[House Hearing, 114 Congress] [From the U.S. Government Publishing Office] THE EXPANDING CYBER THREAT ======================================================================= HEARING BEFORE THE SUBCOMMITTEE ON RESEARCH AND TECHNOLOGY COMMITTEE ON SCIENCE, SPACE, AND TECHNOLOGY HOUSE OF REPRESENTATIVES ONE HUNDRED FOURTEENTH CONGRESS FIRST SESSION __________ JANUARY 27, 2015 __________ Serial No. 114-2 __________ Printed for the use of the Committee on Science, Space, and Technology [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] Available via the World Wide Web: http://science.house.gov ______ U.S. GOVERNMENT PUBLISHING OFFICE 93-880PDF WASHINGTON : 2015 ----------------------------------------------------------------------- For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC 20402-0001 COMMITTEE ON SCIENCE, SPACE, AND TECHNOLOGY HON. LAMAR S. SMITH, Texas, Chair FRANK D. LUCAS, Oklahoma EDDIE BERNICE JOHNSON, Texas F. JAMES SENSENBRENNER, JR. ZOE LOFGREN, California DANA ROHRABACHER, California DANIEL LIPINSKI, Illinois RANDY NEUGEBAUER, Texas DONNA F. EDWARDS, Maryland MICHAEL T. McCAUL FREDERICA S. WILSON, Florida STEVEN M. PALAZZO, Mississippi SUZANNE BONAMICI, Oregon MO BROOKS, Alabama ERIC SWALWELL, California RANDY HULTGREN, Illinois ALAN GRAYSON, Florida BILL POSEY, Florida AMI BERA, California THOMAS MASSIE, Kentucky ELIZABETH H. ESTY, Connecticut JIM BRIDENSTINE, Oklahoma MARC A. VEASEY, TEXAS RANDY K. WEBER, Texas KATHERINE M. CLARK, Massachusetts BILL JOHNSON, Ohio DON S. BEYER, JR., Virginia JOHN R. MOOLENAAR, Michigan ED PERLMUTTER, Colorado STEVE KNIGHT, California PAUL TONKO, New York BRIAN BABIN, Texas MARK TAKANO, California BRUCE WESTERMAN, Arkansas BILL FOSTER, Illinois BARBARA COMSTOCK, Virginia DAN NEWHOUSE, Washington GARY PALMER, Alabama BARRY LOUDERMILK, Georgia ------ Subcommittee on Research and Technology HON. BARBARA COMSTOCK, Virginia, Chair FRANK D. LUCAS, Oklahoma DANIEL LIPINSKI, Illinois MICHAEL T. MCCAUL, Texas STEVEN M. PALAZZO, Mississippi RANDY HULTGREN, Illinois JOHN R. MOOLENAAR, Michigan STEVE KNIGHT, California BRUCE WESTERMAN, Arkansas GARY PALMER, Alabama LAMAR S. SMITH, Texas C O N T E N T S January 27, 2015 Page Witness List..................................................... 2 Hearing Charter.................................................. 3 Opening Statements Statement by Representative Barbara Comstock, Chairwoman, Subcommittee on Research and Technology, Committee on Science, Space, and Technology, U.S. House of Representatives........... 7 Written Statement............................................ 8 Statement by Representative Daniel Lipinski, Ranking Minority Member, Subcommittee on Research and Technology, Committee on Science, Space, and Technology, U.S. House of Representatives.. 8 Written Statement............................................ 10 Statement by Representative Lamar S. Smith, Chairman, Committee on Science, Space, and Technology, U.S. House of Representatives................................................ 11 Written Statement............................................ 12 Witnesses: Ms. Cheri McGuire, Vice President, Global Government Affairs & Cybersecurity Policy, Symantec Corporation Oral Statement............................................... 13 Written Statement............................................ 16 Dr. James Kurose, Assistant Director, Computer and Information Science and Engineering (CISE) Directorate, National Science Foundation Oral Statement............................................... 30 Written Statement............................................ 32 Dr. Charles H. Romine, Director, Information Technology Laboratory, National Institute of Standards and Technology Oral Statement............................................... 56 Written Statement............................................ 58 Dr. Eric A. Fischer, Senior Specialist in Science and Technology, Congressional Research Service Oral Statement............................................... 66 Written Statement............................................ 68 Mr. Dean Garfield, President and CEO, Information Technology Industry Council Oral Statement............................................... 83 Written Statement............................................ 85 Discussion....................................................... 94 Appendix I: Answers to Post-Hearing Questions Ms. Cheri McGuire, Vice President, Global Government Affairs & Cybersecurity Policy, Symantec Corporation..................... 108 Dr. James Kurose, Assistant Director, Computer and Information Science and Engineering (CISE) Directorate, National Science Foundation..................................................... 110 Dr. Charles H. Romine, Director, Information Technology Laboratory, National Institute of Standards and Technology..... 117 Dr. Eric A. Fischer, Senior Specialist in Science and Technology, Congressional Research Service................................. 118 Mr. Dean Garfield, President and CEO, Information Technology Industry Council............................................... 122 THE EXPANDING CYBER THREAT ---------- TUESDAY, JANUARY 27, 2015 House of Representatives, Subcommittee on Research and Technology Committee on Science, Space, and Technology, Washington, D.C. The Subcommittee met, pursuant to call, at 2:03 p.m., in Room 2318 of the Rayburn House Office Building, Hon. Barbara Comstock [Chairwoman of the Subcommittee] presiding. [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] Chairwoman Comstock. The Subcommittee on Research and Technology will come to order. Without objection, the Chair is authorized to declare recesses of the Subcommittee at any time. We might be having some votes, I understand. I would just like to welcome everyone to today's hearing entitled ``The Expanding Cyber Threat.'' Without objection, the Chair authorizes the participation of Mr. Lipinski, Ms. Lofgren, Ms. Bonamici, Ms. Clark, and Mr. Beyer for today's hearing. I understand Mr. Lipinski will serve as the Ranking Minority Member today and give an opening statement. In front of you are packets containing the written testimony, biographies, and truth-in-testimony disclosures for today's witnesses. Now, I will recognize myself for five minutes for an opening statement. Okay. I want to begin by thanking everyone for attending the first hearing of the Research and Technology Subcommittee in the 114th Congress. I look forward to working with the Members of the Subcommittee on the many issues that fall under the jurisdiction of this Subcommittee. The need to secure our information technology systems is a pervasive concern. Today's hearing marks the first of what will be several hearings, I imagine, to examine the topic of cybersecurity. We know we heard the President speak about this and we have--and the Chairman has been a big advocate of increased activity and concerns on this front so I look forward to continuing to work on this issue. The Subcommittee has jurisdiction over the National Science Foundation, the National Institute of Standards and Technology and the Department of Homeland Security's Science and Technology Directorate. These organizations play a role in supporting basic research and development, establishing standards and best practices, and working with industry on cybersecurity concerns. Advances in technology and the growing nature of every individual's online presence means cybersecurity needs to become an essential part of our everyday life. Instances of harmful cyber attacks are in the news regularly and expose the very real threats growing in this area. Financial information, medical records, personal data maintained on computer systems by individuals and organizations all continue to be vulnerable. Cyber attacks on companies like Sony or Target, as well as the U.S. Central Command, will not go away and we have to constantly adapt and intercept and stop these threats and engage in finding the best practices so that we make sure these attacks don't happen and we understand where and how they are coming at us and how we can stay ever vigilant. Utilizing targeted emails, spam, malware, bots and other tools, cyber criminals, ``hacktivists'' and nation states are every day attempting to access information technology systems all over the world and all over our country and in every area of our activities. The defense of these systems relies on professionals who can react to threats and proactively prepare those systems for attack. Our discussion about cybersecurity should examine the research that supports understanding how to defend and support our systems, as well as how to better prepare our workforce by producing experts in these fields and learning of best practices in both the public and private sector. Well-trained professionals are essential to the implementation of the best techniques. Institutions of higher education are working to create and improve cyber education and training programs focused on ensuring there are enough trained professionals to meet the needs of this growing industry. I look forward to hearing from our witnesses today as they provide an overview of the state of cybersecurity from the industry perspective and we learn how the federal government is playing a role in this important area. [The prepared statement of Ms. Comstock follows:] Prepared Statement of Subcommittee Chairwoman Barbara Comstock I want to begin by thanking everyone for attending the first hearing of the Research and Technology Subcommittee in the 114th Congress. I look forward to working with the Members of the Subcommittee on the many issues that fall under the jurisdiction of this Subcommittee. The need to secure our information technology systems is a pervasive concern. Today's hearing marks the first of what will be several hearings to examine the topic of cybersecurity. The Subcommittee has jurisdiction over the National Science Foundation, the National Institute of Standards and Technology and the Department of Homeland Security's Science and Technology Directorate. These organizations play a role in supporting basic research and development, establishing standards and best practices, and working with industry on cybersecurity concerns. Advances in technology and the growing nature of every individual's online presence means cybersecurity needs to become an essential part of our vernacular. Instances of harmful cyber-attacks are reported regularly and expose the very real threats growing in this area. Financial information, medical records, and personal data maintained on computer systems by individuals and organizations continue to be vulnerable. Cyber-attacks on companies like Sony or Target and the U.S. Central Command will not go away and we have to constantly adapt and intercept and stop these threats before they happen and understand where and how they are happening and stay ever vigilant. Utilizing targeted emails, spam, malware, bots and other tools, cyber criminals, ``hacktivists'' and nation states are attempting to access information technology systems all the time. The defense of these systems relies on professionals who can react to threats and proactively prepare those systems for attack. Our discussions about cybersecurity should examine the research that supports understanding how to defend and support our systems as well as how to better prepare our workforce by producing experts in these fields and learning of best practices in both the public and private sector. Well-trained professionals are essential to the implementation of security techniques. Institutions of higher education are working to create and improve cyber education and training programs focused on ensuring there are enough trained professionals to meet the needs of industry. I look forward to hearing from our witnesses today as they provide an overview of the state of cybersecurity from the industry perspective and we learn how the federal government is playing a role in this important area. Chairwoman Comstock. Now, I would like to recognize Ranking Member Mr. Lipinski for his opening statement. Mr. Lipinski. Thank you, Chairwoman Comstock, for holding this hearing on cybersecurity and I want to welcome you to the Science, Space, and Technology Committee. I am looking forward to working with you. I know that you worked for former member Frank Wolf and Frank Wolf was--I have a tremendous amount of respect for him and he was a big supporter of funding for research. He is a big supporter of research and technology, science, so I think hopefully we will have a lot of things that we can work together on on this Subcommittee, on the Committee. I also want to thank our witnesses for being here today on this very important topic. Cybersecurity remains a timely topic, the topic on which this Committee has an important role, and finally, is one for which we have much more agreement than disagreement across the aisle. So I am pleased that the Research and Technology Subcommittee is starting off the new Congress with this hearing. Cyber crimes are ever increasing. The threats are not only growing in number but in level of sophistication. Some cases, such as the recent Sony hack and a 2013 Target breach, are very high profile and are covered extensively in the media. Many, many more receive less attention. Two weeks ago the New York Times reported that hacking has gone mainstream. A website has been created to connect hackers to potential clients. And as of early January, at least 500 hacking jobs have been laid out to bid and at least 50 hackers signed up to do the dirty work. Cyber crime threatens our privacy, our pocketbooks, our safety, our economy, and our national security. Arriving at any precise value of losses to the American people and American economy is impossible, but the Center for Strategic and International Studies, in a study completed last June, reported that on average the United States loses .64 percent of its GDP to cybercrime. I know we will hear much more from our witnesses about the extent and the nature of the cyber threat. Two years ago President Obama signed an Executive Order to begin the process of strengthening our networks and critical infrastructure against cyber attack by increasing information- sharing and establishing a framework for the development of standards and best practices, and this plays a key role in several of these efforts. You will hear about some of it today. But the President reminded us just two weeks ago that Congress must still act to pass comprehensive cybersecurity legislation. Fortunately, this is one area in which this Committee has responsibly legislated in the last few years. At the very end of 2014, the Cybersecurity Enhancement Act that I joined Mr. McCaul in introducing for several Congresses in a row was finally signed into law. That law does a number of things: it strengthens coordination and strategic planning for federal cybersecurity R&D; it codifies the NIST-led voluntary framework in the President's Executive Order; it strengthens and streamlines NIST-led processes by which federal agencies track security risks to their own systems; it codifies NSF's long-standing CyberSecurity Scholarship for Service program to ensure more qualified cyber experts are employed by federal, state, and local governments; it codifies the cybersecurity education and awareness efforts led by NIST; and finally, it authorizes several more important actions and programs led by NIST. I list all of these things in part so that all of the new members of the Science Committee understand just how essential NIST is to our government's cybersecurity efforts. It is one of the most important, least-known agencies in our government. I look forward to hearing about NIST's effort from Dr. Romine and how the new law will further strengthen NIST's leadership role in cybersecurity. I also look forward to hearing from Dr. Kurose about the critical and potentially transformative cybersecurity research programs funded by the National Science Foundation. And I look forward to hearing from the other three witnesses who can help educate us further about the importance of public-private partnerships and the areas where this Committee might look to address cybersecurity vulnerabilities during this Congress. Thank you, Madam Chairwoman, and I yield back the balance of my time. [The prepared statement of Mr. Lipinski follows:] Prepared Statement of Subcommittee Minority Ranking Member Daniel Lipinski Thank you, Chairwoman Comstock for holding this hearing on cybersecurity, and welcome to the Science, Space, and Technology Committee. I look forward to working with you this Congress. I also want to thank our witnesses for being here today. Cybersecurity remains a timely topic, it is a topic on which this Committee has an important role, and finally it is one for which we have much more agreement than disagreement across the aisle. So I am pleased that the Research and Technology Subcommittee is starting off the new Congress with this hearing. Cybercrimes are ever-increasing. The threats are not only growing in number, but in the level of sophistication. Some cases, such as the recent Sony hack and the 2013 Target breach, are very high profile and are covered extensively in the media. Many, many more receive less attention. Two weeks ago, the New York Times reported that hacking has gone mainstream. A website has been created to connect hackers to potential clients, and as of early January, at least 500 hacking jobs had been laid out to bid and at least 50 hackers signed up to do the dirty work. Cybercrime threatens our privacy, our pocketbooks, our safety, our economy, and our national security. Arriving at any precise value of losses to the American people and the American economy is impossible. But the Center for Strategic and International Studies, in a study completed last June, reported that, on average, the U.S. loses 0.64 percent of its GDP to cybercrime. I know we will hear more from our witnesses about the extent and nature of the cyber threat. Two years ago, President Obama signed an Executive Order to begin the process of strengthening our networks and critical infrastructure against cyberattack by increasing information sharing and establishing a framework for the development of standards and best practices. NIST plays a key role in several of these efforts, and we will hear about some of it today. But the President reminded us just two weeks ago that Congress must still act to pass comprehensive cybersecurity legislation. Fortunately, this is one area in which this Committee has responsibly legislated in the last few years. At the very end of 2014, the Cybersecurity Enhancement Act that I joined Mr. McCaul in introducing for several Congresses in a row was finally signed into law. That law does a number of things.It strengthens coordination and strategic planning for federal cybersecurity R&D; It codifies the NIST-led voluntary Framework in the President's Executive Order; It strengthens and streamlines the NIST-led processes by which federal agencies track security risks to their own systems; It codifies NSF's longstanding cybersecurity scholarship for service program to ensure more qualified cyber experts are employed by federal, state, and local governments; It codifies the cybersecurity education and awareness efforts led by NIST; And finally it authorizes several more important actions and programs led by NIST. I list all of these things in part so that all of the new Members to the Science Committee understand just how central NIST is to our government's cybersecurity efforts. It is one of the most important leastknown agencies in our government. I look forward to hearing about NIST's efforts from Dr. Romine, and how the new law will further strengthen NIST's leadership role in cybersecurity. I also look forward to hearing from Dr. Kurose about the critical and potentially transformative cybersecurity research programs funded by the National Science Foundation. And I look forward to hearing from the other three witnesses who can help educate us further about the importance of public-private partnerships and the areas where this Committee might look to address cybersecurity vulnerabilities during this Congress. Thank you, Madam Chairwoman and I yield back the balance of my time. Chairwoman Comstock. And now I recognize the Chairman of the full Committee, Mr. Smith. Chairman Smith. And thank you, Madam Chair. Madam Chair, let me say I look forward to your Chairing this Subcommittee and also to the gentleman from Illinois, Mr. Lipinski, continuing to be the Ranking Member of this Subcommittee as well. He has been a great Ranking Member and I know that we both will all be able to work together for more bipartisan legislation that we enjoyed in the last Congress and that we can look forward to in this new Congress as well. I also look forward to today's hearing on cyber threats, a topic that continues to grow in importance. With technological advances come new methods that foreign countries, cyber criminals and ``hacktivists'' use to attack and access our networks. America is vulnerable and there is an increasing need for technically trained cybersecurity experts to identify and defend against cyber attacks. Protecting America's cyber systems is critical to our economic and national security. As our reliance on information technology expands, so do our vulnerabilities. A number of federal agencies guard America's cybersecurity interests. Several are under the jurisdiction of the Science Committee. These include the National Science Foundation, the National Institute of Standards and Technology, the Department of Homeland Security's Science and Technology Directorate, and the Department of Energy. All of these support critical research and development to promote cybersecurity in hardware, software and our critical infrastructure. At the beginning of the last Congress, the Science Committee considered two cybersecurity bills, the Cybersecurity Enhancement Act and a bill to reauthorize the Networking and Information Technology Research and Development program. Both bills passed the House last April. At the end of the last Congress, the House and Senate did come to an agreement on the Cybersecurity Enhancement Act, which was signed into law in December. The Science Committee will continue its efforts to support the research and development essential to fortifying our nation's cyber defenses. From the theft of credit card information at retailers like Target and Home Depot, to successful attacks at Sony and on the U.S. Central Command, no further wakeup calls are necessary to understand our call to action. As America continues to become more advanced, we must better protect our information technology systems from attack. Any real solution should adapt to changing technology and tactics while also protecting private sector companies, public institutions and personal privacy. Again, Madam Chair, I look forward to today's hearing and yield back. [The prepared statement of Mr. Smith follows:] Prepared Statement of Full Committee Chairman Lamar S. Smith Thank you Madam Chair, I look forward to today's hearing on cyber threats, a topic that continues to grow in importance. In the 60 years since the last major patent reform, America has experienced tremendous technological advancements. Computers the size of a closet have evolved into wireless technology that fits in the palm of our hand. With technological advances come new methods that foreign countries, cyber criminals and ``hacktivists'' can use to attack and access our networks. America is vulnerable and there is an increasing need for technically-trained cybersecurity experts to identify and defend against cyber-attacks. Protecting America's cyber-systems is critical to our economic and national security. As our reliance on information technology expands, so do our vulnerabilities. A number of federal agencies guard America's cybersecurity interests. Several are under the jurisdiction of the Science Committee. These include the National Science Foundation (NSF), the National Institute of Standards and Technology (NIST), the Department of Homeland Security's Science and Technology Directorate, and the Department of Energy. All of these support critical research and development to promote cybersecurity in hardware, software and our critical infrastructure. At the beginning of the last Congress, the Science Committee considered two cybersecurity bills, the Cybersecurity Enhancement Act and a bill to reauthorize the Networking and Information Technology Research and Development program. Both bills passed the House in April 2013. At the end of the last Congress, the House and Senate came to agreement on the Cybersecurity Enhancement Act, which was signed into law in December. That law improves America's cybersecurity abilities. It strengthens strategic planning for cybersecurity research and development needs across the federal government. It supports NSF scholarships to improve the quality of the cybersecurity workforce. And it improves research, development and public outreach organized by NIST related to cybersecurity. The Science Committee will continue its efforts to support the research and development essential to fortifying our nation's cyber defenses. From the theft of credit card information at retailers like Target and Home Depot, to successful attacks at Sony and on the U.S. Central Command, no further wake-up calls are necessary to understand our call to action. As America continues to become more advanced, we must better protect our information technology systems from attack. Any real solution should adapt to changing technology and tactics while also protecting private sector companies, public institutions and personal privacy. I look forward to hearing from our witnesses today and yield back. Chairwoman Comstock. If there are Members who wish to submit additional opening statements, your statements will be added to the record at this point. Chairwoman Comstock. I would also like to welcome our colleague from Washington, Mr. Newhouse, and authorize his participation in today's hearing. Okay. Now, at this time I would like to introduce our witnesses. Our first witness today is Ms. Cheri McGuire. Ms. McGuire is the Vice President of Global Government Affairs & Cybersecurity Policy at Symantec Corporation. Before joining Symantec, Ms. McGuire served as Director for Critical Infrastructure and Cybersecurity in Microsoft's Trustworthy Computing Group and as Acting Director at DHS's National Cybersecurity Division. Ms. McGuire received her bachelor's degree from the University of California Riverside and her MBA from the George Washington University. Our second witness is Dr. James Kurose. Dr. Kurose is the National Science Foundation's Assistant Director for the Computer and Information Science and Engineering Directorate. He also serves as Co-Chair of the Networking and Information Technology Research and Development Subcommittee at the National Science and Technology Council Committee on Technology. Now, do you say all that when--in one introduction? That is good. Prior to joining NSF, Dr. Kurose was a distinguished Professor in the School of Computer Science at the University of Massachusetts Amherst where he served as Chair of the Department of Computer Science. Dr. Kurose holds a bachelor's degree in physics from Wesleyan University and a Master of Science and Ph.D. in computer science from Columbia University. Our third witness today is Dr. Charles Romine, Director of the National Institute of Standards and Technology Information Technology Laboratory, or ITL. Before working at NIST he served as Senior Policy Analyst at the White House Office of Science and Technology Policy and as a Program Manager at the Department Of Energy's Advanced Scientific Computing Research Office. Dr. Romine received his bachelor's degree in mathematics and his Ph.D. in applied mathematics from the University of Virginia. Yea. Our fourth witness is Dr. Eric Fischer, who serves as a Senior Specialist in the Science and Technology for the Congressional Research Service. Prior to working for CRS, Dr. Fischer worked as a faculty member at the University of Washington in Seattle and as a Congressional Science and Technology Policy Fellow for the American Association for the Advancement of Science. Dr. Fischer received his bachelor's degree in biology from Yale and his Ph.D. in zoology from the University of California Berkeley. Our final witness is Mr. Dean Garfield, President and CEO of the Information Technology Industry Council, or ITI. Before joining ITI, Mr. Garfield served as Executive Vice President and Chief Strategic Officer for the Motion Picture Association of America and as the Vice President of Legal Affairs at the Recording Industry Association of America. Mr. Garfield received a joint degree from New York University School of Law and the Woodrow Wilson School of Public Administration and International Affairs at Princeton University. As our witnesses should know, spoken testimony is limited to five minutes each, after which the Members of the Committee will have five minutes each to ask questions. I now recognize Ms. McGuire for five minutes to present her testimony. TESTIMONY OF MS. CHERI MCGUIRE, VICE PRESIDENT, GLOBAL GOVERNMENT AFFAIRS & CYBERSECURITY POLICY, SYMANTEC CORPORATION Ms. McGuire. Chairwoman Comstock, Chairman Smith, Ranking Member Lipinski, and other Members of the Subcommittee, thank you for the opportunity to testify today on behalf of Symantec Corporation. My name is Cheri McGuire and I am the Vice President for Global Government Affairs and Cybersecurity Policy. At Symantec we are the largest security software company in the world and our global intelligence network is made up of millions of sensors that give us a unique view into the entire internet threat landscape. As I am sure you have read, most of the recent headlines about cyber attacks have focused on data breaches and the theft of personally identifiable information, including identities and credit card numbers. According to Symantec's most recent internet security threat report, over 550 million identities were exposed in 2013 alone. Yet while the focus on these breaches is certainly warranted, it is important not to lose sight of other equally concerning types of cyber activity. Attackers run the gamut and include highly organized criminal enterprises, individual cyber criminals, so-called hacktivists, and state-sponsored groups. Common attack types range from distributed denial of service, or DDoS, to highly targeted attacks, to widely distributed financial fraud scams. A DDoS attack is an attempt to overwhelm a system with data, while targeted attacks tried to trick someone into opening an infected file or navigating to a bad website. Of course, scams and blackmail schemes seeking money continue. Some will fill a victim's screen with aggressive pop- up windows that claim falsely that the system is infected. Others lock the victim's computer and display a screen that purports to be from law enforcement and demands payment of a fine for having illegal content on the computer. The most recent scheme has gone from trickery to straight up blackmail. Criminals now will encrypt or scramble all the data on your device and tell you to pay a ransom or they will erase all of it. Critical infrastructure such as the power grid, water system, and mass transit are also at risk. In June 2014 Symantec released a report about a new threat that we named Dragonfly. This was a campaign against a range of targets mainly in the energy sector, but it was not the first to target energy. As we saw in 2012, cyber attackers mounted a campaign against the Saudi Arabian National Oil Company that destroyed 30,000 computers and made them display the image of a burning American flag. Other sectors have seen attacks, too, and the German Government recently disclosed that a cyber attack on a steel plant resulted in massive physical damage. All of the attacks that I have outlined started with a common factor, a compromised computer. We frequently hear about advanced persistent threats, or APTs, but the discussion of cyber attacks too often ignores the psychology of the exploit. Most rely on social engineering, in the simplest terms, trying to trick people into doing something that they would never do if fully aware of their actions. Attack methods vary. Those spear fishing or customized targeted emails containing malware are the most common, and while good security will stop most of these attacks, which often seek to exploit older known vulnerabilities, many organizations and individuals do not have up-to-date security or properly patched operating systems. Social media is also an increasingly valuable tool for cyber criminals both to gather information and to spread malicious links. To combat cyber threats, Symantec partners with government and industry here and abroad. Working extensively with the FBI and international law enforcement, we have helped take down and dismantle some of the world's largest botnets, which has also led to charges against the criminal operators. In addition, together with Palo Alto Networks, McAfee, and Fortinet, we recently cofounded the Cyber Threat Alliance, a group of cybersecurity providers who share advanced cyber threat information. While we are competitors, we have found that there is great benefit to sharing information that will protect all of our customers and help fight cyber criminals. This model has worked well in other sectors such as banking and energy. And further, and even as important, the alliance has strict guidelines that protect our customer privacy and their proprietary information, and this of course must be included in any information-sharing regime. So what can we do? Good protection starts with a plan and strong security should include intrusion protection, reputation-based security, behavioral-based blocking, data encryption, backups, and data loss prevention tools. And while the criminals' tactics are constantly evolving, basic cyber hygiene is still the simplest and most cost-effective first step. Last week, the Online Trust Alliance found that 90 percent of last year's breaches could have been prevented if businesses implemented basic cyber best practices. At Symantec we are committed to improving online security across the globe and we will continue to work collaboratively with our partners on ways to do so. Thank you again for the opportunity to testify today and I look forward to your questions. [The prepared statement of Ms. McGuire follows:] [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] Chairwoman Comstock. I now recognize Dr. Kurose. TESTIMONY OF DR. JAMES KUROSE, ASSISTANT DIRECTOR, COMPUTER AND INFORMATION SCIENCE AND ENGINEERING (CISE) DIRECTORATE, NATIONAL SCIENCE FOUNDATION. Dr. Kurose. Thank you. Good afternoon, Chairwoman Comstock, Chairman Smith, and Representative Lipinski, and Members of the Subcommittee. I am Jim Kurose, National Science Foundation Assistant Director for Computer and Information Science and Engineering. As you know, NSF advances and supports fundamental research in all disciplines, advances the progress of science and engineering, and educates the next generation of innovative leaders. I welcome this opportunity to provide an overview of NSF-funded cybersecurity research and its impact on the nation. Long-term unclassified research is critical to achieving a secure and trustworthy cyberspace. In 2011 NSF contributed to the Administration's Strategic Plan for Federal Cybersecurity Research and Development. It specifies a coordinated research agenda for agency investments that change the game by establishing a science of cybersecurity, transitioning research into practice, and bolstering cybersecurity education and training. With the rapid pace of technological advancement, we are witnessing the tight integration of financial, business, manufacturing, and telecommunications systems into a networked, global society. These interdependencies can lead to vulnerabilities and threats that challenge the security, reliability, and overall trustworthiness of critical infrastructure. The result is a dramatic shift in the size, complexity, and diversity of cyber attacks. In response to these changing threats, NSF has long supported fundamental cybersecurity research resulting in many powerful approaches deployed today. NSF continuously brings the problem-solving capabilities of the nation's best minds to bear on these challenges. It also promotes connections between academia and industry. In Fiscal Year 2014 NSF invested $158.28 million in cybersecurity research, including $126 million in the cross- cutting Secure and Trustworthy Cyberspace program. Projects range from security at the foundational level, including detecting whether a silicon chip contains a malicious circuit or developing new cryptographic solutions, to the systems level, including strategies for securing the electric power grid. Projects are increasingly interdisciplinary spanning computer science, mathematics, economics, behavioral science, and education. They seek to understand, predict, and explain prevention, attack, and defense behaviors and contribute to developing strategies for remediation while preserving privacy and promoting usability. Projects also include center scale activities representing far-reaching explorations motivated by deep scientific questions and grand challenge problems in, for example, privacy, encryption, cloud, and healthcare systems. In addition, NSF promotes the transition of discoveries into the field as threats and solutions co-evolve over time. Partnerships continuously improve the security of our critical infrastructure ensuring U.S. leadership, economic growth, and a skilled workforce. For example, with the Semiconductor Research Corporation, NSF supports research into the design of secure hardware. With Intel Corporation, NSF invests in the security and privacy of cyber-physical systems such as transportation networks and medical devices. NSF also invests in industry university cooperative research centers that feature high-quality industrially- relevant fundamental research enabling direct transfer of university-developed ideas to U.S. industry, improving its competitiveness globally. In recent years, we have seen research outcomes lead to new products and services and to numerous startups in the IT sector bringing innovative solutions to the marketplace. Cybersecurity education is also important. For example, the Scholarship for Service program provides tuition to cybersecurity college majors in exchange for government service following graduation. To date, this program has provided 1,700 scholarships at over 50 institutions and has placed graduates in over 140 federal, state, local, and tribal government agencies. NSF participates in the interagency Networking and Information Technology Research and Development program. I serve as the Co-Chair the NITRD Subcommittee and many NSF division directors and program directors actively participate in NITRD cybersecurity and information assurance activities ensuring coordination of investments across 18 government agencies. To conclude, my testimony today has emphasized that the pace and scope of today's cyber threats pose grand challenges to our nation's critical infrastructure and that NSF continues to make significant investments in fundamental cybersecurity research. I have discussed how NSF partners with industry to advance cybersecurity R&D that will effectively address cyber threats as they evolve. I very much appreciate the opportunity for dialogue with Members of this Subcommittee on these very important topics. With robust, sustained support for foundational and multidisciplinary cybersecurity R&D in the executive and legislative branches, there is a unique opportunity to protect our national security and enhance our economic prosperity for decades to come. This concludes my remarks. I am happy to answer any questions. [The prepared statement of Dr. Kurose follows:] [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] Chairwoman Comstock. All right. Thank you, Doctor. And now we now recognize Dr. Romine for his testimony. TESTIMONY OF DR. CHARLES H. ROMINE, DIRECTOR, INFORMATION TECHNOLOGY LABORATORY, NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Dr. Romine. Chairwoman Comstock, Chairman Smith, Mr. Lipinski, and Members of the Subcommittee, I am Dr. Charles Romine, Director of the Information Technology Laboratory at NIST, and thank you for the opportunity to discuss our role in cybersecurity. In the area of cybersecurity, NIST has worked with federal agencies, industry, and academia since 1972. Our role--to research, develop, and deploy information security standards and technology to protect information systems against threats to the confidentiality, integrity, and availability of information and services--was strengthened through the Computer Security Act of 1987, broadened through the Federal Information Security Management Act of 2002, and recently reaffirmed in the Federal Information Security Modernization Act of 2014. The Cybersecurity Enhancement Act of 2014 also authorizes NIST to facilitate and support the development of voluntary, industry- led cybersecurity standards and best practices for critical infrastructure. NIST accomplishes its mission in cybersecurity through collaborative partnerships. The resulting NIST special publications and interagency reports provide operational and technical security guidelines for federal agencies and cover a broad range of topics such as electronic authentication, intrusion detection, access control, and malware. NIST maintains the National Vulnerability Database, or NVD, a repository of standards-based vulnerability management reference data, which enables security automation capabilities for all organizations. The payment card industry uses the NVD vulnerability metrics to discern the IT vulnerability in point- of-sale devices and determine acceptable risk. NIST researchers develop and standardize cryptographic mechanisms used worldwide to protect information. The NIST algorithms and guidelines are developed in a transparent and inclusive process leveraging cryptographic expertise around the world. The results are standard, interoperable, cryptographic mechanisms that can be used by all. Recently, NIST initiated a research program on usability of cybersecurity focused on password policies, user perceptions of cybersecurity risk, and privacy. This will enhance cybersecurity through increased attention to user interactions with cybersecurity technologies. The impacts of NIST's cybersecurity activities extend beyond providing the means to protect federal IT systems. They provide the cybersecurity foundations for the public trust that is essential to realizing the national and global economic, productivity, and innovation potential of electronic business. Many organizations voluntarily follow NIST standards and guidelines reflecting their worldwide acceptance. NIST also houses the National Program Office of the National Strategy for Trusted Identities in Cyberspace, or NSTIC. The NSTIC initiative aims to address one of the most commonly exploited vectors of attack in cyberspace, the inadequacy of passwords for authentication. The 2013 data breach investigations report noted that in 2012 76 percent of network intrusions exploited weak or stolen credentials. NSTIC is addressing this issue by collaborating with the private sector, including funding 13 pilots, to catalyze a marketplace of better identity and authentication systems. Another critical component of NIST cybersecurity work is the National Cybersecurity Center of Excellence, or NCCoE, a partnership between NIST, the State of Maryland, Montgomery County, and the private sector. NCCoE is accelerating the adoption of applied, standards-based solutions to cybersecurity challenges. The NCCOE is now supported by the nation's first federally funded research and development center dedicated to cybersecurity. Through NCCoE, NIST works directly with businesses across various industry sectors on applied solutions to cybersecurity challenges with current activities addressing the healthcare, financial services, and energy sectors. Almost one year ago NIST issued the Framework for Improving Critical Infrastructure Cybersecurity in response to Executive Order 13636. The framework, created through collaboration between industry and government, consists of standards, guidelines, and practices to promote the protection of critical infrastructure. The framework is being implemented by industry and adopted by infrastructure sectors to reduce cyber risks to our critical infrastructure. As the cyber threats and technology environments evolve, the cybersecurity workforce must continue to adapt so as to continuously improve cybersecurity, including in our nation's critical infrastructure. In 2010, the National Initiative for Cybersecurity Education was established to enhance the overall cybersecurity posture of the United States by accelerating the availability of educational, training, and workforce development resources designed to improve the cybersecurity behavior, skills, and knowledge of every segment of the population. As the lead agency for this initiative, NIST works with more than 20 federal departments and agencies, industry, and academia to raise national awareness about risks in cyberspace, broaden the pool of individuals prepared to enter the cybersecurity profession, and cultivate a globally competitive cybersecurity workforce. NIST recognizes our essential role in helping industry, consumers, and government to counter cyber threats. We are extremely proud of our role in establishing and improving the comprehensive set of cybersecurity technical solutions, standards, guidelines, and best practices, and the robust collaborations with our federal government partners, private sector collaborators, and international colleagues. Thank you for the opportunity to testify today on NIST's work in cybersecurity. I would be happy to answer any questions that you may have. [The prepared statement of Dr. Romine follows:] [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] Chairwoman Comstock. Thank you, Doctor. And now I recognize Dr. Fischer for his testimony. TESTIMONY OF DR. ERIC A. FISCHER, SENIOR SPECIALIST IN SCIENCE AND TECHNOLOGY, CONGRESSIONAL RESEARCH SERVICE Dr. Fischer. Good afternoon, Chairwoman Comstock, Chairman Smith, Ranking Member Lipinski, and distinguished Members of the Subcommittee. On behalf of the Congressional Research Service, thank you for the opportunity to testify today. I will try to put what you have heard from previous witnesses in context with respect to both long-term challenges and near-term needs in cybersecurity and the federal role in addressing them. The technologies that process and communicate information have become ubiquitous and are increasingly integral to almost every facet of modern life. These technologies and the information they manage are collectively known as a cyberspace, which may well be the most rapidly evolving technology space in human history. This growth refers not only to how big cyberspace is but also to what it is. Social media, mobile devices, cloud computing, big data, and the internet of things-- these are all recent developments and all are increasingly important facets of cyberspace. It is difficult to predict how cyberspace will continue to evolve but it is probably safe to expect the evolution to continue for many years. That is not to say that all of cyberspace has changed. Basic aspects of how the internet works are decades old, and obsolete hardware, software, and practices may persist for many years. All of this makes the cyberspace environment a daunting challenge for cybersecurity. Three other major challenges relate to design, incentives, and consensus. Building security into the design of cyberspace has proven to be difficult. The incentive structure within cyberspace does not particularly favor cybersecurity, and significant barriers persist for developing consensus on what cybersecurity to involves and how to implement it effectively. No matter how important such challenges are, they do not diminish the need to secure cyberspace in the short-term. That includes reducing risk by removing threats, hardening vulnerabilities, and taking steps to lessen the impacts of cyber attacks. It also includes addressing needs such as reducing barriers to information-sharing, building a capable cybersecurity workforce, and fighting cybercrime. Federal agencies play significant roles in addressing those near-term needs and meeting the long-term challenges. Under the Federal Information Security Management Act, known as FISMA, all federal agencies are responsible for securing their own systems. Private-sector contractors acting on behalf of federal agencies must also meet FISMA requirements. In Fiscal Year 2013, federal agencies spent $10.3 billion on those activities, about 14 percent of agency information-technology budgets. federal agencies also have responsibilities for other cybersecurity functions. Research and development, along with education, are the two probably most focused on addressing long-term challenges. Others, such as technical standards and support, law enforcement, and regulation, focus more on meeting immediate needs. You have already heard about NIST and NSF. Among other agencies, the Department of Energy supports cybersecurity efforts in the energy sector. Several of its 17 National Laboratories also engage in cybersecurity R&D and education. The Department of Defense, in addition to military operations, also engages in cybersecurity R&D and education. Altogether, DOD agencies account for more than 60 percent of reported federal funding for cybersecurity R&D. The Department of Homeland Security fulfills several cybersecurity functions. In the Science and Technology Directorate, the Cybersecurity Division focuses on developing and delivering new cybersecurity technologies and other tools. The Department spent $75 million on cybersecurity R&D in 2013, more than DOE and NIST but also less than NSF and much less than DOD. Another department responsibility is coordinating the operational security of federal systems under FISMA. The department also plays a significant role in law enforcement but perhaps is best known for coordinating federal efforts to improve the security of critical infrastructure, most of which is controlled by the private sector. Most private-sector department activities are voluntary, but the department also has some regulatory authority over the transportation and chemical sectors. Several other agencies also have regulatory responsibilities relating to cybersecurity in the 16 recognized critical infrastructure sectors. The role of federal regulation in cybersecurity has been a significant source of controversy, along with how to remove barriers to information-sharing while protecting proprietary and personal information, and the proper roles of different federal agencies in various cybersecurity activities. That concludes my testimony. Once again, thank you for asking me to appear before you today. [The prepared statement of Dr. Fischer follows:] [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] Chairwoman Comstock. Thank you. I now recognize Mr. Dean Garfield. TESTIMONY OF MR. DEAN GARFIELD, PRESIDENT AND CEO, INFORMATION TECHNOLOGY INDUSTRY COUNCIL Mr. Garfield. Thank you, Chairwoman Comstock, Chairman Smith, Ranking Member Lipinski. On behalf of 60 of the most dynamic and innovative companies in the world that make up the global IT sector, I would like to thank you for the opportunity to be in front of you today and to thank you as well for focusing on this issue. We think it is an issue that has the potential for bipartisan collaboration and want to seize that opportunity. With that in mind, I would like to focus on three things: 1) how we are experiencing the cybersecurity threat today; 2) what we are doing about it; and then 3) how Congress can help. With regard to the first, as Dr. Fischer pointed out, we are living in an increasingly globally integrated and interconnected world. As a result, cyber criminals are seeking to exploit that. Gone are the days when we had intermittent viruses and instead we face a world, as my colleague Cheri McGuire pointed out, where we consistently face a threat that is increasingly global, increasingly sophisticated, and increasingly persistent. We are seeing advanced persistent threats where cyber criminals are penetrating our networks in phase, avoiding detection, and doing damage over a long period of time. As well, the threat is increasingly asymmetric and so the risks to the banking sector are often quite distinct from the risks to the manufacturing sector or the tech sector. The reality is there is no silver bullet solution so what are we doing about it? In a word, a lot. Increasingly, our approach is based on risk mitigation and resilience. You see that both in the products that we are bringing into the marketplace, as well as the processes that we are integrating into our businesses. With the products in the marketplace, you are already seeing the results of the billions of dollars that we spend on R&D, whether that is through advanced data analytics that is allowing us to get ahead of cyber criminals or in the integration of biometrics, as you see in many of your mobile devices today, including your cell phone, which are all making a difference. In addition to the work that we undertake with our products that are making their way into the market, we are making changes in our business processes that we would advocate for all businesses generally. One, we are increasingly making cybersecurity the default norm, so rather than turning on a cybersecurity feature, we are building products and developing systems where they come as a built-in part of the practice. Secondly, we are increasingly relying on managed services. So rather than relying on the IT person who may or may not know anything about cybersecurity, we are relying heavily on cybersecurity professionals in carrying out work on cybersecurity within our company in network management. As well, we are making sure that cybersecurity is a part of every aspect of our business, and with that in mind, it is worth commending NIST for the work that they have done on the cybersecurity framework, which has done a great job in making that the case for both large and small businesses. So what can Congress do? There are four things that we would recommend. One is making sure that the laws that are on the books and our enforcement of those laws are adequate to meet the challenge and the evolving nature of that challenge that we face today. Second, as all of the doctors on the panel have pointed out, it is important to have adequate funding for early-stage research, as well as for the work that NIST is doing to advance a framework to make it increasingly the norm for all businesses. Third, it is important that we have legislation that helps us to disseminate cyber threat information more broadly. That is an opportunity for a bipartisan consensus in action and we hope that Congress will act on that this year. Fourth, cybersecurity and cybersecurity risk management is not a technology issue; it is a national issue, and so it is important that all of us, including the Members of Congress, take advantage of the bully pulpit we have to educate the public about cybersecurity. So when you have your roundtables in your district, or I speak, it is important to include cybersecurity as one of the default points that we share with the public. There is--the challenge, as all of the panelists have pointed out, is quite significant, but if we take advantage of those four steps and work collaboratively, we think there is an opportunity to make significant headway in addressing this issue. So thank you. [The prepared statement of Mr. Garfield follows:] [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] Chairwoman Comstock. I thank the witnesses for their testimony and now the Committee rules limit our questioning to five minutes and so as the Chair I will do the opening round of questions. So actually I would like to pick up on your four points, Mr. Garfield, but have you all address. Given it is a national issue, what would you recommend that we, when we go home, that we tell people how to--you know, at our town halls, how to engage, what they can do personally at home and maybe some of these 90 percent of the breaches that we can prevent, what can we do with the public education to prevent those most common? Mr. Garfield. I can start and do something quite simple, which is you have heard a lot of data around the risk that we all present because oftentimes cyber breaches are caused by human error, and so making sure that we are using multilevel authentication, for example, so not just relying simply on a password. To the extent that your technology isn't deploying cyber as a default, turning it on so that you have the benefit of all the research and development that is taking place. The other thing that I would say is we often make common mistakes. You know, we post our passwords on our computer, and so moving away from doing things like that makes us vulnerable is an impostant part of---- Chairwoman Comstock. Sort of like don't leave the keys in the car. Mr. Garfield. Exactly. Chairwoman Comstock. Okay. Ms. McGuire. So there are a couple of additional things that I will add to Dean's list. The first is make sure that you are using very strong and complex passwords. You have heard a lot about the research and development going on today both within the NSF and NIST around new authentication methods and password technology but this is one of the most basic things that people can do today. Be careful when you are developing your passwords not to use things that you have posted on your social media site. What an easy way to socially engineer your password. Also make sure that you keep your security products and your systems up-to-date, keep them patched, and that will help give you quite a bit of protection, and then be aware-- always be aware. Just as you are walking down the street, being aware of your surroundings, be aware of your surroundings when you are online. Be careful about accepting emails or clicking on attachments for things that you may not be sure of what they are and be very aware of that because that is the most common way of getting your computer infected is clicking on something that maybe you shouldn't have. Chairwoman Comstock. Any--sure. Dr. Kurose. Yes. I would like to just raise two quick points. First, in terms of what we do, certainly a sustained investment in fundamental research is incredibly important, but we need to really focus on the root causes of cybersecurity challenges, not just treating the symptoms. I mean we do need to do both but I think the need for fundamental research is critical. And something that I think you have heard all the panelists talk about is that it is a socio-technical problem. Technology alone is not going to solve the problem. It is technology together with the correct application and the understanding of the human dimension and the social dimension of security is very important. Chairwoman Comstock. And then maybe to all of you again, how do you, as you gather this expertise and we constantly have to adapt and change, how do you prevent the person who is working with your company or working within the government today, kind of catching the bad guys and catching the cyber threats and the hacktivists, from not turning into the bad guy who is now going out with that knowledge and doing that and how do we prevent that and what kind of safety measures and processes do we have to have in place in the public sector and the private sector? I know that is pretty broad but---- Dr. Romine. Well, certainly I can--the insider threat is one of the most challenging things to address principally because, by definition, you are talking about someone that you view as a trusted entity so you have to be very cautious about demonstrating that you don't trust your own people, so you have to be very careful about that. From our perspective I think we are coming to a situation where increasingly we have more tools at our disposal to do the data analytics for some of the things that are going on within an organization, and there are opportunities to detect anomalous behavior that might reveal that kind of insider threat. Ms. McGuire. And I would just add to that that there are technologies out there today such as data loss prevention technologies, setting your controls appropriately within corporations and governments that will allow you to see how data traverses your network and actually alarm and trigger when your data is moving to places that it shouldn't be. So those are technologies that are very much available today and could in fact prevent a lot of bad things from happening. Chairwoman Comstock. Okay. Thank you. Thank you. And now I recognize Mr. Lipinski for five minutes. Mr. Lipinski. Thank you, Madam Chairwoman. I want to thank the witnesses for their testimony and I just want to pick up on one thing that we were discussing in the Chairwoman's questions is that Dr. Kurose talked about--he said it was a socio- technical problem in terms of security, and I think that points out the importance of social science research that is done to help us better understand and to teach people how to, you know, avoid stepping into these--a lot of these cyber problems and being victims of cyber crimes. But I wanted to--my first question I wanted to ask Dr. Kurose, Dr. Romine, and Dr. Fischer. For years we have heard from nongovernmental experts about weaknesses in interagency coordination of cybersecurity R&D. The civilian agencies with cybersecurity research programs developed a federal cybersecurity R&D strategy in December 2011. As I noted in my opening, the Cybersecurity Enhancement Act that passed last month strengthened interagency coordination in this area. And I know the Cybersecurity Enhancement Act is very new so there may or may not be anything much you can say about that. But I want to also ask how the--how has the federal R&D strategy influenced your own agency's cybersecurity R&D portfolio and how has it strengthened interagency coordination and collaboration. Dr. Kurose? Dr. Kurose. Thank you. I would like to just quickly mention then the Networking and Information Technology Research and Development program, NITRD, that we talked about a little bit earlier. This provides an interagency coordination mechanism and there are specific subcommittees there, one on cybersecurity and information assurance, and that is a vehicle by which representatives from multiple agencies can get together and activities can be coordinated. And one of the co- chairs from the cybersecurity subcommittee there is from the National Science Foundation and the activities there very much find their way back into our discussions at the National Science Foundation. Mr. Lipinski. Thank you. Dr. Romine? Dr. Romine. Yes, I would like to echo what Dr. Kurose said about the value of having a standing interagency working group on cybersecurity and information assurance. That is one of the more robust groups I think under the NITRD program and there is a lot of conversation that takes place across federal agencies and a lot of coordination around specific topics. There have been some strategic planning activities in the past that the interagency working group has undertaken. The agencies among the NITRD program established a senior steering group in this arena to bring together more senior people who have budget authority within their organizations to coordinate some of the investments that are being made, and so I think that has paid dividends, in particular, the emphasis on the science of cybersecurity emerged from that conversation that was taking place. Mr. Lipinski. Dr. Fischer. Dr. Fischer. I would just like to add that certainly I think if one looks at the history of coordination across federal agencies with respect to cybersecurity, clearly there have been--that has increased. One of the questions one has to keep in mind is that coordination also has some cost associated with it. That is to say one doesn't want--potential costs I should say. One doesn't want the coordination to reduce the ability of individual agencies to invest in, you know, consensus mission goals and so that has to be taken into account. And sometimes for somebody like us looking at, you know, trying to analyze some of the interagency documents, it can be a little difficult to figure out exactly what they mean just because it is relatively complicated. Mr. Lipinski. Thank you. And I want to ask Mr. Garfield and Ms. McGuire, anything quickly you could add about your view of federal cybersecurity R&D, something else that--anything else that should be done, done differently? Ms. McGuire, Mr. Garfield, whoever wants to---- Mr. Garfield. I wouldn't necessarily suggest that something different has to be done. I think there is research that has to occur in early stages that have impact over the long-term that the public sector is well-positioned to do, and so making sure that there is adequate funding for that innovation and R&D to occur so that we can stay ahead of the cybercriminals is critically important. Mr. Lipinski. Thank you. I yield back. Chairwoman Comstock. Thank you. I now recognize Mr. Hultgren for five minutes. Mr. Hultgren. Thank you, Chairwoman. Thank you all for being here. This is obviously a very important subject for us and have--I have got a lot of questions in a lot of different directions. But first, I would like to just get a little bit of a response from you. There was some mention--I think Dr. Romine mentioned about passwords and effectiveness of passwords. It seems like there was a lot of nodding heads going on with that. To me it seems like passwords are very effective of keeping me off my own computer because I keep forgetting them. I am wondering if there could be a way that the hackers could remind me of my passwords because I keep forgetting them. But I wonder if you could talk just a little bit more about that, of what is the next step, what is the research, where are we at on that? Specifically, is there R&D that holds promise for a better option or solutions in passwords? Chairwoman Comstock. Great question. Dr. Romine. Absolutely. I can talk from the NIST perspective. We have started a program on what we call the usability of security, and usability is a scientific discipline, a quantitative discipline to determine--our mantra in this case is we want to make it easy to do the right thing, hard to do the wrong thing, and easy to recover when the wrong thing happens anyway. Those are the three principles that I like to talk about. By the way, I shamelessly stole that from a colleague. Mr. Hultgren. It is a good one. Dr. Romine. From our perspective, we now have research results suggesting exactly as you say. We have had, for years, anecdotal evidence suggesting that passwords just don't work. We have been able to collect validated data now suggesting that when you make passwords more complex, which you have to do because if they are easy, if they are simple, then they are guessable. But if you make them too complex, then people find ways around of the security by writing them down, by storing them in plain text files and so on. So it is really sort of counter--it can be counterproductive. The NSTIC program that NIST manages, which is a nationwide program where we have the program office, is pledged to essentially deal with this authentication problem. Password is only one way of authenticating to the system, and it is, as we know, now a pretty poor way to do it in general and yet it is ubiquitous. It is universal. And the NSTIC program is pledged to, as they say, put a stake in the heart of the password. We are trying to transition to other means but---- Mr. Hultgren. What is your guess on when that could happen? I mean what is a timeline, possible time frame? Dr. Romine. Well, the investments that have been made in pilots, and we have 13 pilots running now, sort of span from, you know, authentication through a mechanism, a token, through biometrics, through two-factor authentication I think, as Dean alluded to earlier, or as Dr. Fischer alluded to. So I don't know the exact timeline. I know that we are making strides in that area, we are making investments, and we are making it clear that we have now validated evidence that passwords are flawed as a mechanism for authentication. Mr. Garfield. Some of those technologies are already in the marketplace. I think Ms. McGuire made the point as well. I mean many of the mobile devices that are being sold today do have biometric authentication instead of passwords, and so increasingly that is being deployed commercially. Mr. Hultgren. Okay. Dr. Kurose. So if I might add that I think you really hit the nail on the head. Passwords are something that we all have to wrestle with and I think research has shown that a one-size- fits-all approach isn't really a good way to proceed forward. There has been work that looks at trying to adapt the kinds of authentication that a system is going to use to determine who the individual is; there is a research project at Berkeley going on, and also some very interesting research that went on at Carnegie Mellon about passwords in particular. Is it length, is it complexity--what are the best ways to have users work with passwords when you have password-protected systems, and then how do you feed information back to the user to help the user along? Mr. Hultgren. Let me switch gears real quick. As a parent, I am amazed at how quickly young people pick up on new technology. I have seen in my own office when I struggle with a new technology, I call my staff and leave them a voicemail message, wait for them to get back to me. If they can't figure it out, they text my kids and get an answer right away. But with the access kids have, there is also concern that comes with that and I just wonder if you could talk briefly about current parental control technology. Is it adequately protecting minors? I still have a 10-year-old and 13-year-old at home, as well as older kids, but concerned certainly of protection but then also something that predators are coming after them, not waiting for them to find problem areas. So I wanted to just get your thoughts of how adequate this is and what is happening there. Ms. McGuire. So I will jump in on this one. Mr. Hultgren. Thanks. Ms. McGuire. So online child safety is a critical concern that all of us have, and particularly, as you mentioned, as kids are surfing and going everywhere, it is really hard to monitor that as a parent so there are tools available. Certainly we have them in our Norton Security products. Other products out there have--give the parent to the ability to go in and type in keywords, block certain websites, and so forth. So those are there today. Mr. Hultgren. Do you feel like they are pretty effective in---- Ms. McGuire. Our customers tell us that they are effective and so we believe that they help significantly that--there. The other part of this, though, and it goes to this socio- technological issue, is we have to start with our kids when they are first picking up a device and start training them to be careful, to be aware online, to be safe online. It has got to start immediately and also we need to include that in our school curriculum. You know, we teach kids in general safety but we don't often teach them about cybersecurity, so that is a big area that can help. Mr. Hultgren. I see my time is up. Thank you, Chairwoman. I appreciate your generosity. Chairwoman Comstock. Thank you. And I now recognize Mr. Moolenaar, our Vice Chairman. Mr. Moolenaar. Thank you, Madam Chair. And I appreciate the testimony today. I also wanted to follow up on some of the areas of cybersecurity with respect to our critical infrastructure, and you had mentioned earlier, you know, the area of energy, our electric grid, I would think water, our water supply. And I guess my basic question is what is the role of research in this area? How important is that? And also, if there is research done and that is applied, how much time is it good for? Is this something that, you know, it lasts for a year? Is it something--you know, what is the length of duration that information is valid? Dr. Romine. So I would like to talk to the first half of that question on the protection of critical infrastructure. This is something that NIST was called upon to do in the development of the framework under the Executive Order 13636. And the way that we approached that was to hold a series of workshops around the country with the vigorous participation of industry across all of the sectors, as well as the information technology industry itself, and I know Ms. McGuire's company and Mr. Garfield's, the companies that he represents were also vigorous participants in that process. That led to a consensus document that was spearheaded principally by the private sector but with our sort of guidance with regard to what is effective as a document. So we were able to put together a framework that I think really helps to improve--or has the potential to help improve critical infrastructure cybersecurity and I think it is beginning to have that effect. Mr. Garfield. And if I may add, I think the approach that was taken by NIST in putting that together is really a model for undertaking this work. Related to the second question you asked about the time period, it is important to keep in mind that cybersecurity criminals are always adapting and evolving and so it's important that we continue this work and continue to evolve it as well. Dr. Kurose. So I would like to add also the notion of ``security by design'' rather than reacting to particular threats--designing security is really a first-class consideration and the systems that we are building and the components in the system that we are building are critical. I would point out--I had mentioned the collaboration NSF has with the Semiconductor Research Corporation. There the notion is that the chips that we are building we want to be able to make sure that there haven't been back doors or other malware actually inserted into the chips during the fabrication process and during the design process, so that when those chips come out we are sure that they are going to act and behave the way they are supposed to be behaving. That is an instance of security by design. The other point I would make is critical infrastructure, it is not just social networks that affect society, but personal devices like medical devices as well, so a lot of activity is going on there also. Dr. Fischer. If I could just add that with respect to the question of what kinds of R&D is needed, there are many different aspects to protecting critical infrastructure--for example, control systems which we really haven't talked about today, many of which have been very much a legacy and not really designed with security in mind. And so R&D to determine what the best way is to design control systems so that they work in a highly connected environment is important. The question of to what degree you can actually separate out critical infrastructure systems from the rest of the internet is important. And also worth noting, as some of the other witnesses have mentioned, is the importance of social and behavioral research in determining what are the best ways for operators to help protect critical infrastructure. Mr. Moolenaar. I guess just one final question also is when you are working on something like this in the area of critical infrastructure, let's just say in the electric grid, how--and this gets to the question of oversight, collaboration with different agencies. You have got, you know, Homeland Security involved, you have the energy--FERC. I mean is that something that is--are you collaborating industry by industry? Dr. Romine. The workshops that we undertook were in general inclusive of many different sectors. However, we have had conversations with sector-specific groups as well, and in fact, the output, the actual document or the framework itself is reliant upon much of the input that we got from these regulated sectors, including the regulators themselves who showed up at the workshops and gave us input on what could be valuable for them. Mr. Moolenaar. Okay. Thank you, Madam Chair. Chairwoman Comstock. Thank you. I now recognize Mr. Newhouse for five minutes. Mr. Newhouse. First of all, thank you, Madam Chair, for allowing me to sit in on your Committee. You know, as a freshman, we had the opportunity for several sessions on cybersecurity at our orientation retreats. We learned just enough to be concerned and not enough to know what to do about it and so I appreciate the opportunity to sit here. In fact, in one of those sessions, just an hour before we sat down, my wife called me and told me someone was using our Visa card in Texas. We hadn't been to Texas in several years so we were concerned about that. So I have a couple questions and just real quickly and I know that we are probably going to be leaving for the Floor shortly, but, first of all, last week--and since you read it in the paper it must be true--the Associated Press reported at least 50 data-mining companies are allowed to perch on the HealthCare.gov website and access personal information entered by millions of Americans who come to the website for health insurance. As you know, these data-mining companies scour the internet constantly for all kinds of information about us. Without permission or consent from those who are being spied on, they sell that information to any number of people. So perhaps Dr. Romine and Ms. McGuire, first Dr. Romine, does the NIST Cybersecurity Framework contemplate that, that a federal agency would be certified and then allow scores of data-mining companies to set up shop at a website like that and collect sensitive information? Dr. Romine. It certainly does not address that very specific issue. What it does address, however, is privacy considerations in a more general context. And I think one of the things that the Framework spells out is the need for companies who are setting up cybersecurity risk management structures within their company, whether it is a 10-person company or whether it is a multibillion-dollar, multinational corporation, that they have to ensure that privacy considerations are taken into account and there are guidelines for how to do that. So I don't have any remarks to make on the specific issues in this case, but in general, the Framework does have a pretty strong statement about privacy, and NIST has embarked on a privacy engineering research activity partly as a result of what we learned from the Framework process, that there needs to be more guidance and more tools available for people to promote privacy considerations. Mr. Newhouse. And, Ms. McGuire, if you could comment on the presence of so many of those data-mining companies and whether or not that makes the website more vulnerable to attacks. Ms. McGuire. So I can't obviously speak to the specifics of the technology of what is being used as I am not intimately familiar with the HealthCare.gov website. I do find it surprising, though, that there are that many additive websites or technologies that are able to access the data. Certainly opening up the network, that would indicate that it would provide some additional vulnerability but I don't know all the specifics so---- Mr. Newhouse. Fair enough. Yeah. Then if I may, one last question, Madam Chair. And perhaps again, Ms. McGuire and perhaps Mr. Garfield, business sectors that may be most vulnerable to cyber attack and, you know, we are in Congress looking at what role government could or should play in helping protect businesses from cyber threats, could you help us a little bit, enlighten us there? Ms. McGuire. Sure. So I talked briefly about what some of our telemetry tells us about specific sectors and what--the ones that are most targeted for attacks. Interestingly enough, public sector entities, government institutions because they are such a wealth of knowledge and information. From Social Security identity numbers, all the way to healthcare to retirement benefits, these public sector websites and data repositories clearly are targeted at a very high rate. Also, we see the banking and finance sector, pretty much anywhere that you are going to have a rich set of data, that is where the cyber criminals will target. And happy to provide and follow up but we have a pretty good list of sort of a ranking of the most targeted sectors that we see from our global telemetry. Mr. Newhouse. Maybe what can we do about that? Mr. Garfield. Yeah, the one thing I would add is related to that. The reality is that criminals are looking for vulnerabilities wherever they can find them, and so to the extent that we can figure out ways of sharing the threat matrix more broadly, then I think it would be a great assistance to us. And there is already movement in Congress around advancing legislation that would deal with the sharing of cyber threat information. Passing that legislation is one very concrete thing that I think you could do in the short term. Mr. Newhouse. Thank you. Mr. Garfield. You are welcome. Mr. Newhouse. Thank you, Madam Chair. Chairwoman Comstock. Thank you. I just had one. I think we have votes so we may not get to a second round but I did have one question I wanted to follow up on. Do you see attacks sort of--the Christmas holidays and the opportunity for financial attacks, is that a time to sort of flood the zone and have attacks--like I usually would get called--like the gentleman said, they call, hey, are you in Hawaii buying such and such? Like no, that is not me, don't okay it. But I had a situation where after Christmas I show up in a store, my card has a problem in a department store and they said we have--we see something that you had $7,000 worth of cosmetics that you sent to California right before Christmas. No, we didn't do that. But they had not called me, which got me thinking do they target that sort of Christmas time, that rush time because they know sort of in their rush to get things through, that may be the time they weren't calling people? In this case it was the 23rd, the 24th, and the 26th but all those things were purchased and shipped. Fortunately, they took them off the card before they showed up at my home and horrified everybody but---- Ms. McGuire. Yeah, so your observation is spot on in that cyber criminals will take advantage of any social activity, any major events. We saw, for example, around the Summer Olympics we saw lots of new types of scams associated with that, the World Cup, lots of new scams with that. Even the royals wedding in the U.K., there were a plethora of new online scams that were built around that knowing that people would be searching and going to websites to look up these types of current events. So, yes, in short those international events, major national holidays, et cetera, do create additional levels of risk. Chairwoman Comstock. So in terms of best practices, those kind of things should be--set off bells or time frames so that we are doing extra work in those time frames? Ms. McGuire. Yeah. You should be careful all of the time but those especially can be more intense if you will. Dr. Fischer. I should mention that this relates certainly to cybercrime aimed at consumers, but there is also the question about timing of cyber attacks aimed at, say, critical infrastructure, and one of the sort of hallmarks of cyber criminals who are interested or spies who are interested in, say, getting proprietary information, intellectual property information, national security secrets, or whatever is that they will try to target a system in such a way that they can get in, exfiltrate the information, and then get out without anybody knowing. So it is common--one of the sort of common assessments is that businesses can often take months before they actually realized that they have been the victim of a successful cyber attack and it can just take hours to exfiltrate the information. So to a certain extent, with respect to--as I say, it really depends on the importance of the timing really depends on what the sector is that is being targeted. Mr. Garfield. If I could add, too, just some things that Congress can do very concretely around this question, one is making sure that there adequate resources to address the criminals, right, because if it is viewed as a crime without a penalty, then people will be incentivized to continue to do it. The second is you make the point that you would normally--in the normal course be warned about it, but during that period of time, it wasn't, making sure that there are adequate resources around R&D so that the technologies that are being deployed that detect abnormal behavior are widely distributed. And so those are two things that Congress can do that can be helpful in this area. Chairwoman Comstock. And then how do we--because, you know, the concerns of privacy, you know, people--you always appreciate when you get that phone call but then the next question is, well, how do you know where I am and what I am buying? It gives people a bit--but obviously in this case I was lucky they took it all off my credit card. You know, how do they balance that? Ms. McGuire. So today there are mostly algorithms that are all predominantly---- Chairwoman Comstock. Right. Ms. McGuire. --done by the machines themselves to catch those exact kinds of flags if you will of unusual behavior or unusual activity. And then of course you end up getting a phone call from a real person hopefully to---- Chairwoman Comstock. So part of the public education that we do with the public is we need to separate the algorithms and the patterns that you are looking at there are separate from, say, when Google is getting all of our HealthCare.gov information. So there--these are two--they often get lumped together whereas it is two very separate things. This is the machine kind of going through data, not looking at what I am buying at the department store, just flagging things as opposed to somebody getting my data and knowing when I am on a particular site and that getting pushed out somewhere. So those are two very different types of situations, right? Mr. Garfield. You could have a whole hearing around data analytics. I am not suggesting--necessarily suggesting it but you make a very good point that often people will hear big data or data analytics and think that it is personal to them. In almost all instances what is happening, there are computers that are looking at patterns and then not looking at individuals or individual data, and based on normal patterns, then passing that on to someone else. And so in this instance and in most instances it is actually an advancement that we want to see because in the end it helps us in society. Chairwoman Comstock. Right. Thank you. And, Mr. Lipinski, did you have additional questions? Mr. Lipinski. Yeah, thank you, Madam Chair. I think this will be probably quick. I just wanted to get back to HealthCare.gov, and my understanding is that companies are not actually perched on the HealthCare.gov but they are receiving--they are being given data from there. Now, that is very different. It is still, I understand, a privacy issue, which is something certainly Congress can look at that, but as Mr. Garfield was talking about data analytics, that is a whole different issue, certainly something that, you know, we should be always concerned about privacy. But I want to ask Dr. Romine, HealthCare.gov is FISMA- compliant. Could you just tell us what that means, what the FISMA standards are and how federal agency computer systems are--become FISMA-compliant? Dr. Romine. Sure. The Federal Information Security Management Act, or FISMA, provides NIST the opportunity to develop a collection of standards and guidelines that are used by federal agencies to secure their information systems. We do that in a collaborative way with private sector involvement to try to understand exactly what the right approach is for securing those systems. What we don't really have very often is insight into that because we don't have an operational role; we have a guidance role. We don't have insight into how federal agencies are doing--are complying with FISMA requirements or FISMA guidelines. And so in the case of HealthCare.gov, for example, I have no direct information about the actual implementation of the FISMA guidelines but it is predicated on taking cybersecurity in a risk management approach, in an analogous way to what we did with the framework for critical infrastructure cybersecurity improvement. And so the idea is to identify the risks associated with the system and a catalog of risks and a catalog of mitigations to adopt steps that are necessary to mitigate those risks and then assess the level of risk that the individual organization that is appropriate for that organization or for that particular system. So that is the approach that is taken, but as I say, with regard to any specific agency, it is really the CIO responsibility along with the Inspector General who follows up on ensuring that the guidelines are met. Mr. Lipinski. Thank you very much. I don't want in any way my statements or questions to suggest that everything is wonderful with HealthCare.gov or especially the D.C. website, which was completely atrocious once again for the second year in a row as we had to deal with that being in the system this year. But I think the important thing is looking here at security and, you know, we--as I said, privacy is another issue but the security is something that I think we have talked about here and had hearings here and have not found any issues with that. So thank you very much. Chairwoman Comstock. Okay. I believe, Mr. Newhouse, you wanted an additional question? Mr. Newhouse. Well, I certainly could. We could talk about some of these things for a long time but I guess following up a little bit, Dr. Romine--and I hope you don't feel picked on today, but---- Dr. Romine. Quite all right. Mr. Newhouse. --that is the risk you take. Dr. Romine. That is right. Mr. Newhouse. You do play an important role, though, with regard to FISMA and it is--you talked a little bit about that role in your work up-to-date. I just wanted to know if there are any recommendations that you might have that would be valuable to us in any changes to the law? Dr. Romine. Well, certainly I don't have any changes to the statutes to recommend. I would--it will at least give me the opportunity to thank this Subcommittee and the Committee for the work that we have done collaboratively. We have had a really good working relationship between NIST and the Subcommittee and Committee over time and we appreciate that. I think we are in a good spot with regard to a few things. One is the FISMA risk management framework is really an important--it provides an important understanding of the appropriate balance between ensuring the ability of the private sector to innovate in this space and provide new services while at the same time maintaining an overall approach that balances that against the associated risks. And because the information technology space is so dynamic, the risk management framework is also very adaptive and dynamic as well. And so I think it is the appropriate mechanism. I appreciate the support. Mr. Newhouse. And the Congress must be just as dynamic then? Dr. Fischer. If I may just mention with respect to FISMA implementation, the last Congress enacted, as was mentioned, the Federal Information Security Modernization Act of 2014, and that act gave statutory authority to DHS for some operational aspects of helping to ensure that agencies have adequate cybersecurity. The Obama Administration had administratively delegated it, but previous to that the responsibilities lay entirely with OMB, which doesn't have operational capabilities. So it remains to be seen to what extent the changes in the law will lead to improvements in agencies' cybersecurity. Certainly DHS has a number of programs and activities that are aimed at that. Chairwoman Comstock. Okay. Well, I want to thank the witnesses for their very valuable testimony and we so appreciate all of your expertise, both the public sector and the private sector, and all that you are doing to bring that information to us and to the public, and we look forward to continuing to work with you. And I thank all the Members for their questions. And I do want to note that the record will remain open for two weeks for additional comments or any information you would like to provide and any written questions from the Members. So the witnesses are now excused and this hearing is adjourned. Thank you very much. [Whereupon, at 3:28 p.m., the Subcommittee was adjourned.] Appendix I ---------- Answers to Post-Hearing Questions [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] [all]