diff --git "a/data/CHRG-108/CHRG-108hhrg23174.txt" "b/data/CHRG-108/CHRG-108hhrg23174.txt" new file mode 100644--- /dev/null +++ "b/data/CHRG-108/CHRG-108hhrg23174.txt" @@ -0,0 +1,4321 @@ + +
+[House Hearing, 108 Congress] +[From the U.S. Government Publishing Office] + + + + + HOMELAND CYBERSECURITY AND DHS + ENTERPRISE ARCHITECTURE BUDGET + HEARING FOR FISCAL YEAR 2005 + +======================================================================= + + HEARING + + before the + + SUBCOMMITTEE ON CYBERSECURITY, + SCIENCE, AND RESEARCH AND + DEVELOPMENT + + of the + + SELECT COMMITTEE ON HOMELAND SECURITY + HOUSE OF REPRESENTATIVES + + ONE HUNDRED EIGHTH CONGRESS + + SECOND SESSION + + __________ + + MARCH 30, 2004 + + __________ + + Serial No. 108-44 + + __________ + + Printed for the use of the Select Committee on Homeland Security + + + Available via the World Wide Web: http://www.access.gpo.gov/congress/ + house + + + __________ + + U.S. GOVERNMENT PRINTING OFFICE +23-174 WASHINGTON : 2005 +_____________________________________________________________________________ +For Sale by the Superintendent of Documents, U.S. Government Printing Office +Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; (202) 512�091800 +Fax: (202) 512�092250 Mail: Stop SSOP, Washington, DC 20402�0900012005 + + + SELECT COMMITTEE ON HOMELAND SECURITY + + + + Christopher Cox, California, Chairman + +Jennifer Dunn, Washington Jim Turner, Texas, Ranking Member +C.W. Bill Young, Florida Bennie G. Thompson, MississPpi +Don Young, Alaska Loretta Sanchez, California +F. James Sensenbrenner, Jr., Edward J. Markey, Massachusetts +Wisconsin Norman D. Dicks, Washington +W.J. (Billy) Tauzin, Louisiana Barney Frank, Massachusetts +David Dreier, California Jane Harman, California +Duncan Hunter, California Benjamin L. Cardin, Maryland +Harold Rogers, Kentucky Louise McIntosh Slaughter, New +Sherwood Boehlert, New York York +Lamar S. Smith, Texas Peter A. DeFazio, Oregon +Curt Weldon, Pennsylvania Nita M. Lowey, New York +Christopher Shays, Connecticut Robert E. Andrews, New Jersey +Porter J. Goss, Florida Eleanor Holmes Norton, District of +Dave Camp, Michigan Columbia +Lincoln Diaz-Balart, Florida Zoe Lofgren, California +Bob Goodlatte, Virginia Karen McCarthy, Missouri +Ernest J. Istook, Jr., Oklahoma Sheila Jackson-Lee, Texas +Peter T. King, New York Bill Pascrell, Jr., North Carolina +John Linder, Georgia Donna M. Christensen, U.S. Virgin +John B. Shadegg, Arizona Islands +Mark E. Souder, Indiana Bob Etheridge, North Carolina +Mac Thornberry, Texas Ken Lucas, Kentucky +Jim Gibbons, Nevada James R. Langevin, Rhode Island +Kay Granger, Texas Kendrick B. Meek, Florida +Pete Sessions, Texas Ben Chandler, Kentucky +John E. Sweeney, New York + + John Gannon, Chief of Staff + + tephen DeVine, Deputy Staff Director and General Counsel + + Thomas Dilenge, Chief Counsel and Policy Director + + David H. Schanzer, Democrat Staff Director + + Mark T. Magee, Democrat Deputy Staff Director + + Michael S. Twinchek, Chief Clerk + + ______ + + Subcommittee on Cybersecurity, Science, and Research & Development + + Mac Thornberry, Texas, Chairman + +Pete Sessions, Texas, Vice Chairman Zoe Lofgren, California +Sherwood Boehlert, New York Loretta Sanchez, California +Lamar Smith, Texas Robert E. Andrews, New Jersey +Curt Weldon, Pennsylvania Sheila Jackson-Lee, Texas +Dave Camp, Michigan Donna M. Christensen, U.S. Virgin +Robert W. Goodlatte, Virginia Islands +Peter King, New York Bob Etheridge, North Carolina +John Linder, Georgia Ken Lucas, Kentucky +Mark Souder, Indiana James R. Langevin, Rhode Island +Jim Gibbons, Nevada Kendrick B. Meek, Florida +Kay Granger, Texas Ben Chandler, Kentucky +Christopher Cox, California, ex Jim Turner, Texas, ex officio +officio + + (ii) + + + C O N T E N T S + + ---------- + Page + + STATEMENTS + +The Honorable Mac Thornberry, a Representative in Congress From + the State of Texas, and Chairman, Subcommittee on + Cybersecurity, Science, and Research and Development + Oral Statement................................................. 1 + Prepared Statement............................................. 2 +The Honorable Zoe Lofgren, a Representative in Congress From the + State of California, and Ranking Member, Subcommittee on + Cybersecurity, Science, and Research and Development........... 2 +The Honorable Christopher Cox, a Representative in Congress From + the State of California, and Chairman, Select Committee on + Homeland Security.............................................. 22 +The Honorable Jim Turner, a Representative in Congress From the + State of Texas, Ranking Member, Select Committee on Homeland + Security + Prepared Statement............................................. 4 +The Honorable Robert E. Andrews, a Representative in Congress + From the State of New Jersey................................... 33 +The Honorable Donna M. Christensen, a Delegate in Congress From + the U.S. Virgin Islands........................................ 27 +The Honorable Jennifer Dunn, a Representative in Congress From + the State of Washington........................................ 29 +The Honorable Bob Etheridge, a Representative in Congress From + the State of North Carolina.................................... 31 +The Honorable Jim Gibbons, a Representative in Congress From the + State of Nevada................................................ 25 +The Honorable James R. Langevin, a Representative in Congress + From the State of Rhode Island................................. 36 +The Honorable Kendrick B. Meek, a Representative in Congress From + the State of Florida........................................... 41 + + WITNESSES + +Mr. Robert Liscouski, Assistant Secretary for Infrastructure + Protection, Department of Homeland Security + Oral Statement................................................. 5 + Prepared Statement............................................. 8 +Mr. Steven Cooper, Chief Information Officer, Department of + Homeland Security + Oral Statement................................................. 14 + Prepared Statement............................................. 18 + + APPENDIX + +Questions for Assistant Secretary Robert Liscouski: + Questions from Congressman Dave Camp........................... 45 + Questions from Congressman Sherwood Boehlert................... 46 + Questions from Congressman Mac Thornberry and Congresswoman Zoe + Lofregn...................................................... 47 + Questions from Congressman Jim Turner.......................... 54 + +Questions for Chief Information Officer Steven Cooper: + Questions from Congressman Mac Thornberry and Congresswoman Zoe + Lofgren...................................................... 56 + + + HOMELAND CYBERSECURITY AND DHS + + ENTERPRISE ARCHITECTURE BUDGET HEARING FOR FISCAL YEAR 2005 + + ---------- + + + Tuesday, March 30, 2004 + + House of Representatives, + Select Committee on Homeland Security, + Subcommittee on Cybersecurity, Science, + and Research and Development, + Washington, D.C. + The subcommittee met, pursuant to call, at 10:06 a.m., in +Room 2325, Rayburn House Office + Building, Hon. Mac Thornberry [chairman of the +subcommittee] presiding. + Present: Representatives Thornberry, Smith, Camp, Linder, +Gibbons, Cox (ex officio), + Lofgren, Andrews, (Del.) Christensen, Etheridge, Lucas, +Langevin, Meek, and Turner (ex officio). + Also Present: Representative Dunn. + Mr. Thornberry. The hearing will come to order. I would +like to welcome our witnesses and guests to this hearing of the +Subcommittee on Cybersecurity, Science, and Research and +Development. + Last year, we received a number of perspectives on +cybersecurity from academia, think tanks, the technology +industry, government agencies, users, and others. All want the +Department to succeed in its mission to protect our Nation. All +emphasized the importance of cyberspace and the need for +stronger cybersecurity in government, industry, academia, and +at home. + Now, as we move into the second year of the Department of +Homeland Security there remain many areas in cybersecurity in +need of improvement. Cyber is an area that can touch across +virtually every aspect of our lives, from electrical grids, +airport control towers, manufacturing, banking, chemical +plants, and many other areas. + With the creation of the National Cybersecurity Division +last June, I was pleased the Department acknowledged the need +to consolidate the cyber mission into an organization that +could have one voice in dealing with international, Federal, +State, local, and private sectors. However, over the course of +recent months I have been concerned that many of the +cybersecurity resources within the Department remain fragmented +and have not been integrated under the Cybersecurity Division. + Our Nation needs a seamless, well-functioning organization +within the Department to work with industry, other government +elements, academia, and the home user. That is part of the +external cybersecurity mission of the Department. + But there is also an internal cybersecurity mission for the +Department. The Chief Information Officer has responsibility +for protecting the Nation's most sensitive data that has been +entrusted to the DHS to counter terrorism against the homeland. +As the Department develops its enterprise architecture, privacy +and classified information are two areas that must be +considered as the networks from the 22 agencies are brought +together. + I also believe that the Department must be a role model for +the rest of government as well as the private sector in how +they secure their own information infrastructure. DHS needs to +``walk-the-talk'' and achieve the highest standards within the +Federal Government and cybersecurity. The creation of the +Department should also result in efficiencies through +integration and also find the most effective use of resources. + I look forward to hearing about your progress in both areas +over the course of the past year. + + Prepared Statement of The Honorable Mac Thornberry, Chairman, Select + Committee on Homeland Security + + I would like to welcome our witnesses and guests to today's +hearing. + Last year, this subcommittee received a number of perspectives on +cybersecurity, from academia, think tanks, the technology industry, +government agencies, users, and others. All want the Department of +Homeland Security to succeed in their mission to protect our nation. +All emphasized the importance of cyberspace and the need for stronger +cybersecurity in government, industry, academia, and at home. + As we move into the 2nd year for the Department of Homeland +Security, there remain many areas in cybersecurity in need of +improvement. Cyber is an area that cross-cuts virtually very aspect of +our lives. Electrical grids, airport control towers, manufacturing, +banking, chemical plants, and many other areas are dependent upon their +computers, information, and networks to be reliable and secure from +attacks. + With the creation of the National Cybersecurity Division (NCSD) +last June, I was pleased that the Department acknowledged the need to +consolidate the cyber mission into an organization that could have +``one voice'' in dealing with international, federal, state, local and +private sectors. However, over the course of recent months, I am +concerned that many of the cybersecurity resources within the +Department remain fragmented and have not been integrated under NCSD. + Our nation needs a seamless and well-functioning organization +within the Department to work across industry, other government +elements, academia, and the home user. That is part of the external +cybersecurity mission for the Department of Homeland Security. + There is also an internal cybersecurity mission for the Department. +The Chief Information Officer has the responsibility for protecting our +nation's most sensitive data that has been entrusted to DHS to counter +terrorism against the homeland. As the Department develops its +enterprise architecture, privacy and classified information are two +areas that must be considered as the networks from the 22 agencies are +brought together. + I also believe the Department must be a role model for the rest of +the government--as well as the private sector--in how they secure their +own information infrastructure. DHS needs to ``walk the talk'' and +achieve the highest standards within the federal government in +cybersecurity. The creation of the Department should result in +efficiencies through integration and also find the most effective use +of resources. I look forward to hearing about your progress and plans +for the coming year. + + Before we turn to our witnesses, let me yield to the +distinguished ranking member, the gentlelady from California. + Ms. Lofgren. Thank you, Chairman Thornberry. + The Select Committee on Homeland Security is in the process +of tracking the first ever authorization bill through the +Department of Homeland Security, and I believe that today's +hearing before this subcommittee will serve as an important +part of the authorization process. We will focus on +cybersecurity activities of the Infrastructure Protection +Directorate and will explore the information technology and +enterprise architecture issues facing the agency, and it will +give us an opportunity to understand resource and policy issues +pertaining to the budget request for the next fiscal year. + In addition, members may explore additional legislative +issues relevant to the Director's activities for possible +inclusion into the authorization bill. + Certainly, we have no shortage of issues to discuss with +our witnesses today. Earlier this month President Bush and +Secretary Ridge celebrated the first anniversary of the +creation of the Department of Homeland Security. At the event, +the President said, quote, one of the most important steps we +have taken to fight terrorism is creating the Department of +Homeland Security combined under one room with a clear chain of +command many agencies responsible for protecting our Nation. +Creating the newest department of our Federal Government was a +tough task that required a lot of hard work, changing some old +habits in order to merge into a new department. Unquote. + I think this assessment of the Department is pretty +optimistic, and I know that while rank and file employees have +worked very hard over this past year to get it up and running, +I am not convinced that the leadership of the Department of +Homeland Security should be celebrating at this time, +particularly in the area of cybersecurity. + I am concerned about cyber policy in the Department. I am +not convinced that cybersecurity is a priority within the +overall Department of Homeland Security, and I am troubled by +the lack of concrete cybersecurity accomplishments over the +past year. + The release of the National Strategy to Secure Cyberspace +was at the beginning of 2003. This policy paper established +cybersecurity goals. At the end of 2003, the Department of +Homeland Security convened a cybersecurity summit with major +players in the technology industry in the Silicon Valley. Other +than these two events, I am just not familiar with the work +that is going on in DHS, and I think I am safe in saying that +members of this subcommittee are somewhat frustrated. + The threat of a cyber attack is very real. In 2003, we saw +increasing worm and virus spreads, and Business Week estimated +that the damage from worms last year alone was over $13 +billion. + Today's witnesses are Mr. Robert Liscouski, Assistant +Secretary for Infrastructure Protection, Information Analysis, +and Infrastructure Protection Directorate, and Mr. Steven +Cooper, Chief Information Officer of the Department of Homeland +Security. I hope that the witnesses today will be able to +reassure this subcommittee that work is being done within the +Department and that cybersecurity in fact is a priority for the +administration. + I would also like to note my frustration at the tardiness +with which the statements were delivered to the committee. The +rules of the Homeland Security Committee prescribe that +witnesses who wish to submit a written statement shall file +them--not may, but shall file them 72 hours prior to the +hearing. Mr. Liscouski's statement was filed 14 hours prior to +this committee and Mr. Cooper's statement was filed 45 minutes +before the committee hearing, and I think that that is a real +disservice to every member of the committee as we obviously +have not had the time to really study Mr. Cooper's statement or +Mr. Liscouski's statement. + Before concluding, I would like to thank the chairman of +this committee, Mr. Thornberry, who has led our committee with +great skill and intelligence, and I appreciate his leadership. +Thank you. + Mr. Thornberry. I thank the gentlelady, and let me echo her +frustration with the delays in having the statements before us. +Obviously, it makes it more difficult for all of us to do our +job well. + Let me just, as a brief aside on timing. My understanding +is that we will have votes roughly around 11:30. Mr. Liscouski +also has another hearing in the Intelligence Committee around +that time, and so I don't want to limit anything but the +briefer we can all be in our questions and responses we can +cover more territory. I appreciate both of our witnesses. +Without objection, other members of course may submit opening +statements for the record. + + Prepared Statement of the Honorable Jim Turner, a Representative in + Congress From the State of Texas, and Ranking Member, Subcommittee on + Cybersecurity, Science, and Research & Development + + Thank you Mr. Chairman. + Good Morning Gentlemen. Mr. Liscouski, it is a pleasure to have you +testify before our Committee again. Mr. Cooper, I believe this is the +first time you have appeared before us--welcome. + The Department of Homeland Security's cybersecurity mission is two- +fold. First, it is the key agency responsible for coordinating our +nation's efforts to protect our computer networks and critical +infrastructures. Second, it must ensure that its own information +technology systems are well-integrated and armed with appropriate +safeguards. + We recognize that these tasks are not easy but they must be done to +help ensure the security of our homeland. The ever-changing nature of +technology means that the Department must have the best expertise, +personnel, tools, and full authority to effectively accomplish its +mission. + Unfortunately, the Department is not making the progress needed to +secure our nation from a cyber attack. It is also not moving quickly +enough to integrate and protect its own information technology systems. + Mr. Liscouski, six months ago you appeared before this Subcommittee +and told us that the Department, having finally found a Director to +lead its cybersecurity efforts, was undertaking significant initiatives +to further our country's efforts to secure cyberspace and prepare and +respond to network attacks. To date, however, the cybersecurity +initiatives that the have been unveiled have not gotten us much further +than we were before the creation of the Department. Indeed, some of the +initiatives appear to duplicate existing efforts. + Let me just mention a few specific areas in which I see the +Department's efforts lagging. +First, it is not apparent to me that the Department + has in place the ability and authority to direct other agencies + with specific expertise in the event of a cyber crisis. + Second, the Department does not appear to have an + effective and meaningful public--private cybersecurity + partnership. Many in the private sector have little or no idea + what you are doing, what is expected of them, or how they are + supposed to integrate and coordinate with the Department. + Third, the Department has not sufficiently moved + forward with the National Strategy to Secure Cyberspace + released by the Administration a year ago. Why haven't we yet + seen clear assignments of responsibilities and deadlines for + the Strategy's implementation? If it is because the strategy + won't work or is ineffective--we need to know that. + Lastly, Mr. Liscouski, the Department's 2005 budget + does not clearly lay out what your directorate is planning to + do to further our cybersecurity efforts. We've only seen broad + assertions and categories of activities. There seems to be + lacking a clear vision on what the Department is doing to + secure cyberspace. + Mr. Cooper, I must say I am equally concerned about the state of +the Department's efforts to build robust information technology systems +within the Department and secure its own internal networks. There are +specific areas, in particular, for which I am concerned. + First, the Department's efforts to date have been too + slow. Just last week, I saw one official stating that simple e- + mail can't get passed to people in the same office and that it + takes hours for e-mail to bounce around the Department to reach + its destination. We won't win the war on terror if Homeland + Security officials can't even talk to each other. + Second, good and consistent information technology + policies can help speed the integration of terrorist watch + lists, strengthen the security of our borders, and allow us to + ``connect the dots'' to find terrorists. It worries me, Mr. + Cooper, that you have publicly suggested that a consolidated + watchlist may not be necessary. In my view, achieving this goal + is critical for making our homeland security programs work. + Third, it is not clear to me, Mr. Cooper, that you + have the sufficient authority to coordinate and direct the + divisional Chief Information Officers within the Department. If + this is a problem, I hope that you will be candid with us + regarding any additional authorities your position requires. + Lastly, this past December, the Department received a + 34--the lowest grade of any agency--in the Government Reform + Committee's annual grading of agencies on the security of their + computer systems. The Department should be setting an example + for the rest of government to follow--not trailing at the back + of the class. + Gentleman, I thank you for appearing before our Committee today to +address these important issues. + + I appreciate both of our witnesses being here today. Let me +first call on Robert Liscouski, Assistant Secretary for +Infrastructure Protection at the Department of Homeland +Security. + + STATEMENT OF ROBERT LISCOUSKI, ASSISTANT SECRETARY FOR + INFRASTRUCTURE PROTECTION, DEPARTMENT OF HOMELAND SECURITY + + Mr. Liscouski. Thank you, Mr. Chairman, and distinguished +members of the subcommittee. I appreciate the opportunity to be +here this morning. + As you pointed out, I am responsible for infrastructure +protection at the Department of Homeland Security, and I am +pleased to be here before you today to discuss our progress +that we have made in the National Cybersecurity Division and to +discuss the President's fiscal year 2005 budget request. + In today's highly technical and digital world, we recognize +that attacks against us may manifest themselves in many forms, +including both physical and cyber attacks. And in addition, we +recognize the potential impact of collateral damage from any +one attack to a variety of assets. This interconnected and +interdependent nature of our infrastructure makes our physical +and cyber assets difficult to separate, and it would be +irresponsible to address them in isolation. + The integrated approach that DHS takes toward protection of +physical and cyber assets and responsive threats and protection +of its vulnerabilities enables us to consider the full range of +risks to the Nation, including loss of life, destruction of +infrastructure services, economic impact, and national security +implications. Recognizing that future terrorist attacks may not +be limited to either physical or cyber acts but rather a +combination of the two to amplify the impact, my office is +organized to examine and address threats and vulnerabilities +across the nation's infrastructure by using a five-step risk +management methodology that measures the Nation's risk profile +in the context of and in the absence of threat information. +Those major steps of the risk management methodology include +the identification of the critical infrastructure assets, the +assessment of vulnerabilities, the normalization analysis and +prioritization of protective measures, implementing protective +programs, and then finally the measurement of effectiveness and +performance outputs so we can determine whether what we are +doing is the right thing. + The National Cybersecurity Division was created in June of +2003 to serve as a national focal point for the public and the +private sectors to address the cybersecurity issues and to +coordinate the implementation of a national cyber strategy to +secure cyberspace. + Under that mandate, the National Cybersecurity Division has +been working closely with our partners in the Federal +Government, the private sector, and academia on a variety of +programs and initiatives to protect our information +infrastructure. We recognize that the challenge is vast and +complex, that the threats are multi-faceted and global in +nature, and that our strengths and our vulnerabilities lie in +our interdependencies; that the environment changes rapidly, +and that information sharing and coordination are crucial to +improving our overall national and economic security. + The activities of the National Cybersecurity Division then +are based on this understanding and designed to address each of +the priorities set forth in the National Strategy to Secure +Cyberspace. + Priority one, a national cyberspace secure response system; + Priority two, a national cyberspace security threat and +vulnerability reduction program; + Priority three, a national cyberspace security awareness +and training program; + Priority four, securing the government's cyberspace; and, + Priority five, national security and international +cyberspace security cooperation. + When I appeared before the committee--before the +subcommittee in September of 2003, I announced that Mr. Amit +Yoran was to become the Director of the National Cybersecurity +Division. Under his leadership, the division has aggressively +pursued partnerships and programs and is building a strong team +to meet its objectives. I also announced the creation of the +U.S. Computer Emergency Readiness Team, or the US-CERT. The US- +CERT is a key component of our cyber strategy and readiness and +response system and the National Cybersecurity Division's +operational arm. The US-CERT provides a national coordination +center that links public and private response capabilities to +facilitate information sharing across infrastructure sectors +and to help protect and maintain the continuity of our Nation's +cyber infrastructure. + On 28 January of this year, the Department of Homeland +Security through the US-CERT unveiled the National Cyber Alert +System. It is an operational system developed to deliver +targeted and timely and actionable information to Americans to +secure their computers. At the U.S. government, we have the +responsibility to alert the public of imminent threats and to +provide protective measures where we can, and minimally to +provide information necessary for the public to protect their +systems. + The day we inaugurated the system, the US-CERT site +received more than 1 million hits. And today, from the first +few weeks of that site, we have more than 250,000 direct +subscribers who receive the National Cybersecurity Alert +information to enhance their cybersecurity. And I urge you all +to visit that site at www.US-CERT.gov, to subscribe to our +information services. + To facilitate the preparation interagency and public- +private cooperation coordination during and to recover from +cyber incidents, we have created the Cyber Interagency Incident +Management group, or Cyber IIMG. The Cyber IIMG coordinates +intergovernmental preparedness and operations to respond to and +recover from cyber incidents and attacks. The group brings +together senior officials from national security, law +enforcement, defense, intelligence, and other government +agencies that maintain significant cybersecurity capabilities +and that can bring to bear in response to an incident and, +importantly, possess the necessary statutory authority to act. + We have also broadened our interagency partnerships to +create two new groups addressing the various challenges before +us. The first is a Chief Information Security Officers Forum, +CISO Forum, established to provide a trusted venue for our +government information security offices to collaborate and +share effective practices, initiatives, capabilities, +successes, and challenges. + The second group is the Government Forum of Incidents +Response and Security Teams, FIRST, a group of technical and +tactical practitioners of security response teams responsible +for securing government information technology systems. GFIRST +members work together to understand and handle computer +security incidents and to encourage proactive and preventive +security practices. + One of our most important constituencies of course is the +private sector, because as you well know it is estimated that +85 percent of America's critical infrastructure is owned and +operated by the private sector, and technology developed by the +industry continues to fuel the growth and the evolution of the +Internet. + In December 2003, the Cybersecurity Division co-hosted the +first National Cybersecurity Summit, which allowed the +Department to work side by side with leaders in industry to +address key cybersecurity issues facing the Nation. The Cyber +Division is also working closely with research and academic +communities to better educate and train future cyber analysts, +and we are participating in the National Science Foundation +Scholarship For Service, or the Cyber Corps program as well as +the National Security Agency's Information Assurance Centers +for Excellence, academic excellence in 26 States, for which +there are 50 centers. + The National Cybersecurity Division is only 9 months old, +but these initiatives represent considerable progress toward +making cybersecurity a reality and reflect our collective +commitment to do much more. Each accomplishment fosters further +activity which we have outlined in our fiscal year 2005 budget. +The national cybersecurity budget for fiscal year 2005 request +is $79 million, and it is based upon ongoing and future +activities necessary to meet our mission. + The division is positively exploiting the work of its +predecessors and building crucial partnerships as part of DHS's +overall efforts to enhance the protection of our Nation's +critical infrastructure. We have much to do and it will take +time, resources, dedication, energy, and hard work to succeed. +We are committed to that challenge, and we look forward to the +opportunities to update the subcommittee on our progress. + We are also approaching the next National Cybersecurity +Day, I would like to point out, which is this Sunday. And as +Americans turn their clocks forward, we also urge them to take +this opportunity to review and improve their cyber readiness. + Again, I thank you for the opportunity to testify before +you today, and I would be pleased to answer the questions at +your convenience. + [The statement of Mr. Liscouski follows:] + + Prepared Statement of the Honorable Robert Liscouski + + Good morning, Chairman Thornberry and distinguished Members of the +Subcommittee. My name is Robert Liscouski, and I am the Assistant +Secretary for Infrastructure Protection in the Department of Homeland +Security (DHS). I am pleased to appear before you today to provide an +update on the Department's National Cyber Security Division's efforts +in coordinating cyber security initiatives since my appearance in +September 2003 and to discuss the President's FY 2005 budget request +for the Division. In my testimony today, I will share information on a +number of initiatives that use diverse channels of communication to +reach our government partners as well as our mutual constituents--home +users, small and medium-sized businesses, and corporations. + +Introduction + March 1st marked the one-year anniversary of the Department of +Homeland Security. In his remarks commemorating that day, Secretary +Ridge stressed the Department's goal to strengthen information sharing +and infrastructure protection over the next year. We in the Information +Analysis and Infrastructure Protection Directorate (IAIP) take that +mandate to heart in our collective efforts and activities to protect +the Nation. Established by the Homeland Security Act, the IAIP +Directorate leads the Nation's efforts to protect our critical +infrastructures from attack or disruption, and under the leadership of +Under Secretary Frank Libutti has made significant strides toward that +objective. + The IAIP Directorate includes the Office of Information Analysis, +the primary gathering and analytic center for threat information and +intelligence within DHS, and the Office of Infrastructure Protection +(IP), for which I am responsible. In today's highly technical and +digital world, we recognize that attacks against us may manifest in +many forms, including both physical and cyber attacks. In addition, we +recognize the potential impact of collateral damage from any one attack +to a variety of assets. This interconnected and interdependent nature +of our infrastructure makes our physical and cyber assets difficult to +separate, and it would be irresponsible to address them in isolation. +The placement of our two offices within the Directorate underscores +this linkage and enables us to work together to share intelligence and +other information and coordinate our efforts to mitigate our +vulnerabilities. Further, IP's component divisions work closely +together to coordinate efforts regarding both physical and cyber +threats and vulnerabilities and to develop plans that address the +interdependencies between them. + Homeland Security Presidential Directive 7 (HSPD 7), released by +President Bush on December 17, 2003, requires the development of a +National Infrastructure Protection Plan that sets out a roadmap for +assessing both physical and cyber vulnerabilities and, once the +vulnerabilities are determined, articulating the protective actions +that need to be taken. As such, IAIP takes a holistic view of critical +infrastructure vulnerabilities and works to protect America from all +threats by ensuring the integration of physical and cyber security +approaches in the Directorate's Office of Infrastructure Protection. + This integrated approach to physical and cyber threats and +vulnerabilities enables us to consider the full range of risks to the +Nation, including loss of life, disruptions of infrastructure services, +economic impact, and national security implications. Recognizing that +future terrorist attacks may not be limited to either a physical or +cyber act, but rather a combination of the two to amplify impact, IP +includes the National Cyber Security Division, the Protective Security +Division, the Infrastructure Coordination Division, and the National +Communications System and is organized to examine and address threats +and vulnerabilities across the Nation's infrastructure by using a five- +step risk management methodology that measures the national risk +profile in the context, and absence, of threat information. The major +steps of our risk management methodology include: + + Identification of critical infrastructure + Assessing vulnerabilities + Normalizing, analyzing, and prioritizing protective + measures + Implementing protective programs + Measuring effectives through performance metrics + By performing each of these steps continuously across and within +each critical infrastructure sector, and by integrating threat +information, we are continually improving our national critical +infrastructure protection program--physical and cyber--and driving +better correlation of protective programs to the dynamic threat +environment. + National Cyber Security Division Mission: Coordinating our National +Cyber Security + In support of the broader IAIP mission, the National Cyber Security +Division was created in June 2003 to serve as a national focal point +for the public and private sectors to address cyber security issues and +to coordinate the implementation of the National Strategy to Secure +Cyberspace released by the President in February 2003. + Under that mandate, the National Cyber Security Division has been +working closely with our partners in the federal government, the +private sector, and academia on a variety of programs and initiatives +to protect our information infrastructure. We recognize that the +challenge is vast and complex, that the threats are multi-faceted and +global in nature, that our strengths--and our vulnerabilities--lie in +our interdependencies, that the environment changes rapidly, and that +information sharing and coordination are crucial to improving our +overall national and economic security. The activities of the National +Cyber Security Division, then, are based on this understanding and are +designed to address each of the priorities set forth in the National +Strategy to Secure Cyberspace (``the Strategy''): + Priority I:A National Cyberspace Security Response System + Priority II: A National Cyberspace Security Threat and + Vulnerability Reduction Program + Priority III: A National Cyberspace Security Awareness and + Training Program + Priority IV: Securing Government's Cyberspace + Priority V:National Security and International Cyberspace + Security Cooperation + + Meeting the Mandate: Readiness and Response + The National Cyber Security Division's primary overarching goal +since its creation has been to enhance the Nation's Cyberspace Security +(Readiness and) Response System (Priority I) that will, where possible, +deter and prevent a cyber attack from occurring, limit its scope and +impact on the critical infrastructures, and expedite recovery. In +October 2003, we participated in Livewire, the first ever national- +level cyber exercise to baseline our capabilities and communication +paths for responding to national attack. The exercise involved over 300 +participants representing more than 50 organizations across federal, +state, and local governments and the private sector. Cyber attack +simulation scenarios were developed to stress cyber interdependencies +across our critical infrastructures and baseline our ability to +collaborate across the public and private sectors. The information +gleaned from Livewire validated the National Cyber Security Division's +approach and activities. In that context, I will outline the National +Cyber Security Division's accomplishments to date and discuss on-going +and future programs that all serve to enhance our national cyber +security. + When I appeared before the Subcommittee in September 2003, I +announced the appointment of Mr. Amit Yoran as the Director of the +National Cyber Security Division. Under his leadership, the Division is +aggressively pursuing partnerships and programs and building a strong +team to meet its objectives. I also announced the creation of the U.S. +Computer Emergency Readiness Team, or US-CERT. US-CERT is a key +component of our Cyber Security Readiness and Response System and the +National Cyber Security Division's operational arm. Through its initial +partnership with the CERT Coordination Center (CERT/CC) at Carnegie +Mellon University, US-CERT provides a national coordination center that +links public and private response capabilities to facilitate +information sharing across all infrastructure sectors and to help +protect and maintain the continuity of our Nation's cyber +infrastructure. The overarching approach to this task is to facilitate +and implement systemic global and domestic coordination of deterrence +from, preparation for, defense against, response to, and recovery from, +cyber incidents and attacks across the United States, as well as the +cyber consequences of physical attacks. To this end, US-CERT is +building a cyber watch and warning capability, launching a partnership +program to build situational awareness and cooperation, and +coordinating with U.S. Government agencies and the private sector to +deter, prevent, respond to and recover from cyber--and physical-- +attacks. + One direct impetus of the Livewire exercise was to validate the +importance of building a cyber information dissemination mechanism to +reach our stakeholders. On January 28, 2004, the Department of Homeland +Security through USCERT unveiled the National Cyber Alert System, an +operational system developed to deliver targeted, timely and actionable +information to Americans to secure their computer systems. As the U.S. +Government, we have a responsibility to alert the public of imminent +threats and to provide protective measures when we can, or least +provide the information necessary for the public to protect their +systems. The offerings of the National Cyber Alert System provide that +kind of information, and we have already issued several alerts and the +initial products of a periodic series of providing ``best practices'' +and ``how-to'' guidance. We strive to make sure the information +provided is understandable to all computer users, technical and non- +technical, and reflects the broad usage of the Internet in today's +society. I am pleased to report that Americans are exhibiting a keen +interest in the alert system. On January 28th, the day we inaugurated +the system, the US-CERT site received more than one million hits. +Within the first few weeks, more than 250,000 direct subscribers +received National Cyber Alerts to enhance their cyber security. For +your reference and for your constituents, I urge you to visit www.us- +cert.gov to subscribe to a number of our information services to +facilitate protecting your computer systems. As we increase its +outreach, the National Cyber Alert System is looking at other vehicles +to distribute information to reach as many Americans as possible. + The Livewire exercise reiterated the critical need for government +to share information and coordinate efforts at cyber incident +preparation that enhance our effectiveness in responding to cyber +activity. To facilitate preparation and interagency and public-private +coordination during, and to recover from cyber incidents, we created a +Cyber Interagency Incident Management Group, or Cyber IIMG. The Cyber +IIMG coordinates intra-governmental preparedness and operations to +respond to, and recover from, cyber incidents and attacks. The group +brings together senior officials from national security, law +enforcement, defense, intelligence, and other government agencies that +maintain significant cyber security capabilities that they can bring to +bear in response to an incident and, importantly, possess the necessary +statutory authority to act. By meeting monthly, the Cyber IIMG is +developing cyber preparedness and response plans that will help it to +support the IIMG during national events with cyber implications, and +ensure that during a cyber crisis the full range and weight of federal +capabilities are deployed in a coordinated and effective fashion. + To enhance the level of communication among federal agencies in a +crisis, DHS' IP is continuing to widen the reach of the Critical +Infrastructure Warning Information Network, or CWIN. For those who are +not familiar, CWIN is a technologically advanced, secure network for +infrastructure protection, communication and cooperation, alert, and +notification. As a private communications network, CWIN serves as a +reliable and survivable network with no logical dependency on the +Internet or the public switched network. In the event a significant +cyber attack disrupts our telecommunications networks and/or the +Internet, CWIN provides a secure and survivable capability for members +to communicate. It is important for us to understand and prepare for +any contingency. In this vein, DHS is extending the reach of CWIN's +survivable architecture beyond federal agencies by working with +critical private sector companies to establish CWIN nodes at their +Network Operations Centers. The goal is to increase the number of CWIN +nodes to 100 by the end of 2004, making it a robust and resilient +capability that supports national cyber operations and response during +times of crisis. + Key components of the National Cyber Security Division's efforts +are laid out in Priority IV of the Strategy: Securing Government's +Cyberspace. Consistent with law and policy, the National Cyber Security +Division works with the Office of Management and Budget and the +National Institute of Standards and Technology regarding the security +of federal systems and coordinates with federal law enforcement +authorities as appropriate. We have taken great steps to integrate +existing frameworks into the system, such as the continued +functionality of the Federal Computer Incident Response Center +(FedCIRC) is being transitioned within US-CERT, as well as to create a +new forum for coordination toward greater cyber security in the federal +government. + We have also broadened our interagency partnerships to create two +new groups addressing the various challenges before us. The first is +the Chief Information Security Officers Forum (CISO Forum), established +to provide a trusted venue for our government information security +officers to collaborate and share effective practices, initiatives, +capabilities, successes and challenges. The second is the Government +Forum of Incident Response and Security Teams (GFIRST), a group of +technical and tactical practitioners of security response teams +responsible for securing Government information technology systems. +GFIRST members work together to understand and handle computer security +incidents and to encourage proactive and preventative security +practices. The purpose of the GFIRST peer group is to: + + Provide members with technical information, tools, + methods, assistance and guidance; + Coordinate proactive liaison activities and analytical + support; + Further the development of quality products and + services for the federal government; + Share specific technical details regarding incidents + within a trusted U.S. Government environment on a peer-to-peer + level; and + Improve incident response operations. + The National Cyber Security Division has taken on aggressive plans +for accelerated information sharing and collaboration efforts in both +the CISO Forum and GFIRST. Already, both groups have increased +information sharing horizontally across previously somewhat stove-piped +organizations and improved the overall cyber preparedness of the U.S. +Government. + +Meeting the Mandate: Assessment and Analysis + A major component of the National Cyber Security Division's mission +is our focus within the Office of Infrastructure Protection to +coordinate efforts on physical and cyber threat and vulnerability +identification and assessment, and the implementation of protective +measures to reduce vulnerabilities that will enable IAIP to +systemically address the security status of U.S. networks and the cyber +components and dependencies of our critical infrastructures. This +effort directly responds to the calls in the Strategy and HSPD 7 to: + + Develop a National Infrastructure Protection Plan; + Complete and maintain a critical cyber asset + inventory; + Implement and expand standard methodologies to perform + threat, risk, and vulnerability assessments; + Develop and maintain an interdependency analysis + capability to systematically understand the relationships + between cyber and physical assets; and + Identify and implement priority protective measures to + mitigate vulnerabilities. + The National Cyber Security Division currently houses a number of +operational, data analysis, and other diagnostic tools to assist in +assessing our vulnerabilities. The US-CERT is developing a +comprehensive Watch Operation that will provide a 24x7 single point of +contact for national cyber incident detection, evaluation, response, +coordination, and restoration. Some key tools that US-CERT funded and/ +or executed include: + + Common Vulnerability and Exposures (CVE), a dictionary + of standard names for vulnerabilities that makes it possible to + correlate information across vendor products + Malware Analysis, a laboratory operation performing + detailed analysis and characterization of malicious code to + adequately notify the Government of specific dangers and + threats to the critical infrastructure + Security Analysis Program (SAP), a set of analysis + tools and capabilities offered through US-CERT to (1) help + agencies better monitor network security activity; (2) assist + agencies in identifying configuration problems, unauthorized/ + unnecessary network traffic, network backdoors, and routing + anomalies; and (3) gain better global situational awareness of + network health and malicious activity. The use of these tools + by the federal civilian agencies represents one way that we are + transferring technology used by the military to increase our + overall capabilities. + As part of our efforts to improve our situational awareness and +analysis capabilities, the National Cyber Security Division is +coordinating with the National Communications System (NCS) on the +Global Early Warning Information System (GEWIS). GEWIS is an effort +underway within IAIP to find a wide variety of sources, including open +source and approved private information, which can be analyzed to +provide better situational awareness of the Internet and its underlying +infrastructures. GEWIS will allow DHS to assess the health of the +Internet in a timelier manner and, as a result, coordinate with the +appropriate stakeholders in responding to Internet events. GEWIS is +currently being used by IP in conjunction with other resources to +provide the current situational awareness capability. GEWIS is +continuing to evolve, and over time will provide enhanced +functionality. + +Meeting the Mandate: Awareness, Outreach, and Cooperation + So far I have discussed the accomplishments we have made in +readiness and response, assessment, analysis, and warning efforts at +the National Cyber Security Division. Another major component of our +work lies in the outreach and awareness programs that support every +aspect of our efforts to improve and sustain cyber security. The +Strategy clearly identifies the users and stakeholders in cyber +security in Priority III as home users and small business, large +enterprises, institutes of higher education, the private sectors that +own and operate the vast majority of the Nation's cyberspace, and state +and local governments. In Priority V, the Strategy also emphasizes that +international cooperation is crucial to protecting ourselves in a world +where attacks cross borders at light speed. The following components +make up the National Cyber Security Division's outreach and awareness +programs and serve as the basis for our recently initiated Partnership +Program. + One of our most important constituencies is the private sector. It +is estimated that eighty-five percent of Americas critical +infrastructure is owned and operated by private companies, and +technology developed by industry continues to fuel the growth and +evolution of the Internet. In December 2003, the National Cyber +Security Division co-hosted the first National Cyber Security Summit in +Santa Clara, California with the Information Technology Association of +America, TechNet, the Business Software Alliance, and the U.S. Chamber +of Commerce. This event was designed to energize the public and private +sectors to implement the National Strategy to Secure Cyberspace. The +Summit allowed the Department of Homeland Security to work side-by-side +with leaders from industry to address the key cyber security issues +facing the Nation. Five interest areas were established to focus +specifically in the areas of: + + Increasing awareness + Cyber security early warning + Best practices for information security corporate + governance + Technical standards and common criteria + Security across the software development lifecycle + Perhaps most importantly, the Summit served as a call to action. It +represented a logical transition point from developing a national +strategy to energizing the public-private partnership to implement +concrete, measurable actions to improve the security of America's cyber +systems. The efforts of these working groups as well as those of other +industry leaders will be vital as we move forward in implementing the +National Strategy. + In addition to the National Cyber Security Summit, the National +Cyber Security Division is working with a host of groups to better +understand and address their cyber security issues and concerns. These +groups include, among others, the President's National Infrastructure +Advisory Council, the President's National Security Telecommunications +Advisory Committee, and the private sector Information Sharing and +Analysis Centers (ISAC). As a result of the working relationships that +have been developed among state and local cyber security +representatives, we are also facilitating a multi-state ISAC that will +even further enhance information sharing at the state and local levels. + The National Cyber Security Division is also working closely with +the research and academic communities to better educate and train +future cyber analysts. We are participating in the National Science +Foundation's Scholarship for Service, or ``Cyber Corps'' program as +well as the National Security Agency's fifty Information Assurance +Centers for Academic Excellence in twenty-six states. We are looking at +a number of additional ways to raise cyber security awareness in our +educational and professional programs, including exploring the K-12 +curriculum with the Department of Education and exploring the +possibility for the private sector to create independent information +technology certification programs for IT security professionals. + A crucial role for the National Cyber Security Division is to +cooperate and leverage expertise within the Department of Homeland +Security. Within IP, the National Cyber Security Division coordinates +with the Protective Security Division (PSD) on our physical and cyber +interdependencies and activities. In addition, it works closely with +the National Communications System (NCS), which runs the CWIN program +and the Global Early Warning Information System (GEWIS) described +above, and brings NCS's telecommunications system expertise to its +efforts. Through its integrated approach to addressing the critical +infrastructure, the Office of Infrastructure Protection also +coordinates efforts with the 13 critical infrastructure sectors laid +out in HSPD 7 and their respective Information Sharing and Analysis +Centers (ISACs). The National Cyber Security Division coordinates +closely with IP's Infrastructure Coordination Division on the cyber +elements of their efforts. + In addition to our coordinated work within IP, the National Cyber +Security Division works with a number of other DHS organizations. Close +linkage between the Office of Infrastructure Protection and the Office +of Information Analysis, led by Assistant Secretary Patrick Hughes, +promotes the ability to map threat information with cyber +vulnerabilities. This mapping allows for the effective prioritization +of potential risks so agencies may implement remediation efforts as +quickly as possible to limit the impact of computer incidents. + The technology that drives cyber security needs and product demands +develops very rapidly in today's environment. Therefore, IAIP and the +Science and Technology Directorate (S&T) are working together to +coordinate research and development activities in the important areas +of critical infrastructure protection and cyber security. A program of +regular, interactive meetings between the two directorates ensures a +two-way flow of information and coordination of technical activities. +S&T's cyber security portfolio scope and activities are driven by the +threats and issues that warrant national-level concerns, including +cyber attacks by hostile adversaries against the Nation's critical +infrastructures, or attacks whose consequences are of sufficient +magnitude to cause widespread economic or social disruptions. The +National Cyber Security Division provides important input regarding the +research and development requirements for S&T's cyber security +portfolio based on its activities and insight into the needs for +greater protection of our cyber systems. Initial technical emphases for +the Cyber Security Portfolio include: + + Improving the security of Internet infrastructure + protocols and developing migration paths for these protocols + into commercial use; + Research, development, testing, and evaluation + investments aimed at next-generation cyber security + technologies aimed at prevention of and protection against + attacks; threat identification and tracking; monitoring, + detection, and attribution of attacks; and immediate as well as + longer-term response to attacks; + Economic assessment and modeling to support the + development of business cases for cyber security in addition to + providing a foundation for risk-based cyber security decision + making. + I have addressed many of our national efforts, but I want to +emphasize our international partnership efforts as well. As the +Strategy says, ``America's cyberspace is linked to that of the rest of +the world.'' Cyberspace is truly borderless, and our communications +networks are inarguably interconnected. We need to defend our systems +from the outside, but we can only do so with global cooperation and +coordination. Therefore, the National Cyber Security Division's +Partnership Program includes outreach and advocacy efforts with our +global partners, through US-CERT outreach activities and in bilateral +and multilateral discussions in conjunction with the Department of +State, the Department of Justice, and the Department of Defense. + The National Cyber Security Division is only nine months old, but +these initiatives represent considerable progress toward making cyber +security a reality and reflect our collective commitment to do more. +Each accomplishment fosters further activity, which we have outlined in +our FY 2005 budget request. + +National Cyber Security Division Budget Request FY 2005 + The National Cyber Security Division Budget Request of $ 79 million +for the fiscal year 2005 is based on the on-going and future activities +necessary to meet our mission. The budget plan is organized around +National Cyber Security Division's program initiatives in (1) Readiness +and Response; (2) Strategic Initiatives; (3) Information Sharing and +Coordination; and (4) Management and Administration. Please let me +highlight some key initiatives in the plan. + +Readiness and Response + The core building block for an effective National Cyberspace +Security Readiness and Response System is the U.S. Computer Emergency +Readiness Team (US-CERT). + US-CERT will require full funding of $59.3 million for its various +existing and projected programs, including sustaining and improving the +GEWIS, CWIN, Watch, and other programs described above. In its +inaugural year, US-CERT is making significant progress in establishing +critical operational capabilities and building key relationships within +government, private industry, and academia. To further these +advancements, FY05 will be a significant year for the US-CERT to +continue building and enhancing present capabilities into even more +responsive and robust ones. + + Strategic Initiatives + The National Cyber Security Division's Vulnerability Assessment and +Reduction Program in response to HSPD 7 is a central aspect of its +Strategic Initiative endeavors, and the requested funding of $7.0 +million will build upon the initial efforts undertaken in FY03 and +FY04. Additional aspects of the Strategic Initiatives program include +software assurance efforts, continued awareness and training efforts, +and a series of tabletop and other exercises including a second +Livewire exercise, our participation in the National-Level Exercise +Program, and a planned set of cyber-specific tabletop exercises at the +State and local level. + +Information Sharing and Coordination + A critical aspect of the National Cyber Security Division's +activities is outreach to the public and private stakeholders in the +U.S. and interaction with global partners. $8.7 million will be used to +support a variety of public awareness campaigns and outreach efforts-- +such as continued support of the Stay Safe Online campaign--as called +for in the Strategy. IAIP will also build and expand international +partnerships to raise cyber security awareness and cooperation to +promote a global culture of security. Most importantly, it accomplishes +the operational partnership executive of information sharing and +collaboration. + +Management and Administration + The National Cyber Security Division is building a significant team +of technical and security experts and determining the infrastructure it +needs in support of its numerous initiatives toward greater national +cyber security. + +Conclusion + The creation of the National Cyber Security Division reflects the +recognition that we as a Nation are utilizing sophisticated information +networks to increase productivity, encourage innovation in products and +services, enhance daily lives, and communicate globally in an instant. +Importantly, we are also using these innovations to enhance our +national and economic security, facilitate our law enforcement and +public safety efforts, and protect our individual privacy. As +technology has developed, we have found more exciting ways to use it, +and we have become increasingly dependent on it. But, we have also +acknowledged that its proliferation across our critical +infrastructures--the very same proliferation that makes us more +advanced as a society and an economy--also makes us vulnerable to those +who would use it to harm us. IAIP, through the coordinated efforts of +its component divisions including the National Cyber Security Division, +is working diligently to address those vulnerabilities and provide +greater security without stunting the growth and benefits of the +digital economy for all Americans. We are approaching the next National +Cyber Security Day this Sunday, and as Americans turn their clocks +forward, we will also be urging them take the opportunity to review-- +and improve--their cyber readiness. + In its short life, the National Cyber Security Division is +positively exploiting the work of its predecessors, leveraging the +existing expertise around it, and building crucial partnerships as part +of DHS' overall efforts to enhance the protection of our Nation's +critical infrastructures. We have addressed crucial operational +components of our program and are improving them, and we are developing +strategic plans for the future. We know we still have much to do and +that it will take time, resources, dedication, energy, and hard work to +succeed. We are committed to that challenge, and we look forward to +future opportunities to update the Subcommittee on our progress. + Again, thank you for the opportunity to testify before you today. I +would be pleased to answer any questions you have at this time. + + Mr. Thornberry. Thank you. + Now we turn to Mr. Steven Cooper, who is the Chief +Information Officer for the Department of Homeland Security. + + STATEMENT OF STEVEN COOPER, CHIEF INFORMATION OFFICER, + DEPARTMENT OF HOMELAND SECURITY + + Mr. Cooper. Mr. Chairman and members of the subcommittee, +good morning. I am Steve Cooper, Chief Information Officer for +the Department of Homeland Security. It is my pleasure to +appear before the subcommittee, and I wish to thank the +chairman and members for providing me the opportunity to update +you on our efforts and progress in integrating and securing +information systems within the Department and to discuss the +President's fiscal year 2005 budget for information technology. +I would request that my written testimony be entered into the +record. + Mr. Thornberry. Without objection, your testimony shall be +in the record. + Mr. Cooper. Thank you. + The challenges facing those of us who comprise the +information technology function of the Department of Homeland +Security is complex. There are three major areas of focus. + The first is to ensure that the women and men on the front +lines of the Department have all of the information technology +enabled solutions and tools they need to safeguard the United +States and to deliver our safety and service-related +operational functions and capabilities. The war on terrorism is +real, and we must deliver new mission solutions with quality +and speed in a cost effective manner while maintaining already +existing mission solutions that we inherited when the +Department was formed. + The second area addresses the integration of IT enabled +solutions. Guided by our enterprise architecture, we are +identifying opportunities to consolidate and streamline mission +solutions. In mission areas like threat identification and +management, identity credentialing, in collaboration we have +identified multiple solutions in use within the various +organizational elements of the Department. Our goal is to help +facilitate and support the operators and subject matter experts +in our business units, and determine the optimal number and +nature of mission solutions needed. + And the third area is to realize efficiency and economies +of scale that the President and Congress have set forward when +creating the Department of Homeland Security. Here, we must +rapidly identify and eliminate existing overlap or redundancy +within our IT infrastructure within the Department. However, we +must ensure that we do no harm to mission solutions while we +restructure and consolidate our infrastructure. In this case, +we really are changing the tires on the car while it is moving. + In order to guide the information technology function in +achieving success in these three overarching focus areas, I +have, in concert with our Department of Homeland Security CIO +Council, set eight priority force the IT function. I would like +to share these with the committee. + Very quickly, they are: Information sharing, mission +rationalization, IT portfolio management, information security, +infrastructure transformation, enterprise architecture, IT +governance, and IT human capital. + These priorities are aligned with the strategic priorities +of the Department set forth by Secretary Ridge and Deputy +Secretary Loy. For each priority, we are in the process of +developing a case for change, the business case, a road map +that outlines the activities, tasks, and deliverables needed to +achieve the desired objectives and metrics by which we will +measure success. I would like to highlight two of these eight. + First is enterprise architecture. In my previous +testimonies, I have discussed the vision of strategy of DHS and +how that strategy must be supported by a disciplined capital +planning investment control process that is guided by business- +driven enterprise architecture. With the release of the first +version of enterprise architecture in September 2003, we made +progress toward the goal of achieving, one, Department of +Homeland Security IT infrastructure. Version 1 of the +enterprise architecture describes a target information +management infrastructure that will be dramatically different +from the one we have today, one that will provide timely, +accurate, useful, and actionable information to all individuals +and stakeholders who require it all of the time. We believe +this effort was truly unique in the Federal Government, and +that we delivered a comprehensive and immediately useful target +enterprise architecture in less than 4 months. + Version 1 of our enterprise architecture contributed to +some of our investment decisions for fiscal year 2005. Work is +currently under way on Version 2 of the enterprise +architecture. This work will develop additional detail around +the target architecture and enhance the transition strategy +from Version 1 into a more detailed transition plan that will +specifically enable the implementation of the target enterprise +architecture. + Version 2 is currently on track for completion by the end +of this fiscal year. Along with continuing the hard work of +developing greater detail, we will continue reaching deeper to +find more opportunities to consolidation and begin to develop +new and improved mission support capabilities enabled by +information technology. + Version 2 of the enterprise architecture, together with the +associated transition plan, will serve as the basis for further +improving DHS mission performance and facilitating information +technology, alignment, integration, and consolidation. + DHS is a new organization formed a little over a year ago +from 22 legacy agencies, each with their own culture, +processes, and legacy information technology systems. Many of +these legacy agencies had developed their own enterprise +architectures prior to the establishment of the Department. The +challenge for us is to implement an integrated DHS enterprise +architecture, bringing together the good work that has been +done within each of the organizational elements and, during +that process, ensuring that the entire Department has the IT +capabilities needed to accomplish our mission capabilities +every day. + One challenge to achieving integrated homeland security +enterprise architecture is having enterprise architecture that +is sufficiently mature to support detailed alignment and +analysis for IT investment management decision making. We used +Version 1 to identify what we called quick hits, and these are +outlined in release one of our enterprise architecture; we are +currently developing Version 2 to support more detailed +investment decision making. + Another potential challenge is overcoming resistance to +change and obtaining management and organizational buy-in into +our enterprise architecture initiative. The Department has +placed a very high priority on our efforts. Deputy Secretary +Loy has directed the major organizational components of DHS to +participate in the development of Version 2. As we speak, there +are more than five different business focus area teams +comprised of subject matter experts from across the Department +working in facilitated team sessions to make sure that the +business model for enterprise architecture Version 2 accurately +and comprehensively captures the capabilities and requirements +needed to accomplish the Department's mission. The extent of +each organizational element's participation in these business +area focus teams is reported to the DHS Management Council and +monitored on a bi-weekly basis. + The development of an enterprise architecture is an +enormously complex process requiring considerable resources and +a systematic methodology. However, DHS has already made good +progress in meeting the goals of our desired target enterprise +architecture. We are well on our way to consolidating many of +the management functions from each of the 22 agencies, +including financial and human resources. We have reduced to 10, +19 financial management service providers. We have moved from +13 separate contracting offices to eight. We have moved from 22 +human resource offices to seven. We have moved from eight +different payroll systems to three, and department experts +expect to reduce this to one by the end of the year. And we +have moved from 22 property management systems to three. + These are a few up-to-date examples of the progress we are +making. It is, however, clear that we still have a long way to +go. + I would like to highlight our fiscal year 2005 budget +request very quickly. + Information contributes to every aspect of homeland +security and is a vital foundation of the homeland security +effort. My office has responsibility for providing IT +leadership that will foster best management practices in +managing IT, enhance efficiencies through shared services and +coordination of acquisition strategies, ensuring systems are +properly accredited and certified as secure, and being an +advocate for business transformation, all necessary toward +ensuring that our homeland is more secure. The leadership and +funding provided through the Department's IT investments are +crucial for maintaining an enterprise architecture that is +fully integrated with other management processes, and for +allowing the Department to participate in many of our e-Gov +initiatives across the Federal enterprise. + The President's budget request for fiscal year 2005 +includes a request for 226 million for departmentwide +information technology investments. Included in the request is +$95 million for information technology services, a portion of +which will provide funding for the departmentwide geographic +information system capability to improve the Department's +enterprise portal. This funding provides for continuation of +our enterprise architecture and planning efforts to address our +evolving financial management system, eMERGE2, and funding to +enable the development, the beginning of the development of our +human resources information technology solutions. + Additionally, the request includes $31 million for +information security-related activities. + Finally, the fiscal year 2005 budget request includes $100 +million for wireless communications. + I would like to highlight some key things related to one of +our eight priorities in closing, and that is information +security. + Since its creation, the Department of Homeland Security has +moved out aggressively to design and implement an information +security program that will not only ensure compliance with all +appropriate standards and regulations, but to also ensure that +the entire Homeland Security community has a secure and trusted +computing environment from which to operate. The heart of our +reporting structure is built around the congressional +requirements expressed in FISMA, the Federal Information +Security Management Act. In order to effect a comprehensive +information security program, and in accordance with the +provisions of FISMA, I have designated a Chief Information +Security Officer who manages and oversees all the internal +Homeland Security Department's information systems security +activities. The FISMA report details compliance with Federal +laws and policies and DHS information security policies and +standards. DHS is in the process of implementing enterprise +management tools to ensure the accuracy and completeness of +FISMA reporting across the Department. + FISMA requires each agency to perform for each program and +system periodic testing and evaluation of the effectiveness of +information security policies, procedures, and practices. We do +follow and will apply the Self-Assessment Guide for Information +Technology Systems from the National Institute of Standards and +Technology and as mandated by law. This self-assessment guide +utilizes an extensive questionnaire which we have already begun +using in delivering our first Department of Homeland Security +report. + I have selected a commercial off-the-shelf product called +``Trusted Agent FISMA''. This is an automated enterprise based +management tool that maintains FISMA reporting data from all of +our components and their plans and activities that captures and +tracks security weaknesses and associated corrective +milestones. In addition, it collects, processes, and stores all +of the self-assessment information in accordance with the NIST +guidance. We have deployed this system throughout DHS and have +generated our first quarterly report. We expect this to improve +the timeliness and accuracy of our reporting as this +information is available real-time to the Secretary and other +cognizant officials. + I thank you again for the opportunity to testify before you +today, and am pleased to answer questions that the committee +may have. + + Prepared Statement of Steven Cooper, Chief Information Officer, U.S. + Department of Homeland Security + + Mr. Chairman and Members of the Subcommittee: + Good morning, I am Steve Cooper, Chief Information Officer for the +Department of Homeland Security (DHS). It is my pleasure to appear +before the Subcommittee, and I wish to thank the Chairman and Members +for the providing me the opportunity to update you on our efforts and +progress in integrating and securing information systems within the +Department and to discuss the President's FY 2005 budget request for +Information Technology. I will also update the Subcommittee on our +Enterprise Architecture program efforts. + + Enterprise Architecture + In his proposal for creating the Department over a year ago the +President highlighted the use of enterprise architecture techniques to +improve both the sharing and use of information. The President stated +that the ``development of a single enterprise architecture for the +department would result in elimination of the sub-optimized, +duplicative, and poorly coordinated systems that are +prevalent in government today. There would be rational prioritization +of projects necessary to fund homeland security missions based on an +overall assessment of requirements rather than a tendency to fund all +good ideas beneficial to a separate unit's individual needs even if +similar systems are already in place elsewhere.'' + In my previous testimonies, I've discussed the vision and strategy +of DHS and how that strategy must fulfill the President's vision. +Additionally, it must be supported by a disciplined capital planning +and investment control process that is guided by business-driven +enterprise architecture. With release of the first version of the +enterprise architecture in September 2003, we made progress toward the +goal of one DHS infrastructure. Version 1 of the enterprise +architecture describes a target information management infrastructure +that will be dramatically different from the one we have today, one +that will provide timely, accurate, useful and actionable information +to all individuals who require it all the time. We believe this effort +was truly unique in the federal government in that we delivered a +comprehensive and immediately useful target enterprise architecture in +less than four months. + However, Version 1 of the Homeland Security Enterprise Architecture +(HLS EA) defines the enterprise architecture at a conceptual level and +outlines a general transition strategy that must be broken down further +for the architecture to be implemented. Version 1, which was published +at the end of September 2003: + Identified common activities + Proposed conceptual projects + Proposed reusable business components + Proposed Technology Patterns + Began communications effort + Increased understanding of EA planning and + integration + Increased the knowledge of the target + architecture + Work is currently under way on Version 2 of the enterprise +architecture. This work will develop additional detail around the +target architecture and enhance the transition strategy from Version 1 +into a more detailed transition plan that will more specifically enable +the implementation of the target enterprise architecture. This effort +currently consists of 5 business teams composed of about 45 business +people charged with the responsibility of decomposing the common +business activities. During this effort for Version 2, we will: + Verify and augment transitional projects + Verify and augment reusable business components + Verify and augment technology patterns + Prepare an HLS-EA Framework that identifies the + products that will be produced by the department and that are + expected to be produced by the Transitional Project Managers + Prepare governance procedures and bodies to ensure + alignment with the HLS-EA + Ensure the integration of the transitional projects + Concurrently with the Version 2 effort, the enterprise architecture +team is working with several large project offices, e.g., ACE and US- +VISIT, to determine alignment to the transition strategy so that these +project offices can immediately begin building to the target +architecture. + Version 2 is currently on track for completion early in the 4th +quarter, FY04. Along with continuing the hard work of developing +greater detail, we will continue reaching deeper to find more +opportunities for consolidation and opportunities to develop new and +improved mission support capabilities enabled by information +technology. Version 2 of the enterprise architecture, together with the +associated transition plan, will serve as the basis for further +improving DHS mission performance and facilitating IT alignment, +integration, and consolidation. + +Technical Reference Model Status + In Version 1 of the EA, we developed the DHS Technical Reference +Model (TRM) by extending the TRM from the Office of Management and +Budget Federal (OMB) Enterprise Architecture (FEA). The value of the +TRM is to provide a common set of terminology for describing and +organizing technology. We are currently working on further developing +the DHS TRM by improving the structure of technology categories so that +they promote consistency and are more meaningful across the Department. + In addition, we have made progress on filling in the Standards +Profile (SP). The Standards Profile provides guidance to the components +and major programs on what technologies to use to implement solutions +to ensure consistency and interoperability with other solutions within +the Department and the homeland security community. Our approach is to +collect all of the technology standards from the component CIO offices +and to organize them into the revised TRM for analysis. In many cases, +the standards in place are consistent across the components and these +consensus standards will be adopted as the Departmental standard. +Standards that are adopted fall, generally, into four categories: Move- +to, Divest, Hold, or Contain. As part of the process, we have assigned +``stewardship'' of specific standards to individuals within my CIO shop +or to other appropriate individuals in the Department. As the standards +are developed, they reviewed by the Applied Technology Working Group, +in accordance with the EA Governance Process as a part of the IT +strategic management framework, and are adopted by the Enterprise +Architecture Board (EAB). + One particular area where the TRM from the EA Version 1 has been +useful is in guiding investment in IT is in the area of ``technology +patterns.'' Patterns are repeatable solutions to recurring technical +challenges that are based on best practices, typically from industry. +In Version 1 of the EA, we identified over a dozen patterns that have +significant applicability within the Department. As a result, one of +the major business/IT initiatives within the Department, the +eMERGE2 program of the Resource Management Transformation +Office (RMTO) has adopted the pattern approach and is in the process of +acquiring technologies that implement several of the patterns +identified. These patterns and technologies will form a technology +foundation for other programs to leverage. + +Implementation of ``Quick Hits'' + Definitions for the Quick Hits, foundational elements and +activities that had to be in place to support achievement of an +integrated enterprise architecture, have been completed and stewards +have been recommended. The Quick Hits have begun to be integrated into +existing projects. For example, RMTO will soon begin implementing some +of the technology patterns included in the Technology Patterns Quick +Hit. The Consolidated Enforcement Environment (CEE) project has formed +a case management working group and is incorporating the Standardized +Investigation Case Management Quick Hit into their plans and will be +coordinating with the Department of Justice on a long term solution. +The One Face at the Border initiative met the requirements for the +Integration POE Workforce Quick Hit. The Office of Infrastructure +Management, within the DHS CIOs office, is working toward Network +Integration as part of their One DHS Infrastructure project. + +Challenges Achieving an Integrated Enterprise Architecture, Timelines +and Implementation + DHS is a new organization, formed a little over a year ago from 22 +legacy agencies, each with their own culture, processes, and legacy IT +systems. Many of these legacy agencies had begun development of their +own Enterprise Architectures prior to the establishment of DHS. The +challenge for DHS is to implement an integrated DHS Enterprise +Architecture while ensuring that, during the process, the entire +Department has the IT capabilities needed to accomplish the mission. + One challenge to achieving an integrated HLS EA is having an EA +that is sufficiently mature to support detailed alignment and analysis +for IT investment management decision-making. As I've noted previously, +DHS developed Version 1 of the DHS EA in 4 months ending in September +2003. We also used Version 1 to identify Quick Hits and we are +currently developing the HLS EA version 2, to support IT investment +management. + Another potential challenge is overcoming resistance to change and +obtaining management and organizational buy-in into the EA. The +Department has placed a very high priority on the HLS EA. Deputy +Secretary Loy has directed the major organizational components of DHS +to participate in development of Version 2 of the DHS EA. As we speak, +there are more than 5 different Business Focus Area Teams, composed of +subject matter experts from across the Department, working in +facilitated team sessions to make sure that the business model for EA +Version 2 accurately and comprehensively captures the capabilities +needed to accomplish the Department's mission. The extent of each +organizational element's participation in these Business Area Focus +Teams is reported to the DHS Management Council and monitored on a bi- +weekly basis. + The development of an EA is an enormously complex process. The goal +was to produce a foundation for enabling DHS to make decisions about +DHS investments immediately and to begin to direct its resources away +from stove-piped, duplicative systems and move to interoperable, +enterprise wide systems providing improved mission capability. Although +Version 1 of the EA is relatively conceptual in nature, it does provide +a foundation for implementation. As noted, DHS has been using the +principles and transition strategy as a basis for beginning to redirect +resources from current investments. + As we speak, DHS is working on Version 2 of the EA. This version +will include a transition plan that will be completed in June 2004. +Version 2 will continue to build on the hard work of the first version +by developing greater detail, reaching deeper to find more +opportunities for consolidation, and establishing a consolidated +framework for meeting mission need. + One of the difficulties in expediting implementation of such a +major change, such as EA, is the degree to which that change can be +managed and accepted by an organization. However, DHS has already made +significant progress in meeting the goals of the EA. We are well on our +way to consolidating many of the management functions from each of the +22 agencies, including financial and human resources systems. + 19 financial management service providers were reduced + to 10 + separate contracting offices were reduced to 8 + 22 human resource offices were reduced to 7 + 8 different payroll systems were reduced to 3 and DHS + expects to reduce this to one by the end of the year. + 22 property management systems have been consolidated + to 3. + These are just a few of the examples of progress. And it is clear +we still have a long way to go. + One of the first things we need to do is implement a full +governance structure with enforcement authority to ensure that +investments are aligned with the strategic goals. We have already made +progress in this area. This week the DHS Enterprise Architecture Board +(EAB)is open for business. The EAB is charged with the responsibility +of reviewing all investments for their alignment to our EA. What this +means is that all investments going through the FY06 budget process +will have to demonstrate that it is achieving the goals of our +transition strategy and that it is aligned to the technology standards +identified in the EA. This will mean that the EAB will be responsible +for reviewing nearly 300 investments this year. That is a daunting task +for an organization. + Another area we could focus on to expedite the implementation is to +increase the number of working groups focusing on specific areas within +DHS that support the DHS mission. Currently, DHS has the Resource +Management Transformation Office (RMTO), which is consolidating an +enterprise solution for DHS administrative functions, such as +accounting, acquisition, budgeting, grants, and procurement. + +Department-wide Information Technology Investments Budget Request FY +2005 + Information contributes to every aspect of homeland security and is +a vital foundation for the homeland security effort. My office has +responsibility for providing IT leadership that will foster best +management practices in managing IT, enhance efficiencies through +shared-services and coordination of acquisition strategies, ensuring +systems are properly certified and accredited as secure, and being an +advocate for business transformation, all necessary toward ensuring the +homeland is made more secure. The leadership and funding provided +through the Department's IT investments are crucial for maintaining an +enterprise architecture that is fully integrated with other management +processes, and for allowing DHS to participate in many E-Gov +Initiatives. + The President's budget request for FY 2005 includes a request for +$226 million for Department-wide Information Technology Investments. +Key strategic issues in FY 2005 will be to build and expand upon the +foundational work completed in FY 2003 and FY 2004; to facilitate +consolidation of management function capabilities; to lead the +implementation of the Department's Enterprise Architecture; and, to +continue to coordinate information integration efforts within DHS. + Included in the request is $95 million for Information Technology +Services, a portion of which will provide funding for the Department- +wide Geographic Information System (E-GIS) capability; to improve the +Department's Enterprise Portal; this funding provides for continuation +of the DHS Enterprise Architecture and planning; evolving the Financial +Management System, eMERGE2; and, development of the Human +Resources information technology solution. + Additionally the request includes $31 million for Security +activities, which will provide funding for continuation of the Homeland +Security Information Technology and Evaluation program; and for +continued support of terrorist information integration and sharing. + Finally, the FY 2005 request includes $100 million for Wireless +Communications, which includes funding for enhancement of the +Integrated Wireless Network (IWN) and Tech Ops Support. The Expanded +IWN initiative expands to other DHS agencies the pre-existing Justice- +Treasury IWN partnership established prior to the inception of the +Department of Homeland Security (DHS), and which includes mobile radio +(MR) and the application of emerging technologies as it pertains to +domestic law enforcement and counter/anti-terrorist operations +(including missions in the U.S. Territories), tactical communications, +legacy systems support, and airborne and non-Coast Guard marine +communications. It also continues the funding for the SAFECOM project. + +Information Security + Since it's creation, the Department of Homeland Security has moved +out aggressively to design and implement an Information Security +Program that will not only ensure compliance with all appropriate +statutes and regulations, but to also ensure that the entire Homeland +Security community has a secure and trusted computing environment from +which to operate. The heart of our reporting structure is built around +the congressional requirements expressed in the Federal Information +Security Management Act known as FISMA. In order to effect a +comprehensive Information Security Program and in accordance with the +provisions of FISMA, I have designated a Chief Information Security +Officer (CISO) who manages and oversees all of the internal Homeland +Security Department's Information Systems Security activities. + Due to the comprehensive nature of the FISMA reporting +requirements, and to avoid duplication of effort, DHS uses the FISMA +reports to satisfy the annual requirement to verify to the Secretary +the status of the Information Security Program. Additional mechanisms, +such as program briefings, status information and incident reports +ensure continuous visibility to the Secretary throughout the year. + The FISMA report details compliance with Federal laws and policies +and DHS information security policies and standards. DHS is in the +process of implementing enterprise management tools to ensure the +accuracy and completeness of FISMA reporting across the Department. + FISMA requires each agency to perform for each program and system +``periodic testing and evaluation of the effectiveness of information +security policies, procedures, and practices'' annually. NIST SP 800- +26, Self-Assessment Guide for Information Technology Systems, is the +required self-assessment guide required by OMB policy. This, self- +assessment guide utilizes an extensive questionnaire (containing +specific control objectives and suggested techniques which the security +of programs and systems can be measured. OMB's FISMA implementing +guidance also requires agencies to maintain a Plan of Action and +Milestones process that captures and tracks security weaknesses, and +associated corrective milestones. + I have selected a Commercial off the Shelf Product called ``Trusted +Agent FISMA''. This is an automated enterprise based management tool +that maintains FISMA reporting data from all our components and their +POA&M's that will capture and track security weaknesses and associated +corrective milestones; in addition it will collect, process and store +self-assessment information in accordance with NIST SP 800-26. We have +deployed this system throughout DHS and have generated our first +quarterly report. We expect this to improve the timeliness and accuracy +of our reporting as this information is available real-time to the +Secretary and other cognizant officials. + With this tool we will be able to focus our compliance and as well +as leverage the effort of the DHS Inspector General to corroborate the +accuracy of the FISMA information and improve the compliance stature of +the department. + I thank you again for the opportunity to testify before you today +and I am pleased to answer any questions you may have. + + Mr. Thornberry. Thank you. + I will yield my time to the chairman of the full committee, +Chairman Cox. + Mr. Cox. Thank you, Mr. Chairman. I take it that you mean +you are simply postponing your own opportunity? + Mr. Thornberry. There may be another chance. + Mr. Cox. I hope you do not yield your time entirely. + I want to join in welcoming our witnesses, and thank you +very much for your leadership in the Department, for being up +here today, and for keeping us apprised of what you are doing. +As you know, we are keenly interested, in fact most members of +the subcommittee have been keenly interested in cyber as a +priority since we were developing the Homeland Security Act in +Congress. And we want to make sure that it gets all the +attention that it deserves, and I know that you are doing that. + Let me begin by asking just what I hope is a trivial +question. I am just trying to do the math in the testimony: +That the $79 million dollar request for cyber; of that, 75 +percent is going to the program, 59.3. Then there was another +8.7 that goes to outreach and public awareness, and 7 million +that goes to vulnerability assessments and reduction. That +leaves, by my math, 4 million unaccounted for, and I just +wondered where it went. + Mr. Liscouski. Sir, if you would permit me to get back in +writing on that so I can do the math myself, I am sure we can +provide to you the balance of where that $4 million is. + Mr. Cox. It may be undistributed overhead. I don't know. + Mr. Liscouski. I could look through this, but I would +prefer to get back to you in writing, if I may, sir. + Mr. Cox. Okay. Given the important role, as you outlined, +Mr. Liscouski, in your testimony for the Computer Emergency +Readiness Team, the CERT, the component of your efforts, how +should we assess the other watch centers within DHS? There are +several of them. If we are interested in consistency and +overall cyber spec reporting, shouldn't we be concerned? Or +should we welcome the fact that we have, for example, the IP +National Communications System operating a 24/7 +telecommunications watch center; we have also within IP +Cybersecurity Division operating a 24 by 7 cyber watch center; +we also have within IP the Infrastructure Coordination Division +operating a 24/7 watch for physical and cyber reporting. We +have within IA a 24/7 Homeland Security Op Center with a +dedicated cyber watch desk. We have Mr. Cooper, in your shop, a +Cybersecurity Incident Response Center. And, we have at Secret +Service a 24/7 watch operation for electronic crimes. + Mr. Liscouski. Sir, and thank you for the question. Let me +get some clarity to the operations overall in terms of how the +integration of the watch centers is being performed. + The legacy organizations that came in to us from Secret +Service, from NCS that--and the Fed CIRC, that represent some +of the watch centers you just articulated. With respect to the +Fed CIRC, the NCC, the ones we have created with the HSOC, I +will just quickly try to outline what those capabilities and +mission requirements are and tell you how they are integrating. + The HSOC, the Homeland Security Operations Center is a 24 +by 7 watch center that on behalf of DHS or at large it provides +situational awareness across all of our enterprise, across the +entire United States, integrates information to ensure that we +understand from all hazards what is going on at any given point +in time. Information piped into that HSOC is analyzed, +understood in the context of is it threat information, is it +incident data? And then we share with the respective elements +of DHS to ensure that the appropriate actions are followed +upon. + In the context of other situational awareness types of +watch centers, the ICD, the Infrastructure Coordination +Division, is ultimately responsible for the coordination of +activities as it relates to infrastructure protection and +monitoring what is going on across all of our infrastructure +components irrespective of incidents. + The distinction there is ICD is going to be creating--I +will add one more acronym to you-- the NICC, the National +Infrastructure Coordination Center, which is going to be the +amalgamation of all these watch centers. This is just an +evolutionary process to the comment of not breaking it as we +are building it. We do not want to denigrate the capability we +have with existing watch centers as we are building the one +amalgam capability that is going to respond to our situational +requirements, very large infrastructure protection, which will +mean the incorporation of the NCSD's watch center, the NCC, the +National Communication Coordination Center, and other elements +for infrastructure coordination, all under the ICD. + The interconnectedness between the Homeland Security +Operation Center and the NICC is paramount for us. We are +looking to augment the capabilities of the HSOC. We have NCSD +and as well as other infrastructure protection components on +the HSOC which are responsible for doing incident management +real-time. + The reach-back capability to determine what the impact of +an incident may be is going to be through the Infrastructure +Coordination Division and, through that center, the NICC. And +it is really reflective of the complex nature of all of our +infrastructure components. Instead of creating one gigantic +coordination center, we are really looking to leverage the +capabilities that we have established through DHS to ensure +that we have got the right expertise coming to the table at the +right times to provide the answers as necessary. + So it is not a redundant capability, sir, it is clearly an +augmentation of the capability, depending on what function they +are serving at a given point in time. + Mr. Cox. But I heard in what you said that you also are +anticipating further consolidation. + Mr. Liscouski. That is correct, sir. We are consolidating +the watch centers, the national, the NCS, the National +Communications System. The NCD's watch center will be +incorporated into the NICC. That is correct. + Mr. Cox. How is my time, Mr. Chairman? + Mr. Thornberry. The gentleman's time has expired. + Mr. Cox. All right. I thank the CHAIRMAN. + Mr. Thornberry. Although the Chair is trying to be lenient. + The gentlelady from California. + Ms. Lofgren. Thank you, Mr. Chairman. + I have had a chance to--although I didn't have a chance to +read your testimony, Mr. Cooper, I did have a chance to review +your comments to the House Government Reform Committee in +October of last year. And in that testimony, you had given your +first draft of the Department Enterprise Architecture Plan, and +you provided what I think you called a Quick Hit Project that +you thought could be accomplished within 6 months. And some of +those quick hits were integrating watch lists, network +integration, developing external information sharing strategy, +completing a feasibility study on integrating Immigration and +Customs case management systems, and a number of others. + Now, we don't have teams of people auditing your +department, but I don't believe we yet have a unified watch +list data base. And the Inspector General has told us that the +lack of an agreed-upon IT infrastructure prevents the Office of +Information Analysis Risk Assessment Division from +communicating with State, local, and private sector partners, +and that inhibits the exchange of information. And the IG also +says that there is concern that the IAIP lacks connectivity to +access sensitive data bases maintained in other Federal +agencies, which hampered their efforts to conduct business. +And, you know, you can't always believe what you read in the +press, but Information Week has reported that your office has +had problems handing over and receiving secured e-mail. + Can you provide us with an update and where we are on all +the quick hits that you were going to get done by now? + Mr. Cooper. I can give you an initial update, and I would +like to also provide information in writing on all of the quick +hits represented in the first release of enterprise +architecture. But let me address a couple that I think are +very, very relevant to the points that you made. + With regard to an integrated watch list and with regard to +information sharing, the Secretary and the Deputy Secretary +have already initiated an information sharing program that is +now under way within the Department. The business owner is +General Frank Liboutti, who is our Under Secretary for +Information Analysis and Infrastructure Protection. Under his +guidance, he has named a program director, and a team has been +established that has already begun work in addressing how we +will move forward to better improve our connectivity and our +ability to put in place a two-way exchange of information with +all of our stakeholders, both internal and external. + Ms. Lofgren. Can I interrupt to try to understand? + Mr. Cooper. Yes, ma'am. + Ms. Lofgren. So this information sharing effort is only +within the Department? Does it include the FBI and those +agencies that are outside the Department? + Mr. Cooper. Yes, ma'am. It will address the full national +scope. + Ms. Lofgren. It will but it does not currently? + Mr. Cooper. It does not currently. We are in the early +stages of formation, and the team exists and is now working +through the various requirements for the different communities +with which we must interact. + Ms. Lofgren. When do you think that will be done? + Mr. Cooper. Our expectation is to hit the deadline set for +us by Under Secretary Liboutti, and that means that we will +have a significant amount of this in place operational and done +by the end of this calendar year. + I also want to highlight that in the quick hits we have in +place and operational what we are now calling our Homeland +Security Information Network. We built off a program called +JRIES, Joint Regional Information Exchange System, that is +operational. It is in place. And we are rapidly expanding +membership in that system and as part of our Homeland Security +Information Network. In the next several months, we will expand +from the current about 50 participating State, local, and +Federal partners who are already connected to probably about +five times that number in the next several months. And, again, +I will be more than happy to provide detailed program plans +related to information sharing and building upon what is +already operational. + Ms. Lofgren. I see that I am just about to run out of time. +But I would like to get, I am sure every member of the +committee would want, a report on each one of the quick hits +and the current status. Before--I guess my time has completely +expired, so I will yield back to the chairman. I expect we will +have a second round. + Mr. Thornberry. I thank the gentlelady. + The gentleman from Nevada. + Mr. Gibbons. Thank you very much, Mr. Chairman. + Gentlemen, welcome to the committee. We are happy to have +you. Your information has been extremely helpful to us. + Cybersecurity is not new. It is something that not only +your agency but other Federal agencies have been working on for +decades in some cases. If you could help us better understand +how agencies like the NSA, National Security Agency, NGA, +National Geospatial Intelligence Agency, the CIA, the DOD, all +of those other agencies' efforts have been or have not been, I +don't know what the answer will be, integrated into your effort +in cybersecurity. How do you leverage their experience, their +efforts, their work product over these many years to help you? + Mr. Liscouski. Thank you, sir. And there is a couple of +different perspectives on the roles and responsibilities within +those agencies and how they would integrate and how we partner +up. + DHS has got a protective mission and the protective mission +we have in terms of looking at how we should best protect our +critical infrastructure, the partnerships that we have got +there clearly within the Intelligence Community and the NSA and +the DOD specifically are we actively leveraging those. We have +got a very strong partnership with NSA across a number of +fronts. Up until just recently, until a recent transfer, the +Deputy Director of the NCSD was in fact an NSA detailee, and it +provided tremendous opportunity for us to leverage the +experience that they have over the years of being able to gain +an understanding of how to best protect those systems, and we +are actively looking or looking forward to his replacement to +come on board very shortly. Similarly, within DOD, who also has +a protective mission for their dot-mil domain, we partner up +with the Joint Task Force For Computer Network Operations. We +have a very robust exchange of information between our US-CERT +and their operations center. We have got very good personal +relations as well as operational relationships with that +agency. + On the offensive side, clearly within the domain of that +realm, I speak at a very high level here, we are able to +partner up with CIA and other Intel Community efforts to +understand how they best look at their offensive mission to +understand how we best need to look at our defensive mission +based upon what the capabilities are out there. + On the intel side, in terms of the threat assessments, as +you may know, through our Information Analysis Office we use +them as the portal back into the Intelligence Community. We +regularly drive requirements into the Intel Community to better +understand how we can best protect our networks and our +Nation's infrastructure from cyber threats. + So it is really a multifaceted approach. I would say it is +highly integrative from the standpoint of either through +people, exchange of people, or through active exchange of +information. + Mr. Gibbons. Very quickly, who establishes the standards by +which you integrate and take advantage of all of these multiple +operations? Is there a common standard which is being +established, and are you part of that? Do you control it, or is +some other agency in control of the standard and definitions +about how this cybersecurity program that you just described +takes place? + Mr. Liscouski. Well, we have got the benefit of the +Homeland Security Presidential Directive 7, which was signed by +President Bush on December 17th of 2003, which provides us the +framework for integration of all of the--real large for +infrastructure protection, not just for cyber, to ensure that +we have appropriate roles and responsibilities laid out for +that protection. We are actively engaged in framing out not +just the strategy but the implementation of that strategy. It +is a work in progress as we develop the plan we are +implementing. But we are able to negotiate with respective +sister agencies in the Federal Government as well as State and +local and the private sector to understand how we have to, +again from the total infrastructure protection picture, flesh +out the responsibilities. Who is going to do what? What +programs are necessary to be done? Where the gaps are? And, +most importantly, from the perspective of outcomes, how do we +measure the outcomes to ensure that we have effectiveness? That +falls under the auspices of HSPD-7. I have direct +responsibility for that. I have got a program office in my +office to do this, and we are actively engaged in fleshing it +out. + Mr. Gibbons. One final quick question. What degree does the +DHS enterprise architecture plan to marry up with the Federal +enterprise architectural efforts as well? + Mr. Liscouski. I will defer to Mr. Cooper for that. But I +will just, as a segue into that, is we are wholly dependent on +Mr. Cooper's efforts to provide us the backbone enterprise +architecture for our operations. + Mr. Cooper. It is aligned. Even before the Department was +formed, we actually began working with the Federal enterprise +architecture framework to both work with Dr. Haycock, who was +guiding the charge under Norman Ranscript of the Office of +Management Budget, and we have continued that relationship +since. So it is very much alive. + And in those business areas that are critical to Homeland +Security, we become, if you will, the lead agency. So as the +work we do to populate the business processes, the +informational requirements and then supporting technology, that +flows into the Federal enterprise architecture. + Mr. Gibbons. Thank you, Mr. Chairman. My time has expired. + Mr. Thornberry. I thank the gentleman. + The gentlelady from the Virgin Islands. + Mrs. Christensen. Thank you, Mr. Chairman, and I would like +to welcome our two witnesses, also. + Mr. Cooper, do you feel that your office has the sufficient +authority to drive IT integration within the Department of +Homeland Security, even though you don't have direct line +authority over divisional chief information officers? And, if +not, is there anything that we can do to strengthen that +position, the position you hold within the Department of +Homeland Security? + Mr. Cooper. What I have done is to have created a +Department of Homeland Security CIO Council, which is comprised +of all of the named or titled CIOs who came into the Department +with their respective agencies that now comprise the full +Department. Additionally, I have asked the Chief Financial +Officer and the Chief Procurement Officer to participate with +us as full members of that council. Together, we have been +participating in the investment review process of the +Department. That is under the guidance of the Under Secretary +for Management and Under Deputy Secretary Loy. I believe that +in concert we have been appropriately bringing forward the +proper recommendations, the proper decision-making framework so +that we can make adjustments, if necessary, in some of the +alignment that we inherited with regard to legacy applications +and/or infrastructure investment. We will continue to learn, we +will continue to grow, we will continue to refine these +processes as rapidly as we can. + Mrs. Christensen. And to what extent also does your office +interact with other Federal agencies outside of DHS? + Mr. Cooper. I personally participate in the Federal CIO +Council. So there are regular meetings. I am also a member of +the Executive Committee of the Federal CIO Council. We draw +upon the Federal CIO Council for a lot of that interaction. +Additionally, our Chief Technology Officer and our Deputy Chief +Information Officer are also members of that committee. So the +three of us participate very actively. + Mrs. Christensen. Do you provide standards for the other +agencies that are outside? + Mr. Cooper. My office actually does not provide standards +for other Federal agencies. But let me give you a real example +of how it works. We, like other Federal Cabinet agencies, +receive the direction and guidance that are set by Mr. +Liscouski's area of responsibility, and we then apply, as all +Federal CIOs would do, we apply that guidance and those +standards, those accompanying standards within the Department +of Homeland Security. + Mrs. Christensen. Assistant Secretary Liscouski, last week +we had a briefing from two of the private infrastructure +organizations, the financial and telecommunications sectors. +Could you tell us how your office interacts with the private +sector? And early on, in the early days of the Department there +seemed to be not an easy relationship, or there were problems +that needed to be resolved. Could you talk about the +relationship within your office and those private sector +agencies? + Mr. Liscouski. Yes, ma'am. We have a very aggressive +outreach program with the private sector, and you are +accurately portraying the relationships in the beginning. The +legacy relationships that we inherited from the PDD-63 effort +that ultimately authorized the establishment of the ISACs, the +Information Sharing Analysis Centers, didn't allow for +sufficient leadership and engagement at the private sector +level to allow them to mature to a level of capability that +would ensure that we had robust information sharing going both +horizontally across information or industries as well as +vertically back up to the government. + The first couple of months we were engaged with the private +sector, we actively looked at that model to see how we could +best leverage it, and the first part of that was to determine +the validity or the value of those information sharing analysis +centers. And I can tell you from my private sector experience, +I looked hard at the efficacy of that effort. + To be candid with you, when I looked real hard at it. I saw +there was a lot of opportunity there that we could leverage +very well into a success story by enabling and empowering the +private sector through the ISACs to develop their horizontal +relationships, how they integrate and how they collaborate +information. And that was the road that we embarked upon to +ensure that we could establish that. + We have got a very good story to tell. I hope you heard +that last week between the FS ISAC specifically. + Mrs. Christensen. What exactly is your current relationship +with the ISAC Council? + Mr. Liscouski. Well, we have got an excellent relationship +with the ISAC Council. They have stepped up to the leadership +plate and they have provided what has been necessary and has +been previously missing with the private sector, and that is +the private sector leadership going back down into the private +sector. They are actively engaged with my office both through +the Infrastructure Coordination Division, which is responsible +for managing ISACs and funding ISACs, as well as directly +through my office I actively engage with them minimally once a +month on a council level and much more frequently on an +individual level. So I think we have got a very robust and a +very successful story to tell as it relates to our private +sector partnership there. + Mrs. Christensen. Thank you. I think my time is up. + Mr. Thornberry. I thank the gentlelady. + The gentlelady from Washington, the Vice Chair of the +committee. + Ms. Dunn. Thank you very much, Mr. Chairman, and welcome, +gentlemen. It is very interesting as we begin to tie some of +these responsibilities together to get a clear view from your +point of view on how things are working. + Secretary Liscouski, in your written testimony and in your +testimony before our panel today, you identified a couple of +major steps in your management methodology that were +interesting to me. One was the identification of critical +infrastructure. Another was the assessment of vulnerabilities. +I am especially interested in knowing how you work together +with local government bodies and State government bodies and +the private sector, what kind of input they have into these +assessments, and whether they have a direct pipeline to you to +know what you decided on. + Mr. Liscouski. Yes, ma'am. Thank you, and I appreciate the +question. + As I pointed out, our partnership with the private. +sector--and coming from the private sector, my bias is that we +have to work closely with the industry to determine what they +believe their priorities are, and we have to normalize those +priorities with what we believe are our national level +priorities. + We accept ready input from both the private sector, the +associations and, importantly, the State and local and tribal +governments to ensure that we have got their perspective on +what has to be protected and how it can best be protected. We +develop common vulnerabilities assessments, common best +practice methodologies, which are vetted through our State and +local and tribal contacts as well as the private sector to +ensure that we have got, in terms of our achieving +infrastructure protection at large, consistent, effective, +sustainable, and measurable capabilities and results across all +of our critical infrastructures. + Now, as a general statement, I will tell you that we are +succeeding in that very well. The methodology that we have +outlined is that, at a national level, is scalable right down +to an individual company level. It is the type of methodology +which is being adapted to ensure that we help the industry at +the single entity level as well as those that are highly +interconnected to ensure that we can identify those +vulnerabilities, the assets that need to be protected, the +vulnerabilities, and the appropriate levels of programs. + The reason integration is so important to us, not just +within the Infrastructure Protection Office as it relates cyber +and physical, but clearly as it relates to State and local +involvement, is because these efforts cannot be done +unilaterally. The private sector cannot afford to protect +itself nor does it have the wherewithal to protect itself that +the State and local governments do in their law enforcement and +protective authorities. So all the programs that we have +developed and designed have been in collaboration and +coordination with all those stakeholders to ensure that we have +both a rational approach and an effective approach, and one +which is dynamic enough to be molded against the current threat +at any given point in time. + As you know, it is a very dynamic threat environment, so it +is a work in progress. Clearly, the engagement we have with the +private sector, we are constantly being fed with new +technologies and new ideas on how to best implement programs +that can be effective. At the end of the day, it is the private +sector who is responsible for ensuring that they are doing what +they need to be doing to protect that critical infrastructure. +So we have a significant effort there. + Ms. Dunn. The State and local governments are satisfied +with the relationship they have with you? + Mr. Liscouski. At a general level, I would say they are, +but as everything, I think there are different opinions. + We have clearly a lot of room for improvement across the +board. We are not satisfied with where we are today. We are in +the very early stages of building this program. It is a long- +term approach, but I think we are satisfied with the approach +we are taking. + Over the recent holiday threat period, we were actively +engaged, and I am sorry to see Mr. Gibbons go because I had the +opportunity to be out with Mr. Gibbons in Las Vegas during that +period of time in which we had very robust meetings with the +private sector, State and local governments. To be candid with +you, I wasn't quite sure what kind of reception we were going +to get, but we worked through many very difficult issues and +came up with some very successful solutions to a response of +that holiday threat period; and I think it is representative of +the types of efforts we have out there that do tell a good +story. + Ms. Dunn. That is good. + I think it is very useful that both of you have been in and +out of the private sector, so you understand the value of what +they can contribute and the kinds of communications that they +need in order to be part of this whole thing. I think it makes +us all stronger. + Let me ask you, Mr. Cooper, one question. The enterprise +architecture team that you have started is going to come up +with a plan to connect networks within the Department of +Homeland Security. At the same time, you have new programs +being started up, like U.S. VISIT. Do you believe that you are +in contact with them to the extent that you know what sort of +information-sharing requirements they have and is it working +well together? + Mr. Cooper. Yes, ma'am. I am actually a member of the +executive advisory committee of U.S. VISIT in that specific +example and also participate in the advisory committees of all +of our major programs. We are deliberately looking for major +programs to leverage whatever capability is being established. +For example, within U.S. VISIT, as we roll out new biometric +capability at the borders and ports of entry, that requires +some new underlying infrastructure. We are actually leveraging +that new investment as part of the U.S. VISIT program to ensure +that infrastructure enhancements that we are making become the +foundation of the direction that our infrastructure requires +and--as represented in our enterprise infrastructure +architecture. + We are doing the same thing with Customs and Border +Protection's ACE program. We are leveraging the legacy +Immigration and Naturalization Service's Atlas program for +which there is appropriated funding to better establish +infrastructure, and we are working to coordinate all of those +investments within our enterprise architecture activities. + Ms. Dunn. Are you going to be able to get the FBI and CIA +to come together so the U.S. VISIT can use their information in +a way that is consistent? + Mr. Cooper. I am confident we will do that. I am afraid +where we might have a difference of opinion is the timing that +it might take. + Mr. Thornberry. So the question is, are any of us going to +be alive when it happens? + Gentleman from North Carolina. + Mr. Etheridge. Thank you, Mr. Chairman, and let me thank +you gentlemen for being here this morning. + Mr. Cooper, I know--I think a question has been asked in +one way on the testimony previously before the Government +Reform Committee, and let me go back to that and ask my +question a little different way, to some extent on the same +subject as it relates to the 18 projects. Let me talk about two +of them and one very specifically, I think, because right now, +as you are trying to pull these together, and I guess I am very +interested in particular--first, as you talk about the State +and local industry needs survey, what do you hope to gain and +what is its status is what I would like to know. + And let me go to another one that is very specific that I +know my office and, I assume, many offices have problems with. +This is an ongoing problem of getting information out of the +Citizens Immigration Services, or CIS, because for my +constituents they are constantly blaming the computer system. +We call them, and they keep saying it is the computer system's +problem. Well, garbage in, garbage out. You know what I am +talking about in computer language. + And I am very interested in hearing about the feasibility +study on integrating immigrations and Customs case management +systems. Specifically, don't we need to fix the immigration +computer problems first before we integrate those with Customs? +Because if we don't get them fixed and integrate them, we are +compounding the problem. I hope you will help me understand +that so I can share that back with my staff who are quite upset +about it. + Mr. Cooper. I understand. Let me take them in reverse order +of your question. Let me go ahead and address citizenship and +immigration services. + First, I do agree and the approach we are taking is exactly +as you described. We have done a couple of things very +actively. First we have--. + Mr. Etheridge. Can you give me a time line as to when we +will have it fixed? + Mr. Cooper. I will give you our current working targets of +timing. The first thing that I had done is I have worked +directly with Director Aguirre and his staff. We have named a +CIO in Citizenship and Immigration Services. That individual is +already on board and working directly with his staff and +directly with the program folks to first, as you properly point +out, to fix the problems with both the process as well as the +underlying information technology that supports those +processes. + They will address, first, developing and reengineering any +of the processes that they find to be inefficient or lend +themselves to optimization. Only until that work is done will +we then move forward to integrate with other component parts of +the organization. + So we are following your advice. We are fixing the problems +first, streamlining process, understanding requirements, +understanding the information necessary to support those +processes; then automating within CIS, then integrating. And +there is opportunity to integrate in that case management +arena. + We have also ongoing an integrated consolidated case +management effort that is at the very beginning so that the CIS +folks, who are developing the work that I am just describing to +you, are also part of a larger interdepartmental working group. +And then, in turn, we also have reached out to other Federal +agencies, like the Department of Justice or the Department of +Energy, who have automated solutions in place to then evaluate, +might there be an already existing solution that we could reuse +that we could bring to bear? And the goal is to optimize, +streamline and modernize, but don't necessarily build all this +stuff from scratch because we are suddenly a new department. + Does that give some guidance. + Mr. Etheridge. The time line? + Mr. Cooper. Here, again, we are moving forward. The time +line to address the backlog is 6 months, the target that +Director Aguirre has given us to direct the backlog and a lot +of the cases kind of pending, from roughly this time period. + Another way of thinking about that is that our goal is to +address this and have real solutions on the ground and to have +cleared that backlog as fast as we can. But Director Aguirre's +direction to me and to my team is help us do this by the end of +the fiscal year. + Mr. Etheridge. October 1? + Mr. Cooper. Six months, that is the target, this fiscal +year. + Very quickly, in the State and local information sharing, +that type of thing, as part of the program that I mentioned to +you that Under Secretary Libutti is guiding, as part of that, I +actually have been working along with several of our other +colleagues and leaders within the Department, particularly the +office of State and local government. + We actually have been reaching out through the National +Association of State CIOs and through a number of larger city +CIOs, my office and me personally. We have been exchanging +information. We have been working to better understand the +requirements for information sharing from State and local and +tribal government and from members of the first responder +community. We are doing that not only through my office, but +when we have something like Project Safecom which is also +reaching out on the interoperability issue. That is how we are +gathering requirements. We are then taking those and applying +them and sharing them within the Department and working +together within the Department and State and local partners to +put solutions on the ground. + Mr. Etheridge. I know my time is up. Is that sharing a two- +way sharing? + Mr. Cooper. It is a two-way sharing. In fact, we require +them to guide us. We can't see the requirements from the +Federal environment. We are dependent upon them to provide +local requirements. + Mr. Etheridge. In a lot of cases, they are really our eyes +and ears for those people who don't have the data. + Mr. Thornberry. I thank the gentleman for his good +questions. + The gentleman from New Jersey. + Mr. Andrews. Thank you, Mr. Chairman. I would like to thank +our witnesses for their testimony this morning and for their +service to our country. I know they do it at some considerable +sacrifice. + The first thing I thought about last August when I heard +about the blackout that was rolling across the northeast United +States was whether it was an accident or whether it had been +deliberately caused. + Let's assume--and happily all the evidence from that is +that it was an accident. Let's assume that, this morning, a +utility company in Wisconsin found evidence that someone was +hacking into their system with an apparent attempt to bring +down the system and bring down the grid. How would you find out +about that? + Mr. Liscouski. We learned a lot from the blackout, sir, and +the processes we established with NCSD and through IP in +general, particularly as it relates to situational awareness +during that blackout period served us very well. For +instance--. + Mr. Andrews. Not to interrupt, but if that happened this +morning, who would tell you? + Mr. Liscouski. What we learned in the blackout period was +the processes we put in place at that time were exactly the +same processes we would learn from an event similar to the +hypothetical you just provided. We work with FERC, NERC in +particular, which is the North American Electrical Reliability +Council, which establishes the ISAC management point for our +relationships with all the private sectors that relate to the +electric utility companies. They have a very robust capability +and the communications across the grid to pick up on incidents. +Most likely, that would be the first indication for us +reporting back from the private sector back into the ISAC, +directly back into DHS about any activity like that. + Mr. Andrews. Would the utility company be required to tell +you this, or just do it as a matter of good practice? + Mr. Liscouski. There is a requirement--and I am getting a +little bit out of my lane here as it relates to the regulatory +requirements set forth by both the FERC and the NERC, FERC in +particular; but I believe that there is a requirement to report +those outages, but I can't specifically cite the authorization +for that regulation. + Mr. Andrews. I know this is probably an unknowable answer, +but give me your best guess. + How long would it take between the discovery of the +intrusion by the utility company and report of the intrusion to +responsible authorities within your division? + Mr. Liscouski. There are a lot of dependencies on that +chain--in the chain of that reporting. The first indication +would be the robustness of that particular enterprise that +might be under attack to detect an attack. In some cases, it +might be a failure that might be the first indication of an +attack. Where there is more robust capability, they are doing +network monitoring and there are standards that have been +supplied by NERC for implementation for cybersecurity, +particularly resulting from the blackout example that would +allow a utility company to be able to detect what is going on +and therefore report it. + It depends upon the magnitude of the type of attack, their +capability to detect that. + Mr. Andrews. I think I just heard you say that your ability +to know would be very dependent upon the robustness of the +detection system the utility company has in place. So if they +had a weak system in terms of detection, you all might miss it +all together? + Mr. Liscouski. It really depends upon the type of attack. +If it is a very specific attack against a specific company, a +utility company or any other company that might be on the +Internet, specifically targeting them, there are a couple of +points we might be able to get information from, a, from the +ISP which might be monitoring network activity that might see +an increase of traffic to a specific IP address that might +result in a denial of service for instance. The IP could report +it to us, the target company could report it to us; it really +depends upon the scenario. It is not easy to come up with a cut +and dried answer to say, yes, it can happen, or no, it can't +happen. + Mr. Andrews. Let us assume that the information was +accurately reported and let us further assume that there were +tools at your disposal that would stop the spread of the +problem, that you could wall off other parts of networks and +other parts of systems to protect other parts of the power +grid. And let us assume that your best experts in your +department said that is what you ought to do. + Do you have the authority to tell people to do that or not? +Do you have the authority to tell the other people in the +utility system that they have to follow those prescriptions or +not? + Mr. Liscouski. Taking the example, in partnership with the +Department of Energy with whom we have--and the FERC with whom +we have a strong relationship in the protection of critical +infrastructure, by extension, I would say we have the authority +to initiate that activity. + The actual execution of that authority would be with those +respective regulatory agencies that have that specific +legislative authority. But in terms of taking an action and +prescribing a specific action, going back to the earlier +conversation I had about the HSPD7, we are exactly in the +middle of framing out those roles and responsibilities and how +we would broker those relationships. + Mr. Andrews. What I think I just heard you say was that if +you detected the attack and if you had a clear recommendation +as to what to do about it from your experts that you would have +to have some cooperation from the Department of Energy to +execute the solution, right? + Mr. Liscouski. I think it is more appropriate at the FERC +level. + Mr. Andrews. You would have to have some cooperation from +FERC and there are other regulatory bodies that might have some +flow in this, too. The Nuclear Regulatory Commission might have +a hand in it? + Mr. Liscouski. They might. + Mr. Andrews. I raise these questions not just to paint an +interesting hypothetical, but I think we have a lot of +technological issues, and we have a lot of very smart +technological people to address them; but I think fundamentally +we have a management problem, an analytical problem. And the +analytical problem is, who is in charge when we have a crisis? + I don't pretend to have an answer, and I don't advocate the +answer that government be in charge of private enterprises in +these circumstances. I don't want to see that. But we need to +think through, ``we,'' the committee, the administration, +everyone, these protocols, because we don't have a lot of time +to make these decisions. And even if we have honed the +technology to the point where we know what is going on, and we +have some good ideas what to do about it, we have created +confusion or dysfunction--you haven't--as to who is in charge +of what. + Mr. Liscouski. I don't think that is the appropriate +characterization. I think we have good leadership. I think DHS, +the brilliant part about the creation of this department is it +does pin leadership responsibilities on the Secretary in +working through the relationships we have with sector-specific +agencies. It may not appear to be a direct line of authority, +but there is a clear line of communication that--we got +activity going, and we have plenty of examples over the recent +threat periods of how we have exercised that authority in +cooperation. + Mr. Andrews. Can the Secretary order utility companies to +do what your folks would say they should do? + Mr. Liscouski. I feel pretty confident we can exercise the +necessary actions we would need to get to get the appropriate +action at that level. We have a cyber IIMG, Interagency +Incident Management Group, that was stood up subsequent to the +live wire exercise that took place this past fall in which the +lesson there was that we need a cyber response. We quickly +created that capability. + I am confident, sir, that we have the leadership that we +need. Do we need to refine that and figure out how we do it +better? Absolutely. + Mr. Andrews. I realize my time is up. I am not in any way +impugning the leadership capabilities of people in these jobs +nor am I doubting our competence to do them. What I am +wondering about is because of the relative infancy of this +department whether a--knowing bureaucratic turf battles to be +what they are, if we were find ourselves mired in a +bureaucratic turf battle at a time that we had to make some +very quick decisions, I think it behooves us to answer those +questions in advance so people know clear lines of authority. + Mr. Liscouski. We are actively engaged in looking at those +lines of communication. I would be happy to come back and talk +to you about that. I wouldn't want you to leave this committee +room thinking that we haven't thought about that or we haven't +taken activity on that. + Mr. Andrews. I certainly don't think. I think we +collectively need to think more about it and establish clear +lines of authority. + Mr. Thornberry. Gentleman from Rhode Island. + Mr. Langevin. Thank you, Mr. Chairman. + And, gentlemen, thank you for being here. I would like to +touch on a couple of areas that have already been touched on +this morning, first, dealing with JRIES and the second dealing +with outreach to private industry. + First of all, can you tell us about the relationship +between JRIES and RISSNet? Those people who may not be familiar +with it, that is the Regional Information Sharing Network used +by law enforcement. It is a highly effective tool for +intelligence sharing and obviously it is a proven entity. + It was my understanding that JRIES was supposed to partner +with RISSNet, but evidently that has not happened. And, in +fact, from what I understand, RISSNet has been sidelined by +DHS. So I would like to ask why it seems that you are pushing +aside a proven system for a brand new one. + Second question for Secretary Liscouski: Last week I had a +meeting with the IAIP directorate's enterprise architect +Jonathan Houk and a company from my district, Ibis Consulting, +to discuss how DHS is tapping the vast amount of expertise +residing in the private sector. And I was pleased to hear that +he is trying to leverage industry resources as much as possible +in setting up IAIP's enterprise architecture, which is still +obviously in the planning stages. + But aside from Mr. Houk's efforts, I would like to hear +more on how effective DHS has been in forging industry +partnerships. And I would like to hear more from you and Mr. +Cooper about DHS's policies and guidance concerning industry +outreach, if you would take the RISSNet question first. + Mr. Cooper. Let me address that for you, sir. + You are correct in that there was a period of time where +the communication between the two programs was not occurring +and was not anywhere near as effective as I think both groups +and DHS want it to be. Much more recently, myself included, we +have gotten that back on track and the RISS.Net team has met +with the JRIES team and the program director to reengage and to +actively build upon the work that RISS.Net has already done and +to rapidly map into our homeland security information network, +which is now what JRIES is evolving into as far as a label. It +is a broader scoping. And that change in title properly +reflects the broader scoping on behalf of DHS. So I do +acknowledge that there was a temporary delay. We didn't have +the effective communication. We believe very strongly that now +has been corrected and I know that as of last week, there had +been more recent meetings between the RISS.Net team and the +JRIES team to move this forward. + Mr. Langevin. I am encouraged to hear that. + Mr. Liscouski. Sir, with respect to the private sector +outreach program, we have it in many dimensions. Let me address +the cyber one since that is the focus of this panel or meeting +this morning. + Mr. Yannis has taken a very aggressive approach in +establishing private sector partnerships. The first event that +he participated in was the cyber summit back in December in +which we were actually able to announce and get him engaged in +the private sector outreach program. But subsequent to that, +there have been a number of initiatives that he is engaged in. +There is a US-CERT, private sector partnership program. They +are on daily watch calls with the private sector either +directly with private sector entities or through the ISACs. The +task forces that have result from the cyber summit are also +reporting back and are actively engaged with the NCSD in +providing information and recommendations about how they can +influence best practices throughout the industry. + Across infrastructure protection, we have traditionally +have had--traditionally, in a year, if you can establish a +tradition in the year, we have had active engagement with the +NSTAC, the National Security Telecommunications Advisory +Council, which is a presidential council established through +the NCS; the NIAC, National Infrastructure Advisory Council, +which was established through the legacy organization of the +CAIO. Those are things we are actively engaged with. + The Homeland Security Advisory Council, which was +established by the Secretary, has its own subcouncil, the +Private Sector Advisory Council, with whom we are actively +engaged. They represent, really, leadership of industries at +the top level, at the CEO level, with whom we both exchange +ideas and get influence from, again, the ISACs themselves +across all the infrastructure components. + The private sector component is one in which I personally +take an active leadership role, ensuring that we have got the +right things going on there. We look for every form possible to +ensure we get both feedback as well as getting our message out +there. And importantly, when we get the feedback, it is, what +do they believe they need to be doing to better protect our +critical infrastructure; and we take that feedback into our +thinking about how do we develop programs, realistic, going +back to the consistent, effective, sustainable and measurable +types of approaches we try to take. + I could, frankly, better take the remaining time here to +talk about the different types of relationships and I would +like to address something specific if you have it. + Mr. Langevin. Can you talk about your interaction with +small business? Very often they are the innovators and +entrepreneurs that are out there at your basic level that have +a product they believe can fill a niche. This is what happened +with Ibis Consulting, and I put them in touch with the right +people. + But how easy is it for small business to reach someone at +DHS and get some type of an answer or an action? + Mr. Liscouski. There are two parts to that question. + From a protection standpoint, we actively reach out to +small businesses through our partnerships with our private +sector outreach office, Mr. Al Martinez-Fonts, who you may know +is a Special Assistant to the Secretary. His office is +responsible for ensuring that we don't let any business fall +through the cracks if they are not represented by a specific +infrastructure sector themselves, so leveraging partnerships +with U.S. Chamber of Commerce, for instance, or other industry +groups to reach out to those small businesses to get the word +about how to best protect themselves. + I was a small business owner and I am a staunch believer in +what they add to the economy. That is the growth engine for the +economy. We are very interested in protecting them. In terms of +outreach and ways they can actually do business with us, I will +defer to Steve, but the reality is we have a number of +mechanisms by which companies can reach DHS. + Mr. Cooper. We have specific focus on small--and medium- +sized businesses. My office works very closely with Kevin +Boshears, who is the Director of our Office of Disadvantaged +and Small Business Utilization; and we have actually, with his +guidance, established some programs to flow and to make +introduction connections with small businesses, in particular +with my office. + I have named a Special Assistant For Industry Liaison, Tom +Bold, and Tom has developed a program that then, in addition to +Kevin's guidance to us, we have established a Web site that +allows small businesses, medium-sized businesses--any business, +but we are trying to focus on small and medium-sized +businesses--to make their products and, services with specific +areas they believe that they can help us address some of the +business problems and challenges that we face, known to us. + We have--I personally, along with my team, have met with +more than 3,000 businesses in the past year. We are trying to +meet as many and talk with as many people as we can. We feel +very, very strongly, and I have publicly spoken about the fact +that we inside the Department don't have all of the technology- +enabled answers. We are dependent upon a very cooperative, +collaborative partnership with industry, particularly small-- +and medium-sized businesses where a lot of the innovation does +occur. + Mr. Langevin. I am encouraged by your answer. + Mr. Thornberry. I thank the gentleman. + Mr. Liscouski, let me try to see if I can ask a series of +questions related to the national strategy to secure +cyberspace, which the administration issued just before the +Department really was up and running. But it still seems to me +that to offer a good blueprint on the issues we need to be +concerned about with regard to cybersecurity; and what I would +like to do is go through some of the things they said we need +to work on and have you just at least give us the name of a +program or an effort. We can't get into the details of this +stuff, or we will never get anywhere, but I am trying to get a +feel, over the last year, how much progress have we made. + The first priority, as you know, is the National Cyberspace +Security Response System. That is the first priority in the +national strategy. And then they talk about public-private +architecture for responding to national level cyber incidents. +The first specific under that is analysis, tactical, strategic, +and vulnerabilities. + Are we doing those things? Are we analyzing those cyber +attacks? + Mr. Liscouski. We are, sir. + Mr. Thornberry. Do you do that or does IA do that; or does +the Cyber Division, which is under you, do that? It says +``analysis,'' so how does that work? + Mr. Liscouski. Let me take the first part of what we are +doing, and I will tell you how we are doing it. There are a +number of efforts that we have got under the priority one; the +first--and no order of ranking here, just to give you the +amalgamation. + There is the critical infrastructure--I am sorry, Computer +Incident Interagency Management Group that I referred to +earlier, first part of our response system. There are the +alerts that we put out through the cyber alert system, as well +as the efforts we are taking to build our national watch +capability. We have got a--one effort dedicated to network flow +analysis and situational awareness, and we have got our C1 +project, which is our secure and survivable communications. + But who does the analysis that is aggregated among these +types of efforts is a combination of--we work closely with our +information analysis colleagues. The unique thing is, you know, +about IAIP as we are joined at the hip. We both are resources +for each other. In the context of threats, IA has the +responsibility of providing us with threat information and that +can then be mapped over to vulnerabilities. The technical +expertise to understand how those threats can manifest +themselves and those vulnerabilities, particularly in the cyber +world, is found in the NCSD. + So analysis occurs across the soft center of IAIP if we +look at where really the heart of what the IAIP organization is +providing in terms of value to DHS. + I don't mean to be overly complicated about this, but there +is analysis on both sides of that equation. So as it relates to +priority 1, we have a very distinct role from the NCSD's +perspective providing that response capability as well as an +analytic capability. + Mr. Thornberry. Number two under that same priority is +warning, and you just referred to some organization, but that +is kind of an operational role; it seems to me that is a little +different from infrastructure protection. I presume that is the +same thing. Cyber Division is doing all of that analysis and +the operational things and yet they are under infrastructure +protection. I think that is kind of a unique situation for +cyber, but also raises some questions. + Mr. Liscouski. It is not unique for cyber. We are doing a +similar way for telecommunications under the NCS. Similarly, +within our protective security division, we are doing an +analysis on threat information as it relates to mapping that +threat information into vulnerabilities. As I point out, this +is a very--you can't cut that Gordian knot. It is robustness of +analysis going on both sides of the equation. + The one way that he might look at it is, threat information +is sort of incident specific. Vulnerability analysis in terms +of how vulnerabilities may be exploited might be end results +specific. For instance, oftentimes we look at if we want to +create--if a terrorist group is interested in creating a mass +casualty type of event, they have a number of different ways +they can use that: biological event, chemical event, bombing, +using aircraft as missiles. We all know the results and we look +at different ways we can affect that type of outcome. + The analysis that has to go on to exploit vulnerabilities +in those particular modalities of attack are things that our +organization is responsible for doing. The intent and who has +got the capability of doing those things clearly resides on the +side of the information and analysis. + Mr. Thornberry. Under, still, priority one, one of the +things we need, the strategy says, is recovery mechanisms and +continuity plans in Federal cyber systems. Are those under way? + Mr. Liscouski. Yes, sir, they are. The partnerships we have +in cross-infrastructure components, but cyber in particular, is +intended to be able to recover from an attack as quickly as we +possibly can, reconstitute ourselves. That is an integral part +of our protection program. + One of the things a good recovery capability does is it +devalues the target. One of the protection priorities we have +is not just hardened targets, but to quickly recover from an +attack should an attack occur. That effectively devalues the +target if we can recover quickly. + Mr. Thornberry. I am not going to go through all of these +items. I will skip ahead for a second to priority two, which is +threat and vulnerability reduction. + Among some of the specific items listed there are securing +the mechanisms of the Internet including key Internet +protocols, Internet routing, and management of the Internet. +How are we working with the private sector to do those things +that were specifically set out in the strategy? + Mr. Liscouski. We have a number of initiatives currently +under way in which we are looking at both the vulnerability of +the Internet as well as ways that we need to enhance the +security of the Internet. One of those efforts, the GEWIS +program, which was the Global Early Warning Information System, +started out as an effort that the NCSD has enhanced +significantly and gained ownership of, is looking broadly +across the Internet at the network analysis activity that needs +to be examined to ensure that we can see attacks coming over +the horizon and take protective actions as necessary. + Mr. Thornberry. I think what we might like to do is submit +some of these other types of questions for the record, going +through the various elements of the strategy, again not looking +for detail, because that is way too much, but I do think it is +important for us and for all of those interested in this topic +to have some idea that at least there are initiatives under way +for the various areas, and some of them are not even in your +bailiwick. But the initiatives that are under way, we need to +know that they are under way. + I yield to the gentlelady. + Ms. Lofgren. I realize we are out of time and we have a +series of votes. I have a lot of questions which I will submit +and look forward to the written response. + But I did want to make sure that I understood Mr. Cooper's +answer to Mr. Etheridge, because I wrote it down and want to +make sure I was not mistaken. + Did you say that by the end of this fiscal year we will +meet the President's 6-month goal on processing immigration? + Mr. Cooper. I am indeed saying that we are going to do +everything that we possibly can to meet that goal. That is our +direction, that is where I am placing additional information +technology resources to help do that. + Ms. Lofgren. Thank you very much. + Mr. Thornberry. The chairman may have additional questions, +particularly for Mr. Liscouski, who has another hearing. Maybe +Mr. Cooper might be more flexible if we need to come back. + Mr. Cox. We don't need to come back. I intend to go to the +floor for the vote, but I would take a few minutes before we +leave. + Mr. Thornberry. We have the gentleman from Florida here. + Mr. Meek. I will yield to the chairman and I will submit my +questions for the record. + Mr. Cox. I appreciate your courtesy. + On the subject of our overall strategic objectives, I am +impressed and pleased that the number one strategic objective +is preventing cyber attacks against America's critical +infrastructures. When I look at the priorities as they are laid +out, I find that the first priority is the response system. The +second priority is threat and vulnerability reduction, which +has as its analog the second of the two, the second of the +three overall objectives for DHS itself. + Likewise, priority 3 is awareness and training. That gets +to protection. Priority 4 is securing government cyberspace. +That, of course, is defensive. And within priority 5, as it is +outlined, even though it is described as international +cooperation, there is a bit about intelligence sharing and so +on. + But, you know, the main purpose of the Department of +Homeland Security is to deal with the problem of T and T, +terrorists and technology, the weapons of mass destruction plus +terrorists, the possibility that mayone day be upon us. That is +the worst thing that could happen to the country and, +therefore, the first thing that the Department of Homeland +Security needs to concern itself with. + Such things as pulse weapons directed at our country, +therefore, mark what ought to be the top priority in prevention +there is clearly superior to dealing with it after it happens, +just as with any other weapon of mass destruction. So I wonder +if I could inquire first whether you have it in mind to place +increasing emphasis on the prevention piece, because while it +is occasionally mentioned, I see that we are focused, for +understandable reasons, elsewhere because it is more tractable; +and specifically whether it is possible to initiate more +meaningful collaboration between the National Cyber Division +and the Department of Defense. + Mr. Liscouski. Yes, sir. From our perspective, these +programs all roll up into a good preventive and protection +approach. You can take apart elements and see that they +contribute to protection. But every single one of these, from a +response and recovery capability awareness, threat and +vulnerability reduction, all really do constitute good +protection programs. So I would, if I understand your question +correctly, validate this approach in terms of what it +accumulates--. + Mr. Cox. What I am trying to do is distinguish protection +from prevention. We have prevention, protection response. I see +a lot of protection, a lot of response, and I need to +understand more about what we are thinking about doing in the +prevention area. + Mr. Liscouski. In the context of prevention and again, I +don't want to be definitionally based here, but as it relates +prevention, typically the law enforcement component of +interdicting, detecting and interdicting what is going on. +Detection as it relates to prevention is clearly within the +domain of what we do. The actual activity related to +interdicting or reducing an adversary's ability to attack us is +not something that my organization is charged with. + Mr. Cox. On the other side of IAIP, in the other half of +Frank Libutti's brain, we have the essence of the prevention +piece of DHS, and it would seem to me that that would apply +just as thoroughly to cyberspace as anything else. + Mr. Liscouski. The full circle here--and again, this is +trying to cut the Gordian knot, but we look at prevention in +the context that you just provided it to occur at the target +level. And the things that we can control in the world, that we +do to protect--if I could take some time here for a moment-- +there are protective activities we engage in which increase +awareness of group capabilities and tactics that could be +affected against a specific target. + We go out and train the private sector on what to look for, +the observables of preincident indication of activity of a +terrorist attack. Those observables, while they may be +disparate pieces of information not directly related to an +imminent attack, but potentially future planning of an attack, +are things we can pipe back into our IA folks to assist in the +prevention role. + That is the value add that we have in the ability of +providing information from the private sector that we directly +gain on preincident information that we collect, that we share +with our information analysis component that gets put back into +the intelligence community to affect good prevention +methodologies and good prevention activities. It is finding +out--and the unique thing about this and the unique thing about +what DHS does, particularly as it relates to IP, is that we +deal in the target community; and as a result and as opposed to +looking at just the criminal activity or the terrorist activity +that goes into targeting the private sector, we are dealing +with the targets that are the focus of those terrorist groups. + So if we know what to look for and we can train people in +what the observables are, that observable information can +significantly enhance prevention activities as it relates to +law enforcement and the intelligence function. + As I pointed out earlier, it is a pretty complex process, +but I think it is an extremely articulable one as it relates to +what our role is and how we play together in this space. It +happens in the cyber world routinely; as we found out, probing +or potential exploit probes, things that can be detected in the +cyber world contribute to that sort of knowledge as well. +Terrorist groups, we know, use cyber activity to probe physical +targets to see what the penetration capabilities are. That +information gets collected similarly as observable--physical +things that are observable get reported back to us. + I don't know if that responds to your question or not. + Mr. Cox. It amply responds given the time that we have. I +appreciate very much your willingness to speak to the point. + I thank the chairman. Please keep in mind my suggestion +about deeper cooperation with DOD. I think that that could be +helpful. + Mr. Liscouski. I could respond to that, too. + We actively engage with DOD and we are looking at all +levels between NORTHCOM as well as the Assistant Secretary of +Defense Paul McHale. We have a good partnership there. + Mr. Thornberry. I thank the chairman. + I would like to ask both witnesses if we can have an +agreement that because our time has been cut short, that you +all will make an effort to respond to our written questions, +try to within 2 weeks and less than 30 days, and I will commit +to you to make sure that the questions are reasonable in length +and scope. If we could have that agreement with both of you, I +would appreciate it. + I am going to ask one other question at the risk of missing +this first vote. You are free to go Mr. Liscouski, but I don't +know if anybody is going to be over there anyway because we are +all voting. + But, Mr. Cooper, I want to direct this to you because one +of the primary reasons that the Department of Homeland Security +was created was to integrate 22 different agencies into one +seamless unit. Now, the total measurement of seamlessness is +not having one IT architecture and system with which the +Department can operate, but it is a pretty good one. And yet, +when I look at some of the specifics that you have provided on +the progress you have made, you have still got ten different +financial management systems, you have still got eight +different contracting offices, seven different human resources. + I guess it is an area where I am frustrated, frankly, and I +want to ask, is the primary difficulty you face figuring out +what you want to do? Is it resolving the technical difficulties +of merging these 22 different agencies? Or is it something +else? Is it money? Is it getting the decisions made to force +people to go use somebody else's computer system even though +that is not what they have been using? + If you had to summarize the difficulty you face in making +this one seamless IT department, what is it? + Mr. Cooper. I would summarize it in this way: It is a +combination of people, process and technology. The technology +is in fact, honestly, from my professional and kind of sitting +in the role that I currently sit in, is the least controversial +and the easiest to effect. + However, having said that, it is--in and of itself, the +technology challenges are complex. We know how to do them, so +that is the easiest. + The second is process. What we don't want to do, if you +pardon the expression, is pave the cowpath. We want to +reengineer some of the processes that we now use or will use to +effect threat identification and management or some of the +cybersecurity activity that Bob has talked about or some of the +back office processes that I spoke to briefly. That is hard +work. + We do have--we are making progress. I mentioned the five +business area focus groups. This is under way. We were a little +bit slow to get going because we had to do some education. We +had to help people understand why this is an important and +valuable exercise. + We have had the support of the Secretary. We have had the +support of the Deputy Secretary and now we are engaging. All +areas of the Department are engaging. So that, I feel +comfortable that we are under way. + Again, we will move as fast as we can move with quality and +with speed. It may take us longer than all of us would hope +that we could complete. + The last and the toughest is people. This is about change. +And that means that in some cases, the right decision or what +might come out of these business area focus groups might be +suggestions or reengineering that says a process used to be +done in many organizational elements and now it might be more +appropriate to place it in one organizational element, name +that organizational element, the managing partner or the +business process owner to have reach and span of control across +that process across the entire Department. That is change, it +is difficult, and it is about thinking differently and about +doing work differently. + I don't have exact answers. It is not quite a science yet. +There is a little bit of art involved. + Mr. Thornberry. I appreciate your analogy of changing the +tires as the car is moving, because while you are doing this +stuff, you still have got to guard the borders and still have +to process the people coming in. And I don't want to minimize +that effort. + I will say this. I think a number of us will be looking for +ways to help you, maybe even push you a little bit to make sure +that this does move as fast as possible. And understanding +culture and people and reluctance to change, we cannot let that +obstruct the ability to have a department that is functioning +as well as it possibly can, because so much is riding on the +success of this department. + So I don't want to make your job more difficult, but on the +other hand, separation of powers is here for a reason and maybe +we can help give you some extra incentive or whatever to get +the job done. + But I appreciate it. I appreciate both of you being here +and your answers today, and I appreciate your willingness to +answer our written questions promptly. And, with that, the +hearing is adjourned. + [Whereupon, at 11:50 a.m., the subcommittee was adjourned.] + + + A P P E N D I X + + ---------- + + + Questions Submitted for the Record + + Questions for Assistant Secretary Robert Liscouski, From Congressman + Dave Camp + + 1. Your office has the responsibility to communicate cyber threat +information to the private sector. I am interested in understanding the +different means you use to accomplish this task. What challenges do you +face in communicating with large companies (the Financial Services +Sector, for example) versus small business owners and private users? +What are the different means you utilize to reach these different +groups, especially given their varying levels of understanding of cyber +threats? + The primary ways that DHS communicates cyber threat information to +the private sector are: (1) through the U.S. Computer Emergency +Readiness Team (US-CERT) public website at www.us-cert.gov, (2) through +the US-CERT's National Cyber Alert System (NCAS), (3) through the US- +CERT Portal, and (4) through the Information Sharing and Analysis +Centers (ISACs) in each of the critical infrastructure sectors. + The US-CERT public website is our primary means to provide +information to the public at large. It includes relevant and current +information on cyber security issues, current cyber activity, and +vulnerability resources. To date, the website has received over 3.8 +million hits at an average of 128,000 per day. It also provides a link +to the National Cyber Alert System (NCAS). + NCAS is an operational system developed to deliver targeted, +timely, and actionable information to Americans to allow them to secure +their computer systems. Information provided by the NCAS is designed to +be understandable to all computer users, technical and non-technical, +and reflects the broad usage of the Internet in today's society. The +NCAS provides a communication mechanism through website access and e- +mail alerts for providing general guidance for users and the ability to +reach millions of Americans at once with a variety of cyber security +information materials on both a technical and non-technical level. +There are currently over 270,000 unique subscribers to the various +alerts provided by the NCAS, and our challenge is to increase its +outreach to as many Americans as possible. We are working closely with +the National Cyber Security Alliance on expanding the Stay Safe Online +campaign, coordinating closely with the Federal Trade Commission on +their information security campaign, and working with other trade +groups and industry associations with key cyber security awareness and +outreach programs. + In addition to the public website, US-CERT maintains an active +secure online portal that enables the cyber security stakeholder +communities including government and the private sector to communicate +and collaborate on cyber security efforts. Groups that utilize the US- +CERT portal include the Chief Information Security Forum (CISO Forum), +the National Cyber Response Coordination Group (NCRCG), DHS's Office of +Infrastructure Protection, the Government Forum for Incident Response +Security Teams (GFIRST), the Multi-State Information Sharing and +Analysis Center (MS-ISAC), and the US-CERT staff. One challenge to +reaching the private sector communities has been creating a trusted +protocol for sharing information. That challenge is being addressed in +through the NCSD/US-CERT Outreach and Awareness efforts. + In the case of vendor-specific vulnerability or threat information, +we communicate directly with appropriate and expert representatives in +the individual company when that is possible. The recent Cisco +vulnerability is a key example of how we communicated--and +collaborated--with the private sector on a very specific vulnerability. +The ability to communicate with specific companies in such cases is +crucial. The appropriate contacts are being developed through the NCSD/ +US-CERT Outreach efforts and through participants in the US-CERT +Portal. Outreach targets include the spectrum of the critical +infrastructure sectors (through the ISACs, industry associations, +etc.), software developers and researchers, academia, government, the +information technology (IT) vendor and operator community, and others. +DHS works with various vendors to understand, assess, and inventory +vulnerabilities so that when threat information is transmitted, it +includes specific instructions on how to mitigate or eliminate the +vulnerability, and what resources exist to obtain help. + The ISACs were established as a primary mechanism for two way +information sharing with the critical infrastructure sectors. Many +critical infrastructure sectors have developed procedures to widely +disseminate their alerts, warnings and advisories, to both large and +small companies, throughout their sector. These sectors involve trade +associations, representing smaller companies, who receive information +from the ISAC and who then re-transmit that information to their +members. + + 2. How do you utilize Information Sharing and Analysis Centers +(ISACs) to share and receive threat information? How do you recommend +strengthening or improving the relationship between ISACs and DHS for +this purpose? + DHS/IAIP's Infrastructure Coordination Division within the Office +of Infrastructure Protection maintains an on-going relationship with +the ISACs and is the focal point for all ISAC relationships for +critical infrastructure issues. Threat information gained from the +Intelligence Community through DHS's Office of Information Analysis +alerts, warnings, and advisories applicable to the critical +infrastructures and key resource industries are delivered directly to +them through standard agreed upon procedures. DHS/IAIP also provides to +them regularly scheduled daily situational briefings, and periodic +classified briefings as needed as well as special briefings when there +is a major change in the threat level. IAIP also meets periodically +with the ISAC Council a cross-sector body representing a large number +of the ISACs, to improve information sharing practices and strategies. +Such meetings help to sustain the relationship with the ISACs by +proactively identifying gaps that need to be mutually addressed. + DHS is constantly strengthening its relationship with the ISACs. +One of its most critical programs is the implementation of a National +Infrastructure Coordination Center (NICC) to serve as an operational +nexus for all of the ISACs. The NICC allows representatives from the +ISACs, industry groups, and key companies within each sector to share +and receive situational awareness information. These sector experts +work both within their areas of expertise and across sectors to +maintain constant situational awareness of the status of the critical +infrastructure. The NICC provides a centralized mechanism for sharing +information with the ISACs and the private sector in response to an +event or crisis. The ISACs will also be expanded to ensure that one +exists for each critical infrastructure sector and key segments within +each sector. DHS continues to work with industry to evaluate ways to +reach the full breadth of each critical infrastructure sector, either +through improvements in the ISAC mechanism or additionally through +sector coordinating groups. + In addition to these regular, ongoing efforts, the Homeland +Security Information Network, once functional, will facilitate real- +time communication between DHS and the private sector through the ISACs +or other sector groups as they form. DHS is also working with the ISACs +on a number of exercises, on a national, regional, and sector basis +that will help determine where communication and collaboration +improvements can be made. + + Questions From Congressman Sherwood Boehlert + + 1. Mr. Liscouski, in a September 2003 letter to Governor George +Pataki, you requested New York's initiative and leadership in the +Multi-State Information Sharing and Analysis Center (MS-ISAC) and +promised that DHS would assume a more 'formal' role in the MS-ISAC, +once established. New York State and Mr. William Pelgrin, Director of +Cyber Security and Critical Infrastructure Coordination for the state, +have been proactive and effective in coordinating and leading the +Multi-State Information Sharing and Analysis Center. Mr. Pelgrin's +efforts have resulted in the MS-ISAC involving 49 states and the +District of Columbia and a business plan, submitted to DHS, which +highlights roles, responsibilities, budgets, and additional steps +needed for the MS-ISAC. Now that it has been established, what funding +and support do you plan to provide the MS-ISAC as you work to formalize +the relationship between DHS and this critical initiative that you +requested? + DHS recognizes and appreciates Mr. Pelgrin's efforts to develop and +expand the Multi-State ISAC. As part of this effort, we had requested +that he engage other like entities within the states, which had +information sharing initiatives on-going, such as NASCIO, and integrate +their efforts. That work is in progress. We are currently reviewing Mr. +Pelgrin's business plan that was developed prior to the implementation +of new capabilities within DHS, such as the National Cyber Security +Division, the US-CERT, and the announcement of the Homeland Security +Information Network (HSIN) by Secretary Ridge in March 2004. All of +these new capabilities are intended to assist and enhance the core +capabilities of the ISACs and bring them up to a common level of +effectiveness. The Multi-State ISAC will receive the benefits of all +these new capabilities including the ability to share information and +collaborate on cyber security issues on a 24x7 basis and to further +integrate information sharing within and across State and local +governments through the HSIN/US-CERT portal. + The Multi-State ISAC and Will Pelgrin have been extremely +supportive of the US-CERT and our initiatives to increase national +cyber security situational awareness. The NCSD has participated on a +number of Multi-State ISAC monthly conference calls throughout 2004 and +plans to continue to support the mission of the Multi-State ISAC to +provide valuable cyber security vulnerability and incident information +to the State level. Moving forward, NCSD plans to work along with the +Multi-State ISAC to mutually improve cyber security on both the state +and federal level. As such, DHS has entered into a contract with the +MS-ISAC to provide $400,000 in FY04 funds, which the MS-ISAC is +currently using for various outreach efforts such as conference, the +webcast series, and other activities. DHS is exploring an increase in +the funding for the MS-ISAC in FY05. + + From Congressman Mac Thornberry and Congresswoman Zoe Lofgren + + 1. Coordination for Threat Assessments + a. How is the National Cyber Security Division (NCSD) working + with the Information Analysis Directorate (IA), which has + responsibility for information analysis of the threat? + The Office of Information Analysis (IA) is DHS' portal to the +Intelligence Community and is responsible within DHS for all aspects of +the intelligence cycle for cybersecurity, such as issuing additional +collection or analysis requirements to the rest of the Intelligence +Community. NCSD works with IA on the substance of the collection and +analysis requirements. + Operationally, the NCSD works with IA through daily threat +assessment meetings and on an as-needed basis in the case of a specific +threat. One example of this coordination was the participation of NCSD +in partnership with IA to develop the National Intelligence Estimate +(NIE) ``Cyber Threat Against the Information Infrastructure.'' This +classified document is an update of the 2000 NIE of the same title. In +addition to the regular meetings NCSD participates in daily conference +calls with the National Security Agency/NSIRC, the Central Intelligence +Agency, and the Department of Defense's Joint Task Force Global Network +Operations (JTF-GNO) to discuss classified cyber activity of note. + b. How does the NCSD interact with the Terrorism Threat + Integration Center (TTIC) for classified assessments? How are + these assessments used and what NCSD products have resulted + from TTIC derived information? + NCSD interacts with the Terrorism Threat Integration Center (TTIC) +indirectly through the DHS Homeland Security Operations Center (HSOC). +NCSD shares the staffing of a 24x7 Infrastructure Protection desk at +the HSOC that has direct reach back to the US-CERT, and the HSOC and +TTIC work closely together on information for both physical and cyber +threats. Additionally, NCSD interaction with the TTIC is accomplished +through DHS/IA, law enforcement and intelligence community detailees on +staff in IAIP and is developing a comprehensive threat, risk, +attribution assessment, and response capability. + With regard to classified assessments, NCSD participated in +National Intelligence Estimate's cyber threat assessment in conjunction +with IA and other members of the law enforcement community. + To date there are no specific NCSD products that have been produced +from TTIC-derived information. + c. Who within DHS has the authority and mission to correlate + cyber threat and vulnerability for an overall assessment? When, + how, and with whom will this information be shared? + As a focal point for cyber security issues related to reducing the +vulnerability of critical infrastructure or key resources in order to +deter, mitigate, or neutralize terrorist attacks, DHS' National Cyber +Security Division (NCSD) has the authority and mission to correlate +cyber threat and vulnerability information. The NCSD performs this +correlation within the Division in a collaborative effort between the +US-CERT Operations branch and the Law Enforcement/Intel branch as the +lead entities but also in collaboration with other Divisions in the +Office of Infrastructure Protection. In addition, as part of the +National Infrastructure Protection Plan (NIPP), NCSD is responsible +for: (1) conducting risk assessments and determining the necessary +protective measures for the information technology industry, and (2) +providing guidance to the sector specific agencies with responsibility +for other critical infrastructure sectors on how to incorporate cyber- +related vulnerabilities into their vulnerability assessments. + NCSD regularly shares information with key stakeholders within DHS, +including the Homeland Security Operations Center (HSOC) through +existing daily conference calls or targeted communications, IAIP, and +other components as appropriate as well as with interagency partners +through the NCRCG, GFIRST, and the Chief Information Security Officer +(CISO) Forum. As information is cleared through classification +procedures, NCSD also shares information with the private sector +through appropriate channels, including the ISACs, the HSIN/US-CERT +Portal , and the US-CERT NCAS. The public at large can also access +information provided through the NCAS as well as the US-CERT public +website. In the event that a cyber threat rises to the level of +national security, the public will be informed through the Homeland +Security Advisory System (HSAS). + +2. Coordination for Cyber Advisories and Warnings + a. What organization within DHS is responsible for managing and + issuing cyber advisories and warnings? + Through its mission to serve as a national focal point for cyber +security issues and to implement the National Strategy to Secure +Cyberspace, NCSD is responsible for managing and issuing cyber +advisories and warnings. Those advisories and warnings are issued to +the public and our partners through the NCAS and to specific entities +on an as-needed basis in the case of a targeted vulnerability or +threat. Information that is less sensitive and for wider distribution +is disseminated through the US-CERT public website and the US-CERT +secure online portal, as appropriate. + b. How will DHS integrate cyber advisories and warnings into + the existing Homeland Security Advisory System (HSAS), given + that cyber has a unique audience, particularly when those + people who must respond to an attack are not the traditional + First Responders used for physical national disasters? + NCSD provides information for use in the HSAS to be activated as +appropriate. However, the nature of cyber attacks is that there are +varying degrees of cyber activity at any given time that warrant +advisory to the cyberspace stakeholder community that does not meet the +criteria for raising the national alert status through the HSAS. +Therefore, US-CERT utilizes the NCAS to notify the entire national, and +international stakeholder community about activities that may warrant +specific protective measures but that do not rise to the national +security level of the HSAS. US-CERT is reaching out to key partners for +incident response at various levels of sensitivity or urgency through +the NCAS, the US-CERT secure online portal, the NCRCG, and the US-CERT +public website to communicate with cyber ``first responders'' and other +stakeholders. + In the event of a cyber incident of national significance (or an +incident with both physical and cyber implications), the NCSD/US-CERT +and/or NCRCG will provide analysis and recommendations to the IIMG or +to the Secretary to help inform a decision about whether to raise the +national alert level, + c. How is the cyber threat and warning mission being integrated + into the Homeland Security Operations Center (HSOC)? + US-CERT communicates regularly with the HSOC on cyber security +issues, including participation in daily conference calls and regular +e-mail and other correspondence. In addition, the NCSD shares the +staffing of a 24x7 Infrastructure Protection desk at the HSOC that has +direct reach back to the US-CERT for coordinated action as appropriate. + d. How will DHS work with other countries when responding to a + cyber attack, given that most attacks have effects on + information systems around the world? + Cyberspace transcends traditional borders and we recognize our +international outreach is crucial to protecting ourselves. As such, DHS +is active in a number of multilateral and bilateral activities +addressing cyber security issues such as early warning, response, and +information sharing. NCSD and US-CERT are reaching out to other +countries to form strategic partnerships that we will be able to +leverage in the case of a cyber attack. US-CERT is a member of the +Forum for Incident Response Security Teams (FIRST), an international +coalition of government, commercial, and academic organizations that +aims to foster cooperation and coordination in incident prevention, +prompt rapid reaction to incidents, and promote information sharing +among members and the community at large. FIRST is one way that US-CERT +works with computer security incident response teams (CSIRTs) in other +countries when needed to share information, best practices, and +experiences. US-CERT also communicates and collaborates with other +CSIRTs directly. + For example, NCSD and US-CERT participate in the cyber security +efforts of the Asia Pacific Economic Cooperation (APEC), the +Organization for American States (OAS), and the Organization for +Economic Cooperation and Development (OECD). Their respective programs +seek to raise awareness about cyber security, provide technical +assistance and capacity building for emergency response teams, help +develop trusted relationships between response teams, and to build a +global ``culture of security.'' + On an operational basis, the NCSD and US-CERT are developing closer +ties with the so-called ``Five-Eyes'' countries (United States, United +Kingdom, Canada, Australia, and New Zealand), as well as other +countries with key operational capability and interest through +information sharing and cooperative mechanisms. The objective is to +forge trusted relationships with our counterpart organizations abroad +and develop the basis for a coordinated response in a cyber incident or +attack. We seek and have created opportunities to build those +relationships in a number of international forums and activities. The +most recent example was the multilateral conference on cyber security +that DHS/NCSD co-hosted with the German Ministry of the Interior in +Berlin in October 2004. Government policy makers, managers of CSIRTs +with national responsibility, and law enforcement representatives from +fifteen countries in Europe, Asia Pacific, and the Americas +participated in the conference. The conference focused on developing a +framework for cyber information sharing and incident response, and +included a tabletop exercise to examine international communication and +collaboration channels as well as interactive sessions on international +information sharing and incident response. The participants agreed to +an initial framework for cyber information sharing and incident +response by identifying points of contact cyber information sharing +actions in the short term and, and are forming a cooperative mechanism +to build a more mature framework in the longer term. + +3. Framework + a. Is DHS developing a cybersecurity framework for public and + private use and what is the status? + The cyber security framework for the nation is the National +Strategy to Secure Cyberspace issued by President Bush in February +2003. The Strategy put forth a framework of five priorities for all +stakeholders in protecting our nation's information infrastructure and +provided a roadmap for both the private and public sectors to undertake +toward a more secure cyberspace. DHS is well on our way to implementing +the Strategy with our counterpart agencies throughout the government +and are actively partnering with the private sector to work +collaboratively and create a set of public milestones to measure +progress. We have consolidated and are leveraging existing programs and +have identified new ones toward meeting the mandate of the Strategy. + b. What elements are being included in this framework? At a + minimum, please include an update for benchmarks, standards, + best practices, common criteria and other elements as + appropriate. + The elements of the framework are set out in the Strategy's five +priorities: + Priority I:A National Cyberspace Security Response System + Priority II: A National Cyberspace Security Threat and + Vulnerability Reduction Program + Priority III: A National Cyberspace Security Awareness and + Training Program + Priority IV: Securing Government's Cyberspace + Priority V:National Security and International Cyberspace + Security Cooperation + Key elements of our program to meet the mandate of the Strategy are +as follow: + US-CERT--established a 24x7 cyber watch and warning operation + with a secure online portal for collaboration, information + dissemination, and information exchange; + US-CERT Outreach--establishing regular communication and + collaboration mechanisms such as US-CERT Portal, US-CERT public + website, NCAS and other activities to reach critical + infrastructure sectors, software developers, academia, + government entities, and other stakeholders. + Strategic Initiatives--identification of cyber security + programs for the long term, including software assurance, + research and development, exercises, training, and education. + Law Enforcement and Intelligence Coordination--NCSD works with + key parties in the law enforcement and intelligence communities + to leverage information and coordinate response to cyber + security threats and events. + NCSD has identified a set of goals, corresponding objectives, and +programs and initiatives to further these goals that map to the five +priorities of the National Strategy. NCSD is working to develop a set +of specific milestones to measure progress toward the goals articulated +in the following strategic framework: + +---------------------------------------------------------------------------------------------------------------- + PRIORITY NCSD GOALS +---------------------------------------------------------------------------------------------------------------- +I. National Cyberspace Security Response System #1 Prevent, predict, detect, and respond to cyber incidents, + and reconstitute rapidly after cyber incidents +---------------------------------------------------------------------------------------------------------------- +II. National Cyberspace Threat and Vulnerability #2 Work with public and private sectors to reduce + vulnerabilities and minimize the severity of cyber attacks +Reduction Program #4 Coordinate with the Intelligence and law enforcement + communities to identify and reduce threats to Cyberspace +---------------------------------------------------------------------------------------------------------------- +III. National Cyberspace Security Awareness and #3 Educate and encourage Americans to secure their + Training Program cyberspace thought a National awareness and training + campaign +---------------------------------------------------------------------------------------------------------------- +IV. Securing Governments' Cyberspace #1 Prevent, predict, detect, and respond to cyber incidents, + and reconstitute rapidly after cyber incidents + #2 Work with public and private sectors to reduce + vulnerabilities and minimize the severity of cyber attacks +---------------------------------------------------------------------------------------------------------------- +V. International Cyberspace Security Cooperation #1 Prevent, predict, detect, and respond to cyber incidents, + and reconstitute rapidly after cyber incidents +---------------------------------------------------------------------------------------------------------------- +Common to All Priorities #5 Build an effective organization +---------------------------------------------------------------------------------------------------------------- + + NCSD has various opportunities and obligations to report to +Congress on its programs and activities and will continue to do so as +requested and on a timely basis. + c. How will progress and compliance with voluntary standards + and the framework be measured and certified, particularly in + the private sector, which owns and operates most of the + critical information infrastructure? + The private sector has a large role in increasing our nation's +cyber security, and they are acting upon that responsibility. Private +sector associations formed the National Cyber Security Partnership +(NCSP) and are expanding it to include over 20 associations. NCSD is +participating in meetings of the NCSP and others to encourage the +articulation of a set of priority milestones for implementation of the +priorities of the National Strategy that can track progress by the +private sector and government. + d. What incentives will be provided, or are needed, in order to + have government and industry adopt this cybersecurity + framework? + Much of the Strategy calls for information sharing between the +private and public sectors. Historically, companies and other entities +have had concerns about the confidentiality of information shared with +the federal government, either independently or through a mechanism +such as the ISACs. Congress enacted the Critical Infrastructure +Information Protection Act as part of the Homeland Security Act of 2002 +to facilitate sharing of the most valuable information about +capabilities, threats, vulnerabilities, and deterrence programs +possible. The law granted an exemption for voluntarily submitted +critical infrastructure information from the Freedom of Information Act +(FOIA) and state sunshine laws. To implement the law, DHS has created +and led a working group to develop regulations and procedures for +receipt, disposition, and use of Protected Critical Infrastructure +Information (PCII). In February 2004, DHS created the PCII Program +Office, which has developed rigorous safeguarding and handling +procedures to manage the information flow and prevent unauthorized +access to information submitted under the PCII program. + Separately, the market demand for cyber security presents a +significant incentive for both government and industry to adopt the +approach laid out in the Strategy. + e. The National Institute of Standards and Technology (NIST) + has been active in developing cybersecurity requirements for + industrial control systems. Are these activities being included + in DHS efforts to develop cybersecurity standards? How will DHS + capitalize on these activities to decrease the vulnerability of + privately owned critical infrastructure? + Yes, the National Institute of Standards and Technology (NIST) +efforts to develop cyber security requirements for industrial control +systems have been included in DHS' efforts to develop cyber security +standards, particularly in NCSD's effort to develop a control systems +framework. + The control systems framework will build upon the work already +completed by the NIST-sponsored Process Control Security Requirements +Forum (PCSRF) and developed in compliance with the ISO 15408 +requirements definition language (Common Criteria) to allow for +international acceptance. + PCSRF has already developed a system protection profile for +industrial control systems? components that serves as an appropriate +starting point for this effort. Work continues on the profile, and once +the reference components are defined, a vulnerability analysis will be +conducted to enumerate the relevant operational security requirements +for each class of component. These requirements will then be mapped to +a set of security controls based on specific assurance levels and the +criticality of the site in terms of impact on critical infrastructure, +economic impact and/or potential loss of life due to an environmental +manifestation of a successful cyber attack on a control system. Once +this definition is complete, specific recommendations will be made to +implement the appropriate security controls in each environment. + Currently there is a lack of specific guidance in the standards +that are being developed for operational control systems +implementations. NCSD will continue to work with the standards bodies +and industry to define any specific sector operational requirements, +and then to offer rigorously defined security requirements and specific +recommendations for security and/or mitigation back to the standards +bodies and to industry. + In addition to the framework, DHS has invested funds to augment the +existing testing capability of the National Supervisory Control and +Data Acquisition (SCADA) Testbed officially launched in May 2004 and +run jointly by the Idaho National Environmental and Engineering +Laboratory (INEEL) and Sandia. The National SCADA Testbed is aimed at +SCADA systems only and aimed strictly at developing the capabilities to +test energy sector systems. DHS' test center operates hand-in-hand with +the SCADA Testbed, but the DHS effort is focused on the non-energy +sectors and is trying to work with other existing private and public +testbeds as to leverage their efforts and avoid duplication. The DHS +Control Systems Security and Test Center (CSSTC) and the National SCADA +Testbed was officially opened in August 2004. + Finally, with regard to control systems, NCSD is developing a +control systems risk/impact decision tool that the US-CERT will be able +to use for analysis and vulnerability evaluation for control systems. + +4. Management + a. How is DHS distinguishing cybersecurity roles and + responsibilities internally, e.g., NCSD, CIO, TSA, Secret + Service, NCS, and others? + By virtue of the mandate provided in HSPD #7, NCSD has been given +the mandate to ``facilitate interactions and collaborations between and +among Federal departments and agencies, State and local governments, +the private sector, academia and international organizations.'' As +such, NCSD is a national focal point for the public and private sectors +on cyber security issues and it is responsible for coordinating the +implementation of the National Strategy to Secure Cyberspace. NCSD +recognizes that each of these entities may bring unique capabilities, +responsibilities and/or authorities to bear on cyber security issues, +and as such, NCSD must act as a coordinating body to ensure that these +entities are acting in concert. + When dealing with the internal DHS information systems, the DHS CIO +has the responsibility and authority to implement and assure the +security of such systems. NCSD ensures that the office of the CIO is +kept informed of the latest cyber threats and is provided with timely, +actionable information to take steps to protect DHS systems from +emerging malicious code occurrences. + The National Cyber Response Coordinating Group (NCRCG; previously +known as the Cyber Interagency Incident Management Group) will +coordinate interagency preparedness and operations to respond to, and +recover from, cyber incidents and attacks. The role of the NCRCG is +discussed in the Cyber Annex to the National Response Plan. The group +brings together senior officials from DHS, law enforcement, defense, +intelligence, and other government agencies that maintain significant +cyber security capabilities. The combination of these officials/ +agencies provides the capability to analyze and coordinate a national +level response to any incident that affects cyber assets. In addition +to the ability to focus portions of their agencies? resources, they +possess the necessary statutory authority to act. + The National Communications System (NCS) is responsible for +coordination of the planning for and provision of national security and +emergency preparedness communications for the Federal government under +all circumstances. National security and emergency preparedness (NS/EP) +telecommunications services are those that are used to maintain a state +of readiness or to respond to and manage any event or crisis that +causes or could cause injury or harm to the population, damage to or +loss of property, or degrade or threaten the NS/EP of the United +States. Both the NCS and NCSD report to the Assistant Secretary for +Infrastructure Protection, which allows for close coordination on those +cybersecurity issues that impact each organization. + The draft National Response Plan (NRP) is a set of defined +processes that will bring together several DHS functions for cyber +security. The Cyber Incident Annex of the NRP, as developed by NCSD in +coordination with the NCRCG, establishes procedures for a coordinated, +multidisciplinary, broad-based approach to prepare for, respond to, and +recovery from cyber Incidents of National Significance impacting +critical national processes and the national economy. For physical +incidents, Emergency Support Function 2 (ESF #2)--with NCS as +coordinating agency--would coordinate Federal actions to restore +backbone connectivity for the Internet and provide priority service to +NS/EP users. The draft National Response Plan includes tie-ins between +ESF #2 and the Cyber Incident Annex to ensure these functions stay +coordinated, which has been operationalized by cross-membership across +the NCS, NCRCG and the Interagency Incident Management Group (IIMG). + Various DHS components, including Immigration and Customs +Enforcement (ICE) and the Secret Service have statutory responsibility +for investigating cyber crimes. DHS through NCSD has assumed a +supporting role in this area. Among the efforts that have been +undertaken are, the support and administration of the Cyber Cop Portal, +the co-sponsorship (with the Department of Justice) of the first +statistically valid survey of cyber crime in the US, and the initiation +of a number of joint meetings to address the issue of cyber attack +attribution. + The Cyber Cop Portal is one of the oldest and most widely used +mechanisms for sharing information in the electronic crimes community. +It consists of over 5,300 members from all 50 states and over 40 +countries. Its growth and use brought it to the point where it could no +longer be maintained as a voluntary part time project, and it was in +danger of being shut off. NCSD has decided to sponsor and administer +the portal. + NCSD has agreed to provide funding and support to the DOJ Bureau of +Justice Statistics to assist in the first ever statistically valid +survey of cyber crime in the United States. The effort will involve +questionnaires to over 36,000 US businesses covering all critical +infrastructure sectors. The results of the survey will provide law +enforcement and policy makers with a better understanding of the +problem and how to allocate resources. + One key component in the ability to effectively respond to cyber +attacks is attribution, determining the source of the attack. This is +also one of the most difficult aspects of cyber attack investigations. +The solution to the problem is not found in any one community of +interest, but across a broad spectrum of disciplines (Intelligence, +Counter Intelligence, Law Enforcement, private industry, etc.). Under +the auspices of the NCRCG, and in conjunction with DOJ, a number of +attribution meetings have been held or are being planned. These +meetings are designed to develop an overall picture of the state of +attribution throughout the various communities, and then to develop a +plan to improve it. The plan is due during the second quarter of FY05. + b. What measures have been taken to elevate the importance of + cybersecurity within the overall mission of DHS and to improve + public awareness of cybersecurity issues? Specifically, should + cybersecurity be a part of ``READY.GOV'' public web site to + make Americans more aware of cybersecurity needs? + Cyber security is a priority issue for DHS and the mission for +NCSD. We are improving public awareness of cyber security issues +through the US-CERT public website and the NCAS launched in January +2004 as well as through our engagement in the National Cyber Security +Alliance's Stay Safe Online campaign, our Outreach and Awareness +branch, and our partnership with the MS-ISAC to reach state and local +government. The US-CERT public website provides information on cyber +security issues, cyber activity, and cyber vulnerabilities. NCAS is our +primary mechanism for communicating with the public on cyber alerts, +security tips, and other useful notifications. We are pursuing ways to +reach as many Americans as possible through the website, awareness +campaigns, and the NCAS as well as other public awareness efforts. + DHS is currently expanding the Ready campaign and is developing +Ready for Business and Ready for Kids. Ready for Business is designed +to help small to medium business owners safeguard their business +operations in the event of a terrorist attack or other emergency. + Preliminary messages for the campaign center around three key +themes: Ensuring Business Continuity, Safeguarding and Preparing Your +Employees, and Safeguarding your Computer Systems (cyber security). The +third theme will help businesses owners understand better the need for +cyber security and also how to achieve it. It will encompass topics +such as how to prevent computer viruses, how to detect computer +viruses, how to preserve and back-up computer data, and how to prevent +hacker intrusion. + DHS is working with the Advertising Council to develop content and +messages that will inform and motivate business owners to take action. +The messages will be distributed through a variety of vehicles that +will target business owners and operators. + c. Some have suggested that the NCSD should be elevated within + the DHS organization--either as a direct report to the + Secretary Ridge or to the Under Secretary for Information + Analysis and Infrastructure Protection. What is the + Department's view of such a change? + The Department is working closely with the Homeland Security +Council to evaluate this and other policy and organizational options +related to elevating and expanding the current role of the NCSD. + +5. Wireless Funding + a. The National Communications System program budget for + Wireless Priority Service is $78M. The office of the Chief + Information Officer (CIO) includes funding for wireless + activities at $100M. How are your office, the CIO, and Science + and Technology Directorate working together on developing these + programs? + In summary, each program has a very distinct mission employing +different technologies. DHS/IAIP recognizes the need to continually +assess opportunities to insure integration of communications as well as +efficiencies of programs. DHS has established forums for the review and +ultimate execution of such a strategy and is coordinating all of its +programs efforts. The IAIP NCS is an inter-agency body responsible +(through E.O. 12472) to support the President in providing priority +telecommunications services across federal, state and local entities +that assures the greatest opportunity to communicate during all crises. +The NCS Wireless Priority Service (WPS) program was directed by the +National Security Council and subsequently authorized by the FCC. WPS +is a National Security/Emergency Preparedness (NS/EP) priority service +program utilizing based in the commercial/public cellular networks for +designated Federal, State, Local and critical infrastructure owner +leadership. The DHS CIO office focuses on managing the wireless assets +for the department with a significant focus on the private Land Mobile +Radio (LMR) network users of the federal entities transferred to DHS. +They are also engaged with DOJ in leveraging its capabilities and +development of LMR interoperable communications for the Federal law +enforcement community. In terms of coordination, the NCS programs, +through exhibits 300, are reviewed and approved by the DHS CIO office. +The CIO office also has established a wireless management working group +which IAIP NCS participates in regularly to review technology issues +and evolution as well as identify areas that will create efficiencies +of all programs. A primary long term objective, in addition to assuring +interoperability of DHS assets, is to integrate WPS capabilities with +all wireless solutions as technology enables. + IAIP, DHS' CIO Office and the S&T Directorate, along with other +Directorates, also work together on common interoperability challenges +through the Department's new Office of Interoperability and +Compatibility. This Office, housed within the S&T Directorate, was +created to coordinate the multiple interoperability efforts and needs +of the Department as well as look to leveraging the vast range of +interoperability programs and efforts within the Federal government. +Additionally, the DHS S&T Directorate manages the SAFECOM Project +charged with partnering with state and local governments to improve the +interoperability of federal, state and local LMR communications for +first responders. In this area as well, IAIP support to DHS S&T through +participation and review of Project SAFECOM activities, includes +assuring that the WPS can effectively interoperate with Project SAFECOM +solutions as technology dependency eases to a more open environment. + b. Describe how First Responders will be able to benefit from + the results of these efforts. + First Responders are increasing their dependence on wireless +communications for command and control during emergency operations. The +WPS program provides government and private sector leadership, such as +incident commanders, with priority access to the public cellular +infrastructure. The WPS link improves the commander's ability to +receive reports from and give instructions to First Responder teams and +other supporting organizations. Without the WPS link, command and +control could be degraded because of cellular call-congestion in the +vicinity of the incident/ emergency for all government and private +sector leadership. + Deployment of WPS across the wireless industry is essential to a +full public network based emergency capability for response as well as +COOP and COG needs. WPS is the cellular augmentation of the Government +Emergency Telecommunications Service (GETS). It is anticipated that in +the future technology will enable the integration of these capabilities +with the interoperable Land Mobile Radio (LMR) private systems employed +by the broad based first responder community. + + Questions From Congressman Jim Turner + + 1. When the National Cyber Security Division (NCSD) was created in +June of last summer, the Department announced it would build upon the +existing capabilities of several agencies with cyber responsibilities +transferred to DHS, including the National Communications System (NCS). +The NCS, however, has remained separate from the NCSD. Yet, the NCS +remains responsible for several cybersecurity initiatives, including +the ``Network Security Information Exchanges (NSIE)'' and the ``Cyber +Warning Information Network.'' The proposed budget continues to keep +the NCS activities separate from the NCSD. Isn't it counterproductive +to have so many core cyber functions outside the National Cyber +Security Division? Wasn't the creation of the National Cyber Security +Division intended to provide a focal point for cyber security threat +and vulnerability assessment, as well as information sharing, within +the Department? + The June 2003 DHS announcement forming the NCSD was not intended to +suggest that NCS would be fully absorbed into NCSD. The NCS is an +interagency organization formed under Executive order 12472 to support +the President in the provision of National Security/Emergency +Preparedness (NS/EP) Telecommunications meeting the need of the federal +government under all wartime and non-wartime crisis conditions. This is +a critical mission that now addresses infrastructure protection issues +in addition to its traditional COOP/COG focus. + The NSIE referenced in the question is a government and industry +effort initiated under the auspices of the President's National +Security Telecommunications Advisory Committee (NSTAC) and is managed +through the NCS National Coordinating Center for Telecommunications +(NCC). It addresses a very broad range of security issues potentially +affecting the telecommunications infrastructure. Cyber security is only +one component of these issues and the NCSD sits on the NSIE to address +these matters. Also referenced in the question is the Cyber Warning +Information Network (CWIN). When first envisioned, this private network +was focused on the cyber arena, as the development of the US-CERT +became firm and with further analysis, IP recognized that this +capability had far more utility than originally intended. CWIN is +intended to provide information and warnings across all infrastructures +to our State, local, and industry partners. CWIN has been transferred +to the IP Infrastructure Coordination Division (ICD) where it will +support the cross-sector needs for all IP divisions. + In order to facilitate coordination between these elements, +Infrastructure Protection is currently building out a watch center +facility, the National Information Coordination Center (NICC) that will +include NCSD, US-CERT, NCS, and ICD. Co-locating these groups on in a +single watch center facility will facilitate the fast and efficient +sharing of information. Initial move in to this facility is scheduled +for the first quarter of 2005. + 2. The IAIP budget includes a $1.9 million increase for conducting +cyber exercises such as ``Live Wire,'' which was a simulation of a +terrorist attack on computer, banking, and utility systems. There are, +however, existing cyber exercises that are up-and-running. Over two +years--since before the Department was created--the city of San Antonio +planned and conducted ``Operation Dark Screen,'' a cyber terrorism +exercise that involved both the public and private sector and was +designed to help the city defend and respond to a cyber attack. Even +within the Department, the Secret Service is reaching out to the +private sector and supporting table-top exercises to address the +security of private infrastructures. What is the IAIP Directorate doing +to integrate and coordinate with existing cyberexercises such as these? +How much of the requested $1.9 million will go towards these existing +exercises that have been tested and proven? In addition, what is DHS +doing to ensure that our local communities and towns, who will provide +the cyber-first responders in the time of crisis, are prepared? Isn't +it true that there is no individual entity or individual within IAIP +responsible for coordinating all of the cyberexercises being put on by +the government and, as a result, there may be duplicative efforts? + Whereas the first responder and emergency management communities +have been exercising at national, regional, and local levels for many +years, the cyber response community is quickly catching up. The U.S. +Government has an active program of exercises to assess preparedness +and processes in the event of an attack on the Nation. DHS has +established a National Exercise Program Office (NEP) to coordinate +scheduling and participation in the exercises sponsored by various +agencies. The IAIP Directorate is coordinating its exercise planning +with the NEP, which is the responsibility of the DHS Office of Domestic +Preparedness. The IAIP Under Secretary's Office has an Exercise +Management Program (EMP) that maintains regular contact with members of +the exercise community and coordinates with the NEP to facilitate the +Directorate's participation in exercises. NCSD's coordination efforts +entail scheduling cyber security exercises with NEP as well as +integrating cyber scenario components into other planned exercises as +appropriate. These coordination efforts with NEP assist in minimizing +the duplication of exercise efforts. + NCSD's involvement in the NEP is guided by two principles: (1) +while cyber is only one element of a multifaceted NEP, cyber elements +must be closely coordinated with other elements of that program to +ensure efficient use of limited resources and the most effective return +on exercise investments; (2) cyber exercise elements must not be +sidelined or relegated to an ``afterthought'' category within the NEP. + In October 2003, numerous federal agencies participated in +Livewire, the first ever national-level cyber exercise to baseline our +capabilities for responding to national cyber attack. The exercise +involved more than 300 participants representing more than 50 +organizations across the federal, state, and local governments, as well +as the private sector. Cyber attack simulation scenarios were developed +to stress cyber interdependencies across America's critical +infrastructures and baseline government agencies' abilities to +collaborate across the public and private sectors. Information gleaned +from Livewire and similar exercises aimed at ensuring security of +critical infrastructures are being used to improve our national +incident response processes. + While Livewire brought together a number of players for a large- +scale event simulation, other exercises target specific areas or agency +concerns. For example, the United States Secret Service's (USSS) +Electronic Crimes Task Forces (ECTFs) have been running smaller +regional and sector-specific tabletop exercises over the past eighteen +months. These exercises are designed to help coordinate efforts in a +targeted geographic area and are tailored to a specific regional +infrastructure, such as the energy industry in Houston, TX, the high- +technology industry in San Francisco, CA, and the banking and finance +industry in Charlotte, NC. In February 2004, the National Defense +University ran its Dark Portal exercise and in August 2004, a cyber +security workshop co-hosted by NCSD and the National Security Council +was held at the National Defense University. This tabletop workshop +exercise included members of the National Cyber Response Coordination +Group (NCRCG), as well as multi-agency key decision makers in the U.S. +Government cyber security realm. + NCSD has sponsored several exercises that test cyber readiness in +various geographic locations and critical infrastructure sectors across +the Nation. In September and October 2004, a series of regional +exercises were held in Seattle, WA (Blue Cascades II) and New Orleans, +LA (Purple Crescent II). Both exercises were successful in highlighting +dependencies between cyber and physical infrastructures and +interdependencies among critical infrastructures. These exercises also +identified and tested the coordination and cooperation among federal, +state, and local governments with the private sector in the case of +attacks (both cyber and physical) on the critical infrastructures in +those regions of the U.S. In addition, each of the exercises +illustrated the need to continue to provide outreach and cyber +education to local emergency management and physical security +professionals as well as identify and improve shortfalls in emergency +preparedness. + DHS EMP serves as the lead organization in the development, +facilitation and participation of a week-long, cabinet-level national +exercise (``TOPOFF3'') to be held in the summer of 2005. These national +exercise programs occur every two years and involve the same basic set +of participants. The exercise for TOPOFF3 represents a joint physical +and cyber scenario, with NCSD leading the development of the cyber +component for the exercise. It will test not only response to attacks, +but also continuity of government and operations, emergency response at +the state, regional and local levels, and containment and mitigation of +chemical, nuclear, and other attacks, etc. NCSD is also working with +DHS to ensure a more prominent cyber component in the follow-on TOPOFF +series of exercises for 2007 and beyond. + The lessons learned from these and other exercises will form the +backdrop for an NCSD-sponsored National Cyber Exercise planned for +November 2005. Planning activities are currently underway with initial +groundwork already laid for this effort. In September 2004, a key +stakeholder meeting was held to discuss the scope and objectives with +critical infrastructure sector lead agencies. NCSD is in the process of +planning the Initial Planning Conference (IPC) for the National Cyber +Exercise that will include representatives from various government +agencies and the private sector. The IPC will allow the opportunity for +the stakeholders to establish clear and concise goals and objectives +for the National Cyber Exercise as well as to discuss and develop +possible scenarios. + + The objectives of the National Cyber Exercise are to: + 1. Sensitize a diverse constituency of private and public- + sector decision-makers to a variety of potential cyber threats + including strategic attack; + 2. Familiarize this constituency with DHS' concept of a + national cyber response system and the importance of their role + in it; and + 3. Practice effective collaborative response to a variety of + cyber attack scenarios, including crisis decision-making. + 4. Provide an environment for evaluation of interagency and + cross-sector business processes reliant on information + infrastructure. + 5. Measure the progress of ongoing U.S. efforts to defend + against an attack. + 6. Foster improved information sharing among government + agencies and between government and industry. + 7. Identify new technologies that could provide earlier warning + of attacks. + 8. Define the roles and responsibilities of government agencies + and industry. + + Questions for Chief Officer Steven Cooper, From Congressman Mac + Thornberry and Congresswoman Zoe Lofgren + +1. Cybersecurity Standards + Question: a. How are technical cybersecurity standards being +established and enforced across the Department for information +technology purchases, processes, and practices? + Technical Cybersecurity Standards are promulgated through the +Technical Reference Model portion of the Department's Enterprise +Architecture Program. There are also mature standards established +through the Federal Information Processing Standards. The Information +System Security Managers at the organizational elements are responsible +for ensuring compliance with standards. In addition, regular Program +and Acquisition reviews check for compliance with published standards. + The Department's long-term strategic approach for the enforcement +of information technology security standards is to verify policy and +standards compliance during the Security Test and Evaluation phase of +the system Certification and Accreditation (C&A) process. DHS is +currently in the process of establishing an enterprise C&A application +that will maintain an online repository of all C&A documentation and +enforce the use of Department mandated C&A methodologies. This +application will generate comprehensive system test procedures and +processes to fully map system compliance with DHS policy and standards. +The current status of implementing this C&A tool is that DHS has +completed the Requirements Definition phase and product evaluation +phase, and have an operational pilot system which has given phenomenal +results. We expect to have a Department implementation in the near +future. + The Department also verifies proper implementation of policy and +standards by + conducting NIST 800-26 reviews of security controls in accordance +with Office of Management and Budget Memorandum M-03-19. These reviews +are ongoing. + + Question: b. Who sets cybersecurity requirements for the Department +and how are they communicated to the technology developer or purveyor? + DHS follows cybersecurity standards requirements established by the +Committee for National Security Systems for its classified systems, and +the Office of Management and Budget, and National Institute of +Standards and Technology guidance for it unclassified systems. +Additionally, mission specific requirements are promulgated through the +internal Management Directives, as well as through the Technical +Reference Model of the Department's Enterprise Architecture. These have +been provided to industry in general, and are also specifically called +out when appropriate in contracting vehicles. + + Question: c. How are cybersecurity standards requirements being +incorporated in calls for proposals, grants or other contracting +mechanisms? + The DHS Science and Technology (S&T) Directorate is in the process +of establishing a DHS-internal Cyber Security Standards Working Group. +Within the S&T Directorate, the working group will include +representatives from the Standards and Cyber Security R&D portfolios, +as well as representatives from S&T's Chief Information Officer (CIO) +group. Outside of S&T, invitations to serve on the working group have +been extended to the DHS Office of the CIO, the National Cyber Security +Division and the National Communications System in the Information +Analysis and Infrastructure Protection Directorate, and the United +States Secret Service. This group will collectively identify what cyber +security standards requirements should be incorporated into S&T's R&D +portfolio investment plans. + + Question: d. In what areas of cybersecurity do you see a need for +new or better standards, benchmarks, and other elements of a +cybersecurity framework, and what can DHS do to help implement such a +framework? + With new areas of technology emerging every day as well as new +applications of existing technology, there is always a need to refine +existing standards and promote new ones. The emergence of MPLS has +opened many new questions and the means to securely implement reliable, +secure wireless networks continues to be a challenge, as does the +management of geospatial data and Law Enforcement Information. DHS +works closely with the Federal cooperative process through bodies such +as the National Institute of Standards and Technology and the Committee +for National Security Systems to ensure the success of these efforts. + + Question: e. Does the office of the Chief Information Officer (CIO) +use any cybersecurity standards and processes recommended by the +National Cybersecurity Division (NCSD), National Institute of Standards +and Technology (NIST), and National Security Agency (NSA) to secure the +DHS enterprise architecture? + To the best of our ability, all relevant standards from national +bodies such as NIST, NSA and NCSD are applied throughout DHS. This +includes relevant FIPS and similar standards for procurement and +internal processes such as self assessments and Certification and +Accreditation are explicitly standards based. + + Question: f. How does NCSD provide actionable cybersecurity +information to the CIO to consider in its enterprise architecture +implementation? + DHS participates in the interagency US CERT process. As a member of +USCIRC, DHS like all participating agencies, gets alerts, warning and +mitigation tools in a timely manner. In addition, there is a constant +and constructive exchange of information between the National Cyber +Security Division and the Office of the CIO for timely notifications of +relevant issues. Actionable items--such as those that may significantly +compromise confidentiality or availability are given the highest +priority for incorporation into the Department's security architecture +which is integral to the Department's Enterprise Architecture. + +2. Purchasing Power + Question: a. What specific actions has DHS taken to improve its +FISMA report card in order to become government model for secure +information systems? + DHS has implemented a COTS enterprise product to provide automated +support for 800-26 assessments, manage FISMA metric reporting, as well +as Department-wide Plans of Actions and Milestones (POA&M). This +product is being used to generate a Digital Dashboard showing +Organization Element performance metrics and overall DHS performance +metrics, and access to this system has been made available to the OIG +to ensure veracity of FISMA data reported by Organizational Elements. +Access to the Digital Dashboard will be made available to senior +management in the near future to ensure that senior managers are +directly involved with the Department's Information Security Program. +In the past few moths we have implemented several enhancements made to +FISMA reporting product for improving reporting of 800-26 and C&A +metrics. This enhancements include a) 800-26 integrity checking; 2) +computed metrics for 800-26 assessments and C&A; capability to upload +assessment and C&A artifacts; 4) better tracking of C&A deliverables. +We have purchased an Enterprise license for a C&A tool (SecureInfo +RMS). This tool has been installed on an Enterprise server and all OEs +are currently using the tools with DHS ramping up to full mandatory +use. The DHS baseline policy has been mapped to this tool and use of +the tool will ensure that the C&A SRTM is mapped to DHS policy. We have +prepared and submitted a POA&M to OMB to achieve full ATO on all +currently reported systems by the end of July, 2005. To ensure +continued progress we have formed a DHS security working group to focus +on FISMA reporting and FISMA issues. + + Question: b. Many witnesses before the Subcommittee have suggested +that a powerful tool the federal government possesses in cybersecurity +is its buying power. Has DHS used this power to induce hardware or +software manufacturers to provide more secure systems? + Every new information technology contracting vehicle put into place +by the Department includes robust security standards. Additionally, the +Department regularly engages information technology vendors to ensure +that strong security is integral to product development and +implementation. Sec. + +3. Wireless Funding + Question: a. The office of the CIO includes funding for wireless +activities at $100M. The National Communications System (NCS) program +budget for Wireless Priority Service is $78M. How are your office, the +NCS, and the Science and Technology Directorate working together on +developing these programs? + The Wireless Management Office (WMO), within the DHS Office of the +Chief Information Officer, is mandated to lead and coordinate the +Department's programs, projects, and initiatives that involve the +wireless transport of information, including voice, data, and +multimedia. The WMO's mission, ``To be the model program office, +providing state-of-the art wireless capabilities to preserve our +freedoms and protect America,'' serves to focus and provide direction +for the program's activities and services to ensure the effective use +of wireless technologies across the Department's organizational +elements. As part of its mission, the WMO integrates its activities +with the National Communications System (NCS) and the wireless +initiatives of S&T to meet evolving homeland security requirements. The +WMO is primarily focused on wireless communications to support internal +DHS missions. The NCS is responsible for directing the Wireless +Priority Service program which supports commercial, private sector +wireless capabilities. + The WMO is working with NCS and the DHS S&T Directorate in +implementing program activities through groups such as the Wireless +Working Group (WWG). The WWG is a coordination body established to +ensure DHS-wide approaches to wireless communications are developed and +implemented in an integrated manner. The WMO chairs the WWG, which is +composed of 80 representatives from all of the DHS organizational +elements with wireless communications as part of their mission. The +majority of the WMO's coordination with the NCS and DHS S&T occurs +through its participation on the WWG to collect DHS organizational +elements wireless requirements, coordinate resource utilization, and +ensure organizational elements play an integrated roll in centralized +DHS wireless concepts (e.g., system designs, user requirements, +operational concepts, procurement contracts). This collaborative +approach is consistent with the Department's customer service strategy +and allows for on-going feedback and confirmation that the WMO is +adequately addressing the needs of its customers and stakeholders. + Question: b. Describe how First Responders will be able to benefit +from the results of these efforts. + The activities of the WMO, in partnership with DHS S&T and the NCS, +directly benefits first responders at all levels of the government by +equipping them with the wireless capabilities to fulfill their missions +of protecting the homeland. By building strong relationships that +foster increased coordination among first responders, enabling and +enhancing their wireless capabilities, the DHS WMO--in coordination +with DHS S&T and NCS--are achieving several objectives to the benefit +of first responders, including-- + - Implementing integrated, nationwide tactical communications + capabilities for DHS organizational elements and other public + safety first responders + - Providing technical assistance and implementation of wireless + enhancements + - Advancing the use of emerging wireless technologies among + first responders + These objectives are being met through several major initiatives +supported by the WMO and coordinated with DHS S&T and the NCS. + Integrated Wireless Network (IWN): The mission of the Integrated +Wireless Network (IWN) project is to provide a consolidated, nationwide +approach to reliable, seamless, interoperable wireless communications +to support federal agencies and officers engaged in the conduct of law +enforcement, protective services, homeland defense, and disaster +response within the Departments of Homeland Security, Justice, and +Treasury. The IWN will serve as the day-to-day tactical communications +network for the DHS, Justice, and Treasury user community, as well as +for those within DHS and Treasury, replacing outdated and antiquated +legacy communications systems. As a result, the IWN, in every sense, +will serve as the lifeline that directly supports the wireless +communications capabilities of first responders. + The IWN represents an investment in voice and data communications +technologies, the completed system will establish a 24 x 7 +communications network, complete with support services that will +include major disaster recovery and contingency capabilities (e.g. +system back-up). A centrally managed and coordinated approach to this +initiative ensures that common, standards-compliant technologies are +procured, thereby fostering interoperability between and among federal +agencies for more effective and efficient enforcement activities, as +well as provisioning communications interoperability with our state and +local partners for event management and crisis response. + G4High Risk Metropolitan Areas Interoperability Project: With the +demand for improved intergovernmental communications necessitated by +homeland security concerns, federal agents must increasingly +interoperate with other federal, state, and local public safety +entities. The project was initiated to improve federal interoperability +with local first responders in the highest threat areas across the +country. The project is being implemented in coordination with the +interoperability efforts of the WMO, SAFECOM, and the Office of +Domestic Preparedness (ODP). + WMO Sponsored Projects: The WMO is supporting several projects that +are improving the wireless communications capabilities of agencies at +all levels of the government. + DC Broadband Project: The District of Columbia is currently +implementing a cost-effective, high-speed, wide area, wireless data +network that will permit the use of interoperable, broadband, wireless +data applications for public safety communications. This network will +allow first responders in the NCS to use full-motion, high-resolution +video monitoring and other bandwidth-intensive monitoring tools to +immediately share time-critical incident and emergency event +information. + This will enhance regional and federal first responder +capabilities. It will also provide accurate interoperability usage +profiles and results, collect data on network performance (data +throughput, coverage, latency, and effective of spread spectrum +technologies), and implement public safety application requirements and +operations improvements. + Phoenix Mesa Interoperability Project: This project provides an +opportunity for the WMO to partner with state and local agencies and +build upon existing communications system infrastructure. The WMO plans +to leverage this existing system by installing federal very high +frequency (VHF) trunked repeaters at select locally-owned radio +frequency (RF) sites. The project should result in several key +benefits, including the demonstration of an innovative application that +can be replicated across the country, providing potential long-term +cost savings for IWN implementation, and serving as a model for +coordination and partnerships among federal, state, and local agencies +and first responders. + The primary goal of the project is to demonstrate the feasibility +of local and federal agencies utilizing common infrastructure while +operating within different frequency bands. To accomplish this goal, +the WMO partnered with the cities of Phoenix and Mesa, Arizona, who +were two of the first cities in the country to implement a regional +TIA/EIA-102 Project 25 800-megahertz trunked system. The installation +of these repeaters will enable the WMO to use existing system assets +such as shelters, towers, connectivity, and network management +infrastructure. + SAFECOM: Linking federal tactical communications to local, state, +and tribal public safety first responders is critical to ensuring +seamless, wireless communications at the scene of the incident and +improving officer safety. In 2002, as part of the President's +Management Agenda, the White House established SAFECOM as the umbrella +program within the Federal Government to oversee all communication +interoperability initiatives and projects. Through SAFECOM, the Federal +Government is addressing public safety communications issues in a more +coordinated, comprehensive, and effective way. + The WMO is working with SAFECOM to improve wireless communications +interoperability among federal, state, and local public safety first +responders. The WMO does so by recognizing and supporting the crucial +role of SAFECOM to the benefit of first responders to include-- + Creating and adopting standards + Recognizing interoperability and communications issues + Identifying current initiatives that address + interoperable communications issues, and + Developing coordinated strategies to leverage work, + while decreasing the unnecessary duplication of efforts. + Collectively, the programs are providing the vital link to improve +vertical interoperability among over 100 federal agencies with public +safety response to over 44,000 local and state first responders. + Federal Partnership for Interoperable Communications (FPIC): The +FPIC works to advance federal wireless communications interoperability +across federal first responders by fostering intergovernmental +cooperation. The FPIC pursues this mission by advancing the following +goals to the benefit of the federal wireless community: providing +technical and operational advice to SAFECOM and federal departments and +agencies; educating federal users about wireless communications +equipment, security, and operations standards and best practices; and +coordinating wireless communications interoperability efforts within +the Federal Government. + As members of FPIC, the WMO and SAFECOM work to improve federal +wireless communications first responders through standing committees +and working groups. Standing committees--such as the Standards, +Security, and Spectrum Standing Committees--coordinate ongoing FPIC +activities. Working groups are established to consider, investigate, +and/or act on a specific activity or subject area of interest to +members. The FPIC may establish partnerships with state/local +organizations, associations, departments, bureaus, agencies, or +individuals as appropriate. In this way, projects of mutual concern to +all of the wireless public safety community can be addressed in a +cooperative manner. + Question: 4. To what degree do the DHS enterprise architecture +plans integrate with the federal enterprise architecture effort? How is +DHS working with other departments to establish cybersecurity +standards? + +Support for Federal Initiatives + EA is one of the means by which visibility into IT assets can +enable the federal government to find business and financial +efficiencies. Our alignment to the Office of Management and Budget +(OMB) Federal Enterprise Architecture (FEA) continues throughout all of +our Enterprise Architecture (EA) efforts. Our FEA and e-government +initiatives are discussed below. + +Support for the Federal Enterprise Architecture + Our EA planning project was driven by the concepts and products of +the OMB FEA Reference Models. We have aligned the various EA artifacts +with the five FEA Reference Models: the Business Reference Model, the +Data and Information Reference Model, the Service/Component Reference +Model, the Technical Reference Model, and the Performance Reference +Model. And, more importantly, we have embraced the two FEA foundation +concepts: Line of Sight for program effectiveness and Component and +Service Based Architectures for effective reuse and repeatability. + Business Reference Model. The FEA Business Reference Model drove +the development of our business model. Several of the Business +Reference Model Lines of Business are directly applicable to DHS (in +particular, Homeland Security and Disaster Management). For all other +business activities within the DHS business value chain level, there is +a one-to-one link to the Business Reference Model Lines of Business. +The EA Business Model includes a matrix that shows the relationship +between our business activities and the Business Reference Model +Subfunctions. It is important to note that every business activity in +the EA Business Model is mapped to a Business Reference Model Sub- +function. As a result of this alignment, OMB should be able to readily +identify functional commonality of DHS with other federal agencies. + Data and Information Reference Model. The Data Reference Model +consists of a layered model for decomposing collections of information, +from Subject Areas down to Data Objects and their properties. We +adopted this approach and classified the information required to +support the homeland security business activities at the Subject Area +and Data Object levels. Further decomposition and description of the +data objects will be performed in the next phase of the EA process. Our +Data Architecture aligns with the Data Reference Model concepts by +providing a common, consistent way of categorizing and describing data +to facilitate data sharing and integration. + Service Component Reference Model. The DHS EA project has fully +embraced the FEA Service/Component Reference Model's component-based +approach to the reuse of applications, application capabilities, +components, and business services across the federal government. OMB +created the Service/Component Reference Model specifically to identify +service components and their relationship to the technology +architectures of federal agencies. We leveraged the Service/Component +Reference Model in two important manners: (1) the structure of our +Application Architecture is a set of interworking components that has +direct ties to the Service/Component Reference Model, and (2) our +Technology Architecture applies a set of technology patterns that is +derived directly from the technology aspects of the reference model. + The Application Architecture has been constructed to leverage +reusable components that can be acquired once and used to provide +services to many applications. It shows the structure of this component +reuse. From the set of component architecture diagrams, it can be seen +that there is a significant opportunity to apply this reuse concept +throughout DHS (and across other government agencies). The result +should be considerable cost savings, as well as greatly improved +interoperability and flexibility of applications. + The Technology Patterns of our EA are repeatable solutions to +recurring technical challenges. These patterns employ technologies +described in the DHS Technical Reference Model (discussed below) and +provide capabilities as described in the FEA Service/Component +Reference Model. For example, the Business Intelligence/Data Warehouse +technology pattern of our EA aligns with the Business Intelligence +Service Type of the FEA reference model. + Technical Reference Model. The initial formulation of the DHS +Technical Reference Model began with the taxonomy as well as the +technical services, protocols, and interfaces specified in the FEA +Technical Reference Model. The DHS model extends and refines the FEA +model where necessary to reflect the additional functional and +technology requirements of DHS. In deriving the DHS model from the FEA +model, we have also made adjustments to better align the technology +categories with the physical layering of services that exist in vendor +and open source products. The Domain level (Tier 3) categories of the +DHS model have all been mapped to the FEA model, so that comparisons +can be directly made with the technical reference models from other +agencies. + Performance Reference Model. Although this FEA reference model was +still under development during our EA planning project, an initial +attempt was made to align our Business Model with the intent of the +Performance Reference Model, based on draft materials provided by OMB. +Specifically, the Business Model includes a table that defines the +outcomes or measurement categories and corresponding indicators +(metrics) for each cross-cutting, corporate activity defined in the +Homeland Security Value Chain. Measurement categories are defined for +each activity in six areas: Mission and Business Results, Customer +Results, and Process and Activities, People, Technology, and Other +Fixed Assets. This guidance within the DHS EA will provide specific DHS +IT programs with a starting point for applying the Performance +Reference Model within their Exhibit 300 submissions to OMB. + +Support of E-Government Initiatives + The Target EA and Transition Strategy identified several +opportunities to leverage on-going e-Government initiatives. As you may +be aware, the Department is currently the managing partner for the +Disaster Management and Safecom e-Gov initiatives. The Department is +also actively participating in six additional e-gov initiatives. For +example, there are three major organizations within the department that +provide grants to state, local, private industry, academia, and +individuals for a variety of reasons that participate in the e-Grants +effort. We will be looking more closely at this mode of delivery and +how it may leveraged into the EA program. + Finally, the target EA identifies a concept for homeland security +information sharing and knowledge flow--the Homeland Security +Information Sharing Architecture--based on a concept of Communities of +Interest adopted from the intelligence community. Information sharing +with state, local, tribal, and other federal government entities is a +critical function of DHS, both as a source of information and as the +``first responders'' to an incident. Implementation of this information +sharing architecture will provide value to homeland security community +by driving results and productivity through effective information +sharing. + In addition to the initiatives for which DHS has the lead +responsibility, we expect to be a major contributing player or user of +several others. We are committed to transitioning to projects such as +e-Authentication, e-Clearance, e-Payroll, e-Travel, and HR Integration. +We are actively gaining more knowledge about these initiatives so that +our role in supporting them and their particular timelines and +capabilities can be integrated seamlessly into our target and +transition strategy. + + + +