[House Hearing, 108 Congress] [From the U.S. Government Publishing Office] HOMELAND CYBERSECURITY AND DHS ENTERPRISE ARCHITECTURE BUDGET HEARING FOR FISCAL YEAR 2005 ======================================================================= HEARING before the SUBCOMMITTEE ON CYBERSECURITY, SCIENCE, AND RESEARCH AND DEVELOPMENT of the SELECT COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED EIGHTH CONGRESS SECOND SESSION __________ MARCH 30, 2004 __________ Serial No. 108-44 __________ Printed for the use of the Select Committee on Homeland Security Available via the World Wide Web: http://www.access.gpo.gov/congress/ house __________ U.S. GOVERNMENT PRINTING OFFICE 23-174 WASHINGTON : 2005 _____________________________________________________________________________ For Sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; (202) 512�091800 Fax: (202) 512�092250 Mail: Stop SSOP, Washington, DC 20402�0900012005 SELECT COMMITTEE ON HOMELAND SECURITY Christopher Cox, California, Chairman Jennifer Dunn, Washington Jim Turner, Texas, Ranking Member C.W. Bill Young, Florida Bennie G. Thompson, MississPpi Don Young, Alaska Loretta Sanchez, California F. James Sensenbrenner, Jr., Edward J. Markey, Massachusetts Wisconsin Norman D. Dicks, Washington W.J. (Billy) Tauzin, Louisiana Barney Frank, Massachusetts David Dreier, California Jane Harman, California Duncan Hunter, California Benjamin L. Cardin, Maryland Harold Rogers, Kentucky Louise McIntosh Slaughter, New Sherwood Boehlert, New York York Lamar S. Smith, Texas Peter A. DeFazio, Oregon Curt Weldon, Pennsylvania Nita M. Lowey, New York Christopher Shays, Connecticut Robert E. Andrews, New Jersey Porter J. Goss, Florida Eleanor Holmes Norton, District of Dave Camp, Michigan Columbia Lincoln Diaz-Balart, Florida Zoe Lofgren, California Bob Goodlatte, Virginia Karen McCarthy, Missouri Ernest J. Istook, Jr., Oklahoma Sheila Jackson-Lee, Texas Peter T. King, New York Bill Pascrell, Jr., North Carolina John Linder, Georgia Donna M. Christensen, U.S. Virgin John B. Shadegg, Arizona Islands Mark E. Souder, Indiana Bob Etheridge, North Carolina Mac Thornberry, Texas Ken Lucas, Kentucky Jim Gibbons, Nevada James R. Langevin, Rhode Island Kay Granger, Texas Kendrick B. Meek, Florida Pete Sessions, Texas Ben Chandler, Kentucky John E. Sweeney, New York John Gannon, Chief of Staff tephen DeVine, Deputy Staff Director and General Counsel Thomas Dilenge, Chief Counsel and Policy Director David H. Schanzer, Democrat Staff Director Mark T. Magee, Democrat Deputy Staff Director Michael S. Twinchek, Chief Clerk ______ Subcommittee on Cybersecurity, Science, and Research & Development Mac Thornberry, Texas, Chairman Pete Sessions, Texas, Vice Chairman Zoe Lofgren, California Sherwood Boehlert, New York Loretta Sanchez, California Lamar Smith, Texas Robert E. Andrews, New Jersey Curt Weldon, Pennsylvania Sheila Jackson-Lee, Texas Dave Camp, Michigan Donna M. Christensen, U.S. Virgin Robert W. Goodlatte, Virginia Islands Peter King, New York Bob Etheridge, North Carolina John Linder, Georgia Ken Lucas, Kentucky Mark Souder, Indiana James R. Langevin, Rhode Island Jim Gibbons, Nevada Kendrick B. Meek, Florida Kay Granger, Texas Ben Chandler, Kentucky Christopher Cox, California, ex Jim Turner, Texas, ex officio officio (ii) C O N T E N T S ---------- Page STATEMENTS The Honorable Mac Thornberry, a Representative in Congress From the State of Texas, and Chairman, Subcommittee on Cybersecurity, Science, and Research and Development Oral Statement................................................. 1 Prepared Statement............................................. 2 The Honorable Zoe Lofgren, a Representative in Congress From the State of California, and Ranking Member, Subcommittee on Cybersecurity, Science, and Research and Development........... 2 The Honorable Christopher Cox, a Representative in Congress From the State of California, and Chairman, Select Committee on Homeland Security.............................................. 22 The Honorable Jim Turner, a Representative in Congress From the State of Texas, Ranking Member, Select Committee on Homeland Security Prepared Statement............................................. 4 The Honorable Robert E. Andrews, a Representative in Congress From the State of New Jersey................................... 33 The Honorable Donna M. Christensen, a Delegate in Congress From the U.S. Virgin Islands........................................ 27 The Honorable Jennifer Dunn, a Representative in Congress From the State of Washington........................................ 29 The Honorable Bob Etheridge, a Representative in Congress From the State of North Carolina.................................... 31 The Honorable Jim Gibbons, a Representative in Congress From the State of Nevada................................................ 25 The Honorable James R. Langevin, a Representative in Congress From the State of Rhode Island................................. 36 The Honorable Kendrick B. Meek, a Representative in Congress From the State of Florida........................................... 41 WITNESSES Mr. Robert Liscouski, Assistant Secretary for Infrastructure Protection, Department of Homeland Security Oral Statement................................................. 5 Prepared Statement............................................. 8 Mr. Steven Cooper, Chief Information Officer, Department of Homeland Security Oral Statement................................................. 14 Prepared Statement............................................. 18 APPENDIX Questions for Assistant Secretary Robert Liscouski: Questions from Congressman Dave Camp........................... 45 Questions from Congressman Sherwood Boehlert................... 46 Questions from Congressman Mac Thornberry and Congresswoman Zoe Lofregn...................................................... 47 Questions from Congressman Jim Turner.......................... 54 Questions for Chief Information Officer Steven Cooper: Questions from Congressman Mac Thornberry and Congresswoman Zoe Lofgren...................................................... 56 HOMELAND CYBERSECURITY AND DHS ENTERPRISE ARCHITECTURE BUDGET HEARING FOR FISCAL YEAR 2005 ---------- Tuesday, March 30, 2004 House of Representatives, Select Committee on Homeland Security, Subcommittee on Cybersecurity, Science, and Research and Development, Washington, D.C. The subcommittee met, pursuant to call, at 10:06 a.m., in Room 2325, Rayburn House Office Building, Hon. Mac Thornberry [chairman of the subcommittee] presiding. Present: Representatives Thornberry, Smith, Camp, Linder, Gibbons, Cox (ex officio), Lofgren, Andrews, (Del.) Christensen, Etheridge, Lucas, Langevin, Meek, and Turner (ex officio). Also Present: Representative Dunn. Mr. Thornberry. The hearing will come to order. I would like to welcome our witnesses and guests to this hearing of the Subcommittee on Cybersecurity, Science, and Research and Development. Last year, we received a number of perspectives on cybersecurity from academia, think tanks, the technology industry, government agencies, users, and others. All want the Department to succeed in its mission to protect our Nation. All emphasized the importance of cyberspace and the need for stronger cybersecurity in government, industry, academia, and at home. Now, as we move into the second year of the Department of Homeland Security there remain many areas in cybersecurity in need of improvement. Cyber is an area that can touch across virtually every aspect of our lives, from electrical grids, airport control towers, manufacturing, banking, chemical plants, and many other areas. With the creation of the National Cybersecurity Division last June, I was pleased the Department acknowledged the need to consolidate the cyber mission into an organization that could have one voice in dealing with international, Federal, State, local, and private sectors. However, over the course of recent months I have been concerned that many of the cybersecurity resources within the Department remain fragmented and have not been integrated under the Cybersecurity Division. Our Nation needs a seamless, well-functioning organization within the Department to work with industry, other government elements, academia, and the home user. That is part of the external cybersecurity mission of the Department. But there is also an internal cybersecurity mission for the Department. The Chief Information Officer has responsibility for protecting the Nation's most sensitive data that has been entrusted to the DHS to counter terrorism against the homeland. As the Department develops its enterprise architecture, privacy and classified information are two areas that must be considered as the networks from the 22 agencies are brought together. I also believe that the Department must be a role model for the rest of government as well as the private sector in how they secure their own information infrastructure. DHS needs to ``walk-the-talk'' and achieve the highest standards within the Federal Government and cybersecurity. The creation of the Department should also result in efficiencies through integration and also find the most effective use of resources. I look forward to hearing about your progress in both areas over the course of the past year. Prepared Statement of The Honorable Mac Thornberry, Chairman, Select Committee on Homeland Security I would like to welcome our witnesses and guests to today's hearing. Last year, this subcommittee received a number of perspectives on cybersecurity, from academia, think tanks, the technology industry, government agencies, users, and others. All want the Department of Homeland Security to succeed in their mission to protect our nation. All emphasized the importance of cyberspace and the need for stronger cybersecurity in government, industry, academia, and at home. As we move into the 2nd year for the Department of Homeland Security, there remain many areas in cybersecurity in need of improvement. Cyber is an area that cross-cuts virtually very aspect of our lives. Electrical grids, airport control towers, manufacturing, banking, chemical plants, and many other areas are dependent upon their computers, information, and networks to be reliable and secure from attacks. With the creation of the National Cybersecurity Division (NCSD) last June, I was pleased that the Department acknowledged the need to consolidate the cyber mission into an organization that could have ``one voice'' in dealing with international, federal, state, local and private sectors. However, over the course of recent months, I am concerned that many of the cybersecurity resources within the Department remain fragmented and have not been integrated under NCSD. Our nation needs a seamless and well-functioning organization within the Department to work across industry, other government elements, academia, and the home user. That is part of the external cybersecurity mission for the Department of Homeland Security. There is also an internal cybersecurity mission for the Department. The Chief Information Officer has the responsibility for protecting our nation's most sensitive data that has been entrusted to DHS to counter terrorism against the homeland. As the Department develops its enterprise architecture, privacy and classified information are two areas that must be considered as the networks from the 22 agencies are brought together. I also believe the Department must be a role model for the rest of the government--as well as the private sector--in how they secure their own information infrastructure. DHS needs to ``walk the talk'' and achieve the highest standards within the federal government in cybersecurity. The creation of the Department should result in efficiencies through integration and also find the most effective use of resources. I look forward to hearing about your progress and plans for the coming year. Before we turn to our witnesses, let me yield to the distinguished ranking member, the gentlelady from California. Ms. Lofgren. Thank you, Chairman Thornberry. The Select Committee on Homeland Security is in the process of tracking the first ever authorization bill through the Department of Homeland Security, and I believe that today's hearing before this subcommittee will serve as an important part of the authorization process. We will focus on cybersecurity activities of the Infrastructure Protection Directorate and will explore the information technology and enterprise architecture issues facing the agency, and it will give us an opportunity to understand resource and policy issues pertaining to the budget request for the next fiscal year. In addition, members may explore additional legislative issues relevant to the Director's activities for possible inclusion into the authorization bill. Certainly, we have no shortage of issues to discuss with our witnesses today. Earlier this month President Bush and Secretary Ridge celebrated the first anniversary of the creation of the Department of Homeland Security. At the event, the President said, quote, one of the most important steps we have taken to fight terrorism is creating the Department of Homeland Security combined under one room with a clear chain of command many agencies responsible for protecting our Nation. Creating the newest department of our Federal Government was a tough task that required a lot of hard work, changing some old habits in order to merge into a new department. Unquote. I think this assessment of the Department is pretty optimistic, and I know that while rank and file employees have worked very hard over this past year to get it up and running, I am not convinced that the leadership of the Department of Homeland Security should be celebrating at this time, particularly in the area of cybersecurity. I am concerned about cyber policy in the Department. I am not convinced that cybersecurity is a priority within the overall Department of Homeland Security, and I am troubled by the lack of concrete cybersecurity accomplishments over the past year. The release of the National Strategy to Secure Cyberspace was at the beginning of 2003. This policy paper established cybersecurity goals. At the end of 2003, the Department of Homeland Security convened a cybersecurity summit with major players in the technology industry in the Silicon Valley. Other than these two events, I am just not familiar with the work that is going on in DHS, and I think I am safe in saying that members of this subcommittee are somewhat frustrated. The threat of a cyber attack is very real. In 2003, we saw increasing worm and virus spreads, and Business Week estimated that the damage from worms last year alone was over $13 billion. Today's witnesses are Mr. Robert Liscouski, Assistant Secretary for Infrastructure Protection, Information Analysis, and Infrastructure Protection Directorate, and Mr. Steven Cooper, Chief Information Officer of the Department of Homeland Security. I hope that the witnesses today will be able to reassure this subcommittee that work is being done within the Department and that cybersecurity in fact is a priority for the administration. I would also like to note my frustration at the tardiness with which the statements were delivered to the committee. The rules of the Homeland Security Committee prescribe that witnesses who wish to submit a written statement shall file them--not may, but shall file them 72 hours prior to the hearing. Mr. Liscouski's statement was filed 14 hours prior to this committee and Mr. Cooper's statement was filed 45 minutes before the committee hearing, and I think that that is a real disservice to every member of the committee as we obviously have not had the time to really study Mr. Cooper's statement or Mr. Liscouski's statement. Before concluding, I would like to thank the chairman of this committee, Mr. Thornberry, who has led our committee with great skill and intelligence, and I appreciate his leadership. Thank you. Mr. Thornberry. I thank the gentlelady, and let me echo her frustration with the delays in having the statements before us. Obviously, it makes it more difficult for all of us to do our job well. Let me just, as a brief aside on timing. My understanding is that we will have votes roughly around 11:30. Mr. Liscouski also has another hearing in the Intelligence Committee around that time, and so I don't want to limit anything but the briefer we can all be in our questions and responses we can cover more territory. I appreciate both of our witnesses. Without objection, other members of course may submit opening statements for the record. Prepared Statement of the Honorable Jim Turner, a Representative in Congress From the State of Texas, and Ranking Member, Subcommittee on Cybersecurity, Science, and Research & Development Thank you Mr. Chairman. Good Morning Gentlemen. Mr. Liscouski, it is a pleasure to have you testify before our Committee again. Mr. Cooper, I believe this is the first time you have appeared before us--welcome. The Department of Homeland Security's cybersecurity mission is two- fold. First, it is the key agency responsible for coordinating our nation's efforts to protect our computer networks and critical infrastructures. Second, it must ensure that its own information technology systems are well-integrated and armed with appropriate safeguards. We recognize that these tasks are not easy but they must be done to help ensure the security of our homeland. The ever-changing nature of technology means that the Department must have the best expertise, personnel, tools, and full authority to effectively accomplish its mission. Unfortunately, the Department is not making the progress needed to secure our nation from a cyber attack. It is also not moving quickly enough to integrate and protect its own information technology systems. Mr. Liscouski, six months ago you appeared before this Subcommittee and told us that the Department, having finally found a Director to lead its cybersecurity efforts, was undertaking significant initiatives to further our country's efforts to secure cyberspace and prepare and respond to network attacks. To date, however, the cybersecurity initiatives that the have been unveiled have not gotten us much further than we were before the creation of the Department. Indeed, some of the initiatives appear to duplicate existing efforts. Let me just mention a few specific areas in which I see the Department's efforts lagging.First, it is not apparent to me that the Department has in place the ability and authority to direct other agencies with specific expertise in the event of a cyber crisis. Second, the Department does not appear to have an effective and meaningful public--private cybersecurity partnership. Many in the private sector have little or no idea what you are doing, what is expected of them, or how they are supposed to integrate and coordinate with the Department. Third, the Department has not sufficiently moved forward with the National Strategy to Secure Cyberspace released by the Administration a year ago. Why haven't we yet seen clear assignments of responsibilities and deadlines for the Strategy's implementation? If it is because the strategy won't work or is ineffective--we need to know that. Lastly, Mr. Liscouski, the Department's 2005 budget does not clearly lay out what your directorate is planning to do to further our cybersecurity efforts. We've only seen broad assertions and categories of activities. There seems to be lacking a clear vision on what the Department is doing to secure cyberspace. Mr. Cooper, I must say I am equally concerned about the state of the Department's efforts to build robust information technology systems within the Department and secure its own internal networks. There are specific areas, in particular, for which I am concerned. First, the Department's efforts to date have been too slow. Just last week, I saw one official stating that simple e- mail can't get passed to people in the same office and that it takes hours for e-mail to bounce around the Department to reach its destination. We won't win the war on terror if Homeland Security officials can't even talk to each other. Second, good and consistent information technology policies can help speed the integration of terrorist watch lists, strengthen the security of our borders, and allow us to ``connect the dots'' to find terrorists. It worries me, Mr. Cooper, that you have publicly suggested that a consolidated watchlist may not be necessary. In my view, achieving this goal is critical for making our homeland security programs work. Third, it is not clear to me, Mr. Cooper, that you have the sufficient authority to coordinate and direct the divisional Chief Information Officers within the Department. If this is a problem, I hope that you will be candid with us regarding any additional authorities your position requires. Lastly, this past December, the Department received a 34--the lowest grade of any agency--in the Government Reform Committee's annual grading of agencies on the security of their computer systems. The Department should be setting an example for the rest of government to follow--not trailing at the back of the class. Gentleman, I thank you for appearing before our Committee today to address these important issues. I appreciate both of our witnesses being here today. Let me first call on Robert Liscouski, Assistant Secretary for Infrastructure Protection at the Department of Homeland Security. STATEMENT OF ROBERT LISCOUSKI, ASSISTANT SECRETARY FOR INFRASTRUCTURE PROTECTION, DEPARTMENT OF HOMELAND SECURITY Mr. Liscouski. Thank you, Mr. Chairman, and distinguished members of the subcommittee. I appreciate the opportunity to be here this morning. As you pointed out, I am responsible for infrastructure protection at the Department of Homeland Security, and I am pleased to be here before you today to discuss our progress that we have made in the National Cybersecurity Division and to discuss the President's fiscal year 2005 budget request. In today's highly technical and digital world, we recognize that attacks against us may manifest themselves in many forms, including both physical and cyber attacks. And in addition, we recognize the potential impact of collateral damage from any one attack to a variety of assets. This interconnected and interdependent nature of our infrastructure makes our physical and cyber assets difficult to separate, and it would be irresponsible to address them in isolation. The integrated approach that DHS takes toward protection of physical and cyber assets and responsive threats and protection of its vulnerabilities enables us to consider the full range of risks to the Nation, including loss of life, destruction of infrastructure services, economic impact, and national security implications. Recognizing that future terrorist attacks may not be limited to either physical or cyber acts but rather a combination of the two to amplify the impact, my office is organized to examine and address threats and vulnerabilities across the nation's infrastructure by using a five-step risk management methodology that measures the Nation's risk profile in the context of and in the absence of threat information. Those major steps of the risk management methodology include the identification of the critical infrastructure assets, the assessment of vulnerabilities, the normalization analysis and prioritization of protective measures, implementing protective programs, and then finally the measurement of effectiveness and performance outputs so we can determine whether what we are doing is the right thing. The National Cybersecurity Division was created in June of 2003 to serve as a national focal point for the public and the private sectors to address the cybersecurity issues and to coordinate the implementation of a national cyber strategy to secure cyberspace. Under that mandate, the National Cybersecurity Division has been working closely with our partners in the Federal Government, the private sector, and academia on a variety of programs and initiatives to protect our information infrastructure. We recognize that the challenge is vast and complex, that the threats are multi-faceted and global in nature, and that our strengths and our vulnerabilities lie in our interdependencies; that the environment changes rapidly, and that information sharing and coordination are crucial to improving our overall national and economic security. The activities of the National Cybersecurity Division then are based on this understanding and designed to address each of the priorities set forth in the National Strategy to Secure Cyberspace. Priority one, a national cyberspace secure response system; Priority two, a national cyberspace security threat and vulnerability reduction program; Priority three, a national cyberspace security awareness and training program; Priority four, securing the government's cyberspace; and, Priority five, national security and international cyberspace security cooperation. When I appeared before the committee--before the subcommittee in September of 2003, I announced that Mr. Amit Yoran was to become the Director of the National Cybersecurity Division. Under his leadership, the division has aggressively pursued partnerships and programs and is building a strong team to meet its objectives. I also announced the creation of the U.S. Computer Emergency Readiness Team, or the US-CERT. The US- CERT is a key component of our cyber strategy and readiness and response system and the National Cybersecurity Division's operational arm. The US-CERT provides a national coordination center that links public and private response capabilities to facilitate information sharing across infrastructure sectors and to help protect and maintain the continuity of our Nation's cyber infrastructure. On 28 January of this year, the Department of Homeland Security through the US-CERT unveiled the National Cyber Alert System. It is an operational system developed to deliver targeted and timely and actionable information to Americans to secure their computers. At the U.S. government, we have the responsibility to alert the public of imminent threats and to provide protective measures where we can, and minimally to provide information necessary for the public to protect their systems. The day we inaugurated the system, the US-CERT site received more than 1 million hits. And today, from the first few weeks of that site, we have more than 250,000 direct subscribers who receive the National Cybersecurity Alert information to enhance their cybersecurity. And I urge you all to visit that site at www.US-CERT.gov, to subscribe to our information services. To facilitate the preparation interagency and public- private cooperation coordination during and to recover from cyber incidents, we have created the Cyber Interagency Incident Management group, or Cyber IIMG. The Cyber IIMG coordinates intergovernmental preparedness and operations to respond to and recover from cyber incidents and attacks. The group brings together senior officials from national security, law enforcement, defense, intelligence, and other government agencies that maintain significant cybersecurity capabilities and that can bring to bear in response to an incident and, importantly, possess the necessary statutory authority to act. We have also broadened our interagency partnerships to create two new groups addressing the various challenges before us. The first is a Chief Information Security Officers Forum, CISO Forum, established to provide a trusted venue for our government information security offices to collaborate and share effective practices, initiatives, capabilities, successes, and challenges. The second group is the Government Forum of Incidents Response and Security Teams, FIRST, a group of technical and tactical practitioners of security response teams responsible for securing government information technology systems. GFIRST members work together to understand and handle computer security incidents and to encourage proactive and preventive security practices. One of our most important constituencies of course is the private sector, because as you well know it is estimated that 85 percent of America's critical infrastructure is owned and operated by the private sector, and technology developed by the industry continues to fuel the growth and the evolution of the Internet. In December 2003, the Cybersecurity Division co-hosted the first National Cybersecurity Summit, which allowed the Department to work side by side with leaders in industry to address key cybersecurity issues facing the Nation. The Cyber Division is also working closely with research and academic communities to better educate and train future cyber analysts, and we are participating in the National Science Foundation Scholarship For Service, or the Cyber Corps program as well as the National Security Agency's Information Assurance Centers for Excellence, academic excellence in 26 States, for which there are 50 centers. The National Cybersecurity Division is only 9 months old, but these initiatives represent considerable progress toward making cybersecurity a reality and reflect our collective commitment to do much more. Each accomplishment fosters further activity which we have outlined in our fiscal year 2005 budget. The national cybersecurity budget for fiscal year 2005 request is $79 million, and it is based upon ongoing and future activities necessary to meet our mission. The division is positively exploiting the work of its predecessors and building crucial partnerships as part of DHS's overall efforts to enhance the protection of our Nation's critical infrastructure. We have much to do and it will take time, resources, dedication, energy, and hard work to succeed. We are committed to that challenge, and we look forward to the opportunities to update the subcommittee on our progress. We are also approaching the next National Cybersecurity Day, I would like to point out, which is this Sunday. And as Americans turn their clocks forward, we also urge them to take this opportunity to review and improve their cyber readiness. Again, I thank you for the opportunity to testify before you today, and I would be pleased to answer the questions at your convenience. [The statement of Mr. Liscouski follows:] Prepared Statement of the Honorable Robert Liscouski Good morning, Chairman Thornberry and distinguished Members of the Subcommittee. My name is Robert Liscouski, and I am the Assistant Secretary for Infrastructure Protection in the Department of Homeland Security (DHS). I am pleased to appear before you today to provide an update on the Department's National Cyber Security Division's efforts in coordinating cyber security initiatives since my appearance in September 2003 and to discuss the President's FY 2005 budget request for the Division. In my testimony today, I will share information on a number of initiatives that use diverse channels of communication to reach our government partners as well as our mutual constituents--home users, small and medium-sized businesses, and corporations. Introduction March 1st marked the one-year anniversary of the Department of Homeland Security. In his remarks commemorating that day, Secretary Ridge stressed the Department's goal to strengthen information sharing and infrastructure protection over the next year. We in the Information Analysis and Infrastructure Protection Directorate (IAIP) take that mandate to heart in our collective efforts and activities to protect the Nation. Established by the Homeland Security Act, the IAIP Directorate leads the Nation's efforts to protect our critical infrastructures from attack or disruption, and under the leadership of Under Secretary Frank Libutti has made significant strides toward that objective. The IAIP Directorate includes the Office of Information Analysis, the primary gathering and analytic center for threat information and intelligence within DHS, and the Office of Infrastructure Protection (IP), for which I am responsible. In today's highly technical and digital world, we recognize that attacks against us may manifest in many forms, including both physical and cyber attacks. In addition, we recognize the potential impact of collateral damage from any one attack to a variety of assets. This interconnected and interdependent nature of our infrastructure makes our physical and cyber assets difficult to separate, and it would be irresponsible to address them in isolation. The placement of our two offices within the Directorate underscores this linkage and enables us to work together to share intelligence and other information and coordinate our efforts to mitigate our vulnerabilities. Further, IP's component divisions work closely together to coordinate efforts regarding both physical and cyber threats and vulnerabilities and to develop plans that address the interdependencies between them. Homeland Security Presidential Directive 7 (HSPD 7), released by President Bush on December 17, 2003, requires the development of a National Infrastructure Protection Plan that sets out a roadmap for assessing both physical and cyber vulnerabilities and, once the vulnerabilities are determined, articulating the protective actions that need to be taken. As such, IAIP takes a holistic view of critical infrastructure vulnerabilities and works to protect America from all threats by ensuring the integration of physical and cyber security approaches in the Directorate's Office of Infrastructure Protection. This integrated approach to physical and cyber threats and vulnerabilities enables us to consider the full range of risks to the Nation, including loss of life, disruptions of infrastructure services, economic impact, and national security implications. Recognizing that future terrorist attacks may not be limited to either a physical or cyber act, but rather a combination of the two to amplify impact, IP includes the National Cyber Security Division, the Protective Security Division, the Infrastructure Coordination Division, and the National Communications System and is organized to examine and address threats and vulnerabilities across the Nation's infrastructure by using a five- step risk management methodology that measures the national risk profile in the context, and absence, of threat information. The major steps of our risk management methodology include: Identification of critical infrastructure Assessing vulnerabilities Normalizing, analyzing, and prioritizing protective measures Implementing protective programs Measuring effectives through performance metrics By performing each of these steps continuously across and within each critical infrastructure sector, and by integrating threat information, we are continually improving our national critical infrastructure protection program--physical and cyber--and driving better correlation of protective programs to the dynamic threat environment. National Cyber Security Division Mission: Coordinating our National Cyber Security In support of the broader IAIP mission, the National Cyber Security Division was created in June 2003 to serve as a national focal point for the public and private sectors to address cyber security issues and to coordinate the implementation of the National Strategy to Secure Cyberspace released by the President in February 2003. Under that mandate, the National Cyber Security Division has been working closely with our partners in the federal government, the private sector, and academia on a variety of programs and initiatives to protect our information infrastructure. We recognize that the challenge is vast and complex, that the threats are multi-faceted and global in nature, that our strengths--and our vulnerabilities--lie in our interdependencies, that the environment changes rapidly, and that information sharing and coordination are crucial to improving our overall national and economic security. The activities of the National Cyber Security Division, then, are based on this understanding and are designed to address each of the priorities set forth in the National Strategy to Secure Cyberspace (``the Strategy''): Priority I:A National Cyberspace Security Response System Priority II: A National Cyberspace Security Threat and Vulnerability Reduction Program Priority III: A National Cyberspace Security Awareness and Training Program Priority IV: Securing Government's Cyberspace Priority V:National Security and International Cyberspace Security Cooperation Meeting the Mandate: Readiness and Response The National Cyber Security Division's primary overarching goal since its creation has been to enhance the Nation's Cyberspace Security (Readiness and) Response System (Priority I) that will, where possible, deter and prevent a cyber attack from occurring, limit its scope and impact on the critical infrastructures, and expedite recovery. In October 2003, we participated in Livewire, the first ever national- level cyber exercise to baseline our capabilities and communication paths for responding to national attack. The exercise involved over 300 participants representing more than 50 organizations across federal, state, and local governments and the private sector. Cyber attack simulation scenarios were developed to stress cyber interdependencies across our critical infrastructures and baseline our ability to collaborate across the public and private sectors. The information gleaned from Livewire validated the National Cyber Security Division's approach and activities. In that context, I will outline the National Cyber Security Division's accomplishments to date and discuss on-going and future programs that all serve to enhance our national cyber security. When I appeared before the Subcommittee in September 2003, I announced the appointment of Mr. Amit Yoran as the Director of the National Cyber Security Division. Under his leadership, the Division is aggressively pursuing partnerships and programs and building a strong team to meet its objectives. I also announced the creation of the U.S. Computer Emergency Readiness Team, or US-CERT. US-CERT is a key component of our Cyber Security Readiness and Response System and the National Cyber Security Division's operational arm. Through its initial partnership with the CERT Coordination Center (CERT/CC) at Carnegie Mellon University, US-CERT provides a national coordination center that links public and private response capabilities to facilitate information sharing across all infrastructure sectors and to help protect and maintain the continuity of our Nation's cyber infrastructure. The overarching approach to this task is to facilitate and implement systemic global and domestic coordination of deterrence from, preparation for, defense against, response to, and recovery from, cyber incidents and attacks across the United States, as well as the cyber consequences of physical attacks. To this end, US-CERT is building a cyber watch and warning capability, launching a partnership program to build situational awareness and cooperation, and coordinating with U.S. Government agencies and the private sector to deter, prevent, respond to and recover from cyber--and physical-- attacks. One direct impetus of the Livewire exercise was to validate the importance of building a cyber information dissemination mechanism to reach our stakeholders. On January 28, 2004, the Department of Homeland Security through USCERT unveiled the National Cyber Alert System, an operational system developed to deliver targeted, timely and actionable information to Americans to secure their computer systems. As the U.S. Government, we have a responsibility to alert the public of imminent threats and to provide protective measures when we can, or least provide the information necessary for the public to protect their systems. The offerings of the National Cyber Alert System provide that kind of information, and we have already issued several alerts and the initial products of a periodic series of providing ``best practices'' and ``how-to'' guidance. We strive to make sure the information provided is understandable to all computer users, technical and non- technical, and reflects the broad usage of the Internet in today's society. I am pleased to report that Americans are exhibiting a keen interest in the alert system. On January 28th, the day we inaugurated the system, the US-CERT site received more than one million hits. Within the first few weeks, more than 250,000 direct subscribers received National Cyber Alerts to enhance their cyber security. For your reference and for your constituents, I urge you to visit www.us- cert.gov to subscribe to a number of our information services to facilitate protecting your computer systems. As we increase its outreach, the National Cyber Alert System is looking at other vehicles to distribute information to reach as many Americans as possible. The Livewire exercise reiterated the critical need for government to share information and coordinate efforts at cyber incident preparation that enhance our effectiveness in responding to cyber activity. To facilitate preparation and interagency and public-private coordination during, and to recover from cyber incidents, we created a Cyber Interagency Incident Management Group, or Cyber IIMG. The Cyber IIMG coordinates intra-governmental preparedness and operations to respond to, and recover from, cyber incidents and attacks. The group brings together senior officials from national security, law enforcement, defense, intelligence, and other government agencies that maintain significant cyber security capabilities that they can bring to bear in response to an incident and, importantly, possess the necessary statutory authority to act. By meeting monthly, the Cyber IIMG is developing cyber preparedness and response plans that will help it to support the IIMG during national events with cyber implications, and ensure that during a cyber crisis the full range and weight of federal capabilities are deployed in a coordinated and effective fashion. To enhance the level of communication among federal agencies in a crisis, DHS' IP is continuing to widen the reach of the Critical Infrastructure Warning Information Network, or CWIN. For those who are not familiar, CWIN is a technologically advanced, secure network for infrastructure protection, communication and cooperation, alert, and notification. As a private communications network, CWIN serves as a reliable and survivable network with no logical dependency on the Internet or the public switched network. In the event a significant cyber attack disrupts our telecommunications networks and/or the Internet, CWIN provides a secure and survivable capability for members to communicate. It is important for us to understand and prepare for any contingency. In this vein, DHS is extending the reach of CWIN's survivable architecture beyond federal agencies by working with critical private sector companies to establish CWIN nodes at their Network Operations Centers. The goal is to increase the number of CWIN nodes to 100 by the end of 2004, making it a robust and resilient capability that supports national cyber operations and response during times of crisis. Key components of the National Cyber Security Division's efforts are laid out in Priority IV of the Strategy: Securing Government's Cyberspace. Consistent with law and policy, the National Cyber Security Division works with the Office of Management and Budget and the National Institute of Standards and Technology regarding the security of federal systems and coordinates with federal law enforcement authorities as appropriate. We have taken great steps to integrate existing frameworks into the system, such as the continued functionality of the Federal Computer Incident Response Center (FedCIRC) is being transitioned within US-CERT, as well as to create a new forum for coordination toward greater cyber security in the federal government. We have also broadened our interagency partnerships to create two new groups addressing the various challenges before us. The first is the Chief Information Security Officers Forum (CISO Forum), established to provide a trusted venue for our government information security officers to collaborate and share effective practices, initiatives, capabilities, successes and challenges. The second is the Government Forum of Incident Response and Security Teams (GFIRST), a group of technical and tactical practitioners of security response teams responsible for securing Government information technology systems. GFIRST members work together to understand and handle computer security incidents and to encourage proactive and preventative security practices. The purpose of the GFIRST peer group is to: Provide members with technical information, tools, methods, assistance and guidance; Coordinate proactive liaison activities and analytical support; Further the development of quality products and services for the federal government; Share specific technical details regarding incidents within a trusted U.S. Government environment on a peer-to-peer level; and Improve incident response operations. The National Cyber Security Division has taken on aggressive plans for accelerated information sharing and collaboration efforts in both the CISO Forum and GFIRST. Already, both groups have increased information sharing horizontally across previously somewhat stove-piped organizations and improved the overall cyber preparedness of the U.S. Government. Meeting the Mandate: Assessment and Analysis A major component of the National Cyber Security Division's mission is our focus within the Office of Infrastructure Protection to coordinate efforts on physical and cyber threat and vulnerability identification and assessment, and the implementation of protective measures to reduce vulnerabilities that will enable IAIP to systemically address the security status of U.S. networks and the cyber components and dependencies of our critical infrastructures. This effort directly responds to the calls in the Strategy and HSPD 7 to: Develop a National Infrastructure Protection Plan; Complete and maintain a critical cyber asset inventory; Implement and expand standard methodologies to perform threat, risk, and vulnerability assessments; Develop and maintain an interdependency analysis capability to systematically understand the relationships between cyber and physical assets; and Identify and implement priority protective measures to mitigate vulnerabilities. The National Cyber Security Division currently houses a number of operational, data analysis, and other diagnostic tools to assist in assessing our vulnerabilities. The US-CERT is developing a comprehensive Watch Operation that will provide a 24x7 single point of contact for national cyber incident detection, evaluation, response, coordination, and restoration. Some key tools that US-CERT funded and/ or executed include: Common Vulnerability and Exposures (CVE), a dictionary of standard names for vulnerabilities that makes it possible to correlate information across vendor products Malware Analysis, a laboratory operation performing detailed analysis and characterization of malicious code to adequately notify the Government of specific dangers and threats to the critical infrastructure Security Analysis Program (SAP), a set of analysis tools and capabilities offered through US-CERT to (1) help agencies better monitor network security activity; (2) assist agencies in identifying configuration problems, unauthorized/ unnecessary network traffic, network backdoors, and routing anomalies; and (3) gain better global situational awareness of network health and malicious activity. The use of these tools by the federal civilian agencies represents one way that we are transferring technology used by the military to increase our overall capabilities. As part of our efforts to improve our situational awareness and analysis capabilities, the National Cyber Security Division is coordinating with the National Communications System (NCS) on the Global Early Warning Information System (GEWIS). GEWIS is an effort underway within IAIP to find a wide variety of sources, including open source and approved private information, which can be analyzed to provide better situational awareness of the Internet and its underlying infrastructures. GEWIS will allow DHS to assess the health of the Internet in a timelier manner and, as a result, coordinate with the appropriate stakeholders in responding to Internet events. GEWIS is currently being used by IP in conjunction with other resources to provide the current situational awareness capability. GEWIS is continuing to evolve, and over time will provide enhanced functionality. Meeting the Mandate: Awareness, Outreach, and Cooperation So far I have discussed the accomplishments we have made in readiness and response, assessment, analysis, and warning efforts at the National Cyber Security Division. Another major component of our work lies in the outreach and awareness programs that support every aspect of our efforts to improve and sustain cyber security. The Strategy clearly identifies the users and stakeholders in cyber security in Priority III as home users and small business, large enterprises, institutes of higher education, the private sectors that own and operate the vast majority of the Nation's cyberspace, and state and local governments. In Priority V, the Strategy also emphasizes that international cooperation is crucial to protecting ourselves in a world where attacks cross borders at light speed. The following components make up the National Cyber Security Division's outreach and awareness programs and serve as the basis for our recently initiated Partnership Program. One of our most important constituencies is the private sector. It is estimated that eighty-five percent of Americas critical infrastructure is owned and operated by private companies, and technology developed by industry continues to fuel the growth and evolution of the Internet. In December 2003, the National Cyber Security Division co-hosted the first National Cyber Security Summit in Santa Clara, California with the Information Technology Association of America, TechNet, the Business Software Alliance, and the U.S. Chamber of Commerce. This event was designed to energize the public and private sectors to implement the National Strategy to Secure Cyberspace. The Summit allowed the Department of Homeland Security to work side-by-side with leaders from industry to address the key cyber security issues facing the Nation. Five interest areas were established to focus specifically in the areas of: Increasing awareness Cyber security early warning Best practices for information security corporate governance Technical standards and common criteria Security across the software development lifecycle Perhaps most importantly, the Summit served as a call to action. It represented a logical transition point from developing a national strategy to energizing the public-private partnership to implement concrete, measurable actions to improve the security of America's cyber systems. The efforts of these working groups as well as those of other industry leaders will be vital as we move forward in implementing the National Strategy. In addition to the National Cyber Security Summit, the National Cyber Security Division is working with a host of groups to better understand and address their cyber security issues and concerns. These groups include, among others, the President's National Infrastructure Advisory Council, the President's National Security Telecommunications Advisory Committee, and the private sector Information Sharing and Analysis Centers (ISAC). As a result of the working relationships that have been developed among state and local cyber security representatives, we are also facilitating a multi-state ISAC that will even further enhance information sharing at the state and local levels. The National Cyber Security Division is also working closely with the research and academic communities to better educate and train future cyber analysts. We are participating in the National Science Foundation's Scholarship for Service, or ``Cyber Corps'' program as well as the National Security Agency's fifty Information Assurance Centers for Academic Excellence in twenty-six states. We are looking at a number of additional ways to raise cyber security awareness in our educational and professional programs, including exploring the K-12 curriculum with the Department of Education and exploring the possibility for the private sector to create independent information technology certification programs for IT security professionals. A crucial role for the National Cyber Security Division is to cooperate and leverage expertise within the Department of Homeland Security. Within IP, the National Cyber Security Division coordinates with the Protective Security Division (PSD) on our physical and cyber interdependencies and activities. In addition, it works closely with the National Communications System (NCS), which runs the CWIN program and the Global Early Warning Information System (GEWIS) described above, and brings NCS's telecommunications system expertise to its efforts. Through its integrated approach to addressing the critical infrastructure, the Office of Infrastructure Protection also coordinates efforts with the 13 critical infrastructure sectors laid out in HSPD 7 and their respective Information Sharing and Analysis Centers (ISACs). The National Cyber Security Division coordinates closely with IP's Infrastructure Coordination Division on the cyber elements of their efforts. In addition to our coordinated work within IP, the National Cyber Security Division works with a number of other DHS organizations. Close linkage between the Office of Infrastructure Protection and the Office of Information Analysis, led by Assistant Secretary Patrick Hughes, promotes the ability to map threat information with cyber vulnerabilities. This mapping allows for the effective prioritization of potential risks so agencies may implement remediation efforts as quickly as possible to limit the impact of computer incidents. The technology that drives cyber security needs and product demands develops very rapidly in today's environment. Therefore, IAIP and the Science and Technology Directorate (S&T) are working together to coordinate research and development activities in the important areas of critical infrastructure protection and cyber security. A program of regular, interactive meetings between the two directorates ensures a two-way flow of information and coordination of technical activities. S&T's cyber security portfolio scope and activities are driven by the threats and issues that warrant national-level concerns, including cyber attacks by hostile adversaries against the Nation's critical infrastructures, or attacks whose consequences are of sufficient magnitude to cause widespread economic or social disruptions. The National Cyber Security Division provides important input regarding the research and development requirements for S&T's cyber security portfolio based on its activities and insight into the needs for greater protection of our cyber systems. Initial technical emphases for the Cyber Security Portfolio include: Improving the security of Internet infrastructure protocols and developing migration paths for these protocols into commercial use; Research, development, testing, and evaluation investments aimed at next-generation cyber security technologies aimed at prevention of and protection against attacks; threat identification and tracking; monitoring, detection, and attribution of attacks; and immediate as well as longer-term response to attacks; Economic assessment and modeling to support the development of business cases for cyber security in addition to providing a foundation for risk-based cyber security decision making. I have addressed many of our national efforts, but I want to emphasize our international partnership efforts as well. As the Strategy says, ``America's cyberspace is linked to that of the rest of the world.'' Cyberspace is truly borderless, and our communications networks are inarguably interconnected. We need to defend our systems from the outside, but we can only do so with global cooperation and coordination. Therefore, the National Cyber Security Division's Partnership Program includes outreach and advocacy efforts with our global partners, through US-CERT outreach activities and in bilateral and multilateral discussions in conjunction with the Department of State, the Department of Justice, and the Department of Defense. The National Cyber Security Division is only nine months old, but these initiatives represent considerable progress toward making cyber security a reality and reflect our collective commitment to do more. Each accomplishment fosters further activity, which we have outlined in our FY 2005 budget request. National Cyber Security Division Budget Request FY 2005 The National Cyber Security Division Budget Request of $ 79 million for the fiscal year 2005 is based on the on-going and future activities necessary to meet our mission. The budget plan is organized around National Cyber Security Division's program initiatives in (1) Readiness and Response; (2) Strategic Initiatives; (3) Information Sharing and Coordination; and (4) Management and Administration. Please let me highlight some key initiatives in the plan. Readiness and Response The core building block for an effective National Cyberspace Security Readiness and Response System is the U.S. Computer Emergency Readiness Team (US-CERT). US-CERT will require full funding of $59.3 million for its various existing and projected programs, including sustaining and improving the GEWIS, CWIN, Watch, and other programs described above. In its inaugural year, US-CERT is making significant progress in establishing critical operational capabilities and building key relationships within government, private industry, and academia. To further these advancements, FY05 will be a significant year for the US-CERT to continue building and enhancing present capabilities into even more responsive and robust ones. Strategic Initiatives The National Cyber Security Division's Vulnerability Assessment and Reduction Program in response to HSPD 7 is a central aspect of its Strategic Initiative endeavors, and the requested funding of $7.0 million will build upon the initial efforts undertaken in FY03 and FY04. Additional aspects of the Strategic Initiatives program include software assurance efforts, continued awareness and training efforts, and a series of tabletop and other exercises including a second Livewire exercise, our participation in the National-Level Exercise Program, and a planned set of cyber-specific tabletop exercises at the State and local level. Information Sharing and Coordination A critical aspect of the National Cyber Security Division's activities is outreach to the public and private stakeholders in the U.S. and interaction with global partners. $8.7 million will be used to support a variety of public awareness campaigns and outreach efforts-- such as continued support of the Stay Safe Online campaign--as called for in the Strategy. IAIP will also build and expand international partnerships to raise cyber security awareness and cooperation to promote a global culture of security. Most importantly, it accomplishes the operational partnership executive of information sharing and collaboration. Management and Administration The National Cyber Security Division is building a significant team of technical and security experts and determining the infrastructure it needs in support of its numerous initiatives toward greater national cyber security. Conclusion The creation of the National Cyber Security Division reflects the recognition that we as a Nation are utilizing sophisticated information networks to increase productivity, encourage innovation in products and services, enhance daily lives, and communicate globally in an instant. Importantly, we are also using these innovations to enhance our national and economic security, facilitate our law enforcement and public safety efforts, and protect our individual privacy. As technology has developed, we have found more exciting ways to use it, and we have become increasingly dependent on it. But, we have also acknowledged that its proliferation across our critical infrastructures--the very same proliferation that makes us more advanced as a society and an economy--also makes us vulnerable to those who would use it to harm us. IAIP, through the coordinated efforts of its component divisions including the National Cyber Security Division, is working diligently to address those vulnerabilities and provide greater security without stunting the growth and benefits of the digital economy for all Americans. We are approaching the next National Cyber Security Day this Sunday, and as Americans turn their clocks forward, we will also be urging them take the opportunity to review-- and improve--their cyber readiness. In its short life, the National Cyber Security Division is positively exploiting the work of its predecessors, leveraging the existing expertise around it, and building crucial partnerships as part of DHS' overall efforts to enhance the protection of our Nation's critical infrastructures. We have addressed crucial operational components of our program and are improving them, and we are developing strategic plans for the future. We know we still have much to do and that it will take time, resources, dedication, energy, and hard work to succeed. We are committed to that challenge, and we look forward to future opportunities to update the Subcommittee on our progress. Again, thank you for the opportunity to testify before you today. I would be pleased to answer any questions you have at this time. Mr. Thornberry. Thank you. Now we turn to Mr. Steven Cooper, who is the Chief Information Officer for the Department of Homeland Security. STATEMENT OF STEVEN COOPER, CHIEF INFORMATION OFFICER, DEPARTMENT OF HOMELAND SECURITY Mr. Cooper. Mr. Chairman and members of the subcommittee, good morning. I am Steve Cooper, Chief Information Officer for the Department of Homeland Security. It is my pleasure to appear before the subcommittee, and I wish to thank the chairman and members for providing me the opportunity to update you on our efforts and progress in integrating and securing information systems within the Department and to discuss the President's fiscal year 2005 budget for information technology. I would request that my written testimony be entered into the record. Mr. Thornberry. Without objection, your testimony shall be in the record. Mr. Cooper. Thank you. The challenges facing those of us who comprise the information technology function of the Department of Homeland Security is complex. There are three major areas of focus. The first is to ensure that the women and men on the front lines of the Department have all of the information technology enabled solutions and tools they need to safeguard the United States and to deliver our safety and service-related operational functions and capabilities. The war on terrorism is real, and we must deliver new mission solutions with quality and speed in a cost effective manner while maintaining already existing mission solutions that we inherited when the Department was formed. The second area addresses the integration of IT enabled solutions. Guided by our enterprise architecture, we are identifying opportunities to consolidate and streamline mission solutions. In mission areas like threat identification and management, identity credentialing, in collaboration we have identified multiple solutions in use within the various organizational elements of the Department. Our goal is to help facilitate and support the operators and subject matter experts in our business units, and determine the optimal number and nature of mission solutions needed. And the third area is to realize efficiency and economies of scale that the President and Congress have set forward when creating the Department of Homeland Security. Here, we must rapidly identify and eliminate existing overlap or redundancy within our IT infrastructure within the Department. However, we must ensure that we do no harm to mission solutions while we restructure and consolidate our infrastructure. In this case, we really are changing the tires on the car while it is moving. In order to guide the information technology function in achieving success in these three overarching focus areas, I have, in concert with our Department of Homeland Security CIO Council, set eight priority force the IT function. I would like to share these with the committee. Very quickly, they are: Information sharing, mission rationalization, IT portfolio management, information security, infrastructure transformation, enterprise architecture, IT governance, and IT human capital. These priorities are aligned with the strategic priorities of the Department set forth by Secretary Ridge and Deputy Secretary Loy. For each priority, we are in the process of developing a case for change, the business case, a road map that outlines the activities, tasks, and deliverables needed to achieve the desired objectives and metrics by which we will measure success. I would like to highlight two of these eight. First is enterprise architecture. In my previous testimonies, I have discussed the vision of strategy of DHS and how that strategy must be supported by a disciplined capital planning investment control process that is guided by business- driven enterprise architecture. With the release of the first version of enterprise architecture in September 2003, we made progress toward the goal of achieving, one, Department of Homeland Security IT infrastructure. Version 1 of the enterprise architecture describes a target information management infrastructure that will be dramatically different from the one we have today, one that will provide timely, accurate, useful, and actionable information to all individuals and stakeholders who require it all of the time. We believe this effort was truly unique in the Federal Government, and that we delivered a comprehensive and immediately useful target enterprise architecture in less than 4 months. Version 1 of our enterprise architecture contributed to some of our investment decisions for fiscal year 2005. Work is currently under way on Version 2 of the enterprise architecture. This work will develop additional detail around the target architecture and enhance the transition strategy from Version 1 into a more detailed transition plan that will specifically enable the implementation of the target enterprise architecture. Version 2 is currently on track for completion by the end of this fiscal year. Along with continuing the hard work of developing greater detail, we will continue reaching deeper to find more opportunities to consolidation and begin to develop new and improved mission support capabilities enabled by information technology. Version 2 of the enterprise architecture, together with the associated transition plan, will serve as the basis for further improving DHS mission performance and facilitating information technology, alignment, integration, and consolidation. DHS is a new organization formed a little over a year ago from 22 legacy agencies, each with their own culture, processes, and legacy information technology systems. Many of these legacy agencies had developed their own enterprise architectures prior to the establishment of the Department. The challenge for us is to implement an integrated DHS enterprise architecture, bringing together the good work that has been done within each of the organizational elements and, during that process, ensuring that the entire Department has the IT capabilities needed to accomplish our mission capabilities every day. One challenge to achieving integrated homeland security enterprise architecture is having enterprise architecture that is sufficiently mature to support detailed alignment and analysis for IT investment management decision making. We used Version 1 to identify what we called quick hits, and these are outlined in release one of our enterprise architecture; we are currently developing Version 2 to support more detailed investment decision making. Another potential challenge is overcoming resistance to change and obtaining management and organizational buy-in into our enterprise architecture initiative. The Department has placed a very high priority on our efforts. Deputy Secretary Loy has directed the major organizational components of DHS to participate in the development of Version 2. As we speak, there are more than five different business focus area teams comprised of subject matter experts from across the Department working in facilitated team sessions to make sure that the business model for enterprise architecture Version 2 accurately and comprehensively captures the capabilities and requirements needed to accomplish the Department's mission. The extent of each organizational element's participation in these business area focus teams is reported to the DHS Management Council and monitored on a bi-weekly basis. The development of an enterprise architecture is an enormously complex process requiring considerable resources and a systematic methodology. However, DHS has already made good progress in meeting the goals of our desired target enterprise architecture. We are well on our way to consolidating many of the management functions from each of the 22 agencies, including financial and human resources. We have reduced to 10, 19 financial management service providers. We have moved from 13 separate contracting offices to eight. We have moved from 22 human resource offices to seven. We have moved from eight different payroll systems to three, and department experts expect to reduce this to one by the end of the year. And we have moved from 22 property management systems to three. These are a few up-to-date examples of the progress we are making. It is, however, clear that we still have a long way to go. I would like to highlight our fiscal year 2005 budget request very quickly. Information contributes to every aspect of homeland security and is a vital foundation of the homeland security effort. My office has responsibility for providing IT leadership that will foster best management practices in managing IT, enhance efficiencies through shared services and coordination of acquisition strategies, ensuring systems are properly accredited and certified as secure, and being an advocate for business transformation, all necessary toward ensuring that our homeland is more secure. The leadership and funding provided through the Department's IT investments are crucial for maintaining an enterprise architecture that is fully integrated with other management processes, and for allowing the Department to participate in many of our e-Gov initiatives across the Federal enterprise. The President's budget request for fiscal year 2005 includes a request for 226 million for departmentwide information technology investments. Included in the request is $95 million for information technology services, a portion of which will provide funding for the departmentwide geographic information system capability to improve the Department's enterprise portal. This funding provides for continuation of our enterprise architecture and planning efforts to address our evolving financial management system, eMERGE2, and funding to enable the development, the beginning of the development of our human resources information technology solutions. Additionally, the request includes $31 million for information security-related activities. Finally, the fiscal year 2005 budget request includes $100 million for wireless communications. I would like to highlight some key things related to one of our eight priorities in closing, and that is information security. Since its creation, the Department of Homeland Security has moved out aggressively to design and implement an information security program that will not only ensure compliance with all appropriate standards and regulations, but to also ensure that the entire Homeland Security community has a secure and trusted computing environment from which to operate. The heart of our reporting structure is built around the congressional requirements expressed in FISMA, the Federal Information Security Management Act. In order to effect a comprehensive information security program, and in accordance with the provisions of FISMA, I have designated a Chief Information Security Officer who manages and oversees all the internal Homeland Security Department's information systems security activities. The FISMA report details compliance with Federal laws and policies and DHS information security policies and standards. DHS is in the process of implementing enterprise management tools to ensure the accuracy and completeness of FISMA reporting across the Department. FISMA requires each agency to perform for each program and system periodic testing and evaluation of the effectiveness of information security policies, procedures, and practices. We do follow and will apply the Self-Assessment Guide for Information Technology Systems from the National Institute of Standards and Technology and as mandated by law. This self-assessment guide utilizes an extensive questionnaire which we have already begun using in delivering our first Department of Homeland Security report. I have selected a commercial off-the-shelf product called ``Trusted Agent FISMA''. This is an automated enterprise based management tool that maintains FISMA reporting data from all of our components and their plans and activities that captures and tracks security weaknesses and associated corrective milestones. In addition, it collects, processes, and stores all of the self-assessment information in accordance with the NIST guidance. We have deployed this system throughout DHS and have generated our first quarterly report. We expect this to improve the timeliness and accuracy of our reporting as this information is available real-time to the Secretary and other cognizant officials. I thank you again for the opportunity to testify before you today, and am pleased to answer questions that the committee may have. Prepared Statement of Steven Cooper, Chief Information Officer, U.S. Department of Homeland Security Mr. Chairman and Members of the Subcommittee: Good morning, I am Steve Cooper, Chief Information Officer for the Department of Homeland Security (DHS). It is my pleasure to appear before the Subcommittee, and I wish to thank the Chairman and Members for the providing me the opportunity to update you on our efforts and progress in integrating and securing information systems within the Department and to discuss the President's FY 2005 budget request for Information Technology. I will also update the Subcommittee on our Enterprise Architecture program efforts. Enterprise Architecture In his proposal for creating the Department over a year ago the President highlighted the use of enterprise architecture techniques to improve both the sharing and use of information. The President stated that the ``development of a single enterprise architecture for the department would result in elimination of the sub-optimized, duplicative, and poorly coordinated systems that are prevalent in government today. There would be rational prioritization of projects necessary to fund homeland security missions based on an overall assessment of requirements rather than a tendency to fund all good ideas beneficial to a separate unit's individual needs even if similar systems are already in place elsewhere.'' In my previous testimonies, I've discussed the vision and strategy of DHS and how that strategy must fulfill the President's vision. Additionally, it must be supported by a disciplined capital planning and investment control process that is guided by business-driven enterprise architecture. With release of the first version of the enterprise architecture in September 2003, we made progress toward the goal of one DHS infrastructure. Version 1 of the enterprise architecture describes a target information management infrastructure that will be dramatically different from the one we have today, one that will provide timely, accurate, useful and actionable information to all individuals who require it all the time. We believe this effort was truly unique in the federal government in that we delivered a comprehensive and immediately useful target enterprise architecture in less than four months. However, Version 1 of the Homeland Security Enterprise Architecture (HLS EA) defines the enterprise architecture at a conceptual level and outlines a general transition strategy that must be broken down further for the architecture to be implemented. Version 1, which was published at the end of September 2003: Identified common activities Proposed conceptual projects Proposed reusable business components Proposed Technology Patterns Began communications effort Increased understanding of EA planning and integration Increased the knowledge of the target architecture Work is currently under way on Version 2 of the enterprise architecture. This work will develop additional detail around the target architecture and enhance the transition strategy from Version 1 into a more detailed transition plan that will more specifically enable the implementation of the target enterprise architecture. This effort currently consists of 5 business teams composed of about 45 business people charged with the responsibility of decomposing the common business activities. During this effort for Version 2, we will: Verify and augment transitional projects Verify and augment reusable business components Verify and augment technology patterns Prepare an HLS-EA Framework that identifies the products that will be produced by the department and that are expected to be produced by the Transitional Project Managers Prepare governance procedures and bodies to ensure alignment with the HLS-EA Ensure the integration of the transitional projects Concurrently with the Version 2 effort, the enterprise architecture team is working with several large project offices, e.g., ACE and US- VISIT, to determine alignment to the transition strategy so that these project offices can immediately begin building to the target architecture. Version 2 is currently on track for completion early in the 4th quarter, FY04. Along with continuing the hard work of developing greater detail, we will continue reaching deeper to find more opportunities for consolidation and opportunities to develop new and improved mission support capabilities enabled by information technology. Version 2 of the enterprise architecture, together with the associated transition plan, will serve as the basis for further improving DHS mission performance and facilitating IT alignment, integration, and consolidation. Technical Reference Model Status In Version 1 of the EA, we developed the DHS Technical Reference Model (TRM) by extending the TRM from the Office of Management and Budget Federal (OMB) Enterprise Architecture (FEA). The value of the TRM is to provide a common set of terminology for describing and organizing technology. We are currently working on further developing the DHS TRM by improving the structure of technology categories so that they promote consistency and are more meaningful across the Department. In addition, we have made progress on filling in the Standards Profile (SP). The Standards Profile provides guidance to the components and major programs on what technologies to use to implement solutions to ensure consistency and interoperability with other solutions within the Department and the homeland security community. Our approach is to collect all of the technology standards from the component CIO offices and to organize them into the revised TRM for analysis. In many cases, the standards in place are consistent across the components and these consensus standards will be adopted as the Departmental standard. Standards that are adopted fall, generally, into four categories: Move- to, Divest, Hold, or Contain. As part of the process, we have assigned ``stewardship'' of specific standards to individuals within my CIO shop or to other appropriate individuals in the Department. As the standards are developed, they reviewed by the Applied Technology Working Group, in accordance with the EA Governance Process as a part of the IT strategic management framework, and are adopted by the Enterprise Architecture Board (EAB). One particular area where the TRM from the EA Version 1 has been useful is in guiding investment in IT is in the area of ``technology patterns.'' Patterns are repeatable solutions to recurring technical challenges that are based on best practices, typically from industry. In Version 1 of the EA, we identified over a dozen patterns that have significant applicability within the Department. As a result, one of the major business/IT initiatives within the Department, the eMERGE2 program of the Resource Management Transformation Office (RMTO) has adopted the pattern approach and is in the process of acquiring technologies that implement several of the patterns identified. These patterns and technologies will form a technology foundation for other programs to leverage. Implementation of ``Quick Hits'' Definitions for the Quick Hits, foundational elements and activities that had to be in place to support achievement of an integrated enterprise architecture, have been completed and stewards have been recommended. The Quick Hits have begun to be integrated into existing projects. For example, RMTO will soon begin implementing some of the technology patterns included in the Technology Patterns Quick Hit. The Consolidated Enforcement Environment (CEE) project has formed a case management working group and is incorporating the Standardized Investigation Case Management Quick Hit into their plans and will be coordinating with the Department of Justice on a long term solution. The One Face at the Border initiative met the requirements for the Integration POE Workforce Quick Hit. The Office of Infrastructure Management, within the DHS CIOs office, is working toward Network Integration as part of their One DHS Infrastructure project. Challenges Achieving an Integrated Enterprise Architecture, Timelines and Implementation DHS is a new organization, formed a little over a year ago from 22 legacy agencies, each with their own culture, processes, and legacy IT systems. Many of these legacy agencies had begun development of their own Enterprise Architectures prior to the establishment of DHS. The challenge for DHS is to implement an integrated DHS Enterprise Architecture while ensuring that, during the process, the entire Department has the IT capabilities needed to accomplish the mission. One challenge to achieving an integrated HLS EA is having an EA that is sufficiently mature to support detailed alignment and analysis for IT investment management decision-making. As I've noted previously, DHS developed Version 1 of the DHS EA in 4 months ending in September 2003. We also used Version 1 to identify Quick Hits and we are currently developing the HLS EA version 2, to support IT investment management. Another potential challenge is overcoming resistance to change and obtaining management and organizational buy-in into the EA. The Department has placed a very high priority on the HLS EA. Deputy Secretary Loy has directed the major organizational components of DHS to participate in development of Version 2 of the DHS EA. As we speak, there are more than 5 different Business Focus Area Teams, composed of subject matter experts from across the Department, working in facilitated team sessions to make sure that the business model for EA Version 2 accurately and comprehensively captures the capabilities needed to accomplish the Department's mission. The extent of each organizational element's participation in these Business Area Focus Teams is reported to the DHS Management Council and monitored on a bi- weekly basis. The development of an EA is an enormously complex process. The goal was to produce a foundation for enabling DHS to make decisions about DHS investments immediately and to begin to direct its resources away from stove-piped, duplicative systems and move to interoperable, enterprise wide systems providing improved mission capability. Although Version 1 of the EA is relatively conceptual in nature, it does provide a foundation for implementation. As noted, DHS has been using the principles and transition strategy as a basis for beginning to redirect resources from current investments. As we speak, DHS is working on Version 2 of the EA. This version will include a transition plan that will be completed in June 2004. Version 2 will continue to build on the hard work of the first version by developing greater detail, reaching deeper to find more opportunities for consolidation, and establishing a consolidated framework for meeting mission need. One of the difficulties in expediting implementation of such a major change, such as EA, is the degree to which that change can be managed and accepted by an organization. However, DHS has already made significant progress in meeting the goals of the EA. We are well on our way to consolidating many of the management functions from each of the 22 agencies, including financial and human resources systems. 19 financial management service providers were reduced to 10 separate contracting offices were reduced to 8 22 human resource offices were reduced to 7 8 different payroll systems were reduced to 3 and DHS expects to reduce this to one by the end of the year. 22 property management systems have been consolidated to 3. These are just a few of the examples of progress. And it is clear we still have a long way to go. One of the first things we need to do is implement a full governance structure with enforcement authority to ensure that investments are aligned with the strategic goals. We have already made progress in this area. This week the DHS Enterprise Architecture Board (EAB)is open for business. The EAB is charged with the responsibility of reviewing all investments for their alignment to our EA. What this means is that all investments going through the FY06 budget process will have to demonstrate that it is achieving the goals of our transition strategy and that it is aligned to the technology standards identified in the EA. This will mean that the EAB will be responsible for reviewing nearly 300 investments this year. That is a daunting task for an organization. Another area we could focus on to expedite the implementation is to increase the number of working groups focusing on specific areas within DHS that support the DHS mission. Currently, DHS has the Resource Management Transformation Office (RMTO), which is consolidating an enterprise solution for DHS administrative functions, such as accounting, acquisition, budgeting, grants, and procurement. Department-wide Information Technology Investments Budget Request FY 2005 Information contributes to every aspect of homeland security and is a vital foundation for the homeland security effort. My office has responsibility for providing IT leadership that will foster best management practices in managing IT, enhance efficiencies through shared-services and coordination of acquisition strategies, ensuring systems are properly certified and accredited as secure, and being an advocate for business transformation, all necessary toward ensuring the homeland is made more secure. The leadership and funding provided through the Department's IT investments are crucial for maintaining an enterprise architecture that is fully integrated with other management processes, and for allowing DHS to participate in many E-Gov Initiatives. The President's budget request for FY 2005 includes a request for $226 million for Department-wide Information Technology Investments. Key strategic issues in FY 2005 will be to build and expand upon the foundational work completed in FY 2003 and FY 2004; to facilitate consolidation of management function capabilities; to lead the implementation of the Department's Enterprise Architecture; and, to continue to coordinate information integration efforts within DHS. Included in the request is $95 million for Information Technology Services, a portion of which will provide funding for the Department- wide Geographic Information System (E-GIS) capability; to improve the Department's Enterprise Portal; this funding provides for continuation of the DHS Enterprise Architecture and planning; evolving the Financial Management System, eMERGE2; and, development of the Human Resources information technology solution. Additionally the request includes $31 million for Security activities, which will provide funding for continuation of the Homeland Security Information Technology and Evaluation program; and for continued support of terrorist information integration and sharing. Finally, the FY 2005 request includes $100 million for Wireless Communications, which includes funding for enhancement of the Integrated Wireless Network (IWN) and Tech Ops Support. The Expanded IWN initiative expands to other DHS agencies the pre-existing Justice- Treasury IWN partnership established prior to the inception of the Department of Homeland Security (DHS), and which includes mobile radio (MR) and the application of emerging technologies as it pertains to domestic law enforcement and counter/anti-terrorist operations (including missions in the U.S. Territories), tactical communications, legacy systems support, and airborne and non-Coast Guard marine communications. It also continues the funding for the SAFECOM project. Information Security Since it's creation, the Department of Homeland Security has moved out aggressively to design and implement an Information Security Program that will not only ensure compliance with all appropriate statutes and regulations, but to also ensure that the entire Homeland Security community has a secure and trusted computing environment from which to operate. The heart of our reporting structure is built around the congressional requirements expressed in the Federal Information Security Management Act known as FISMA. In order to effect a comprehensive Information Security Program and in accordance with the provisions of FISMA, I have designated a Chief Information Security Officer (CISO) who manages and oversees all of the internal Homeland Security Department's Information Systems Security activities. Due to the comprehensive nature of the FISMA reporting requirements, and to avoid duplication of effort, DHS uses the FISMA reports to satisfy the annual requirement to verify to the Secretary the status of the Information Security Program. Additional mechanisms, such as program briefings, status information and incident reports ensure continuous visibility to the Secretary throughout the year. The FISMA report details compliance with Federal laws and policies and DHS information security policies and standards. DHS is in the process of implementing enterprise management tools to ensure the accuracy and completeness of FISMA reporting across the Department. FISMA requires each agency to perform for each program and system ``periodic testing and evaluation of the effectiveness of information security policies, procedures, and practices'' annually. NIST SP 800- 26, Self-Assessment Guide for Information Technology Systems, is the required self-assessment guide required by OMB policy. This, self- assessment guide utilizes an extensive questionnaire (containing specific control objectives and suggested techniques which the security of programs and systems can be measured. OMB's FISMA implementing guidance also requires agencies to maintain a Plan of Action and Milestones process that captures and tracks security weaknesses, and associated corrective milestones. I have selected a Commercial off the Shelf Product called ``Trusted Agent FISMA''. This is an automated enterprise based management tool that maintains FISMA reporting data from all our components and their POA&M's that will capture and track security weaknesses and associated corrective milestones; in addition it will collect, process and store self-assessment information in accordance with NIST SP 800-26. We have deployed this system throughout DHS and have generated our first quarterly report. We expect this to improve the timeliness and accuracy of our reporting as this information is available real-time to the Secretary and other cognizant officials. With this tool we will be able to focus our compliance and as well as leverage the effort of the DHS Inspector General to corroborate the accuracy of the FISMA information and improve the compliance stature of the department. I thank you again for the opportunity to testify before you today and I am pleased to answer any questions you may have. Mr. Thornberry. Thank you. I will yield my time to the chairman of the full committee, Chairman Cox. Mr. Cox. Thank you, Mr. Chairman. I take it that you mean you are simply postponing your own opportunity? Mr. Thornberry. There may be another chance. Mr. Cox. I hope you do not yield your time entirely. I want to join in welcoming our witnesses, and thank you very much for your leadership in the Department, for being up here today, and for keeping us apprised of what you are doing. As you know, we are keenly interested, in fact most members of the subcommittee have been keenly interested in cyber as a priority since we were developing the Homeland Security Act in Congress. And we want to make sure that it gets all the attention that it deserves, and I know that you are doing that. Let me begin by asking just what I hope is a trivial question. I am just trying to do the math in the testimony: That the $79 million dollar request for cyber; of that, 75 percent is going to the program, 59.3. Then there was another 8.7 that goes to outreach and public awareness, and 7 million that goes to vulnerability assessments and reduction. That leaves, by my math, 4 million unaccounted for, and I just wondered where it went. Mr. Liscouski. Sir, if you would permit me to get back in writing on that so I can do the math myself, I am sure we can provide to you the balance of where that $4 million is. Mr. Cox. It may be undistributed overhead. I don't know. Mr. Liscouski. I could look through this, but I would prefer to get back to you in writing, if I may, sir. Mr. Cox. Okay. Given the important role, as you outlined, Mr. Liscouski, in your testimony for the Computer Emergency Readiness Team, the CERT, the component of your efforts, how should we assess the other watch centers within DHS? There are several of them. If we are interested in consistency and overall cyber spec reporting, shouldn't we be concerned? Or should we welcome the fact that we have, for example, the IP National Communications System operating a 24/7 telecommunications watch center; we have also within IP Cybersecurity Division operating a 24 by 7 cyber watch center; we also have within IP the Infrastructure Coordination Division operating a 24/7 watch for physical and cyber reporting. We have within IA a 24/7 Homeland Security Op Center with a dedicated cyber watch desk. We have Mr. Cooper, in your shop, a Cybersecurity Incident Response Center. And, we have at Secret Service a 24/7 watch operation for electronic crimes. Mr. Liscouski. Sir, and thank you for the question. Let me get some clarity to the operations overall in terms of how the integration of the watch centers is being performed. The legacy organizations that came in to us from Secret Service, from NCS that--and the Fed CIRC, that represent some of the watch centers you just articulated. With respect to the Fed CIRC, the NCC, the ones we have created with the HSOC, I will just quickly try to outline what those capabilities and mission requirements are and tell you how they are integrating. The HSOC, the Homeland Security Operations Center is a 24 by 7 watch center that on behalf of DHS or at large it provides situational awareness across all of our enterprise, across the entire United States, integrates information to ensure that we understand from all hazards what is going on at any given point in time. Information piped into that HSOC is analyzed, understood in the context of is it threat information, is it incident data? And then we share with the respective elements of DHS to ensure that the appropriate actions are followed upon. In the context of other situational awareness types of watch centers, the ICD, the Infrastructure Coordination Division, is ultimately responsible for the coordination of activities as it relates to infrastructure protection and monitoring what is going on across all of our infrastructure components irrespective of incidents. The distinction there is ICD is going to be creating--I will add one more acronym to you-- the NICC, the National Infrastructure Coordination Center, which is going to be the amalgamation of all these watch centers. This is just an evolutionary process to the comment of not breaking it as we are building it. We do not want to denigrate the capability we have with existing watch centers as we are building the one amalgam capability that is going to respond to our situational requirements, very large infrastructure protection, which will mean the incorporation of the NCSD's watch center, the NCC, the National Communication Coordination Center, and other elements for infrastructure coordination, all under the ICD. The interconnectedness between the Homeland Security Operation Center and the NICC is paramount for us. We are looking to augment the capabilities of the HSOC. We have NCSD and as well as other infrastructure protection components on the HSOC which are responsible for doing incident management real-time. The reach-back capability to determine what the impact of an incident may be is going to be through the Infrastructure Coordination Division and, through that center, the NICC. And it is really reflective of the complex nature of all of our infrastructure components. Instead of creating one gigantic coordination center, we are really looking to leverage the capabilities that we have established through DHS to ensure that we have got the right expertise coming to the table at the right times to provide the answers as necessary. So it is not a redundant capability, sir, it is clearly an augmentation of the capability, depending on what function they are serving at a given point in time. Mr. Cox. But I heard in what you said that you also are anticipating further consolidation. Mr. Liscouski. That is correct, sir. We are consolidating the watch centers, the national, the NCS, the National Communications System. The NCD's watch center will be incorporated into the NICC. That is correct. Mr. Cox. How is my time, Mr. Chairman? Mr. Thornberry. The gentleman's time has expired. Mr. Cox. All right. I thank the CHAIRMAN. Mr. Thornberry. Although the Chair is trying to be lenient. The gentlelady from California. Ms. Lofgren. Thank you, Mr. Chairman. I have had a chance to--although I didn't have a chance to read your testimony, Mr. Cooper, I did have a chance to review your comments to the House Government Reform Committee in October of last year. And in that testimony, you had given your first draft of the Department Enterprise Architecture Plan, and you provided what I think you called a Quick Hit Project that you thought could be accomplished within 6 months. And some of those quick hits were integrating watch lists, network integration, developing external information sharing strategy, completing a feasibility study on integrating Immigration and Customs case management systems, and a number of others. Now, we don't have teams of people auditing your department, but I don't believe we yet have a unified watch list data base. And the Inspector General has told us that the lack of an agreed-upon IT infrastructure prevents the Office of Information Analysis Risk Assessment Division from communicating with State, local, and private sector partners, and that inhibits the exchange of information. And the IG also says that there is concern that the IAIP lacks connectivity to access sensitive data bases maintained in other Federal agencies, which hampered their efforts to conduct business. And, you know, you can't always believe what you read in the press, but Information Week has reported that your office has had problems handing over and receiving secured e-mail. Can you provide us with an update and where we are on all the quick hits that you were going to get done by now? Mr. Cooper. I can give you an initial update, and I would like to also provide information in writing on all of the quick hits represented in the first release of enterprise architecture. But let me address a couple that I think are very, very relevant to the points that you made. With regard to an integrated watch list and with regard to information sharing, the Secretary and the Deputy Secretary have already initiated an information sharing program that is now under way within the Department. The business owner is General Frank Liboutti, who is our Under Secretary for Information Analysis and Infrastructure Protection. Under his guidance, he has named a program director, and a team has been established that has already begun work in addressing how we will move forward to better improve our connectivity and our ability to put in place a two-way exchange of information with all of our stakeholders, both internal and external. Ms. Lofgren. Can I interrupt to try to understand? Mr. Cooper. Yes, ma'am. Ms. Lofgren. So this information sharing effort is only within the Department? Does it include the FBI and those agencies that are outside the Department? Mr. Cooper. Yes, ma'am. It will address the full national scope. Ms. Lofgren. It will but it does not currently? Mr. Cooper. It does not currently. We are in the early stages of formation, and the team exists and is now working through the various requirements for the different communities with which we must interact. Ms. Lofgren. When do you think that will be done? Mr. Cooper. Our expectation is to hit the deadline set for us by Under Secretary Liboutti, and that means that we will have a significant amount of this in place operational and done by the end of this calendar year. I also want to highlight that in the quick hits we have in place and operational what we are now calling our Homeland Security Information Network. We built off a program called JRIES, Joint Regional Information Exchange System, that is operational. It is in place. And we are rapidly expanding membership in that system and as part of our Homeland Security Information Network. In the next several months, we will expand from the current about 50 participating State, local, and Federal partners who are already connected to probably about five times that number in the next several months. And, again, I will be more than happy to provide detailed program plans related to information sharing and building upon what is already operational. Ms. Lofgren. I see that I am just about to run out of time. But I would like to get, I am sure every member of the committee would want, a report on each one of the quick hits and the current status. Before--I guess my time has completely expired, so I will yield back to the chairman. I expect we will have a second round. Mr. Thornberry. I thank the gentlelady. The gentleman from Nevada. Mr. Gibbons. Thank you very much, Mr. Chairman. Gentlemen, welcome to the committee. We are happy to have you. Your information has been extremely helpful to us. Cybersecurity is not new. It is something that not only your agency but other Federal agencies have been working on for decades in some cases. If you could help us better understand how agencies like the NSA, National Security Agency, NGA, National Geospatial Intelligence Agency, the CIA, the DOD, all of those other agencies' efforts have been or have not been, I don't know what the answer will be, integrated into your effort in cybersecurity. How do you leverage their experience, their efforts, their work product over these many years to help you? Mr. Liscouski. Thank you, sir. And there is a couple of different perspectives on the roles and responsibilities within those agencies and how they would integrate and how we partner up. DHS has got a protective mission and the protective mission we have in terms of looking at how we should best protect our critical infrastructure, the partnerships that we have got there clearly within the Intelligence Community and the NSA and the DOD specifically are we actively leveraging those. We have got a very strong partnership with NSA across a number of fronts. Up until just recently, until a recent transfer, the Deputy Director of the NCSD was in fact an NSA detailee, and it provided tremendous opportunity for us to leverage the experience that they have over the years of being able to gain an understanding of how to best protect those systems, and we are actively looking or looking forward to his replacement to come on board very shortly. Similarly, within DOD, who also has a protective mission for their dot-mil domain, we partner up with the Joint Task Force For Computer Network Operations. We have a very robust exchange of information between our US-CERT and their operations center. We have got very good personal relations as well as operational relationships with that agency. On the offensive side, clearly within the domain of that realm, I speak at a very high level here, we are able to partner up with CIA and other Intel Community efforts to understand how they best look at their offensive mission to understand how we best need to look at our defensive mission based upon what the capabilities are out there. On the intel side, in terms of the threat assessments, as you may know, through our Information Analysis Office we use them as the portal back into the Intelligence Community. We regularly drive requirements into the Intel Community to better understand how we can best protect our networks and our Nation's infrastructure from cyber threats. So it is really a multifaceted approach. I would say it is highly integrative from the standpoint of either through people, exchange of people, or through active exchange of information. Mr. Gibbons. Very quickly, who establishes the standards by which you integrate and take advantage of all of these multiple operations? Is there a common standard which is being established, and are you part of that? Do you control it, or is some other agency in control of the standard and definitions about how this cybersecurity program that you just described takes place? Mr. Liscouski. Well, we have got the benefit of the Homeland Security Presidential Directive 7, which was signed by President Bush on December 17th of 2003, which provides us the framework for integration of all of the--real large for infrastructure protection, not just for cyber, to ensure that we have appropriate roles and responsibilities laid out for that protection. We are actively engaged in framing out not just the strategy but the implementation of that strategy. It is a work in progress as we develop the plan we are implementing. But we are able to negotiate with respective sister agencies in the Federal Government as well as State and local and the private sector to understand how we have to, again from the total infrastructure protection picture, flesh out the responsibilities. Who is going to do what? What programs are necessary to be done? Where the gaps are? And, most importantly, from the perspective of outcomes, how do we measure the outcomes to ensure that we have effectiveness? That falls under the auspices of HSPD-7. I have direct responsibility for that. I have got a program office in my office to do this, and we are actively engaged in fleshing it out. Mr. Gibbons. One final quick question. What degree does the DHS enterprise architecture plan to marry up with the Federal enterprise architectural efforts as well? Mr. Liscouski. I will defer to Mr. Cooper for that. But I will just, as a segue into that, is we are wholly dependent on Mr. Cooper's efforts to provide us the backbone enterprise architecture for our operations. Mr. Cooper. It is aligned. Even before the Department was formed, we actually began working with the Federal enterprise architecture framework to both work with Dr. Haycock, who was guiding the charge under Norman Ranscript of the Office of Management Budget, and we have continued that relationship since. So it is very much alive. And in those business areas that are critical to Homeland Security, we become, if you will, the lead agency. So as the work we do to populate the business processes, the informational requirements and then supporting technology, that flows into the Federal enterprise architecture. Mr. Gibbons. Thank you, Mr. Chairman. My time has expired. Mr. Thornberry. I thank the gentleman. The gentlelady from the Virgin Islands. Mrs. Christensen. Thank you, Mr. Chairman, and I would like to welcome our two witnesses, also. Mr. Cooper, do you feel that your office has the sufficient authority to drive IT integration within the Department of Homeland Security, even though you don't have direct line authority over divisional chief information officers? And, if not, is there anything that we can do to strengthen that position, the position you hold within the Department of Homeland Security? Mr. Cooper. What I have done is to have created a Department of Homeland Security CIO Council, which is comprised of all of the named or titled CIOs who came into the Department with their respective agencies that now comprise the full Department. Additionally, I have asked the Chief Financial Officer and the Chief Procurement Officer to participate with us as full members of that council. Together, we have been participating in the investment review process of the Department. That is under the guidance of the Under Secretary for Management and Under Deputy Secretary Loy. I believe that in concert we have been appropriately bringing forward the proper recommendations, the proper decision-making framework so that we can make adjustments, if necessary, in some of the alignment that we inherited with regard to legacy applications and/or infrastructure investment. We will continue to learn, we will continue to grow, we will continue to refine these processes as rapidly as we can. Mrs. Christensen. And to what extent also does your office interact with other Federal agencies outside of DHS? Mr. Cooper. I personally participate in the Federal CIO Council. So there are regular meetings. I am also a member of the Executive Committee of the Federal CIO Council. We draw upon the Federal CIO Council for a lot of that interaction. Additionally, our Chief Technology Officer and our Deputy Chief Information Officer are also members of that committee. So the three of us participate very actively. Mrs. Christensen. Do you provide standards for the other agencies that are outside? Mr. Cooper. My office actually does not provide standards for other Federal agencies. But let me give you a real example of how it works. We, like other Federal Cabinet agencies, receive the direction and guidance that are set by Mr. Liscouski's area of responsibility, and we then apply, as all Federal CIOs would do, we apply that guidance and those standards, those accompanying standards within the Department of Homeland Security. Mrs. Christensen. Assistant Secretary Liscouski, last week we had a briefing from two of the private infrastructure organizations, the financial and telecommunications sectors. Could you tell us how your office interacts with the private sector? And early on, in the early days of the Department there seemed to be not an easy relationship, or there were problems that needed to be resolved. Could you talk about the relationship within your office and those private sector agencies? Mr. Liscouski. Yes, ma'am. We have a very aggressive outreach program with the private sector, and you are accurately portraying the relationships in the beginning. The legacy relationships that we inherited from the PDD-63 effort that ultimately authorized the establishment of the ISACs, the Information Sharing Analysis Centers, didn't allow for sufficient leadership and engagement at the private sector level to allow them to mature to a level of capability that would ensure that we had robust information sharing going both horizontally across information or industries as well as vertically back up to the government. The first couple of months we were engaged with the private sector, we actively looked at that model to see how we could best leverage it, and the first part of that was to determine the validity or the value of those information sharing analysis centers. And I can tell you from my private sector experience, I looked hard at the efficacy of that effort. To be candid with you, when I looked real hard at it. I saw there was a lot of opportunity there that we could leverage very well into a success story by enabling and empowering the private sector through the ISACs to develop their horizontal relationships, how they integrate and how they collaborate information. And that was the road that we embarked upon to ensure that we could establish that. We have got a very good story to tell. I hope you heard that last week between the FS ISAC specifically. Mrs. Christensen. What exactly is your current relationship with the ISAC Council? Mr. Liscouski. Well, we have got an excellent relationship with the ISAC Council. They have stepped up to the leadership plate and they have provided what has been necessary and has been previously missing with the private sector, and that is the private sector leadership going back down into the private sector. They are actively engaged with my office both through the Infrastructure Coordination Division, which is responsible for managing ISACs and funding ISACs, as well as directly through my office I actively engage with them minimally once a month on a council level and much more frequently on an individual level. So I think we have got a very robust and a very successful story to tell as it relates to our private sector partnership there. Mrs. Christensen. Thank you. I think my time is up. Mr. Thornberry. I thank the gentlelady. The gentlelady from Washington, the Vice Chair of the committee. Ms. Dunn. Thank you very much, Mr. Chairman, and welcome, gentlemen. It is very interesting as we begin to tie some of these responsibilities together to get a clear view from your point of view on how things are working. Secretary Liscouski, in your written testimony and in your testimony before our panel today, you identified a couple of major steps in your management methodology that were interesting to me. One was the identification of critical infrastructure. Another was the assessment of vulnerabilities. I am especially interested in knowing how you work together with local government bodies and State government bodies and the private sector, what kind of input they have into these assessments, and whether they have a direct pipeline to you to know what you decided on. Mr. Liscouski. Yes, ma'am. Thank you, and I appreciate the question. As I pointed out, our partnership with the private. sector--and coming from the private sector, my bias is that we have to work closely with the industry to determine what they believe their priorities are, and we have to normalize those priorities with what we believe are our national level priorities. We accept ready input from both the private sector, the associations and, importantly, the State and local and tribal governments to ensure that we have got their perspective on what has to be protected and how it can best be protected. We develop common vulnerabilities assessments, common best practice methodologies, which are vetted through our State and local and tribal contacts as well as the private sector to ensure that we have got, in terms of our achieving infrastructure protection at large, consistent, effective, sustainable, and measurable capabilities and results across all of our critical infrastructures. Now, as a general statement, I will tell you that we are succeeding in that very well. The methodology that we have outlined is that, at a national level, is scalable right down to an individual company level. It is the type of methodology which is being adapted to ensure that we help the industry at the single entity level as well as those that are highly interconnected to ensure that we can identify those vulnerabilities, the assets that need to be protected, the vulnerabilities, and the appropriate levels of programs. The reason integration is so important to us, not just within the Infrastructure Protection Office as it relates cyber and physical, but clearly as it relates to State and local involvement, is because these efforts cannot be done unilaterally. The private sector cannot afford to protect itself nor does it have the wherewithal to protect itself that the State and local governments do in their law enforcement and protective authorities. So all the programs that we have developed and designed have been in collaboration and coordination with all those stakeholders to ensure that we have both a rational approach and an effective approach, and one which is dynamic enough to be molded against the current threat at any given point in time. As you know, it is a very dynamic threat environment, so it is a work in progress. Clearly, the engagement we have with the private sector, we are constantly being fed with new technologies and new ideas on how to best implement programs that can be effective. At the end of the day, it is the private sector who is responsible for ensuring that they are doing what they need to be doing to protect that critical infrastructure. So we have a significant effort there. Ms. Dunn. The State and local governments are satisfied with the relationship they have with you? Mr. Liscouski. At a general level, I would say they are, but as everything, I think there are different opinions. We have clearly a lot of room for improvement across the board. We are not satisfied with where we are today. We are in the very early stages of building this program. It is a long- term approach, but I think we are satisfied with the approach we are taking. Over the recent holiday threat period, we were actively engaged, and I am sorry to see Mr. Gibbons go because I had the opportunity to be out with Mr. Gibbons in Las Vegas during that period of time in which we had very robust meetings with the private sector, State and local governments. To be candid with you, I wasn't quite sure what kind of reception we were going to get, but we worked through many very difficult issues and came up with some very successful solutions to a response of that holiday threat period; and I think it is representative of the types of efforts we have out there that do tell a good story. Ms. Dunn. That is good. I think it is very useful that both of you have been in and out of the private sector, so you understand the value of what they can contribute and the kinds of communications that they need in order to be part of this whole thing. I think it makes us all stronger. Let me ask you, Mr. Cooper, one question. The enterprise architecture team that you have started is going to come up with a plan to connect networks within the Department of Homeland Security. At the same time, you have new programs being started up, like U.S. VISIT. Do you believe that you are in contact with them to the extent that you know what sort of information-sharing requirements they have and is it working well together? Mr. Cooper. Yes, ma'am. I am actually a member of the executive advisory committee of U.S. VISIT in that specific example and also participate in the advisory committees of all of our major programs. We are deliberately looking for major programs to leverage whatever capability is being established. For example, within U.S. VISIT, as we roll out new biometric capability at the borders and ports of entry, that requires some new underlying infrastructure. We are actually leveraging that new investment as part of the U.S. VISIT program to ensure that infrastructure enhancements that we are making become the foundation of the direction that our infrastructure requires and--as represented in our enterprise infrastructure architecture. We are doing the same thing with Customs and Border Protection's ACE program. We are leveraging the legacy Immigration and Naturalization Service's Atlas program for which there is appropriated funding to better establish infrastructure, and we are working to coordinate all of those investments within our enterprise architecture activities. Ms. Dunn. Are you going to be able to get the FBI and CIA to come together so the U.S. VISIT can use their information in a way that is consistent? Mr. Cooper. I am confident we will do that. I am afraid where we might have a difference of opinion is the timing that it might take. Mr. Thornberry. So the question is, are any of us going to be alive when it happens? Gentleman from North Carolina. Mr. Etheridge. Thank you, Mr. Chairman, and let me thank you gentlemen for being here this morning. Mr. Cooper, I know--I think a question has been asked in one way on the testimony previously before the Government Reform Committee, and let me go back to that and ask my question a little different way, to some extent on the same subject as it relates to the 18 projects. Let me talk about two of them and one very specifically, I think, because right now, as you are trying to pull these together, and I guess I am very interested in particular--first, as you talk about the State and local industry needs survey, what do you hope to gain and what is its status is what I would like to know. And let me go to another one that is very specific that I know my office and, I assume, many offices have problems with. This is an ongoing problem of getting information out of the Citizens Immigration Services, or CIS, because for my constituents they are constantly blaming the computer system. We call them, and they keep saying it is the computer system's problem. Well, garbage in, garbage out. You know what I am talking about in computer language. And I am very interested in hearing about the feasibility study on integrating immigrations and Customs case management systems. Specifically, don't we need to fix the immigration computer problems first before we integrate those with Customs? Because if we don't get them fixed and integrate them, we are compounding the problem. I hope you will help me understand that so I can share that back with my staff who are quite upset about it. Mr. Cooper. I understand. Let me take them in reverse order of your question. Let me go ahead and address citizenship and immigration services. First, I do agree and the approach we are taking is exactly as you described. We have done a couple of things very actively. First we have--. Mr. Etheridge. Can you give me a time line as to when we will have it fixed? Mr. Cooper. I will give you our current working targets of timing. The first thing that I had done is I have worked directly with Director Aguirre and his staff. We have named a CIO in Citizenship and Immigration Services. That individual is already on board and working directly with his staff and directly with the program folks to first, as you properly point out, to fix the problems with both the process as well as the underlying information technology that supports those processes. They will address, first, developing and reengineering any of the processes that they find to be inefficient or lend themselves to optimization. Only until that work is done will we then move forward to integrate with other component parts of the organization. So we are following your advice. We are fixing the problems first, streamlining process, understanding requirements, understanding the information necessary to support those processes; then automating within CIS, then integrating. And there is opportunity to integrate in that case management arena. We have also ongoing an integrated consolidated case management effort that is at the very beginning so that the CIS folks, who are developing the work that I am just describing to you, are also part of a larger interdepartmental working group. And then, in turn, we also have reached out to other Federal agencies, like the Department of Justice or the Department of Energy, who have automated solutions in place to then evaluate, might there be an already existing solution that we could reuse that we could bring to bear? And the goal is to optimize, streamline and modernize, but don't necessarily build all this stuff from scratch because we are suddenly a new department. Does that give some guidance. Mr. Etheridge. The time line? Mr. Cooper. Here, again, we are moving forward. The time line to address the backlog is 6 months, the target that Director Aguirre has given us to direct the backlog and a lot of the cases kind of pending, from roughly this time period. Another way of thinking about that is that our goal is to address this and have real solutions on the ground and to have cleared that backlog as fast as we can. But Director Aguirre's direction to me and to my team is help us do this by the end of the fiscal year. Mr. Etheridge. October 1? Mr. Cooper. Six months, that is the target, this fiscal year. Very quickly, in the State and local information sharing, that type of thing, as part of the program that I mentioned to you that Under Secretary Libutti is guiding, as part of that, I actually have been working along with several of our other colleagues and leaders within the Department, particularly the office of State and local government. We actually have been reaching out through the National Association of State CIOs and through a number of larger city CIOs, my office and me personally. We have been exchanging information. We have been working to better understand the requirements for information sharing from State and local and tribal government and from members of the first responder community. We are doing that not only through my office, but when we have something like Project Safecom which is also reaching out on the interoperability issue. That is how we are gathering requirements. We are then taking those and applying them and sharing them within the Department and working together within the Department and State and local partners to put solutions on the ground. Mr. Etheridge. I know my time is up. Is that sharing a two- way sharing? Mr. Cooper. It is a two-way sharing. In fact, we require them to guide us. We can't see the requirements from the Federal environment. We are dependent upon them to provide local requirements. Mr. Etheridge. In a lot of cases, they are really our eyes and ears for those people who don't have the data. Mr. Thornberry. I thank the gentleman for his good questions. The gentleman from New Jersey. Mr. Andrews. Thank you, Mr. Chairman. I would like to thank our witnesses for their testimony this morning and for their service to our country. I know they do it at some considerable sacrifice. The first thing I thought about last August when I heard about the blackout that was rolling across the northeast United States was whether it was an accident or whether it had been deliberately caused. Let's assume--and happily all the evidence from that is that it was an accident. Let's assume that, this morning, a utility company in Wisconsin found evidence that someone was hacking into their system with an apparent attempt to bring down the system and bring down the grid. How would you find out about that? Mr. Liscouski. We learned a lot from the blackout, sir, and the processes we established with NCSD and through IP in general, particularly as it relates to situational awareness during that blackout period served us very well. For instance--. Mr. Andrews. Not to interrupt, but if that happened this morning, who would tell you? Mr. Liscouski. What we learned in the blackout period was the processes we put in place at that time were exactly the same processes we would learn from an event similar to the hypothetical you just provided. We work with FERC, NERC in particular, which is the North American Electrical Reliability Council, which establishes the ISAC management point for our relationships with all the private sectors that relate to the electric utility companies. They have a very robust capability and the communications across the grid to pick up on incidents. Most likely, that would be the first indication for us reporting back from the private sector back into the ISAC, directly back into DHS about any activity like that. Mr. Andrews. Would the utility company be required to tell you this, or just do it as a matter of good practice? Mr. Liscouski. There is a requirement--and I am getting a little bit out of my lane here as it relates to the regulatory requirements set forth by both the FERC and the NERC, FERC in particular; but I believe that there is a requirement to report those outages, but I can't specifically cite the authorization for that regulation. Mr. Andrews. I know this is probably an unknowable answer, but give me your best guess. How long would it take between the discovery of the intrusion by the utility company and report of the intrusion to responsible authorities within your division? Mr. Liscouski. There are a lot of dependencies on that chain--in the chain of that reporting. The first indication would be the robustness of that particular enterprise that might be under attack to detect an attack. In some cases, it might be a failure that might be the first indication of an attack. Where there is more robust capability, they are doing network monitoring and there are standards that have been supplied by NERC for implementation for cybersecurity, particularly resulting from the blackout example that would allow a utility company to be able to detect what is going on and therefore report it. It depends upon the magnitude of the type of attack, their capability to detect that. Mr. Andrews. I think I just heard you say that your ability to know would be very dependent upon the robustness of the detection system the utility company has in place. So if they had a weak system in terms of detection, you all might miss it all together? Mr. Liscouski. It really depends upon the type of attack. If it is a very specific attack against a specific company, a utility company or any other company that might be on the Internet, specifically targeting them, there are a couple of points we might be able to get information from, a, from the ISP which might be monitoring network activity that might see an increase of traffic to a specific IP address that might result in a denial of service for instance. The IP could report it to us, the target company could report it to us; it really depends upon the scenario. It is not easy to come up with a cut and dried answer to say, yes, it can happen, or no, it can't happen. Mr. Andrews. Let us assume that the information was accurately reported and let us further assume that there were tools at your disposal that would stop the spread of the problem, that you could wall off other parts of networks and other parts of systems to protect other parts of the power grid. And let us assume that your best experts in your department said that is what you ought to do. Do you have the authority to tell people to do that or not? Do you have the authority to tell the other people in the utility system that they have to follow those prescriptions or not? Mr. Liscouski. Taking the example, in partnership with the Department of Energy with whom we have--and the FERC with whom we have a strong relationship in the protection of critical infrastructure, by extension, I would say we have the authority to initiate that activity. The actual execution of that authority would be with those respective regulatory agencies that have that specific legislative authority. But in terms of taking an action and prescribing a specific action, going back to the earlier conversation I had about the HSPD7, we are exactly in the middle of framing out those roles and responsibilities and how we would broker those relationships. Mr. Andrews. What I think I just heard you say was that if you detected the attack and if you had a clear recommendation as to what to do about it from your experts that you would have to have some cooperation from the Department of Energy to execute the solution, right? Mr. Liscouski. I think it is more appropriate at the FERC level. Mr. Andrews. You would have to have some cooperation from FERC and there are other regulatory bodies that might have some flow in this, too. The Nuclear Regulatory Commission might have a hand in it? Mr. Liscouski. They might. Mr. Andrews. I raise these questions not just to paint an interesting hypothetical, but I think we have a lot of technological issues, and we have a lot of very smart technological people to address them; but I think fundamentally we have a management problem, an analytical problem. And the analytical problem is, who is in charge when we have a crisis? I don't pretend to have an answer, and I don't advocate the answer that government be in charge of private enterprises in these circumstances. I don't want to see that. But we need to think through, ``we,'' the committee, the administration, everyone, these protocols, because we don't have a lot of time to make these decisions. And even if we have honed the technology to the point where we know what is going on, and we have some good ideas what to do about it, we have created confusion or dysfunction--you haven't--as to who is in charge of what. Mr. Liscouski. I don't think that is the appropriate characterization. I think we have good leadership. I think DHS, the brilliant part about the creation of this department is it does pin leadership responsibilities on the Secretary in working through the relationships we have with sector-specific agencies. It may not appear to be a direct line of authority, but there is a clear line of communication that--we got activity going, and we have plenty of examples over the recent threat periods of how we have exercised that authority in cooperation. Mr. Andrews. Can the Secretary order utility companies to do what your folks would say they should do? Mr. Liscouski. I feel pretty confident we can exercise the necessary actions we would need to get to get the appropriate action at that level. We have a cyber IIMG, Interagency Incident Management Group, that was stood up subsequent to the live wire exercise that took place this past fall in which the lesson there was that we need a cyber response. We quickly created that capability. I am confident, sir, that we have the leadership that we need. Do we need to refine that and figure out how we do it better? Absolutely. Mr. Andrews. I realize my time is up. I am not in any way impugning the leadership capabilities of people in these jobs nor am I doubting our competence to do them. What I am wondering about is because of the relative infancy of this department whether a--knowing bureaucratic turf battles to be what they are, if we were find ourselves mired in a bureaucratic turf battle at a time that we had to make some very quick decisions, I think it behooves us to answer those questions in advance so people know clear lines of authority. Mr. Liscouski. We are actively engaged in looking at those lines of communication. I would be happy to come back and talk to you about that. I wouldn't want you to leave this committee room thinking that we haven't thought about that or we haven't taken activity on that. Mr. Andrews. I certainly don't think. I think we collectively need to think more about it and establish clear lines of authority. Mr. Thornberry. Gentleman from Rhode Island. Mr. Langevin. Thank you, Mr. Chairman. And, gentlemen, thank you for being here. I would like to touch on a couple of areas that have already been touched on this morning, first, dealing with JRIES and the second dealing with outreach to private industry. First of all, can you tell us about the relationship between JRIES and RISSNet? Those people who may not be familiar with it, that is the Regional Information Sharing Network used by law enforcement. It is a highly effective tool for intelligence sharing and obviously it is a proven entity. It was my understanding that JRIES was supposed to partner with RISSNet, but evidently that has not happened. And, in fact, from what I understand, RISSNet has been sidelined by DHS. So I would like to ask why it seems that you are pushing aside a proven system for a brand new one. Second question for Secretary Liscouski: Last week I had a meeting with the IAIP directorate's enterprise architect Jonathan Houk and a company from my district, Ibis Consulting, to discuss how DHS is tapping the vast amount of expertise residing in the private sector. And I was pleased to hear that he is trying to leverage industry resources as much as possible in setting up IAIP's enterprise architecture, which is still obviously in the planning stages. But aside from Mr. Houk's efforts, I would like to hear more on how effective DHS has been in forging industry partnerships. And I would like to hear more from you and Mr. Cooper about DHS's policies and guidance concerning industry outreach, if you would take the RISSNet question first. Mr. Cooper. Let me address that for you, sir. You are correct in that there was a period of time where the communication between the two programs was not occurring and was not anywhere near as effective as I think both groups and DHS want it to be. Much more recently, myself included, we have gotten that back on track and the RISS.Net team has met with the JRIES team and the program director to reengage and to actively build upon the work that RISS.Net has already done and to rapidly map into our homeland security information network, which is now what JRIES is evolving into as far as a label. It is a broader scoping. And that change in title properly reflects the broader scoping on behalf of DHS. So I do acknowledge that there was a temporary delay. We didn't have the effective communication. We believe very strongly that now has been corrected and I know that as of last week, there had been more recent meetings between the RISS.Net team and the JRIES team to move this forward. Mr. Langevin. I am encouraged to hear that. Mr. Liscouski. Sir, with respect to the private sector outreach program, we have it in many dimensions. Let me address the cyber one since that is the focus of this panel or meeting this morning. Mr. Yannis has taken a very aggressive approach in establishing private sector partnerships. The first event that he participated in was the cyber summit back in December in which we were actually able to announce and get him engaged in the private sector outreach program. But subsequent to that, there have been a number of initiatives that he is engaged in. There is a US-CERT, private sector partnership program. They are on daily watch calls with the private sector either directly with private sector entities or through the ISACs. The task forces that have result from the cyber summit are also reporting back and are actively engaged with the NCSD in providing information and recommendations about how they can influence best practices throughout the industry. Across infrastructure protection, we have traditionally have had--traditionally, in a year, if you can establish a tradition in the year, we have had active engagement with the NSTAC, the National Security Telecommunications Advisory Council, which is a presidential council established through the NCS; the NIAC, National Infrastructure Advisory Council, which was established through the legacy organization of the CAIO. Those are things we are actively engaged with. The Homeland Security Advisory Council, which was established by the Secretary, has its own subcouncil, the Private Sector Advisory Council, with whom we are actively engaged. They represent, really, leadership of industries at the top level, at the CEO level, with whom we both exchange ideas and get influence from, again, the ISACs themselves across all the infrastructure components. The private sector component is one in which I personally take an active leadership role, ensuring that we have got the right things going on there. We look for every form possible to ensure we get both feedback as well as getting our message out there. And importantly, when we get the feedback, it is, what do they believe they need to be doing to better protect our critical infrastructure; and we take that feedback into our thinking about how do we develop programs, realistic, going back to the consistent, effective, sustainable and measurable types of approaches we try to take. I could, frankly, better take the remaining time here to talk about the different types of relationships and I would like to address something specific if you have it. Mr. Langevin. Can you talk about your interaction with small business? Very often they are the innovators and entrepreneurs that are out there at your basic level that have a product they believe can fill a niche. This is what happened with Ibis Consulting, and I put them in touch with the right people. But how easy is it for small business to reach someone at DHS and get some type of an answer or an action? Mr. Liscouski. There are two parts to that question. From a protection standpoint, we actively reach out to small businesses through our partnerships with our private sector outreach office, Mr. Al Martinez-Fonts, who you may know is a Special Assistant to the Secretary. His office is responsible for ensuring that we don't let any business fall through the cracks if they are not represented by a specific infrastructure sector themselves, so leveraging partnerships with U.S. Chamber of Commerce, for instance, or other industry groups to reach out to those small businesses to get the word about how to best protect themselves. I was a small business owner and I am a staunch believer in what they add to the economy. That is the growth engine for the economy. We are very interested in protecting them. In terms of outreach and ways they can actually do business with us, I will defer to Steve, but the reality is we have a number of mechanisms by which companies can reach DHS. Mr. Cooper. We have specific focus on small--and medium- sized businesses. My office works very closely with Kevin Boshears, who is the Director of our Office of Disadvantaged and Small Business Utilization; and we have actually, with his guidance, established some programs to flow and to make introduction connections with small businesses, in particular with my office. I have named a Special Assistant For Industry Liaison, Tom Bold, and Tom has developed a program that then, in addition to Kevin's guidance to us, we have established a Web site that allows small businesses, medium-sized businesses--any business, but we are trying to focus on small and medium-sized businesses--to make their products and, services with specific areas they believe that they can help us address some of the business problems and challenges that we face, known to us. We have--I personally, along with my team, have met with more than 3,000 businesses in the past year. We are trying to meet as many and talk with as many people as we can. We feel very, very strongly, and I have publicly spoken about the fact that we inside the Department don't have all of the technology- enabled answers. We are dependent upon a very cooperative, collaborative partnership with industry, particularly small-- and medium-sized businesses where a lot of the innovation does occur. Mr. Langevin. I am encouraged by your answer. Mr. Thornberry. I thank the gentleman. Mr. Liscouski, let me try to see if I can ask a series of questions related to the national strategy to secure cyberspace, which the administration issued just before the Department really was up and running. But it still seems to me that to offer a good blueprint on the issues we need to be concerned about with regard to cybersecurity; and what I would like to do is go through some of the things they said we need to work on and have you just at least give us the name of a program or an effort. We can't get into the details of this stuff, or we will never get anywhere, but I am trying to get a feel, over the last year, how much progress have we made. The first priority, as you know, is the National Cyberspace Security Response System. That is the first priority in the national strategy. And then they talk about public-private architecture for responding to national level cyber incidents. The first specific under that is analysis, tactical, strategic, and vulnerabilities. Are we doing those things? Are we analyzing those cyber attacks? Mr. Liscouski. We are, sir. Mr. Thornberry. Do you do that or does IA do that; or does the Cyber Division, which is under you, do that? It says ``analysis,'' so how does that work? Mr. Liscouski. Let me take the first part of what we are doing, and I will tell you how we are doing it. There are a number of efforts that we have got under the priority one; the first--and no order of ranking here, just to give you the amalgamation. There is the critical infrastructure--I am sorry, Computer Incident Interagency Management Group that I referred to earlier, first part of our response system. There are the alerts that we put out through the cyber alert system, as well as the efforts we are taking to build our national watch capability. We have got a--one effort dedicated to network flow analysis and situational awareness, and we have got our C1 project, which is our secure and survivable communications. But who does the analysis that is aggregated among these types of efforts is a combination of--we work closely with our information analysis colleagues. The unique thing is, you know, about IAIP as we are joined at the hip. We both are resources for each other. In the context of threats, IA has the responsibility of providing us with threat information and that can then be mapped over to vulnerabilities. The technical expertise to understand how those threats can manifest themselves and those vulnerabilities, particularly in the cyber world, is found in the NCSD. So analysis occurs across the soft center of IAIP if we look at where really the heart of what the IAIP organization is providing in terms of value to DHS. I don't mean to be overly complicated about this, but there is analysis on both sides of that equation. So as it relates to priority 1, we have a very distinct role from the NCSD's perspective providing that response capability as well as an analytic capability. Mr. Thornberry. Number two under that same priority is warning, and you just referred to some organization, but that is kind of an operational role; it seems to me that is a little different from infrastructure protection. I presume that is the same thing. Cyber Division is doing all of that analysis and the operational things and yet they are under infrastructure protection. I think that is kind of a unique situation for cyber, but also raises some questions. Mr. Liscouski. It is not unique for cyber. We are doing a similar way for telecommunications under the NCS. Similarly, within our protective security division, we are doing an analysis on threat information as it relates to mapping that threat information into vulnerabilities. As I point out, this is a very--you can't cut that Gordian knot. It is robustness of analysis going on both sides of the equation. The one way that he might look at it is, threat information is sort of incident specific. Vulnerability analysis in terms of how vulnerabilities may be exploited might be end results specific. For instance, oftentimes we look at if we want to create--if a terrorist group is interested in creating a mass casualty type of event, they have a number of different ways they can use that: biological event, chemical event, bombing, using aircraft as missiles. We all know the results and we look at different ways we can affect that type of outcome. The analysis that has to go on to exploit vulnerabilities in those particular modalities of attack are things that our organization is responsible for doing. The intent and who has got the capability of doing those things clearly resides on the side of the information and analysis. Mr. Thornberry. Under, still, priority one, one of the things we need, the strategy says, is recovery mechanisms and continuity plans in Federal cyber systems. Are those under way? Mr. Liscouski. Yes, sir, they are. The partnerships we have in cross-infrastructure components, but cyber in particular, is intended to be able to recover from an attack as quickly as we possibly can, reconstitute ourselves. That is an integral part of our protection program. One of the things a good recovery capability does is it devalues the target. One of the protection priorities we have is not just hardened targets, but to quickly recover from an attack should an attack occur. That effectively devalues the target if we can recover quickly. Mr. Thornberry. I am not going to go through all of these items. I will skip ahead for a second to priority two, which is threat and vulnerability reduction. Among some of the specific items listed there are securing the mechanisms of the Internet including key Internet protocols, Internet routing, and management of the Internet. How are we working with the private sector to do those things that were specifically set out in the strategy? Mr. Liscouski. We have a number of initiatives currently under way in which we are looking at both the vulnerability of the Internet as well as ways that we need to enhance the security of the Internet. One of those efforts, the GEWIS program, which was the Global Early Warning Information System, started out as an effort that the NCSD has enhanced significantly and gained ownership of, is looking broadly across the Internet at the network analysis activity that needs to be examined to ensure that we can see attacks coming over the horizon and take protective actions as necessary. Mr. Thornberry. I think what we might like to do is submit some of these other types of questions for the record, going through the various elements of the strategy, again not looking for detail, because that is way too much, but I do think it is important for us and for all of those interested in this topic to have some idea that at least there are initiatives under way for the various areas, and some of them are not even in your bailiwick. But the initiatives that are under way, we need to know that they are under way. I yield to the gentlelady. Ms. Lofgren. I realize we are out of time and we have a series of votes. I have a lot of questions which I will submit and look forward to the written response. But I did want to make sure that I understood Mr. Cooper's answer to Mr. Etheridge, because I wrote it down and want to make sure I was not mistaken. Did you say that by the end of this fiscal year we will meet the President's 6-month goal on processing immigration? Mr. Cooper. I am indeed saying that we are going to do everything that we possibly can to meet that goal. That is our direction, that is where I am placing additional information technology resources to help do that. Ms. Lofgren. Thank you very much. Mr. Thornberry. The chairman may have additional questions, particularly for Mr. Liscouski, who has another hearing. Maybe Mr. Cooper might be more flexible if we need to come back. Mr. Cox. We don't need to come back. I intend to go to the floor for the vote, but I would take a few minutes before we leave. Mr. Thornberry. We have the gentleman from Florida here. Mr. Meek. I will yield to the chairman and I will submit my questions for the record. Mr. Cox. I appreciate your courtesy. On the subject of our overall strategic objectives, I am impressed and pleased that the number one strategic objective is preventing cyber attacks against America's critical infrastructures. When I look at the priorities as they are laid out, I find that the first priority is the response system. The second priority is threat and vulnerability reduction, which has as its analog the second of the two, the second of the three overall objectives for DHS itself. Likewise, priority 3 is awareness and training. That gets to protection. Priority 4 is securing government cyberspace. That, of course, is defensive. And within priority 5, as it is outlined, even though it is described as international cooperation, there is a bit about intelligence sharing and so on. But, you know, the main purpose of the Department of Homeland Security is to deal with the problem of T and T, terrorists and technology, the weapons of mass destruction plus terrorists, the possibility that mayone day be upon us. That is the worst thing that could happen to the country and, therefore, the first thing that the Department of Homeland Security needs to concern itself with. Such things as pulse weapons directed at our country, therefore, mark what ought to be the top priority in prevention there is clearly superior to dealing with it after it happens, just as with any other weapon of mass destruction. So I wonder if I could inquire first whether you have it in mind to place increasing emphasis on the prevention piece, because while it is occasionally mentioned, I see that we are focused, for understandable reasons, elsewhere because it is more tractable; and specifically whether it is possible to initiate more meaningful collaboration between the National Cyber Division and the Department of Defense. Mr. Liscouski. Yes, sir. From our perspective, these programs all roll up into a good preventive and protection approach. You can take apart elements and see that they contribute to protection. But every single one of these, from a response and recovery capability awareness, threat and vulnerability reduction, all really do constitute good protection programs. So I would, if I understand your question correctly, validate this approach in terms of what it accumulates--. Mr. Cox. What I am trying to do is distinguish protection from prevention. We have prevention, protection response. I see a lot of protection, a lot of response, and I need to understand more about what we are thinking about doing in the prevention area. Mr. Liscouski. In the context of prevention and again, I don't want to be definitionally based here, but as it relates prevention, typically the law enforcement component of interdicting, detecting and interdicting what is going on. Detection as it relates to prevention is clearly within the domain of what we do. The actual activity related to interdicting or reducing an adversary's ability to attack us is not something that my organization is charged with. Mr. Cox. On the other side of IAIP, in the other half of Frank Libutti's brain, we have the essence of the prevention piece of DHS, and it would seem to me that that would apply just as thoroughly to cyberspace as anything else. Mr. Liscouski. The full circle here--and again, this is trying to cut the Gordian knot, but we look at prevention in the context that you just provided it to occur at the target level. And the things that we can control in the world, that we do to protect--if I could take some time here for a moment-- there are protective activities we engage in which increase awareness of group capabilities and tactics that could be affected against a specific target. We go out and train the private sector on what to look for, the observables of preincident indication of activity of a terrorist attack. Those observables, while they may be disparate pieces of information not directly related to an imminent attack, but potentially future planning of an attack, are things we can pipe back into our IA folks to assist in the prevention role. That is the value add that we have in the ability of providing information from the private sector that we directly gain on preincident information that we collect, that we share with our information analysis component that gets put back into the intelligence community to affect good prevention methodologies and good prevention activities. It is finding out--and the unique thing about this and the unique thing about what DHS does, particularly as it relates to IP, is that we deal in the target community; and as a result and as opposed to looking at just the criminal activity or the terrorist activity that goes into targeting the private sector, we are dealing with the targets that are the focus of those terrorist groups. So if we know what to look for and we can train people in what the observables are, that observable information can significantly enhance prevention activities as it relates to law enforcement and the intelligence function. As I pointed out earlier, it is a pretty complex process, but I think it is an extremely articulable one as it relates to what our role is and how we play together in this space. It happens in the cyber world routinely; as we found out, probing or potential exploit probes, things that can be detected in the cyber world contribute to that sort of knowledge as well. Terrorist groups, we know, use cyber activity to probe physical targets to see what the penetration capabilities are. That information gets collected similarly as observable--physical things that are observable get reported back to us. I don't know if that responds to your question or not. Mr. Cox. It amply responds given the time that we have. I appreciate very much your willingness to speak to the point. I thank the chairman. Please keep in mind my suggestion about deeper cooperation with DOD. I think that that could be helpful. Mr. Liscouski. I could respond to that, too. We actively engage with DOD and we are looking at all levels between NORTHCOM as well as the Assistant Secretary of Defense Paul McHale. We have a good partnership there. Mr. Thornberry. I thank the chairman. I would like to ask both witnesses if we can have an agreement that because our time has been cut short, that you all will make an effort to respond to our written questions, try to within 2 weeks and less than 30 days, and I will commit to you to make sure that the questions are reasonable in length and scope. If we could have that agreement with both of you, I would appreciate it. I am going to ask one other question at the risk of missing this first vote. You are free to go Mr. Liscouski, but I don't know if anybody is going to be over there anyway because we are all voting. But, Mr. Cooper, I want to direct this to you because one of the primary reasons that the Department of Homeland Security was created was to integrate 22 different agencies into one seamless unit. Now, the total measurement of seamlessness is not having one IT architecture and system with which the Department can operate, but it is a pretty good one. And yet, when I look at some of the specifics that you have provided on the progress you have made, you have still got ten different financial management systems, you have still got eight different contracting offices, seven different human resources. I guess it is an area where I am frustrated, frankly, and I want to ask, is the primary difficulty you face figuring out what you want to do? Is it resolving the technical difficulties of merging these 22 different agencies? Or is it something else? Is it money? Is it getting the decisions made to force people to go use somebody else's computer system even though that is not what they have been using? If you had to summarize the difficulty you face in making this one seamless IT department, what is it? Mr. Cooper. I would summarize it in this way: It is a combination of people, process and technology. The technology is in fact, honestly, from my professional and kind of sitting in the role that I currently sit in, is the least controversial and the easiest to effect. However, having said that, it is--in and of itself, the technology challenges are complex. We know how to do them, so that is the easiest. The second is process. What we don't want to do, if you pardon the expression, is pave the cowpath. We want to reengineer some of the processes that we now use or will use to effect threat identification and management or some of the cybersecurity activity that Bob has talked about or some of the back office processes that I spoke to briefly. That is hard work. We do have--we are making progress. I mentioned the five business area focus groups. This is under way. We were a little bit slow to get going because we had to do some education. We had to help people understand why this is an important and valuable exercise. We have had the support of the Secretary. We have had the support of the Deputy Secretary and now we are engaging. All areas of the Department are engaging. So that, I feel comfortable that we are under way. Again, we will move as fast as we can move with quality and with speed. It may take us longer than all of us would hope that we could complete. The last and the toughest is people. This is about change. And that means that in some cases, the right decision or what might come out of these business area focus groups might be suggestions or reengineering that says a process used to be done in many organizational elements and now it might be more appropriate to place it in one organizational element, name that organizational element, the managing partner or the business process owner to have reach and span of control across that process across the entire Department. That is change, it is difficult, and it is about thinking differently and about doing work differently. I don't have exact answers. It is not quite a science yet. There is a little bit of art involved. Mr. Thornberry. I appreciate your analogy of changing the tires as the car is moving, because while you are doing this stuff, you still have got to guard the borders and still have to process the people coming in. And I don't want to minimize that effort. I will say this. I think a number of us will be looking for ways to help you, maybe even push you a little bit to make sure that this does move as fast as possible. And understanding culture and people and reluctance to change, we cannot let that obstruct the ability to have a department that is functioning as well as it possibly can, because so much is riding on the success of this department. So I don't want to make your job more difficult, but on the other hand, separation of powers is here for a reason and maybe we can help give you some extra incentive or whatever to get the job done. But I appreciate it. I appreciate both of you being here and your answers today, and I appreciate your willingness to answer our written questions promptly. And, with that, the hearing is adjourned. [Whereupon, at 11:50 a.m., the subcommittee was adjourned.] A P P E N D I X ---------- Questions Submitted for the Record Questions for Assistant Secretary Robert Liscouski, From Congressman Dave Camp 1. Your office has the responsibility to communicate cyber threat information to the private sector. I am interested in understanding the different means you use to accomplish this task. What challenges do you face in communicating with large companies (the Financial Services Sector, for example) versus small business owners and private users? What are the different means you utilize to reach these different groups, especially given their varying levels of understanding of cyber threats? The primary ways that DHS communicates cyber threat information to the private sector are: (1) through the U.S. Computer Emergency Readiness Team (US-CERT) public website at www.us-cert.gov, (2) through the US-CERT's National Cyber Alert System (NCAS), (3) through the US- CERT Portal, and (4) through the Information Sharing and Analysis Centers (ISACs) in each of the critical infrastructure sectors. The US-CERT public website is our primary means to provide information to the public at large. It includes relevant and current information on cyber security issues, current cyber activity, and vulnerability resources. To date, the website has received over 3.8 million hits at an average of 128,000 per day. It also provides a link to the National Cyber Alert System (NCAS). NCAS is an operational system developed to deliver targeted, timely, and actionable information to Americans to allow them to secure their computer systems. Information provided by the NCAS is designed to be understandable to all computer users, technical and non-technical, and reflects the broad usage of the Internet in today's society. The NCAS provides a communication mechanism through website access and e- mail alerts for providing general guidance for users and the ability to reach millions of Americans at once with a variety of cyber security information materials on both a technical and non-technical level. There are currently over 270,000 unique subscribers to the various alerts provided by the NCAS, and our challenge is to increase its outreach to as many Americans as possible. We are working closely with the National Cyber Security Alliance on expanding the Stay Safe Online campaign, coordinating closely with the Federal Trade Commission on their information security campaign, and working with other trade groups and industry associations with key cyber security awareness and outreach programs. In addition to the public website, US-CERT maintains an active secure online portal that enables the cyber security stakeholder communities including government and the private sector to communicate and collaborate on cyber security efforts. Groups that utilize the US- CERT portal include the Chief Information Security Forum (CISO Forum), the National Cyber Response Coordination Group (NCRCG), DHS's Office of Infrastructure Protection, the Government Forum for Incident Response Security Teams (GFIRST), the Multi-State Information Sharing and Analysis Center (MS-ISAC), and the US-CERT staff. One challenge to reaching the private sector communities has been creating a trusted protocol for sharing information. That challenge is being addressed in through the NCSD/US-CERT Outreach and Awareness efforts. In the case of vendor-specific vulnerability or threat information, we communicate directly with appropriate and expert representatives in the individual company when that is possible. The recent Cisco vulnerability is a key example of how we communicated--and collaborated--with the private sector on a very specific vulnerability. The ability to communicate with specific companies in such cases is crucial. The appropriate contacts are being developed through the NCSD/ US-CERT Outreach efforts and through participants in the US-CERT Portal. Outreach targets include the spectrum of the critical infrastructure sectors (through the ISACs, industry associations, etc.), software developers and researchers, academia, government, the information technology (IT) vendor and operator community, and others. DHS works with various vendors to understand, assess, and inventory vulnerabilities so that when threat information is transmitted, it includes specific instructions on how to mitigate or eliminate the vulnerability, and what resources exist to obtain help. The ISACs were established as a primary mechanism for two way information sharing with the critical infrastructure sectors. Many critical infrastructure sectors have developed procedures to widely disseminate their alerts, warnings and advisories, to both large and small companies, throughout their sector. These sectors involve trade associations, representing smaller companies, who receive information from the ISAC and who then re-transmit that information to their members. 2. How do you utilize Information Sharing and Analysis Centers (ISACs) to share and receive threat information? How do you recommend strengthening or improving the relationship between ISACs and DHS for this purpose? DHS/IAIP's Infrastructure Coordination Division within the Office of Infrastructure Protection maintains an on-going relationship with the ISACs and is the focal point for all ISAC relationships for critical infrastructure issues. Threat information gained from the Intelligence Community through DHS's Office of Information Analysis alerts, warnings, and advisories applicable to the critical infrastructures and key resource industries are delivered directly to them through standard agreed upon procedures. DHS/IAIP also provides to them regularly scheduled daily situational briefings, and periodic classified briefings as needed as well as special briefings when there is a major change in the threat level. IAIP also meets periodically with the ISAC Council a cross-sector body representing a large number of the ISACs, to improve information sharing practices and strategies. Such meetings help to sustain the relationship with the ISACs by proactively identifying gaps that need to be mutually addressed. DHS is constantly strengthening its relationship with the ISACs. One of its most critical programs is the implementation of a National Infrastructure Coordination Center (NICC) to serve as an operational nexus for all of the ISACs. The NICC allows representatives from the ISACs, industry groups, and key companies within each sector to share and receive situational awareness information. These sector experts work both within their areas of expertise and across sectors to maintain constant situational awareness of the status of the critical infrastructure. The NICC provides a centralized mechanism for sharing information with the ISACs and the private sector in response to an event or crisis. The ISACs will also be expanded to ensure that one exists for each critical infrastructure sector and key segments within each sector. DHS continues to work with industry to evaluate ways to reach the full breadth of each critical infrastructure sector, either through improvements in the ISAC mechanism or additionally through sector coordinating groups. In addition to these regular, ongoing efforts, the Homeland Security Information Network, once functional, will facilitate real- time communication between DHS and the private sector through the ISACs or other sector groups as they form. DHS is also working with the ISACs on a number of exercises, on a national, regional, and sector basis that will help determine where communication and collaboration improvements can be made. Questions From Congressman Sherwood Boehlert 1. Mr. Liscouski, in a September 2003 letter to Governor George Pataki, you requested New York's initiative and leadership in the Multi-State Information Sharing and Analysis Center (MS-ISAC) and promised that DHS would assume a more 'formal' role in the MS-ISAC, once established. New York State and Mr. William Pelgrin, Director of Cyber Security and Critical Infrastructure Coordination for the state, have been proactive and effective in coordinating and leading the Multi-State Information Sharing and Analysis Center. Mr. Pelgrin's efforts have resulted in the MS-ISAC involving 49 states and the District of Columbia and a business plan, submitted to DHS, which highlights roles, responsibilities, budgets, and additional steps needed for the MS-ISAC. Now that it has been established, what funding and support do you plan to provide the MS-ISAC as you work to formalize the relationship between DHS and this critical initiative that you requested? DHS recognizes and appreciates Mr. Pelgrin's efforts to develop and expand the Multi-State ISAC. As part of this effort, we had requested that he engage other like entities within the states, which had information sharing initiatives on-going, such as NASCIO, and integrate their efforts. That work is in progress. We are currently reviewing Mr. Pelgrin's business plan that was developed prior to the implementation of new capabilities within DHS, such as the National Cyber Security Division, the US-CERT, and the announcement of the Homeland Security Information Network (HSIN) by Secretary Ridge in March 2004. All of these new capabilities are intended to assist and enhance the core capabilities of the ISACs and bring them up to a common level of effectiveness. The Multi-State ISAC will receive the benefits of all these new capabilities including the ability to share information and collaborate on cyber security issues on a 24x7 basis and to further integrate information sharing within and across State and local governments through the HSIN/US-CERT portal. The Multi-State ISAC and Will Pelgrin have been extremely supportive of the US-CERT and our initiatives to increase national cyber security situational awareness. The NCSD has participated on a number of Multi-State ISAC monthly conference calls throughout 2004 and plans to continue to support the mission of the Multi-State ISAC to provide valuable cyber security vulnerability and incident information to the State level. Moving forward, NCSD plans to work along with the Multi-State ISAC to mutually improve cyber security on both the state and federal level. As such, DHS has entered into a contract with the MS-ISAC to provide $400,000 in FY04 funds, which the MS-ISAC is currently using for various outreach efforts such as conference, the webcast series, and other activities. DHS is exploring an increase in the funding for the MS-ISAC in FY05. From Congressman Mac Thornberry and Congresswoman Zoe Lofgren 1. Coordination for Threat Assessments a. How is the National Cyber Security Division (NCSD) working with the Information Analysis Directorate (IA), which has responsibility for information analysis of the threat? The Office of Information Analysis (IA) is DHS' portal to the Intelligence Community and is responsible within DHS for all aspects of the intelligence cycle for cybersecurity, such as issuing additional collection or analysis requirements to the rest of the Intelligence Community. NCSD works with IA on the substance of the collection and analysis requirements. Operationally, the NCSD works with IA through daily threat assessment meetings and on an as-needed basis in the case of a specific threat. One example of this coordination was the participation of NCSD in partnership with IA to develop the National Intelligence Estimate (NIE) ``Cyber Threat Against the Information Infrastructure.'' This classified document is an update of the 2000 NIE of the same title. In addition to the regular meetings NCSD participates in daily conference calls with the National Security Agency/NSIRC, the Central Intelligence Agency, and the Department of Defense's Joint Task Force Global Network Operations (JTF-GNO) to discuss classified cyber activity of note. b. How does the NCSD interact with the Terrorism Threat Integration Center (TTIC) for classified assessments? How are these assessments used and what NCSD products have resulted from TTIC derived information? NCSD interacts with the Terrorism Threat Integration Center (TTIC) indirectly through the DHS Homeland Security Operations Center (HSOC). NCSD shares the staffing of a 24x7 Infrastructure Protection desk at the HSOC that has direct reach back to the US-CERT, and the HSOC and TTIC work closely together on information for both physical and cyber threats. Additionally, NCSD interaction with the TTIC is accomplished through DHS/IA, law enforcement and intelligence community detailees on staff in IAIP and is developing a comprehensive threat, risk, attribution assessment, and response capability. With regard to classified assessments, NCSD participated in National Intelligence Estimate's cyber threat assessment in conjunction with IA and other members of the law enforcement community. To date there are no specific NCSD products that have been produced from TTIC-derived information. c. Who within DHS has the authority and mission to correlate cyber threat and vulnerability for an overall assessment? When, how, and with whom will this information be shared? As a focal point for cyber security issues related to reducing the vulnerability of critical infrastructure or key resources in order to deter, mitigate, or neutralize terrorist attacks, DHS' National Cyber Security Division (NCSD) has the authority and mission to correlate cyber threat and vulnerability information. The NCSD performs this correlation within the Division in a collaborative effort between the US-CERT Operations branch and the Law Enforcement/Intel branch as the lead entities but also in collaboration with other Divisions in the Office of Infrastructure Protection. In addition, as part of the National Infrastructure Protection Plan (NIPP), NCSD is responsible for: (1) conducting risk assessments and determining the necessary protective measures for the information technology industry, and (2) providing guidance to the sector specific agencies with responsibility for other critical infrastructure sectors on how to incorporate cyber- related vulnerabilities into their vulnerability assessments. NCSD regularly shares information with key stakeholders within DHS, including the Homeland Security Operations Center (HSOC) through existing daily conference calls or targeted communications, IAIP, and other components as appropriate as well as with interagency partners through the NCRCG, GFIRST, and the Chief Information Security Officer (CISO) Forum. As information is cleared through classification procedures, NCSD also shares information with the private sector through appropriate channels, including the ISACs, the HSIN/US-CERT Portal , and the US-CERT NCAS. The public at large can also access information provided through the NCAS as well as the US-CERT public website. In the event that a cyber threat rises to the level of national security, the public will be informed through the Homeland Security Advisory System (HSAS). 2. Coordination for Cyber Advisories and Warnings a. What organization within DHS is responsible for managing and issuing cyber advisories and warnings? Through its mission to serve as a national focal point for cyber security issues and to implement the National Strategy to Secure Cyberspace, NCSD is responsible for managing and issuing cyber advisories and warnings. Those advisories and warnings are issued to the public and our partners through the NCAS and to specific entities on an as-needed basis in the case of a targeted vulnerability or threat. Information that is less sensitive and for wider distribution is disseminated through the US-CERT public website and the US-CERT secure online portal, as appropriate. b. How will DHS integrate cyber advisories and warnings into the existing Homeland Security Advisory System (HSAS), given that cyber has a unique audience, particularly when those people who must respond to an attack are not the traditional First Responders used for physical national disasters? NCSD provides information for use in the HSAS to be activated as appropriate. However, the nature of cyber attacks is that there are varying degrees of cyber activity at any given time that warrant advisory to the cyberspace stakeholder community that does not meet the criteria for raising the national alert status through the HSAS. Therefore, US-CERT utilizes the NCAS to notify the entire national, and international stakeholder community about activities that may warrant specific protective measures but that do not rise to the national security level of the HSAS. US-CERT is reaching out to key partners for incident response at various levels of sensitivity or urgency through the NCAS, the US-CERT secure online portal, the NCRCG, and the US-CERT public website to communicate with cyber ``first responders'' and other stakeholders. In the event of a cyber incident of national significance (or an incident with both physical and cyber implications), the NCSD/US-CERT and/or NCRCG will provide analysis and recommendations to the IIMG or to the Secretary to help inform a decision about whether to raise the national alert level, c. How is the cyber threat and warning mission being integrated into the Homeland Security Operations Center (HSOC)? US-CERT communicates regularly with the HSOC on cyber security issues, including participation in daily conference calls and regular e-mail and other correspondence. In addition, the NCSD shares the staffing of a 24x7 Infrastructure Protection desk at the HSOC that has direct reach back to the US-CERT for coordinated action as appropriate. d. How will DHS work with other countries when responding to a cyber attack, given that most attacks have effects on information systems around the world? Cyberspace transcends traditional borders and we recognize our international outreach is crucial to protecting ourselves. As such, DHS is active in a number of multilateral and bilateral activities addressing cyber security issues such as early warning, response, and information sharing. NCSD and US-CERT are reaching out to other countries to form strategic partnerships that we will be able to leverage in the case of a cyber attack. US-CERT is a member of the Forum for Incident Response Security Teams (FIRST), an international coalition of government, commercial, and academic organizations that aims to foster cooperation and coordination in incident prevention, prompt rapid reaction to incidents, and promote information sharing among members and the community at large. FIRST is one way that US-CERT works with computer security incident response teams (CSIRTs) in other countries when needed to share information, best practices, and experiences. US-CERT also communicates and collaborates with other CSIRTs directly. For example, NCSD and US-CERT participate in the cyber security efforts of the Asia Pacific Economic Cooperation (APEC), the Organization for American States (OAS), and the Organization for Economic Cooperation and Development (OECD). Their respective programs seek to raise awareness about cyber security, provide technical assistance and capacity building for emergency response teams, help develop trusted relationships between response teams, and to build a global ``culture of security.'' On an operational basis, the NCSD and US-CERT are developing closer ties with the so-called ``Five-Eyes'' countries (United States, United Kingdom, Canada, Australia, and New Zealand), as well as other countries with key operational capability and interest through information sharing and cooperative mechanisms. The objective is to forge trusted relationships with our counterpart organizations abroad and develop the basis for a coordinated response in a cyber incident or attack. We seek and have created opportunities to build those relationships in a number of international forums and activities. The most recent example was the multilateral conference on cyber security that DHS/NCSD co-hosted with the German Ministry of the Interior in Berlin in October 2004. Government policy makers, managers of CSIRTs with national responsibility, and law enforcement representatives from fifteen countries in Europe, Asia Pacific, and the Americas participated in the conference. The conference focused on developing a framework for cyber information sharing and incident response, and included a tabletop exercise to examine international communication and collaboration channels as well as interactive sessions on international information sharing and incident response. The participants agreed to an initial framework for cyber information sharing and incident response by identifying points of contact cyber information sharing actions in the short term and, and are forming a cooperative mechanism to build a more mature framework in the longer term. 3. Framework a. Is DHS developing a cybersecurity framework for public and private use and what is the status? The cyber security framework for the nation is the National Strategy to Secure Cyberspace issued by President Bush in February 2003. The Strategy put forth a framework of five priorities for all stakeholders in protecting our nation's information infrastructure and provided a roadmap for both the private and public sectors to undertake toward a more secure cyberspace. DHS is well on our way to implementing the Strategy with our counterpart agencies throughout the government and are actively partnering with the private sector to work collaboratively and create a set of public milestones to measure progress. We have consolidated and are leveraging existing programs and have identified new ones toward meeting the mandate of the Strategy. b. What elements are being included in this framework? At a minimum, please include an update for benchmarks, standards, best practices, common criteria and other elements as appropriate. The elements of the framework are set out in the Strategy's five priorities: Priority I:A National Cyberspace Security Response System Priority II: A National Cyberspace Security Threat and Vulnerability Reduction Program Priority III: A National Cyberspace Security Awareness and Training Program Priority IV: Securing Government's Cyberspace Priority V:National Security and International Cyberspace Security Cooperation Key elements of our program to meet the mandate of the Strategy are as follow: US-CERT--established a 24x7 cyber watch and warning operation with a secure online portal for collaboration, information dissemination, and information exchange; US-CERT Outreach--establishing regular communication and collaboration mechanisms such as US-CERT Portal, US-CERT public website, NCAS and other activities to reach critical infrastructure sectors, software developers, academia, government entities, and other stakeholders. Strategic Initiatives--identification of cyber security programs for the long term, including software assurance, research and development, exercises, training, and education. Law Enforcement and Intelligence Coordination--NCSD works with key parties in the law enforcement and intelligence communities to leverage information and coordinate response to cyber security threats and events. NCSD has identified a set of goals, corresponding objectives, and programs and initiatives to further these goals that map to the five priorities of the National Strategy. NCSD is working to develop a set of specific milestones to measure progress toward the goals articulated in the following strategic framework: ---------------------------------------------------------------------------------------------------------------- PRIORITY NCSD GOALS ---------------------------------------------------------------------------------------------------------------- I. National Cyberspace Security Response System #1 Prevent, predict, detect, and respond to cyber incidents, and reconstitute rapidly after cyber incidents ---------------------------------------------------------------------------------------------------------------- II. National Cyberspace Threat and Vulnerability #2 Work with public and private sectors to reduce vulnerabilities and minimize the severity of cyber attacks Reduction Program #4 Coordinate with the Intelligence and law enforcement communities to identify and reduce threats to Cyberspace ---------------------------------------------------------------------------------------------------------------- III. National Cyberspace Security Awareness and #3 Educate and encourage Americans to secure their Training Program cyberspace thought a National awareness and training campaign ---------------------------------------------------------------------------------------------------------------- IV. Securing Governments' Cyberspace #1 Prevent, predict, detect, and respond to cyber incidents, and reconstitute rapidly after cyber incidents #2 Work with public and private sectors to reduce vulnerabilities and minimize the severity of cyber attacks ---------------------------------------------------------------------------------------------------------------- V. International Cyberspace Security Cooperation #1 Prevent, predict, detect, and respond to cyber incidents, and reconstitute rapidly after cyber incidents ---------------------------------------------------------------------------------------------------------------- Common to All Priorities #5 Build an effective organization ---------------------------------------------------------------------------------------------------------------- NCSD has various opportunities and obligations to report to Congress on its programs and activities and will continue to do so as requested and on a timely basis. c. How will progress and compliance with voluntary standards and the framework be measured and certified, particularly in the private sector, which owns and operates most of the critical information infrastructure? The private sector has a large role in increasing our nation's cyber security, and they are acting upon that responsibility. Private sector associations formed the National Cyber Security Partnership (NCSP) and are expanding it to include over 20 associations. NCSD is participating in meetings of the NCSP and others to encourage the articulation of a set of priority milestones for implementation of the priorities of the National Strategy that can track progress by the private sector and government. d. What incentives will be provided, or are needed, in order to have government and industry adopt this cybersecurity framework? Much of the Strategy calls for information sharing between the private and public sectors. Historically, companies and other entities have had concerns about the confidentiality of information shared with the federal government, either independently or through a mechanism such as the ISACs. Congress enacted the Critical Infrastructure Information Protection Act as part of the Homeland Security Act of 2002 to facilitate sharing of the most valuable information about capabilities, threats, vulnerabilities, and deterrence programs possible. The law granted an exemption for voluntarily submitted critical infrastructure information from the Freedom of Information Act (FOIA) and state sunshine laws. To implement the law, DHS has created and led a working group to develop regulations and procedures for receipt, disposition, and use of Protected Critical Infrastructure Information (PCII). In February 2004, DHS created the PCII Program Office, which has developed rigorous safeguarding and handling procedures to manage the information flow and prevent unauthorized access to information submitted under the PCII program. Separately, the market demand for cyber security presents a significant incentive for both government and industry to adopt the approach laid out in the Strategy. e. The National Institute of Standards and Technology (NIST) has been active in developing cybersecurity requirements for industrial control systems. Are these activities being included in DHS efforts to develop cybersecurity standards? How will DHS capitalize on these activities to decrease the vulnerability of privately owned critical infrastructure? Yes, the National Institute of Standards and Technology (NIST) efforts to develop cyber security requirements for industrial control systems have been included in DHS' efforts to develop cyber security standards, particularly in NCSD's effort to develop a control systems framework. The control systems framework will build upon the work already completed by the NIST-sponsored Process Control Security Requirements Forum (PCSRF) and developed in compliance with the ISO 15408 requirements definition language (Common Criteria) to allow for international acceptance. PCSRF has already developed a system protection profile for industrial control systems? components that serves as an appropriate starting point for this effort. Work continues on the profile, and once the reference components are defined, a vulnerability analysis will be conducted to enumerate the relevant operational security requirements for each class of component. These requirements will then be mapped to a set of security controls based on specific assurance levels and the criticality of the site in terms of impact on critical infrastructure, economic impact and/or potential loss of life due to an environmental manifestation of a successful cyber attack on a control system. Once this definition is complete, specific recommendations will be made to implement the appropriate security controls in each environment. Currently there is a lack of specific guidance in the standards that are being developed for operational control systems implementations. NCSD will continue to work with the standards bodies and industry to define any specific sector operational requirements, and then to offer rigorously defined security requirements and specific recommendations for security and/or mitigation back to the standards bodies and to industry. In addition to the framework, DHS has invested funds to augment the existing testing capability of the National Supervisory Control and Data Acquisition (SCADA) Testbed officially launched in May 2004 and run jointly by the Idaho National Environmental and Engineering Laboratory (INEEL) and Sandia. The National SCADA Testbed is aimed at SCADA systems only and aimed strictly at developing the capabilities to test energy sector systems. DHS' test center operates hand-in-hand with the SCADA Testbed, but the DHS effort is focused on the non-energy sectors and is trying to work with other existing private and public testbeds as to leverage their efforts and avoid duplication. The DHS Control Systems Security and Test Center (CSSTC) and the National SCADA Testbed was officially opened in August 2004. Finally, with regard to control systems, NCSD is developing a control systems risk/impact decision tool that the US-CERT will be able to use for analysis and vulnerability evaluation for control systems. 4. Management a. How is DHS distinguishing cybersecurity roles and responsibilities internally, e.g., NCSD, CIO, TSA, Secret Service, NCS, and others? By virtue of the mandate provided in HSPD #7, NCSD has been given the mandate to ``facilitate interactions and collaborations between and among Federal departments and agencies, State and local governments, the private sector, academia and international organizations.'' As such, NCSD is a national focal point for the public and private sectors on cyber security issues and it is responsible for coordinating the implementation of the National Strategy to Secure Cyberspace. NCSD recognizes that each of these entities may bring unique capabilities, responsibilities and/or authorities to bear on cyber security issues, and as such, NCSD must act as a coordinating body to ensure that these entities are acting in concert. When dealing with the internal DHS information systems, the DHS CIO has the responsibility and authority to implement and assure the security of such systems. NCSD ensures that the office of the CIO is kept informed of the latest cyber threats and is provided with timely, actionable information to take steps to protect DHS systems from emerging malicious code occurrences. The National Cyber Response Coordinating Group (NCRCG; previously known as the Cyber Interagency Incident Management Group) will coordinate interagency preparedness and operations to respond to, and recover from, cyber incidents and attacks. The role of the NCRCG is discussed in the Cyber Annex to the National Response Plan. The group brings together senior officials from DHS, law enforcement, defense, intelligence, and other government agencies that maintain significant cyber security capabilities. The combination of these officials/ agencies provides the capability to analyze and coordinate a national level response to any incident that affects cyber assets. In addition to the ability to focus portions of their agencies? resources, they possess the necessary statutory authority to act. The National Communications System (NCS) is responsible for coordination of the planning for and provision of national security and emergency preparedness communications for the Federal government under all circumstances. National security and emergency preparedness (NS/EP) telecommunications services are those that are used to maintain a state of readiness or to respond to and manage any event or crisis that causes or could cause injury or harm to the population, damage to or loss of property, or degrade or threaten the NS/EP of the United States. Both the NCS and NCSD report to the Assistant Secretary for Infrastructure Protection, which allows for close coordination on those cybersecurity issues that impact each organization. The draft National Response Plan (NRP) is a set of defined processes that will bring together several DHS functions for cyber security. The Cyber Incident Annex of the NRP, as developed by NCSD in coordination with the NCRCG, establishes procedures for a coordinated, multidisciplinary, broad-based approach to prepare for, respond to, and recovery from cyber Incidents of National Significance impacting critical national processes and the national economy. For physical incidents, Emergency Support Function 2 (ESF #2)--with NCS as coordinating agency--would coordinate Federal actions to restore backbone connectivity for the Internet and provide priority service to NS/EP users. The draft National Response Plan includes tie-ins between ESF #2 and the Cyber Incident Annex to ensure these functions stay coordinated, which has been operationalized by cross-membership across the NCS, NCRCG and the Interagency Incident Management Group (IIMG). Various DHS components, including Immigration and Customs Enforcement (ICE) and the Secret Service have statutory responsibility for investigating cyber crimes. DHS through NCSD has assumed a supporting role in this area. Among the efforts that have been undertaken are, the support and administration of the Cyber Cop Portal, the co-sponsorship (with the Department of Justice) of the first statistically valid survey of cyber crime in the US, and the initiation of a number of joint meetings to address the issue of cyber attack attribution. The Cyber Cop Portal is one of the oldest and most widely used mechanisms for sharing information in the electronic crimes community. It consists of over 5,300 members from all 50 states and over 40 countries. Its growth and use brought it to the point where it could no longer be maintained as a voluntary part time project, and it was in danger of being shut off. NCSD has decided to sponsor and administer the portal. NCSD has agreed to provide funding and support to the DOJ Bureau of Justice Statistics to assist in the first ever statistically valid survey of cyber crime in the United States. The effort will involve questionnaires to over 36,000 US businesses covering all critical infrastructure sectors. The results of the survey will provide law enforcement and policy makers with a better understanding of the problem and how to allocate resources. One key component in the ability to effectively respond to cyber attacks is attribution, determining the source of the attack. This is also one of the most difficult aspects of cyber attack investigations. The solution to the problem is not found in any one community of interest, but across a broad spectrum of disciplines (Intelligence, Counter Intelligence, Law Enforcement, private industry, etc.). Under the auspices of the NCRCG, and in conjunction with DOJ, a number of attribution meetings have been held or are being planned. These meetings are designed to develop an overall picture of the state of attribution throughout the various communities, and then to develop a plan to improve it. The plan is due during the second quarter of FY05. b. What measures have been taken to elevate the importance of cybersecurity within the overall mission of DHS and to improve public awareness of cybersecurity issues? Specifically, should cybersecurity be a part of ``READY.GOV'' public web site to make Americans more aware of cybersecurity needs? Cyber security is a priority issue for DHS and the mission for NCSD. We are improving public awareness of cyber security issues through the US-CERT public website and the NCAS launched in January 2004 as well as through our engagement in the National Cyber Security Alliance's Stay Safe Online campaign, our Outreach and Awareness branch, and our partnership with the MS-ISAC to reach state and local government. The US-CERT public website provides information on cyber security issues, cyber activity, and cyber vulnerabilities. NCAS is our primary mechanism for communicating with the public on cyber alerts, security tips, and other useful notifications. We are pursuing ways to reach as many Americans as possible through the website, awareness campaigns, and the NCAS as well as other public awareness efforts. DHS is currently expanding the Ready campaign and is developing Ready for Business and Ready for Kids. Ready for Business is designed to help small to medium business owners safeguard their business operations in the event of a terrorist attack or other emergency. Preliminary messages for the campaign center around three key themes: Ensuring Business Continuity, Safeguarding and Preparing Your Employees, and Safeguarding your Computer Systems (cyber security). The third theme will help businesses owners understand better the need for cyber security and also how to achieve it. It will encompass topics such as how to prevent computer viruses, how to detect computer viruses, how to preserve and back-up computer data, and how to prevent hacker intrusion. DHS is working with the Advertising Council to develop content and messages that will inform and motivate business owners to take action. The messages will be distributed through a variety of vehicles that will target business owners and operators. c. Some have suggested that the NCSD should be elevated within the DHS organization--either as a direct report to the Secretary Ridge or to the Under Secretary for Information Analysis and Infrastructure Protection. What is the Department's view of such a change? The Department is working closely with the Homeland Security Council to evaluate this and other policy and organizational options related to elevating and expanding the current role of the NCSD. 5. Wireless Funding a. The National Communications System program budget for Wireless Priority Service is $78M. The office of the Chief Information Officer (CIO) includes funding for wireless activities at $100M. How are your office, the CIO, and Science and Technology Directorate working together on developing these programs? In summary, each program has a very distinct mission employing different technologies. DHS/IAIP recognizes the need to continually assess opportunities to insure integration of communications as well as efficiencies of programs. DHS has established forums for the review and ultimate execution of such a strategy and is coordinating all of its programs efforts. The IAIP NCS is an inter-agency body responsible (through E.O. 12472) to support the President in providing priority telecommunications services across federal, state and local entities that assures the greatest opportunity to communicate during all crises. The NCS Wireless Priority Service (WPS) program was directed by the National Security Council and subsequently authorized by the FCC. WPS is a National Security/Emergency Preparedness (NS/EP) priority service program utilizing based in the commercial/public cellular networks for designated Federal, State, Local and critical infrastructure owner leadership. The DHS CIO office focuses on managing the wireless assets for the department with a significant focus on the private Land Mobile Radio (LMR) network users of the federal entities transferred to DHS. They are also engaged with DOJ in leveraging its capabilities and development of LMR interoperable communications for the Federal law enforcement community. In terms of coordination, the NCS programs, through exhibits 300, are reviewed and approved by the DHS CIO office. The CIO office also has established a wireless management working group which IAIP NCS participates in regularly to review technology issues and evolution as well as identify areas that will create efficiencies of all programs. A primary long term objective, in addition to assuring interoperability of DHS assets, is to integrate WPS capabilities with all wireless solutions as technology enables. IAIP, DHS' CIO Office and the S&T Directorate, along with other Directorates, also work together on common interoperability challenges through the Department's new Office of Interoperability and Compatibility. This Office, housed within the S&T Directorate, was created to coordinate the multiple interoperability efforts and needs of the Department as well as look to leveraging the vast range of interoperability programs and efforts within the Federal government. Additionally, the DHS S&T Directorate manages the SAFECOM Project charged with partnering with state and local governments to improve the interoperability of federal, state and local LMR communications for first responders. In this area as well, IAIP support to DHS S&T through participation and review of Project SAFECOM activities, includes assuring that the WPS can effectively interoperate with Project SAFECOM solutions as technology dependency eases to a more open environment. b. Describe how First Responders will be able to benefit from the results of these efforts. First Responders are increasing their dependence on wireless communications for command and control during emergency operations. The WPS program provides government and private sector leadership, such as incident commanders, with priority access to the public cellular infrastructure. The WPS link improves the commander's ability to receive reports from and give instructions to First Responder teams and other supporting organizations. Without the WPS link, command and control could be degraded because of cellular call-congestion in the vicinity of the incident/ emergency for all government and private sector leadership. Deployment of WPS across the wireless industry is essential to a full public network based emergency capability for response as well as COOP and COG needs. WPS is the cellular augmentation of the Government Emergency Telecommunications Service (GETS). It is anticipated that in the future technology will enable the integration of these capabilities with the interoperable Land Mobile Radio (LMR) private systems employed by the broad based first responder community. Questions From Congressman Jim Turner 1. When the National Cyber Security Division (NCSD) was created in June of last summer, the Department announced it would build upon the existing capabilities of several agencies with cyber responsibilities transferred to DHS, including the National Communications System (NCS). The NCS, however, has remained separate from the NCSD. Yet, the NCS remains responsible for several cybersecurity initiatives, including the ``Network Security Information Exchanges (NSIE)'' and the ``Cyber Warning Information Network.'' The proposed budget continues to keep the NCS activities separate from the NCSD. Isn't it counterproductive to have so many core cyber functions outside the National Cyber Security Division? Wasn't the creation of the National Cyber Security Division intended to provide a focal point for cyber security threat and vulnerability assessment, as well as information sharing, within the Department? The June 2003 DHS announcement forming the NCSD was not intended to suggest that NCS would be fully absorbed into NCSD. The NCS is an interagency organization formed under Executive order 12472 to support the President in the provision of National Security/Emergency Preparedness (NS/EP) Telecommunications meeting the need of the federal government under all wartime and non-wartime crisis conditions. This is a critical mission that now addresses infrastructure protection issues in addition to its traditional COOP/COG focus. The NSIE referenced in the question is a government and industry effort initiated under the auspices of the President's National Security Telecommunications Advisory Committee (NSTAC) and is managed through the NCS National Coordinating Center for Telecommunications (NCC). It addresses a very broad range of security issues potentially affecting the telecommunications infrastructure. Cyber security is only one component of these issues and the NCSD sits on the NSIE to address these matters. Also referenced in the question is the Cyber Warning Information Network (CWIN). When first envisioned, this private network was focused on the cyber arena, as the development of the US-CERT became firm and with further analysis, IP recognized that this capability had far more utility than originally intended. CWIN is intended to provide information and warnings across all infrastructures to our State, local, and industry partners. CWIN has been transferred to the IP Infrastructure Coordination Division (ICD) where it will support the cross-sector needs for all IP divisions. In order to facilitate coordination between these elements, Infrastructure Protection is currently building out a watch center facility, the National Information Coordination Center (NICC) that will include NCSD, US-CERT, NCS, and ICD. Co-locating these groups on in a single watch center facility will facilitate the fast and efficient sharing of information. Initial move in to this facility is scheduled for the first quarter of 2005. 2. The IAIP budget includes a $1.9 million increase for conducting cyber exercises such as ``Live Wire,'' which was a simulation of a terrorist attack on computer, banking, and utility systems. There are, however, existing cyber exercises that are up-and-running. Over two years--since before the Department was created--the city of San Antonio planned and conducted ``Operation Dark Screen,'' a cyber terrorism exercise that involved both the public and private sector and was designed to help the city defend and respond to a cyber attack. Even within the Department, the Secret Service is reaching out to the private sector and supporting table-top exercises to address the security of private infrastructures. What is the IAIP Directorate doing to integrate and coordinate with existing cyberexercises such as these? How much of the requested $1.9 million will go towards these existing exercises that have been tested and proven? In addition, what is DHS doing to ensure that our local communities and towns, who will provide the cyber-first responders in the time of crisis, are prepared? Isn't it true that there is no individual entity or individual within IAIP responsible for coordinating all of the cyberexercises being put on by the government and, as a result, there may be duplicative efforts? Whereas the first responder and emergency management communities have been exercising at national, regional, and local levels for many years, the cyber response community is quickly catching up. The U.S. Government has an active program of exercises to assess preparedness and processes in the event of an attack on the Nation. DHS has established a National Exercise Program Office (NEP) to coordinate scheduling and participation in the exercises sponsored by various agencies. The IAIP Directorate is coordinating its exercise planning with the NEP, which is the responsibility of the DHS Office of Domestic Preparedness. The IAIP Under Secretary's Office has an Exercise Management Program (EMP) that maintains regular contact with members of the exercise community and coordinates with the NEP to facilitate the Directorate's participation in exercises. NCSD's coordination efforts entail scheduling cyber security exercises with NEP as well as integrating cyber scenario components into other planned exercises as appropriate. These coordination efforts with NEP assist in minimizing the duplication of exercise efforts. NCSD's involvement in the NEP is guided by two principles: (1) while cyber is only one element of a multifaceted NEP, cyber elements must be closely coordinated with other elements of that program to ensure efficient use of limited resources and the most effective return on exercise investments; (2) cyber exercise elements must not be sidelined or relegated to an ``afterthought'' category within the NEP. In October 2003, numerous federal agencies participated in Livewire, the first ever national-level cyber exercise to baseline our capabilities for responding to national cyber attack. The exercise involved more than 300 participants representing more than 50 organizations across the federal, state, and local governments, as well as the private sector. Cyber attack simulation scenarios were developed to stress cyber interdependencies across America's critical infrastructures and baseline government agencies' abilities to collaborate across the public and private sectors. Information gleaned from Livewire and similar exercises aimed at ensuring security of critical infrastructures are being used to improve our national incident response processes. While Livewire brought together a number of players for a large- scale event simulation, other exercises target specific areas or agency concerns. For example, the United States Secret Service's (USSS) Electronic Crimes Task Forces (ECTFs) have been running smaller regional and sector-specific tabletop exercises over the past eighteen months. These exercises are designed to help coordinate efforts in a targeted geographic area and are tailored to a specific regional infrastructure, such as the energy industry in Houston, TX, the high- technology industry in San Francisco, CA, and the banking and finance industry in Charlotte, NC. In February 2004, the National Defense University ran its Dark Portal exercise and in August 2004, a cyber security workshop co-hosted by NCSD and the National Security Council was held at the National Defense University. This tabletop workshop exercise included members of the National Cyber Response Coordination Group (NCRCG), as well as multi-agency key decision makers in the U.S. Government cyber security realm. NCSD has sponsored several exercises that test cyber readiness in various geographic locations and critical infrastructure sectors across the Nation. In September and October 2004, a series of regional exercises were held in Seattle, WA (Blue Cascades II) and New Orleans, LA (Purple Crescent II). Both exercises were successful in highlighting dependencies between cyber and physical infrastructures and interdependencies among critical infrastructures. These exercises also identified and tested the coordination and cooperation among federal, state, and local governments with the private sector in the case of attacks (both cyber and physical) on the critical infrastructures in those regions of the U.S. In addition, each of the exercises illustrated the need to continue to provide outreach and cyber education to local emergency management and physical security professionals as well as identify and improve shortfalls in emergency preparedness. DHS EMP serves as the lead organization in the development, facilitation and participation of a week-long, cabinet-level national exercise (``TOPOFF3'') to be held in the summer of 2005. These national exercise programs occur every two years and involve the same basic set of participants. The exercise for TOPOFF3 represents a joint physical and cyber scenario, with NCSD leading the development of the cyber component for the exercise. It will test not only response to attacks, but also continuity of government and operations, emergency response at the state, regional and local levels, and containment and mitigation of chemical, nuclear, and other attacks, etc. NCSD is also working with DHS to ensure a more prominent cyber component in the follow-on TOPOFF series of exercises for 2007 and beyond. The lessons learned from these and other exercises will form the backdrop for an NCSD-sponsored National Cyber Exercise planned for November 2005. Planning activities are currently underway with initial groundwork already laid for this effort. In September 2004, a key stakeholder meeting was held to discuss the scope and objectives with critical infrastructure sector lead agencies. NCSD is in the process of planning the Initial Planning Conference (IPC) for the National Cyber Exercise that will include representatives from various government agencies and the private sector. The IPC will allow the opportunity for the stakeholders to establish clear and concise goals and objectives for the National Cyber Exercise as well as to discuss and develop possible scenarios. The objectives of the National Cyber Exercise are to: 1. Sensitize a diverse constituency of private and public- sector decision-makers to a variety of potential cyber threats including strategic attack; 2. Familiarize this constituency with DHS' concept of a national cyber response system and the importance of their role in it; and 3. Practice effective collaborative response to a variety of cyber attack scenarios, including crisis decision-making. 4. Provide an environment for evaluation of interagency and cross-sector business processes reliant on information infrastructure. 5. Measure the progress of ongoing U.S. efforts to defend against an attack. 6. Foster improved information sharing among government agencies and between government and industry. 7. Identify new technologies that could provide earlier warning of attacks. 8. Define the roles and responsibilities of government agencies and industry. Questions for Chief Officer Steven Cooper, From Congressman Mac Thornberry and Congresswoman Zoe Lofgren 1. Cybersecurity Standards Question: a. How are technical cybersecurity standards being established and enforced across the Department for information technology purchases, processes, and practices? Technical Cybersecurity Standards are promulgated through the Technical Reference Model portion of the Department's Enterprise Architecture Program. There are also mature standards established through the Federal Information Processing Standards. The Information System Security Managers at the organizational elements are responsible for ensuring compliance with standards. In addition, regular Program and Acquisition reviews check for compliance with published standards. The Department's long-term strategic approach for the enforcement of information technology security standards is to verify policy and standards compliance during the Security Test and Evaluation phase of the system Certification and Accreditation (C&A) process. DHS is currently in the process of establishing an enterprise C&A application that will maintain an online repository of all C&A documentation and enforce the use of Department mandated C&A methodologies. This application will generate comprehensive system test procedures and processes to fully map system compliance with DHS policy and standards. The current status of implementing this C&A tool is that DHS has completed the Requirements Definition phase and product evaluation phase, and have an operational pilot system which has given phenomenal results. We expect to have a Department implementation in the near future. The Department also verifies proper implementation of policy and standards by conducting NIST 800-26 reviews of security controls in accordance with Office of Management and Budget Memorandum M-03-19. These reviews are ongoing. Question: b. Who sets cybersecurity requirements for the Department and how are they communicated to the technology developer or purveyor? DHS follows cybersecurity standards requirements established by the Committee for National Security Systems for its classified systems, and the Office of Management and Budget, and National Institute of Standards and Technology guidance for it unclassified systems. Additionally, mission specific requirements are promulgated through the internal Management Directives, as well as through the Technical Reference Model of the Department's Enterprise Architecture. These have been provided to industry in general, and are also specifically called out when appropriate in contracting vehicles. Question: c. How are cybersecurity standards requirements being incorporated in calls for proposals, grants or other contracting mechanisms? The DHS Science and Technology (S&T) Directorate is in the process of establishing a DHS-internal Cyber Security Standards Working Group. Within the S&T Directorate, the working group will include representatives from the Standards and Cyber Security R&D portfolios, as well as representatives from S&T's Chief Information Officer (CIO) group. Outside of S&T, invitations to serve on the working group have been extended to the DHS Office of the CIO, the National Cyber Security Division and the National Communications System in the Information Analysis and Infrastructure Protection Directorate, and the United States Secret Service. This group will collectively identify what cyber security standards requirements should be incorporated into S&T's R&D portfolio investment plans. Question: d. In what areas of cybersecurity do you see a need for new or better standards, benchmarks, and other elements of a cybersecurity framework, and what can DHS do to help implement such a framework? With new areas of technology emerging every day as well as new applications of existing technology, there is always a need to refine existing standards and promote new ones. The emergence of MPLS has opened many new questions and the means to securely implement reliable, secure wireless networks continues to be a challenge, as does the management of geospatial data and Law Enforcement Information. DHS works closely with the Federal cooperative process through bodies such as the National Institute of Standards and Technology and the Committee for National Security Systems to ensure the success of these efforts. Question: e. Does the office of the Chief Information Officer (CIO) use any cybersecurity standards and processes recommended by the National Cybersecurity Division (NCSD), National Institute of Standards and Technology (NIST), and National Security Agency (NSA) to secure the DHS enterprise architecture? To the best of our ability, all relevant standards from national bodies such as NIST, NSA and NCSD are applied throughout DHS. This includes relevant FIPS and similar standards for procurement and internal processes such as self assessments and Certification and Accreditation are explicitly standards based. Question: f. How does NCSD provide actionable cybersecurity information to the CIO to consider in its enterprise architecture implementation? DHS participates in the interagency US CERT process. As a member of USCIRC, DHS like all participating agencies, gets alerts, warning and mitigation tools in a timely manner. In addition, there is a constant and constructive exchange of information between the National Cyber Security Division and the Office of the CIO for timely notifications of relevant issues. Actionable items--such as those that may significantly compromise confidentiality or availability are given the highest priority for incorporation into the Department's security architecture which is integral to the Department's Enterprise Architecture. 2. Purchasing Power Question: a. What specific actions has DHS taken to improve its FISMA report card in order to become government model for secure information systems? DHS has implemented a COTS enterprise product to provide automated support for 800-26 assessments, manage FISMA metric reporting, as well as Department-wide Plans of Actions and Milestones (POA&M). This product is being used to generate a Digital Dashboard showing Organization Element performance metrics and overall DHS performance metrics, and access to this system has been made available to the OIG to ensure veracity of FISMA data reported by Organizational Elements. Access to the Digital Dashboard will be made available to senior management in the near future to ensure that senior managers are directly involved with the Department's Information Security Program. In the past few moths we have implemented several enhancements made to FISMA reporting product for improving reporting of 800-26 and C&A metrics. This enhancements include a) 800-26 integrity checking; 2) computed metrics for 800-26 assessments and C&A; capability to upload assessment and C&A artifacts; 4) better tracking of C&A deliverables. We have purchased an Enterprise license for a C&A tool (SecureInfo RMS). This tool has been installed on an Enterprise server and all OEs are currently using the tools with DHS ramping up to full mandatory use. The DHS baseline policy has been mapped to this tool and use of the tool will ensure that the C&A SRTM is mapped to DHS policy. We have prepared and submitted a POA&M to OMB to achieve full ATO on all currently reported systems by the end of July, 2005. To ensure continued progress we have formed a DHS security working group to focus on FISMA reporting and FISMA issues. Question: b. Many witnesses before the Subcommittee have suggested that a powerful tool the federal government possesses in cybersecurity is its buying power. Has DHS used this power to induce hardware or software manufacturers to provide more secure systems? Every new information technology contracting vehicle put into place by the Department includes robust security standards. Additionally, the Department regularly engages information technology vendors to ensure that strong security is integral to product development and implementation. Sec. 3. Wireless Funding Question: a. The office of the CIO includes funding for wireless activities at $100M. The National Communications System (NCS) program budget for Wireless Priority Service is $78M. How are your office, the NCS, and the Science and Technology Directorate working together on developing these programs? The Wireless Management Office (WMO), within the DHS Office of the Chief Information Officer, is mandated to lead and coordinate the Department's programs, projects, and initiatives that involve the wireless transport of information, including voice, data, and multimedia. The WMO's mission, ``To be the model program office, providing state-of-the art wireless capabilities to preserve our freedoms and protect America,'' serves to focus and provide direction for the program's activities and services to ensure the effective use of wireless technologies across the Department's organizational elements. As part of its mission, the WMO integrates its activities with the National Communications System (NCS) and the wireless initiatives of S&T to meet evolving homeland security requirements. The WMO is primarily focused on wireless communications to support internal DHS missions. The NCS is responsible for directing the Wireless Priority Service program which supports commercial, private sector wireless capabilities. The WMO is working with NCS and the DHS S&T Directorate in implementing program activities through groups such as the Wireless Working Group (WWG). The WWG is a coordination body established to ensure DHS-wide approaches to wireless communications are developed and implemented in an integrated manner. The WMO chairs the WWG, which is composed of 80 representatives from all of the DHS organizational elements with wireless communications as part of their mission. The majority of the WMO's coordination with the NCS and DHS S&T occurs through its participation on the WWG to collect DHS organizational elements wireless requirements, coordinate resource utilization, and ensure organizational elements play an integrated roll in centralized DHS wireless concepts (e.g., system designs, user requirements, operational concepts, procurement contracts). This collaborative approach is consistent with the Department's customer service strategy and allows for on-going feedback and confirmation that the WMO is adequately addressing the needs of its customers and stakeholders. Question: b. Describe how First Responders will be able to benefit from the results of these efforts. The activities of the WMO, in partnership with DHS S&T and the NCS, directly benefits first responders at all levels of the government by equipping them with the wireless capabilities to fulfill their missions of protecting the homeland. By building strong relationships that foster increased coordination among first responders, enabling and enhancing their wireless capabilities, the DHS WMO--in coordination with DHS S&T and NCS--are achieving several objectives to the benefit of first responders, including-- - Implementing integrated, nationwide tactical communications capabilities for DHS organizational elements and other public safety first responders - Providing technical assistance and implementation of wireless enhancements - Advancing the use of emerging wireless technologies among first responders These objectives are being met through several major initiatives supported by the WMO and coordinated with DHS S&T and the NCS. Integrated Wireless Network (IWN): The mission of the Integrated Wireless Network (IWN) project is to provide a consolidated, nationwide approach to reliable, seamless, interoperable wireless communications to support federal agencies and officers engaged in the conduct of law enforcement, protective services, homeland defense, and disaster response within the Departments of Homeland Security, Justice, and Treasury. The IWN will serve as the day-to-day tactical communications network for the DHS, Justice, and Treasury user community, as well as for those within DHS and Treasury, replacing outdated and antiquated legacy communications systems. As a result, the IWN, in every sense, will serve as the lifeline that directly supports the wireless communications capabilities of first responders. The IWN represents an investment in voice and data communications technologies, the completed system will establish a 24 x 7 communications network, complete with support services that will include major disaster recovery and contingency capabilities (e.g. system back-up). A centrally managed and coordinated approach to this initiative ensures that common, standards-compliant technologies are procured, thereby fostering interoperability between and among federal agencies for more effective and efficient enforcement activities, as well as provisioning communications interoperability with our state and local partners for event management and crisis response. G4High Risk Metropolitan Areas Interoperability Project: With the demand for improved intergovernmental communications necessitated by homeland security concerns, federal agents must increasingly interoperate with other federal, state, and local public safety entities. The project was initiated to improve federal interoperability with local first responders in the highest threat areas across the country. The project is being implemented in coordination with the interoperability efforts of the WMO, SAFECOM, and the Office of Domestic Preparedness (ODP). WMO Sponsored Projects: The WMO is supporting several projects that are improving the wireless communications capabilities of agencies at all levels of the government. DC Broadband Project: The District of Columbia is currently implementing a cost-effective, high-speed, wide area, wireless data network that will permit the use of interoperable, broadband, wireless data applications for public safety communications. This network will allow first responders in the NCS to use full-motion, high-resolution video monitoring and other bandwidth-intensive monitoring tools to immediately share time-critical incident and emergency event information. This will enhance regional and federal first responder capabilities. It will also provide accurate interoperability usage profiles and results, collect data on network performance (data throughput, coverage, latency, and effective of spread spectrum technologies), and implement public safety application requirements and operations improvements. Phoenix Mesa Interoperability Project: This project provides an opportunity for the WMO to partner with state and local agencies and build upon existing communications system infrastructure. The WMO plans to leverage this existing system by installing federal very high frequency (VHF) trunked repeaters at select locally-owned radio frequency (RF) sites. The project should result in several key benefits, including the demonstration of an innovative application that can be replicated across the country, providing potential long-term cost savings for IWN implementation, and serving as a model for coordination and partnerships among federal, state, and local agencies and first responders. The primary goal of the project is to demonstrate the feasibility of local and federal agencies utilizing common infrastructure while operating within different frequency bands. To accomplish this goal, the WMO partnered with the cities of Phoenix and Mesa, Arizona, who were two of the first cities in the country to implement a regional TIA/EIA-102 Project 25 800-megahertz trunked system. The installation of these repeaters will enable the WMO to use existing system assets such as shelters, towers, connectivity, and network management infrastructure. SAFECOM: Linking federal tactical communications to local, state, and tribal public safety first responders is critical to ensuring seamless, wireless communications at the scene of the incident and improving officer safety. In 2002, as part of the President's Management Agenda, the White House established SAFECOM as the umbrella program within the Federal Government to oversee all communication interoperability initiatives and projects. Through SAFECOM, the Federal Government is addressing public safety communications issues in a more coordinated, comprehensive, and effective way. The WMO is working with SAFECOM to improve wireless communications interoperability among federal, state, and local public safety first responders. The WMO does so by recognizing and supporting the crucial role of SAFECOM to the benefit of first responders to include-- Creating and adopting standards Recognizing interoperability and communications issues Identifying current initiatives that address interoperable communications issues, and Developing coordinated strategies to leverage work, while decreasing the unnecessary duplication of efforts. Collectively, the programs are providing the vital link to improve vertical interoperability among over 100 federal agencies with public safety response to over 44,000 local and state first responders. Federal Partnership for Interoperable Communications (FPIC): The FPIC works to advance federal wireless communications interoperability across federal first responders by fostering intergovernmental cooperation. The FPIC pursues this mission by advancing the following goals to the benefit of the federal wireless community: providing technical and operational advice to SAFECOM and federal departments and agencies; educating federal users about wireless communications equipment, security, and operations standards and best practices; and coordinating wireless communications interoperability efforts within the Federal Government. As members of FPIC, the WMO and SAFECOM work to improve federal wireless communications first responders through standing committees and working groups. Standing committees--such as the Standards, Security, and Spectrum Standing Committees--coordinate ongoing FPIC activities. Working groups are established to consider, investigate, and/or act on a specific activity or subject area of interest to members. The FPIC may establish partnerships with state/local organizations, associations, departments, bureaus, agencies, or individuals as appropriate. In this way, projects of mutual concern to all of the wireless public safety community can be addressed in a cooperative manner. Question: 4. To what degree do the DHS enterprise architecture plans integrate with the federal enterprise architecture effort? How is DHS working with other departments to establish cybersecurity standards? Support for Federal Initiatives EA is one of the means by which visibility into IT assets can enable the federal government to find business and financial efficiencies. Our alignment to the Office of Management and Budget (OMB) Federal Enterprise Architecture (FEA) continues throughout all of our Enterprise Architecture (EA) efforts. Our FEA and e-government initiatives are discussed below. Support for the Federal Enterprise Architecture Our EA planning project was driven by the concepts and products of the OMB FEA Reference Models. We have aligned the various EA artifacts with the five FEA Reference Models: the Business Reference Model, the Data and Information Reference Model, the Service/Component Reference Model, the Technical Reference Model, and the Performance Reference Model. And, more importantly, we have embraced the two FEA foundation concepts: Line of Sight for program effectiveness and Component and Service Based Architectures for effective reuse and repeatability. Business Reference Model. The FEA Business Reference Model drove the development of our business model. Several of the Business Reference Model Lines of Business are directly applicable to DHS (in particular, Homeland Security and Disaster Management). For all other business activities within the DHS business value chain level, there is a one-to-one link to the Business Reference Model Lines of Business. The EA Business Model includes a matrix that shows the relationship between our business activities and the Business Reference Model Subfunctions. It is important to note that every business activity in the EA Business Model is mapped to a Business Reference Model Sub- function. As a result of this alignment, OMB should be able to readily identify functional commonality of DHS with other federal agencies. Data and Information Reference Model. The Data Reference Model consists of a layered model for decomposing collections of information, from Subject Areas down to Data Objects and their properties. We adopted this approach and classified the information required to support the homeland security business activities at the Subject Area and Data Object levels. Further decomposition and description of the data objects will be performed in the next phase of the EA process. Our Data Architecture aligns with the Data Reference Model concepts by providing a common, consistent way of categorizing and describing data to facilitate data sharing and integration. Service Component Reference Model. The DHS EA project has fully embraced the FEA Service/Component Reference Model's component-based approach to the reuse of applications, application capabilities, components, and business services across the federal government. OMB created the Service/Component Reference Model specifically to identify service components and their relationship to the technology architectures of federal agencies. We leveraged the Service/Component Reference Model in two important manners: (1) the structure of our Application Architecture is a set of interworking components that has direct ties to the Service/Component Reference Model, and (2) our Technology Architecture applies a set of technology patterns that is derived directly from the technology aspects of the reference model. The Application Architecture has been constructed to leverage reusable components that can be acquired once and used to provide services to many applications. It shows the structure of this component reuse. From the set of component architecture diagrams, it can be seen that there is a significant opportunity to apply this reuse concept throughout DHS (and across other government agencies). The result should be considerable cost savings, as well as greatly improved interoperability and flexibility of applications. The Technology Patterns of our EA are repeatable solutions to recurring technical challenges. These patterns employ technologies described in the DHS Technical Reference Model (discussed below) and provide capabilities as described in the FEA Service/Component Reference Model. For example, the Business Intelligence/Data Warehouse technology pattern of our EA aligns with the Business Intelligence Service Type of the FEA reference model. Technical Reference Model. The initial formulation of the DHS Technical Reference Model began with the taxonomy as well as the technical services, protocols, and interfaces specified in the FEA Technical Reference Model. The DHS model extends and refines the FEA model where necessary to reflect the additional functional and technology requirements of DHS. In deriving the DHS model from the FEA model, we have also made adjustments to better align the technology categories with the physical layering of services that exist in vendor and open source products. The Domain level (Tier 3) categories of the DHS model have all been mapped to the FEA model, so that comparisons can be directly made with the technical reference models from other agencies. Performance Reference Model. Although this FEA reference model was still under development during our EA planning project, an initial attempt was made to align our Business Model with the intent of the Performance Reference Model, based on draft materials provided by OMB. Specifically, the Business Model includes a table that defines the outcomes or measurement categories and corresponding indicators (metrics) for each cross-cutting, corporate activity defined in the Homeland Security Value Chain. Measurement categories are defined for each activity in six areas: Mission and Business Results, Customer Results, and Process and Activities, People, Technology, and Other Fixed Assets. This guidance within the DHS EA will provide specific DHS IT programs with a starting point for applying the Performance Reference Model within their Exhibit 300 submissions to OMB. Support of E-Government Initiatives The Target EA and Transition Strategy identified several opportunities to leverage on-going e-Government initiatives. As you may be aware, the Department is currently the managing partner for the Disaster Management and Safecom e-Gov initiatives. The Department is also actively participating in six additional e-gov initiatives. For example, there are three major organizations within the department that provide grants to state, local, private industry, academia, and individuals for a variety of reasons that participate in the e-Grants effort. We will be looking more closely at this mode of delivery and how it may leveraged into the EA program. Finally, the target EA identifies a concept for homeland security information sharing and knowledge flow--the Homeland Security Information Sharing Architecture--based on a concept of Communities of Interest adopted from the intelligence community. Information sharing with state, local, tribal, and other federal government entities is a critical function of DHS, both as a source of information and as the ``first responders'' to an incident. Implementation of this information sharing architecture will provide value to homeland security community by driving results and productivity through effective information sharing. In addition to the initiatives for which DHS has the lead responsibility, we expect to be a major contributing player or user of several others. We are committed to transitioning to projects such as e-Authentication, e-Clearance, e-Payroll, e-Travel, and HR Integration. We are actively gaining more knowledge about these initiatives so that our role in supporting them and their particular timelines and capabilities can be integrated seamlessly into our target and transition strategy.