[House Hearing, 113 Congress] [From the U.S. Government Publishing Office] DATA SECURITY: EXAMINING EFFORTS TO PROTECT AMERICANS' FINANCIAL INFORMATION ======================================================================= HEARING BEFORE THE SUBCOMMITTEE ON FINANCIAL INSTITUTIONS AND CONSUMER CREDIT OF THE COMMITTEE ON FINANCIAL SERVICES U.S. HOUSE OF REPRESENTATIVES ONE HUNDRED THIRTEENTH CONGRESS SECOND SESSION __________ MARCH 5, 2014 __________ Printed for the use of the Committee on Financial Services Serial No. 113-68 ______ U.S. GOVERNMENT PRINTING OFFICE 88-530 WASHINGTON : 2014 ____________________________________________________________________________ For sale by the Superintendent of Documents, U.S. Government Printing Office, http://bookstore.gpo.gov. For more information, contact the GPO Customer Contact Center, U.S. Government Printing Office. Phone 202�09512�091800, or 866�09512�091800 (toll-free). E-mail, [email protected]. HOUSE COMMITTEE ON FINANCIAL SERVICES JEB HENSARLING, Texas, Chairman GARY G. MILLER, California, Vice MAXINE WATERS, California, Ranking Chairman Member SPENCER BACHUS, Alabama, Chairman CAROLYN B. MALONEY, New York Emeritus NYDIA M. VELAZQUEZ, New York PETER T. KING, New York BRAD SHERMAN, California EDWARD R. ROYCE, California GREGORY W. MEEKS, New York FRANK D. LUCAS, Oklahoma MICHAEL E. CAPUANO, Massachusetts SHELLEY MOORE CAPITO, West Virginia RUBEN HINOJOSA, Texas SCOTT GARRETT, New Jersey WM. LACY CLAY, Missouri RANDY NEUGEBAUER, Texas CAROLYN McCARTHY, New York PATRICK T. McHENRY, North Carolina STEPHEN F. LYNCH, Massachusetts JOHN CAMPBELL, California DAVID SCOTT, Georgia MICHELE BACHMANN, Minnesota AL GREEN, Texas KEVIN McCARTHY, California EMANUEL CLEAVER, Missouri STEVAN PEARCE, New Mexico GWEN MOORE, Wisconsin BILL POSEY, Florida KEITH ELLISON, Minnesota MICHAEL G. FITZPATRICK, ED PERLMUTTER, Colorado Pennsylvania JAMES A. HIMES, Connecticut LYNN A. WESTMORELAND, Georgia GARY C. PETERS, Michigan BLAINE LUETKEMEYER, Missouri JOHN C. CARNEY, Jr., Delaware BILL HUIZENGA, Michigan TERRI A. SEWELL, Alabama SEAN P. DUFFY, Wisconsin BILL FOSTER, Illinois ROBERT HURT, Virginia DANIEL T. KILDEE, Michigan MICHAEL G. GRIMM, New York PATRICK MURPHY, Florida STEVE STIVERS, Ohio JOHN K. DELANEY, Maryland STEPHEN LEE FINCHER, Tennessee KYRSTEN SINEMA, Arizona MARLIN A. STUTZMAN, Indiana JOYCE BEATTY, Ohio MICK MULVANEY, South Carolina DENNY HECK, Washington RANDY HULTGREN, Illinois DENNIS A. ROSS, Florida ROBERT PITTENGER, North Carolina ANN WAGNER, Missouri ANDY BARR, Kentucky TOM COTTON, Arkansas KEITH J. ROTHFUS, Pennsylvania Shannon McGahn, Staff Director James H. Clinger, Chief Counsel Subcommittee on Financial Institutions and Consumer Credit SHELLEY MOORE CAPITO, West Virginia, Chairman SEAN P. DUFFY, Wisconsin, Vice GREGORY W. MEEKS, New York, Chairman Ranking Member SPENCER BACHUS, Alabama CAROLYN B. MALONEY, New York GARY G. MILLER, California RUBEN HINOJOSA, Texas PATRICK T. McHENRY, North Carolina CAROLYN McCARTHY, New York JOHN CAMPBELL, California DAVID SCOTT, Georgia KEVIN McCARTHY, California AL GREEN, Texas STEVAN PEARCE, New Mexico KEITH ELLISON, Minnesota BILL POSEY, Florida NYDIA M. VELAZQUEZ, New York MICHAEL G. FITZPATRICK, STEPHEN F. LYNCH, Massachusetts Pennsylvania MICHAEL E. CAPUANO, Massachusetts LYNN A. WESTMORELAND, Georgia PATRICK MURPHY, Florida BLAINE LUETKEMEYER, Missouri JOHN K. DELANEY, Maryland MARLIN A. STUTZMAN, Indiana DENNY HECK, Washington ROBERT PITTENGER, North Carolina ANDY BARR, Kentucky TOM COTTON, Arkansas C O N T E N T S ---------- Page Hearing held on: March 5, 2014................................................ 1 Appendix: March 5, 2014................................................ 51 WITNESSES Wednesday, March 5, 2014 Fortney, David, Senior Vice President, Product Management and Development, The Clearing House Payments Company............... 38 Garcia, Gregory T., Advisor, Financial Services Information Sharing and Analysis Center (FS-ISAC).......................... 36 Leach, Troy, Chief Technology Officer, Payment Card Industry (PCI) Security Standards Council (SSC)......................... 34 Mierzwinski, Edmund, Consumer Program Director, U.S. PIRG........ 39 Noonan, William, Deputy Special Agent in Charge, Criminal Investigative Division, Cyber Operations Branch, United States Secret Service................................................. 7 Zelvin, Larry, Director, National Cybersecurity and Communications Integration Center (NCCIC), U.S. Department of Homeland Security.............................................. 9 APPENDIX Prepared statements: Waters, Hon. Maxine.......................................... 52 Fortney, David............................................... 54 Garcia, Gregory T............................................ 57 Leach, Troy.................................................. 67 Mierzwinski, Edmund.......................................... 73 Noonan, William.............................................. 84 Zelvin, Larry................................................ 95 Additional Material Submitted for the Record Capito, Hon. Shelley Moore: Written statement of the American Bankers Association (ABA).. 101 Written statement of the Credit Union National Association (CUNA)..................................................... 111 Written statement of the Independent Community Bankers of America (ICBA)............................................. 116 Written statement of the National Association of Federal Credit Unions (NAFCU)...................................... 118 Written statement of the National Retail Federation (NRF).... 122 Heck, Hon. Denny: Letter to Financial Services Committee Chairman Jeb Hensarling requesting a data security hearing, dated January 10, 2014........................................... 136 Sinema, Hon. Kyrsten: Written responses to questions submitted to Larry Zelvin..... 138 DATA SECURITY: EXAMINING EFFORTS TO PROTECT AMERICANS' FINANCIAL INFORMATION ---------- Wednesday, March 5, 2014 U.S. House of Representatives, Subcommittee on Financial Institutions and Consumer Credit, Committee on Financial Services, Washington, D.C. The subcommittee met, pursuant to notice, at 10:03 a.m., in room 2128, Rayburn House Office Building, Hon. Shelley Moore Capito [chairwoman of the subcommittee] presiding. Members present: Representatives Capito, Bachus, McHenry, Pearce, Posey, Fitzpatrick, Luetkemeyer, Stutzman, Pittenger, Barr, Cotton, Rothfus; Meeks, Maloney, Scott, Green, Lynch, Delaney, and Heck. Ex officio present: Representatives Hensarling and Waters. Also present: Representatives Royce and Sinema. Chairwoman Capito. The subcommittee will come to order. Without objection, the Chair is authorized to declare a recess of the subcommittee at any time. I now recognize myself for the purpose of making an opening statement. Over the last 6 months, we have learned about a series of breaches of American businesses' data--millions and millions have had their personal data compromised. We will not know the true extent of the impact on American consumers until investigators from Federal agencies and private entities are done with the investigation. These breaches raise, I believe, really legitimate questions about the storage and usage of personal data by private industry. The prosperous have long sought access to this type of information, but the recent breaches demonstrated an evolving sophistication of attacks that seek to exploit and confuse consumers. As we have learned in previous subcommittee hearings, these criminals often reside in nations that fail to cooperate with United States law enforcement agencies. In some cases, these nations not only protect these criminals from prosecution but they celebrate them as heros. The data these criminals steal is often sold on the black market and can potentially be used for fraudulent purposes. While possibilities for such fraudulent charges may be the source of stress and frustration for consumers, many payment networks have zero fraud policies to protect consumers from fraudulent transactions. Today, we will learn more about why these breaches are occurring, existing payment security standards, what happens during and after a breach, and new payment technologies authorized to help prevent future breaches. One area that is of critical importance is information- sharing, both during and after a breach. We have representatives from the National Cybersecurity and Communications Integration Center (NCCIC) and the Financial Services Information Sharing and Analysis Center (FS-ISAC) who will testify about the existing information-sharing efforts between the private sector and government agencies. On February 13th, members of the retail financial services communities publicly announced their efforts at information-sharing amongst all parties that are a part of the payment system. I applaud this effort instructing all parties to strive for a more efficient, thorough, and effective information-sharing system to prevent data breaches in the future. The final area that this hearing will cover is future payment systems that may provide consumers with a more secure method of transmitting their financial data. I have great interest in the progression and diversification of our payment system. In the past, we learned about developments in mobile payments. Today, we will learn about a cloud-based tokenization proposal which will transfer payments without the need to store significant amounts of consumer financial data. If sensitive payment data is not being stored unnecessarily, the payment systems could be much less attractive to future hackers. The high degree of innovation in the payment space is exciting for consumers, but we also need to ensure that the new payment systems that are developed increase the level of security and reduce the threat of future breaches. I would like to thank our witnesses for joining us this morning. Each of you plays a critical role in helping to prevent future data breaches. I now yield time to the ranking member of the subcommittee, Mr. Meeks, for an opening statement. Mr. Meeks. Thank you, Madam Chairwoman. In recent months, a number of banking and U.S. retailers including Target, Neiman Marcus, and Nike have announced data breaches which stole the payment card account and sensitive personal information of millions of Americans. Although forensic investigations of recent breaches are still ongoing, news reports and announcements by the retailers themselves indicate that these breaches may be the largest breaches ever in the history of our country as of today. On December 19, 2013, Target announced that 40 million credit and debit accounts had been compromised through its in- store credit card magnetic strips, allowing hackers to access customer names, credit and debit card numbers, and security codes. Less than a month later, on January 10, 2014, Target announced that the breach was significantly larger and that the personal information of 70 million customers was also stolen. Americans need to have the security that when they shop at a retail store, or when they use their credit or their debit cards, their account and personal information will be protected. We must make sure that happens. It is further troubling that we see the line fall behind Europe and Canada in terms of technology and security standards. Some reports even indicate that we are behind certain countries in Latin America and Africa, who are using the latest mobile technology for processing payments, as a result of the fact that they started late in adopting such technology, and therefore immediately adopted the latest innovations. We have to improve our technology to make sure that we are more up-to-date. We need to take our security more seriously in this country. The security breaches at Target were only reminders of existing national security issues, and there are, indeed, a lot of issues which we will seek to clarify in our hearing. How is it that this could happen in the world's most advanced economy and financial market in the world? What have we learned, and how do we prevent these serious incidents from ever happening again? And what technologies and standards need to be adopted instead so that we can protect Americans and the Nation? I want to thank all of the witnesses who are here, and I look forward to your participation and to listening to your testimony. Chairwoman Capito. Thank you. I now recognize Mr. Fitzpatrick for 2 minutes for an opening statement. Mr. Fitzpatrick. Thank you, Madam Chairwoman, for calling this hearing, and I also thank the witnesses for their time today. I spend a considerable amount of time at home--as do my colleagues--visiting my discrict, visiting with businesses and financial instutions, and also talking to their customers. Most if not all of these groups, when asked, would identify cybersecurity, identity theft, and national safety as a concern. My staff and I spent some time looking into this and quickly learned that hackers and thieves are by and large not only attacking financial institutions directly and literally downloading customers' back accounts to either deceive people into giving up their security information or they are stealing outright from some other source. Those sources are many times unsuspecting businesses or financial institutions that are storing or transferring personal information in ways that are quite vulnerable to attack. That is not to say that the burden of data security lies disproportionately with any one group, but I think these facts speak to the importance of working in a collaborative manner on developing a system that protects personal financial data through the process--from the individual, to the business, to the processor, and then to the bank or credit union. There is a level of trust necessary for an economy to function in this new virtual era, where cash is becoming a preferred payment method for fewer and fewer people. I look forward to the testimony and hearing what these experts can share with us about how we can protect people from theft and maintain and possibly restore trust in our cybersecurity system. And I thank the Chair. Chairwoman Capito. Thank you. I now recognize Mrs. Maloney for 2 minutes for an opening statement. Mrs. Maloney. I want to thank you, Madam Chairlady, and Ranking Member Meeks, for holding this incredibly important hearing. I would say that most Americans have had their identity stolen, including myself, and it is very costly to law enforcement, and certainly to our stakeholders, our financial institutions, and individuals. And I am particularly interested in the second panel, the industry itself, and what they have to say on new technologies. Why can't we just protect the number and have transactions take place? This is something really, really important: When the data breach occurs, the party who is most exposed when you look at it is the consumer. It is typically the retailer that is in the best position to know about the breach, although it is often the bank who discovers the breach before the retailer because the bank notices a spike in fraudulent transactions and then traces it back to the retailer that was breached. In my opinion, this makes it all much more reasonable to make the banks and financial institutions liable for all the fraudulent transactions that occur after the breach. This would give the banks and financial institutions an incentive to invest publicly in fraud-detecting technologies, which are remarkably effective at identifying fraudulent activities on your credit or debit card. If retailers were liable for all fraudulent costs after a breach, then there would be probably like a legal Fort Knox. And if payment networks were liable, there would be more robust security systems, as well. The point is that sometimes assigning blame, and in this case, assigning liablitity, is, in fact, important, because it incentivizes different parties to invest or not invest in fraud-reducing technology to protect consumers and our overall economy and it makes it more difficult for criminals. So I really look forward to this hearing. I think it is incredibly important and I look forward to hearing of new innovations to protect identity and therefore, hopefully, our banking system. Thank you very much. I yield back. Chairwoman Capito. Thank you. I recognize Mr. Pittenger for 2 minutes for an opening statement. Mr. Pittenger. Thank you, Chairwoman Capito, for allowing me to properly make this opening statement. And thank you to each of the witnesses for coming today to testify. We are here today to listen to experts from Homeland Security and the Secret Service and representatives of industry to learn about the ongoing effort to protect our fellow citizens' private information. We have seen over the past several years advancements in technology when Americans shop to pay for goods. But with these new advancements certainly comes the responsibility of protecting the integrity of the system. As payment systems increasingly rely on electronic transmissions of personal financial data, Americans have a right and an expectation to know how that data is being protected, where it is stored, the extent to which the government has access to it, and the protocols that ought to be in place in private or public sector entities who mishandle, improperly disclose, or otherwise fail to ensure the security of personal financial information. Over the last 6 months, several American companies and universities have experienced significant data breaches--my wife and I had a breach just yesterday--and while the details of these breaches remain under investigation by Federal and State law enforcement authorities, these episodes have disclosed a serious threat to financial privacy and data security posed by individuals and criminal syndicates. We have to remain vigilant in our fight against these individuals and organizations. I know it is a difficult task to ask to be prepared to prevent 100 percent of the cyber attacks. But the consequences of not being equipped to handle the threat could ruin the lives and threaten the security of millions of Americans. Thank you again for coming before the committee, and I look forward to hearing your testimony. Chairwoman Capito. Thank you. I would like to recognize Mr. Scott for 2 minutes for an opening statement. Mr. Scott. Thank you very much, Madam Chairwoman. And this is indeed a very, very interesting and important hearing as more and more Americans shift to electronic payment systems and online shopping. One of my professors at graduate school in economics and finance was an economist, John Kenneth Galbraith, and he produced a book about 40 years ago called, ``The New Industrial State.'' I bring that up because he made a very interesting statement. He said, ``Very shortly we in our country, and perhaps around the world, will soon become the victims and servants of the very machine that was created to serve us.'' I think we are at that point now. As payment systems increasingly rely on electronic transmission of personal financial data, Americans certainly have a right and an expectation to know how that data is protected. They need to know where it is stored, who has access to that data, and to what extent. Americans have a right and an expectation to know the protocols that are and ought to be in place when entities, whether public or private, mishandle or improperly disclose or otherwise fail to ensure the security of their personal information. We have the big picture here. We have to hold everybody accountable. Financial institutions must be held accountable to the same accountability as our retailers. We have had over 110 million Americans impacted by this situation. Earlier, I had a very interesting conversation with one of our panelists, Mr. Troy Leach, and I think he is on to something here with the Security Standards Council. Perhaps we are indeed working on this, giving too much information, making too much information available, and that maybe we can cut down on some of that information so we don't make it so easy for hackers to access it. I look forward to the hearing, Madam Chairwoman, and I yield back. Chairwoman Capito. Thank you. I now recognize the chairman emeritus of the full Financial Services Committee, Mr. Bachus, for 2 minutes for an opening statement. Mr. Bachus. Thank you, Madam Chairwoman. One of Yogi Berra's most famous quotes is, ``It is deja vu all over again.'' A little more than a decade ago, this committee investigated a series of data breaches involving New York City restaurants, cable companies, retail businesses of all kinds, banks, universities, and all branches of government from local to State to Federal. People's credit was being ruined, and their good names being used for criminal purposes. But identity theft suddenly became a national issue. I remember this because I was chairman of the Financial Institutions Subcommittee at the time. I am proud of this committee because at the time, we held numerous hearings like the one today, that resulted in the Fair and Accurate Credit Transactions (FACT) Act or (FACTA), which was bipartisan legislation passed almost unanimously by this committee and signed into law by President Bush in December 2003. The legislation created a number of protections, which I am convinced have helped prevent numerous cases of identity theft over the last 10 years. That is why your full credit card number is no longer on store or restaurant receipts, and you can place fraud alerts on your credit report. Very significantly, it is why consumers are entitled to be provided with free copies of their credit report from the three major reporting bureaus. But I am having deja vu again because the same arguments that were being used then are being used again today against the adoption of marked chip and PIN cards. It won't be a total solution, and it wouldn't have prevented the Target breach, but it would prevent that information from then being used in credit transactions. It wouldn't be a total solution. It wouldn't be easy. It would be complicated. It would be expensive. All of that is true. It was then, and it is now. But still, something needs to be done. Let me close by saying, Mr. Noonan, you mentioned the National Computer Forensic Institute, and I want to compliment the Secret Service. They joined with the Alabama district attorney's office in the State of Alabama, Shelby County, and responded with that, and it has really helped, and I want to commend the Secret Service for that. That building that it is housed in was donated by a county and a city in Birmingham--a modern facility at no cost to the taxpayers. And it is a way that we can inexpensively respond with innovative thinking. The people being trained there--it is in his testimony on page 8, and I commend you for mentioning that. Thank you. Chairwoman Capito. Thank you. With that, I ask unanimous consent to allow members of the full Financial Services Committee who are not members of this subcommittee to sit in on today's hearing. Without objection, it is so ordered. And with that, I would like to recognize Ms. Sinema for 1 minute for an opening statement. Ms. Sinema. Thank you, Madam Chairwoman. And thank you, Ranking Member Meeks. I believe that it is critical for public and private sector leaders to continue to push for the development of a strong cybersecurity industry that can protect our economic and national security interests. The nature of cyber means that nongovernment institutions and private sector companies alike need tools and resources to protect Americans' personal information from cyber attacks. Several large companies such as Honeywell, Schwab, and America's Best have some or all of their security space in Arizona; and several smaller innovative companies like Bishop Fox and Securosis are among the significant and growing number of cybersecurity businesses in my home State. Arizona is a hub for innovation. We are ahead of the curve on tech growth, thanks to entrepreneurial programs at Arizona State University, the University of Advancing Technology, and America's community colleges. Thank you for the opportunity to highlight this critically important issue. Through your collaboration with government and innovative private institutions, I believe we can meet the cybersecurity challenges of today and tomorrow. Thank you, Madam Chairwoman. Chairwoman Capito. Thank you. Mr. Green, for 2 minutes. Mr. Green. Thank you, Madam Chairwoman. I will be pithy and concise. I would like to thank you for the hearing, and thank the ranking member, as well. And I would like to, if I may, indicate to the public that while a hearing is titled, ``Data Security: Examining Efforts to Protect Americans' Financial Information,'' the actual concern is much broader and much bigger. We are also concerned about medical information. We are also concerned about your travel history. We are concerned about the materials that you purchase--your reading materials. This has implications that are far-reaching, that can have an impact on privacy beyond which we can't imagine currently. I am excited about the hearing and I am interested to find out how we can prevent this kind of encroachment on privacy. I thank you, and I yield back. Chairwoman Capito. The gentleman yields back. All time has expired for opening statements, and I would like to welcome our first panel of distinguished witnesses. Each of you will be recognized for 5 minutes to give an oral presentation of your testimony. And without objection, each of your written statements will be made a part of the record. Our first witness is Mr. William Noonan, Deputy Special Agent in Charge, Criminal Investigative Division, Cyber Operations Branch, United States Secret Service. Welcome, Mr. Noonan. STATEMENT OF WILLIAM NOONAN, DEPUTY SPECIAL AGENT IN CHARGE, CRIMINAL INVESTIGATIVE DIVISION, CYBER OPERATIONS BRANCH, UNITED STATES SECRET SERVICE Mr. Noonan. Good morning, Chairwoman Capito, Ranking Member Meeks, and distinguished members of the subcommittee. Thank you for the opportunity to testify on behalf of the Department of Homeland Security regarding the ongoing trend of criminals exploiting cyberspace to obtain sensitive financial and identity information as part of a complex criminal scheme to defraud our Nation's payment systems. Our modern financial system depends heavily on information technology for convenience and efficiency. Accordingly, criminals motivated by greed have adapted their methods and are increasingly using cyberspace to exploit our Nation's financial payment systems to engage in fraud and other illicit activities. The widely reported payment card data breaches of Target, Neiman Marcus, White Lodging, and other retailers are just recent examples of this trend. The Secret Service is investigating these recent data breaches and we are confident we will bring the criminals responsible to justice. However, data breaches like these recent events are part of a long trend. In 1984, Congress recognized the risk posed by increasing use of information technology and established 18 USC Sections 1029 and 1030 through the Comprehensive Crime Control Act. These statutes define access device fraud and misuse of computers as Federal crimes and explicitly assign the Secret Service authority to investigate these crimes. In support of the Department of Homeland Security's mission to safeguard cyberspace, the Secret Service has developed a unique record of success in investigating cyber crime through the efforts of our highly trained special agents and the work of our growing network of 35 electronic crimes task forces, which Congress assigned the mission of preventing, detecting, and investigating various forms of electronic crimes, including potential terrorist attacks against critical infrastructure and financial payment systems. As a result of our cyber crime investigations, over the past 4 years the Secret Service has arrested nearly 5,000 cyber criminals. In total, these criminals were responsible for over $1 billion in fraud losses, and we estimate our investigations prevented over $11 billion in fraud losses. Data breaches like the recently reported occurrences are just one part of a complex criminal scheme executed by organized cyber crime. These criminal groups are using increasingly sophisticated technology to conduct a criminal conspiracy consisting of five parts: one, gaining unauthorized access to computer systems carrying valuable, protected information; two, deploying specialized malware to capture and exfiltrate this data; three, distributing or selling this sensitive data to their criminal associates; four, engaging in sophisticated and distributed frauds using the sensitive information obtained; and five, laundering the proceeds of their illicit activity. All five of these activities are criminal violations in and of themselves, and when conducted by sophisticated, transnational networks of cyber criminals, this scheme has yielded hundreds of millions of dollars in illicit proceeds. The Secret Service is committed to protecting our Nation from this threat. We disrupt every step of their five-part criminal scheme through proactive criminal investigations and defeat these transnational cyber criminals through coordinated arrests and seizure of assets. Foundational to these efforts are our private industry partners as well as our close partnerships with State, local, Federal, and international law enforcement. As a result of these partnerships, we were able to prevent many cyber crimes, by sharing criminal intelligence regarding the plans of cyber criminals and by working with the victim companies and financial institutions to minimize financial losses. Through our Department's National Cybersecurity and Communications Integration Center, the NCCIC, the Secret Service also quickly shares technical cybersecurity information while protecting civil rights and civil liberties in order to enable other organizations to reduce their cyber risks by mitigating technical vulnerabilities. We also partner with the private sector and academia to research cyber threats and public information on cyber crime trends through reports like the Carnegie Mellon CERT Insider Threat Study, the Verizon Data Breach Investigations Report, and the Trustwave Global Security Report. The Secret Service has a long history of protecting our Nation's financial systems from threats. In 1865, the threat we were founded to address was that of counterfeit currency. As our financial payment system has evolved from paper, to plastic, and now digital information, so too has the investigative mission. The Secret Service is committed to continuing to protect our Nation's financial system even as criminals increasingly exploit it through cyberspace. Through the dedicated efforts of our special agents, our electronic crimes task forces, and by working in close partnership with the Department of Justice--in particular, the computer crimes and intellectual property section--and local U.S. attorneys' offices, the Secret Service will continue to bring cyber criminals who perpetrate major data breaches to justice. Thank you for the opportunity to testify on this important topic, and we look forward to your questions. [The prepared statement of Deputy Special Agent in Charge Noonan can be found on page 84 of the appendix.] Chairwoman Capito. Thank you. Mr. Zelvin, you are recognized for 5 minutes. STATEMENT OF LARRY ZELVIN, DIRECTOR, NATIONAL CYBERSECURITY AND COMMUNICATIONS INTEGRATION CENTER (NCCIC), U.S. DEPARTMENT OF HOMELAND SECURITY Mr. Zelvin. Chairwoman Capito, Ranking Member Meeks, and distinguished members of the subcommittee, thank you for the opportunity to appear before you today. In my brief opening comments, I would like to highlight the DHS National Cybersecurity and Communications Integration Center (NCCIC's) role in preventing, responding to, and mitigating cyber incidents, and then discuss our activities during the recent point-of-sale compromises. As you well know, the Nation's economic vitality and national security depend on a secure cyberspace where reasonable risk decisions can be made on digital goods, transactions, and online interactions so that they can occur safely and reliably. In order to meet this objective, we must share the technical characteristics of malicious cyber activity in a timely fashion so cyber defenders can discover, address, and mitigate information technology threats and vulnerabilities. It is increasingly clear that no single country, agency, company, or individual can effectively respond to the ever-rising threats of malicious cyber activity alone. Effective responses require a whole-of-nation effort, including close coordination among entities like: DHS's NCCIC; the Secret Service; the Department of Justice, to include the Federal Bureau of Investigation; the intelligence community; sector-specific agencies, such as the Department of the Treasury; private sector entities, who are simply critical to these efforts; and State, local, tribal, territorial, and international governments. In carrying out our particular responsibilities, the NCCIC promotes and implements a unified approach to cybersecurity, which enables the efforts of bringing these diverse partners to quickly share cybersecurity information in a manner that ensures the protection of individuals' privacy, civil rights, and civil liberties. As you may already know, the NCCIC is a civilian organization that provides an around-the-clock center where key government, private sector, and international partners can work together in both physical and virtual environments. The NCCIC is composed of four branches: the United States Computer Emergency Readiness Team, or US-CERT; the Industrial Control Systems CERT; the National Coordination Center for Communications; and Ops and Integration. In response to the recent retailer compromises, the NCCIC specifically leveraged the resources and capabilities of US- CERT, whose mission focuses specifically on computer network defense, including prevention, protection, mitigation, and response activities. In executing this mission, the NCCIC and US-CERT regularly publish technical and nontechnical information products analyzing the characteristics of malicious cyber activities and improving the ability of organizations and individuals to reduce risk. When appropriate, all NCCIC components have onsite response teams that can assist owners and operators at their facilities. In addition, US-CERT has global partnerships with over 200 CERTs worldwide that allow the teams to work directly with analysts across international borders. Increasingly, data from the NCCIC and US-CERT can be shared in machine-readable formats, such as the Structured Threat Information Expression, also known as STIX, which is currently being implemented and utilized. In the recent point-of-sale compromises NCCIC/US-CERT analyzed the malware provided to us by the Secret Service as well as other relevant technical data and used these findings, in part, to create a number of information-sharing products. The first, which is publicly available and can be found on the US-CERT Web site, provides a nontechnical overview of risks to point-of-sale systems along with recommendations on how businesses and individuals can better protect themselves and mitigate their losses in the event of an incident that has already occurred. Other products have been more limited in distribution and they are meant for cybersecurity professionals and provide technical analysis and mitigation recommendations to better enable expert-level protection, discovery, response, and recovery efforts. As a matter of strategic intent, the NCCIC's goal is always to share information as broadly as possible. These efforts ensured that actionable details associated with major cyber events are shared with the right partners so they can protect themselves, their families, their businesses and organizations quickly and accurately. In the case of the point-of-sale compromises, we especially benefited from the close coordination with the Financial Services Information Sharing and Analysis Center, or the FS- ISAC. In particular, the FS-ISAC's Payments Processing Information Sharing Council has been useful in that they provide a forum for sharing information about fraud, threats, vulnerabilities, and risk mitigation in the payments industry. In conclusion, I want to highlight again that we in DHS and across the NCCIC strive every day to enhance the security and resilience across cyberspace and information technology enterprise. At every opportunity the NCCIC, in close coordination with our partners, publishes technical and nontechnical products to better enable our national critical infrastructure, businesses, and our citizens to protect against cyber threats, while also providing onsite technical assistance whenever necessary. We will accomplish our mission through voluntary means, ever mindful of the need to respect privacy, civil liberties, and the law. I truly appreciate the opportunity to speak with you today and look forward to your questions. [The prepared statement of Mr. Zelvin can be found on page 95 of the appendix.] Chairwoman Capito. Thank you. And I am offering my sincere apologies to you, as the first panel, and to the next panel, and to the members of this subcommittee, but we are going to call a recess subject to the call of the Chair. We expect it to be a half hour, so that would be 11:05; hopefully, we can call back in sooner. Again, I apologize. [recess] Chairwoman Capito. I am going to go ahead and reconvene the hearing. Thank you for your patience. Mr. Meeks will be here in a few minutes, but I am going to go ahead and begin my questioning so we can move along a little bit. Mr. Noonan, in your statement you mentioned that the Secret Service had either arrested or gotten 5,000 criminals. Was that the number that you used? Mr. Noonan. Yes, ma'am. Chairwoman Capito. Those, I assume, are all American citizens in the United States? Because we hear about how a lot of this is occurring offshore. Are you coordinating in any international fashion, or--if you could just kind of give me a little background on that? Mr. Noonan. Sure, ma'am. That figure comprises all of the cases that we have made arrests on that have any connection back to the use of cyber in those crimes. So to say that they are domestic or international, it is both. Chairwoman Capito. It is both. Mr. Noonan. Yes. We have a very unique success of bringing international, transnational cyber criminals to justice here domestically, but that figure that we have provided for you there is domestic and international. Chairwoman Capito. Okay. Mr. Zelvin, you are from Homeland Security, and Mr. Noonan is with the Secret Service. I think sometimes we find that when there is coordination between Federal agencies, who is in charge, I guess is always a good question. I know it is a collaborative effort, but who is really leading this in your mind, from your agency's perspective? Mr. Zelvin. Yes, ma'am. It is a team effort so there is a variety, depending on which area you are looking at. As you are looking at the law enforcement aspect, the Secret Service and the Federal Bureau of Investigation have the primacy, depending on the cyber case. When you look at the intelligence field, obviously the National Security Agency, the Central Intelligence Agency, and others have primacy, whether you are talking about electronics intelligence or human intelligence. We at the NCCIC specifically really focus on those network defense measures--understanding the intrusions, understanding how to plug those holes, and then preventing them from reoccurring. We have the responsibility, as well, of protecting the Federal dot-gov space, and that is a big part of our effort, and then we work across the private sector at 16 critical infrastructures, and as I mentioned in my opening statement, the international partnerships. Chairwoman Capito. Mr. Noonan, would you concur with Mr. Zelvin in terms of who is in charge or the coordinative aspect of what you are doing? I know we talk a lot about coordination, and both of you did in your statements, but I am trying to make sure that if Mr. Meeks and I say we are both in charge, but then something goes wrong, and I say, ``But he was in charge,'' so-- Mr. Noonan. Yes, for sure. In an investigation like this law enforcement generally takes charge of the investigative piece-- Chairwoman Capito. Right. Mr. Noonan. --and information-sharing we do through a bunch of different mechanisms. Our primary source for information- sharing is through the NCCIC, but we also partner, as well, with the FS-ISAC. Obviously, the Secret Service has a rich history of working in the financial services sector. Chairwoman Capito. Right. Mr. Noonan. So the FS-ISAC, who is going to be on the next panel, is another great partner that we use to push information out to the financial services sector. In addition to that, we have 35 electronic crimes task forces. And those electronic crimes task forces that we have aren't just made up of law enforcement; they are made up of the private sector, so we have members from the private sector working side by side with agents, where we share information back and forth, as well as academia. So that is another method that the Secret Service uses to push information that is going to better protect the private industry and the critical infrastructure that we have. Chairwoman Capito. When there is a data breach from a retailer, say, such as what happened with Target--and I know the investigation is ongoing so not specifically that, I am just using it as an example--is the way that you are made aware of this through individuals whose cards have been corrupted, or does the company itself, whatever company it is, is it incumbent upon them to come to you? How does that reach your level of understanding of what is going on? Mr. Noonan. It depends on the case, ma'am. I brought up in my oral remarks that we have a proactive approach to law enforcement. And there is a reactive approach, in which the crime has already occurred, and we are chasing the clues back to the criminal to identify who the criminal is to affect an arrest. Chairwoman Capito. Right. Mr. Noonan. The proactive approach of what we do in law enforcement is we are out working with sources, we are out working undercover operations, we are working with private sector banking investigators, and in our proactive approach there are many times where we identify a potential breach before it has occurred. And we find that it is more valuable-- it is critical for law enforcement, then, to make notification to that industry, to that private sector partner, to be able to stop the crime from occurring. Chairwoman Capito. Okay. Let me stop you there because I am running out of time, but I am curious to know, in the case of a retailer where this could have an effect on their future sales, do you find that they are willing to make this breach public and really better inform everybody who could be affected by such a breach? Mr. Noonan. Again, it depends on the company-- Chairwoman Capito. Right. Mr. Noonan. --and it depends on the case, so-- Chairwoman Capito. Yes. Mr. Noonan. --I can't give you a yes-or-no answer. Chairwoman Capito. Right. You can see both sides of it. I would think more and more it is in the company's best interest, obviously, to be as open and transparent as possible in something of this nature. Mr. Meeks? Mr. Meeks. Thank you, Madam Chairwoman. Let me start with Mr. Noonan, and let me maybe ask a question that might not even be fair because I am going to ask you how to help me do my job. You urge Congress to take legislative action that could help to improve the Nation's cybersecurity, reduce regulatory costs on U.S. companies, and strengthen law enforcement's ability to conduct effective investigations. I think that was part of your testimony. And, I am sure that all parties agree with this in general, when you make the general assessment, but there are differing, at times, interests, and sometimes even competing interests that individuals would have. For example, there may be different interests between card issuers, merchants, and consumers. They can all overlap, but ultimately there could be divergent visions of how the government can best solve these problems. So, we are going to be trying to dig into this and talking to a number of different folks, but I would like to get your opinion. How would you suggest as lawmakers we balance these interests and create a plan that can satisfy the core concerns of all parties? Because we have this balancing act that we have to do but we need to--we want to help you also, so how would you suggest we do that? Mr. Noonan. Yes, sir. So from the law enforcement perspective--and that is what I can provide to you--I think it is important and it is critical for companies that have been exposed, companies that have knowledge of a potential breach, to bring that to law enforcement's attention. Law enforcement, at that point, is critical in the fact that it can, obviously, collect evidence to try to make a difference, make a physical arrest of a criminal. But I think it is also important that at that point in time, is when the information-sharing piece begins. Because if law enforcement is brought in early and we are able to draw the cybersecurity concerns out of the investigation, the evidence out of that, and we are able to take that information, we are able to minimize that information and protect the victim. We are able to then share that information with my partners over at the NCCIC and get that out to the greater infrastructure of this Nation so that they can better protect themselves from an additional potential attack to other pieces or other avenues of infrastructure. Mr. Meeks. Should the notification that goes out to you, go out to the consumer or the customer at the same time? For example, I was just wondering how long do most companies wait before they even notify you and/or notify the customer that their sensitive personal information may have been breached. Mr. Noonan. I would agree, sir. I think that it should be in a short period of time that the information should be put out to the customers. I, too, fell victim to a data breach as well, where it was inconvenient for myself and my family. So I think I am able to better respond as a customer to help support my family, but I think there is also a law enforcement concern there, as well, where there are situations and there are points in time wherein law enforcement may or may not need a window of opportunity to run operations to determine what has happened or who is behind the effort or the attack. Mr. Meeks. Let me just also, in that regard, ask Mr. Zelvin a question. I know in your testimony you also talked about the various virtual currencies as a means of laundering illicit proceeds, and I was wondering whether or not the Secret Service or other regulators have taken any action to address some of those concerns? And in your view, do regulators have--do you have sufficient authority to address the risk that these currencies pose as identified in your testimony? Mr. Noonan. Yes, sir. Just as early as last year the Secret Service, along with HSI and IRS, was successful in taking down a virtual currency or a digital currency called Liberty Reserve. Liberty Reserve was one of those digital currencies which the criminal underground used in which they would launder their money anonymously, and we were effective in taking that marketplace out of the criminal underground, as well as we were able and successful in arresting the people who were behind the setup of that operation. So it is more important than just taking the operation off, but we also arrested the people behind it. Mr. Meeks. Thank you. Really quick, Mr. Zelvin, what about individual criminal activity outside of the United States? What can be done to go after these illicit actors? And what tools do you have to ensure that foreign individuals are also held accountable? Does that fit within our-- Mr. Zelvin. Ranking Member Meeks, that is a question I would recommend for the FBI and the Secret Service--I will talk from the US-CERT perspective. We work with 200 like-minded CERTs around the world. We are in contact with them in many cases on a weekly basis and we are able to work our mitigations. I was in London about 3 weeks ago, and when we were meeting with our counterparts, they said the point-of-sale product that we had from US-CERT was very helpful to them because they were bringing it to their industries, because what had happened here in the United States they felt was probably happening in the U.K. and around Europe, and this was instructive for them, as well. Mr. Meeks. Thank you. Chairwoman Capito. Thank you. Mr. Pearce? Mr. Pearce. Thank you, Madam Chairwoman. I appreciate both of the witnesses being here. Mr. Rothfus and I have decided we are going to cut up our cards right here among us while we are listening to you, so if you have any scissors, pass them on up. Mr. Zelvin, has the CFPB called you all? Are you all working with them in any way? Mr. Zelvin. Congressman, the CFPB? Mr. Pearce. Yes. Mr. Zelvin. The Consumer Financial Protection Bureau? Mr. Pearce. Yes. Mr. Zelvin. No, we haven't been in contact with them directly. Mr. Pearce. Mr. Noonan? Mr. Noonan. No, sir. Mr. Pearce. No. They are collecting 990 million records. Target lost 40 million. They are collecting 990 million. It seems like they would be calling the Nation's best to say, ``What do we do for data security?'' Amazing. What kind of protection is available against a Snowden-type attack? In other words, he is working inside and pulls those records, downloads a three-mile-high stack of records, and is there any protection? Either one of you? Mr. Noonan. From the Federal Government standpoint, when we are talking about retail-type positions, there is nothing that we have that would stop an insider threat. Mr. Pearce. I guess I didn't make it clear. The CFPB is-- would be parallel to the NSA. I don't want to carry that analogy too far, but they are a government agency and they are collecting a massive amount of data--massive--almost a billion credit cards. And so I guess I am interested in if somebody inside the agency wants to release documents, like Mr. Snowden was inside the agency, it wasn't planned, and the agency didn't approve of it, so is there any protection for the Snowden-type attack from inside the agencies? Mr. Zelvin. Congressman, I can answer the question broadly, not specifically. So broadly, the insider threat is one of the most difficult things we face. I think the one that is probably almost as bad is if somebody was into what we call the supply chain. The ability to defend against the insider threat is developing quickly but we are not where we need to be by a long shot. There are things in the financial community which are leading the way that we are taking as lessons, but as you rightly point out, it is a vulnerability and a weakness that we need to get better on, and we need to do so quickly. Mr. Pearce. Okay. Mr. Noonan, your testimony had some numbers in it, but I don't know that I saw the scope. In other words, I saw 4,900-- that is the people that we had--that you have had 4,900 arrests. What is the scope? How many cyber attacks are there each day, roughly? Mr. Noonan. I can't comment on the number of attacks that occur every day. Mr. Pearce. Because it is too secret, or you just don't know? Mr. Noonan. No, we don't compile our data in that manner. We have active investigations, so-- Mr. Pearce. What would you guess? Hundreds of thousands a day? Is that too high? Mr. Noonan. I think there are cyber criminals who are probing our systems every day. I think every moment, they are probing our systems. Mr. Pearce. Yes, every day, hundreds of thousands, and I suspect that your agency is probably strained for resources. To put it in perspective, in your testimony you talk about the 11 that you have indicted; how many convictions have you been able to get through the system? Mr. Noonan. Numerous convictions. We have had-- Mr. Pearce. Numerous. How many? Like 20,000? Mr. Noonan. No, sir. Mr. Pearce. 22,000? What is numerous? Mr. Noonan. I would say that it is in the range of several hundred a year. Mr. Pearce. Several hundred. In the paragraph right above where you are talking about the 11, you are talking about how one system has 80,000 users. That is an illicit system--80,000 users and we are getting 11. That is absolutely frightening, the scope that is coming at us and the system is, again, very difficult to work in, with almost no protections against inside attacks where people knowingly download and give away information. Snowden gave away, again, 1.8 million documents, and I just--I worry the CFPB has not even talked to you. Mr. Cordray got somewhat offended at the line of questioning and began to rewrite the question. I didn't accuse him of--going to do it, I just said that any agency--this information is widely viewable by almost everybody in the agency and widely accessible, and yet they haven't even called the best people in the Nation. I would recommend that the next time we have the CFPB come in and sit down and talk about the protections, maybe they have better operations than these two guys were able to present, but I find it stunning that they have not even contacted either one of you. Thank you. I yield back. Mr. Luetkemeyer [presiding]. Thank you. Now, the Chair recognizes the gentlelady from New York, Mrs. Maloney. Mrs. Maloney. Thank you so much. And I feel this is an incredible challenge for our country. Just talking to four friends on the panel, all four of us have had our identity stolen. The fact that 40 billion people lost their--40 million, I guess it was, from Target. That is staggering. So the cost to individuals, law enforcement, and institutions is absolutely huge. One of the problems I see is that the reaction time is so slow. By the time we put something in place, say the data breach chip by 2015, the hackers will have gone on to the next stage of how to hack that. And it seems to me the next phase is going to be online. Most of the transactions are online. So the tokenism idea and technology seems the most promising to me. When you do find a breach, Mr. Noonan, and you said that you are sometimes the first to notice it--who do you notify? Do you notify the financial institution, the consumer, or the retailer, or all three? What do you when you notice a breach? What do you do? Mr. Noonan. It depends on who the victim is, ma'am. If it is a retailer, we would obviously contact the security department of that retailer and we would suggest to them different steps to look at their system to be able to determine if, in fact-- Mrs. Maloney. Okay. Do you tell them to also notify the bank and notify the consumer? Who does-- Mr. Noonan. Yes, ma'am. Mrs. Maloney. Okay. Mr. Noonan. So the part we would do is we would have them work closely with the financial institutions and the processing system which they use. Mrs. Maloney. Now you also said that--and also retailers have said--that the reason that they don't immediately disclose a data breach is that public disclosure would hinder law enforcement efforts to catch the criminal. Is that true? Mr. Noonan. Not in all cases, ma'am. Mrs. Maloney. And why would public disclosure hinder an investigation? Mr. Noonan. Just at a point in time where there was potentially an undercover operation, it could hamper the conclusion of that undercover operation. So the time that we are talking is a very small window of time. Mrs. Maloney. I believe most public policy and resources are directed when we have good data, so who is keeping the data on how big a problem it is in the United States? It is huge in terms of the national security and financial security and economic security of our country. Somebody has to be tracking the overall picture of the extent and the depth of it and the techniques. Who is doing that if the CIA is not doing it? Who is doing the overall--we have to be collecting that data in a broad way to analyze trends and movements. Who is collecting that data? Somebody has to be collecting it. If they aren't, then someone should be. Who is collecting that data--the FBI, the CIA, Homeland Security? Mr. Zelvin. Congresswoman, let me answer the question this way: We are all collecting data in areas in which we have the ability to see the information. Mrs. Maloney. Okay, but then who is getting the overall picture for our national security and economic security? Mr. Zelvin. Again, it is being looked at by Homeland Security. We in the NCCIC look at the overall picture. But it is a matter of looking at the Internet service providers, and managed security service providers, and others, and taking that data and aggregating it. But I will tell you that we still don't have the visibility on everything. It is still just a snapshot. But those snapshots are useful because they show trends and then our ability to provide mitigations. So if you look at these security reports that Mr. Noonan has here, they will talk about things like spearphishing and man-in-the-middle attacks and all these other things, and we are defending against those things, so we have a lot of work to do as we take this data to build security measures so they are not successful. But that aggregation, it doesn't exist; we are just compiling data from a lot of sources. Mrs. Maloney. Before 9/11, we had 18 different intelligence organizations working independently, not sharing their information. The most important reform was that we created the Department of Homeland Security and combined all of our intelligence so we are working in a coordinated way. We have to do the same thing with cybersecurity. Somebody has to be in charge of the overall picture. And I know everybody is doing a good job in their department, and I would say the private sector is doing a pretty good job, too. Who is coordinating with finding the top things the private sector is doing with the top things the government is doing? This is a number one national security issue; it is not just an economic issue. And so, who is doing that? Is it Homeland Security? Somebody has to be pulling it all together. Who is in charge of doing that? Mr. Zelvin. Congresswoman, I will tell you, I think it is our responsibility at the NCCIC, as you describe it, to bring that all together, especially on the network defense side--so to be able to work with the private sector; to work with the critical infrastructure sectors; to work with State, local, tribal, territorial; to work with our international partners. That is what we are doing on a daily basis. Last year alone, the Center had 240,000 cyber incidents reported to us. But again, that is probably a fraction of the greater whole. But our numbers are increasing upwards at about 60 percent a year as far as-- Mrs. Maloney. And is the private sector also sending you their information? Mr. Zelvin. Yes, Congresswoman, they are, but it is done on a voluntary basis. They have no requirement to do so. The Federal Government has requirements to report to US-CERT under policy and other requirements, but the private sector reporting is voluntary and that is why one of the initiatives that has been asked for is the data breach reporting requirement. Mrs. Maloney. Okay. Thank you. Mr. Luetkemeyer. I thank the gentlelady. With that, it is my turn to ask the questions, so the Chair now allows himself 5 minutes to engage the witnesses, as well. I want to follow up on Mr. Pearce's comments with regards to the CFPB. I was kind of stunned, taken aback that you gentleman hadn't heard of or weren't aware of the CFPB, and I would certainly echo the concerns of Mr. Pearce from the standpoint that in committee, they actually testified themselves that they have access and take in at least 80 percent of the credit card transactions per day that occur in this country. That sort of access, that sort of accumulation of data in one agency is, quite frankly, scary. You are looking at what happened with Target and Neiman Marcus and some of the other merchants, and now you have a government agency that has 80 percent of all the credit card transactions going on in this country on a daily basis accumulating in their files and they are not coordinating with each of you? That certainly scares the dickens out of me, so I would certainly urge you to contact those folks and see once if there is a way that you can coordinate with them to see if there is something that they find which needs to be checked out. With that, I was curious--I assume that you have jurisdiction to go to any individual company or group or industry, whatever, if there is a challenge or some sort of a cyber breakdown within that group that deals with personal information. Is that correct? Mr. Noonan. The authority to go actually into the organization itself? Mr. Luetkemeyer. Yes. Mr. Noonan. We would use the court process to be able to work with that company so-- Mr. Luetkemeyer. Okay. Mr. Noonan. --if somebody was reluctant or there was a company that was reluctant, we could potentially use the court process to do that, sir. Mr. Luetkemeyer. The reason I asked the question is that when--we are talking mostly this morning about financial institutions and merchants, but there are other entities out there that have personal information, sometimes have monetary transactions that occur. One of the things, for instance, you are looking at different kinds of, for instance, schools, associations--I kind of made a list here of other groups-- hospitals--medical information is huge these days, as well as credit bureaus. So have you taken any actions or coordinated with any of those kind of groups before with regards to this? Mr. Noonan. Yes, sir. Again, through our electronic crimes task forces, we would partnering with those different institutions, as well. We go after any sort of cyber criminal which is seeking to benefit through the monetization of whatever that they are trying to accomplish or steal. So in many of these situations that you have brought up, personally identifiable information is a piece that is of great concern to us, which the criminal underground can monetize and gain from. So any opportunity that we can work with a potential victim company before it occurs or as it has occurred to be able to go at those cyber criminals who are-- Mr. Luetkemeyer. One of the reasons I bring that up is a lot of those folks, for instance, are not as aware of the ability of somebody to get into their records because they probably don't deal with financial matters as much. But yet, they are probably more at risk than anybody else because their systems probably aren't protected as well as, I would think, for instance, financial institutions. So, just kind of an observation. One of the questions I also had was, what about penalties? Do you guys ever catch anybody? How many folks have you caught in the last 5 years? Mr. Noonan. As a matter of fact, yes. I am talking about international, the higher-level cyber criminals. Going back, starting in 2005, the Secret Service successfully arrested Roman Vega out of the Ukraine. He was sentenced to 18 years, sir. In 2008, out of Estonia, Alexander Suvorov was sentenced to 7 years. In 2010, Russian Israeli citizen Vladislav Horohorin received 88 months, and Igor Shevelev, a citizen of the Ukraine, was sentenced to 13 to 40 years in New York. Mr. Luetkemeyer. Are they serving time in the United States? Mr. Noonan. They are serving time here domestically, sir. Mr. Luetkemeyer. They sound like they are all--and you indicated they are all from foreign countries-- Mr. Noonan. They are all international, transnational-- Mr. Luetkemeyer. Okay. Mr. Noonan. --cyber criminals that we were able to successfully arrest internationally, and have extradited back to the United States where they are serving their sentences domestically here in the United States-- Mr. Luetkemeyer. Now, are there other tools or other things that you need to be able to do your job better or to have better access to be able to bring charges against individuals? Is there something we need to do to help you do your job better? Mr. Noonan. Sir, what we are doing, which is bringing great success in the arena of going after international cyber criminals, is our partnerships with our international law enforcement partners as well as the international offices that we have and the international working groups that we have overseas. Because cyber crime knows no borders, we think it is important to be working outside of our own borders and developing these partnerships. So anything that we can get--continue to grow in the area of our international partnerships is where we find value right now in bringing these targets to justice. Mr. Luetkemeyer. Okay. Thank you. My time has expired. Mr. Noonan. Thank you. Mr. Luetkemeyer. With that, we will recognize the ranking member of the full Financial Services Committee, Ms. Waters. Ms. Waters. Thank you very much. And I ask unanimous consent to submit my opening statement for the record. Mr. Luetkemeyer. Without objection, it is so ordered. Ms. Waters. I would like to thank our witnesses for being here today. We are also very interested in this subject, and I think that there was a bipartisan effort to support this hearing. I would like to know, in light of the fact that the intrusion of Target came through a set of compromised vendor credentials, what, if any, updated guidance is being given to companies to heighten their due diligence of vendors to ensure they are, in fact, legitimate actors? Mr. Noonan. So surrounding the information of the potential--of the attacks that have occurred over the past several months, as we learn information on those attacks we are able to learn what criminal tools the perpetrators are utilizing. We take that information, and we analyze that information with the help of the NCCIC, and the NCCIC is the main operation that sends out the information to other industry. It is also partnered closely with the FS-ISAC, which is the Financial Services Information Sharing and Analysis Center, to take the information learned and push the tactics and trends of what is happening out to industry. And Mr. Zelvin could probably comment a little bit more on exactly how they are doing that. Mr. Zelvin. Yes, ma'am. We got the malware, or the malicious software, from the Secret Service. We analyzed it. We actually put out three different products. Informational products--the first one went to law enforcement so they could go out and hopefully find the actors who did this. The second one was a more technical product that went out to cyber defenders not only at the financial services companies and the retailers but also to the cyber defense community, managed security service providers, and Internet service providers, but the people who really understand one-zeros and backslashes and hashtags. Lastly, we have on the US-CERT Web site for consumers and the general population guidance on what they can do to protect themselves, and if they have been a victim, what they can do to recover from these events. Ms. Waters. So you do have some specific vendor information so that these companies can make a decision about whether or not they are credible vendors? Mr. Zelvin. Yes, ma'am. The government has put out information, the Financial Services ISAC has put out information, and also, the industry writ large is working hard at the problem. So, it is being attacked from a number of areas. Internationally, I will tell you we have gotten some focus there in working with our partners, because this is a global problem, not just a U.S. problem. Ms. Waters. I would like to ask Mr. Noonan a question about Attorney General Eric Holder's recent urging of Congress to establish a national standard for notifying Americans of data breaches in light of the theft, of course, of customer data at Target and other major retailers. Would you support a national breach notification standard? And if so, do you have any specific recommendations for how that should be crafted? I heard what you just said about all the things that are being done, but I think what is being urged by Attorney General Holder is a little bit different. Are you familiar with that? And what do you think? Mr. Noonan. Yes, ma'am. The Secret Service does support any initiative which would bring a data breach to the attention of a law enforcement agency with jurisdiction to be able to help bring criminals to justice and also to help in the aid of information-sharing. Ms. Waters. So you would consider that Congress does not need to establish a national standard for notifying Americans of data breaches? I appreciate that you have come up with some ways to approach this, including the notification of Americans, but there is nothing in law where we have set a standard. Do you think Congress should do that or could be helpful to you in doing that? Would you want to put something like that together as a recommendation for us to place in law? Mr. Noonan. Yes. Absolutely. Ms. Waters. Okay. Mr. Zelvin? Mr. Zelvin. Ma'am, I would absolutely agree. Last year at the Center, we had 240,000 incidents reported, but we know that is only a fraction of what is actually happening out there. There is no requirement. We would be supportive of that. We think it should be a public-private discussion to build what is the most appropriate way to come up with that standard, but we would support it. Ms. Waters. Thank you so very much. Mr. Chairman, I yield back the balance of my time. Mr. Luetkemeyer. Thank you. With that, we recognize the gentleman from Alabama, the chairman emeritus of the full Financial Services Committee, Mr. Bachus, for 5 minutes. Mr. Bachus. I thank the gentleman from Missouri. The Target incident has focused a lot of attention on data breaches at the point of sale, and I will ask Mr. Noonan, does the National Computer Forensic Institute (NCFI) have experience with these type of cases, and are there any lessons we can draw or any successful prosecutions? Mr. Noonan. Yes, sir. NCFI is an operation where the Secret Service brings State and locals to understand cyber crime the same way that Secret Service understands cyber crime. We teach them computer forensics; we teach them network intrusion capabilities; we teach them cell phone forensics, as well, and a litany of other courses to bring State and local law enforcement to the same level of understanding of cyber crime as the Secret Service. We utilize that facility as a capacity-building to help local law enforcement understand and be able to go after the small and medium-sized compromises, as well. A great success that we have out of the NCFI is a case in which a national restaurant chain was compromised in the same way that Target was compromised, through a POS case--intrusion case. Our office in Manchester, New Hampshire, worked this case and they worked it with the support of State and local law enforcement. And it was the State and local law enforcement that we were able to train at NCFI in understanding the forensics that were going on that actually were critical in bringing, in that case, three international, transnational cyber criminals to justice. So it is a force multiplication effort of the Secret Service, by training State and local law enforcement that are in your communities to have the same level of training, the same level of tools that the Secret Service has to go after these types of criminals. Not to mention that State and locals can't use that same equipment and that same training to do other types of cyber crime that is important to them in their communities, as well. So we know that agents or officers that we have trained and detectives that we have trained have also used those skills to bring homicide suspects to justice, pedophile suspects to justice, and a litany of other suspects. It doesn't stop at State and local law enforcement. We also have trained numerous State and local prosecutors as well as judges at that facility. So in the past 4 years, we have trained over 2,000 State and local members there. Mr. Bachus. Let me ask both of you this question, and it really goes into what Congresswoman Waters was saying: With Target, they delayed announcing anything until a blogger basically put on his blog that there had been a security breach, and then they disclosed the 40 million on their debit cards. But I think, Mr. Zelvin, you may have referred to this, they didn't report the 70 million on the personally identifiable information, which actually is almost a worse problem than the credit or the debit cards, because you can change the debit card. They didn't change the PPIs, and it is pretty hard to change your address or your grandmother's maiden name or the community you were born in, which are all used for passwords, so, there was all kinds of information. You are probably not going to change your phone number, and so those things are pretty difficult. And there has been a lot of discussion, and I have advocated before for some uniform Federal standard for disclosing this information--who you disclose it to and the timeframe. Because right now, they operate under--it depends on what State, and the disclosure laws are all different in different States. So if you would like to address the need for a--what we will call a uniform Federal standard? Mr. Zelvin. Congressman, I think one of the better examples is on the Federal side, the dot-gov side, the Federal departments and agencies, at least in the Executive Branch. You have a requirement to report if you had an intrusion, if you had a denial of service, if you have had a number of cyber events. That doesn't exist outside the dot-gov domain. So it really is incumbent upon that company to decide what they want to do and how they want to do it, and I know they talk about it at the highest levels, they bring in their security professionals who bring their attorneys, and then there is a decision made and the decision is either to disclose or not to disclose. They have to make a risk management decision of whether or not it is better to say something. I think we would--what I worry about is someday there could be that cyber 9/11, Pearl Harbor, whatever your analogy is, and the Congress will be asking, ``What do you need?'' This will be top on our list because if we don't know, we can't help to protect and secure the Nation. Mr. Bachus. Mr. Noonan? Mr. Noonan. Yes, sir. I would agree that a lot of times companies have to make a decision based on--they do make a decision based on a business need as opposed to what is right for the victim. Mr. Bachus. Right. Thank you. Chairwoman Capito. The gentleman's time has expired. Mr. Scott? Mr. Scott. Thank you very much. In light of everything that has happened, do each of you believe that our retailers are held accountable and responsible for cybersecurity at the same standard and level as our financial institutions? Mr. Zelvin. Congressman, let me answer your question this way: We don't have national standards; we are building them now. That is part of the President's Executive Order and-- forgive me--let me make sure I get the name right--there is the Cyber Critical Infrastructure Community Voluntary Program, the C3 program. Mr. Scott. But don't our financial institutions have standards now? My point is that, are the retailers held to that same level as our financial institutions? Because quite honestly, if not, much of what we are doing here is in vain: 110 million Americans have suffered mainly because, in my humble opinion, retailers are not held to as high a standard in this issue as the financial institutions, and it is critical that we get those two on the same page quickly. Mr. Zelvin. Agreed, sir. The standards can be legislated; they can be put out by regulators; they can be enforced by the industry themselves. And I think your point is there are certain places in industry where they don't have standards and it would be very helpful to do so. Mr. Scott. Let's talk about that for a moment because, as you notice from the questions from our committee, we are eager here in Congress to respond to this issue. This is almost like a Poseidon tidal wave coming at us. As you rightly point out in your testimony, there are now over 2 billion Internet users. There are over 12 billion computers and other instruments that are used, and satellite devices, and so forth. And in the next 10 years that is estimated to possibly double. So the issue becomes, can we win this? Can we with this battle? That is especially true because not only--even if we just existed over the next 10 years at the same level of sophistication of these technical devices, which we have become sort of servants to instead of servants to us. So the question becomes, with the rapid advancements in technology--just think: Ten years ago, we didn't have what we have now, and what we have now, my God, is going to be ancient 10 years from now and we are going to have double the people with it. So I think the American people are looking for some confidence here that their vital security is at stake, and then more than that, the Nation's security is at stake. Let me ask you an interesting question, Mr. Noonan. What was very interesting about your comment, because I wanted to get to--you said you caught some people and you mentioned sentencing of these people. Are there any possibilities for parole in this or negotiation or anything like that? Mr. Noonan. In the Federal system, my understanding is that there can be downward departures of sentences, but not that I know of as-- Mr. Scott. That is interesting. Why so? Because you see, these national conspiracies, as you so aptly put it, are very sophisticated. And it could be that they are even more sophisticated than you or us or where we are. So why are there plea agreements? Why don't we have stiff, hard criminal sanctions and put these folks who do wrong in jail for what they are doing to the country? The other point I wanted to ask is that you mentioned that all of these were foreigners attacking us. Now, that begs the question, why aren't they attacking--I don't want them to attack France or Germany or Great Britain--but the question is, why us? Is there something that these other nations are doing that deters them, and we are vulnerable where other nations aren't? Is that a possibility, since the only ones that you have been able to get ahold of and put away, hopefully for a while, are foreigners? Mr. Noonan. Sir, we know that these cyber criminals are not just attacking the United States. This is a global issue. This is not just a national issue to the United States; this is a global issue. These particular criminals are attacking wherever they can find wealth and monetize that data. Mr. Scott. How are we doing compared to these other nations? Are these other nations putting them away as they should? Is there coordination with other nations? Mr. Noonan. Yes, sir. We are coordinating very closely with other nations. And to be honest, we have a very, very rich success rate of getting some significant, stiff sentences. Albert Gonzalez was a domestic target that we arrested in the TJX and Heartland Payment Systems breach. He was sentenced to 20 years in prison here in the United States. We also have a litany of other huge sentences. I brought up earlier Roman Vega out of the Ukraine was sentenced to 18 years in prison. Recently, out of Romania, Mr. Oprea was sentenced to 15 years in prison here domestically for, again, point-of-sale breaches we are talking about today. Chairwoman Capito. The gentleman's time-- Mr. Scott. And the national breach law is what you recommend we do? Mr. Noonan. Yes, sir. Mr. Scott. Okay. Chairwoman Capito. Thank you. Mr. Stutzman? Mr. Stutzman. Thank you, Madam Chairwoman. And I thank both of the witnesses for being here today. I would like to follow up just a little bit on the questions that you just talked about in, I guess, retailers. I come from a small business background and have small business-- or a retail small business as well, and obviously any sort of credit card is a convenience for both consumer and for the retailer, but the role that retailers play--granted, I am small, but there are large retailers out there. Can you share with us a little bit of what--how is that data stored? Do they keep that data? For us, we don't--we have no interest in it other than the transaction, and so I guess I am trying to follow up and understand why would we expect the retailers to be held to a different standard--or at the same standard as the financial institutions? Is there an effort out there by retailers even trying to do that? I guess I would be concerned about that to some extent, because the more information that is held in different groups' hands, the more opportunity there is going to be for breaches. I don't know if either of you had a comment on that? Mr. Noonan. Yes, sir. Actually on your next panel you have a witness from PCI who is going to be able to discuss some of those issues, but regulations have changed over the course of the years, so back in 2005, TJX intrusion happened where cyber criminals were able to go after a database where retailers were able to, at that time, store credit card data unencrypted in servers. So, the criminals were able to exfiltrate a whole database of stored credit card data in 2005. Because of that intrusion, industry changed. No longer can you store credit card data on a database within your system. So what the criminals then did is they looked at, where is the path of least resistance, and they attacked Heartland Payment Systems, which was a credit card processing company. Credit card data during that period of time crossed over the system from the retailer to the credit card processing company to the bank, and in that system it was not encrypted data during that period of time. Again, after that intrusion happened, the standards changed and from point to point credit card data and data information had to be encrypted. Today, the criminals are going after, again, where is the edge of the fence? So, they have gone after the point-of-sale systems. In domestic retail shops, from the point that you swipe your credit card at the terminal, that data goes to a back-of- the-house server, to a computer in the back that you see it, it is probably in the storage room or something of that nature. And that data, from the point that it is swiped at the keypad to the back of the computer, that is where it is vulnerable and it is not encrypted. Once it hits that computer and goes through the processing system, that is where it is encrypted and protected. So what happens is continually we change the standard and these complex, sophisticated criminal actors are going to go after and have been going after this data in whatever they see as the most advantageous, weakest point in the system. Mr. Stutzman. So are you saying that typically, the weakest point is through retailers' entry points? How do they use the retailers' entry points? When I am swiping a card, are they able to follow that data from-- Mr. Noonan. What they have done is they have actually installed malware into the computer system where it makes the switch from the swipe into the encryption piece, so before it is encrypted they have malware which actually captures the data at that point and exfiltrates the data back out to a different system where the criminal is able to collect it. Mr. Stutzman. Do retailers have the ability to--is there software out there that can prohibit that sort of activity, or what could retailers do to protect that information? Mr. Noonan. I am unsure at this point. That would be an industry question to bring up, sir. Mr. Stutzman. All right. Thank you. I will yield back. Chairwoman Capito. The gentleman yields back. Mr. Heck? Mr. Heck. Thank you, Madam Chairwoman. I would like to begin by asking unanimous consent to enter into the record the letter dated January 10, 2014, from 17 signatories to Chairman Hensarling requesting this hearing. At the same time, I would like to express my public appreciation to you for conducting this hearing. Chairwoman Capito. Thank you. Without objection, it is so ordered. Mr. Heck. Thank you. Mr. Noonan, it is a little hard to look at this phenomenon without coming away with an answer to the question of, ``Are we winning or losing?'' of, ``We are losing,'' at least as measured--not in terms of the number of attacks, but the number of successful attacks and the dollar amount that has successfully been effectively stolen. So for those of us who aren't especially geeky, among whom I would count myself, can you put this in the simplest terms possible: What is the most important takeaway for those of us sitting here about what it is we can do as Members of Congress to help change that trend line? What is the most important action we could take, policy we could enact, in whatever form, to help? Mr. Noonan. It is my belief that if Congress were to assist in coming up with a reporting requirement where if there is a data breach or a company has knowledge of a data breach, that they were to bring that to law enforcement's attention. That is my perspective. That is the Secret Service perspective. Because we are able to, at that point, help with the information- sharing piece that has to go forward to better protect what is going on after the fact. In other words, it is best for industry to have a point of contact at law enforcement--I make the analogy with a fire: Don't wait until your house is on fire to have the phone number to the fire department. If industry partners with law enforcement and already has a personal, a trusted relationship with law enforcement, we, law enforcement, are better able to assist a victim company walk through the process. And in doing so, we are able to grab and gather the cybersecurity-related information and share that, then, with the greater infrastructure in an effort to prevent other attacks. We use, again, a number of different efforts to share that information. We use the NCCIC, where they are able to push it out through their sources to greater industry. We are able to use our electronic crimes task forces. We are able to push that out to our trusted partners in the private sector as well as academia. And we are able to use our partners at the FS-ISAC to be able to take that information and push it. So I think the important part of this whole mechanism that we are talking about is the information-sharing apparatus of when a breach does occur, what can we learn from that breach, and how can we share that information to prevent others? Mr. Heck. I want to ask a follow-up corollary to that, which is really a follow up to the question--he has left now-- Mr. Luetkemeyer asked, which I didn't think you answered; I didn't think you were evading it but I didn't think you actually answered it, and I really thought it was a very good question, especially given that the nature of this activity does not respect boundaries of countries whatsoever. He asked you, ``What could we do to help you be more effective internationally?'' And basically what you said is, ``Well, these international partnerships are really important to us.'' But the question, sir, is, what can we do to help you be more effective as it relates to your ability to engage in effective enforcement internationally? Mr. Noonan. You can continue to support the Secret Service in our efforts of continuing to expand our presence in our international field offices and expanding that footprint. You can help us in furthering our international working groups that we have. We have working groups in the Ukraine; we have international working groups-- Mr. Heck. Just use one example. Mr. Noonan. I'm sorry. Mr. Heck. I got it. I have one other question that I want to ask, and I apologize-- Mr. Noonan. Sure. No problem. Mr. Heck. --for interrupting. I want to go back to Target. It is my understanding that neither Target-branded debit cards or credit cards were breached, or successfully--and first of all, I would like to know if I have accurate information in that regard. And if it is true, what was the difference? And is there a lesson to be learned there if it is true? What were they doing such that information wasn't used against-- Mr. Noonan. Sure. So, I just checked, and that information is not accurate. Those cards-- Mr. Heck. They were breached. Mr. Noonan. --were breached as well, so that was taken. Mr. Heck. Thank you. Mr. Noonan. Yes, sir. Mr. Heck. I yield back the balance of my entire 6 seconds. Thank you, Madam Chairwoman. Chairwoman Capito. The gentleman yields back. Mr. McHenry? Mr. McHenry. I thank the chairwoman. I just have a broad question for both of you, and if you could answer this. I read news reports that merchants and universities are finding out about data breaches from the government, from financial institutions, from credit card companies, banks, the whole lot. Why are merchants failing to detect those security breaches? Mr. Noonan. I can't answer why they are not detecting the security breaches, but law enforcement as well as other parts of the private sector--banks, processing companies--have a unique perspective of looking at compromised data. So we can be working with bank investigators--you can take any bank for example--and when they start seeing different anomalies with their customer base of reporting fraud losses, the initial point of report is going to be back to the bank investigator or back to the bank. So when they start seeing high percentages of fraud loss coming from the same merchant or the same retailer, that is a concern, so they would either bring it to law enforcement's attention or actually bring it to the retailer's attention at that point. So not necessarily would the retailer have the exposure themselves of that-- Mr. McHenry. Okay. But to that end, Mr. Noonan, when you announced the data breach with Visa and Target in August of 2013, right, it was made public then. Am I right on the timeline? Mr. Noonan. Negative. On Target? It wasn't until December at some point. Mr. McHenry. Okay. So when did you all identify the malware for that data breach? Mr. Noonan. The data breach, when it was brought to--when we were working closely side by side with the forensic examiners that--the third-party forensic examiners that Target had hired, within a week we were able to have that data and be able to push that out to-- Mr. McHenry. So, you turned it around in a week's time? Mr. Noonan. Yes, sir. Mr. McHenry. Okay. So on the next panel, we have a witness from the Financial Services Information and Sharing and Analysis Center, and they are going to--they are actually conducting a study which, ``engages machine-to-machine threat intelligence exchange in a way that will more quickly inform financial infrastructure front line operators and aid their preventative and incident response decision-making.'' They are calling this the Cyber Threat Intelligence Repository. Are you both familiar with this initiative? Mr. Zelvin. We are, sir. At the NCCIC, we are one of the leading proponents and creators of the STIX and TAXII framework to which you are referring. Mr. McHenry. So will this speed the response? Tell us the value of it. Mr. Zelvin. Sure, Congressman. I think one of the best ways to highlight this is in September 2012, our financial sector was being attacked about 3 times a week with something called ``distributed denial of service attacks.'' We were getting information by the hundreds of thousands, and technical information. We were getting those--and I am going to use some generalisms just to illustrate the point--in PDFs, so, in a very user-unfriendly format for a cybersecurity defender. We started using spreadsheets like Excel, which was a little bit better, but there are a variety of different data formats that companies use so there wasn't a one-size-fits-all. The STIX and TAXII format will enable to us adjust the information so somebody doesn't have to e-mail it, we don't have to process it, we then e-mail it back. This will do it in an automatic way so what had been taking us days that we got down into hours will hopefully take us seconds. Mr. McHenry. So you move from PDFs to Excel-- Mr. Zelvin. To a machine-to-machine format that will take the human out of the equation. Again, it will be up to the-- where the destination goes how they are going to want to process-- Mr. McHenry. My time is short, but can you tell us the legal restrictions that prohibit greater data-sharing? What are the things we could do to make the dissemination of data better? Mr. Zelvin. Congressman, I am going to highlight something that is--the question that was asked of Mr. Noonan, and you may have asked it. One of the things that we would really ask Congress to do is just better define clarity on information- sharing. What is information that the private sector and others can share with us? I will tell you, we meet with a lot of C-suite executives, the security folks, and they say, ``By all means, government, here, you can have this information. Proliferate it widely. Others are being attacked. This will help us all.'' Then they have others in the company who are giving good advice--their lawyers--saying, ``Look, there is no legal means that allows this. We are assuming some risk, some liability here.'' If we could get some clarity as to what can be shared with us and have that in law, that will really speed the process. And also, it should be respectful of privacy and civil liberties. We should not do this without having some governance on us, but it should not stop us from doing it, either. Mr. McHenry. I thank the chairwoman for her advocacy on this important issue. Chairwoman Capito. Mr. Rothfus? Mr. Rothfus. Thank you, Madam Chairwoman. In Pittsburgh, we are fortunate to have premier academic institutions like Carnegie Mellon University and the University of Pittsburgh right at our doorsteps. Both of these universities are doing exceptional work in the area of data security. And, Mr. Noonan, you highlighted in your testimony the work of Carnegie Mellon. As you, I think, would both agree, we need to be using these great resources in our fight to combat data-breachers. I am wondering, Mr. Noonan, if you would elaborate a little bit on how the Secret Service--and then, Mr. Zelvin, if you could perhaps comment on what DHS has been doing with these and similarly situated universities around the country? Mr. Noonan. Yes, sir. Thank you. The University Carnegie Mellon, we work closely with their Software Engineering Institute. We actually have a full-time agent who is assigned there, so he is sitting at Carnegie Mellon, partnered with them. Through academia and observing what is occurring in a lot of these cyber incidents, we are able to develop other tools--technical tools--which the Software Engineering Institute is able to help us identify different situations, different forensic solutions, different ways of looking at data, which better helps us do our cases, our investigations, our information-sharing. Like the institution at Carnegie Mellon, we also have representation at the University of Tulsa, where we have the Cell Phone or Mobile Device Forensics Facility, which we worked closely with students--graduate student level students there-- and we look at how mobile devices can be affected by criminals. We take highly complex criminal cases and we push them to our agent who sits with the University of Tulsa to examine how to get at those forensic capabilities and those forensic hurdles in mobile devices, too. So it is very important for us to team with academia to decide what is on the horizon of the next threat. Mr. Rothfus. Mr. Zelvin, is DHS similarly engaged with the academic institutions? Mr. Zelvin. Congressman, we are. Carnegie Mellon is one of our most critical partners in not only understanding threats but also in the mitigation, so it is an intimate relationship and something that we hold in the highest regard. Mr. Rothfus. I want to follow up a little bit on what Representative McHenry was talking about. I think everyone can agree that effective data security is dependent on a voluntary collaboration between the government and members of the private sector. Key to establishing this sort of trust-based public- private partnership is adequate legal liability protection for private entities that share information with the government. And to that end, could you please elaborate on the current policy regarding legal liability protection for private entities that opt to share threat information with agencies like yours? Maybe each of you can-- Mr. Zelvin. Congressman, that is one of the central issues with sharing at government is the concern of either breaking the law or potentially having court action in a civil case. So, there is great desire on behalf of the Executive Branch to have the legal liabilities in place so one would not be punished for sharing with government. Again, the information should be clarified as to what can be shared, but if you do share that information, one should be able to do so without penalty. Mr. Rothfus. Mr. Noonan, can you comment on, from your perspective, the current policy with respect to information- sharing? Mr. Noonan. Yes, sir. I don't believe there is a policy as of right now. So I would concur with Mr. Zelvin. I think there is an issue with companies coming forward so they are given some sort of protection, but I cannot comment on existing policy, sir, no. Mr. Rothfus. In both of your written testimonies, you discuss the increasingly international nature of the threat landscape and the need for close partnerships with foreign law enforcement agencies. Which countries are you most concerned about in terms of data security? Mr. Noonan. A number of the international cases that we are talking about today are Eastern European, Russian-speaking cyber criminals. I don't want to affiliate these type of criminals with one particular country because again, there are no borders. We see Eastern European, Russian-speaking cyber criminals who are here domestically in our country that we are able to arrest and bring to justice. We see these types of criminals all over the world. I say this in the fact that these are the most sophisticated, in our opinion, cyber criminals who are attacking our Nation's financial infrastructure. So as far as saying--in trying to lock it down to a particular country of origin, there is not one in particular. We are seeing them across-the-board. But again, the Russian-speaking cyber criminal is using the Russian language as a form of OPSEC, if you will, to provide some anonymity to them. Because they use the Internet, they are wallowing in the anonymity of the Internet. Mr. Rothfus. Mr. Zelvin, would you agree with the Russian- speaking actors out there? Are there other countries about which you have particular concerns? Mr. Zelvin. Congressman, I worry about actors in Asia; I worry about actors in Europe, to include Eastern Europe. It is literally a global threat environment. So on the financial side, I would agree with Mr. Noonan, it is more the Eastern European criminal actors, but there is also extraordinary criminal activity in Asia, as well. Mr. Rothfus. Thank you. And thank you, Madam Chairwoman. Chairwoman Capito. Thank you. Mr. Barr? Mr. Barr. Thank you, Madam Chairwoman. I wanted to kind of know from the witnesses what the worst- case scenario would be. In your all's professional judgment, what would be the greatest cybersecurity threat to America's financial system? Mr. Noonan. In my opinion, it is a financial services attack that goes unnoticed. So a long, long period of exposure to a financial services sector company is my opinion of what the worst case could be. It is through the actions of law enforcement that proactively go out and seek these out that brings it to industry's attention. And I also think it is important that when industry itself notices it, that they bring it to our attention. It is important for us--law enforcement, the government--to be able to either prevent the attack from happening or see it as it is happening to be able to stop the bleeding from happening. If the bleeding occurs for a long, long period of time and there is a long period of exposure, that, in the financial services sector, would be probably the more important, more area of concern for that sector. Mr. Barr. Mr. Noonan, what would prevent a victim or targeted company from failing to notice this attack? Mr. Noonan. In my opinion, it is how advanced these criminal actors are. So when we are talking about significant criminal actors that--you have to understand, when they are going after the financial services sector, they are going into these targeted victim companies stealthily. Their job is to go undetected, because if they are detected and they go into these situations loud and disrupt everything, they are going to lose what their goal is and that is their financial gain; that is their grabbing the data and being able to monetize that data. So if law enforcement and industry learns about the theft of that data and we are able to do something about it, it minimizes the criminal profit in what they are attempting to do. Mr. Barr. Have we been able to assess or gauge the capabilities of some of these hackers? Specifically, the kind of nightmare scenario would be something along the lines of a hacker being able to erase electronic data from a large financial institution, or worse, effectuate transactions through hacking into a large, systemically important financial institution. Are we aware of whether or not cyber terrorists have that capability at this point? Mr. Zelvin. Congressman, let me answer that and then maybe go back to your original question. There are actors out there who have extraordinary sophistication, who are patient and are looking for vulnerabilities and are absolutely capable of finding them quickly, and it is just whether or not they have the intent and the access and then the ability. As I look at the worst-case scenario, to answer the first part of your question, I think that if somebody was to find an intrusion in the transactional systems that the financial sector uses, that would be pretty catastrophic. If there is a loss of confidence within the systems themselves where data has been compromised, that would be pretty catastrophic. If consumers lose the convenience that they rely upon, are unable to use their credit cards and their ATMs, that would be pretty catastrophic. There are others but those are the three that really come to my mind. You really get to that high impact, low probability. The sector, the institutions are doing extraordinary work at this every hour of every day. But ultimately, there are vulnerabilities and the actors are using some very creative and clever means to come at us, so you have to be very good every single day because they are trying to come at you every single minute of every day. Mr. Barr. And in terms of technological advancements in terms of creating defenses to this, there is talk about these chip cards and more extensive use of PINs, particularly with credit cards. But I did notice that in the case of the Target situation, that PINs were procured by the hackers, as well. So how effective is expanded use of PINS as a defense mechanism? Mr. Noonan. Any added security measure is going to definitely help in the monetization of whatever data is stolen. It would not assist in the theft of the data itself. Mr. Barr. Right. Mr. Noonan. Chip and PIN technology will help in limiting the criminal monetization of that data, but it would not help in the theft of that data. That data could still be used on card-not-present purchases. So a cyber criminal, though he cannot re-encode that data onto a credit card and use that counterfeit credit card, he could go online and type in the 16-digit number and the other information that is exposed there and still accomplish financial loss to the victim bank or the victim institution. Mr. Barr. Thank you. I yield back the balance of my time. Chairwoman Capito. Thank you. The gentleman yields back, and that concludes questioning for the first panel. I want to thank both of you gentlemen. I think this has been very enlightening, and I again apologize for the delay and thank you for your patience. You are dismissed. While we are changing over, I am going to ask for unanimous consent to submit several statements for the record from the Independent Community Bankers of America; the National Retail Federation; the National Association of Federal Credit Unions; the American Bankers Association; and the Credit Union National Association. Without objection, it is so ordered. All right. I want to thank the second panel for coming in. We have a second panel of distinguished witnesses. Again, thank you for your patience. I know you have been sitting here, as well, while we had our technical difficulties. Each of you will be recognized for 5 minutes to give an oral presentation of your testimony. And without objection, each of your written statements will be made a part of the record. Our first witness is Mr. Troy Leach, chief technology officer, PCI Security Standards Council. Welcome, Mr. Leach. STATEMENT OF TROY LEACH, CHIEF TECHNOLOGY OFFICER, PAYMENT CARD INDUSTRY (PCI) SECURITY STANDARDS COUNCIL (SSC) Mr. Leach. Thank you. My name is Troy Leach, and I am the chief technology officer for the PCI Security Standards Council, a global industry initiative that is focused on security payment card data. Our approach to an effective security program is people, process, and technology as key parts of data protection. Our community of over 1,000 of the world's leading businesses tackles security challenges from simple issues--for example, the word ``password'' is still one of the most commonly used passwords--to very complex issues, like proper encryption key management. We understand when consumers are upset when their payment card data is put at risk and the harm that is caused by breaches. The Council was created as a forum for all stakeholders--banks, merchants, manufacturers, and others--to proactively protect consumers' cardholder data against emerging threats. Our standards focus on removing cardholder data if it is no longer needed. Our mantra is simple: If you don't need it, don't store it. If you do need it, then protect it through a multilayered approach and devalue it through innovative technologies that reduce incentives for criminals to steal it. Let me explain how we do that. The data security standard is built on 12 principles that cover everything from strong access control, monitoring and testing of networks, risk assessment, and much more. This standard is updated regularly through feedback from our global community. In addition, we have developed other standards that cover payment software, security manufacturing of cards, point-of- sale devices, and much more. We also develop standards and guidance on emerging technologies, like tokenization and point- to-point encryption, that remove the amount of card data that is kept in systems, rendering it useless to cyber criminals. Another technology, EMV chip, has widespread use in Europe and other markets and is an extremely effective method of reducing card fraud in face-to-face environments. That is why the Council supports the deployment of this technology. In fact, today we already certified a securing of chip terminals and manufacturing of chip cards. However, EMV chip is only one piece of the puzzle. In addition, controls are needed to protect the integrity of payments online, on the telephone, and in other channels. These controls include encryption, proper access, response from tampering, malware protection, and more. These are all addressed within the PCI standards today. Used together, EMV chip and PCI standards can provide strong protections for payment card data. But effective security requires more than just standards and technology. Without ongoing adherence and supporting programs, these are only tools and not solutions. The Council makes it easy for businesses to choose products that have been independently lab-tested and certified as secure. The Council's certification and training programs have educated tens of thousands of individuals including assessors, merchants, technology companies, and government. And finally, we conduct global campaigns to raise awareness of payment card security. The recent compromises demonstrate the importance of a multilayered approach to payment card security, and there are clear ways in which the government can help--for example, by leading stronger law enforcement efforts worldwide, particularly because of the global nature of these threats; and by encouraging stiff penalties for these crimes. Promoting information-sharing between the public and private sector also merits attention. The Council is an active collaborator with government. We work with NIST, DHS, and many other government entities, and we are ready and willing to do more. We believe that the development of standards to protect payment card data is something that we are uniquely qualified to do. The global reach, expertise, and flexibility of PCI have made it an extremely effective mechanism for protecting consumers if implemented correctly. The recent breaches underscore the complex nature of payment card security. A multifaceted problem cannot be solved by a single technology, mandate, or regulation. It cannot be solved by a single sector of society. Businesses, standards bodies, policymakers, and law enforcement must work together to protect the financial and privacy interests of consumers. Today, as this committee focuses on recent breaches, we know that criminals are focusing on inventing the next attack. There is no time to waste. The PCI Council and business must continue to provide multilayered security protections while Congress leads efforts to combat global cyber crimes that threaten us all. We thank the committee for its attention to this, and we look forward to finding a way forward with addressing large security concerns of our time. [The prepared statement of Mr. Leach can be found on page 67 of the appendix.] Chairwoman Capito. Thank you. Our next witness is Mr. Greg Garcia, advisor, Financial Services Information Sharing and Analysis Center. Welcome. STATEMENT OF GREGORY T. GARCIA, ADVISOR, FINANCIAL SERVICES INFORMATION SHARING AND ANALYSIS CENTER (FS-ISAC) Mr. Garcia. Thank you, Chairwoman Capito, Ranking Member Meeks, and members of the subcommittee. I am Greg Garcia, president of Garcia Cyber Partners, a cybersecurity policy and business development consulting firm. I am testifying here today as an advisor to the Financial Services Information Sharing and Analysis Center, or FS-ISAC. In light of the recent data breaches in the retail sector, this hearing is timely as we consider how commercial and critical infrastructure sectors can prevent and defend against such attacks from happening in the future. During my tenure as Assistant Secretary at Homeland Security and as an executive with the financial services sector and IT sectors, I have consistently held up the FS-ISAC as a model operation. It is a model for how trusted collaboration, timely intelligence, and information-sharing are essential elements of any risk management strategy. They are effective tools against cyber adversaries who would subvert the integrity of the critical infrastructures that maintain the cyber, physical, and economic security of this country and the world. So accordingly, I would like to spend just the next few minutes describing some of the major elements of the model and put it in the context of the recent data breaches that are the subject of this hearing. The FS-ISAC was founded in 1999 in acknowledgement of a Presidential Directive, PDD 63, which urged private industry to self-organize around the mission of sector-specific critical infrastructure protection. The FS-ISAC provides a formal structure for its 4,500 member institutions to share valuable and actionable cyber intelligence within the sector and with their industry and government partners. This collaborative activity ultimately benefits the Nation. At FS-ISAC, we use all the tools at our disposal to stay ahead of adversaries. And just a few of these tools include the secure FS-ISAC member Web portal, where threat indicators are published; e-mail listservs; threat assessment conference calls; best practices advisories; incident response and mitigation protocols; cyber exercises; and information-sharing partnerships across the sector, with other sectors, and with government and cyber operations and intelligence entities, such as the NCCIC. We recognize that the threats we face are sophisticated and are frequently changing, and that immediate sharing of threat details and patterns is effective in heading off the changing nature of the threats. We also share this sensitive information without the risk that any member company would exploit another's misfortune from cyber attack for competitive advantage. Members know we are all in this together, that an attack on one can very quickly escalate to attack on many if all eyes and ears are not working together. And our organization ensures that even smaller community institutions have access to threat information alongside the largest financial institutions in the Nation. By way of specific example, allow me to walk you through some of the actions taken by the FS-ISAC in the wake of the retailer data breaches that recently occurred. First, when information from forensic investigations became available FS-ISAC published a joint document with the DHS National Cybersecurity and Communications Integration Center (NCCIC), the U.S. Secret Service, and ISAC partners regarding the breach. We provided relevant mitigation recommendations and network security best practices from an industry owner and operator perspective. These security practices are intended to help vendors and merchants to secure their point-of-sale systems and to defend against malware that are used in those system attacks. Second, FS-ISAC encouraged its association members to share the joint document broadly with their members, and we also met with and provided the document to a number of retailer associations and encouraged them to share the document with their members. Third, as information about the attacks was becoming available, members were able to leverage FS-ISAC's all-hazards playbook and related best practices to better protect and communicate with their customers and the general public. Fourth, FS-ISAC provided an assessment of the point-of-sale malware to its members on its biweekly threat calls and the assessment examined the malware in several ways--the usage patterns in the short term, the growing popularity and availability of the malware tools, and threat indicators for network defenders. Finally, we continue to work with multiple associations representing the retailers to explore ways in which we can help them enhance the security of their systems. Since these data breaches occurred, there has been considerable discussion in the public domain about accountability and assignment of costs associated with these breaches. Indeed, financial institutions have absorbed considerable costs associated with canceling and reissuing credit and debit cards to their customers. But as I stated at the beginning of my testimony, it is clear to us that we are all in this together, that security is a shared responsibility, and that is why the FS-ISAC was pleased to see the announcement on February 13th of a new partnership between merchant and financial trade associations that will focus on exploring the paths to increased information-sharing, better card security technology, and maintaining the trust of customers. Discussion regarding the partnership was initiated by the Retail Industry Leaders Association and the Financial Services Roundtable and was joined by a dozen other influential financial associations. Madam Chairwoman, that concludes my testimony and I look forward to answering any questions the subcommittee may have for me. [The prepared statement of Mr. Garcia can be found on page 57 of the appendix.] Chairwoman Capito. Thank you. Our next witness is Mr. David Fortney, senior vice president, product manager and development, The Clearing House Payments Company. Welcome. STATEMENT OF DAVID FORTNEY, SENIOR VICE PRESIDENT, PRODUCT MANAGEMENT AND DEVELOPMENT, THE CLEARING HOUSE PAYMENTS COMPANY Mr. Fortney. Thank you. Good afternoon, Chairwoman Capito, Ranking Member Meeks, and members of the subcommittee. My name is David Fortney. I am the senior vice president of product management for The Clearing House, and I thank you for the opportunity to talk today about issues that are critical to all Americans--the security of our payment system and also the protection of sensitive consumer financial information. The Clearing House is the Nation's oldest bank association and payments company. Our mission includes ensuring the safety, soundness, and efficiency of the payments system. We provide payment services to our 23 owner banks and other financial institutions, clearing and settling nearly $2 trillion daily. The organization's owner banks collectively represent over half of the Nation's deposits and over 70 percent of Visa and MasterCard-branded credit cards. The recent escalation of merchant data breaches demonstrates the increasing sophistication of cyber criminals and also underscores the urgent need for financial institutions, merchants, and all who touch the payment system to work together to protect against current and future threats. I will focus my testimony today on two payment systems technologies that are on the horizon and will reduce the risk of future breaches: EMV; and tokenization. First, EMV cards contain computer chips and they are designed to protect against counterfeiting, as compared to the magnetic stripe-based cards used today. However, EMV alone would not have prevented the theft of card information in the recent breaches, as it relies on merchants receiving and processing the same static information that account numbers have today. As we have heard from prior testimony, those account numbers would still be significantly valuable to cyber criminals for committing fraud online, where most fraud occurs. Additionally, as EMV was designed prior to the Internet, prior to mobile phones or tablets, it does not address transactions initiated via those means. The second technology I would like to discuss is one that we have been directly involved in at The Clearing House. It is called tokenization. Tokenization addresses online and mobile phone payments by substituting a limited-use random number, called a digital token, for the customer's account number during the transaction. Working behind the scenes, the secure digital token acts just like a regular account number as it goes through the system and requires very little change in how customers and merchants operate. A customer's true account number is never present in the smartphone or in the merchant's system, preventing any malware residing on those systems from capturing that sensitive information in the first place. The implementation of these two technologies--EMV and tokenization--will require cooperation amongst the banks and merchants as the tangible benefits can only be achieved by moving in tandem. Turning to e-commerce, today customers provide personal financial and other data to e-commerce merchants, online wallets, alternative payment providers, merchant aggregators, and others. This proliferation of live sensitive customer account data increases the risk of breach-related fraud. When my bank recently sent me a new card after a compromise, I needed to update that card information on 47 different merchant and payment provider Web sites. In a tokenized environment, customer account data is held securely behind the bank firewalls and consumers won't need to update account information when cards are reissued. The scale of the payment system is enormous, with hundreds of millions of consumers, millions of merchants, thousands of banks and credit unions, and hundreds of networks and processors. The only way to gain broad adoption of a new technology such as tokenization is to develop an open standard that is scalable and widely adopted. Open standards promote innovation and allow customers and merchants to choose the best point-of-sale technology that works best for them. Two years ago, The Clearing House and its owner banks began working together to create an open tokenization standard that we call Secure Token Exchange. We are working with mobile wallets, networks, merchants, and payment processors to pilot and trial the standard. The initial pilot began late last year and we will soon expand the trial phase to encompass additional banks, merchants, and cities. This initiative has acted as a catalyst with an increasing number of payment system participants now working on tokenization. We remain very much at the center of this activity. For example, The Clearing House is now working with the card networks, standard bodies, merchants, and processors on digital tokenization efforts with the goal of upholding the core openness, safety, and soundness principles. We also joined the coalition referred to by the prior witness, a coalition of merchant and financial industry trade associations, to form a cybersecurity partnership. Thank you again for the opportunity to testify on these critical issues, and I would be happy to answer any questions you may have. [The prepared statement of Mr. Fortney can be found on page 54 of the appendix.] Chairwoman Capito. Thank you. Our final witness is Mr. Edmund Mierzwinski, consumer program director, U.S. PIRG. Welcome. STATEMENT OF EDMUND MIERZWINSKI, CONSUMER PROGRAM DIRECTOR, U.S. PIRG Mr. Mierzwinski. Thank you, Madam Chairwoman, Ranking Member Meeks, and members of the subcommittee. As I did at a Senate hearing last month, I want to try to shift the discussion from what it has been in the media anyway, which is simply data breach notification--I am glad today we are talking about a lot more than data breach notification--to many of the other issues surrounding data security. First, regarding the Target breach, I am very concerned that Target dragged out notification to consumers for a long time. If it was because of investigations conducted with law enforcement that is one thing, but if it is simply because they wanted to drag it out for a long time, I am very disappointed. I am also disappointed in the product that they gave consumers--credit monitoring lite, a product that only tells you if your Experian credit report has any changes made to it, but not if your other two major credit reports have any changes made on them. Further, in order to accept that product, even though it was free, consumers had to agree to a mandatory arbitration clause limiting their rights against Experian in the future, and that is simply unacceptable to me. But at the same time, I don't hold Target, Neiman Marcus, or any other company completely to blame for the breaches that have occurred in their stores or in their payment systems. The reason for that is they are working with the banks and the card networks, and the banks and the card networks are forcing them to use an obsolete payment system known as the mag-stripe card. For 50 years, or maybe 40 years, we have used the mag-stripe card without upgrading it. I am very pleased to hear that the banks are now talking about open standards to upgrade the systems out there. That is very encouraging to me. But for 40 years, they acted as monopolists with closed standards and required merchants to accept a card essentially like a car from the 1950s--no airbags, no ABS brakes, no additional safety features, no safety glass. Merchants were forced to continue to adopt new and different and ever-changing changes to their systems. It was just very difficult for them and it is not all the merchants' fault, and the banks need to be held accountable and the card networks that were formerly owned by the banks and still are largely controlled by the banks. I have in my written testimony 10 recommendations that I want to go through quickly. First, Congress should make all plastic equal. Credit cards are safe by law; debit cards have zero liability by promise only. Plus, with a debit card, again, you are required to use an unsafe system on the signature-based network instead of a PIN-based network. You are encouraged, anyway, to use it without a PIN, and that is just unfair and unreasonable to consumers who not only are breached, who will not only face the problem of fraud or identity theft, but also lose money from their existing account until the bank replaces it, if it honors the zero liability promise. So first, why shouldn't debit cards have the same consumer protection as credit cards? Second, be careful not to endorse any specific technologies. Go forward with open standards that push innovation and that all participants in the system are subject to the same rules. Previously, the banks have forced merchants to be subject to a different set of rules than they have been subject to, and companies that are under Gramm-Leach-Bliley are subject to a different set of rules than the merchants are subject to--an easier, softer set of rules. Third, look into whether the open standards bodies are truly open. I don't think they have been in the past; I am encouraged to think that they may be in the future. Fourth, Congress should stay away from an issue that has been debated in State legislatures, which is that banks try to get the merchants, by law, to pay all of their costs. They already do pay most of the banks' costs. It is impossible to do that by law. Finally, don't preempt the States. Even if you come up with a uniform standard, don't preempt the States. You don't need to. The States will move onto other issues as long as your standard is good enough, but if it isn't, we need the States as first responders. Make sure you allow for private enforcement by consumers of any law in State attorneys general as well as a good Federal law. Don't include a harm trigger in your law. Force companies that lost their information to tell us about it. Investigate overpriced credit monitoring. I have already talked about the fact that it is given for free to consumers, but it is something the committee should investigate and the CFPB has been looking into quite a bit, as well. Finally, Congress should investigate the over-collection of consumer information generally on the Internet by companies we don't even do business with--not only by our banks, and not only by the retailers with whom we do business. There are dozens if not hundreds of additional business-to-business companies collecting information about us that are not regulated. Thank you. [The prepared statement of Mr. Mierzwinski can be found on page 73 of the appendix.] Chairwoman Capito. Thank you very much, and I want to thank all of the witnesses. I will yield myself 5 minutes to begin the questioning. My first question is for Mr. Garcia. On the FS-ISAC, it is a sharing organization with the financial services community, are there now private entities who are in that--retailers and such that are a member of that community or is it mostly just financial services? Mr. Garcia. It is mostly financial services, although we do have a retailer member now and we include insurance companies, and payment processors. Any organizations that have--that essentially are regulated as financial institutions or have banking credit subsidiaries are eligible for membership in the FS-ISAC. Chairwoman Capito. Would, say, like a Target be eligible for membership to-- Mr. Garcia. Yes. And they are a member. Chairwoman Capito. And they are a member. Mr. Garcia. Yes. Chairwoman Capito. So are you going to encourage other retailers--because obviously this is where the--some of the breaches most recently have taken place-- Mr. Garcia. Absolutely. We have had a lot of conversations with the retail sector, and certainly Target's membership in the FS-ISAC, I think, serves as leadership and opportunity to bring on the broader retail sector, provided each individual organization is eligible for ISAC membership according to the regulatory status, as I mentioned. Chairwoman Capito. All right. Thank you. Mr. Fortney, you mentioned two different types of technologies, the EMV chip and the tokenization. Is anybody using the tokenization now in the United States with whom we would all be familiar? Mr. Fortney. Tokenization has been used in what I would call point-to-point or proprietary type of environments, but what is-- Chairwoman Capito. Give me an example of that. Mr. Fortney. So, an example would be that instead of using a true account number in a product that maybe one bank issues, instead embed a digital token. That has been done. Or individual merchants-- Chairwoman Capito. In financial transactions, not retail. Mr. Fortney. Correct. Chairwoman Capito. Okay. Mr. Fortney. What is new with this is really talking about it in terms of an open standard that could be used widely in which everyone agrees to the same rules-- Chairwoman Capito. Is anybody outside the United States using tokenization in a retail spectrum? Mr. Fortney. I believe the United States is ahead in this particular area, although there is a lot of interest for the technology globally, and some-- Chairwoman Capito. Okay. Mr. Fortney. For instance, some of the institutions in our owner base do operate globally. They have strong interest in using this technology across the globe. Chairwoman Capito. Okay. The EMV chip is used in Europe, correct? Mr. Fortney. That is correct. Chairwoman Capito. Okay. Now I think I read this or heard that Target--and I am using Target as an example, but it might not be the correct example--had originally looked at the EMV chip as one of the mechanisms that they would use and actually might have even used it at some point and then ceased using it. Is that correct? Mr. Fortney. I read the same thing, and I think it really goes to--it is really impossible for a single entity to introduce a new technology in payment with--and have impact without moving in tandem with a number of other retailers at the same time and the banks at the same time. Chairwoman Capito. Yes. I think in that same article it said that it was discontinued because of the ease of service at the checkout. It was holding people up for one reason or another. Anyway, yes, I was just curious about that. Mr. Leach, I know from our previous conversation when we talked about the EMV chip, it is not the be-all and end-all to solve these issues. Could you expound on that a little bit for us, please? Mr. Leach. Sure. I would be happy to do so. As you know, our PCI standards are applied in Europe already today, and so we are looking at ways that we can remove the exposure of card data. So in a chip transaction, mag-stripe transaction, the card information is still exposed. And as Mr. Noonan in the previous panel explained, you can take that information and create fraud in online, telephone order, and other channels. So our focus is on removing that card information completely from the merchant environment through tokenization, point-to-point encryption, and other means, so as soon as the customer puts their information into a point-of-sale terminal, it is removed, and it is no longer available to the criminal if they are able to get into that system. Chairwoman Capito. Okay. We have been talking a lot about cards, and one of the things I mentioned in my opening statement is my interest in mobile payments, and I don't think of those as cards, although they are attached to a card number. What about security around these? Is that something that is part of what you are looking at for standards, Mr. Leach? Mr. Leach. It is. And we think that this new, innovative technology--and there is actually going to be a press release on the framework next week on this--is very exciting. We think that by removing card data, we can actually improve the security of mobile transactions, as well. Chairwoman Capito. Okay. Thank you. Mr. Meeks? Mr. Meeks. Thank you, Madam Chairwoman. And let me, as a guy who is not tech-savvy at all, say that I appreciate your testimony. I guess I will start with Mr. Leach. Again, in trying to figure out what we can do as Members of Congress, there is currently no Federal law establishing security standards that merchants and data brokers are required to meet. My first question is, does this matter? And what is the appropriate role of the Federal Government, in your estimation, in setting a dynamic and effective security standard, and what should the private sector's role be? And then, in light of the recent breaches at major U.S. retailers, do the existing PCI standards need to be updated? Mr. Leach. I will start with the last question, because it is very interesting the timing of these breaches and our most recent update to the standards. Many of the actual incidents that are being reported in the media of how these criminals were able to get into these systems are actually already addressed in our PCI standards today. When these forensic investigations are completed, they typically provide a report of what PCI requirements have failed in those environments in order for a criminal to actually access and steal consumers' cardholder information. There is enforcement of our standards in the industry today. It is by contract, so it is a financial institution and their contractual relationships with their merchants is how we enforce in our industry today. For government involvement, I think the FS-ISAC and information-sharing so that we can take what we learn from these investigations and put that into our standards is where we need to have improvement. I think there has actually been in the last couple of years more engagement between the government and the private sector, and we encourage that to go forward. Mr. Meeks. Let me ask, I guess, Mr. Mierzwinski: You testified today, as you did before the Senate Banking Committee in early February, where you urged that we should not embrace any specific technology but use and encourage the users to use the highest existing standard to prevent by action of rules of existing players from blocking additional technological improvements and security innovations. And I am listening, and I am hearing, on one end, and if I get a chance, I will ask Mr. Fortney about tokenization and how that can become a large-scale viable--but could you please elaborate on some of the basic pros and cons of each smart chip card variation, keeping in mind the differences in cost and the susceptibility to fraud, and how any of the resulting fraud losses are divided between merchants and card issuers and consumers? Mr. Mierzwinski. Thank you, Congressman. Again, today is really the first time that I have heard the words ``open standards'' from the bank and card network industry. They may have talked about it in the past but I have understood the PCI standards body to be totally controlled by the banks and the card networks, and that has been harmful to innovation. Today, EMV is kind of a standard, but it has different levels of protection, and the card networks would like you to believe that they are moving toward something called ``chip and signature,'' and that is good enough. But chip and signature is designed by them to ride on the old signature-based platform. Anybody can forge a signature. Chip and PIN is a better solution. Tokenization is also a better solution to part of the problem. Online, using virtual account numbers for each transaction, is another part of the solution. So I think as long as we are developing standards in a truly open body where you can promote innovation, we are much better off. Mr. Meeks. Mr. Fortney, would you alter your answer at all? What is your opinion on the same question? Mr. Fortney. Yes, so, first of all, in the United States, as Mr. Mierzwinski points out, as the chip cards are introduced it is not necessarily going to be mandating a PIN. You can call it chip and choice, that there will be certain transactions that require a PIN just as they do today, such as an ATM machine or certain retailer transactions. Other transactions may be requiring the signature, and certainly underneath a certain dollar amount there may not be either of those. But regardless of all that, that chip card is fundamentally more secure than the mag-stripe card and is a big advance forward. Mr. Meeks. Thank you. Mr. Luetkemeyer [presiding]. Thank you. With that, I will yield myself 5 minutes. One of the things that is concerning to me is at this point, from what I understand, the banks normally are the ones left holding the bag normally whenever you have one of these breaches, and is there something, Mr. Leach, in the discussion with your group, to find a way to put some liability on the other--the merchant who didn't maybe have the latest technology or didn't exercise the greatest care with his data so that it was breached? Or am I wrong on that? Is there a sharing of liability there? Mr. Leach. The PCI Council is a technical standards body, so liability and all of the enforcement of our standards is managed through those banking relationships between the bank and the merchant. What we do is we try to remove that card information from ever being stored in a merchant location. We heard from other Congressmen earlier who recognize that security is a very hard thing to do day in and day out, and what we are trying to do, to the gentleman's point earlier about tokenization, is remove cardholder data from ever being exposed in merchant locations so there is no longer an ability for criminals to monetize that data. Mr. Luetkemeyer. Mr. Garcia, is there a movement to have higher standards for the merchants so that they share some of the liability there? Mr. Garcia. We discussed just this recent partnership consortium that has been established between the financial services sector and merchants and payment processors, and I think that is going to go a long way to sort of gaining a common understanding as to what are our respective vulnerabilities, our respective responsibilities, and how do we work together to stay ahead of the adversaries. Mr. Luetkemeyer. Okay. You made mention a while ago that there was a February agreement to that effect. Is that correct? Mr. Garcia. That is correct, February 13th. Mr. Luetkemeyer. Can you explain that just a little bit further? Mr. Garcia. There are about a dozen industry associations that are signatory to this. It is just in the beginning phases. It is a partnership that is based on the recognition that we all--this is a shared challenge and therefore a shared responsibility, and over the coming months we are going to be looking into what are the various initiatives and programs we can engage in together to think about not just new technological capabilities, but what are standards of practice? How do we interact among each other to have a more secure ecosystem for the commercial and retail financial environments? Mr. Luetkemeyer. Okay. Do you work with foreign countries, as well, foreign clearinghouses? Mr. Garcia. No, not that I am aware of at this point. It is U.S.-based. Mr. Luetkemeyer. Okay. With your chip technology changing-- or perhaps changing--where do you go with that when it comes to discussing it with merchants who--for instance, if I want to take a trip to Italy and now I want to use my credit card, how is that going to work if they don't have that same technology to be able to accept that card? This is going to have to be worldwide, I assume. Either Mr. Garcia or Mr. Fortney here? Mr. Fortney. You have hit upon an issue that has been out there for people who travel from country to country, and maybe the card technology they work in one country doesn't work fully in the other. There are a number of banks today that will issue cards that will work internationally, using EMV, and as the rest of the U.S. industry issues those cards over the next year or two, that problem should diminish greatly. Mr. Luetkemeyer. One of the problems that we have is with convenience comes more exposure, more risk, and that means more responsibility on an individual's part, too. Is there something an individual can do to protect his cards, his information better by the way he uses it? Mr. Fortney? Mr. Fortney. You are asking an interesting question because I don't really put a lot of the responsibility on the end user. The end user, when they are in a payments environment, they need to enter their card information in the way in order to get the purchase done. So I guess I would prefer to focus on what are ways that we can actually improve the system, get rid of these card numbers and live static information out of the system and protect the consumers in that way? Now, to further answer your question, sure there are some things that we all would agree are very bad practices, like if you have a PIN, don't write it on the back of your card, and if you are missing a card or you see a fraudulent transaction, report it promptly. I would encourage people to sign up for the mobile banking alerts that most financial institutions offer so that you have rapid information if your card has been used, and if you don't recognize that transaction, take quick action. Mr. Luetkemeyer. Does a consumer need to change his cards regularly? In other words, if I have a MasterCard, for instance, do I need to call the company and say, once every 6 months get a new card with new numbers and--is that a protection or is that just a waste of my time? Mr. Fortney. I don't think that is really necessary because if your card number were to be breached then your institution would most likely reissue that card. This really would be a tremendous hassle for a consumer to proactively go about asking for a new card. If you have reason to believe it has been breached, absolutely, but not just as a preventative measure. I wouldn't recommend that. Mr. Luetkemeyer. My wife, this past couple of weeks, has been in a different State, and as a result, she has used her credit card, and because it was a different State, immediately the credit card company, zam, they said, ``Hey, your card is being used in a different State. Is this what you want to--are you there or did somebody steal your card?'' It was very quick because the first transaction she did, immediately it was like that, the thing popped up on our e-mail and I was immediately notified to that effect. It was very helpful and it is nice to know that they are that quick to respond. So I guess that is another way that the companies are trying to prevent some folks from being abused with regards to that. Mr. Fortney. Yes, that is correct. And as you saw in your personal experience, many of the banks--really all of the banks now have this kind of fraud detection technology and they are looking for anything that is outside of the pattern. That can certainly create a hassle if you are traveling and it happens to you erroneously, but typically you can call and get that--verify the last transaction and the card gets opened up again for a full purchase. Mr. Luetkemeyer. Very good. Thank you. With that, we will move to the gentleman from Georgia, Mr. Scott. Mr. Scott. Thank you very much, Mr. Chairman. Certainly, first, I just want to commend Mr. Leach and the PCI. I think you guys are on the right track in lessening the available information out there for the bad guys to work with in the first place, and I encourage you to continue with that. But what really disturbs me about this hearing is that earlier I asked the Secret Service and Homeland Security why the United States was targeted, is there something other nations are doing that we are not doing, and their answer was not an accurate one, if I may say, and I want to address that. Because this is a serious problem and there is a reason why we are being targeted, and I want you all to respond to this. The Economist, in its February 15th article, said that America--this Nation, the United States--leads the world in payment card fraud. It is the only country in which counterfeit card fraud is consistently growing. In fact, the United States currently accounts for nearly half--47 percent--of all global payment card losses. It goes on to say, in part, that fraudsters target the United States because that is where the cards are. At the end of 2013 there were 1.2 billion debit, credit, and prepaid cards in circulation in America. That is over half of the 2 billion-- more than in any other region. That is nearly five cards per adult here. But America also makes things easy for fraudsters. Alone among developed countries, it still relies exclusively on cards with magnetic strips, which are far less secure than the chip and PIN technology used elsewhere. So clearly, the gentlemen with Homeland Security and the Secret Service are probably not aware of this. But now that we are aware of this, Mr. Mierzwinski, let me ask you, given this information from The Economist, given how big this issue is, let me ask you: What makes the United States payment card so vulnerable to fraud more than any other nation, and what is it that we do differently than other countries around the world regarding this? Mr. Mierzwinski. Mr. Scott, I think you answered the question already. I don't know how much I can add to it, but we are still using a 40- or 50-year-old magnetic stripe obsolete technology. We are now starting to move slowly toward chip and PIN, tokenization, virtual card numbers on the Internet, and other solutions that are going to be better. But the second thing that we do in this country is we aggressively rolled out debit cards to be used without PINs. When they were exclusively ATM cards they required a PIN, but the big card networks wanted them to ride along on their signature-based systems and so they said, ``Merchants and consumers, use the unsafe product on the signature-based system.'' So that is why we say, let's give consumers greater consumer protection when they use debit cards. And let's go back to encouraging the use of PIN-based networks. There are competitor PIN-based networks but the big banks don't want you to use them because they don't own them. Mr. Scott. I see. Let me ask you this, because I am anxious--and all of us on this committee are anxious--to see what we in Congress can do. So let me ask you, is there any reason why Congress shouldn't mandate that payment card security standards use the most effective technology in the marketplace? Mr. Mierzwinski. I agree with you on that completely, and I will leave it up to your legislative counsel to help draft it, but absolutely it should be a standard-based system that promotes the highest and most innovative standards. Mr. Scott. And so don't you feel--let me just ask you this: Why is it important, in your opinion--and others can comment on this as well--for Congress to improve debit ATM card consumer rights and make all plastic equal? Mr. Mierzwinski. Very simply, cards are not protected and your bank account is not protected, and that is a real problem for consumers. I believe that if the consumer rights were increased to the level of credit cards--I only use credit cards, by the way, on the Internet, and I only use credits cards at the store. It is the safer way to go. But if debit cards had higher consumer rights that would focus the mind of the banks on improving protections for those cards. Mr. Scott. And you also mentioned that if fraud victims are reimbursed at what you refer to as zero liability, is this zero liability policy ubiquitous among all credit card and debit card users? Mr. Mierzwinski. As far as I--zero liability is something that the debit card industry promotes. The credit card law maximizes our liability at $50, but with a debit card, you could lose all the money in your account under some circumstances. Mr. Scott. Okay. My-- Mr. Mierzwinski. But as far as I know, all the card companies do use zero liability but some have more asterisks, more exceptions. Mr. Scott. And so my final point is, because I think the American people--I think this is a problem of soaring magnitude, and we are going to be in trouble if we don't get a handle on this. We in Congress, there is no national directive here, so I just want to ask each of you, do you feel that the most important thing we can do right now is this national breach legislation that we have been talking about, that we have a national standard, or do you see just leaving it at the State level--the various State levels, this hodge-podge that we have? Mr. Mierzwinski. If you are starting with me, I have already testified that I think that we don't really need a national standard, but if you do establish one--because a good, smart company can just comply with the strongest State law, but if we are going to focus on that as part of the solution, just don't preempt the States. Go to a high, good national standard. You won't need to preempt the States. Mr. Scott. Okay. Anyone else? Mr. Fortney. Yes. We would support a national standard. We just think the most efficient way to deal with these sorts of threats is to be consistent and provide standard consumer protection versus a haphazard, State-by-State approach. Mr. Scott. Yes. Mr. Garcia? Mr. Garcia. Yes. I would agree with that. I think if you have 40-plus State laws that differ in various respects as to what are the requirements for breach notification, it doesn't necessarily improve consumer protection to have multiple different forms of communication, and to the extent that you can standardize that kind of communication to the consumer base nationally, I think that would be more effective and less costly. Mr. Scott. Okay. Thank you. Mr. Leach, would you-- Mr. Leach. Consistency is good. Again, we need to find ways to get after these bad guys and remove the monetization of card data, period. Mr. Scott. Okay. Thank you very much, Mr. Chairman. I appreciate the extra time. Mr. Luetkemeyer. Thank you. I just have one follow-up question here, and then I think we are done for the day and we will let you guys go. We have seen in the last year or so a number of breaches, and my concern is, how many more are yet to come? And as a result of that, when are we going to get some action taken to stop this? And so if you could answer those two questions succinctly here, we will start with Mr. Mierzwinski? Mr. Mierzwinski. I apologize-- Mr. Luetkemeyer. I guess the question is, how susceptible are we to further breaches, and then where are we going to be 5 years from now? Are we going to take action? Mr. Mierzwinski. I think that further breaches are going to occur. I just saw Brian Krebs who is tweeting that--he is the guy who broke the Target story; he is a cyber journalist, I guess--that there was another breach today of a beauty company. And so, there will be continued breaches. The question is, what do we do about them? Five years from now, I predict we are going to have a much more sophisticated system. There is innovation coming from phone companies, coming from Internet companies, coming from alternatives. It is going to force the banks to do a better job. Mr. Luetkemeyer. Mr. Fortney? Mr. Fortney. I would agree with most of that. I think it is not just on the banks, however. It is really on the banks and the merchants and everyone to work together to introduce these new technologies. It can't be done from one side. Mr. Luetkemeyer. Mr. Garcia? Mr. Garcia. Asking when we are going to stop cyber attacks is tantamount to asking when we are going to stop crime. It is an ongoing challenge. As long as there is technological innovation, there is technological innovation on the side of criminals as well, finding ways to exploit that. So, as I mentioned before, it isn't just about technology, but it is about your practices and your information-sharing and your collaboration. We are all in this together and no single one of us is as smart as all of us combined, and that is really what the FS-ISAC is here to talk about today is how we collaborate when those technological solutions aren't going to fully protect us, but what can we do together as a team. Mr. Luetkemeyer. I guess the follow-up to you would be, okay, we recognize we have a problem. Your group is one who tries to solve a problem. Are you going to kick it into another gear to get this done ASAP? Mr. Garcia. As a matter of fact, we have initiated a new program that tries to automate--that does automate our intelligence and information-sharing and incident response, because as we know, many cyber attacks happen at Internet speed, and as long as we are operating at human speed, we are one step behind. So we have invested quite a lot of resources-- FS-ISAC and its membership--in developing--in automated tools using standardized language for how we characterize threats and attacks such that the front-line cyber operators and analysts who are protecting our systems are able to make decisions in a more real-time way and take action in a more real-time way against those threats and attacks. Mr. Luetkemeyer. Very good. Mr. Leach? Mr. Leach. I would say we can't address 2014 threats with 2004 controls. We need to remove the legacy systems that we have--and part of that is legacy business process and educating merchants that there is no longer a need to store cardholder information beyond the point of getting an authorization. I think with the legacy systems that we have today, there is opportunity for us to improve. You asked about what we will see in about 5 years. I see us no longer having these value card information for criminals to attack. That is where I hope we are going to be in 5 years. Mr. Luetkemeyer. I thank each of the witnesses for being here today. As you can see, we are very concerned on this side of the table with regards to the privacy of information and the privacy of financial transactions that take place with our consumers and our constituents and the people of this country. And so, we want to work with you. If you can continue to work with us to point out places where we can be of help, we certainly want to look for that. And again, I thank the chairwoman for the opportunity to have this hearing. The Chair notes that some Members may have additional questions for this panel, which they may wish to submit in writing. Without objection, the hearing record will remain open for 5 legislative days for Members to submit written questions to these witnesses and to place their responses in the record. Also, without objection, Members will have 5 legislative days to submit extraneous materials to the Chair for inclusion in the record. With that, hearing is adjourned. [Whereupon, at 1:09 p.m., the hearing was adjourned.] A P P E N D I X March 5, 2014 [GRAPHIC] [TIFF OMITTED] T8530.001 [GRAPHIC] [TIFF OMITTED] T8530.002 [GRAPHIC] [TIFF OMITTED] T8530.003 [GRAPHIC] [TIFF OMITTED] T8530.004 [GRAPHIC] [TIFF OMITTED] T8530.005 [GRAPHIC] [TIFF OMITTED] T8530.006 [GRAPHIC] [TIFF OMITTED] T8530.007 [GRAPHIC] [TIFF OMITTED] T8530.008 [GRAPHIC] [TIFF OMITTED] T8530.009 [GRAPHIC] [TIFF OMITTED] T8530.010 [GRAPHIC] [TIFF OMITTED] T8530.011 [GRAPHIC] [TIFF OMITTED] T8530.012 [GRAPHIC] [TIFF OMITTED] T8530.013 [GRAPHIC] [TIFF OMITTED] T8530.014 [GRAPHIC] [TIFF OMITTED] T8530.015 [GRAPHIC] [TIFF OMITTED] T8530.016 [GRAPHIC] [TIFF OMITTED] T8530.017 [GRAPHIC] [TIFF OMITTED] T8530.018 [GRAPHIC] [TIFF OMITTED] T8530.019 [GRAPHIC] [TIFF OMITTED] T8530.020 [GRAPHIC] [TIFF OMITTED] T8530.021 [GRAPHIC] [TIFF OMITTED] T8530.022 [GRAPHIC] [TIFF OMITTED] T8530.023 [GRAPHIC] [TIFF OMITTED] T8530.024 [GRAPHIC] [TIFF OMITTED] T8530.025 [GRAPHIC] [TIFF OMITTED] T8530.026 [GRAPHIC] [TIFF OMITTED] T8530.027 [GRAPHIC] [TIFF OMITTED] T8530.028 [GRAPHIC] [TIFF OMITTED] T8530.029 [GRAPHIC] [TIFF OMITTED] T8530.030 [GRAPHIC] [TIFF OMITTED] T8530.031 [GRAPHIC] [TIFF OMITTED] T8530.032 [GRAPHIC] [TIFF OMITTED] T8530.033 [GRAPHIC] [TIFF OMITTED] T8530.034 [GRAPHIC] [TIFF OMITTED] T8530.035 [GRAPHIC] [TIFF OMITTED] T8530.036 [GRAPHIC] [TIFF OMITTED] T8530.037 [GRAPHIC] [TIFF OMITTED] T8530.038 [GRAPHIC] [TIFF OMITTED] T8530.039 [GRAPHIC] [TIFF OMITTED] T8530.040 [GRAPHIC] [TIFF OMITTED] T8530.041 [GRAPHIC] [TIFF OMITTED] T8530.042 [GRAPHIC] [TIFF OMITTED] T8530.043 [GRAPHIC] [TIFF OMITTED] T8530.044 [GRAPHIC] [TIFF OMITTED] T8530.045 [GRAPHIC] [TIFF OMITTED] T8530.046 [GRAPHIC] [TIFF OMITTED] T8530.047 [GRAPHIC] [TIFF OMITTED] T8530.048 [GRAPHIC] [TIFF OMITTED] T8530.049 [GRAPHIC] [TIFF OMITTED] T8530.050 [GRAPHIC] [TIFF OMITTED] T8530.051 [GRAPHIC] [TIFF OMITTED] T8530.052 [GRAPHIC] [TIFF OMITTED] T8530.053 [GRAPHIC] [TIFF OMITTED] T8530.054 [GRAPHIC] [TIFF OMITTED] T8530.055 [GRAPHIC] [TIFF OMITTED] T8530.056 [GRAPHIC] [TIFF OMITTED] T8530.057 [GRAPHIC] [TIFF OMITTED] T8530.058 [GRAPHIC] [TIFF OMITTED] T8530.059 [GRAPHIC] [TIFF OMITTED] T8530.060 [GRAPHIC] [TIFF OMITTED] T8530.061 [GRAPHIC] [TIFF OMITTED] T8530.062 [GRAPHIC] [TIFF OMITTED] T8530.063 [GRAPHIC] [TIFF OMITTED] T8530.064 [GRAPHIC] [TIFF OMITTED] T8530.065 [GRAPHIC] [TIFF OMITTED] T8530.066 [GRAPHIC] [TIFF OMITTED] T8530.067 [GRAPHIC] [TIFF OMITTED] T8530.068 [GRAPHIC] [TIFF OMITTED] T8530.069 [GRAPHIC] [TIFF OMITTED] T8530.070 [GRAPHIC] [TIFF OMITTED] T8530.071 [GRAPHIC] [TIFF OMITTED] T8530.072 [GRAPHIC] [TIFF OMITTED] T8530.073 [GRAPHIC] [TIFF OMITTED] T8530.074 [GRAPHIC] [TIFF OMITTED] T8530.075 [GRAPHIC] [TIFF OMITTED] T8530.076 [GRAPHIC] [TIFF OMITTED] T8530.077 [GRAPHIC] [TIFF OMITTED] T8530.078 [GRAPHIC] [TIFF OMITTED] T8530.079 [GRAPHIC] [TIFF OMITTED] T8530.080 [GRAPHIC] [TIFF OMITTED] T8530.081 [GRAPHIC] [TIFF OMITTED] T8530.082 [GRAPHIC] [TIFF OMITTED] T8530.083 [GRAPHIC] [TIFF OMITTED] T8530.084 [GRAPHIC] [TIFF OMITTED] T8530.085 [GRAPHIC] [TIFF OMITTED] T8530.086 [GRAPHIC] [TIFF OMITTED] T8530.087 [GRAPHIC] [TIFF OMITTED] T8530.088 [GRAPHIC] [TIFF OMITTED] T8530.089 [GRAPHIC] [TIFF OMITTED] T8530.090 [GRAPHIC] [TIFF OMITTED] T8530.091 [GRAPHIC] [TIFF OMITTED] T8530.092 [GRAPHIC] [TIFF OMITTED] T8530.093