudications officers, who would then look at the information. Mr. Hudson. So as my time is running out--so if someone-- you can't verify they are a citizen, they don't come in to see you, that is it. We don't follow up, we don't enforce any immigration law on this illegal person. Ms. Correa. Not that I am aware of, sir, but I could confirm that for you. Mr. Hudson. If you wouldn't mind, I would appreciate that. Mr. Chairman, my time has expired. I will yield back. Chairman McCaul. I thank the gentleman. The gentlelady from Texas, Ms. Jackson Lee, is recognized. Ms. Jackson Lee. Mr. Chairman, let me thank you, as well, and Mr. Thompson for this hearing. I always believe that the exercise of our oversight is crucial and important. I think this is the first hearing that I have been in since the loss of Mr. Gerardo Hernandez, and I want to publicly offer my deepest sympathy to him and his family. That is the transportation security officer killed in the line of duty, which reinforces that the U.S. Department of Homeland Security is on the front line, all of your staff and personnel. Would you offer to all of them my deepest sympathy, and to his family. I wanted to pursue a line of questioning that I think may be helpful to us. First of all, I think it is important to note that this committee invited DHS on November 5, which gives less than 8 days, because of an intervening holiday. So let me thank you for getting your testimony in as quickly as possible. I am not at the agencies, but I do know that there is a layer of review. Although you may be an eloquent writer, you may be a poet laureate, I know that they have to review your work. So I am grateful that you got it in. One of the things that is happening all over the Congress today, we have got sequester issues, budget issues. But we are dealing with the Affordable Care Act and oversight and homeland security and small business. Certainly, I think it is important to emphasize that the Affordable Care Act is here and it deals with health care. It deals with having the ability to have insurance if you have a preexisting disease. You can stay on your family's insurance to age 26; preventive care and wellcare examples. It is a solid piece of legislation, and I am grateful that it is here. Like my colleagues, I am dogged about fixing the technology and, as well, dealing with our privacy and the protection of the privacy of the American people. They should know that. That collectively, as Republicans and Democrats, we will not yield any moment, any minute, any second to protecting their private data. In fact I have joined on to legislation by my colleague, Jim Sensenbrenner, to, in essence, protect American citizens with any reach of privacy beyond what is required for security under the National Security Agency. I take no back seat to that. So in making that point, I want to just emphasize what I think your work is. Let me go to Ms. Correa, and indicate--and let me just make the point. There is always a representation that Republicans had nothing to do with the Affordable Care Act. Well, it was the Republicans' amendments that required the checking of citizenship and income. That was their language. I am surprised that every time we see a Republican, my friends, they are talking about ending the Affordable Care Act. We never got any amendments in. They got eons of amendments in to this bill. That was one of them, which requires this simplistic data collection, which is simply that. So I want to ask the question. This is data collection that is basically information on income and citizenship. These fields of data are checked with the records of accuracy. Is that what you do, Mr. Correa? When it comes in, you check the accuracy on citizenship issues? Ms. Correa. That is correct. Ms. Jackson Lee. All right. Once it is checked, is this information kept or discarded? The inquiry and the information? Ms. Correa. We retain the transaction information because we go back and do quality control checks to make sure we are giving accurate information. But we do not download the actual record. Only the immigration status and the---- Ms. Jackson Lee. So what do you specifically keep? Ms. Correa. That information--the immigration status, the-- -- Ms. Jackson Lee. When you have an inquiry from HHS. Ms. Correa. We retain the inquiry information that was received. The individual's name, their alien registration or I- 94 number. Ms. Jackson Lee. That you received an inquiry from HHS. How long do you keep it? Ms. Correa. I would have to confirm how long. Ms. Jackson Lee. Well, you need to get an answer about how long you keep it. Is it protected information? Ms. Correa. Yes, it is. Ms. Jackson Lee. Have you been hacked? Ms. Correa. I am not aware that we have been hacked. I will confirm that for you, but I am not aware that we have been hacked. Ms. Jackson Lee. So what is your measure of securing it? Ms. Correa. Our system is accredited and certified by our chief information officer. Ms. Jackson Lee. Do you do regular checks? Ms. Correa. Yes, we do. Ms. Jackson Lee. Is it your highest responsibility to protect this information of the American people? Ms. Correa. Yes, it is. Ms. Jackson Lee. You only get--you get information. Suppose someone is calling for Mr. Garcia, who is a citizen. Are you keeping that inquiry, as well? Ms. Correa. In the SAVE program, no. If the individual has attested they are a citizen---- Ms. Jackson Lee. Yes. Ms. Correa [continuing]. And Social Security has been able to confirm, then we would never receive that query. Ms. Jackson Lee. All right. So therefore, it is only individuals that may be in question. Ms. Correa. Correct. Ms. Jackson Lee. You are checking this every day. Ms. Correa. Yes, as query---- Ms. Jackson Lee. Or a regular basis. Ms. Correa [continuing]. As queries are received, yes. Ms. Jackson Lee. Let me go to Ms. Stempfley. You are the lead agency that coordinates on the cybersecurity for other agencies in the United States. The other--you sort of lead, but you have the point that the other agencies also have responsibility for their cybersecurity. Is that correct? Ms. Stempfley. Yes, ma'am. Ms. Jackson Lee. But as your Department, or your subset Department, DHS, do you feel that there are competencies under your jurisdiction that are attentive to protecting information and preventing hacking through the DHS agency and in coordinating with the other agencies? Ms. Stempfley. Yes, ma'am, we are very focused on that. My part in the Office of Cybersecurity and Communication, and there are competencies in the data operation centers through the Federal enterprise. Ms. Jackson Lee. So what--if we were to keep this system in place, based upon Republican amendments, into the ACA--checking income and immigration status, and that was being held--you deal with cybersecurity, you deal with the potential of hacking or information going in a different direction that it should not go. What is your level of confidence and your level of competence that you are working in a coordinated fashion, but have the level of technology that can assure, as much as possible, the protection of this information? Ms. Stempfley. So I am very grateful both for the question and for this committee's continued support of DHS authorities and support of important programs that will improve both the competence and confidence in this area. As we have been talking about the continuous diagnostic and mitigation activity and the FISMA reform efforts that will both increase the awareness across the Federal enterprise of the operational risks that systems are operating under on a daily basis, and enable accrediting officials to take that into account in something more often than annual or every 3-year accreditation processes. As well as I believe I---- Ms. Jackson Lee. But are you confident in your present structure in your oversight on cybersecurity? That is, information is being gathered; you don't compare this to the Veterans Administration loss of 24 million records under the Bush administration. We are not at that---- Ms. Stempfley. We are not at that---- Ms. Jackson Lee. We are not at that point. So are you confident, as this huge process is going forward, that we have a system in place to protect that information? Ms. Stempfley. Yes, ma'am. Ms. Jackson Lee. I thank you very much for your answers. Mr. Chairman, I hope that we can rid ourselves of sequestration so we can invest more in the work that is being done by Ms. Stempfley and Ms. Correa. I yield back, thank you. Chairman McCaul. I thank the gentlelady. Also, the gentlelady is correct that we did put provisions in to assure that only those legally in the country received this--that were eligible under this law. Also, we both agreed that if you have a preexisting condition you cannot be denied coverage, as well. I will just add lastly that we did make a request for the statement, the opening statements, on August 31, and that is almost 2 weeks. I am sorry, October 31, nearly 2 weeks. So with that, the Chairman now recognizes the gentleman from Pennsylvania, Mr. Barletta. Ms. Jackson Lee. Well, Mr. Chairman, I thank you. We recognize the pounding of work on these various hard-working public servants. As you well know, we were in the middle of a Government shutdown, and so I appreciate timely responses, Mr. Chairman. I hope that they will work to get timely responses. I yield back, Mr. Chairman. Thank you. Chairman McCaul. Yes, right. The Chairman recognizes Mr. Barletta. Mr. Barletta. Thank you, Mr. Chairman. Ms. Stempfley, I would like to continue on and follow up on some questions that Mr. Meehan had brought up earlier. Secretary Sibelius admitted that convicted felons could be hired as exchange navigators because there was no background checks system in place for these individuals. Why aren't we conducting background checks? Ms. Stempfley. Respectfully, sir, my area of expertise is cybersecurity. Physical security and personal security are outside of that area. I am happy to take the question, but I could only speculate and that seems inappropriate. Mr. Barletta. Okay. With your expertise in cybersecurity, do you think it would be a good idea to do background checks on these navigators? Ms. Stempfley. I believe one of the things that we certainly focus on is assuring the protection against---- Mr. Barletta. I am just asking: Do you think it would be a good idea to do background checks on the navigators? Ms. Stempfley. I am happy--again, sir, I would be---- Mr. Barletta. No. Do you think it would be a good idea? That is all I am asking, real simple. Do you think it would be a good idea to do background checks on navigators? Ms. Stempfley. I believe that all individuals should be vetted---- Mr. Barletta. Good idea, bad idea? Ms. Stempfley [continuing]. Prior to access to the information that they provided. Mr. Barletta. Good idea, bad idea? Ms. Stempfley. I am not trying to evade, sir. I believe that all individuals should be vetted prior to access. Mr. Barletta. I am not gonna get an answer. Ms. Correa, my time--I was mayor for quite some time. I remember one individual. He was in the country illegally. It took our detectives 5 hours to determine who he was. He had five Social Security cards, five different identities. You suggested a little earlier that illegal immigrants won't try to go through the system, and because you are using the SAVE system. I am gonna disagree with you. That is simply not true. We know, for a fact--is the SAVE system used for the SNAP program, do you know? Ms. Correa. Not that I am aware of. Sir, may I clarify? I wasn't trying to imply that an illegal alien wouldn't try. What I was trying to make clear was that they would have to have some form of documentation---- Mr. Barletta. Do you think that they can get through the system? Ms. Correa. It is hard to say. It would depend on the documentation that they present. Mr. Barletta. Well, we know for a fact that illegal immigrants are able to access many Federal benefits through fraudulent documentations. We know that for a fact. That is-- you know, so I don't believe this Government program will really be any different. There is nothing that indicates that it will. So if you determine an applicant is in the country illegally, am I correct, there is no enforcement action taken? Ms. Correa. The SAVE program isn't making a determination whether that individual is here illegally, or not. What the SAVE program is doing is based on the information that was presented to us. We are going out and checking the Federal---- Mr. Barletta. Well, it does tell if they are a lawful citizen. Ms. Correa. Whether they are here as---- Mr. Barletta. Right. So, you determine that this individual is not lawfully here, there is no enforcement action taken? Ms. Correa. As I explained earlier, the determination that we make is whether we can confirm that individual's immigration status and provide that information---- Mr. Barletta. Okay, so you determine that individual's status, that that person is not legally present in the United States. Is there any enforcement action taken? Ms. Correa. We don't determine whether the person is here legally or not because we are not seeing the individual. All we are seeing is the information that comes through the query. Mr. Barletta. So if the information that is presented is fraudulent, what happens? Ms. Correa. We don't have a way of determining if that information is fraudulent. Mr. Barletta. So we don't know. Ms. Correa. As it is presented. Mr. Barletta. So it doesn't seem like there is really any guard for illegal immigrants to access this program as they have been able to access many Government programs. We know there is fraud in so many Government programs. How can we assure the American people that this time we got it? This time we are not gonna let people illegally get into a program that they are not rightfully entitled to. Ms. Correa. Sir, if I may explain. I appreciate your question. The benefit-granting agency is the organization that is receiving the information from the individual and is privy to that information. They submit a query to us, where we go back and confirm---- Mr. Barletta. But if the information is fraudulent. Ms. Correa. What we do is, the only way we could ever determine that is if somebody actually sees the documents and compares them to the individuals. That is why if we cannot confirm immigration status we do ask them to set up an--to refer the individual---- Mr. Barletta. I am not real confident that we are gonna be able to stop it. I just want to close, Mr. Chairman. I am a huge baseball fan, huge baseball fan. Now that the Affordable Care Act has been rolled out, we find that the website doesn't work, that Americans' personal information is at risk, that felons could be navigators. This is only the first inning. The Obamacare batting average is not so good. If the Affordable Care Act was a baseball player, and I was the manager, I would bench him. Thank you. Chairman McCaul. I thank the gentleman for his analogy. With that, I want to thank the members of the first panel for their valuable testimony here today. With that, this panel is dismissed, and the clerk will prepare for the witness table for a second panel. I am pleased to welcome the second panel to today's hearing. Mr. Luke Chung is the president at FMS, Incorporated, a company he founded in 1986. In addition to being a primary author and designer of many FMS commercial products, Mr. Chung has personally provided consulting services to a wide range of clients. A recognized database expert, highly-regarded authority in the Microsoft Access developer community, Mr. Chung was featured by Microsoft as an Access hero during Access' 10-year anniversary celebration. Mr. Chung, really good to have you here. Our second witness, Mr. Waylon Krush is the chief executive officer of Lunar, Incorporated. He served over 15 years of experience in critical infrastructure protection, information operation, signal intelligence, system and telecommunications exploitation, and certification and accreditation. Prior to becoming CEO, Mr. Krush was a senior InfoSec engineer in AT&T's advanced systems division and chief of the information assurance group with the GRC/TSC. The witnesses' full written statements will appear in the record. I now recognize Mr. Chung for 5 minutes for his opening statement. STATEMENT OF LUKE CHUNG, PRESIDENT, FMS, INC. Mr. Chung. Well, thank you very much for having me. I am the president and founder of FMS, Inc., a privately-held software development firm located in Vienna, Virginia. For 27 years, we have offered commercial software products and services. We have tens of thousands of customers in over 100 countries, including 90 of the Fortune 100. In response to 9/ 11, we created a product, Sentinel Visualizer, a link analysis solution for the counterterrorism, defense, and law enforcement communities. That work led to our only outside investor, InQTel, the CIA's venture capital arm. We also have a professional solutions group that creates custom software. An example is a humanitarian relief logistics system we built for the Pan- American Health Organization and United Nations. It is deployed around the world, and I presume it is in heavy use right now in the Philippines. I am a graduate of Harvard College, with a bachelor's degree in engineering and a masters in physical oceanography. On October 1, I visited the HealthCare.gov website, eager to see what it offered. As a small business owner, I am faced with the challenge of purchasing health insurance for my company and family. Unfortunately, my shopping experience failed due to technical problems with the website. It was not designed to be customer-friendly, appeared to be developed by amateurs, and seemed to be untested. I sensed the site would not work for one person, much less a National enterprise quality solution that was needed. I wrote a blog post that day providing a nonpartisan technical assessment entitled ``HealthCare.gov is a Technical Disaster.'' I warned that the problems were far deeper than too many users, and concluded this would be a huge public relations problem that could doom the Affordable Care Act. That is what I saw on Day 1. My blog post went viral. After a week, I was quoted in the New York Times and have been on many radio and National TV news shows, which led to my appearance before you today. I would like to say that my firm is not involved with the development of HealthCare.gov, we did not bid on any portion of the project, and I am here to provide my perspective as a small business owner, someone experienced with database web development and familiar with the Government contracting process. Since I don't like being a critic without offering solutions, on October 14 I wrote another blog post outlining how HealthCare.gov could be built properly; a site that would match the customer buying process, be quicker to develop, easier to test, be more robust, support more users, and be more secure. It is not that complicated. This website does not provide health care. It does not even provide health insurance. It is supposed to let consumers shop and choose among health insurance plans, and then apply for a subsidy. It is essentially the automation of a paper form. So how did we get here? Originally, I thought the design decisions of HealthCare.gov were created by amateurs who didn't know what they were doing. Now I see the design decisions can be explained by considering what the contractors would choose to maximize profitability at every step of the way. The current Government contracting system discourages technically-qualified companies like mine. The big Government contractors are great at winning contracts, protesting lost awards, and generating change orders. They are not known for their technical expertise and would unlikely survive in the private sector. This is a complete breakdown in managing technology investments. Policymakers and politicians do not understand if a project should cost a million dollars or $200 million, or the decisions they make that impact price. For instance, $200 million, at a generous $200 per-hours, is 1 million man-hours. That is 500 man-years. Forget the money. What could these contractors have possibly been doing with all that time? I propose that the Government needs to create a nonpartisan technology accountability office, TAO, similar to the GAO that is capable of assessing and managing Government technology projects. The TAO also needs to be empowered to enforce accountability. Bad performance does not seem to prevent contractors from winning new contracts. Multi-year and permanent bans should target underperforming vendors and their owners and the managers. Get refunds. In the private sector, vendors that fail like this would rarely be allowed back in an organization. In conclusion, I have provided written testimony with additional examples, information, and recommendations on investigating how so much money was spent for so little. This is a scandal beyond HealthCare.gov. Unfortunately, the Federal Government has paid for even larger software projects that were never deployed. Without changing the processes, there will be more technology disasters in our future. Just so you know, while I was able to complete my HealthCare.gov application on October 1, it remains in progress as of last night. Thank you for inviting me. I look forward to your questions. [The prepared statement of Mr. Chung follows:] Prepared Statement of Luke Chung November 13, 2013 summary About Me and FMS, Inc. I'm the president and founder of FMS, Inc., a privately-held software development firm in Vienna, Virginia. For 27 years, we've created database solutions with a combination of commercial products and services. In response to 9/11, our Advanced Systems Group created Sentinel Visualizer, a product for the counter-terrorism, defense, and law enforcement communities that led to our only outside investor, InQTel, the CIA's venture capital arm. We have tens of thousands of customers in over 100 countries, including 90 of the Fortune 100. Our Professional Solutions Group has created a wide range of custom solutions, some which are more complex than Healthcare.gov, but never more expensive. I'm a graduate of Harvard College with a bachelor's in engineering and a master's in physical oceanography. My Experience with Healthcare.gov On October 1, I visited Healthcare.gov to get an insurance quote for my family. The experience was so terrible that I documented the technical problems I encountered and wrote a blog post about it. I could tell immediately from the nature of the crashed I encountered that the site was not ready by prime time. It had a terrible design that was not consumer-friendly, seemed to be coded by amateurs, and wasn't tested. I could tell the site would not work for one person much less the expected load. The blog post I wrote on October 1 went viral as people began to understand the problems were deeper than too many users. That led to being quoted in the New York Times and appearing on radio and news shows such as CBS, CNN, Fox, MSNBC, NBC, Hannity, Greta, Al Jazeera, Geraldo, etc. Throughout the period, I've learned more about the website and its many problems both political and technical. Healthcare.gov Overview This website should not be that difficult to build. It doesn't provide health care. It doesn't even provide health insurance. It's comparing plans and applying for a subsidy. It's the automation of a paper form. Security Implications Security is considered at the beginning of a project, not at the end. Avoiding the collection of unnecessary personal information is the first step to reducing security issues. Separating the user experience from back-end legacy systems is another. The pressure to make a software solution ``work'' is not conducive to good security. There are ways to improve the user experience, scalability, and security. Contractor Abuse of Taxpayers Healthcare.gov is just one example of a software project gone awry that Government contractors profited at the expense of taxpayers. I originally thought the website was created by people who didn't know what they were doing; that they were trying to do too much in an unnecessarily complicated and thorough manner. My thoughts have evolved and I now feel that it's designed quite cleverly to maximize taxpayer expense. This is a scandal that needs to be investigated. Follow the money and I believe you'll see design decisions that led to increased costs. There are ways to improve governance to fix this. background Thank you for inviting me to your hearing. About FMS, Inc. I'm Luke Chung; the president and founder of FMS, Inc., a privately-held software development firm located in Vienna, Virginia. Since 1986, FMS has provided software products and development services to commercial and Government agencies. Over 27 years, we've created a wide range of database solutions helping organizations make better decisions based on data. These important decisions include delivering services, managing operations, understanding finances, increasing accuracy, improving customer service, making fewer errors, targeting criminals, making more money, and increasing efficiency. We have tens of thousands of customers in over 100 countries. In the 1990s, we became the world's leading provider of commercial products for Microsoft Access with 12 solutions to help people better analyze data, automate e-mail blasts, create better solutions, eliminate errors, and provide system administration. In response to 9/11, we created the FMS Advanced Systems Group to use link analysis and social network analysis (SNA) to find hidden relationships among people, places, and events. That led to the creation of our Sentinel Visualizer product that helps analysts in the counter-terrorism, defense, and law enforcement communities, both in the United States and abroad. Sentinel Visualizer led to our only outside investor, InQTel, the CIA's venture capital arm. In addition to our commercial off-the-shelf products, the FMS Professional Solutions Group has created custom database applications for a wide range of customers. Examples include the Logistics Support System for the Pan American Health Organization sponsored by six U.N. agencies. It coordinates humanitarian relief logistics for disaster zones and is deployed with language localization features in over 100 countries, including the Philippines. FMS also created a course management system for the Defense Acquisition University, which provides non-military training to all branches of the DoD. FMS has also created custom solutions for event management, e-commerce, logistics, education, health care, public works, nonprofits, and businesses. About Me I'm originally from New York, grew up in Orlando and Sarasota, Florida, and am a graduate of Harvard College. I have a bachelor's degree in engineering, and a master's degree in Physical Oceanography. Prior to founding FMS, I worked as a management consultant at Strategic Planning Associates/Mercer. Current member and past president of the Washington, DC Chapter of the Entrepreneurs Organization. Serve on the Business and Community Advisory Council to the Fairfax County Virginia Public School Superintendent. Serve on the Information Technology Policy Advisory Committee to assist the Fairfax County Board of Supervisors oversee county technology investments. The committee exists because the supervisors recognized years ago they were unable to provide the proper governance over their technology investments. Caveats My testimony is based on my personal experiences and opinions. I am an observer to the Healthcare.gov website and am not personally involved with its design and development. Any suggestions of incompetence or wrongdoing are comments intended for further investigation by the committee. My Perspective I am providing my testimony from a non-partisan perspective focused on my decades of experience creating database solutions, the challenges of running a small business, and having observed how the Government contracting world works. In 27 years running FMS, I've experienced multiple Government administrations, economic cycles, and changes with technology. I run a small business and have responsibilities to my clients, firm, employees, and family. These obligations include buying health insurance. experience with healthcare.gov on october 1 On October 1, I visited the Healthcare.gov website to get an insurance quote for my family. I wanted to see what policies were available and how they compared in features and price to what my small business is currently purchasing in our group plan. What started as a simple shopping experience turned into a venture inside the technically worst website I've ever visited. It was so bad that I started documenting the bugs I encountered. I was shocked because the mistakes were so amateurish that it seemed the website was created by people who had never been paid to write commercial software. Based on my experience, I realized that if those types of bugs existed, the website had huge problems way beyond the number of users. I sensed that it would not support one user, much less the millions expected. The shocking part is that this website should be very simple: It does not provide health care; It does not even provide health insurance; It's supposed to let consumers compare and choose among insurance plans; It's supposed to generate a subsidy, if any, to buy insurance; It is essentially the automation of a 12-page paper form. I shared my findings in a company blog post entitled Healthcare.gov is a Technological Disaster (http://blog.fmsinc.com/healthcare-gov-is- a-technological-disas- ter/)--See Appendix A. It includes screenshots of the crashes and suggested that I was embarrassed for my profession for delivering such junk. It looked like the developers never used or tested it. I concluded that the quality of the work wouldn't pass a computer science class and that there would be huge Public Relations problems that could doom the entire Affordable Care Act. That's what I saw on Day 1. Response to My Blog Post While the contractors and administration tried to spin the problems as the result of too many users, my blog post--which provided a non- partisan, technical evaluation of Healthcare.gov--started getting picked up by multiple websites. And through the power of social media, it went viral. Within a week, I was quoted in a New York Times article which was followed by interviews with radio and National TV news channels including CBS, CNN, Fox, MSNBC, NBC, Sean Hannity, Al Jazeera, Greta van Susteren, Geraldo Rivera, etc. It has led to this testimony. Offering Solutions Since I don't like being a critic without offering possible solutions, on October 14, I wrote another blog post outlining how Healthcare.gov can be properly built: Creating a Healthcare.gov Web Site that Works (http://blog.fmsinc.com/creating-a-healthcare-gov-web- site-that-works/) see Appendix B. My suggestions would a website that would better address the needs of the customer, be simpler to develop, easier to test, more robust, support more simultaneous users, and be more secure. It would separate the shopping experience and an estimate of a subsidy from the actual application to receive a subsidy (the part that needs to be secure). The marketplace would be the central site where it would be easy to compare insurance plans before worrying about pricing and subsidies. The site would be hosted on commercial cloud providers that could scale to support huge numbers of simultaneous users. It would use commercial business software that would significantly reduce the amount of code that needs to be written and tested, which would also reduce the security risk. Healthcare.gov Observations Here are my observations about the technical issues I encountered on the Healthcare.gov website: It's poorly designed. It doesn't address the needs of a consumer trying to shop for something, nor is it designed to support lots of users or high security. It's poorly developed. The site has such amateurish errors that it appears to be created by inexperienced developers. It's not tested, or if it was tested, the test plan was woefully inadequate. In my experience, encountering that many bugs in such a short period of time indicates that was only the tip of the iceberg with many more bugs below the surface. As bugs are fixed, more bugs will be found since those sections were never adequately tested before. The management team and contractors seemed to think the site was production quality on October 1. It clearly wasn't, which would indicate that those people don't understand what production quality means. They shouldn't be involved with the project since we've experienced what they consider shipping quality. I do not consider what was delivered to be beta (test) quality. security implications Lack of competent technical oversight not only leads to waste, but to potentially devastating security vulnerabilities if complex systems that millions of people depend on are undermined or brought to their knees by attackers. Technology alone cannot deliver security, and the more complex a system is, the harder it is to secure against known threats, much less unknown ones which are sure to emerge in the future. When developers operate under deadline pressure, they tend to cut corners to ``just get it to work'', generating fresh security vulnerabilities and bugs. Nothing is ever perfectly secure. Security has to be considered at the beginning of the project, not at the end. The most important part of security is to NOT collect secure information unnecessarily. The next step is to minimize the places where security is necessary. The sections in which users shop for insurance policies, get an estimate of the subsidy, and buy a policy without a subsidy should not require any security. Another design consideration is to create as few places of vulnerability as possible. That means fewer screens, fewer places where data changes hands, and running secure processes off-line separate from the user interface. The skills to build a secure web database application are far more advanced than the skills the existing developers failed to exhibit. A chain is only as strong as its weakest link. contractor incentives Originally, I thought the design decisions of the Healthcare.gov site were done by amateurs who didn't know what they were doing. I'm now moving away from that conclusion. Instead, I'm seeing how the design decisions may have been made to maximize taxpayer expense and vendor profitability. Government Contractors The current Government contracting system excludes technically- qualified companies by making it difficult for them to bid and work on Government projects. The companies that specialize in Government contracts are good at winning Government contracts, protesting lost awards, and creating change orders. They are not known for their technical expertise. Their strategies and operations would not be competitive in the private sector. Currently there is no downside for failure to deliver on a Government contract. There is nothing to prevent failed vendors from bidding on future projects or being suspended from existing projects. Abusing Taxpayers I don't know how the decisions were made, but if I look at it from the contractors' perspective with the knowledge that the budget was essentially unlimited, it would explain how choices were made to add complexity, increase billable hours, purchase more hardware and bandwidth, and maximize profits. Of course, the big mistake was not delivering a quality solution. Unlike many other IT projects that have failed in the Federal Government, this one let the public experience the quality of the deliverables. Examples of areas that maximize profits: Performing an identity check for each visitor. Is the credit agency paid for each check? Creating a user login in three screens rather than one? Was the contractor paid per screen? Was there consideration that more screens use more resources? Why ask for secret questions? The email confirmation process requires almost immediate confirmation. My 30-minute delay in responding canceled my account and required creating a new login. Why does this feature exist? Why are the screens to fill out the application one question per screen? Why not put all the questions on one screen to minimize the complexity, data exchanges, and improve scalability and security? Were contractors paid based on the number of questions and screens? Why ask optional questions such as race that are not part of the subsidy process? Addressing Contractor Complaints From what I can see, the contractors are trying their best to deflect blame: There are claims the Government was changing the design at the last minute and there wasn't enough time for testing. On every project I've worked on, designs are always changing and there has never been too much time for testing. It's the responsibility of the contractor to provide the guidance and services to ensure success. There are claims that individual portions were working but the overall system was not. Based on what I observed, the website wasn't working even if the overall system wasn't tested. My belief is that both the individual portions AND the integrated system were not working. Where Did the Money Go? I don't understand how the contractors could have charged the taxpayers so much money. At $200 million at a generous $200 per hour, that's 1,000,000 man hours. That's 500 man-years. Now the numbers are even larger. Where did all that time go? technology management recommendations This is a complete breakdown in managing technology investments. People do not understand when a project should cost $1 million vs. $100 million. In the private sector, a $1 million budget to build a website is huge. The Government needs to remember that buying from companies that specialize in Government contracting is not the same as vendors who are competitive in the private sector. Create a Technology Assessment Office A Technology Assessment Office (TAO), a non-partisan entity similar to the GAO that is capable of assessing and managing Government technology projects. Policy makers, politicians, and bureaucrats do not possess the technology skills to keep up with the rapidly-changing technology options. They also don't understand what technology should cost or the implications their decisions have on cost, security, and other options. My serving on the Fairfax County Technology Policy Advisory Committee is an example of this type of governance. Enforce Accountability Past performance is considered an important part of winning Government contracts but it doesn't seem to prevent contractors involved with failed projects to continue winning new contracts. If qualifications matter for selecting contractors, when do contractors ever get permanently banned? Multi-year or permanent bans should target underperforming vendors to prevent them from bidding on new contracts and removed from existing ones. In the private sector, vendors that fail would rarely be allowed back. Do we have a too-big-to-exclude policy? audit and investigation needed An exhaustive investigation and audit of the Healthcare.gov project would help determine the various points of systemic failure in order to ensure that a debacle of this magnitude never happens again. Experience of the Development Team The experience of the vendor is important, but what's most important is the experience of the people actually doing the work. Given my sense that the developers were quite junior, it would be interesting to learn their previous experience building commercial database websites, what they were being paid, and what the taxpayers were charged. Make sure people involved with the entire life of the project are questioned, and not just the ones remaining today. Development Management and Environment How were the deliverables designed, scheduled, and delivered? How were the teams managed? What code reviews were held, and by whom? What development, testing, and staging environments were employed? Was there a test plan? If so, what were the results of the test plan before October 1? What bugs were considered acceptable for deployment? How did the test plan change and who was paid for the October 1 that was so bad? Is load testing and balancing in place? What kind of security reviews, threat analyses, and mitigation strategies were undertaken? What kinds of security vulnerabilities were detected, and when are they scheduled to be addressed? How are security issues addressed on an on-going basis? Technology Selections Why did they take such a strong stand on using open-source ``free'' software rather than commercial business software that would require less customization (and therefore cost less with fewer security vulnerabilities)? (TheAtlantic.com, June 28, 2013, Healthcare.gov: Code Developed by the People and for the People, Released Back to the People) Why did they create their own cloud rather than using better and cheaper commercial cloud providers? Especially when large portions of this site do not need any security. Design Flaws and Bugs Secretary Sebelius and HHS have announced that they've fixed hundreds of bugs, which indicates that there are likely hundreds more yet to be found. No matter how many bugs are fixed, the unintended consequence is that more will inevitably crop up elsewhere in the code base. Is the current website being redesigned to make it work properly for consumers, or are they instead trying to make the existing flawed design functional? Poorly-designed systems are nearly impossible to rescue, and inevitably lead to further support costs down the road. When a complex system is created by multiple vendors with no technical managerial oversight, it is inevitable that systemic flaws will lead only to finger-pointing and recrimination, not to solid, functioning software. Number of Concurrent Users The heaviest demand day was not October 1, but will be the day of the deadline to sign up. It's the equivalent of April 15 for the IRS. How are they preparing for that? How many simultaneous users can they support, and what happens if the number of users exceeds that? Is load balancing in place? Are we buying lots of equipment for that one day that will sit idle afterwards? Totally unnecessary if a commercial cloud provider is used. There are policy implications if the system crashes and people are shut out before the deadline. What Are They Thinking? How could they have possibly thought the site was ready to go on October 1? There was a seminar scheduled on HowTo.gov to showcase how the contractors created this great website but it was postponed due to the Government shutdown and later canceled. Are they redesigning the website to make it work properly for consumers or are they trying to make the existing bad design work? A More Open Policy Many companies could have created the Healthcare.gov website or similar database websites. Why is it so difficult for technically-qualified companies to bid and work on Government projects? Why isn't the data on the insurance policies, pricing, and formulas for subsidies opened in a manner that the private sector can create their own website marketplaces? conclusions Overall, I'm embarrassed as an American to watch my President and Cabinet Secretary talk about website design, development, and testing, and promoting 800 numbers. They should be focused on policy and things like Iran and North Korea. Websites should be taken care of at a much lower level and certainly no higher than the CTO. The underlying problem of Healthcare.gov lies in the way that Government contracts are awarded. Our way of life is becoming more, not less, dependent on technology every day, yet there is no one at the highest levels of Government capable of determining when the Government is being ripped off. Taxpayers made a significant investment with the contractors to expect a functional Healthcare.gov website. While there may be some excuse for complexity with connecting to legacy databases in various agencies, I don't see any reasonable excuse why the user experience would be so defective or the costs so high. This is a scandal beyond Healthcare.gov and touches on the entire way the Government purchases software solutions. Unfortunately, the Federal Government has paid for even larger software projects that were never functional. The need for a bi-partisan Technology Accountability Office to investigate and regulate technology at the Federal level is urgent and immediate; not only to stem the hemorrhage of taxpayer dollars, but to ensure the security and viability of the essential systems millions of Americans depend on. Taxpayers paid Super Bowl ticket prices and were delivered a high school football game. Follow the money. Attachments appendix 1.--blog post: healthcare.gov is a technological disaster This was the blog post I wrote on October 1 providing a non- partisan technical review of the Healthcare.gov website. Finally Here October 1, the Affordable Care Act (Obamacare) website Healthcare.gov finally went live today. I was eager to personally review what was being offered and cut through the hoopla and criticism. I had previously written FMS Receives Health Insurance Premium Refund from the Affordable Care Act, so my expectations were high. From the previously published rates for Virginia, the cost of insurance premiums for individuals and families was considerably lower than what FMS currently pays for our group plan. Business plans aren't available yet, but the individual plans should be a good indicator. I wasn't interested in the subsidies; I simply wanted to know the prices for the different plan options. Applying for Coverage So I went on-line to Healthcare.gov around 5:30 A.M. to apply for my family and see what it would cost. As expected, you create a log-in with email confirmation, and fill out a Wizard to select the options. It's similar to many other instances I've applied on-line for credit cards and other forms of insurance. How tough could it be? Technically, it's a very simple data entry application that should generate a quote at the end. What a Mess! Unfortunately, what should be a simple process is a complete software technology disaster. The logical flow of the application to register, log-in, and fill out the data for a family was horrendously inefficient. It seemed like the person who designed it, had never used it. Or maybe didn't have a family which required filling out the same information for each member of the family. Just the initial process of creating a log-in required multiple secret questions and other unnecessary data for getting a quote. Sure that may be necessary for the final acceptance, but it's a complete waste of time and web resources initially. The system should expedite the process as much as possible to get people a quote without subsidies, then ask for more information to calculate the subsidies if desired. Since I later discovered it never generates a quote, it may not really matter anyway. What were the designers thinking? Overly Complex Data Entry As for my family, I not only had to identify my spouse, my two kids, their relationship to me, but also their relationship to my wife, and even their relationship to each other! What? Given the prior information, obvious defaults could be offered. The selection of race was also more complicated than it should be. Here's an idea that may not have occurred to the designers: Maybe the kids should default to inherit their parents' races. That's how inheritance works. And does race impact pricing? If not, why ask? The system crashed several times for me and had problems when I logged back in. It seemed like the system wasn't even tested. Here are some screenshots: [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] What the hell is that? How could that get through testing much less production? [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] Having error handling to catch unexpected crashes is a Best Practice in application development. It should tell the user what went wrong, what to do next, and gracefully exit the system. This page does none of that. The error message and error number are blank. Who knows what went wrong? Useless and amateurish. They do have a Live Chat button. I wonder what I would chat with them about with this crash. [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] In this screenshot a series of errors appear to be triggered without meaningful explanation. Embarrassing. Logging Back in and Repeating If anything, I'm persistent. I not only had my original goal to see the premium prices, I was now intrigued to discover how poorly designed, developed, and tested this application was. Eventually, I was able to finish. Took about an hour. However, rather than receiving a quote immediately, it's now being ``processed''. For what? It shouldn't be held up for pre-existing conditions which ACA eliminates. I would expect it to be some mathematical, logical formula that would generate the results. I presume it's because that part of the application isn't built yet. Although my application is submitted, given the crashes, I'm not sure what data it has. We'll see. Authors of Healthcare.gov A few months ago, I read this article about how the site was being built and was impressed: Healthcare.gov: Code Developed by the People and for the People, Released Back to the People. In hindsight, it appears the authors have a philosophical bias toward Open Source and ``people power.'' That's all fine and dandy if it works, but this site doesn't. To deliver such low quality results requires multiple process breakdowns. It just proves you can create bad solutions independent of the choice of technology. Technical Software Conclusions What should clearly be an enterprise-quality, highly-scalable software application, felt like it wouldn't pass a basic code review. It appears the people who built the site don't know what they're doing, never used it, and didn't test it. I actually experienced many more problems than the screenshots I captured. Had I known I was performing a Quality Assurance assignment, I would have kept better documentation of typos, unclear directions, bad grammar, poorly-designed screens, and other crashes. My bad! It makes me wonder if this is the first paid application created by these developers. How much did the contractor receive for creating this awful solution? Was it awarded to the lowest price bidder? As a taxpayer, I hope we didn't pay a premium for this because it needs to be rebuilt. And fixing, testing, and redeploying a live application like this is non-trivial. The managers who approved this system before it went live should be held accountable, along with the people who selected them. fms professional services group Our Professional Solutions Group has created many mission-critical, custom software applications where scalability, reliability, and quality are paramount. For instance, we built the Logistics Support System for International Humanitarian Relief for the United Nations where lives are dependent on accurate, timely data on a global scale. sentinel visualizer We've also created a database link analysis program for the intelligence and law enforcement communities. I know what's involved in creating great software, and this ain't it. Healthcare.gov is simply an insurance quote system. As a software developer, I'm embarrassed for my profession. If FMS ever delivered such crap, I'd be personally inconsolable. This couldn't pass an introductory computer science class. Overall Conclusions This is going to be a huge public relations mess that could doom the whole initiative. Maybe they can blame the problems on too many users even if that weren't the real cause, but it's not going to be fixed with a few weekend tweaks and throwing more hardware at this. The application process asks too many unnecessary questions and repeatedly crashes. Since 9 A.M. and as of this evening, the site no longer lets you apply. I presume it got overloaded or someone finally discovered how broken it is and pulled the plug. Given what I experienced, it needs to be off-line until it's corrected. Meanwhile, I'd be highly concerned about the security of the data people enter given all the crashes I encountered. Of course, software problems with the application process are not the reason to abandon health care reform. As a small business owner, we face the highest premiums for the lowest coverage. I applaud the efforts to reform health insurance and look forward to working in a constructive, rather than destructive, manner to improve this. I presume once these issues are resolved, I'll have more options for my company and employees than I did before. In the big picture, this website is much easier to fix than health insurance. We'll see. appendix 2: blog post: creating a healthcare.gov website that works Healthcare.gov Suggestions for Improvement Since I don't like to just complain without offering solutions, on October 14, I wrote a new blog post outlining a solution that would be better for consumers, easier to develop, quicker to test, more scalable, and more secure. Entitled Creating a Healthcare.gov Web Site that Works (http://blog.fmsinc.com/creating-a-healthcare-gov-web-site- that-works/), it offers suggestions: Understanding the Buying Process for Health Insurance It's important to understand what the website should do. The primary mistake the designers of the system made was assuming that people would visit the website, step through the process, see their subsidy, review the options, and select ``buy'' a policy. That is NOT how the buying process works. It's not the way people use Amazon.com, a bank mortgage site, or other insurance pricing sites for life, auto, or homeowner policies. People want to know their options and prices before making a purchase decision, often want to discuss it with others, and take days to be comfortable making a decision. Especially when the deadline is months away. What's the rush? The existing process acts as if a retail website asked for your credit card number before showing what you could buy and their prices. Almost all sites let you browse without creating a user name. Retailers want you to see what's available as quickly and easily as possible. People often visit multiple times before buying. Only after making a purchase decision should personal information be collected to complete the transaction. The website needs to reflect this and support a more common buying process. Conceptual Overview Here's an overview showing three distinct processes that flow into each other (or people buy a policy at their step and leave the system). A critical part is offering a comparison matrix at each level so consumers can quickly see the differences between the insurance policies. [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] 1. The first one gives policy options and non-subsidized quotes. People can click to purchase the policy from the insurance company. If so, they leave Healthcare.gov and the Government is no longer involved. 2. The second provides a subsidy estimate and uses the same display as the first but with and without subsidized prices. People can also click to buy the policy without a subsidy and leave the system, or they can officially apply for a subsidy. 3. The third is the actual application for the subsidy and the only path which collects Personally Identifiable Information (PII). Higher security is necessary for this. The first two do not require PII and would not require high security. That means a commercial cloud service such as Microsoft Azure could be used to host the site and adjust to high traffic loads. It would support people shopping and browsing multiple times before buying without the need to invest in hardware or bandwidth. With this improved design, only a small portion of the site's traffic would be in the final subsidy application portion. That can be isolated with high security and for much lower volumes of users since people would only apply once. Hassling people at this stage with lots of personal questions is acceptable since people are serious about purchasing. User Experience Goals These are some objectives for creating a great user experience: Quickly get the unsubsidized insurance rate quotes and policies (no login required); Easily compare among insurance policies based on features and price; Easily select and subscribe with an insurance company without a subsidy; Quickly receive an estimate of a subsidy without having to provide personally identifiable, confidential information; Easily compare among insurance policies based on features and subsidized prices; Formally apply for the subsidy (log-in and personal information required); Select a subsidized policy and pass the appropriate information so the insurance company can validate the subscriber's information and receive the subsidy; Once policy options are offered, allow users to create a log-in to save their inputs, and get back into the system to recover their work-in-progress. This would be required with the formal subsidy application but not necessary for the other options. Technical ``Back Office'' Goals Performance.--The system should move people through the process as quickly as possible. Collecting Information.--It should not ask for any information that's not required for generating the policy options and prices. Fewer Screens.--Rather than having one screen per question, multiple questions should be asked in as few screens as possible. People know how to scroll. Extra screens should only be added if they depend on answers from previous screens. Data Security.--The first part of data security is to NOT collect sensitive information. Sensitive information should only be collected from people actually applying for the subsidy. Data Integrity.--All database changes need to be in transactions with commitments and rollback on failure. Situations where accounts are partially created with a valid user name and no account details should never occur. No Other Connections During Data Entry.--The system should not be connecting to other data sources while the user is entering data. Just collect the data. Off-line Processing.--Once the user enters all their data for a subsidy quote, a separate system processes the applications and interfaces with the other systems to validate the data and calculate the subsidy. By separating this process from the user's on-line experience, problems with connections to other systems do not impact the user. Email Notification.--Once a subsidy is calculated, an email is sent to the user inviting them to log into the system to see their options. Notification to Insurers.--Web pages and web services to allow real-time views of the status of applications selecting the insurer's policies. Commercial Cloud Hosting.--Using a commercial cloud platform would provide automatic scalability to meet fluctuating levels of users without having to make hardware purchases. By eliminating the need to collect and store sensitive user data for most of the website, commercial cloud hosting and its benefits are available without security concerns. Oversight Goals Management and interested parties should have system dashboards: Real-time Displays.--Monitor user progress with summary tables and graphs showing the status of people moving through different stages of the system. Basic Business Intelligence.--Summary and drill-down details by State, date, hour, etc. System Transparency.--Provide a public view of some data in a cached mode (updated daily or hourly, but not real-time). Design Overview Here is how the goals could be implemented for the Healthcare.gov website: (1) The initial form asks people to select their State. If the visitor is in a State that has their own system, ship them to those sites, otherwise proceed with the next step in the Federal system. (2) Collect the information necessary to create the unsubsidized options. I was told there were five or so pieces of information necessary to generate the unsubsidized rates (e.g. gender, year of birth, family status, smoking status, etc.). (3) Display the available plans with options to compare and filter them easily based on plan level (gold, silver, bronze, etc.), provider, price, etc. Should be similar to retail websites like Best Buy or Staples showing different products and their features in a matrix comparison, with buttons to get more details and a button to select one to buy. One would expect users to come to this site multiple times over multiple days to learn about their options before making a purchase. (4) An option to save the inputs. This would be the first time to create a simple account to collect user information (which does not include things like social security numbers, birthdates, or names). A simple user name (e-mail address) and password, with a standard e-mail confirmation that doesn't have a time limit. This would allow users to get back to the previous screen without re-entering their data. (5) An option to get a subsidized price estimate. If the person chooses this option, they create a simple account because highly sensitive information will not be collected. The account is simply to retrieve the user's entries. The user provides the information necessary to calculate the prices without having to look up data from Government sources. The user can enter their values for income and whatever other factors impact generating a subsidy estimate. Just like bank websites let you enter basic information to get a mortgage or car loan rate before you apply, Healthcare.gov should do the same. This would allow the site to create quotes quickly without having to bog down or wait for the other sites such as the IRS, Experian, etc. This minimizes the impact of too many users. Once the estimated subsidies are calculated, a display similar to No. 3 above would show the options. (6) Finally, applying for the subsidy. Once someone decides they want a particular policy, they can officially apply for a subsidy. This is the first time personal data needs to be entered. The system should collect the data as quickly as possible without having to validate the information while the user is entering it. Once all the data is collected, the user is informed via email when the subsidy calculation is ready. (7) A separate background process calculates the subsidy requests and looks up the necessary data from the different sources. If any of those linked systems is unavailable, it's no big deal since it doesn't impact the user on the website. The user is already gone and waiting for an e-mail. Once the calculation is generated (or if it couldn't be generated), the user is notified via e-mail and they can view the results by logging back into their account. For management, there should be dashboards with tables and graphs showing what's happening. No more excuses of not knowing how many people are in each phase of the process, how many have received quotes or enrolled, etc. For transparency, some of this information should be publicly available updated at least daily. conclusions I'm not sure whether the people designing and developing the site will find these suggestions helpful. There's obviously lots of details not included in my proposal, but I'm confident my basic design is a significant improvement over the original site. It would provide a better user experience, be much easier and faster to develop, easier to test, and more scalable and secure. Was it that tough to envision earlier? Let's remember, this website remains the automation of a paper form. It's not as hard as providing health care. Chairman McCaul. Thank you, Mr. Chung. I appreciate your testimony. Mr. Krush is now recognized for 5 minutes. STATEMENT OF WAYLON W. KRUSH, CHIEF EXECUTIVE OFFICER, LUNARLINE, INC. Mr. Krush. Chairman McCaul, Ranking Member Thompson, and the Members of the committee, thank you for this opportunity to testify today on the important topic of cybersecurity as it relates to HealthCare.gov. I am Waylon Krush, founder and CEO of Lunarline, Inc. We are a leading provider of cybersecurity products, services, and training for the Federal Government and also the commercial sector. I am also a founding member of the Warrior to Cyber Warrior program. The Warrior to Cyber Warrior program provides, at no cost, a 6-month boot camp for returning veterans. This program equips veterans or their--if a veteran is unable to participate because of service-related injuries, their spouses--with the skills, training, and certifications they need to thrive in the cybersecurity world. I have been asked to speak today on the topic of cybersecurity as it relates to the recent events surrounding the HealthCare.gov website and related systems. I want to make clear that I am not here to weigh on the political debate surrounding the Patient Protection and Affordable Act. This is above my pay grade. Instead, I am here in my capacity as a cybersecurity professional, one who has contributed to the defense of our Nation's IT infrastructure, both as a soldier in uniform and as a leader of one of our country's fastest-growing cybersecurity firms. I was recently asked by the press if I would, as a cybersecurity professional, trust my own personal data to HealthCare.gov. I said yes that I would, and I stand by that statement. This is not because I believe HealthCare.gov is 100 percent secure. There is no IT system, Federal or otherwise, that can make this claim. Instead, my confidence in HealthCare.gov is based on my hands-on experience with the rigorous process the Federal Government has instituted to effectively manage--not eliminate, but manage--cybersecurity risk. Now, I realize it is a bit odd for a cybersecurity professional to come before Congress and preach the confidence in our Government's cybersecurity posture. We cybersecurity folks are usually better known for peddling cyber doom and gloom. However, the truth is there is plenty of cause for confidence, particularly when we--it comes to Federal cybersecurity. To explain why I feel this way, I would like to focus my testimony today on the risk management framework and how it relates to some of the concerns recently brought up in the on-going media coverage of HealthCare.gov. Now, I have been given just 5 minutes to briefly describe this extensive cybersecurity process and regulations that provide the foundation for the U.S. Government's systems security. To put this task into context, a few years ago a colleague and I wrote a book entitled, ``The Definitive Guide to the C&A Transformation.'' In this book, we did our best to scope down thousands upon thousands of pages of Federal cybersecurity and privacy regulations into 600 pages of easy reading. The easy reading part is a joke, but the level of depth and rigor in this process is not. Here today, I will try to distill these processes even further into just 5 minutes of testimony. During these 5 minutes, I will do my best to describe how the 6-step risk management framework supports the Federal Information Security Management Act. Excuse me. This, in turn, should provide a baseline understanding for the security processes governing HealthCare.gov and, in reality, any Government IT system. I hope that from my testimony this will help folks interpret how now-famous decision memo originally intended for Marilyn Tavenner that describes some of the known security risks faced by HealthCare.gov. The RMF is a 6-step process. It includes categorization, security control selection, implementation, assessment, authorization, and continuous monitoring. I will briefly describe each one of these steps, and provide some insight into how each one relates to the security of HealthCare.gov. I will, however, caution the committee that any internal vulnerabilities related to HealthCare.gov should absolutely not be publicly released until HHS or CMS has time to mitigate or remediate these issues. The first step is categorization. We look at all of the data types that are actually in the Federal information system. We have two publications, NIST Special Publication 860, Volume 1 and Volume 2. So we have to find out what type of data this system consists of. The next step governs the selection of the security controls. This is a process where we automatically assign a set of baseline security controls, whether it is low, moderate, or high. And enhancements, if need be, based on the protection requirements of the system. In step 3, this is where we actually implement the security controls. These are hundreds upon hundreds of controls, including enhancements and tailoring guidance that goes into every Federal information system. In step 4, we actually have assessment. These are on-going assessments, these are assessments before the authorization decision is made. These are annual assessments. These are what we call assessments that go with the updates of code that we are gonna see during this process of updating HealthCare.gov. There is one thing that we need to know; there is no such thing as a clean assessment. An assessment of any system, Federal or otherwise, will always reveal some security risk. It is not possible to have a completely secure system. In conclusion, I hate to tell everyone but at this point in time there is no cybersecurity bullet, silver bullet. If there were I would be selling them, lots of them. A secure system requires the right people, process, and technology to work together harder, smarter, and faster than the adversary. [The prepared statement of Mr. Krush follows:] Prepared Statement of Waylon W. Krush November 13, 2013 Chairman McCaul, Ranking Member Thompson, and Members of the committee: Thank you for this opportunity to testify today on the important topic of cybersecurity as it relates to Healthcare.gov. I am Waylon Krush, founder and CEO of Lunarline, a leading provider of cybersecurity products, services, and training to both Federal and commercial clients. I am also a founding member of the Warrior to Cyber Warrior program. Warrior to Cyber Warrior provides, at no-cost, a 6-month cybersecurity boot camp for returning Veterans. This program equips Veterans, or if a Veteran is unable to participate because of service- related injuries, their spouses, with the skills, training, and certifications they need to thrive in the cybersecurity world. I have been asked to speak today on the topic of cybersecurity as it relates to the recent events surrounding the Healthcare.gov website and related systems. I want to make clear that I am not here to weigh in on the political debate surrounding the Patient Protection and Affordable Care Act. That is above my pay grade. Instead, I am here in my capacity as a cybersecurity professional, one who has contributed to the defense of our Nation's IT infrastructure, both as a soldier in uniform and as a leader of one of our country's fastest-growing cybersecurity companies. I was recently asked by the press if I would, as a cybersecurity professional, trust my own personal data to Healthcare.gov. I said yes, that I would. I stand by that statement. This is not because I believe that Healthcare.gov is 100% secure. There is no IT system, Federal or otherwise, that can make this claim. Instead my confidence in Healthcare.gov is based on my hands-on experience with the rigorous processes the Federal Government has instituted to effectively manage--not eliminate, but manage-- cybersecurity risk. Now I realize it is a bit odd for a cybersecurity professional to come before Congress and preach confidence in our Government's security posture. We cybersecurity folks are usually better known for pedaling cyber doom and gloom. However, the truth is, there is plenty of cause for confidence, particularly when it comes to Federal cybersecurity. To explain why I feel this way, I would like to focus my testimony today on the Risk Management Framework and how it relates to some of the concerns recently brought up in the on-going media coverage of Healthcare.gov. Now, I have been given just 5 minutes to very briefly describe the extensive cybersecurity processes and regulations that provide the foundation for U.S. Government system security. To put this task in context, a few years ago a colleague and I wrote a book entitled The Definitive Guide to the C&A Transformation. In this book we did our best to scope down thousands upon thousands of pages of Federal cybersecurity and privacy regulations into just 600 pages of easy reading. The easy reading part is a joke, but the level of depth and rigor in the process is not. Here today, I will try to distill these processes even further, into just 5 minutes of testimony. During these 5 minutes I will do my best to inform everyone on how the 6-step Federal Risk Management Framework (RMF) supports the Federal Information Security Management Act (FISMA). This, in turn, should provide a baseline for understanding the security processes governing Healthcare.gov, and in reality any Government IT system. I also hope that my testimony will help folks interpret the now-famous ``decision memo''--originally intended for Marilyn Tavenner--that describes some of the known security risks faced by Healthcare.gov. The RMF is a 6-step process that governs the categorization, security control selection, control implementation, control assessment, authorization, and continuous monitoring of all Federal IT systems. I will briefly describe each step and provide some insight into how each one relates to the security of Healthcare.gov. I will however caution the committee that any internal vulnerabilities related to Healthcare.gov should absolutely not be publicly released until HHS or CMS has time to mitigate or remediate these issues. The first step, Step 1, is called categorization. During system categorization we analyze all the information stored, processed, or transmitted by any component of the system. We classify all data by data type and sensitivity, and set the protection level as ``Low,'' ``Moderate,'' or ``High'' to meet the requirements of the most sensitive system data. Based on what I have read publicly thus far, Healthcare.gov is most likely categorized as a Moderate system. The second step, Step 2, governs the selection of security controls to meet the protection requirements defined in Step 1. As a ``Moderate'' level system, Healthcare.gov is required to implement, at minimum, several hundred security controls. Additional controls may be selected based on any unique system security requirements, such as the presence of personally identifiable information (PII). In Step 3, we take the controls identified in Step 2 and implement them. This is where the rubber hits the road. HHS and CMS have both authored comprehensive information security policies that govern their approach to cybersecurity. These policies are backed by significant investments in enterprise detection and protection capabilities, including security operations centers, enterprise end-point technologies, border and gateway filtering, incident response teams, and enterprise continuous monitoring capabilities. For Healthcare.gov, these enterprise-level controls are combined with system specific ones to support the implementation and maintenance of an effective security posture. After selecting and implementing controls, Step 4 of the RMF mandates frequent security control assessments. These are tests that are conducted to determine whether or not to allow a system to continue operation. However, let me be clear: There is no such thing as a clean assessment. An assessment, of any system, Federal or otherwise, will always reveal some security risks. It is not possible to have a completely secure system. At this point, everyone here is probably familiar with the ``Tavenner memo'' I discussed previously. This memo described some components of the ``Federally Facilitated Marketplace'' that had not yet undergone thorough re-testing due to continued system development. It was determined that this uncertainty represented a ``high risk.'' Now, there is no denying that this does indeed represent a significant system risk. Had the memo ended with that finding we would have every right to be deeply concerned. However, the memo continues to outline a comprehensive mitigation strategy designed to mitigate this risk. This includes the establishment of a dedicated security team to monitor the system, weekly testing of all border and web-facing assets, daily/weekly scans using continuous monitoring tools, and a promise to conduct a full Security Control Assessment within 90 days. While Healthcare.gov's political sensitivity has cast a spotlight on this process, these types of risk analyses are common place across the Federal Government. Again, security assessments always reveal risks, no matter what system is being assessed. How those risks are managed ultimately determine whether or not a system can be labeled ``secure.'' There is a reason it's called the ``Risk Management Framework,'' rather than the ``No Risk Framework.'' It is designed to ensure that Risk Executives conduct precisely these types of trade-off analyses. The Tavenner memo is also an example of Step 5, called System Authorization. Simply put, this step requires a management decision on how, when, and under what conditions a Federal system may be authorized to operate. Like Healthcare.gov, most Federal systems are authorized with conditions and pending the implementation of an effective mitigation strategy. This is exactly what you are reading in the Tavenner memo. Finally, during Step 6 we continuously monitor security posture throughout the entire system life cycle. This is the most important step in the process. This is why I have publicly stated that I would trust my own personal data to Healthcare.gov. I know as well as anyone that as soon as a system is developed you are in a race against time to find and mitigate vulnerabilities. This is particularly true for high- value targets such as Government IT assets. That being said, if HHS follows through with their on-going daily and weekly scanning and more importantly--quickly remediates and mitigates security issues as they are discovered, we can be assured our data is safe as possible. In conclusion, I hate to tell everyone this, but at this point and time there is no cybersecurity silver bullet. If there were, I would be selling them--lots of them. A secure system requires the right people, process, and technology to work together, harder, smarter, and faster than the adversary. Chairman McCaul. I thank Mr. Krush for your testimony. Yes, I have emphasized before this is probably one of the most significant websites ever created by the Federal Government. In this exchange, the most personal, private data is put into this--Social Security numbers, addresses, e-mails, personal- private health information. I can't think of anything more private than health information. What the American people want, I think, is not only a system that works and that is functional--which, clearly, this is not. As Mr. Chung said, it was amateurish. But they also want some assurance that it is secure. They do not want this data breached and obtained by hackers, or identify theft perpetrators who can then exploit that information. To that point, the CMS administrator wrote a letter to our committee and, specifically, to the Ranking Member, Mr. Thompson, because of his concerns about security of this website. The assurance was given at that time, when that letter was written, that it would be both secure and follow industry best practices. We have since found out that a September 3 memo came out from a senior official at CMS stating that it found two high- risk issues and said the threat and risk potential is limitless. According to Federal guidelines, high-risk means vulnerability could be expected to have a severe or catastrophic adverse effect on organizational operations, assets or, most importantly, individuals; individuals being the American people. We have advocated for a delay in the implementation of this law for many reasons. But certainly, when you have a dysfunctional website and a security risk to the American people's most personally identifiable information, I think that delay, that argument, is certainly even stronger. Mr. Chung, do you agree that we should delay implementation? Mr. Chung. Delaying that would be a policy question. With regard to my knowledge, it would be on the technical side. My expectation would be that when we pay this kind of money to these contractors they would build something that would be secure. It is like buying a car that has tires on it. You would assume that for hundreds of millions of dollars it would be a secure site. The other part of this would--you know, the first step in security and privacy is to not ask for information that needs to be secured. So going through the process of asking all those personal pieces of information, when people are just shopping, without even buying or requesting a subsidy, is an outrage. I don't know if the identity verification company is getting paid for every person that they verify, but I think if you follow the money it would be very easy to see how those decisions were made. Chairman McCaul. In your opinion here, did CMS actually follow industry best practices in setting up this website? Mr. Chung. I was not involved directly on the project so I am not exactly sure what they did or didn't do. I just know from a taxpayer's perspective we paid enough money to demand, and expect, a fully functional website. It is huge how much we have paid. It is over, what, $300 million? I think you can get a 747 and crash it into the ground for less. So it is unbelievable what we have spent for essentially the automation of a paper form. Chairman McCaul. So I guess the question is, I mean: How did this come to be? I mean, we spent, you know, all this money for what you called an amateur website. How did that happen? Mr. Chung. I think that we have an environment where Government contractors are incentivized, especially when they know a customer has an open pocketbook, to create opportunities to bill more hours, to put in more features, to add more complexity, get more change orders, and get the next contract. That is the product that they are really going after. It is not necessarily creating a solution that works. They got caught this time because the general public actually use software that they created. But there are a lot of projects in the Government where Government contractors deliver things that the public never sees. Chairman McCaul. So in other words, you have a Government- run program that the contractors exploited for their own profit at the expense of the American taxpayer. Mr. Chung. Absolutely. I think that is very clear. Chairman McCaul. I am personally stunned that DHS, that has primary responsibility over the dot.gov space--Federal-civilian networks within the Government--the extent of communication with the Secretary and with HHS was two e-mails and one phone call. When I asked a question about how does HHS rank in its scorecard, if you will, for cybersecurity they get a 50 percent compliance record and they rank No. 2 at the bottom. They are the second-worst Federal agency when it comes to security of their networks. Mr. Krush, don't you believe that the Department of Homeland Security should play a greater role in trying to secure this website? Mr. Krush. I believe they should play a greater role. I will say, however, the process that was followed is the process that is followed with all Government systems. Meaning that a risk-based decision was made by an executive that was put in charge of the site. They were provided the information about what type of vulnerabilities, what things need to be mitigated. You know, this goes on throughout the entire Government. You know, there is not a system out there that is perfect in nature, by any means, from a cybersecurity perspective. Chairman McCaul. No, this was certainly not perfect. Mr. Chung, if you have a business and you are pushing a product, and your website not only is dysfunctional but it crashes, would you take a time out and try to fix it first? Or would you still go forward with that program? Mr. Chung. I guess it depends how desperate I was. But, you know, being concerned about the experiences of my customers, no, I would not be able to deliver a product that didn't work. That was what was so shocking when I experienced it on the first day. Because I wasn't there to do a quality assessment of that HealthCare.gov website. I went there to get a price. It was by accident that I find myself in this situation, after experiencing what can truly be considered one of the worst pieces of software I have ever used. Chairman McCaul. In addition to a bad piece of software, though, you have the security risk to Americans' most private information. Mr. Chung. Absolutely. When you have an environment where the developers can barely get the website functional, security is way down on the list of things to take care of, right? Security needs to be built in at the very beginning, not added at the end. When you have an inexperienced developer--people don't--that can't even build a website properly or spell or do grammar, I mean, the skill set that is necessary to create a secure website are far higher than what I could see was the skills of the people that were put on creating that website. Chairman McCaul. So I guess it comes as no surprise that under 50,000 Americans have actually signed up for the exchanges, given the fact that, No. 1, the website is flawed. No. 2, the security risks are so great, if people--if the administration was really interested in getting more people to sign up you think they would take a time-out, fix this, and also fix it from the security standpoint. The thing that also bothers me tremendously is that it has been reported to me that there are about--there are over 700 fake websites out there that purport to be an exchange, purport to be part of this Obamacare program. HealthCare.gov is the official, but there are over 700 fake websites out there that are preying on victims for their personal identifying information so they can exploit that. Does that trouble either one of you? Mr. Krush. Mr. Chung. That happens all the time on every website. That is not unusual. Mr. Krush. Yes, that is not abnormal. One of the things that were brought up earlier by DHS was that they ensured that HHS actually implemented DNS security. So that if you go to HealthCare.gov you are arriving at HealthCare.gov. That doesn't take away the process that when you go out to go to Google.com and you actually put a ``P'' in front of it, or a ``G'' or something, you are gonna sent to a site that looks like Google but I wouldn't be using that search engine. Chairman McCaul. Well, I think it demonstrates--I mean, perhaps a better public education process to demonstrate that there are fake websites out there, and here is the official one. Again, I will close by saying I am troubled that the Department of Homeland Security, that has the primary responsibility for securing the dot.gov space, is defaulting to an agency, a department, HHS, which has one of the worst scorecards when it comes to cybersecurity. With that, it is lunchtime. A lot of the Members have left. But I do want to give the witnesses, since you have taken so much time to prepare and come here today, perhaps give you the last word. I will start with Mr. Chung. Mr. Chung. Well, thank you very much. I mean, I can tell you that as a small business owner I am facing the need to buy insurance for myself and my employees. I have to follow the law. I don't get to choose the laws that I follow. I was really hoping that this would be an opportunity for me to be able to buy health insurance that would be more competitive. Health insurance is a big problem for small businesses. We pay the highest premiums for the worst coverage. We are competing against companies like CGI and these other Government contractors that are much bigger and can probably get lower-priced insurance than we can. So I hope that throughout this whole process we do keep in mind that getting health insurance for companies is important to small businesses for us to remain competitive. Chairman McCaul. Thank you. Mr. Krush. Mr. Krush. I would just like to say that, you know, the processes that we have in place in the Federal Government are some of the most rigorous processes of any type of auditing you would perform on any type of information system. I am very familiar with the type of commercial auditing that goes on. I am very familiar with the Federal auditing that goes on. So, you know, the depth and rigor in the implementation of cybersecurity and privacy requirements that we do build into the systems--whether, you know, they are always working properly, or not--is some of the best out there. I mean, there is just really no comparison. All of the previous speakers brought up HIPAA, they brought up different compliance requirements that are out there. I will tell you, if you are gonna deploy a Federal information system you must not only implement those controls, but the control catalogue itself that we are required to implement throughout each one of the components; whether that be starting at the hardware layer, the hypervisor, the operating system, and all the applications to sit on top of that is the most rigorous cybersecurity of any Nation in the world. Also, just of any organization, whether it be Government or not. Chairman McCaul. Well, with all due respect, I would submit, in this case, it was an abysmal failure. We don't like to see that as Americans, and hope we can move forward in a more productive way. With that, I want to thank the witnesses for your testimony. Members are advised if they have additional questions they can submit that within 10 days. I would ask you to respond in writing to that. Without objection, the committee stands adjourned. [Whereupon, at 12:45 p.m., the committee was adjourned.]