[House Hearing, 114 Congress]
[From the U.S. Government Publishing Office]


                FDIC DATA BREACHES: CAN AMERICANS TRUST
                       THAT THEIR PRIVATE BANKING
                         INFORMATION IS SECURE?

=======================================================================

                                HEARING

                               BEFORE THE

                       SUBCOMMITTEE ON OVERSIGHT

              COMMITTEE ON SCIENCE, SPACE, AND TECHNOLOGY
                        HOUSE OF REPRESENTATIVES

                    ONE HUNDRED FOURTEENTH CONGRESS

                             SECOND SESSION

                               __________

                              May 12, 2016

                               __________

                           Serial No. 114-77

                               __________

 Printed for the use of the Committee on Science, Space, and Technology
 
 [GRAPHIC NOT AVAILABLE IN TIFF FORMAT]


       Available via the World Wide Web: http://science.house.gov

                                __________
                                
                     
                     U.S. GOVERNMENT PUBLISHING OFFICE
20-874PDF                     WASHINGTON : 2017                     
_____________________________________________________________________________________
For sale by the Superintendent of Documents, U.S. Government Publishing Office, 
http://bookstore.gpo.gov. For more information, contact the GPO Customer Contact Center, 
U.S. Government Publishing Office. Phone 202�09512�091800, or 866�09512�091800 (toll-free). 
E-mail, [email protected].  
             
              
              
              COMMITTEE ON SCIENCE, SPACE, AND TECHNOLOGY

                   HON. LAMAR S. SMITH, Texas, Chair
FRANK D. LUCAS, Oklahoma             EDDIE BERNICE JOHNSON, Texas
F. JAMES SENSENBRENNER, JR.,         ZOE LOFGREN, California
    Wisconsin                        DANIEL LIPINSKI, Illinois
DANA ROHRABACHER, California         DONNA F. EDWARDS, Maryland
RANDY NEUGEBAUER, Texas              SUZANNE BONAMICI, Oregon
MICHAEL T. McCAUL, Texas             ERIC SWALWELL, California
MO BROOKS, Alabama                   ALAN GRAYSON, Florida
RANDY HULTGREN, Illinois             AMI BERA, California
BILL POSEY, Florida                  ELIZABETH H. ESTY, Connecticut
THOMAS MASSIE, Kentucky              MARC A. VEASEY, Texas
JIM BRIDENSTINE, Oklahoma            KATHERINE M. CLARK, Massachusetts
RANDY K. WEBER, Texas                DON S. BEYER, JR., Virginia
JOHN R. MOOLENAAR, Michigan          ED PERLMUTTER, Colorado
STEVE KNIGHT, California             PAUL TONKO, New York
BRIAN BABIN, Texas                   MARK TAKANO, California
BRUCE WESTERMAN, Arkansas            BILL FOSTER, Illinois
BARBARA COMSTOCK, Virginia
GARY PALMER, Alabama
BARRY LOUDERMILK, Georgia
RALPH LEE ABRAHAM, Louisiana
DARIN LaHOOD, Illinois
                                 ------                                

                       Subcommittee on Oversight

                 HON. BARRY LOUDERMILK, Georgia, Chair
F. JAMES SENSENBRENNER, JR.,         DON BEYER, Virginia
    Wisconsin                        ALAN GRAYSON, Florida
BILL POSEY, Florida                  ZOE LOFGREN, California
THOMAS MASSIE, Kentucky              EDDIE BERNICE JOHNSON, Texas
DARIN LaHOOD, Illinois
LAMAR S. SMITH, Texas
                            C O N T E N T S

                              May 12, 2016

                                                                   Page
Witness List.....................................................     2

Hearing Charter..................................................     3

                           Opening Statements

Statement by Representative Barry Loudermilk, Chairman, 
  Subcommittee on Oversight, Committee on Science, Space, and 
  Technology, U.S. House of Representatives......................     5
    Written Statement............................................     7

Statement submitted by Representative Donald S. Beyer, Jr., 
  Ranking Minority Member, Subcommittee on Oversight, Committee 
  on Science, Space, and Technology, U.S. House of 
  Representatives................................................    13
    Written Statement............................................    15

Statement by Representative Lamar S. Smith, Chairman, Committee 
  on Science, Space, and Technology, U.S. House of 
  Representatives................................................    17
    Written Statement............................................    19

Statement by Representative Eddie Bernice Johnson, Ranking 
  Member, Committee on Science, Space, and Technology, U.S. House 
  of Representatives.............................................    26
    Written Statement............................................    28

                               Witnesses:

Mr. Lawrence Gross, Jr., Chief Information Officer and Chief 
  Privacy Officer, FDIC
    Oral Statement...............................................    30
    Written Statement............................................    32

Mr. Fred W. Gibson, Acting Inspector General, FDIC
    Oral Statement...............................................    36
    Written Statement............................................    38
Discussion.......................................................    47

             Appendix I: Answers to Post-Hearing Questions

Mr. Lawrence Gross, Jr., Chief Information Officer and Chief 
  Privacy Officer, FDIC..........................................    70

Mr. Fred W. Gibson, Acting Inspector General, FDIC...............    72

            Appendix II: Additional Material for the Record

Documents submitted by Representative Darin LaHood, Subcommittee 
  on Oversight, Committee on Science, Space, and Technology, U.S. 
  House of Representatives.......................................    78

 
                   FDIC DATA BREACHES: CAN AMERICANS
                   TRUST THAT THEIR PRIVATE BANKING      
                       INFORMATION IS SECURE?

                              ----------                              


                         THURSDAY, MAY 12, 2016

                  House of Representatives,
                  Subcommittee on Oversight
               Committee on Science, Space, and Technology,
                                                   Washington, D.C.

    The Subcommittee met, pursuant to call, at 10:04 a.m., in 
Room 2318 of the Rayburn House Office Building, Hon. Barry 
Loudermilk [Chairman of the Subcommittee] presiding.
[GRAPHICS NOT AVAILABLE IN TIFF FORMAT]

    Chairman Loudermilk. The Subcommittee on Oversight will 
come to order.
    Without objection, the Chair is authorized to declare a 
recess of the Subcommittee at any time.
    Welcome to today's hearing entitled ``FDIC Data Breaches: 
Can Americans Trust That Their Private Banking Information is 
Secure?''
    I recognize myself for five minutes for an opening 
statement.
    Good morning. We're here today to learn more about 
cybersecurity breaches at the Federal Deposit Insurance 
Corporation. As a former information systems technology company 
owner for over 20 years, I know firsthand the importance of 
safeguarding sensitive information and private customer data. 
Regrettably, the American people have good reason to question 
whether their private banking information is properly secured 
by the FDIC.
    The FDIC is an independent agency established by Congress, 
with the mission ``to maintain stability and public confidence 
in the nation's financial system.'' Unfortunately, the FDIC is 
failing to live up to its mission of maintaining public 
confidence in the Nation's financial system because the Agency 
is failing to safeguard private banking information for 
millions of Americans who rely on FDIC.
    During the Committee's current investigation, it has become 
clear that FDIC has a long history of cybersecurity incidents. 
According to information obtained by the Committee, in 2011, a 
foreign government hacked into the workstations of the former 
FDIC Chairman and other senior officials. It appears that this 
entity had access to senior officials' workstations for at 
least one year before the FDIC took remedial action.
    More recently, in letters dated February 26, 2016, and 
March 18, 2016, FDIC notified the Science Committee of two 
major security incidents. This notification to the Committee 
was required in accordance with the Federal Information 
Security Modernization Act of 2014, otherwise known as FISMA, 
and Office of Management and Budget guidelines that require 
executive branch departments and agencies to report major 
security incidents to Congress within seven days.
    The security breach reported in FDIC's February 26 letter 
to the Committee involved an FDIC employee who copied sensitive 
personally identifiable information, or PII, over 10,000 
individuals onto a portable storage device prior to separating 
from employment at the FDIC. The employee also downloaded 
suspicious activity reports, bank currency transaction reports, 
customer data reports and a small subset of personal work and 
tax files. This security incident is particularly troublesome, 
given that the FDIC did not ultimately recover the portable 
storage device from the former employee until nearly two months 
after the device was removed from FDIC premises.
    Further, according to the information obtained by the 
Committee, the FDIC did not report the incident to Congress 
within the seven-day time period as required by FISMA. In fact, 
FDIC waited for over four months to report the incident to 
Congress and only did so after being prompted by the FDIC 
Office of Inspector General.
    Just as troubling, FDIC continues to maintain that the 
employee ``accidently'' copied sensitive and proprietary 
information to a portable storage device, despite the fact that 
the employee initially told the agency that she ``would never 
do such a thing,'' and even denied ever owning a portable 
storage device. Ultimately, she retained legal counsel, who 
engaged in protracted negotiations with the agency for the 
return of the device.
    The second security breach reported to the Committee was on 
March 18, 2016, involved a disgruntled FDIC employee who 
obtained sensitive data for over 44,000 individuals prior to 
separating from employment at the agency. When the employee 
left the FDIC on February 26, 2016, the employee took the 
storage device from the premises. Upon learning of the incident 
three days later, FDIC personnel worked to recover the device. 
The device was ultimately recovered on March 1, 2016. According 
to the FDIC, this was just another case of an employee 
``accidently'' leaving the agency with sensitive information.
    This week, FDIC retroactively reported five additional 
major breaches to the Committee. In one of those instances, an 
employee retired from FDIC and took three portable storage 
devices containing over 49,000 individuals' personal data. In 
total, over 160,000 individuals have recently been a victim of 
having their personal information leave the FDIC by 
``accident.'' To date, FDIC has failed to notify any of those 
individuals that their private information may have been 
compromised.
    According to the FDIC, none of the 160,000 individuals has 
anything to worry about because all of the FDIC employees who 
improperly walked out of the agency with sensitive information 
were required to sign affidavits stating the information was 
not disseminated. At best, this is a misleading statement 
because apparently all employees who are separating from the 
FDIC are generally required to sign an exit document attesting 
that they have not removed any FDIC materials from the 
premises. In the recent breaches reported to this Committee, 
all employees who improperly took the data should have already 
signed exit documents before ever leaving the agency.
    It is Congress's responsibility to shine a light on FDIC's 
history of cybersecurity breaches. The Committee will continue 
its oversight of FDIC failures to secure Americans' sensitive 
information from apparent foreign entities and disgruntled FDIC 
employees.
    I thank the witnesses for being here today and sincerely 
hope that we are able to get answers from the FDIC here this 
morning.
    [The prepared statement of Chairman Loudermilk follows:]
    [GRAPHICS NOT AVAILABLE IN TIFF FORMAT]
    
    Chairman Loudermilk. With that, I recognize the Ranking 
Member for his opening statement.
    Mr. Beyer. Thank you, Chairman Loudermilk, and I appreciate 
your extensive detailing of these breaches.
    Defending against cyber threats is a persistent and 
evolving battle, and the cyber hazards that confront the public 
and private sectors come in various forms. Hackers can and have 
wreaked havoc on Hollywood studios, global financial 
institutions, retail outlets, and public agencies alike, and no 
one seems immune from the various cyber threats that touch 
virtually everyone.
    Please forgive a certain amount of redundancy in my 
statement. It's important that we have both parties on record 
here.
    In case of the Federal Deposit Insurance Corporation, they 
suffered from seven major cyber incidents in the past 7 months, 
and these breaches include plugging removable media such as a 
USB drive into an FDIC computer and removing thousands of 
sensitive financial and other records from the agency as 
employees walked out the door. We'll be focusing on two of 
these breaches today, as well as the FDIC's cybersecurity 
practices.
    I'm glad the FDIC has installed new software that allowed 
them to identify these recent breaches and respond to them. 
Without that technology, known as data loss prevention tool, 
these incidents, whether inadvertent or intentional, would have 
gone unnoticed and unaddressed, and we in Congress would have 
remained uninformed. And I believe the FDIC Chairman has taken 
some positive steps in the wake of these breaches, phasing out 
the use of removable media such as flash drives and CDs that 
pose increased security risks.
    However, I, along with our Chairman, do have questions 
about why there was such a long delay in notifying Congress 
about major cyber incidents, particularly the one that occurred 
last October and was not reported to Congress until February 
26, 2016. And in that instance, it took a memo from the FDIC 
Inspector General's Office to the FDIC CIO reminding the agency 
that they had an obligation to report the incident to Congress.
    I would add that the IG was not the only one suggesting the 
FDIC notify Congress of the incident. It's my understanding 
that other FDIC employees had also recommended reporting this 
to Congress earlier.
    In addition, I believe that the new OMB guidance on federal 
information security and privacy management requirements, as 
detailed in the OMB memo 16-03 last October, is very clear. If 
it takes 8 hours or more to recover sensitive data that 
comprises 10,000 or more records or affects 10,000 or more 
people, it is considered a major cyber incident.
    Under these guidelines, once an agency is aware that a 
breach meets that criteria, the incident should be considered a 
major breach and must be reported to Congress within 7 days. 
This did not happen in either of the two cases this hearing 
will focus on or the other five that the FDIC just reported to 
the Committee this week, and I'm still unclear why.
    In the October incident, the breach included records from 
eight banks, more than 40,000 individuals, and 30,000 entities, 
including the sensitive bank currency transaction reports and 
Social Security numbers. Despite the OMB requirement that 
agencies inform Congress of major incidents within 7 days, FDIC 
notified Congress nearly 3 months after it had enough data to 
determine that this was a major breach.
    I hope that Mr. Gross, the Chief Information Officer at 
FDIC, can help explain FDIC's decision to delay notifying 
Congress in that October incident, and I hope also that you'll 
be able to help us understand the agency's characterization of 
the incident, which appears to be at odds with some of the 
information obtained by the Committee. I know the Inspector 
General has looked at the October incident and the FDIC's 
response, so I look forward to Mr. Gibson's testimony as well.
    As a business owner, we have a very important 
responsibility to protect our customer data, which includes 
Social Security numbers, cell phones, emails, personal 
addresses, and we do all we can to protect them, especially 
when an employee leaves, because we know that this has value to 
the employee in a different role. And we're just a business. 
We're not the government controlling these really sensitive 
government records. So this is a very important issue.
    And, Mr. Gross, I understand you just arrived at the FDIC 
in November, and the CIO's office has suffered from a lack of 
consistent leadership. You're the fourth CIO in the last four 
years. I hope that you'll be able to bring some stability to 
this office, and equally important is I hope that you'll help 
us establish a solid foundation of reliability and openness 
with Congress and that you'll strive to do that as well.
    So thank you both for being with us today, and we look 
forward to the questioning.
    Mr. Chairman, I yield back.
    [The prepared statement of Mr. Beyer follows:]
    [GRAPHICS NOT AVAILABLE IN TIFF FORMAT]
    
    Chairman Loudermilk. Thank you, Mr. Beyer.
    I now recognize the Chairman of the Full Committee, the 
gentleman from Texas, Mr. Smith.
    Chairman Smith. Thank you, Mr. Chairman. And I appreciate 
both your comments and the Ranking Member's comments as well.
    The recent cybersecurity breaches experienced by the FDIC 
date back to October 2015 and compromise nearly 160,000 
individuals' sensitive information or personally identifiable 
information. The number of individuals whose information was 
compromised by the agency's poor cybersecurity posture could be 
much higher. The breaches reported to Congress represent only 
those that the agency itself called ``major.'' In reality, the 
FDIC likely has experienced additional breaches deemed 
insufficient by the agency to warrant reporting to Congress.
    On April 8, 2016, the Committee sent a letter to the FDIC 
about a February 2016 cyber breach. In that case, more than 
44,000 individuals' sensitive information was breached. Less 
than two weeks later, the Committee sent an additional letter 
to the FDIC concerning an earlier breach in October 2015, which 
compromised more than 10,000 individuals' sensitive 
information. The Committee sent the additional letter to the 
FDIC because the FDIC withheld reporting the breach to Congress 
for more than four months. In fact, the FDIC only reported the 
breach once the Office of Inspector General urged it to do so.
    The FDIC's attempts to shield information from Congress did 
not end with its hesitation to report the significant October 
breach. The Committee has encountered a pattern of obstruction 
from the FDIC when responding to Committee requests.
    In the FDIC's response to the Committee's letters, the 
agency initially produced documents extensively redacted for 
information the agency deemed to be confidential. These 
redactions included public information, such as the names of 
senior-level agency employees, whose identities were already 
known to the Committee.
    The FDIC failed to provide statutory authority or a valid 
privilege for redacting the information. Still, the agency 
resisted the Committee's request for unredacted documents until 
faced with the threat of the Committee's use of the compulsory 
process to obtain the information.
    Additionally, the Committee learned that the agency 
actively obstructed the Committee's ongoing investigation by 
limiting the scope of documents produced in response to the 
Committee's requests. The FDIC responded to the Committee's 
second letter and certified that it produced all responsive 
documents. However, subsequent discussions with the Office of 
Inspector General indicated that responsive documents were 
withheld by the agency.
    Upon learning of the agency's active obstruction, the 
Committee wrote to the Office of Inspector General to request 
these documents. If not for the Office of Inspector General's 
openness and transparency with the Committee, we would not have 
been aware of the Agency's attempts to avoid providing a full 
and complete response to the Committee.
    The FDIC's repeated efforts to conceal information from 
Congress are inexcusable. They raise significant questions 
about whether the Agency actively attempts to hide potentially 
incriminating information from Congress. As an agency that has 
faced repeated security breaches, it should focus its resources 
on reforming its internal cybersecurity mechanisms instead of 
engaging in efforts to conceal information from this Committee.
    The Committee will continue to investigate the shortfalls 
in the FDIC's cybersecurity posture and why the Agency 
continues to withhold certain information from Congress and 
this Committee. We also will hear what measures the Agency 
should take to remediate the damage to the tens of thousands of 
Americans' whose information was compromised.
    So, Mr. Chairman, we have a lot to learn this morning and 
look forward to the testimony of our two witnesses, and I yield 
back.
    [The prepared statement of Chairman Smith follows:]
    [GRAPHICS NOT AVAILABLE IN TIFF FORMAT]
    
    Chairman Loudermilk. The gentleman yields back.
    I now recognize the Ranking Member of the Full Committee 
for a statement.
    Ms. Johnson. Thank you very much, Chairman Loudermilk, and 
thanks to you, our witnesses, for being here today.
    All data breaches that expose sensitive personal 
information should be taken very seriously. In today's digital 
age, our sensitive personal data is everywhere. When we swipe 
our credit cards at the grocery store, renew our driver's 
license at the Department of Motor Vehicles and passports at 
the Department of State, or visit the emergency room at the 
local hospital or the bank around the corner, our sensitive, 
personal, and financial data is processed, stored, and 
entrusted to those entities to safeguard it and ensure that it 
is not inadvertently breached or intentionally stolen.
    But that has happened seven times in the past 7 months in 
major cyber breaches at the Federal Deposit Insurance 
Corporation. None of these breaches were the result of 
sophisticated hackers, foreign adversaries, or cyber criminals. 
And those that downloaded this data, including Social Security 
numbers and suspicious activity reports, did not use high-tech 
digital tools. They simply plugged in their thumb drives and 
other removable media to their FDIC workstations in that office 
and downloaded sensitive, personal, and financial data onto 
their personal storage devices. These actions jeopardized the 
data security of thousands of individuals, multiple banks, and 
potentially criminal investigations.
    In virtually every--each of these seven instances the FDIC 
has said the sensitive data was inadvertently downloaded and 
that there was no malicious intent. In all of these cases the 
FDIC was able to recover the data, and the former FDIC 
employees signed affidavits saying they had not shared the data 
with others.
    However, in at least one case, according to FDIC's own 
records, a former employee who downloaded such data was evasive 
about her actions and not cooperative when initially confronted 
by FDIC staff. Some FDIC employees also suggest that it was 
highly improbable that this former employee's actions were 
accidental.
    In addition, this former employee is now working for a U.S. 
subsidiary of a non-U.S. financial services company, which 
raises additional concerns. I would remind FDIC that in 2013 an 
Inspector General review of another much more serious cyber 
accident at the agency resulted in one senior official in the 
CIO's office leaving the agency and another being demoted.
    My understanding is that this response by these former 
officials to both the Chairman of the FDIC and the IG's office 
and the Government Accountability Office lacked candor in both 
of their descriptions of the extent of this penetration and 
potential consequences to the agency.
    I hope IG's office will be able to clarify whether or not 
all of the recent data breaches were inadvertent, as the FDIC 
has claimed, when his office completes the two audits they are 
currently working on regarding FDIC's handling of major 
cybersecurity incidences in the coming weeks. I also hope that 
the IG's office can shed some light on the reasons why the 
office of the Chief Information Officer and the FDIC failed to 
inform Congress of these major incidences within the 7-day time 
frame required by the guidance from the Office of Management 
and Budget and that issued in the late October 2015.
    I believe that FDIC has already taken some positive steps 
in responding to the recent data breaches, phasing out the use 
of removable media, for instance. I encourage them to continue 
to ensure that sensitive data is not intentionally or 
inadvertently breached, but I would also request that the new 
CIO, Mr. Lawrence Gross, who is testifying with us today, to 
keep Congress appropriately and fully informed in a timely 
manner when major cybersecurity incidences do occur.
    I thank you, Mr. Chairman, and my time's expired. I yield 
back.
    [The prepared statement of Ms. Johnson follows:]
    [GRAPHICS NOT AVAILABLE IN TIFF FORMAT]
    
    Chairman Loudermilk. I thank the lady. She has yielded 
back.
    Now, let me introduce our witnesses for today. Our first 
witness is Mr. Fred Gibson, acting Inspector General of the 
Federal Deposit Insurance Corporation. Mr. Gibson has 
previously served with the Resolution Trust Corporation Office 
of Inspector General and as Principal Deputy Inspector General 
and counsel to the Inspector General.
    Mr. Gibson received his bachelor's degree in history from 
the University of Texas at Austin and his master's degree in 
Russian Area Studies from Georgetown University. He received 
his J.D. from the University of Texas Law School.
    Our second witness today is Mr. Lawrence Gross?
    Chairman Loudermilk. Gross. Mr. Lawrence Gross, Jr., Chief 
Information Officer and Chief Privacy Officer of the Federal 
Deposit Insurance Corporation. Mr. Gross previously served as 
the CIO for the U.S. Department of Agriculture, Farm Service 
Agency and the Deputy CIO at the Department of the Interior.
    Mr. Gross received his bachelor's degree in information 
systems management from the University of Maryland, University 
College, and he received his CIO certification from the 
National Defense University.
    I now recognize Mr. Gibson for five minutes to present his 
testimony.

             TESTIMONY OF MR. LAWRENCE GROSS, JR.,

                   CHIEF INFORMATION OFFICER

                AND CHIEF PRIVACY OFFICER, FDIC

    Mr. Gibson. Thank you, sir.
    Chairman Smith, Ranking Member Johnson, Chairman 
Loudermilk, Ranking Member Beyer, and Members of the 
Subcommittee, my name is Fred Gibson, and I'm the acting 
Inspector General of the Federal Deposit Insurance Corporation. 
Thank you for the invitation to speak with the Subcommittee 
today regarding recent cybersecurity incidents at the Federal 
Deposit Insurance Corporation.
    The Federal Government has seen a marked increase in the 
number of information security incidents affecting the 
integrity, confidentiality, and availability of government 
information, systems, and services. The charter for this 
hearing is to address two specific security interests and 
concerns that this Committee has regarding the FDIC's 
cybersecurity posture.
    The FDIC's Office of Inspector General carries out two 
primary functions. The first is to audit and evaluate the 
FDIC's programs and operations, including controls designed to 
safeguard the Corporation's data and address and report 
breaches when they occur. The second function is to investigate 
suspected criminal activity, including breach incidents where 
case-specific facts lead us to believe that a crime may have 
occurred.
    With respect to our first role, we are currently conducting 
two audits pertinent to the Committee's concerns that we 
anticipate will be completed in the near future. The first 
examines the FDIC's process for identifying and reporting major 
security incidents, as required by applicable federal law and 
related guidance. The second audit addresses the FDIC's 
controls for mitigating the risk of an unauthorized release of 
sensitive information submitted by systemically important 
financial institutions.
    As you are aware, on February 19, 2016, during the planning 
phase of the first of these audits, we issued a memorandum to 
the FDIC's Chief Information Officer regarding a specific 
security incident which we believe warranted Congressional 
reporting. In the memorandum the OIG concluded that the 
Corporation was required under the Federal Information Security 
Modernization Act of 2014 and related guidance issued by the 
Office of Management and Budget--and that's OMB Memorandum 16-
03--to report the security breach as a major incident to the 
appropriate Congressional committees. Ultimately, the FDIC 
reported the major incident to this Committee, which led 
ultimately to our testimony today.
    With respect to our criminal investigative function, the 
FDIC OIG participates as a non-voting member on the FDIC's Data 
Breach Management Team, or DBMT, for situational awareness 
purposes. The DBMT, as its name implies, reviews data breach 
incidents. Where the facts of a particular incident, which we 
learn through our participation in the DBMT or from other 
sources, appear to point to a crime having been committed, we 
open an investigation. If the results of our investigation 
warrant, we make referrals to the Department of Justice. I can 
confirm the existence of one criminal investigation arising out 
of the incidents that formed the basis for today's hearing. 
However, that case is open. It's in a pre-indictment phase, 
which limits my ability to discuss it directly.
    Nevertheless, I hope to be able to provide you with the 
information that you need to conduct your oversight activities 
with regard to these issues, and I look forward to answering 
the questions that the Committee has. Thank you very much.
    [The prepared statement of Mr. Gibson follows:]
    [GRAPHICS NOT AVAILABLE IN TIFF FORMAT]
    
    Chairman Loudermilk. I now recognize Mr. Gross for his 
opening statement.

                TESTIMONY OF MR. FRED W. GIBSON,

                 ACTING INSPECTOR GENERAL, FDIC

    Mr. Gross. Chairman Loudermilk, Ranking Member Beyer, and 
Members of the Subcommittee, thank you for the opportunity to 
appear before you today.
    At the FDIC, protecting sensitive information is critical 
to our mission of maintaining stability and public confidence 
in the Nation's financial system, and we are continually 
enhancing our information security program.
    My name is Lawrence Gross, and I am FDIC's Chief 
Information Officer and Chief Privacy Officer. I assumed my 
duties at the FDIC in November of 2015, and I have more than 39 
years of combined military and federal sector experience in the 
information technology, law enforcement, cybersecurity, and 
critical infrastructure fields. My testimony today will focus 
on our program to identify, analyze, report, and remediate 
incidents based on the risk of harm they pose.
    The FDIC has a strong information security program to 
identify events that could signal a data security incident, 
including mandatory annual training for all employees and 
contractors to ensure that they will be alert to inadequate 
protection of sensitive information and know when and how to 
notify our Computer Security Incident Response Team.
    We also have automated monitoring tools, including the data 
loss prevention tool, which scans for sensitive information in 
outgoing emails, uploads to Web sites, and any data downloaded 
to portable media from FDIC systems. Our goal is to assess and 
continually improve our situational awareness so that we can 
reduce and ultimately eliminate the risk of harm to individuals 
and entities.
    The FDIC has a security incident response and escalation 
plan to ensure the systemic gathering and analyzing of facts 
relevant to an event to determine the risk of harm and the 
taking of appropriate action. We then take steps to mitigate 
the risk of harm and complete the appropriate reporting and 
notifications based on the risk of harm.
    With the passage of FISMA in late 2014 and the subsequent 
issuance in October of OMB guidance on what constitutes a major 
incident, we have further refined our incident reporting 
regime. Notably, the new law and OMB's guidance have been 
applied to incidents over the past 6 months where FDIC 
employees departed employment and were identified by our 
monitoring tools as having downloaded personally identifiable 
information or other FDIC-sensitive information on portable 
media not long before their departure.
    It was my initial judgment, based on several factors, that 
these incidents did not rise to the level of major incident as 
defined in the OMB guidance. In each case, the employee had 
legitimate access to the sensitive data in question while at 
the FDIC. Further, our analysis indicated the downloading of 
the PII was inadvertent. The FDIC recovered the data from the 
former employees, and there was no evidence that the former 
employee had disseminated the data. And all the former 
employees assigned affidavits affirming they had not 
disseminated the data beyond themselves.
    Lastly, in each case, the circumstances surrounding the 
employees' departure were non-adversarial. Under these 
circumstances, I judged the risk of harm to be very low, 
meaning that the reporting of these incidents would fall under 
the annual FISMA-notification-to-Congress requirement.
    However, our Office of Inspector General reviewed one of 
these incidents and came to a different conclusion. Although 
our interpretations are different, we nevertheless gave such 
notification to Congress within seven days, and I further 
directed my staff to go back through all incidents that had 
occurred since issuance of the OMB guidance, regardless if they 
were closed, to identify any incidents that had characteristics 
we thought would meet the OIG's interpretation of major 
incident. FDIC has now reported those as well to Congress.
    Finally, let me touch on changes we have made or are making 
to lower the risk of future incidents. We've implemented a plan 
to eliminate the ability of employees and contractors to 
download to portable media. We're implementing digital rights 
management software that prevents copying of information. 
Further, I've directed my staff to begin immediately a top-to-
bottom review of IT policies and procedures with the focus on 
those for departing employees to ensure that everyone 
understands FDIC policy regarding downloading of data. Also, I 
will be engaging an independent third party to conduct an end-
to-end assessment of all the key areas of the IT security and 
privacy programs.
    The global interconnected landscape continues to evolve, 
and the threats continue to develop. The FDIC takes very 
seriously cybersecurity incident management and transparency as 
it relates to our reporting requirements and remains committed 
to maintaining a robust IT security program that ensures a 
real-time current view of our situational awareness.
    Thank you again for the opportunity to testify, and I would 
be happy to answer any of your questions.
    [The prepared statement of Mr. Gross follows:]
    [GRAPHICS NOT AVAILABLE IN TIFF FORMAT]
    
    Chairman Loudermilk. I thank the witnesses for their 
testimony.
    And just before we begin our questions, for the witnesses 
and the Members of the Committee, it is the Chair's intention 
to be somewhat lenient with the clock because it is important 
that we do get these questions answered and as many rounds of 
questioning as we need. The Chair is ready to extend this 
hearing as long as we need to make sure that all the questions 
are adequately answered.
    And also to our witnesses, we ask that you be very 
truthful, as well as comprehensive, but also we have had 
incidents of filibustering answers. And again, the Chair will 
maintain the Subcommittee going as long as we need to, to make 
sure. So we ask that you be as accurate and as brief with your 
answer.
    I now recognize myself for five minutes for questioning.
    Mr. Gross, this Committee wrote the FDIC requesting 
documents and communications referring or relating to the 
security breaches we discussed here today. Are you aware of 
those letters?
    Mr. Gross. I am.
    Chairman Loudermilk. The FDIC has certified that all 
responsive documents pursuant to this Committee's request had 
been produced. Is that your understanding as of today?
    Mr. Gross. I believe the office has been responsive to your 
inquiries, sir, yes.
    Chairman Loudermilk. Mr. Gross, did anyone in your office, 
to your knowledge, voice any concern regarding the manner, 
scope, or have any other concerns about the FDIC's response to 
this Committee's request?
    Mr. Gross. No one in my office had any concern with being 
responsive----
    Chairman Loudermilk. No one expressed any concerns about 
the documents you were providing?
    Mr. Gross. No one in my office expressed any concerns, sir.
    Chairman Loudermilk. What about other offices, anyone in 
the FDIC express concerns about the comprehensiveness of the 
investigation or the documents you're providing?
    Mr. Gross. I'm not aware of anyone expressing any concerns.
    Chairman Loudermilk. No one in the FDIC. Mr. Gross, are you 
aware of any internal FDIC documents responsive to the 
Committee's request that were not produced to this Committee?
    Mr. Gross. I'm not aware of any that have not been 
provided, sir.
    Chairman Loudermilk. Mr. Gibson, to your knowledge, were 
all responsive documents produced to this Committee?
    Mr. Gibson. Sir, was that direction--was that question----
    Chairman Loudermilk. I'm sorry. Yes, I'm sorry. Mr. Gibson, 
that was directed to you. I was looking at Mr. Gross. Sorry.
    Mr. Gibson, to your knowledge, were all responsive 
documents produced to this Committee?
    Mr. Gibson. Sir, we haven't reviewed the FDIC's production 
of documents to the Committee. We received a request from the 
Committee for FDIC documents that were in our possession, and 
we provided the documents that we collected in the context of 
our audit.
    Chairman Loudermilk. Okay. So, Mr. Gross, just to summarize 
and make sure we understand, to your knowledge, you provided 
all the documents that were responsive to the Committee's 
request?
    Mr. Gross. To my knowledge, sir, we were responsive to the 
request. If there's a request for additional information, I'll 
stand ready to provide that.
    Chairman Loudermilk. Okay. Thank you.
    Mr. Gross, what I have here is the stack of documents that 
the FDIC provided to the Committee in response to our inquiry. 
This stack of documents, however--I may need a forklift. This 
stack of documents was provided to the Committee by the 
Inspector General's Office. Why were these documents not 
provided to the Committee by the FDIC?
    Mr. Gross. I had an opportunity to review the material 
provided by the IG, and in reviewing that material, a lot of it 
is duplicative, so the material that you received from us with 
the incident response forms that are in there, it includes 
information that has been duplicated in the IG's response. The 
incident response forms provide a summary of the incident, and 
it's--it may in fact provide a more comprehensive review of 
each of the incidents more so than what's in the documents.
    I did note that there were several copies of what we call 
our Data Breach Management Guide that was included in the 
material provided by the Inspector General, and there were 
multiple copies of that. That document is still currently being 
developed and in review.
    Chairman Loudermilk. So let me make sure I understand what 
your statement here is today, that everything that you provided 
is also covered in the IG's? There's no more information in 
what the IG provided to us than what is covered in this stack 
of documents here?
    Mr. Gross. I can----
    Chairman Loudermilk. Is that what you're telling me?
    Mr. Gross. I cannot make that as an affirmative statement, 
sir. I had a brief opportunity to review the IG's material 
yesterday----
    Chairman Loudermilk. Okay.
    Mr. Gross. --so I cannot say that it's a one-to-one 
correlation.
    Chairman Loudermilk. Well, you were saying it was 
duplicative----
    Mr. Gross. I said----
    Chairman Loudermilk. --but----
    Mr. Gross. --quite a bit of the material that was in there 
was duplicative. There was multiple copies, for example, of the 
Data Breach Management Guide. There are multiple copies of that 
guide provided in their response to you.
    Chairman Loudermilk. Okay. There are many emails that were 
provided to us by the IG that were not included in your 
documents. Those are not duplicative.
    Mr. Gross. I cannot speak to that without looking at the 
exact emails, but what we have in the incident response summary 
might be--well, I would think it's an encapsulation of what may 
be contained in emails that were transmitted between different 
entities that participated on the DBMT.
    Chairman Loudermilk. Okay. Okay. But you did say that you 
had reviewed the materials----
    Mr. Gross. I did----
    Chairman Loudermilk. --provided----
    Mr. Gross. I did a cursory review.
    Chairman Loudermilk. A cursory review----
    Mr. Gross. Yes.
    Chairman Loudermilk. --but you have not looked at them. 
When were these--Mr. Gibson, when were these documents 
provided?
    Mr. Gibson. Sir, I believe they were provided at ten 
o'clock yesterday morning.
    Chairman Loudermilk. Okay. Has Mr. Gross received copies of 
these documents?
    Mr. Gibson. Yes, sir. We provided a copy of our--I don't 
know if Mr. Gross personally has. We provided a copy of our 
production to the Congress to the FDIC so they would be aware 
of what we did.
    Chairman Loudermilk. And when was that provided?
    Mr. Gibson. At the same time we provided it to the 
Committee.
    Chairman Loudermilk. So ten o'clock yesterday morning?
    Mr. Gibson. Yes, sir, about ten o'clock.
    Chairman Loudermilk. Okay. Allow me to clear my desk for a 
moment here. Okay.
    So, Mr. Gross, you still stand by that--your previous 
testimony that you did provide this Committee all the documents 
that we requested?
    Mr. Gross. That wasn't my statement, sir. I said I believe 
we were responsive to your request. If there is additional 
documents that you think are necessary or required, I stand 
ready to deliver that.
    Chairman Loudermilk. Okay. So you're acknowledging that 
there may not be some documents that we requested that the 
FDIC----
    Mr. Gross. I believe----
    Chairman Loudermilk. --failed to provide us?
    Mr. Gross. I believe our response to you was responsive. If 
there's other material or additional material that you deem 
that's warranted, I stand ready to provide that.
    Chairman Loudermilk. So you will provide every document 
that we request?
    Mr. Gross. If there's a request for additional information, 
we stand ready to provide that.
    Chairman Loudermilk. Okay. Well, we requested the 
information the IG has actually provided as well. We're just 
asking for it to be comprehensive and all-inclusive.
    And so who's responsible for providing the documents in 
response to the Committee's request?
    Mr. Gross. When your letter came in and when the letter 
came in for the information, that's sent to each of the offices 
that may have relevant information. Each of those offices then 
provide that information. It's a--there's a coordination effort 
that's done by our Office of Legal Affairs, and then it's put 
together as a comprehensive package for submission.
    Chairman Loudermilk. Were any directions--to your 
knowledge, were any directions given to withhold or not provide 
certain documents to this Committee?
    Mr. Gross. No, sir.
    Chairman Loudermilk. To your knowledge, was anyone in your 
office or the legal division directed to limit the response to 
the Committee's request?
    Mr. Gross. I'm not aware of anyone making such a statement 
or providing any such direction.
    Chairman Loudermilk. I do have other questions, but I have 
run over the clock. I was a little more lenient with myself 
than I intended to be. I do have more questions. The Chair's 
intention is to do a second round of questioning.
    And so at this time I recognize the Ranking Member, Mr. 
Beyer.
    Mr. Beyer. Thank you, Mr. Chairman. And thanks again to the 
witnesses.
    Mr. Gross, are you aware--to follow up on Chairman 
Loudermilk's questions--of any documents requested by the 
Committee that you have not submitted yet?
    Mr. Gross. No, sir, I'm not aware of any.
    Mr. Beyer. So at this point if anything's missing, you'd be 
happy to provide it?
    Mr. Gross. Yes, sir, I will.
    Mr. Beyer. And I hope--are you willing to have your--you 
and your staff carefully go through Mr. Gibson's documents to 
make sure that anything he provided that you didn't that you 
affirm its value or its legitimacy? I'm trying to get--you 
pointed out that one reason the stack of documents are so 
different was there's many duplications, things provided again 
and again in Mr. Gibson's documents. I think what the Chairman 
is concerned about is, is there anything Mr. Gibson provided 
that you didn't?
    Mr. Gross. I understand. I can go through the material and 
review that and provide you any additional information that you 
may need or want. I haven't had a full opportunity to review 
the material, as he's indicated. I received it at 10 o'clock 
yesterday.
    Mr. Beyer. So we're 24 hours away. So--but you're willing 
to do the reconciliation?
    Mr. Gross. Yes, sir, I am.
    Mr. Beyer. Great. Great.
    The employee in the October breach reportedly left the FDIC 
on good terms. She was seeking new employment at the time, and 
she currently works for a foreign financial firm. Furthermore, 
she initially denied that she had downloaded the information. 
She resisted turning over the device to the FDIC, and we 
understand she was having personal problems at home, she was 
going through a divorce, she was living in a hotel room. All 
these factors highlight increased security risks, not 
mitigating factors, especially as outlined by the FBI and the 
U.S. counterintelligence community, as this brochure ``The 
Insider Threat'' details.
    Were these facts known by the Data Breach Management Team 
when the incident was being analyzed for risk of harm?
    Mr. Gross. All the circumstances surrounding the incident 
was known by the Data Breach Management Team. I'd like to even 
go back further and state that we--personally, I make a 
concerted effort to be very transparent in all the activities 
that we have within the security realm. This incident, when it 
occurred, it actually occurred prior to the promulgation of the 
OMB guidance, so it was in fact reported in 2015 in our annual 
FISMA report.
    It was my encouragement to the staff that we knew that the 
policy had come out as we were reviewing this incident, and I 
asked that they apply the standard of the policy to the 
incident. So we fully understood the circumstances surrounding 
it, yes, and we applied the standard to the incident to ensure 
that we were being responsive. But it had already been reported 
as part of our FISMA submission.
    Mr. Beyer. Okay. So let me break these up. On the one hand, 
you're arguing that the 7-day didn't apply because the OMB 
guidance didn't come out until January, but the greater concern 
is whether it was low risk, moderate risk, or high risk. And we 
know that this person had gone to work for a foreign bank, had 
initially denied downloading, refused to turn over the drive, 
and was going through a lot of personal problems. Don't all 
those elevate the sense of risk that your--the breach team 
would consider and that you would consider as CIO?
    Mr. Gross. I considered all the factors associated with the 
incident. We weighed all the factors. But I would say even if 
an individual leaves their employment with the Federal 
Government, we leave with not only potentially material that on 
removable media, we leave with corporate knowledge. And we 
still trust that the individuals leaving federal service is 
going to protect not only that digital media that they may 
take, but the corporate information they may take in their 
head. So that had to be weighed as to what risk of harm did the 
information that this individual inadvertently download pose.
    And yes, we considered what type of employment she may have 
been seeking outside the organization and other factors, and we 
deemed that the incident was in fact low.
    Mr. Beyer. In your testimony on page 4 you talk about that 
your initial judgment in all these incidents didn't rise to the 
level of the major incident as defined by OMB guidelines. But 
the OMB guidelines talked about 8 hours to restore the data, 
more than 10,000 records affected. Weren't more than 10,000 
records affected in virtually every one of these cases?
    Mr. Gross. Yes, sir, they were. Several of these incidents 
just barely met the threshold that we just retroactively 
reported.
    I think the larger issue is not only does the policy say 
that there's time-specific parameters for reporting, but it 
also says in the very end of the document that it's left to the 
discretion of the agency to determine if in fact the agency has 
sufficient information to determine if the incident rises to 
the level of a major. That was considered as part of the review 
of the policy and the incident.
    Mr. Beyer. I don't want to harp on this too much, but 
you'll forgive us if there's a certain amount of skepticism of 
seven different people downloading information just as they're 
leaving that affects more than 10,000 records, and none of them 
seem to rise to the level of major incident.
    Mr. Gross. Well, it's--in--from my perspective it's not a 
question of whether or not we're going to report. The agency 
has no relief in reporting. The issue that we were looking at 
was what was the time frame that the reporting was required. If 
there's a 7-day notification or a 30-day notification or if 
it's included in the annual FISMA report, you'll find that the 
FDIC is very responsive. And if you review our FISMA report, 
you will find that we report all incidents. There is no 
incidents not reported.
    Mr. Beyer. One more question right on this part of it. You 
said that in each of these cases the downloading was 
inadvertent.
    Mr. Gross. Yes, sir.
    Mr. Beyer. Once again, I have a hard time understanding how 
you could inadvertently download 10,000 customer records or 
bank records.
    Mr. Gross. The individuals involved in these incidents were 
not computer proficient. We have policies in place that will 
allow the FDIC IT staff to assist you when you're departing the 
organization to copy down things that you may have collected 
over your long tenure with the agency, specifically, 
photographs or your personal resume.
    The fact that they were not computer proficient, if you go 
in and you don't copy the material and do it as a targeted 
copying of that information, you could in fact inadvertently 
copy the entire hard drive. So if you insert and you do the 
copy and not being proficient in the technology, you may take 
more data than what you intended.
    Mr. Beyer. I would certainly hope as you--you talked about 
the many steps going forward. I think a major step going 
forward would be to make sure that all that personal 
information isn't on their computers and that there isn't a way 
to download an entire--I just--I'm glad you're making progress 
because all of this sort of boggles the mind that somebody 
could go in and download an entire disc or all the information 
that the FDIC has on record about companies and individuals.
    Mr. Gross. Well, sir, I arrived at FDIC in November. As you 
see from my resume, I've been in federal service to this 
country for 39--actually, it'll be 40 years in July. I'm an IT 
professional, and there were several areas that I focused on 
immediately upon arriving, one of which was removable mobile 
media, as well as the elimination of the need for being able to 
do that as a common business practice.
    Mr. Beyer. Great. Great. Well, thank you very much, Mr. 
Gross. Mr. Chairman, I yield back.
    Chairman Loudermilk. Thank you, Mr. Beyer.
    Being 30 years in the IT world, I find it very 
disheartening that you give someone who is not computer 
proficient access to such sensitive data. Maybe someone will 
address that.
    I now recognize Mr. Posey, the gentleman from Florida.
    Mr. Posey. Thank you very much, Mr. Chairman.
    Mr. Gross, you and I are just viewing this incident from 
completely different perspectives. You make it sound like this 
is a very friendly termination from an employee, she 
accidentally took personal information about 160,000 or more 
citizens, and then gladly gave it back, just for one example. 
And the staff kind of tells me it didn't really work out that 
way all the time, that there was some defiance there, some 
refusal.
    You mentioned there was no evidence that she kept any of 
the information. Actually, there's no evidence that she didn't 
keep the information. One went to work for a foreign financial 
institution that could benefit greatly from mining that kind of 
data, we know that.
    And, you know, I'm amused by the term--the whole issue. We 
call it a data breach. You know, where I'm from we'd call it a 
theft. If you take something that's not yours, that's called a 
theft. We don't call it a data breach back home. Maybe just 
because we're talking about electronic records, we're no longer 
going to call it a theft, we're going to call it a data breach. 
But the fact is tens of thousands of American citizens are 
compromised because of this.
    And my question for you, Mr. Gibson, in your testimony you 
stated that ``If the threshold for criminal investigation is 
not met, the responsibility lies with the FDIC to pursue the 
civil and administrative remedies.'' Could you expound upon 
what these remedies could potentially be? Surely there will be 
clear punitive measures for the perpetrators of such a breach. 
Are there--any of these former employees currently on 
administrative leave, getting a full paycheck, receiving a 
pension like the IRS people were? There needs to be 
consequences for these actions.
    Mr. Gibson. Sir, as a former employee, they're not on 
payroll, and I do not believe that any of these individuals 
have retired or are receiving pensions, but I don't know for 
sure. I believe that they all left for other employment 
opportunities in other places.
    With respect to the FDIC's remedies, both administratively 
and civilly, the FDIC can pursue the return of information. The 
FDIC could take actions to enjoin an individual from using, 
disseminating, taking any action with respect to that 
information. The FDIC could undertake administrative actions 
within the FDIC in order to tighten up its security protocols 
or other situations. There's a number of things they can do in 
the absence of criminal activity, and that's what I'm really 
referring to.
    Mr. Posey. Okay. But just on a practical basis, you know, 
somebody walks into a retail store without the owner's 
permission and steals 160,000 items, the store owner comes back 
and figures out somebody stole this, went to them, they say, 
oh, okay, well, I'll give you back these particular items is 
all I'm going to admit that I accidentally took from your 
store. That doesn't eliminate the fact that there was a theft 
from the store just because they gave back at least some of the 
items that they illegally took. Do you see any similarity to 
the example I'm drawing and what happened here?
    Mr. Gibson. Well, sir, I understand the example that you're 
using, and I would agree in that particular situation. I mean, 
the fact that somebody robs a bank and gives the money back 
doesn't mean that they didn't rob the bank. That's absolutely 
right.
    For us to pursue a criminal case, however, one of the 
things that we're going to have to be able to establish in 
connection with our case is specific intent on that person's 
part. If the material was removed inadvertently, which is the 
FDIC's conclusion with respect to that, we have a bar right up 
front to being able to pursue a criminal case in the face of 
that determination. I'm not saying that we can't, but we're 
going to need some facts that get us over that and allow us to 
be able to pursue that sort of a case.
    Mr. Posey. Have you exhausted the questioning of the people 
involved? Have they voluntarily come forth? Do you need to 
depose them? Are you in a position to--you could depose them 
and ask the kind of questions you'd like to see answers to and 
I'd like to see answers to?
    Mr. Gibson. Sir, we--when we conduct a criminal 
investigation, we do so when we have probable cause to believe 
that there's been a crime that's been committed. Prior to that 
time, we conduct something called an inquiry. And the methods 
that we use in conducting that are somewhat less intrusive than 
the methods that we would use to conduct an investigation.
    When information comes to us where we are able to open an 
investigation, we do. And in one of these cases, we have. If 
additional information were to come forward to us that would 
enable us to open a case, we certainly would be asking those 
questions. We try and develop it as best we can, and that's the 
way in which we're pursuing it.
    Mr. Posey. Thank you for your frank answers. I see my time 
is up. I thank you, Mr. Chairman.
    Chairman Loudermilk. The Chair recognizes the gentlewoman 
from California, Ms. Lofgren.
    Ms. Lofgren. Thank you, Mr. Chairman.
    I understand from your testimony that in some instances the 
Data Breach Management Team recommends that individuals or 
financial institutions be notified of the breach of personally 
identifiable information and then credit monitoring can be 
offered and that that has not been done in this case or in the 
five other major breaches. Mr. Gross, can you explain why that 
hasn't happened, what was the thinking here, and are 
individuals adequately protected without this credit monitoring 
opportunity?
    Mr. Gross. We evaluated each of the cases and determined 
because there was low risk of harm that there were no 
individuals that were affected or impacted adversely as a 
result of the downloading of the information. So as a result of 
the lack of impact to the individuals, it was deemed that 
credit monitoring was not warranted.
    We have in other cases where the information has been taken 
and we know it was a known adversary or someone with adverse 
intent where they may break in an employee's car and steal 
records, we know that that individual had ill intent by 
breaking in the car. That information, regardless of the number 
of records that may have been exposed, in those cases we would 
have offered credit monitoring, as we've done in the past.
    Ms. Lofgren. But we don't have digital rights management on 
these files at this point, do we?
    Mr. Gross. We don't have digital rights management deployed 
across the FDIC at this moment. It is one of the 60-day 
response activities that I've laid out for the IG.
    Ms. Lofgren. So we don't know for sure whether this 
information that was taken was not in fact further copied 
because there was no DRM to prevent it?
    Mr. Gross. Well, we have the signed affidavit from the 
employees a----
    Ms. Lofgren. Right.
    Mr. Gross. --and each of these employees----
    Ms. Lofgren. Well, technologically, we have no assurance of 
that?
    Mr. Gross. Technologically, no, ma'am.
    Ms. Lofgren. I'm interested in the DRM response that you're 
recommending. I'm interested in what is the timeline. And also, 
did you--what process was used to determine what DRM response 
would be--did you do an RFP, was it sole-source, did you do 
market research? How did you select which DRM solution and 
what's the timeline for implementation?
    Mr. Gross. I'm working very aggressively to implement it. 
This is something that we're just beginning to pursue. I don't 
have the specifics for you at this moment. I could come back to 
you with a more detailed plan.
    Ms. Lofgren. Oh, so you haven't actually begun that?
    Mr. Gross. We have begun the process of identifying the 
technology from the standpoint that we think that the right 
tool for protecting the data is DRM. What solution set and the 
timeline for implementing it, we have not identified that as 
yet. We've looked at two technologies. We didn't put that in 
the report. We didn't want to advocate for any specific vendor, 
but we are looking at two right now as the potential tools that 
we would employ.
    Ms. Lofgren. Well, I'm interested in whether you might 
conduct a pilot with different offerings. I mean, this is an 
important decision for the agency.
    Mr. Gross. Absolutely, it is. And one of the things that we 
have to look at is we want to make sure that we don't break the 
business, that means we have to do this focused on the data 
that is the most sensitive and work our way out. So yes, we are 
not going to do this as a wholesale change across the 
organization because it's--not only do we have to evaluate if 
there's any internal impact, we have to evaluate is this going 
to create an impact with the businesses that we have to work 
with in the conduct of the mission.
    Ms. Lofgren. Just a final note, I was interested in your 
comment that employees that are leaving are permitted to 
download their personal information on their computer. And my 
suggestion would be there shouldn't be any personal information 
on the government computer.
    You know, people do dumb things. I--we once had a young 
person who downloaded BearShare who migrated all kinds of 
sensitive information unwittingly. You should create 
technological barriers to doing that, and if someone manages to 
subvert that, they should lose their personal information.
    I'm just sort of interested in what technological methods 
have you deployed to prevent the migration of potentially 
harmful data from outside of your system.
    Mr. Gross. Ma'am, I've arrived at FDIC in November, and I 
can assure you that there are several things that we've already 
begun to implement, but there are several other things that 
we'll be looking at implement going forward.
    One of the messages to my staff is that security is not 
something that we bolt on after the fact. It's something that 
we include as part of the process from implementation moving 
toward. So I've identified a number of things in the 60-day 
plan, but I can assure you that those are immediate actions 
that we need to take because of these incidents that we've 
seen, but there are others that I'm fully looking to employ 
based on the years of experience knowing that it's about 
protecting the data and that we do have individuals that may do 
things mistakenly and we have to manage that. But we also have 
to manage for external adversarial threats as well. So I can 
assure you this is just the beginning of some of the things 
that will be implementing.
    Ms. Lofgren. I see my time is expired, Mr. Chair.
    Chairman Loudermilk. The Chair recognizes the gentleman 
from Illinois, Mr. LaHood.
    Mr. LaHood. Thank you, Mr. Chairman. And I want to thank 
the witnesses for being here today.
    I would just say at the outset, it is troubling to me to 
hear your response to Mr. Beyer's questions, almost a 
dismissive nature of these breaches and kind of the nonchalant 
answers that you've given, particularly with the backdrop of 
cyber attacks on this country.
    We hear every week in this Committee about the 
cybersecurity and how, at the highest levels of our government 
and in the private sector, computers are compromised every 
single day. And you look at--whether it's Chinese entities or 
Russian mob or domestic enterprises in the United States, I 
don't think anybody has any confidence that we have this under 
control. And it leads to a lot of uncertainty about how we 
tackle this issue.
    And so when I hear about an agency, the FDIC, and the 
information that you control, it's concerning to me that you 
don't highlight this as an important breach and further 
investigation to find out what's at stake here. That's really 
concerning to me to hear that today.
    Let me ask some specific questions here. Mr. Gross, in your 
opening statement you state that the downloading of the 
personal identifiable information in all the breaches FDIC 
reported to Congress was ``inadvertent'' and ``non-
adversarial.'' Is that accurate?
    Mr. Gross. That's correct, sir.
    Mr. LaHood. I want to direct your attention to Exhibit one, 
which is a document sent by the FDIC legal department to one of 
the former FDIC employees who left the agency with unauthorized 
materials on a portable storage device. According to this 
document, which is dated December 2, 2015, when asked about her 
actions, she said ``she would never do such a thing.'' And that 
it would be against FDIC policy and that she knows the policy. 
When asked if she owns an external hard drive, she said she did 
not know what an external hard drive is. And she stated that 
``in any event, she does not own such a device.''
    Now, Mr. Gross, do you stand by your statement that this 
person is non-adversarial?
    Mr. Gross. Sir, if I could, one, I'd like to draw the scale 
because in your opening comment you mentioned the difference 
between the current incidents and if we had a third-party bad 
actor in our system. And I don't want to be dismissive. Any 
loss of information, regardless of how that information is 
lost, is significant. It's important, and we need to pay 
attention to it.
    I think what we have to do is to draw to scale, though, the 
different incidents that we have. If there was a third-party 
actor in my system today, the way the policy is currently 
constructed, unless that third-party has taken an amount of 
records, it may not meet the criteria of a major, but I can 
assure you, if there was a bad actor in our system today, it 
would be reported as a major, especially if I know that they're 
adversarial in nature and they intend to do harm to the 
organization or the agency. I could care less if they were 
reading the menu for the FDIC. If it's a bad actor and they're 
in our system today, it is reported, and it falls into the 
major category.
    These incidents where we had employees that left had 
multiple years of faithful service to the FDIC. These are 
different circumstances.
    Mr. LaHood. I understand that, Mr. Gross. My specific 
question that I asked you, I--the exhibit that's up there, I 
mean, do you stand by the statement that this person is non-
adversarial?
    Mr. Gross. I do. And let me give some context. When the 
employee departs the FDIC, they sign a document indicating that 
they have not taken any information with them. When we go back 
to that employee and we have proof, because of our DLP 
capabilities, that in fact they have downloaded information, at 
that instance that conversation is an employee who now realized 
I've made a mistake. And as a result of that, that relationship 
has to be managed from the standpoint of a trusted employee who 
now realizes that they inadvertently took information, and now 
they're caught misrepresenting the truth.
    So I do stand by that from the standpoint is I believe that 
the employee inadvertently took the material and now they find 
themselves in an awkward situation where their closing 
statement doesn't match the actual facts.
    Mr. LaHood. Yes. Well, I understand your statement, what 
you're saying there. I mean, this is not a foolproof system. It 
clearly is not. And the nature of the world we live in now with 
cyber attacks and foreign entities and what's out there, that's 
what's, I guess, concerning about the protocol that you went 
through here.
    Let me follow up. So was she telling the truth when she 
said ``she would never do such a thing''?
    Mr. Gross. I believe she, on the surface, was telling the 
truth, but I don't think she really understood that she had 
taken--one, I think she realized she took her personal data. I 
don't believe she realized she took FDIC-specific data. And in 
each of these cases, these are all referred to the IG's office. 
Every one of these cases we had asked the IG if they were going 
to investigate the case. The response we received is that there 
was no criminal activity; therefore, it did not warrant any 
further action on their part.
    Mr. LaHood. Mr. Gibson, let me ask you. Do you agree with 
Mr. Gross that this person was non-adversarial?
    Mr. Gibson. So I really need to take a look at this set of 
facts. Offhand, I'd say that there are different 
interpretations of these facts. Non-adversarial, I mean, it 
seems to me that you could interpret these facts to suggest 
that she is adversarial. You could certainly interpret these 
facts to suggest that she's being less than candid or truthful.
    Mr. LaHood. And so you don't necessarily agree with that 
statement and they have a different opinion, is that fair to 
say?
    Mr. Gibson. Sir, I don't agree with that statement, and I 
may have a different opinion.
    Mr. LaHood. I see my time is expired. Let me just ask 
another question here.
    I'm going to refer to Exhibit number two. Mr. Gross, this 
is an email dated April 28, 2016, to you from the acting Chief 
Information Security Officer at the FDIC. The message says, 
``We were notified of the $10,000 record count of these 
incidences on April 27, so the seven-day reporting requirement 
will be on May 4, 2016.'' Mr. Gross, what incidents is the 
acting Chief Information Security Officer referring to?
    Mr. Gross. I'm not really sure from just looking at this 
document, but I believe what he's talking about are one of the 
incidents that we retroactively went back and looked at.
    Mr. LaHood. And you understood the seven-day reporting 
period, correct?
    Mr. Gross. Actually, this may have been an incident that 
was reviewed by the DBMT and already deemed as closed. Without 
actually looking closer at the document and getting the other 
information, I'm not sure of that. But we went back 
retroactively, and some of the incidents that we reported, they 
had already been reviewed by the DBMT and it had been deemed a 
breach but a low-risk breach.
    Mr. LaHood. Did you report the incident to Congress by May 
4, as required by the law?
    Mr. Gross. I don't know if this incident was reported by 
May 4. I believe it was reported in the recent report where we 
provided five different incidents to the Congress.
    Mr. LaHood. Yes. I mean, in looking at what the--
information I have, it was not reported within the seven days, 
and actually, it appears on May 9 it was reported, so it was 
outside of that window. Do you disagree with that?
    Mr. Gross. I don't agree or disagree without looking at--
but I believe this was included in the report for all of the 
incidents. My question would be is was this incident previously 
closed by the DBMT and deemed as a low-risk? So therefore, the 
seven-day clock would have actually started long before we 
completed the record count. It would have been back when the 
incident may have been initially reviewed.
    Mr. LaHood. Well, when I look at this document, it looks 
like this--I mean, clearly, in that quote that I sent to you, 
you're notified of the incidents on April 27 and told that it 
has to be done by May 4. It appears that it's outside that 
window. I guess it just as a follow-up, Mr. Gibson, should 
incidents such as this that we're discussing today be reported 
to Congress within a timely manner?
    Mr. Gibson. Sir, I think that when the waterfall 
requirements of 16-03 are triggered, I think that there's an 
obligation to report in 7 days from the time that the agency 
has a reasonable basis to believe that a major incident has 
occurred. That's what the law says.
    Mr. LaHood. It appears from this document in Exhibit two 
that that was the case and it wasn't done within the seven-day 
period.
    Mr. Gibson. So it could. I haven't--I'm not familiar with 
the incidents that that's referring to and, you know, to answer 
that conclusively, I want to review that. But, you know, it 
certainly could indicate that, yes.
    Mr. LaHood. Thank you. I went over my time.
    Chairman Loudermilk. The Chair recognizes himself for 
questions.
    Mr. Gross, the Florida incident, is that one of the 
incidents that Mr. LaHood was referencing that you believed was 
inadvertent?
    Mr. Gross. I believe all of the incidents that have been 
reported were identified where the individual inadvertently 
downloaded the material.
    Chairman Loudermilk. And how many incidents has that been?
    Mr. Gross. I believe we've reported seven.
    Chairman Loudermilk. Seven and they were all accidental?
    Mr. Gross. Out of the seven, we had--I believe it was five 
individuals that were retiring, and I believe the other 
individuals were term employees and they were coming to the end 
of their term.
    Chairman Loudermilk. Were all seven of these those that you 
described as not very computer literate or----
    Mr. Gross. Yes, sir, I would say that these individuals 
downloaded the information in an attempt to take their personal 
information prior to departure.
    Chairman Loudermilk. But they had access to sensitive 
information even though they were not ``computer literate''?
    Mr. Gross. Well, the information they had legitimate access 
to was required for them to perform their day-to-day duties. 
Their duties continued up until the day they left employment 
with the FDIC.
    Chairman Loudermilk. So it's common practice to allow 
personnel to download information from the FDIC official 
server?
    Mr. Gross. Prior to my arrival, we did utilize mobile 
media, and individuals could download information to those 
devices. We've since put into place capability to prevent the 
downloading of information to mobile devices.
    Chairman Loudermilk. So is it accepted practice to allow 
personal use of the government computers? If they were taking 
personal information, then obviously they're allowed to use 
them for personal----
    Mr. Gross. Policy does allow de minimis use of the personal 
computer, yes, sir.
    Chairman Loudermilk. Does--do any of the employees in the 
FDIC, yourself or any others, use personal email to conduct 
official business?
    Mr. Gross. No, sir, not that I'm aware of.
    Chairman Loudermilk. None at all. Regarding the Florida 
incident, the Data Breach Management Team, did they give you a 
recommendation on whether this was a breach?
    Mr. Gross. The Data Breach Management Team is a group of 
representatives across the organization. The Inspector General 
sits on that group. It's not a voting body. It's a consensus 
body, and they do provide a recommendation. And I believe from 
the Florida incident that they did recommend that it was a 
breach, but we did also indicate it was a low-level breach.
    Chairman Loudermilk. Okay. Well, let me read from you an 
email which you were just provided a copy. This was from the 
former CIO Christopher Farrow to you, and--regarding the 
Florida incident and just item number seven, ``Only you can 
declare this incident a breach. You have not done so. The DBMT 
has only recommended that this is a breach. We're waiting on 
you to declare this a breach.''
    I'm bringing attention to this email that was provided to 
us by the IG, and it was sent to you on November 30, 2015. And 
in the subject line it refers to the October 2015 Florida 
incident that you informed this Committee of. And the subject 
line says ``action required, Florida incident.''
    As we've discussed here, the body of the email concerns the 
handling of the incident completely within the scope of the 
documents requested by this Committee. The IG provided us this 
document, but you did not, sir. Now, how is not including this 
email with the documents you provided us being responsive to 
the Committee's request?
    Mr. Gross. Sir, I believe every effort was made to be 
responsive to your request. If there's needs for additional 
information, as I said, I stand ready to do so. I believe this 
document right here is summarized in our response in the 
incident management.
    Chairman Loudermilk. But, sir, did the Committee's request 
ask for summaries or did it ask for the documents? I believe 
our request was for all documents, not summaries of documents, 
but documents.
    Mr. Gross. Sir, I believe our response to the Committee's 
request was comprehensive. We made an active effort to provide 
a comprehensive response to this Committee.
    Chairman Loudermilk. But evidence that you have in front of 
you is that it was not comprehensive.
    Mr. Gross. I don't know for sure if this was included in 
the overall submission to the Committee, sir.
    Chairman Loudermilk. It was not, but the IG did provide 
this to us.
    Are you aware, sir, that actively--by not providing this, 
you are actively obstructing this Committee's investigation?
    Mr. Gross. Sir, I believe our submission to you was 
comprehensive. Every effort was made for it to be 
comprehensive.
    Chairman Loudermilk. But, sir, it wasn't comprehensive if 
we're receiving documents from the Inspector General that are 
clearly relating to these incidents that we are investigating 
but you did not provide them.
    Mr. Gross. Well, I didn't provide all the documents that 
you received, sir. These documents came from a variety of 
different offices within the Corporation.
    Chairman Loudermilk. But, sir, you are the addressee on the 
email with this document, so clearly you did have this 
document. And it would have been your responsibility to provide 
this in response to our request for all documents.
    Mr. Gross. I believe that this would have been included in 
the incident response because this document speaks to what's 
summarized in the incident report.
    Chairman Loudermilk. But again, sir, the Committee did not 
ask for summaries; we asked for documents. And are you aware 
that obstructing Congress is a violation of federal law?
    Mr. Gross. I'm fully aware of that, sir. I'm a prior law 
enforcement officer.
    Chairman Loudermilk. Okay.
    Mr. Gross. As I said, we made every effort to be 
responsive. I believe what we provided was a representation of 
the production. We made every effort to be quite exhaustive in 
our response to this Committee. As I said, I--we stand ready to 
provide any additional information that you deem warranted.
    Chairman Loudermilk. Well, I thank you for that, but I 
would prefer that we get these initially and not have to go 
back and get--let me read directly from the correspondence this 
Committee sent to you. It says, ``All documents and 
communications referring or relating to the security 
incident.'' All documents and communications. We didn't ask for 
summaries; we asked for all documents and communications, which 
you failed to provide.
    Let me ask you another question. We'll shift our direction 
of questioning here. Sir, if a bank were to have the incidents 
happened to them, an employee walks out with a USB drive 
containing 10,000 pieces of PII of their customers, and they 
followed the same procedure that you followed by not reporting 
it to the FDIC, what would the FDIC's actions be to that bank?
    Mr. Gross. I can't speak to that, sir. That's speculative. 
I----
    Chairman Loudermilk. I would like to get the answer to that 
because I don't think it would be following the same procedures 
that you're holding yourself accountable to.
    Maybe, Mr. Gibson, do you know what action would be taken 
to a bank?
    Mr. Gibson. Sir, I think that question would need to be 
answered by the supervisors.
    Chairman Loudermilk. Okay.
    Mr. Gibson. I'm afraid I can't.
    Chairman Loudermilk. I did pose that to--a question to a 
banker yesterday, and I will get a formal response of what he 
believes would have--the action that would have been taken.
    Mr. Gross, it appears the FDIC has a history of cyber 
security breaches that goes beyond what has been made public to 
date. I personally have a problem after 30 years of being in 
the information systems business that seven repeated incidents 
are all inadvertent.
    But let's move on to other incidents. Is it true that an 
``advanced persistent threat'' was able to penetrate the FDIC 
computer systems in August 2011?
    Mr. Gross. I believe that's correct, sir.
    Chairman Loudermilk. Okay. Is it true that FDIC employees' 
computers were accessed by a foreign entity without their 
knowledge?
    Mr. Gross. I believe you're speaking from an Inspector 
General report, sir, and that, I think, would be best discussed 
by the Inspector General. That document has sensitive 
information in it.
    Chairman Loudermilk. Mr. Gibson, do you have any 
information that you can share with us?
    Mr. Gibson. If you want to ask me a question, let's see.
    Chairman Loudermilk. Is it----
    Mr. Gibson. I don't see why not.
    Chairman Loudermilk. Is it true that FDIC employees' 
computers were accessed by a foreign entity without their 
knowledge----
    Mr. Gibson. Sir----
    Chairman Loudermilk. --dating back to August 2011?
    Mr. Gibson. That is my understanding, yes, sir.
    Chairman Loudermilk. Okay. Thank you. Mr. Gross, is it true 
that the Chairman of the FDIC's own computer was accessed by 
this foreign entity?
    Mr. Gross. Sir, I have reviewed that document. I believe 
what you're stating is included in the report, but I just 
became familiar with that document yesterday. I think Mr. 
Gibson would be best positioned to respond.
    Chairman Loudermilk. Mr. Gibson, can you respond? Is it 
true that the Chairman of the FDIC's own computer was accessed 
by this foreign entity?
    Mr. Gibson. Sir, that's my understanding.
    Chairman Loudermilk. That's your understanding. And again, 
this is in an IG report?
    Mr. Gibson. Sir, there are actually--well, there is--I 
believe the document that you've got is an IG report.
    Chairman Loudermilk. Okay.
    Mr. Gibson. That document was produced to address the 
FDIC's handling of the incident internally. It's not a 
technical report.
    Chairman Loudermilk. Okay.
    Mr. Gibson. The technical reports would have been prepared 
by an FDIC contractor that was brought in to study the specific 
situation. The question is a technical one. Our report really 
doesn't get to that. It gets more to the issue of reporting of 
the incident and the FDIC's handling of the incident than it 
does the technical aspects.
    Chairman Loudermilk. Okay.
    Mr. Gibson. But in so far as--you know, yes, the answer to 
the questions that you're asking is yes, but I don't know the 
technical details----
    Chairman Loudermilk. Okay.
    Mr. Gibson. --behind some of that.
    Chairman Loudermilk. Mr. Gross, is it true that the foreign 
entity was China?
    Mr. Gross. Sir, I don't know that to be correct. I can only 
tell you what I've read in the report. The details surrounding 
the report, it happened prior to my arrival.
    Chairman Loudermilk. I understand.
    Mr. Gross. I can assure you that if that was to happen 
today under my watch, I'm a prior military person and I believe 
in the command structure, so if there's an incident that occurs 
in my organization, one, it's my boat. I'm responsible for 
making sure it's reported and addressed.
    Chairman Loudermilk. Well, I understand that and I 
appreciate your response there. But in the report, does it 
identify anywhere--Mr. Gibson, in the report does it identify 
that the foreign entity was indeed China?
    Mr. Gibson. No, sir, it is not.
    Chairman Loudermilk. It does not.
    Mr. Gibson. We are not authorized to make a specific 
attribution to any particular actor.
    Chairman Loudermilk. Okay. Thank you.
    Mr. Gross, regarding this particular incident where 
supposedly China had access to FDIC computer systems for over a 
year, which I think would be a very significant issue to maybe 
have more information on than what we're sharing here today, 
according to the materials provided to the Committee, the FDIC 
chose to intentionally violate its own policies and procedures 
and did not notify CSIRT, the central national authority 
responsible for tracking, analyzing, and coordinating responses 
to computer security incidents that attack U.S. Government 
systems. Is this true?
    Mr. Gross. Sir, as I said, I've reviewed that report, and 
it's actually great to kind of draw that to scale. When you 
look at the APT that you're mentioning here versus an incident 
where we have trusted employees that left the organization, you 
can see why we drew the fact that the risk of harm to 
individuals were low. In this instance, if there was an APT in 
our environment, we would be taking active steps to address it.
    But I would have to defer to Mr. Gibson on the specifics 
that might be contained in the report as to who might have been 
penetrated or the extent of the penetration into the 
environment.
    Chairman Loudermilk. Mr. Gibson, can you provide any more 
enlightenment in whether they followed proper procedures by 
notifying a foreign entity?
    Mr. Gibson. They did not.
    Chairman Loudermilk. They did not. Thank you.
    Mr. Gross, it's my understanding that one of the steps 
taken by the FDIC to prevent further breaches was to shut off 
the use of USB drives on the computers at the FDIC. What 
percentage of the FDIC employees roughly still have access to 
their USB drives?
    Mr. Gross. I believe we've reduced that number down to 
probably less than 50 percent. We still have a significant 
number. Our goal is zero. As I said, I've come from other 
federal agencies, so my goal is to reduce that down to zero. 
However, we have to work through different business processes 
that still require the use of that, and what I mean by that is 
our examiners have a need to exchange information with their 50 
different counterparts that they work with in the field. So I 
can't immediately drive down to zero, but I can assure you and 
the Committee my goal is to get to zero on use of mobile media 
within the organization.
    Chairman Loudermilk. So with the 50 percent that you have 
disabled, were those the employees that have access to the type 
of the information that was breached, or are those the 50 
percent still remaining to be blocked?
    Mr. Gross. The 50 percent that we had are primarily 
examiners that work out in the field and other components of 
the organization that still have an express business 
requirement for that. The goal, as I said, is zero. In our 
examiner area, we are actually rolling out technology right now 
which we call our ETS system.
    Chairman Loudermilk. Right.
    Mr. Gross. As we roll that out, we will begin to be able to 
have larger numbers of those groups no longer have a need for 
the use of mobile media. So we're going to do this over time in 
specific business areas to be able to get to that zero 
threshold.
    Chairman Loudermilk. So if you had these 50 percent--let me 
ask it this way. If the 50 percent you have blocked now was 
done six months ago, would it have prevented these incidents?
    Mr. Gross. I can't say that for certain, sir, because these 
individuals were in various different parts of the 
organization. And even, as I said, it was an inadvertent 
download of the data.
    Chairman Loudermilk. What have you done to prevent it from 
happening other than the USB drives?
    Mr. Gross. Actually, what we've done to prevent it is 
we've, one, eliminated the use of mobile media across the 
organization only to those individuals that require it in order 
to complete their business processes. In order for those 
individuals to be able to use the removable media, it requires 
the approval of their division director.
    Chairman Loudermilk. Okay.
    Mr. Gross. The--in addition to that, what we're also 
putting in place is encryption--is that any device that's 
placed into the machines, once that device is placed in the 
machine, it will automatically be encrypted. So those mobile 
devices that we do have in the environment would in fact have 
encryption, which would enhance their--the security on those 
devices if they're lost.
    Chairman Loudermilk. But it would not have prevented these 
actions from taking place?
    Mr. Gross. I don't believe it would have.
    Chairman Loudermilk. Mr. Gross, it's interesting that some 
of these breaches were retroactively reported to Congress. It's 
clear that the OMB guidance and FISMA state anything over 
10,000 instances of PII is to be reported to Congress. We have 
systems in place to trigger awareness at various government 
levels. If I go to the bank and withdraw $10,000 of my own 
money, that is immediately going to be reported, but certain 
employees at FDIC can download 10,000 individual PIIs and it's 
not flagged. Is that a double standard?
    Mr. Gross. Well, actually, sir, it is flagged. I think we 
have a best practice in the fact that we're using DLP to 
identify those instances. Prior to DLP, we would have been 
unaware that the employees were downloading that information.
    Chairman Loudermilk. But there was 10,000 that were 
breached that were disclosed or taken but you did not report 
those within the seven-day window.
    Mr. Gross. Sir, it's--we don't have relief in reporting. I 
want to be--I want to go back to that in that it's not a 
question of whether or not if it's going to be reported. All 
incidents within the FDIC are reported. The question is, is it 
reported within 7 days, 30 days, or is it reported in an annual 
FISMA report.
    So I want to make sure that it's understood is that there's 
no question about our transparency in reporting. It was in 
which time frame. And we wanted to draw to scale--we wanted to 
focus on, is this major? Is this an APT? Is this someone in our 
system? If we report on incidents that we have deemed as non-
major, then we're reporting on everything. And then when we 
have an APT or a significant event, the risk you run is that 
these incidents are then lost in the noise. And I would hate to 
classify any incident as just noise. But we want to make sure 
that we're focusing our energies and our time around those 
incidents that pose significant risk of harm to individuals or 
the organization.
    Chairman Loudermilk. Okay. I have been very lenient with my 
time, and I will do the same to my good friend from Virginia, 
Mr. Beyer, who is now recognized.
    Mr. Beyer. Thank you, Mr. Chairman.
    Mr. Gibson, in your testimony you said that the memorandum 
that you had prepared on February 19 this year to the Chief 
Information Officer was marked privileged and for official use 
only, and it was later leaked, which is how come we know about 
it. Why wasn't it public in the first place? And what's the 
argument for keeping something like that from the public?
    Mr. Gibson. Sir, it's not our responsibility to report; 
it's the FDIC's responsibility. We prepared that document in 
the middle of an audit, actually planning for an audit. We had 
not completed our work at that point in time. At the time that 
our work is completed, we would have made some public 
disclosure of it. There are other points at which public 
disclosure might have occurred, depending upon the FDIC's 
response to that memorandum. When they responded by determining 
that they would disclose the incident, then there was no need 
for us to make it public ourselves.
    Mr. Beyer. In the seven incidents we're talking about that 
the FDIC and the CIO have all determined were inadvertent, does 
the decision--or the determination of inadvertency make it more 
difficult for you to pursue criminal charges?
    Mr. Gibson. Well, sir, it could. It's a fact that you'd 
have to consider as you evaluate the case. When we have a 
statement from the government that says that something's 
inadvertent then you have to establish that there's specific 
intent to violate the law. Now, if I was a defense lawyer, 
that's probably the first document that I would wave around. 
That doesn't mean we can't, but it does mean that it can 
increase the bar; it can increase the level of difficulty that 
we have.
    Mr. Beyer. Great. Thank you.
    Mr. Gross, one of the things I want to be clear about, too, 
because you've mentioned a number of times your distinguished 
39-year career in the military and the federal office, and we 
thank you for that and thank you for your service. But I just 
want to also clarify that the hearing is not about your 
remarkable career but rather about what's going on with the 
FDIC right now.
    In your attempt to remove the mobile media devices down to 
50 percent and rolling out ETS, how then will examiners share 
data if the mobile devices are gone?
    Mr. Gross. We're identifying technology solutions that will 
allow them to exchange information. As I said, since arriving, 
I've been looking at the business practices that we have within 
the organization trying to identify other solutions that will 
allow us to conduct our business without exposing the data.
    Mr. Beyer. Which will include not being able to email the 
data back and forth?
    Mr. Gross. That's correct. We currently monitor email, and 
we have the ability to manage or prevent email exchange. But in 
the case of mobile media, it--just as it says, the ability for 
a person to move it from point A to point B is quite easy.
    Mr. Beyer. I want to clarify one thing you said earlier, 
and I'm confused. So in the OMB guidance, on the one hand, if 
it affects more than 10,000 records, it triggers the 7-day 
response. You also said that it's your classification, major, 
minor, intermediate, that determines 7-day, 30-day, annual 
disclosure. Are those in conflict? Do you really have the 
discretion as CIO to determine what's major and what's not 
major and therefore what--or, to be specific--because something 
released 11,000 records and you still determine it not major?
    Mr. Gross. Actually, sir, in the incidents that we've 
reported, we have several in there that just barely meets the 
bar. I believe there's a couple that are 13,000 records. The 
policy is a--it provides some guidance to the agency to 
consider in making a determination of, one, the significance of 
an event. So you can have an incident and it's not considered a 
major in that the surrounding issues around the incident 
doesn't warrant the 7-day reporting.
    Mr. Beyer. Even though it has more than 10,000 records?
    Mr. Gross. In----
    Mr. Beyer. Is the 10,000 records threshold not de facto 
sufficient----
    Mr. Gross. I----
    Mr. Beyer. --for the 7-day reporting?
    Mr. Gross. I believe it draws a bright line, and that 
bright line is that--is what we're following now. But I believe 
what happens is it creates an environment where you're 
reporting everything and--as a major, and then you run the risk 
that if you have a significant event, it would be--it may be 
overlooked. But the policy clearly says it leaves to the 
discretion of the agency if there's significant enough 
information to warrant reporting as a major.
    Mr. Beyer. Okay.
    Mr. Gross. But I want to be clear, there's not a question 
of if the incident is reported. It is reported. The question is 
in what time frame is it reported.
    Mr. Beyer. Well, and I--I'd ask you, please, to listen 
carefully to this, too, because if anything over 10,000 
constitutes so many reports that it's noise, we have a much 
bigger problem. We should have very few incidents ever that 
have more than 10,000 records.
    Mr. Gross. I would hope, sir, that we get to zero. My goal 
by removing the mobile media where we have seen these incidents 
occur is that we have better management of control of our data. 
But as you--if you read through the incidents, our employees 
are fully aware of their requirements of reporting, so we're 
focused today on removable media.
    But on a day-to-day basis, you may have employees that may 
inadvertently have access to information that was unintended. 
That could be they saw--they looked at a file share that was 
online where the permissions may not have been removed. Is that 
a major? Well, there may be 10,000 records in that file share 
that they inadvertently saw during that period of time, but was 
it during the normal course of their business so it's not 
reported as a major, but we still report it as an incident in 
our FISMA report.
    Mr. Beyer. You say that in determining whether major, minor 
incident, that you used their signed statements, their 
affidavits to determine that the information has not been 
disseminated. That seemed to put an awful lot of trust into one 
signed statement. Are there any other steps you did, tests to 
see whether any of these records had leaked out, had been sold, 
had been contacted? For example, the FEC assaults its FEC 
reports with fake names so they can determine whether somebody 
else has pulled it off the internet and used it 
inappropriately.
    Mr. Gross. We do have a forensic review that we conduct on 
the device once it's returned. One, we can identify if the 
device that was returned is in fact the device that was used to 
make the copy. We can also examine the files that are on the 
document to ensure that we've in fact recovered all of the 
information that was exfiltrated onto the device originally. 
But in addition to that, we can determine the last time the 
files were opened or accessed.
    There are limitations to what we can do with the forensics, 
but it gives us a better perspective as to what happened to the 
data from the time it was downloaded to the device to the time 
the device was returned to the organization.
    Mr. Beyer. Is there any way to determine whether that data 
was downloaded into another computer or sent to someone else?
    Mr. Gross. We have limited capabilities in our forensic 
that we can determine some things but we have to rely on the 
fact that the employee's assertion that it has not been 
disseminated beyond themselves is important.
    Mr. Beyer. Yes. Once again, I fear that that's going to be 
too low a bar. But let me move on.
    Is the--on the personal information, Ms. Lofgren from 
California pointed out how probably important it is that the 
personal information be in fact de minimis, and if it's de 
minimis, there should be very little that needs to be taken 
off.
    I served four years in State Department, and at the end 
didn't need to download a single thing. I did have to go delete 
emails to my wife as to what time I was coming home for dinner 
but nothing else beyond that. And it's sort of hard to imagine 
that I would need it--after serving four years that there--or 
even 30 years that there's much that you'd need to take off the 
computer.
    Mr. Gross. By implementing the procedures that we have in 
place for preventing the downloading of the material to mobile 
media, what that does is put us in a position that if an 
employee in fact does want to download information, we in fact 
have to intervene and do that with them on their behalf. So I 
believe we'll be able to meet that bar that she's indicated 
where we should be.
    We want to make sure that if the employee does have 
information that they may have created through de minimis use 
of the device, creating of a resume or other material, that in 
fact they can take that. But by eliminating their ability to 
download it, I believe we're in a better position to manage 
that.
    Mr. Beyer. Okay. One last question. On the October breach 
you made the determination that it couldn't be classified as a 
major incident, but you have the DBMT, the Data Breach 
Management Team. And they all have a--are they simply advisory 
or do they have a vote in determining what's a major and what's 
a minor event?
    Mr. Gross. It's not a voting body. All of the 
representatives on the group--as I said, the Inspector General 
sits on the group. We have a representative from each of the 
program areas where the incident may have occurred. They 
provide a recommendation based on the information to the CIO of 
whether or not it's a breach, but they also make other 
recommendations of things that should be considered as part of 
the review process.
    Mr. Beyer. Do you remember whether the--what recommendation 
the DBMT made in response to the October incident?
    Mr. Gross. I'm not sure the--when you say October incident, 
is that the Florida incident? That's the one we refer to as----
    Mr. Beyer. The original one, yes.
    Mr. Gross. --the Florida incident. I believe it was 
recommended that it was a breach but it was low risk.
    Mr. Beyer. Okay. Have you been in the position yet of 
having to make a determination that differed from what the DBMT 
recommended?
    Mr. Gross. No, I don't believe so. And I want to be clear 
is that the DBMT doesn't meet once. So on the surface it may 
appear that these incidents may have lingered on or we were 
nonresponsive. In fact, the DBMT meets on a number of different 
times during an incident as additional information becomes 
available, but I don't know of any incidents where I have been 
in--I've had a difference of opinion of what came out of the 
DBMT.
    Mr. Beyer. All right. Thank you, Mr. Gross. Thank you, Mr. 
Gibson.
    Mr. Chairman, I yield back.
    Chairman Loudermilk. I thank the Ranking Member for the 
line of questioning, and I thank the witnesses for their 
testimony and the other Members who were here with questions.
    We've identified several inconsistencies here today by the 
FDIC, and the Committee will continue its oversight and looking 
forward to having the FDIC Chairman here once the Inspector 
General completes its audits. We will continue looking into 
this. This is a very critical issue.
    And the record will remain open for two weeks for 
additional comment and written questions from the members.
    The hearing is adjourned.
    [Whereupon, at 11:40 a.m., the Subcommittee was adjourned.]

                               Appendix I

                              ----------                              

[GRAPHICS NOT AVAILABLE IN TIFF FORMAT]


                              Appendix II

                              ----------                              

[GRAPHICS NOT AVAILABLE IN TIFF FORMAT]

                                 [all]