[House Hearing, 114 Congress] [From the U.S. Government Publishing Office] EXAMINING THE PRESIDENT'S CYBERSECURITY INFORMATION-SHARING PROPOSAL ======================================================================= HEARING BEFORE THE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED FOURTEENTH CONGRESS FIRST SESSION __________ FEBRUARY 25, 2015 __________ Serial No. 114-4 __________ Printed for the use of the Committee on Homeland Security [GRAPHIC NOT AVAILABLE IN TIFF FORMAT] Available via the World Wide Web: http://www.gpo.gov/fdsys/ __________ U.S. GOVERNMENT PUBLISHING OFFICE 94-108 PDF WASHINGTON : 2015 _______________________________________________________________________________________ For sale by the Superintendent of Documents, U.S. Government Publishing Office, http://bookstore.gpo.gov. For more information, contact the GPO Customer Contact Center, U.S. Government Publishing Office. Phone 202-512-1800, or 866-512-1800 (toll-free). E-mail, gpo@custhelp.com. COMMITTEE ON HOMELAND SECURITY Michael T. McCaul, Texas, Chairman Lamar Smith, Texas Bennie G. Thompson, Mississippi Peter T. King, New York Loretta Sanchez, California Mike Rogers, Alabama Sheila Jackson Lee, Texas Candice S. Miller, Michigan, Vice James R. Langevin, Rhode Island Chair Brian Higgins, New York Jeff Duncan, South Carolina Cedric L. Richmond, Louisiana Tom Marino, Pennsylvania William R. Keating, Massachusetts Steven M. Palazzo, Mississippi Donald M. Payne, Jr., New Jersey Lou Barletta, Pennsylvania Filemon Vela, Texas Scott Perry, Pennsylvania Bonnie Watson Coleman, New Jersey Curt Clawson, Florida Kathleen M. Rice, New York John Katko, New York Norma J. Torres, California Will Hurd, Texas Earl L. ``Buddy'' Carter, Georgia Mark Walker, North Carolina Barry Loudermilk, Georgia Martha McSally, Arizona John Ratcliffe, Texas Brendan P. Shields, Staff Director Joan V. O'Hara, General Counsel Michael S. Twinchek, Chief Clerk I. Lanier Avant, Minority Staff Director C O N T E N T S ---------- Page Statements The Honorable Michael T. McCaul, a Representative in Congress From the State of Texas, and Chairman, Committee on Homeland Security: Oral Statement................................................. 1 Prepared Statement............................................. 3 The Honorable Bennie G. Thompson, a Representative in Congress From the State of Mississippi, and Ranking Member, Committee on Homeland Security: Oral Statement................................................. 4 Prepared Statement............................................. 5 Witnesses Ms. Suzanne E. Spaulding, Under Secretary, National Protection and Programs Directorate, U.S. Department of Homeland Security: Oral Statement................................................. 7 Joint Prepared Statement....................................... 9 Ms. Phyllis Schneck, Deputy Under Secretary, Cybersecurity and Communications, National Protection and Programs Directorate, U.S. Department of Homeland Security: Oral Statement................................................. 13 Joint Prepared Statement....................................... 9 Mr. Eric A. Fischer, Senior Specialist, Science and Technology, Congressional Research Service, Library of Congress: Oral Statement................................................. 15 Prepared Statement............................................. 17 For the Record The Honorable Bennie G. Thompson, a Representative in Congress From the State of Mississippi, and Ranking Member, Committee on Homeland Security: Letter......................................................... 25 Appendix Questions From Ranking Member Bennie G. Thompson for Suzanne E. Spaulding and Phyllis Schneck.................................. 47 Questions From Honorable Jim Langevin for Suzanne E. Spaulding and Phyllis Schneck............................................ 48 Question From Ranking Member Bennie G. Thompson for Eric A. Fischer........................................................ 48 Questions From Honorable Jim Langevin for Eric A. Fischer........ 52 EXAMINING THE PRESIDENT'S CYBERSECURITY INFORMATION-SHARING PROPOSAL ---------- Wednesday, February 25, 2015 U.S. House of Representatives, Committee on Homeland Security, Washington, DC. The committee met, pursuant to call, at 12:04 p.m., in Room 311, Cannon House Office Building, Hon. Michael T. McCaul [Chairman of the committee] presiding. Present: Representatives McCaul, Rogers, Barletta, Clawson, Katko, Hurd, Carter, Walker, Loudermilk, McSally, Ratcliffe, Thompson, Jackson Lee, Langevin, Richmond, Payne, Vela, Watson Coleman, and Torres. Chairman McCaul. The Committee on Homeland Security will come to order. First of all, my apologies to the Members and the witnesses. I had a conflict with the--on the Foreign Affairs Committee with the Secretary of State on the authorized use of military force against ISIS, which I think is a very relevant issue to this committee, as well, in terms of dealing with the threat where it exists before it can come into the United States. Anyway, I just want to thank everybody for your patience. I will give this opening statement. Been involved in this issue for quite some time. To Suzanne and Phyllis Schneck, thank you for being here, Dr. Fischer. At the dawn of the digital age, our Nation saw endless opportunities to generate prosperity by expanding our networks and connecting to the world. But today, American prosperity depends as much on defending those networks as it does on expanding them. Every day, our country faces digital intrusions from criminals, activists, terrorists, and nation-states like Russia, China, and Iran. The impact of those intrusions are felt everywhere; from our National security secrets to the personal information of Americans. We cannot tolerate acts of cyber vandalism, theft, or cyber warfare, especially when they put our Nation's critical infrastructure at risk and when they steal American intellectual property and innovations. Accordingly, our Government must play a leading role in combating threats in the digital domain. It is clear that safeguarding American cyber space is one of the great National security challenges of our time. We are confronted almost daily with frightening new precedents, such as North Korea's act on Sony Pictures; a cowardly act meant to intimidate Americans and stifle freedom of expression. This attack came from a nation-state using a digital bomb to target and destroy computer systems here in the United States. Iranian-backed hackers also demonstrated this capability when they attacked Saudi Arabia's national oil company, Aramco, and destroyed 30,000 computers. Iran also targeted and continues to target major U.S. banks to shut down websites and restrict Americans' ability to access their bank accounts. Imagine this type of attack on our gas pipelines or power grids in the northeast. Such assaults on our critical infrastructure could cripple our economy and weaken our ability to defend the United States. These scenarios sometimes sound alarmist. But we must take them seriously, as they grow more realistic every day. Our adversaries are hard at work developing and refining cyber attack capabilities, and they are using them to intimidate our Government and threaten our people in both times of peace and times of conflict. But the threat extends beyond the industrial engines that drive our economies, to the homes of Americans themselves. Criminals and countries alike can use cyber attacks to raid Americans' saving accounts or steal their personal health records. The recent breach of health insurer Anthem illustrates the intrusiveness of these attacks. That assault alone exposed the personal information of up to 80 million people, including the names, birth dates, and Social Security numbers of tens of millions of children. But this is just the latest in a long string of cyber breaches targeting private citizens, a list that includes breaches at Target, Neiman Marcus, Home Depot, and J.P. Morgan. Our adversaries are also seeking to steal secrets from our Government and our most innovative companies. We know that Chinese hackers, for instance, continue to breach Federal networks for the purpose of espionage and attack major U.S. businesses to give themselves a competitive edge in the global economy. Make no mistake, these attacks are costing Americans their time, their money, and their jobs. General Keith Alexander described cyber espionage and the loss of American intellectual property as the greatest transfer of wealth in human history. Sadly, our laws are not keeping up with the threat. For instance, fearing legal liability, many private companies choose not to disclose the threats they see on their own networks, leaving others vulnerable to the same intrusions. We cannot leave the American people and our businesses to fend for themselves. Now more than ever, Congress must take aggressive action. This year I will lead a renewed effort to push cybersecurity legislation through Congress. Last year, the Ranking Member and I in this committee passed five cybersecurity bills. These new statutes lay out the rules of the road on how cyber information will be shared between Government and the private sector so that the two can work together to combat this persistent threat. The laws also provide important protections to ensure Americans' information and civil liabilities are not compromised. But now we must build on that success. We can start by creating a safe harbor, where legal barriers to share cyber threat information are removed and the private sector is encouraged to collaborate. This will allow us to respond to cyber incidents more quickly and effectively and will give Government and private entities the ability to see the threat landscape in real time. I am pleased the President has come forward with a proposal on this important issue. Our solutions must transcend partisan boundaries if we are going to tackle this challenge, and the American people are counting on us. Again, I want to thank the witnesses. I want to thank the Members for their patience here today. [The statement of Chairman McCaul follows:] Statement of Chairman Michael T. McCaul February 25, 2015 At the dawn of the digital age, our Nation saw endless opportunities to generate prosperity by expanding our networks and connecting to the world. But today, American prosperity depends as much on defending those networks as it does on expanding them. Every day our country faces digital intrusions from criminals, hacktivists, terrorists, and nation-states like Russia, China, and Iran. The impacts of those intrusions are felt everywhere--from our National security secrets to the personal information of Americans. We cannot tolerate acts of cyber vandalism, cyber theft, and cyber warfare especially when they put our Nation's critical infrastructure at risk and when they steal American intellectual property and innovation. Accordingly, our Government must play a leading role in combating threats in the digital domain. It is clear that safeguarding American cyber space is one of the great National security challenges of our time. We are confronted almost daily with frightening new precedents, such as the North Korean cyber attack on Sony Pictures--a cowardly act meant to intimidate Americans and stifle freedom of expression. This attack came from a nation-state using a digital bomb to target and destroy computer systems here in the United States. Iranian-backed hackers also demonstrated this capability when they attacked Saudi Arabia's national oil company, Aramco, and destroyed 30,000 computers. Iran also continues to target major U.S. banks to shut down websites and restrict Americans ability to access their bank accounts. Imagine this type of attack on our gas pipelines or power grid in the Northeast. Such assaults on our critical infrastructure could cripple our economy and weaken our ability to defend the United States. These scenarios sometimes sound alarmist, but we must take them seriously as they grow more realistic every day. Our adversaries are hard at work developing and refining cyber attack capabilities, and they are using them to intimidate our Government and threaten our people in both times of peace and times of conflict. But the threat extends beyond the industrial engines that drive our economy to the homes of Americans themselves. Criminals and countries alike can use cyber attacks to raid Americans' savings accounts or steal their personal health records. The recent breach of health insurer, Anthem, illustrates the intrusiveness of these attacks. That assault alone exposed the personal information of up to 80 million people, including the names, birth dates, and social security numbers of tens of millions of children. But this is just the latest in a long string of cyber breaches targeting private citizens--a list that includes breaches at Target, Neiman Marcus, Home Depot, and JP Morgan. Our adversaries are also seeking to steal secrets from our Government and our most innovative companies. We know that Chinese hackers, for instance, continue to breach Federal networks for the purpose of espionage and attack major U.S. businesses to give themselves a competitive edge in the global economy. Make no mistake: These attacks are costing Americans their time, money, and jobs. General Keith Alexander has described cyber espionage and the loss of American intellectual property as the ``greatest transfer of wealth in history.'' Sadly, our laws are not keeping up with the threat. For instance, fearing legal liability, many private companies choose to not disclose the threats they see on their own networks, leaving others vulnerable to the same intrusions. We cannot leave the American people and our businesses to fend for themselves. Now, more than ever, Congress must take aggressive action. This year I will lead a renewed effort to push cybersecurity legislation through Congress. Last year, the Ranking Member and I, and this committee, passed five cyber bills. These new statutes lay out the rules of the road on how cyber information will be shared between Government and the private sector so that the two can work together to combat this persistent threat. The laws also provide important protections to ensure Americans' information and civil liberties are not compromised. But now, we must build on that success. And, we can start by creating a ``safe harbor'' where legal barriers to sharing cyber threat information are removed and the private sector is encouraged to collaborate. This will allow us to respond to cyber incidents more quickly and effectively--and will give Government and private entities the ability to see the threat landscape in real time. I am pleased the President has come forward with a proposal on this important issue. Our solutions must transcend partisan boundaries if we are going to tackle this challenge. The American people are counting on us. I want to thank the witnesses for testifying before this committee and I look forward to your testimony. Chairman McCaul. I now recognize the Ranking Member. Mr. Thompson. Thank you very much, Mr. Chairman. Let me also welcome our witnesses and thank them for their patience on getting started. Earlier, some of us were briefed on some on-going efforts by the Department, Mr. Chairman. I might add, it was very informative. Thank you all very much for doing it. Our hearing today is examining the President's cybersecurity information-sharing proposal. Mr. Chairman, at its core cybersecurity relies on effective information sharing among network operators about indicator, hacks, and cyber vulnerabilities. This committee has been central in its effort to foster better cyber information sharing by producing bipartisan cybersecurity legislation that President Obama signed into law at the end of last year. As you talked about it, the National Cybersecurity Protection Act of 2014 authorizes the National Cyber and Communications Integrity Center, NCCIC, within the Department of Homeland Security as an information-sharing hub for cybersecurity risk and incidents, and erected the NCCIC to provide technical assistance, risk management support, and incident response capabilities to impacted network operators. The legislative proposal that the President unveiled last month has again spurred debate. Importantly, the administration's proposal would require participating companies to comply with certain privacy restrictions, such as removing unnecessary personal information and taking measures to protect any personal information to quality for liability protection. In my view, the President's proposal has some merit. As we go forward, we should consider the following questions: First, what is being shared? Is it just computer code made up of zeros and ones, or does the information contain Americans' sensitive personal data? If it does contain personal data, I believe that reasonable efforts should be made by participating companies to remove personally identifiable information from the information shared with the Government that will help to preserve Americans' privacy. Second, who is doing the sharing? Is it a critical infrastructure operator? Third, where is the sharing happening? The answer to the question has privacy implications, particularly when the sharing is between the Federal Government and the private sector, as opposed to sharing between private-sector companies. I look forward to hearing testimony from our witnesses on the potential risks and rewards of a cyber information-sharing environment dominated by ISAO, as the President envisions. Certainly, I would like to hear how the proposed changes could impact NCCIC. The success of NCCIC is dependent on the companies' seeing the value of proposition for sharing with the Department. I look forward to hearing from the Department on how they intend to drive traffic to the NCCIC and how implementation of a new cyber law is progressing. I would also like to hear more about the new education grant program that the President has proposed. While I am pleased that the President seems to agree about the importance of making this investment in growing our cyber workforce, I am disappointed that the proposal calls for just $5 million a year to be spent over 5 years at 13 historically black colleges and universities and two National laboratories is disappointing, especially in light of a documented shortfall in cyber workforce. Given the billions of dollars spent on cybersecurity, much of which is spent on Federal contractors, I would have expected a more ambitious plan for developing cyber tactics. Before I close, I would like to note that on February 11, together with the Chairman and the leadership of its Senate Homeland Security and Governmental Affairs Committee, we wrote to the President about the new Cyber Threat Intelligence Integration Center. We look forward to a formal response to our questions, particularly as they relate to the NCCIC. I look forward to hearing from our witnesses today and working with the Chairman on forthcoming legislation to help ensure that the networks of our Nation's critical infrastructure are more secure. With that, I yield back. [The statement of Ranking Member Thompson follows:] Statement of Ranking Member Bennie G. Thompson February 25, 2015 Over the past decade, we have witnessed an explosion of internet use in all aspects of life. As a Nation, we do more business on-line than ever before--trillions of dollars a year. For most Americans, smartphones, tablets, and other computers have become the platforms on which we live, work, and play. Unfortunately, these devices and networks have also become targets for bad actors. Last month's cyber attack on the Nation's second-largest health insurer, Anthem, resulted in tens of millions of Social Security numbers, birth dates, addresses, and names being stolen from its database. Given that Anthem insures 7.5 million people in 14 States, the potential damage of this breach is expected to be extensive. Last year's attack on Sony destroyed data, disabled thousands of computers, and exposed the personal information of Sony employees. These attacks underscore that any network that is connected to the internet is a potential victim. The fact that our Nation's critical infrastructure--including the power grid, financial institutions, and health care systems--are all connected to the internet make them particularly attractive targets for attack. Cyber attackers are constantly probing for weaknesses in our critical infrastructure which powers much of our electric grid, financial institutions, and health care systems. The attention that cybersecurity has received in recent years by President Obama and Congress is reflective of the increasing awareness that the responsibility to address this homeland security threat is a collective one. At its core, cybersecurity relies on effective information sharing among network operators about indicators, hacks, and cyber vulnerabilities. This committee has been central in efforts to foster better cyber information sharing by producing bipartisan cybersecurity legislation that President Obama signed into law at the end of last year. The ``National Cybersecurity Protection Act of 2014'' authorizes the National Cybersecurity and Communications Integrity Center (NCCIC) within the Department of Homeland Security as an information-sharing hub for cybersecurity risks and incidents, and directed the NCCIC to provide technical assistance, risk management support, and incident response capabilities to impacted network operators. The legislative proposal that the President unveiled last month has, again, spurred debate. Importantly, the administration's proposal would require participating companies to comply with certain privacy restrictions such as removing unnecessary personal information and taking measures to protect any personal information to qualify for liability protection. In my view, the President's proposal has some merit. As we go forward, we should consider the following questions: First, what is being shared?--Is it just computer code made up of ``zeroes and ones'' or does the information contain Americans' sensitive personal data? If it does contain personal data, I believe that ``reasonable efforts'' should be made by participating companies to remove ``personally identifiable information'' from information shared with the Government. This will help to preserve Americans' privacy. Second, who is doing the sharing?--Is it a critical infrastructure operator? Third, where is the sharing happening?--The answer to that question has privacy implications--particularly when the sharing is between the Federal Government and the private sector, as opposed to sharing between private-sector companies. I look forward to hearing testimony from our witnesses on the potential risks and rewards of a cyber information-sharing environment dominated by ISAOs, as the President envisions. Certainly, I would like to hear how these proposed changes could impact the NCCIC. The success of the NCCIC is dependent on companies seeing the ``value proposition'' for sharing with the Department. I look forward to hearing from the Department on how they intend to drive traffic to the NCCIC and how implementation of the new cyber law is progressing. I would also like to hear more about the new education grant program that the President has proposed. While I am pleased that the President seems to agree about the importance of making this investment in growing our cyber workforce, I am disappointed that the proposal calls for just $5 million a year to be spent over 5 years at 13 Historically Black Colleges and Universities, and two National laboratories, is disappointing. Given the billions of dollars spent on cybersecurity, much of which is spent on Federal contractors, I would have expected a more ambitious plan for developing cyber talent. Before I close, I would like to acknowledge that the committee just met with the President's cybersecurity advisor, Michael Daniel. I appreciate Mr. Daniel's willingness to lay out the administration's vision for cybersecurity and to address our questions, particularly about the newly-announced cyber center that will be housed in the intelligence community. On February 11, together with the Chairman and the leadership of the Senate Homeland Security and Governmental Affairs Committee, we wrote to the President about this new ``Cyber Threat Intelligence Integration Center''. We look forward to a formal response to our questions, particularly as they relate to the NCCIC. In conclusion, I look forward to hearing from our witnesses today and to working with the Chairman on forthcoming legislation to help ensure that the networks of our Nation's critical infrastructure are more secure. Chairman McCaul. Thank the Ranking Member. Chairman now recognizes the--I would like to briefly introduce the witnesses. First, we have the Honorable Suzanne Spaulding. She is the under secretary for the National Protection and Programs Directorate at the Department of Homeland Security. Next, we have Dr. Phyllis Schneck. She is a deputy under secretary for cybersecurity and communications within the National Protection and Programs Directorate at the Department of Homeland Security. It is great to have both of you here today. Finally, we have Dr. Eric Fischer, who is a senior specialist for science and technology at the Congressional Research Service. The witnesses' full statements will appear in the record. The Chairman now recognizes Ms. Spaulding for 5 minutes. STATEMENT OF SUZANNE E. SPAULDING, UNDER SECRETARY, NATIONAL PROTECTION AND PROGRAMS DIRECTORATE, U.S. DEPARTMENT OF HOMELAND SECURITY Ms. Spaulding. Thank you, Chairman McCaul, Ranking Member Thompson, Members of the committee. We are very pleased to be here today to discuss the administration's proposal to enhance cybersecurity information sharing. This proposal recognizes the unique mission and capabilities of the Department of Homeland Security's National Protection and Programs Directorate. It will facilitate information sharing in ways that will significantly advance our National security. By placing the Department's National Cybersecurity and Communications Integration Center, or NCCIC, as the coordination center for receiving and disseminating cyber threat indicator information, which will be very quickly shared. We will receive and disseminate that information to Federal and non-Federal entities. As this committee knows, we are faced with pervasive cyber threats from a variety of actors, including nation-state actors. They are motivated by a range of objectives, including espionage, political and ideological beliefs, and financial gain. The National Preparedness and Protection Directorate focuses on helping our partners across Government and non- Government to manage those cyber risks, to reduce the frequency and impact of cyber incidents, and to build their own capacity. We do this by sharing timely and accurate information and analysis, particularly to enable the private and public-sector partners to protect themselves. This includes detailed analysis about cascading consequences in the physical world that can result from cyber incidents. We provide technology to detect and block cyber threats from impacting the dot.gov networks, the civilian Government networks, and enable those agencies to more readily identify network security issues and prioritize the actions that they must take to address those. We enable commercial cybersecurity companies to use Government-furnished Classified information to better protect their private-sector customers. We provide on-site assistance to critical infrastructure and Federal agencies who have been impacted by a significant cyber incident. We maintain a trusted environment for private-sector partners to share information and to collaborate to address cybersecurity threats and trends. Congress' support for these activities led to the bipartisan action last year to pass critical cybersecurity legislation. That legislation enhanced our ability to work with the private sector and with other Federal civilian departments. As been noted, it strengthened the Department's ability to recruit and to retain the kind of cybersecurity exerts that we now have on-board. Enactment of these bills represents significant progress in the Department's cybersecurity mission. I am very grateful to Congress, to this committee, and particularly to Chairman McCaul and Ranking Member Thompson, who contributed significant efforts to ensure the enactment of this legislation. But we need to keep moving forward. Additional legislation is needed. Carefully updating laws to facilitate cybersecurity information sharing is essential to improving the Nation's cybersecurity. While many companies currently do share cybersecurity information with each other and with the Government under existing laws, there is a growing need to increase the volume and the speed of such information sharing, without sacrificing the trust of the American people or individual privacy and civil liberties. The President's legislative proposal incentivizes private entities to share information with the Government through that National Cybersecurity and Integration Center, or NCCIC, that I mentioned earlier. That is our 24/7 operations and watch center. It brings together currently Government partners from across the Government and the private sector. This is important. The NCCIC's core mission, as stated in this committee's unanimously-passed National Cybersecurity Protection Act, is coordinating and serving as the interface for cybersecurity information across the Government and the private sector. We do this with strong protections in place for protecting privacy and for protecting sensitive business information. Having a single designated entry point into the Government makes it easier to ensure that privacy protections are being consistently applied across the Government. It reduces the complexity for the private sector that wonders where to go. It improves our ability to develop a common operating picture of the cyber threats that we see daily. It helps us to connect the dots, if you will, with regard to cyber threats. I understand that Chairman McCaul has invited Members of this committee to visit and tour our National Cybersecurity Communications Integration Center. I look forward to seeing many of you there and continuing this discussion at that time. Before I close, I would like to reiterate Secretary Johnson's comments on the Department's funding situation. Congress still has not passed a fiscal year 2015 appropriations bill for the Department of Homeland Security. As long as we operate on a continuing resolution, we are hampered by uncertainty and the inability to fund vital new homeland security initiatives. Without funding, NPBD's cybersecurity and critical infrastructure mission will be significantly impacted. Let me end by saying that today, our adversaries can exploit a fundamental asymmetry in our network infrastructure. While nearly all of our systems and networks are globally interconnected, our defensive capabilities are not yet. This gives the attacker a compelling advantage. They can find and exploit weak links in our systems from anywhere around the world at machine speed. By sharing cyber threat indicators in near real time, we can and will reduce that asymmetry. I want to thank you for this opportunity to testify. I look forward to your questions. I turn it over to my cyber deputy, Dr. Phyllis Schneck. [The joint prepared statement of Ms. Spaulding and Ms. Schneck follows:] Joint Prepared Statement of Suzanne E. Spaulding and Phyllis Schneck February 25, 2015 introduction Chairman McCaul, Ranking Member Thompson, and distinguished Members of the committee, we are pleased to appear today to discuss the President's cybersecurity legislative proposal on information sharing. In our testimony today, we will highlight the Department of Homeland Security (DHS) National Protection and Programs Directorate cybersecurity role and capabilities, and describe how the President's legislative proposal to facilitate cyber threat indicator information sharing will further our National security, with DHS's National Cybersecurity and Communications Integration Center (NCCIC) as the coordination center to receive and disclose cyber threat indicators to Federal and Non-Federal entities. the on-going cyber threat and the dhs cybersecurity role As a Nation, we are faced with pervasive cyber threats. Malicious actors, including those at nation-state level, are motivated by a variety of reasons that include espionage, political and ideological beliefs, and financial gain. Increasingly, State, Local, Tribal and Territorial (SLTT) networks are experiencing cyber activity of a sophistication level similar to that seen on Federal networks. To achieve our cybersecurity mission, the National Protection and Programs Directorate focuses on helping our partners understand and manage cyber risk, reduce the frequency and impact of cyber incidents, and build partner capacity. We share timely and accurate information and analysis to enable private and public-sector partners to protect themselves. We provide on-site assistance to Federal agencies and critical infrastructure entities impacted by a significant cybersecurity incident. We provide technology and services to detect and block cyber threats from impacting Federal civilian networks. We enable Federal agencies to more readily identify network security issues and take prioritized action. We enable commercial cybersecurity companies to use Classified information so they can better protect their private-sector customers. We perform comprehensive consequence analyses that assess cross-sector interdependencies and cascading effects, including the potential for kinetic harm that includes loss of life, and we maintain a trusted environment for private-sector partners to share information and collaborate on cybersecurity threats and trends. DHS's National Cybersecurity and Communications Integration Center The NCCIC serves as a 24x7 centralized location for the coordination and integration of cyber situational awareness and incident management. NCCIC partners include all Federal departments and agencies; State, local, Tribal, and territorial governments; the private sector; and international entities. The NCCIC continues to explore opportunities to expand its liaison capacity from other agencies and the private sector. The NCCIC provides its partners with enhanced situational awareness of cybersecurity and communications incidents and risks, and provides timely information to manage vulnerabilities, threats, and incidents. In 2014, the NCCIC received over 97,000 incident reports, and issued nearly 12,000 actionable cyber alerts or warnings. NCCIC teams also detected over 64,000 significant vulnerabilities on Federal and non-Federal systems and directly responded to 115 significant cyber incidents. The NCCIC actively shares cyber threat indicators to and from multiple sources including private-sector partners, the intelligence community, Federal Departments and agencies, law enforcement, State, local, Tribal, and territorial governments, and international governments. This sharing, which has been taking place for many years, takes many forms including person-to-person interactions on the NCCIC floor, manual exchange of information via e-mail and secure web portals, and more recently via automated, machine-to-machine exchanges in STIX and TAXII protocols. While all of these sharing methods have value, the cybersecurity community has recognized the strategic importance of migrating cyber threat indicator sharing to more automated mechanisms when and where appropriate. cybersecurity legislation Last year, Congress acted in a bipartisan manner to pass critical cybersecurity legislation that enhanced the ability of the Department of Homeland Security to work with the private sector and other Federal civilian departments in each of their own cybersecurity activities, and enhanced the Department's cyber workforce authorities. Enactment of these bills represents a significant moment for the Department's cybersecurity mission, and this committee in particular undertook significant efforts to bring the bills to passage. We are thankful for your support and we are deploying those additional authorities with clarity of mission. Additional legislation is needed. We must take additional steps to ensure that DHS is able to rapidly and efficiently deploy new protective technologies across Federal civilian agency information systems. In addition, carefully updating laws to facilitate cybersecurity information sharing within the private sector and between the private and Government sectors is also essential to improving the Nation's cybersecurity. While many companies currently share cybersecurity threat information under existing laws, there is a heightening need to increase the volume and speed of information shared without sacrificing the trust of the American people or the protection of privacy, confidentiality, civil rights, or civil liberties. It is essential to ensure that cyber threat information can be shared quickly among trusted partners, including with law enforcement, so that network owners and operators can take necessary steps to block threats and avoid damage. The NCCIC plays a critical role in the President's recent legislative proposal because its core mission--as articulated in the National Cybersecurity Protection Act, developed by this committee and unanimously passed by the House in December--is to coordinate and serve as an interface for cybersecurity information across the Government and private sector. The Administration's Information-Sharing Proposal for Cyber Threat Indicators Building on the bipartisan cybersecurity legislation enacted last Congress, President Obama visited the NCCIC on January 13, 2015, to announce a proposal for additional legislation to improve cybersecurity information sharing. The President noted, ``Much of our critical infrastructure runs on networks connected to the Internet . . . [a]nd most of this infrastructure is owned and operated by the private sector. So neither Government nor the private sector can defend the Nation alone. It's going to have to be a shared mission--Government and industry working hand in hand, as partners.'' This partnership entails sharing cyber threat indicators to better enable Government agencies and the private sector to protect themselves. Information sharing, especially of these technical ``threat indicators'' that can be used to identify and block malicious activity, is the lifeblood of effective cyber defense and response. Pulling together this information allows defenders to identify anomalies or patterns and recognize dangerous activity before it can do significant damage. The goal of the President's proposal is to increase the sharing of this type of information, as quickly as possible, with appropriate protection for privacy and of sensitive information and systems. Among other things, the administration's proposal would reduce the risks for private entities to voluntarily share technical cyber threat indicators with each other and the NCCIC by providing protections against civil or criminal liability for such sharing. Equally important, the proposal narrowly defines the threat indicators that will be shared, requires that irrelevant identifying information be minimized from these indicators, and generally requires strong protections for the privacy and confidentiality of personal information. Finally, the proposal calls for the creation of Information Sharing and Analysis Organizations (ISAOs). ISAOs would be information sharing organizations that would help speed information sharing within the private sector and between the private sector and Government. Our goal is to expand information sharing within the private sector, and to build on the existing relationships, processes and programs of the NCCIC to enhance cooperation between the Government and private sector. The proposal will help us improve the methods that the NCCIC already uses to share cyber threat indicators, and leverage automation to achieve scalability wherever possible. We look to evolve and expand indicator sharing at the NCCIC from human exchanges, portals, and written reports to automated machine-to-machine communications. Our vision is that this may reduce the time to receive and act on indicators from hours to milliseconds, create consistency in information provided to interagency partners, law enforcement, and the private sector, and free analysts to focus on the threats that require human analysis while expediting detection and blocking of new threats. NCCIC as the Coordination Center Cyber threat indicators, which allow Government agencies and the private sector to better protect themselves, come from a variety of sources, including: Government agencies, private companies, international partners, and ISAOs. Given the variety of formats used-- and information that is included--when sharing such information, the Government must have a central clearinghouse to ensure that privacy and confidentiality protections are consistently applied and that the right information reaches the right Government and private-sector entities. DHS is a leader within the Government when it comes to the development and operational implementation of privacy, confidentiality, and civil liberties policies. DHS was the first agency to have statutorily established Officers for Privacy and for Civil Rights and Civil Liberties. From its creation, DHS has built both privacy and civil liberties protections into all of its programs and has dedicated, on-site privacy professionals committed to ensuring that its cyber mission is carried out in a way consistent with our Nation's values. Through statutory protections like Protected Critical Infrastructure Information (PCII), DHS will continue to anonymize the identity of submitters and other proprietary and sensitive information in threat indicator submissions. Moreover, the President's proposal calls for DHS to build upon its existing privacy, confidentiality, and civil liberty procedures by working with the Attorney General to develop new procedures to appropriately limit Government receipt, use, and retention of threat indicators. Establishing the NCCIC as the primary entry way for cyber threat indicators from the private sector will ensure uniform application of these important privacy and confidentiality protections, while still allowing cyber threat indictors to be shared with law enforcement for the specific purposes identified in the legislation. NCCIC sits at the intersection of cyber communities, with representatives from the private sector and other Government entities physically present on the NCCIC floor and connected virtually. This diverse participation in the NCCIC was cemented by section 226(d) of the Homeland Security Act as added by the National Cybersecurity Protection Act. NCCIC's core mission is to enable better network defense by assessing and appropriately sharing information on the risks to America's critical cyber systems and how to reduce them. building capacity to accelerate automated sharing of cyber threat indicators The administration's proposal directs DHS to automate and share information in as close to real time as practicable with relevant Federal agencies, including law enforcement entities, and with ISAOs. For the past 3 years, DHS has led the development in collaboration with the private sector of specifications--known as STIX and TAXII--which standardize the representation and exchange of cyber threat information, including actionable cyber threat indicators. STIX, the Structured Threat Information eXpression, is a standardized format for the representation and exchange of cyber threat information, including indicators. TAXII, the Trusted Automated eXchange of Indicator Information, is a standardized protocol for discovering and exchanging cyber threat information in STIX. The interagency Enhance Shared Situational Awareness initiative has already chosen STIX as the basis for sharing cyber threat indicators between the Federal cyber centers, ensuring interoperability between these key sources of information. Through collaboration between DHS and the private sector, there is a solid and rapidly-growing base of commercial offerings supporting STIX and sharing indicators via the TAXII, including platforms, network protection appliances and endpoint security tools. While the NCCIC has in-house systems and tools to assist analysts in generating STIX indicators, those indicators are currently analyzed and filtered by human analysts and shared back out with the private sector and Federal partners through manual methods such as e-mail and secure portals. In 2014, the NCCIC began a limited pilot with several organizations to test automated delivery of STIX indicators via TAXII. To inform our plan for achieving automated cyber threat indicator information sharing, DHS created a working group between a range of DHS offices and the FBI, a critical stakeholder in the NCCIC. We also included experts from our Privacy, Civil Rights and Civil Liberties, and Science and Technology offices, among others, to ensure that our architecture is based on best-in-class technology and is consistent with our values and our respect for Americans' privacy and civil liberties. Implementation will proceed through four major phases: (1) An initial operating capability phase in which we will deploy a TAXII system that can disseminate STIX cyber threat indicators with increased automation capability, enabling the use of human analysis for the most complex problems and egregious threats; (2) an expanded automation phase in which we will develop and deploy DHS infrastructure that can receive, filter, and analyze cyber threat indicators--during this phase, we will promulgate guidance for private-sector companies to minimize, redact, and tag their data prior to submission to NCCIC, and will complete a Privacy Impact Assessment; (3) a final operating capability phase in which we will fully automate DHS processes to receive and appropriately disseminate cyber threat indicators in a machine-readable format and finalize policies for filtering, receipt, retention, use, and sharing, including regular compliance reviews; and (4) a scaled services capability phase, during which DHS will work to enable agencies that lack sufficient cybersecurity resources or expertise to receive and share cyber threat indicators with the NCCIC in near-real time by providing a turnkey technical solution to ``plug in'' to the NCCIC. dhs shares information widely with federal agencies and the private sector Currently, DHS shares information with Federal agencies and the private sector. DHS takes a customer-focused approach to information sharing, and different types of information require differing response times and dissemination protocols. DHS provides information to detect and block cybersecurity attacks on Federal civilian agencies and shares information to help critical infrastructure entities in their own protection; provides information to commercial cybersecurity companies so they can better protect their customers through the Enhanced Cybersecurity Services program, or ECS; and maintains a trusted information-sharing environment for private-sector partners to share information and collaborate on cybersecurity threats and trends via a program known as the Cyber Information Sharing and Collaboration Program, or CISCP. This trust derives in large part from our emphasis on privacy, confidentiality, civil rights, and civil liberties across all information-sharing programs, including special care to safeguard personally identifiable information. DHS also directly supports Federal civilian departments and agencies in developing capabilities that will improve their own cybersecurity posture. Through the Continuous Diagnostics and Mitigation (CDM) program, DHS enables Federal agencies to more readily identify network security issues, including unauthorized and unmanaged hardware and software; known vulnerabilities; weak configuration settings; and potential insider attacks. Agencies can then prioritize mitigation of these issues based upon potential consequences or likelihood of exploitation by adversaries. The CDM program provides diagnostic sensors, tools, and dashboards that provide situational awareness to individual agencies, and will provide DHS with summary data to understand relative and system risk across the Executive branch. DHS is moving aggressively to implement CDM across all Federal civilian agencies, and Memoranda of Agreement with the CDM program encompass over 97 percent of all Federal civilian personnel. While CDM will identify vulnerabilities and systemic risks within agency networks, the National Cybersecurity Protection System, also known as EINSTEIN, detects and blocks threats at the perimeter of those networks or at an agencies' Internet Service Provider. EINSTEIN is an integrated intrusion detection, analysis, information-sharing, and intrusion-prevention system. The most recent iteration, Einstein 3 Accelerated (E3A), supplements EINSTEIN 2 by adding additional intrusion prevention capabilities and enabling Internet Service Providers (ISPs), under the direction of DHS, to detect and block known or suspected cyber threats using indicators. conclusion We are working together to find new and better ways to share accurate, timely data in a manner consistent with fundamental American values of privacy, confidentiality, and civil rights. While securing cyberspace has been identified as a core DHS mission since the 2010 Quadrennial Homeland Security Review, the Department's view of cybersecurity has evolved to include a more holistic emphasis on critical infrastructure which takes into account the convergence of cyber and physical risk. Today our adversaries exploit a fundamental asymmetry in our network infrastructure: While nearly all of our systems and networks are globally interconnected, our defensive capabilities are not. This gives the attackers a compelling advantage as they can find and exploit the weak links in our systems from anywhere around the world--at machine speed. By sharing cyber threat indicators in near-real time, we reduce that asymmetry. As our defensive cybersecurity capabilities become more interconnected, we greatly reduce the likelihood that an adversary can re-use attack infrastructure, tools, tactics, techniques, and procedures. In addition, we greatly reduce the time window in which new and novel attacks are effective because the ecosystem shares those indicators and develops a type of ``herd immunity,'' improving defenses as indicators are shared and events are correlated in near-real time. These two factors do not eliminate all cyber threats, but they hold the promise of significantly increasing the time and resources (both technical and human) that attackers must expend to achieve their goals. Moreover, the STIX data format and the TAXII transport method are increasingly compatible with commonly-used commercial information technology (IT) products. This means more entities are able to send indicators automatically to the NCCIC, creating an ecosystem of indicators which will in turn provide greater context to malicious cyber activity and rapidly increase situational awareness per Executive Order 13636, Improving Critical Infrastructure Cybersecurity and Executive Order 13691, signed February 13, 2015, Promoting Private Sector Cybersecurity Information Sharing. DHS will continue to serve as one of the Government's primary resources for information sharing and collaborative analysis, at machine speed wherever possible, of global cyber risks, trends, and incidents. Through our leadership role in protecting civilian Government systems and helping the private sector protect itself, DHS can correlate data from diverse sources, in an anonymized and secure manner, to maximize insights and inform effective risk mitigation. DHS provides the foundation of the U.S. Government's approach to securing and ensuring the resilience of civilian critical infrastructure and essential services. We look forward to continuing the conversation and supporting the American goals of peace and stability; in these endeavors, we rely upon your continued support. Thank you for the opportunity to testify, and we look forward to any questions you may have. Chairman McCaul. Thank you, Ms. Spaulding. We appreciate your service and dedication to this important issue. The Chairman now recognizes Dr. Schneck. STATEMENT OF PHYLLIS SCHNECK, DEPUTY UNDER SECRETARY, CYBERSECURITY AND COMMUNICATIONS, NATIONAL PROTECTION AND PROGRAMS DIRECTORATE, U.S. DEPARTMENT OF HOMELAND SECURITY Ms. Schneck. Good morning and thank you Chairman McCaul, Ranking Member Thompson, and distinguished Members of the committee. Let me echo Under Secretary Spaulding's thanks for convening this meeting today. Thank you for your tireless support to our cyber mission and thank you for making it a constant between my time in the private sector and my time now in Government, the impact that our work and our legislative process can have on good things. The under secretary explained the Department of Homeland Security's role and capabilities in cybersecurity and explained why our National Cybersecurity and Communications Integration Center, our NCCIC, is key and at the forefront of the President's proposal for increasing the volume and speed of information sharing. I would like to amplify that and tell you how we are going to do this and how we are building that capability. First, to the Ranking Member's question; what is being shared and what do we need most? We need information sharing and especially the technical threat indicators; the bare bones information of, for example, what is an address of a machine that is doing something bad that we see? What is the specific code of software that is being sent to hurt good people? By identifying these indicators, that is the life blood of cyber defense; by being able to very quickly recognize them and put them together. Pulling together this information, it builds on the rules of statistics. We have to understand good behavior and bad behavior to identify anomalies. Identifying those anomalies at the speed of machines will help us in our cyber defense initiatives. The President's proposal defines the kind of information, specifically, that can be shared and requires very strong protections around privacy and civil liberties to protect our personal information and protect those privacy and civil liberties and American ways of life that we seek to protect and defend through our cybersecurity mission. The proposal narrowly defines categories of technical information used to define and mitigate these threats so that we can then pull them together. But it does not, for an example, include exfiltrated information; which means the information, for example, that someone might have tried to steal, which could include proprietary information or someone's private information. So very narrowly-defined information on what we need to share and share quickly. The President's ISAO Executive Order will enhance the information-sharing efforts. The order focuses specifically on encouraging the formation effectiveness of information sharing and analysis organizations. They can be profit or nonprofit, private sector, and they can be composed of any combination of public and private sectors. The Executive Order directs DHS to strongly encourage the development of these formations to bring people together in trusted relationships to share information that transcends competition to enable those cyber threat indicators to come together and show us, again at machine speed, what enemy might be trying to hurt our systems and be able to see at that 50,000-foot level all over the world what actions are happening dispersed that we could use to protect somebody right now. DHS--this is a very important point--is already sharing information in real time with Federal agencies and the private sector. We share with people and machines using people and machines. We provide information to detect and block cybersecurity threats to our Federal civilian government agencies and, as the under secretary mentioned, within that, using Government-Classified information. We also provide information to commercial companies so that they can better protect themselves as well, also with some systems using that Classified information. We maintain key trusted information-sharing partnerships at a scientist level and at policy levels with parts of the private sector so we can enable us--ourselves and them to understand what is the science and what are the key things we need to be looking for? So trust between people and machines. Where are we going and why is this so important? We need to up our game to automate. We need to take the machines and remember that machines are not smart, they are just fast, and use that very machine speed that the adversary uses to steal and hurt us in our cyber systems and use that machine to understand what is happening all over the world and enable our machines in addition to other technologies to sense bad behavior before it hurts. In doing that, part of that is pulling those automated cyber threat indicators together so that we can start looking at behavior all over the world and work--and this is very, very important--in partnership. So no one can do this alone. We need DHS, we need the FBI, we need the Secret Service, we need the intelligence community, and we need the private sector. I thank you, Chairman, as well for all the work you have done with the private sector to engage them with your committee and how important it is to work with Government. We have developed a common language and a common way of writing cyber threat indicators so that anyone who wants to share with us can, that can be transported at machine speed, and that machines can readily read the information; and it limits itself to what is required to be a cyber threat indicator. We need to continue to work with our privacy and civil liberties experts constantly; with the FBI, with the Secret Service, with law enforcement, with the intelligence community to manage all the expectations and all of the equities. But we are building protocols and structured language to equalize and normalize with what a cyber threat indicator is, to have the machines get a lot of the noise out of the way so our top minds can look at the most egregious threats, and to have our networks become more self-healing and more resilient. Finally, I would like to reemphasize the importance of our NCCIC, our National Cybersecurity Communications Integration Center, and point out that that is the interface for sharing cyber information across the Government and private sector. But we do this in clear cooperation, and as we develop these protocols, it is with the Secret Service and the FBI and all the law enforcement and the intelligence community and the private sector. This can't work if we do it alone. It has to respect everyone's equities and all privacy and civil liberties. Having that single designated entity in the Government reduces complexity, as the under secretary stated and streamlines our ability to develop that common picture of the threats we see daily. Thank you for this opportunity to testify. I look forward to any questions you might have. Chairman McCaul. Thank you. Just let me say that you have really done an outstanding job standing up the NCCIC, bringing the capabilities of the NCCIC to the current threats that we have. Your experience at McAfee is well-served. I thank the Department. With that, the Chairman now recognizes Dr. Fischer. STATEMENT OF ERIC A. FISCHER, SENIOR SPECIALIST, SCIENCE AND TECHNOLOGY, CONGRESSIONAL RESEARCH SERVICE, LIBRARY OF CONGRESS Mr. Fischer. Good afternoon, Chairman McCaul, Ranking Member Thompson, and distinguished Members of the committee. On behalf of the Congressional Research Service, I would like to thank you for the opportunity to testify today on information sharing and cybersecurity. Barriers to sharing of cybersecurity information are considered by many, as we heard, to be a significant hindrance to effective protection of information systems. That is especially true for critical infrastructure, even though most recent prominent cases of successful cyber attacks have not involved such organizations. Many examples have been cited of legal, technical, and other barriers. In addition, traditional approaches to security and confidentiality would themselves impede sharing of information. There is some disagreement among experts about whether Federal legislation is needed. Nevertheless, there appears to be a fairly broad consensus that legislation could be useful if crafted appropriately. However, there is disagreement also about what the key characteristics should be. Proposals to reduce or remove barriers have raised concerns, some of which are related to the purpose of the barriers; that the barriers are thought to currently impede sharing. A key challenge appears to be how to achieve the proper level of balance that fosters the sharing of useful information efficiently and effectively, while ensuring avoidance of adverse impacts. I will touch on five questions that the debate has tended to focus on. Question No. 1: What are the kinds of information for which barriers to sharing make effective cybersecurity more difficult? Information sharing can involve a wide variety of materials communicated on a wide variety of time scales. The level of sensitivity of information can vary. For example, it may be Classified, proprietary, or personal, or open public information. Information of any class will also vary in its value for cybersecurity and the degree to which it needs human processing to be useful. To the extent that the goal of information sharing is to defend information systems against cyber attacks, the focus has been on actionable information. Such information may often need to be shared very quickly, as Dr. Schneck has mentioned, with little or no time for human examination. Broader information contributing to shared situational awareness may also be useful; for example, among companies within a sector. Such information might not be technically actionable, but helps organizations to analyze their current security postures and inform their responses. A key point is that addressing what should be shared, how and when, is not as straightforward as it may seem. This is true not only for cybersecurity information, but more broadly with security information. Question No. 2: How should information sharing be structured to ensure that it is efficient and effective? Information sharing can conceivably lead to information overload. That can include not only information of uncertain quality and use, but also similar or redundant information from a variety of sources. Various legislative proposals have approached the structure information sharing differently. The White House proposal would use information sharing and analysis organizations, which were created in the Homeland Security Act, but few of which appear to exist today. It might be useful to clarify the roles of these and other entities as the committee considers legislation. Question No. 3: What are the risks to privacy rights and civil liberties of individual citizens, and how are they best protected? Such concerns have been a significant source of controversy and debate about information sharing and legislation. They have arisen in part because proposals would permit sharing of specific information or specified information by covered private entities, notwithstanding any other provision of law. That particular phrase has certain implications that would be worthy of--perhaps of additional consideration. Now, the various legislative proposals address privacy concerns in various ways, but there are also many similarities among them. Fourth question is: What, if any, statutory protections against liability are needed? Concerns about liability has often been cited as a significant barrier to private-sector information sharing, both with other private entities and with the Federal Government. There are--in addition to the notwithstanding provisions, there are also various proposals to prohibit court actions to protect organizations against such actions--or against liability concerns and reduce that barrier. The fifth question, finally, is: What improvements to current standards and practices are needed to ensure that information sharing is useful and efficient for protecting information systems, networks, and their contents? As the other witnesses have testified, standards for exchange of threat data have been developed and their use is growing. But there are also calls for additional standards and best practices. There are some concerns among observers that such work is needed, particularly with respect to--well, for example, evaluating the effectiveness of information sharing. That concludes my testimony. Once again, thank you for asking me to appear before you today. [The prepared statement of Mr. Fischer follows:] Prepared Statement of Eric A. Fischer February 25, 2015 Chairman McCaul, Ranking Member Thompson, and distinguished Members of the committee: Thank you for this opportunity to discuss legislative proposals on information sharing in cybersecurity.\1\ In January of this year, the White House announced a revision of its 2011 information-sharing proposal as part of a set of updated proposals and other actions relating to cybersecurity:\2\ --------------------------------------------------------------------------- \1\ This statement is limited to a policy analysis of the proposals and initiatives discussed and is not intended to reach any legal conclusions regarding them. \2\ The White House, ``Securing Cyberspace: President Obama Announces New Cybersecurity Legislative Proposal and Other Cybersecurity Efforts,'' Press Release (January 13, 2015), http:// www.whitehouse.gov/the-press-office/2015/01/13/securing-cyberspace- president-obama-announces-new-cybersecurity-legislat. ---------------------------------------------------------------------------A draft bill to enhance information sharing on cybersecurity within the private sector and between the private sector and the Federal Government. Most of my testimony today will focus on this proposal and related bills in the 113th and 114th Congresses.\3\ --------------------------------------------------------------------------- \3\ The White House, Updated Information Sharing Legislative Proposal, 2015, http://www.whitehouse.gov/sites/default/files/omb/ legislative/letters/updated-information-sharing-legislative- proposal.pdf. --------------------------------------------------------------------------- A draft bill to amend Federal statutes relating to cyber crime by creating or increasing criminal penalties for certain types of offenses and providing some other authorities to law- enforcement agencies and the courts.\4\ --------------------------------------------------------------------------- \4\ The White House, Updated Administration Proposal: Law Enforcement Provisions, 2015, http://www.whitehouse.gov/sites/default/ files/omb/legislative/letters/updated-law-enforcement-tools.pdf. --------------------------------------------------------------------------- A draft bill to harmonize State laws requiring companies holding personal information on customers to notify them of data breaches involving such information.\5\ --------------------------------------------------------------------------- \5\ The White House, The Personal Data Notification & Protection Act, 2015, http://www.whitehouse.gov/sites/default/files/omb/ legislative/letters/updated-data-breach-notification.pdf. --------------------------------------------------------------------------- A 5-year, $25 million grant to create a new cybersecurity consortium consisting of 13 Historically Black Colleges and Universities (HBCUs), the Lawrence Livermore and Sandia National Laboratories of the Department of Energy, and a South Carolina school district. The object of the program is to help fill demand for cybersecurity professionals while diversifying the pipeline of talent for this and related fields of expertise.\6\ This program can be seen as a complement to legislation enacted by the 113th Congress that addresses cybersecurity workforce needs in the Department of Homeland Security \7\ (DHS) and more broadly.\8\ --------------------------------------------------------------------------- \6\ The White House, ``Vice President Biden Announces $25 Million in Funding for Cybersecurity Education at HBCUs,'' Press Release (January 15, 2015), http://www.whitehouse.gov/the-press-office/2015/01/ 15/vice-president-biden-announces-25-million-funding-cybersecurity- educatio. \7\ H.R. 2952, the Cybersecurity Workforce Assessment Act (Pub. L. No. 113-246), and S. 1691, the Border Patrol Agent Pay Reform Act of 2014 (Pub. L. No. 113-277), requiring assessments of workforce needs within the Department of Homeland Security and providing enhanced authorities to the Secretary for recruitment and retention of cybersecurity personnel. \8\ S. 1353, the Cybersecurity Enhancement Act of 2014 (Pub. L. No. 113-274), establishing in statute a National Science Foundation program for educating cybersecurity professionals for Government agencies, and an interagency program of challenges and competitions in cybersecurity to stimulate identification and recruitment of cybersecurity professionals more broadly as well as cybersecurity research and innovation. --------------------------------------------------------------------------- The announcement also included a description of the White House cybersecurity summit held on February 13 at Stanford University. Barriers to the sharing of information on threats, attacks, vulnerabilities, and other aspects of cybersecurity--both within and across sectors--have long been considered by many to be a significant hindrance to effective protection of information systems, especially those associated with critical infrastructure.\9\ Examples have included legal barriers, concerns about liability and misuse, protection of trade secrets and other proprietary business information, and institutional and cultural factors--for example, the traditional approach to security tends to emphasize secrecy and confidentiality, which would necessarily impede sharing of information. --------------------------------------------------------------------------- \9\ See, for example, The Markle Foundation Task Force on National Security in the Information Age, Nation At Risk: Policy Makers Need Better Information to Protect the Country, March 2009, http:// www.markle.org/downloadable_assets/20090304_mtf_report.pdf; CSIS Commission on Cybersecurity for the 44th Presidency, Cybersecurity Two Years Later, January 2011, http://csis.org/files/publication/ 110128_Lewis_CybersecurityTwoYearsLater_Web.pdf. --------------------------------------------------------------------------- A few sectors are subject to Federal notification requirements,\10\ but most such information sharing is voluntary, often through sector- specific Information Sharing and Analysis Centers (ISACs)\11\ or programs under the auspices of the Department of Homeland Security (DHS) or sector-specific agencies.\12\ --------------------------------------------------------------------------- \10\ Notable examples include the chemical industry, electricity, financial, and transportation sectors. \11\ See, for example, ISAC Council, ``National Council of ISACS,'' 2015, http://www.isaccouncil.org/. ISACs were originally formed pursuant to a 1998 Presidential Directive (The White House, ``Presidential Decision Directive 63: Critical Infrastructure Protection,'' May 22, 1998, http://www.fas.org/irp/offdocs/pdd/pdd- 63.htm). \12\ See also CRS Report R42114, Federal Laws Relating to Cybersecurity: Overview and Discussion of Proposed Revisions, by Eric A. Fischer; CRS Report R42409, Cybersecurity: Selected Legal Issues, by Edward C. Liu et al.; CRS Report R42984, The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress, by Eric A. Fischer et al.; CRS Report R4381, Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis, by N. Eric Weiss. --------------------------------------------------------------------------- While there is some disagreement among experts about whether Federal legislation is needed to address the problem, there appears to be fairly broad consensus that such legislation could be useful if crafted appropriately but potentially harmful if not. However, there is disagreement about what the key characteristics of useful legislation would be. Proposals to reduce or remove such barriers, including provisions in legislative proposals in the last two Congresses, have raised concerns, some of which are related to the purpose of barriers that currently impede sharing. Examples include risks to individual privacy and even free speech and other rights, use of information for purposes other than cybersecurity, such as unrelated Government regulatory actions, commercial exploitation of personal information, or anticompetitive collusion among businesses that would currently violate Federal law. More broadly, debate has tended to focus on questions such as the following: 1. What are the kinds of information for which barriers to sharing exist that make effective cybersecurity more difficult, and what are those barriers? 2. How should information sharing be structured in the public and private sectors to ensure that it is efficient and effective? 3. What are the risks to privacy rights and civil liberties of individual citizens associated with sharing different kinds of cybersecurity information, and how can those rights and liberties best be protected? 4. What, if any, statutory protections against liability are needed to reduce disincentives for private-sector entities to share cybersecurity information with each other and with Government agencies, and how can the need to reduce such barriers best be balanced against any risks to well-established protections? 5. What improvements to current standards and practices are needed to ensure that information sharing is useful and efficient for protecting information systems, networks, and their contents? The White House information-sharing proposal would attempt to address such questions in several ways. The discussion below includes a summary of how the proposal would address them in comparison to the following bills addressing information sharing: H.R. 234, the Cyber Intelligence Sharing and Protection Act (CISPA), in the 114th Congress, identical to H.R. 624 as passed by the House in the 113th Congress; S. 2588, Cybersecurity Information Sharing Act of 2014 (CISA) as reported to the Senate in the 113th Congress; S. 456, the Cyber Threat Sharing Act of 2015, as introduced in the 114th Congress. kinds of information shared Information sharing can involve a wide variety of material communicated on a wide range of time scales, ranging from broad cybersecurity policies and principles to best practices to descriptions of specific threats and vulnerabilities to computer-generated data transmitted directly from one information system to another electronically. The level of sensitivity of information can also vary-- for example, it may be Classified, proprietary, or personal. Information of any class will also vary in its value for cybersecurity and the degree to which it needs human processing to be useful.\13\ --------------------------------------------------------------------------- \13\ See, for example, Kathleen M. Moriarty, ``Transforming Expectations for Threat-Intelligence Sharing,'' RSA Perspective (August 3, 2013), https://www.emc.com/collateral/emc-perspective/h12175-transf- expect-for-threat-intell-sharing.pdf. --------------------------------------------------------------------------- To the extent that the goal of information sharing is to defend information systems against cyber attacks, there appears to be a consensus that shared information needs to be actionable--that is, it should identify or evoke a specific response aimed at mitigating cybersecurity risks. To be meaningfully actionable, information may often need to be shared very quickly or even in an automated fashion. There may therefore be little or no time for human operators to examine a specific parcel of data to determine whether sharing it could raise privacy, liability, or other concerns. The White House proposal would limit the scope of shared information covered under the proposal to ``cyber threat indicators,'' which includes information needed to ``indicate, describe, or identify'' malicious reconnaissance or command-and-control activities, methods of social engineering and of defeating technical or operational controls, and technical vulnerabilities, and from which ``reasonable efforts'' have been made to remove personally identifying information if the person is thought to be unrelated to the threat. The definition in S. 456 is largely identical. The definition in the White House proposal and S. 456 are arguably the narrowest in scope. S. 2588 also focuses on ``cyber threat indicators,'' with a definition that is similar to that in the White House proposal, but is somewhat broader, including other attributes, such as the actual or potential harm caused by an incident. It also expressly permits sharing of information on countermeasures--measures to prevent or mitigate threats and vulnerabilities. H.R. 234 uses the term ``cyber threat information,'' characterized as information ``directly pertaining to'' efforts to gain unauthorized access to information systems or to effect negative impacts on systems or networks, threats to the information security of a system or its contents, and vulnerabilities of systems and networks. The bill also defines a related term, ``cyber threat intelligence,'' with characteristics similar to those of cyber threat information but is in the possession of the intelligence community. structure of information sharing Information sharing can conceivably lead to information overload, where an entity receives much more information than it can reasonably process. That could include not only information of uncertain quality and use, but also similar or redundant information from a variety of sources. In addition, a proliferation of sharing mechanisms could lead to stovepiping, which could reduce sharing across sectors, for example, and lack of clarity with respect to responsibilities, which could lead to gaps in sharing useful information. In contrast, a narrow, tightly- defined structure for information sharing could lead to logjams or impede innovation in response to continuing evolution of cyberspace. The White House proposal and S. 456 would create a structure for information sharing that includes the National Cybersecurity and Communications Integration Center (NCCIC) as the Federal hub for receipt and distribution of cybersecurity information, and fostering the use of private information sharing and analysis organizations (ISAOs) as recipients of information from private entities.\14\ ISAOs could presumably also share such information under the provisions of the Homeland Security Act, but the proposal does not specifically address that function for them. The proposal would require the DHS Secretary to ensure that indicators are shared in a timely fashion with other Federal agencies. S. 456 would require that procedures for such sharing be established and would specifically require the Secretary to ensure that both useful Classified and Unclassified information is shared with non-Federal entities. --------------------------------------------------------------------------- \14\ ISAOs were defined in the Homeland Security Act (6 U.S.C. 131(5)) as entities that gather and analyze information relating to the security of critical infrastructure, communicate such information to help with defense against and recovery from incidents, and disseminate such information to any entities that might assist in carrying out those goals. The proposal covers receipt of indicators by ISAOs but does not mention communication or dissemination of information by them, except, by inference, to the NCCIC. Information Sharing and Analysis Centers (ISACs) are more familiar to most observers. They may also be ISAOs but are not the same, having been originally formed pursuant to a 1998 Presidential directive (The White House, ``Presidential Decision Directive 63: Critical Infrastructure Protection,'' May 22, 1998, http://www.fas.org/irp/offdocs/pdd/pdd-63.htm). --------------------------------------------------------------------------- H.R. 234 would create an entity at DHS (presumably the NCCIC \15\) to share threat information and an entity at the Department of Justice to share cyber crime information. It would require individual agencies that receive threat information to develop procedures for sharing it. In contrast to S. 456, it would require the Director of National Intelligence to establish procedures for sharing Classified threat information. It would also designate specific classes of private-sector entities as those permitted to monitor systems and share threat information under the bill. Those include entities that provide cybersecurity goods and services to others or to themselves. --------------------------------------------------------------------------- \15\ The text in the bill was originally drafted before the enactment of the National Cybersecurity and Communications Integration Center Act of 2014 (Pub. L. No. 113-282), which established the NCCIC by statute. --------------------------------------------------------------------------- S. 2588 would require DHS to create a ``capability and process'' for sharing both threat indicators and countermeasures. It would establish an interagency process to develop procedures for sharing Federal information with the private sector. It would require development of an interagency process for sharing Classified threat indicators. timeliness of sharing The time scale on which shared information will be most useful varies. That is especially an issue in an environment where the relevance of timing for shared information may be measured in seconds or even milliseconds in many cases.\16\ The White House proposal and S. 456 would address this concern by requiring the NCCIC to share indicators ``in as close to real time as practicable'' and by requiring establishment of a program to advance automated mechanisms for such sharing. --------------------------------------------------------------------------- \16\ See, for example, M.J. Herring and K.D. Willett, ``Active Cyber Defense: A Vision for Real-Time Cyber Defense,'' Journal of Information Warfare 13, no. 2 (April 2014): 46-55. --------------------------------------------------------------------------- H.R. 234 and S. 2588 would also require ``real-time sharing.'' The meaning of this term is not explicitly defined or described in the bills, but it presumably refers to sharing that occurs rapidly, for example, by machine-to-machine transmission. That is consistent with the stated purposes of the legislative proposals, in that threat information would likely need to be disseminated quickly in order to detect or prevent incoming cyber attacks, which can occur very quickly. This raises the question of whether this term should require any particular mode of sharing, for example, by machine-to-machine transmission without or with minimal intervening processing by human operators, and how different interpretations of the term may impact operational effectiveness, privacy interests, and competition for technical and financial resources. The White House proposal appears to address that through its proposed development of automated mechanisms, and S. 2588 would require development of a process to receive indicators and countermeasures electronically, including via an ``automated process between information systems.'' privacy and civil liberties Concerns relating to privacy and civil liberties, especially the protection of personal and proprietary information and uses of shared information, have been a significant source of controversy in debate about information-sharing legislation. Such concerns have arisen in part because the White House proposal and the bills would permit sharing of specified cybersecurity information by covered private entities ``notwithstanding any other provision of law.'' That would arguably remove barriers to sharing stemming from concerns that information would inadvertently violate laws such as those on privacy and anti-trust. However, it also raises concerns about privacy and civil liberties. In particular, personally identifying information might be included in the shared information but might not be related to the threat. In addition, data analytics might conceivably be used to draw inferences about identity from data sets even if any given piece of the shared information would not be identifying. Second, if access to shared information is not strictly controlled and restricted, or is used for purposes other than cybersecurity, risks to civil liberties may arise. Concerns have also been raised about regulatory use of shared information and disclosure of proprietary business information. The White House proposal would address such concerns by: limiting application of the ``notwithstanding'' provision to indicators disclosed to the NCCIC and ISAOs; limiting private-sector use of shared indicators to purposes relating to protection of information systems and their contents; requiring minimization of personally identifiable information and safeguarding of any such information that cannot be removed; requiring development of guidelines by the Attorney General on limiting the acquisition and sharing of personally identifiable information and establishing processes for anonymization, safeguarding, and destruction of information; exempting information received by the Federal Government from disclosure under the Freedom of Information Act; prohibiting use of shared information for regulatory enforcement; requiring penalties for Federal violations of its restrictions relating to information sharing; and an annual report to Congress on privacy and civil liberties. S. 456 includes those provisions but would also permit a private entity to receive indicators under the ``notwithstanding'' provision. H.R. 234 and S. 2588 have related provisions except as follows: Both bills explicitly limit Federal use of shared information to cybersecurity purposes and uses relating to protection of individuals and investigation and prosecution of cyber crimes and certain other offenses. They both require various activities to reduce the degree to which personal information is shared and other means of safeguarding it from unauthorized sharing and use. H.R. 234 requires that guidelines be developed through an interagency process. liability protections Concern about liability has often been cited as a significant barrier to private-sector sharing of cybersecurity information, both with other private entities and with the Federal Government. In addition to the protections granted by the use of ``notwithstanding any other provision of law'' with respect to provision of information by private-sector entities, the White House proposal would address this issue by prohibiting civil or criminal actions in Federal or State courts for covered activities with respect to lawfully obtained cyber threat indicators disclosed to or received from the NCCIC or a certified ISAO. However, it also specifies monopolistic actions such as price fixing that are not permitted. The prohibition on civil or criminal actions in H.R. 234 covers acquisition and sharing of cyber threat information, or decisions for cybersecurity purposes based on such information. The bill stipulates that actions must be taken in good faith. The S. 2588 prohibition covers only private defendants, and includes monitoring systems or sharing information. S. 2588 states that a good-faith reliance that an activity was permitted under the bill's provisions will serve as a complete defense against any court action. It also stipulates that private-sector exchange of cyber threat information or assistance for cybersecurity purposes does not violate anti-trust laws, but further specifies monopolistic actions such as price-fixing that are not permitted. improvements to standards and practices The concerns discussed above about what information would be most useful to share and how raise the question of whether better standards and best practices are needed for improving the effectiveness and efficiency of information sharing.\17\ The White House proposal and S. 456 would require the DHS Secretary to establish a process for selecting a private entity that would determine best practices for creating and operating private ISAOs. The recent Executive Order on information sharing has a similar provision.\18\ There are no similar provisions in the other bills. --------------------------------------------------------------------------- \17\ See, for example, Moriarty, Transforming Expectations for Threat-Intelligence Sharing. \18\ Executive Order 13691, ``Promoting Private Sector Cybersecurity Information Sharing,'' Federal Register 80, no. 34 (February 20, 2015): 9349-53. Chairman McCaul. Thank you, Dr. Fischer. I now recognize myself for questions. Ms. Spaulding, I think as you mentioned, we have extraordinary offensive capabilities that we--you and I have seen and Dr. Schneck. That kind of capability turned against us could be very destructive. It is the defensive capability that I think is where we are trying to improve here through additional legislation. I am very proud of this committee's work last Congress in passing really the first cybersecurity legislation, landmark cybersecurity legislation, that I think the Ranking Member--I can speak for him as well--is both pro-security but pro- privacy. We had that support from two groups that don't always agree on how to get things done. Mr. Thompson. Oh, really? Chairman McCaul. Well, I am not talking about you. I am talking about the pro-privacy and pro-security. You know, as I have studied this--and I have studied it extensively--it seems to me that there is--the Department of Homeland Security is really the ideal place for the safe harbor. It is the civilian interface to the private sector. It also has a robust privacy office and can protect personal information. Some would argue it should be another portal in the Federal Government. I think that the safe harbor at DHS is--again, should be the lead portal, if you will, for the sharing of this information. But there are other opinions on that. I wanted to elicit first from Dr. Schneck and Ms. Spaulding, what are your thoughts on how to integrate the other portals that exist today? We have, of course, NSA, the intelligence community, we have Treasury Department that the financial world, as I talk to people in that sector seem to--they like that portal, as well. I know that you would be taking it--you know, information from the intelligence community, FBI, and other agencies to basically funnel that threat information through the DHS civilian interface. But can you speak to these other portals and how they factor into the President's proposal and what do you think would be the best idea here? Ms. Spaulding. Yes, thank you, Mr. Chairman. First, I think it is really important to emphasize what this legislation does and does not cover. So this is narrowly focused on network defense and the kind of information that is most important for specifically defending networks; and that is this cyber threat indicator information. It is in no way intended to get in the way of existing relationships that companies might have today with other parts of the Federal Government, whether it is the FBI or Treasury or elsewhere in the Federal Government. Calls to say we think we see something odd going on in our system should continue to be made wherever those companies are most comfortable going in. We have mechanisms in place to ensure that a call to one is effectively and appropriately a call to all; and that we put together the appropriate interagency teams to respond to those kinds of requests for assistance and information coming in. So this is by no means intended to cover all kinds of information sharing between the private sector and the Government. Those relationships are very important. Chairman McCaul. I think that is an important point. As I talk to the private sector--and it is very important to me to have their buy-in on this--I think that is a very important point to make; is that we are not saying you can't have contact with these other portals. It is just that DHS is, you know, the lead interface. Dr. Schneck, do you have any thoughts on that? Ms. Schneck. I would only add at a technical level, we are working day in and day out with our---- Ms. Spaulding. Push to talk. Ms. Schneck. Sorry. At a technical level, we are working constantly with our peers, across with the FBI and with the Secret Service and with the intelligence community to look at how do we make sure that information that comes in is handled and distributed exactly the right way in real time, as if it had come into them, so that we can have it. The important thing here is that it is not a fragmented weather map, if you would. The way to see a tornado--and I used to work tornado modeling. The way you do this is to see all the information at once. That is one of the key reasons why we think this is so important, to have the NCCIC do this. But we are working constantly with our partners to make sure that no one is deprived of any information. That is what takes so long. It is not just a technology problem. This is a policy puzzle of how do we preserve the privacy, civil liberties, and equities, continue to maintain all the existing relationships and make sure information gets to the right people at the right time at light speed. Chairman McCaul. Let me just echo the comments made earlier, and that is that in the last 5 years, I have seen the capabilities at Homeland Security go way up. The sharing of this threat information in real time has increased exponentially, I think, under your leadership. That makes a difference. Because there were doubters, you know, 5 years ago about whether DHS could stand up and have that capability. I think you have demonstrated and proved that they can. So last question. Well, I have two quick ones. But on the liability protection, I commend the Secretary for coming forward with this piece. It is sometimes a bone of contention between both sides of the aisle. But I think it is absolutely essential to incentivize the private sector to participate in the safe harbor; for without that, they will not do so. I think they have to have the assurance that if they share information, they are not open to a lawsuit. So I have talked to the private sector. They like the liability protections that are presented here. I think they have some concern about private-to-private sharing and the certification process and all this. How would that work under this proposal? Ms. Spaulding. So the liability protections, as you know, apply not only to sharing of these cyber threat indicators with the NCCIC, with the Department of Homeland Security, but also to sharing with these information sharing and analysis organizations, these--we call them ISAOs. Many of those are the ISACs that exist today for the various sectors; the financial services ISAC, the multi-State ISAC, and others. So what the legislation provides is that the private sector can share among themselves through these appropriate organizations and enjoy the same liability protection for providing that information to those organizations. Chairman McCaul. I think the safe harbor at DHS is a construct within--where we want to incentivize most of the sharing of information. But I do think the private sector's private-to-private sharing also should be protected as well. We can discuss that more as this legislation unfolds. Last question. I get asked this question probably the most. That is, you know, what keeps you up at night? I talk about cybersecurity quite a bit. But within this space, to both Ms. Spaulding and Dr. Schneck, what keeps you up at night the most? Ms. Spaulding. So clearly, what I worry most about is cyber activity that would significantly disrupt our critical infrastructure. So we spend a lot of time thinking about those consequences and making sure we understand interdependencies within the physical world. Because this is not just about protecting machines, this is about protecting our ways of life. So we need to make sure that we understand what are those consequences that would be most devastating, and that we are working most closely with those parts of our critical infrastructure to make sure that we can mitigate those consequences and try to prevent, as Dr. Schneck said, bad things--bad things from doing bad harm. Chairman McCaul. Thank you. Dr. Schneck. Ms. Schneck. Thank you. I would echo the interface of the physical world. No one ever tried to keep a machine safe to keep a machine safe. Our job at Homeland Security is to keep people safe. The Secretary always tells us that cybersecurity is a key part of homeland security. Another piece that really does keep me up at night as well is our small-to-medium business and our State and local. They don't typically have enough budget to focus on cybersecurity. Part of the elegance that will come from our teamwork with our partners and the FBI and the intelligence community and across the private sector and Government is to pull those threat indicators together to be able to, in final phases, make them available to the greater 99 percent of our business fabric that is not a big company and to our State and locals, and to have that system learn by participating and make all of us smarter and safer. If I would just add, I thank you for your gracious comments about my leadership earlier. I think about the team back at the NCCIC and back across DHS that really makes it happen, and I want you to know about that. I walked into the finest team on the planet. Chairman McCaul. Well, thank you. Your boss just arrived. I want to recognize the Secretary. I will reiterate my comments about Ms. Spaulding and Dr. Schneck and their tremendous performance in standing up DHS with the capabilities with the respect it deserves, and I think the ability to move forward with the proposal from you, sir. I also commended you before you came in on your proposal of liability protection, which I think will incentivize the private sector to fully participate in this safe harbor. So thank you for your leadership. You got two really good employees right here. So with that, the Chairman now recognizes the Ranking Member. Mr. Thompson. Thank you, Mr. Chairman. Very rarely do we agree 100 percent on anything. But the two employees referenced here today absolutely have distinguished themselves. Not just here, but in their careers in general. I would like unanimous consent to have entered into the record the letter that you co-authored with me and our colleagues on the Senate to the President referencing some concerns we had about the new cyber center. Chairman McCaul. Without objection, it is ordered. [The information follows:] Letter Submitted for the Record by Ranking Member Bennie G. Thompson February 11, 2015. The Honorable Barack Obama, President of The United States, The White House, Washington, DC 20500. Dear Mr. President: Thank you for your dedication and leadership on the important national and economic security issue of cybersecurity. As the leaders of the Committees that developed legislation to codify the Department of Homeland Security's role as the lead Federal agency for helping to protect private sector networks, principally through the National Cybersecurity and Communications Integration Center (NCCIC), we have several questions regarding your newly-unveiled proposal for a new cybersecurity information integration center. We were pleased that you signed ``National Cybersecurity Protection Act of 2014'' (P.L. 113-282) into law less than two months ago, on December 18th, and implementation of that law is underway. At this time, the NCCIC, with its newly codified authority, is working to establish itself as an effective partner with the private sector to meet evolving cybersecurity challenges. Pursuant to the ``National Cybersecurity Protection Act of 2014,'' among the functions of the NCCIC are the following: ``(1) being a Federal civilian interface for the multi-directional and cross-sector sharing of information related to cybersecurity risks, incidents, analysis, and warnings for Federal and non-Federal entities; ``(2) providing shared situational awareness to enable real-time, integrated, and operational actions across the Federal Government and non-Federal entities to address cybersecurity risks and incidents to Federal and non-Federal entities; ``(3) coordinating the sharing of information related to cybersecurity risks and incidents across the Federal Government;'' Additionally, the NCCIC is ``a 24/7 cyber situational awareness, incident response, and management center that is a national nexus of cyber and communications integration for the Federal government, intelligence community, and law enforcement.'' We understand that increasing private sector participation and improving the quantity and quality of information received at this Federal civilian center was a priority for you, as it is for us and DHS Secretary Jeh Johnson. Therefore, we have questions about your new proposal to establish another information sharing hub, the Cyber Threat Intelligence Integration Center (CTIIC) that was unveiled this week, as the activities outlined for the center seem to resemble the functions authorized in law for the NCCIC. We are concerned that the introduction of the CTIIC at this moment in the NCCIC's evolution may complicate those efforts and introduce uncertainty for the private sector and other partners. It also risks driving away activity to the new CTIIC, which would be operated by the Office of the Director of National Intelligence (ODNI). Accordingly, we request that you please answer the following questions: Why is the CTIIC needed at this time? How is it supposed to differ from the NCCIC? Do you intend to submit a legislative proposal to Congress to authorize this center? If so, when? Some have observed that functions of the CTIIC are duplicative with those of the NCCIC.\1\ Others have said that it introduces unnecessary bureaucracy.\2\ Is the CTIIC duplicative? Specifically, what are the responsibilities and activities of the CTIIC and are they already covered by the NCCIC or, for that matter, the FBI's cyber center? --------------------------------------------------------------------------- \1\ Sean Lyngaas, ``New Cyber Agency Modeled on Counterterrorism Center,'' FEDERAL COMPUTER WEEK (FCW), February 10, 2015, wrote that Chris Cummiskey, the former DHS under secretary for management, said his first reaction to the news of the CTIIC's establishment was that ``its prescribed functions sounded quite a bit like NCCIC's.'' \2\ Melissa Hathaway, former White House cybersecurity coordinator and president of Hathaway Global Strategies told Ellen Nakashima in ``New Agency to Sniff Out Threats in Cyberspace,'' WASHINGTON POST, February 10, 2015, that said ``We should not be creating more organizations and bureaucracy . . . we need to be forcing the existing organizations to become more effective--hold them accountable.'' Further, Stephen Cobb, a security researcher at ESET North America, told National Public Radio's Marketplace Tech that ``the only real difference between NCCIC and CTIIC is that NCCIC reports to the Department of Homeland Security, whereas the new agency answers to the Office of Director of National Intelligence,'' at http:// www.marketplace.org/topics/tech/two-cybersecurity-agencies-diverged- wood. --------------------------------------------------------------------------- Why are you establishing this center at the ODNI, particularly in light of your longstanding interest in bolstering DHS as the interface for the private sector on cybersecurity? What interactions will the new center have with the private sector? Given that the CTIIC will be housed in the Intelligence Community, please explain how it will relate to the National Security Agency and the degree to which it will be involved in the collection of intelligence? As you roll out this new center, how do you plan to ensure that the private sector shares timely cyber threat information with the statutorily-authorized NCCIC? To what degree does the effectiveness of the CTIIC depend on enactment of information-sharing legislation? The protections for personally identifiable information are well-established with respect to private sector information sharing at the NCCIC. What, if any, privacy protections would be required for information sharing with the CTIIC? As partners in efforts to bolster the nation's cyber posture, we have a keen interest in ensuring efficiency and effectiveness of the Federal government's efforts and seek opportunities to minimize duplication and get the best results for our money. Thank you, in advance, for your timely response to our questions. Should you or other members of your team need to follow up on this request, please feel free to contact Hope Goins, Chief Counsel for Oversight (Committee on Homeland Security, Minority), Brett DeWitt, Senior Policy Advisor for Cybersecurity (Committee on Homeland Security, Majority), Matt Grote, Senior Professional Staff Member (Senate Homeland Security and Governmental Affairs Committee, Minority) or William McKenna, Chief Counsel for Homeland Security (Senate Homeland Security and Governmental Affairs Committee, Majority). Sincerely, Bennie G. Thompson, Ranking Member, Committee on Homeland Security. Michael T. McCaul, Chairman, Committee on Homeland Security. Thomas R. Carper, Ranking Member, Homeland Security and Government Affairs Committee. Ron Johnson, Chairman, Homeland Security and Government Affairs Committee. Mr. Thompson. Thank you. Ms. Spaulding, I referenced the letter in my opening statements. I would hope that at some point we will have an answer back on that. Thank you very much. In 3 days, unless a miracle happens, we will be, as a Department, out of money. We have talked here about the cyber threat and what that means to this country, what keeps us up at night and all of that. Ms. Spaulding, can you enlighten the Members of this committee, if 3 days come and DHS is without money to go forward, what that would mean for our cyber defense here? Ms. Spaulding. Absolutely, Ranking Member Thompson. Thank you, and let me just reassure you that we are working diligently on the response to your letter, and it will arrive promptly. It is a priority of the Secretary's that we be prompt in our response to Congressional inquires. This is one we take particularly seriously. We will get back to you very quickly on that. With regard to the impact of a potential funding hiatus, I can say it will--as I said in my testimony, it will have an impact on our cyber mission. Let me give you a few examples. So we are in the process of deploying the latest iteration of our sensors in the dot.gov, in our civilian government networks and systems. That is our Einstein program. This is Einstein 3A, which is the technology that will help us not just detect, but block the intrusions coming in; and Einstein 2, which is the detection capability. These activities of rolling this out will have to stop in the event of a funding hiatus. I will say a week of stoppage we could probably make up. But with each week that continues, that is another couple of agencies that are not brought on-board and receiving the protection at a time when the adversary is not taking any break in their efforts to penetrate our civilian government systems. Our other dot.gov technologies is our continuous diagnostics and mitigation program, which looks inside that civilian government networks and systems to look at their health. That--deployment of that also will be delayed if we have a funding hiatus. That has an impact on our ability to quickly address--identify and address vulnerabilities like the JASBUG vulnerability that has been most recently in the media. With regard to our enhanced cybersecurity services program, where we make sensitive Government and Classified information available to cybersecurity providers to better protect private- sector companies, the on-boarding of new providers will be delayed if we have a funding hiatus. So our ability to protect critical infrastructure owners and operators will be impacted. On the communications side, our ability to keep up with the next generation of communication technologies that the private sector is going full-speed-ahead to implement, our ability to continue to provide priority interoperable communication for National security and emergency response will be impacted, will be delayed. As I say, in the mean time, the private sector is rolling out that new technology. If we don't keep up, we will not be able to provide that prioritized interoperable communications that is so essential. Mr. Thompson. Well, thank you very much. A follow-up to that, all of us want to work with the business community. What constraints would a lack of money impact the Department's work in interfacing from a cyber standpoint with the business community? Ms. Spaulding. So the work we do on a daily basis to build those essential trusted relationships would be put on hold. All of that outreach, we are--have done a campaign across the country, for example, to educate critical infrastructure owners and operators about threats to their industrial control systems in cyber space. Critically important; you asked what keeps me awake at night, those are the kinds of things that do. Those activities would not be able to continue. The guidance from the President, the direction to the President to have--for the Department to set up the standards body to facilitate the establishment of these appropriate information-sharing mechanisms between private-sector entities, these information sharing and analysis organizations, our ability to issue that grant and get that going forward would be hampered by both a continuing resolution and certainly by a funding hiatus. Mr. Thompson. Thank you, Mr. Chairman. I yield back. Chairman McCaul. Let me just say for myself that I don't think we should be playing politics with the National Security Agency, given the high-threat environment that we are in today, both from a cybersecurity standpoint and also from al-Qaeda and ISIS, as well. I certainly hope that Congress can resolve this and avoid a shutdown of the Department. With that, the Chairman now recognizes Mr. Clawson. Mr. Clawson. Thank you for coming today and for your service. Thank you--both of y'all for holding this important session. So I imagine myself on the top of a large multi-national company. I have got employee--I have got stakeholders all over the world, a board of directors that is not all Americans. I have got an ERP system, maybe it is--could be Triton Bond, could be Oracle, could be--you know, could be SAP, could be anything. I have worked years to get it integrated around the world. Factories everywhere. I accept that cybersecurity is an important public good, and that if we don't have it, we are dead. I also accept that the liability insurance that you y'all talk about here protects one stakeholder, and that is the shareholder. But my world is much more complicated. I have data centers, regional data centers, all over the world, with customers and suppliers integrated in those data centers. Now as CEO, I am gonna go out and say look, y'all, in the name of cybersecurity for the world, but mainly for America, we are gonna start sharing data. You kind of have to trust us on what we are gonna share, when we are gonna share it. The devil will be in the details actually. We are gonna--you know, those specifics will be defined later. But don't worry, none of this data will get into the wrong hands; your privacy will not be violated, even though you grew up in the Czech Republic or Russia, where they were spied upon their whole lives, and the last thing they want is another big brother. It feels to me like y'all got a tough sale. It feels to me liability insurance or not, that my world is all about multiple stakeholders. It is not just about profit; big, bad corporations making more money. We are trying to protect our customers, our suppliers, the communities that we live in. What I have read so far about what y'all propose just doesn't feel like a very compelling case that I can take to my multi- national board of directors. What am I missing, and what data can you give to make this more palatable? Because if you can't get me, I know what my friends back in the private sector are gonna say. It is not just about profit. Go ahead. Ms. Spaulding. No, Congressman, you have very well articulated the concerns that we hear when we are out talking to our partners in the private sector. You are absolutely right. There is a wide range of reasons that companies have-- legitimate reasons--for having concerns about sharing information with the Government. Mr. Clawson. It is not just lack--it is not lack of patriotism. Ms. Spaulding. Right. No, I totally agree. Throughout my career, interacting with CEOs of companies, I find them to be an extremely patriotic bunch. So I absolutely agree. I will say, with respect to this legislative proposal and the sharing of cyber threat indicator information, you are correct, the devil is in the details. The good news is that as we move to automated information sharing, those details will be apparent. There will be total transparency about the specific kinds of information that we are seeking and receiving. Because we are creating a structured way of presenting that information that will detail very specifically the kind of information that we want to get. We will also work through the policy and protocols for protecting that sensitive information, both in terms of proprietary information and privacy information. So those things will be transparent. Mr. Clawson. Can you imagine if, in one of the countries that I operate in, the government of that country telling me that I had to share this same sort of information? How would we respond? Ms. Spaulding. Again, I--think the--limiting this to cyber threat indicator information, which is fairly technical information about the IP addresses that are sending malware, for example, to disrupt equipment, this is the kind of information that is less sensitive. Each company will make its own decisions. I think you are right. One of the things we have tried to be clear about, this is not a silver bullet, this is not a panacea, this is not gonna make every company open its doors. But it does address concerns that we have heard from the private sector. There will be a fair amount of detail about precisely what we are talking about sharing here. The legislation defines it fairly---- Mr. Clawson. I think that without that detail, any private- sector CEO would be negligent to go along on the basis of trust. Chairman McCaul. Dr. Schneck, would you like to answer that? Ms. Schneck. Yes, very briefly. So I was in a very large company about 18 months ago. I hear you. I lived that. I was not at the level you describe. But I was a key technology officer for the global government. I was the one that shared information or didn't. I was the subject of a storied phone call from a former FBI executive and executive assistant director, three down from the top, who I consider a very close friend, who yelled at me at 11:00 at night on my home phone because he found out something he didn't know, and I couldn't share it with him. We are going to have to earn your trust. This sharing is not required. It is my scientific belief that there will be benefits in getting our data. You don't have to give anything at first to get it. I think what the under secretary points out is very important, it is key. These are just scientific indicators. But you--the companies will see that. We will work to earn your trust. It is voluntary. Mr. Clawson. I am nonpartisan on this issue. Anything I can do to help you, you know, with my background, I urge you to seek me out. I am always worried about people on the telephone. I am even more worried about people in my ERP system. So with that as a starting point, y'all--you know, use--anything I can do to help, I am here. Ms. Spaulding. Thank you very much, Congressman. We will definitely take you up on that. Thank you. Chairman McCaul. If the gentleman would yield, we do have a field trip, if you will, to the NCCIC facility. I would encourage you to attend that. I think it is important to note also this is not a mandatory sharing system. It is voluntary. This authorization that we authorized the Department's cyber operations last Congress had the support of industry, the chamber, the privacy groups. All I think in moving forward what we want to do is provide liability protection so that they can fully participate. Because I think there is a reluctance, as you point out. Because you have a duty to the shareholders to not want to participate until you have that assurance that you wouldn't open yourself up to a lawsuit. So I look forward to you--you obviously have tremendous experience on this issue. I look forward to working with you on this. Chairman recognizes the gentlelady from Texas, Ms. Jackson Lee. Ms. Jackson Lee. Mr. Chairman, thank you very much. I might say to my good friend, Mr. Clawson, with his experience but also his demeanor. I truly believe that we have common ground on these very important issues. I gave an old story that I hope will be very brief. I indicated that when I chaired the transportation security committee, we had included infrastructure, which was then cybersecurity. The point was that it was all embracing an infrastructure that we had not yet hit, if you will, the epicenter of fear and epicenter of hacking. But we did look at the infrastructures that are governed by cybersecurity and realized that we were vulnerable. So I want to thank all of you for bringing us up into the 21st Century as it relates to home homeland security and this very crucial issue. I want to add my appreciation for those of you who have come from the private sector for serving your Nation. Let me acknowledge the Secretary in his absence and thank him for being, as he has indicated, everywhere and all over on the basis of National security. I want to thank the Chairman of this full committee. I hope that his efforts will be heard in his Republican conference that we should be dealing with National security and not political security. Clearly, on the issue of where we are in this time and date and what we are facing, I can't imagine a more important component. There are many important components at DHS. But certainly, what we are discussing today has far- reaching impact. So I want to just take the words that were presented when the President offered his thoughts on January 13 and he said when public and private networks are facing an unprecedented threat from rogue hackers, as well as organized crime and even state actors, the President is, of course, unveiling the next steps in his plan to defend the Nation. At that time, then he unveiled the White House proposal. That is, of course, the Cyber Threat Intelligence Integration Center. Many of you know that we have worked so hard on the efforts to have the National Cybersecurity and Communications Integration Center. So my questions are going to be--I know we had some earlier discussions--the pointed synergism, if you will, of those two entities and the concern about confusion between the broader public. My interpretation--I have some privacy questions--is that the CTIIC will be not gathering, but analyzing; will be the high-level threat entity. My concern is, will that information of their analysis be accessible to DHS, Members of the respective homeland security committees? Because it looks as if there is an attempt to put a wall between the very agency that then has to act on trying to save the Nation. Then, of course, the NCCIC will be the face to the private sector. We will have to engender their trust. They will have to know well, this is an agency that can help me, or do I need to try to bang down the doors of the CTIIC, even though that is not the intent? So let me just end right there so that I can ask you, Madam Secretary Spaulding, our Ranking Member gave you the opportunity for a long litany. Let me for the record speak to this defunding or no funding of Department of Homeland Security in the backdrop of--let me try not to use the word ``crisis''-- but the increasing threats that are viable through hacking, through other efforts as it relates to security. Does this put us, the Department of Homeland Security and the security of this Nation, in a position of jeopardy if all of the functions in your area are either halted, stalled, people laid off because of the actual moment in history that we are in? Are we at a serious moment in history that you need all hands on deck? Ms. Spaulding. Congresswoman, I think that is an accurate statement. I mean, we are--as this committee knows as well as anyone, we are, as I said, under daily moment-by-moment efforts by adversaries to penetrate our networks and systems across the Federal Government, State, local, territorial, Tribal government systems, and the private sector. There is no pausing, no slowing down, in that range of actors' efforts to penetrate our systems and to do us harm. So anything that hampers, we are running on a daily basis full speed ahead to try to keep ahead of those--efforts of those adversaries. Anything that hampers and slows us down creates risk for us and for the Nation. Ms. Jackson Lee. If I could get these last two questions in, I would greatly appreciate it. I started out by offering my assessment of the CTIC--CTIIC and the NCCIC. So if I could get the question answered as to how the public is to decipher between these entities. Then I want to add a question of my colleague here on privacy. Will the information shared that is going to be shared with the Government identify the identity of law-abiding citizens? Will it be the responsibility of the company--companies--for removing personal information for what is shared with DHS? So first, how are they gonna interface with these two entities? I am concerned about the confusion. Then the privacy question. Ms. Spaulding. Great. I very much appreciate the question. We welcome the establishment of the Cyber Threat Intelligence Integration Center. Those two ``I''s are actually important to help make this distinction. Because what the CTIIC will do for us is to pull together intelligence information from across the 16 different entities that make up that intelligence community over which the DNI, the Director of National Intelligence, has purview. So that is a very useful function for us. Part of their articulated, explicit mission is to support the NCCIC, our operations in watch center, and the other centers across Government; the FBI's NCIJTF and the other centers out there across Government. They are--in military terms, they are supporting command and we are the supported demand. So they will provide that integrated analysis for us, which will be very useful. They also will be one place where we can go to work with the intelligence community to get information cleared for wide dissemination. So whether that is continuing to press intelligence agencies to write or release, to create products from the very beginning that can be widely disseminated or to go back to them to get things declassified that we think are important to disseminate widely. Instead of having to go to 16 different entities, we can go to this one place who will be an advocate for us, because that is their mission in making sure we can disseminate this information. Those two key functions will be really helpful for us. It is a very distinct mission from our mission, which is to interact with the private sector. That is not the mission of the CTIIC. Our mission is to interact on a daily basis with our partners across the Federal Government and the private sector and to receive information from them; and most importantly, to get information out as broadly as we the can so that those who are trying to defend their networks can do so effectively. I will ask the deputy to address the privacy issue if---- Mr. Clawson [presiding]. Quickly, if that is okay. Ms. Schneck. I will make it very quick, sir. The privacy issue cuts to the core of why we do what we do and why I came here to the Department to serve in Government. The story I shared about the call from the FBI, this is one of the finest investigators on the planet. I wanted to answer him. I couldn't. If we had a system like this in place that night, I could have. My lawyer would have given us the ability to share just the indicators. So what we are building---- Mr. Clawson. That I understand. Ms. Schneck. So what we are building is with a team, working every day with the FBI, their assistant director of cyber. He called me last night just to make sure we were in the loop on things. This is the kind of relationship that we have. He called me on my cell phone a couple of weeks ago. We have-- -- Ms. Jackson Lee. Are you answering--I am sorry. I don't want to interrupt. But are you answering my question, which is will the information---- Ms. Schneck. Yes. Ms. Jackson Lee [continuing]. Shared identify--because I want to--abide by the Chairman---- Ms. Schneck. No. Working with---- Ms. Jackson Lee [continuing]. Identify law-abiding citizens and is the companies have the responsibility of removing the personal data? Ms. Schneck. The companies have a responsibility to make a good-faith effort. This is a policy puzzle that which is being solved each day by working together with each different equity with the private sector, with law enforcement, with the intelligence community. We are doing our best to get everybody to design that. Ms. Jackson Lee. Mr. Chairman, I am just gonna say this for the record and then yield back. You all issued $25 million in cybersecurity education grants. I noticed that States to the west of the Mississippi, including Texas, have not been included. I would like to meet with whoever is appropriate to talk about these important grants. Because we need a vast array of representation. So would someone let me know who I should be meeting with? Ms. Spaulding. Absolutely, Congresswoman. That was announced by the Department of Energy for historically black colleges and universities. We will absolutely make sure that you get a full briefing on that and hear your thoughts. Ms. Jackson Lee. I thank the gentleman for his courtesy. Thank you. I yield back. Mr. Clawson. The Chairman recognizes the gentleman from Texas, Mr. Hurd. Mr. Hurd. I would like to also thank y'all for being here. This is an important topic. I know a little something about it. I spent 9 years as an undercover officer in the CIA. My job was collecting intelligence on threats to the homeland. But I also did some offensive cyber operations and I recognize the dangerous threat that is out there. Helped start a cybersecurity company, as well. I have been doing that for the last 5 years. It is pretty scary, the folks that y'all have to help defend against. So it is a difficult job. But I appreciate you all being here. My question is, you know, when you look at Border Patrol and ICE, they have difficulty sharing information amongst each other. A lot of it is structural issues; right? You know, it is--and then you talk about, you know, having DHS sharing with FBI or CIA or NSA. Even more difficult. Then also trying to do it with the private sector. I know this is one of the areas that these new entities have been created to do. My question is, you know, in an attack of the magnitude that we are starting to see, one of the most important things that you need is you need timely information. What is the system--how are y'all trying to design this so that the information is timely? Ms. Schneck. So as information comes in, it will go through a process that is automatic. So that is fractions of a second for a machine. Indicators will be available through those standard protocols that every machine can read and every machine can send. So right now, we are depending our real-time sharing on people to all be in the room to get it at once to create a report and to fan it out. Now you will have machines do it at their speed, which is the speed of the adversary. This already works in pockets in the private sector, protecting against bot-nets. A few tens of thousands of machines light up with bad behavior, and the rest of the world can block against them. We will do that for extended threats, as well as the ability to combine what we see of protecting the Government, combining it with what we see which may be partnered or bought from private sector, and creating a large set of data that can be provided to all. Mr. Hurd. So how do you plan on sharing tactics, techniques, and procedures that the bad guys are using; right? It is one thing to have an IP address or a piece of digital code that you can share, that you can share quickly. But some of the--you know, they are looking at certain, you know, ports or the style of the attack. How is that gonna be shared with the broader community? Ms. Schneck. I think two ways. One is, that is currently shared today across the agencies and with the private sector through trusted relationships. The other way is as we see those indicators coming in, we build patterns that can be combined. Again, this is where the CTIIC can help, as well. That can be combined with the intelligence they would give us and creating an even broader picture for then people to disseminate that context. Mr. Hurd. Thank you. Thank you for that. The other area is, you know, the stuff that you are talking about, obviously, the level of classification of the data, you know, is not going to be a problem because you are sharing it, you know, with folks. But how do we address the classification of threat information that is gathered by, you know, elements throughout the entire Federal Government to push that down to the private sector? Ms. Spaulding. So this is also an issue that we deal with on a regular basis currently. We have a couple of ways we address this. One is, as I mentioned, the enhanced cybersecurity services program that we are implementing and have implemented, where we work with managed security providers to build systems that can take Classified information and, while protecting sources and methods, use that information to provide enhanced cybersecurity solutions to their customers. So this is a way for us to use Classified information, to protect private-sector entities, without having to clear all of those private-sector entities to receive the information. So that is one way. The other thing that we do is we do interact on a very regular basis with the help of our intelligence and analysis I&A directorate, headed by General Frank Taylor, with the intelligence community to help them understand what is the information that we need to get out more broadly and what is the information we don't need to share that might implicate sources and methods. That granularity we are able to achieve because we bring in cleared private-sector folks who look at the intelligence and say as a network defender, this is the piece I need. I don't need to know where it came from. I don't need to know all of these other things that are very sensitive. But this bit I need. Then we can go back to the intelligence community and say this is the piece we really need to get out to folks. That equities review process is actually working fairly well. We have shortened the amount of time that it takes to run through that process significantly. We also have ways of, again, working to mask sources and methods and be able to disseminate that information. So these are issues we are working through, but would love to sit down and talk with you. You might have some additional insights and ideas for us to continue to push that boundary. Mr. Hurd. Thank you. I yield back. Chairman McCaul [presiding]. Thank you, Mr. Hurd. The Chairman now recognizes my fellow co-chair of the cybersecurity caucus, Mr. Langevin. Mr. Langevin. Thank you, Mr. Chairman. I thank you, Mr. Chairman, and Ranking Member Thompson for the attention and support you have been giving to this topic for many years. In many ways, you and I were pioneers on this--in the Congress on the challenges we face in cyber space. I want to thank our panelists for their testimony today, for the work you are doing on this issue. I applaud your work and the Department's work, and especially the President's leadership on trying to better protect the Nation's cyber space, close the glaring vulnerabilities that we face. Of the range of things that we could do in this area and clearly, we face significant challenges, I have often said that this is never a problem, unfortunately, that we are going to solve. It is a problem to be managed. Right now, the aperture vulnerability is wide open. What we need to do is shrink this down to something that is much more manageable. I have often said that the single most important thing we can do in closing that aperture vulnerability is information sharing. Right now in many ways we are fighting this battle with both hands tied behind our back. If we can inform, the Government can share the information that it has with private sector more easily and private sector can share the threat and the hacks that they are experiencing, we can disseminate that, we are going to be light years ahead of where we are right now. So with that point--and maybe, Dr. Fischer, I will start with you. Information sharing is in many ways, it is a means to an end. It is undoubtedly an important means. However, as has been demonstrated, even at DHS, for example, during Heartbleed, perfect information is useless without appropriate processes, protocols, and people to act on it. So based on your scholarship, can you give a base assessment of the proportion of cyber incidents that only suceeded because information about a known threat was not disseminated? How substantial an impact do you foresee cyber information sharing legislation, such as the President's proposal, having on the overall state of cybersecurity? Mr. Fischer. Well, Congressman, I would have to get back to you on the specifics with respect to what there might be--what the proportion of attacks that have been, say, prevented specifically with respect to--because of cybersecurity information sharing. The question, though, with respect to--I mean, part of the problem here is that there are--information sharing, as a number of people have said, is no silver bullet. It is an important tool for protecting systems and their contents. As long as organizations are not implementing even basic cyber hygiene, there are going to be some significant difficulties. So companies--there are demonstrated cases of companies that have had the information which--but nevertheless, did not pay sufficient attention to it. They have had information they could have used to prevent an attack. If a company is not prepared to implement sort of threat assessments that they receive, then that is going to be a problem. A recent study by Hewlett Packard I think indicated like 45 percent of companies do not actually have sufficient basic cyber hygiene. So those sorts of companies are not going to be able to actually implement information sharing effectively. So--and what was the second part of your question, sir? Mr. Langevin. I wanted to know the substantial impact that you perceive that information-sharing legislation would have on the--such as the President's bill would have on the overall state of cybersecurity. Mr. Fischer. Right. That is something--there is a fundamental sort of issue about the effectiveness of information sharing. It is very difficult to measure--and there have been attempts by a number of folks. I saw a recent study by the Rand Corporation, for example, to try to analyze what the effectiveness of information sharing is. So you start out with a baseline. So the question is well, what is the current baseline for information sharing? How much would actually improving information sharing improve cybersecurity? There are plenty of examples, specific examples. It is very--I think one could make a fairly compelling case on principle as to why improving information sharing is important. But to really be able to determine its actual effectiveness will require, I think, additional information and study, and perhaps some information that is not readily available now. So I am sorry I can't give you a--you know, a definite answer to it. But it is an important challenge, and one I think that a number of people are thinking about. Mr. Langevin. Well, my time is expired. But I will have additional questions for our witnesses. I just want to thank you for the expertise you bring to the table, the work you are doing in this, and I look forward to supporting you in your efforts. Thank you, Mr. Chairman. Chairman McCaul. Thank you. Thank you for your strong interest and leadership on this issue. The Chairman now recognizes the gentleman from Georgia, Mr. Carter. Mr. Carter. Thank you, Mr. Chairman. Thank you to each of you for being here. This is obviously something that is very needed. I want to speak about small businesses, in particular. I am a small business owner, or I was. My wife is now. But, you know, I have three independent retail pharmacies, have 19 employees. This is important. This is important to my business, just as it is important to a big corporation. But it is tough. It is tough for us to adhere to some of the procedures, some of the policies that we are gonna be forced to adhere to. Do you take that into account at all? Ms. Spaulding. We absolutely pay, as the deputy said, particular attention to small and medium-sized businesses. So the first thing that I want to point out is that even with this information-sharing legislation, it is all voluntary. So there are no new requirements being imposed on businesses of any size pursuant to this legislative proposal. But that said, even a company that wants to voluntarily participate in this may be challenged by a lack of resources and the ability to bring on the human resources. So we do look at how can we facilitate better cyber hygiene by small and medium-size businesses. Because they make up the important part of that cyber ecosystem in which our critical infrastructure swims. We all swim in the same ocean. As we saw in the Target breach, those small companies can be an opening for an adversary. So I will let the deputy address a request for proposals for information that we put out to the cybersecurity solution providers to say, what ideas can you give us from your innovation in the private sector to specifically address the needs of small and medium-size businesses? Because we understand that is a real challenge, but it is critically important. Mr. Carter. Well, and thank you for recognizing that. Ms. Schneck. So as I mentioned earlier, it is the small businesses and State and locals that also keep me at night. Two initial things I did when I came here. First is we put money to protect the State and local governments and gave them management security services that we paid for. We couldn't do that for small businesses. So what we did was put out a request for information, which is basically asking all the companies to please tell us how would you use your innovation and use your desire for revenue, use the market to drive better, faster, safer, cheaper solutions that can enable, whether you are a small business that makes the solution, makes money off it, or whether you are one that gets the protection from it. The other piece I want to make very, very clear is in all this technical talk, the main thing is that as we as a Government are able to put together this indicator information, that is available for you. You don't have to give us anything. So you will inevitably, as any business, buy a few widgets to protect yourself. Whatever those widgets are in our vision--and I don't mean in 5 years, I mean hopefully in 1, if not sooner-- will be able to start to talk to our big database and get what we have. We are not asking you to necessarily deliberately share things. So we are trying to just make it available to you because we recognize that. Mr. Carter. Well, good. Thank you for that. But let me ask you, thus far have you had a good participation rate from small and medium-sized businesses? Ms. Schneck. I have a binder literally that thick full of responses to that proposal and requests for information that could lead to a request for a proposal. The team is looking at how we act on that. It will go into a larger strategy in the name of efficiency in cybersecurity really across DHS with all the components, the two pieces of cyber. But our State and local and Tribal territorial is--and our small-to-medium business work--is huge to us. This is homeland security, not big business security. It is everybody. Mr. Carter. Right. Right. Well, let me ask you this: Specifically to health care, do you see any specific threats in that? I mean, you know, we have insurance information. We have Social Security numbers, birth dates. I mean, we have everything that is essential that would use in a patient's information. What are the real threats there? Ms. Schneck. So I think that any time you have a computer that is connected to the internet, somebody can see whatever it stores. So the adversaries are looking for whatever the motive that was mentioned earlier, they can get that information. So what you have to do, no matter what the information, is find the best way to secure those assets. We will work with you on that. We have people in each of the areas that can work with you on that and partnerships with the U.S. Chamber of Commerce to get this message out. Ms. Spaulding. We are absolutely seeing activity in the health care arena. Some of which appears to be for financial gain. It is a target-rich environment with very rich information; beyond just Social Security numbers or credit card numbers, for example; but information that can perpetrate other criminal schemes, such as Medicare fraud. So---- Mr. Carter. Exactly. Ms. Spaulding. Right? So we are watching that very carefully. The FBI and others in law enforcement are looking at this. Mr. Carter. Well, great. Thank you very much for what you are doing. We appreciate this. Mr. Speaker, I yield back. Chairman McCaul. Appreciate the promotion in my title. But I am not sure I would want to be Speaker right now, to be honest. The Chairman now recognizes Mrs. Watson Coleman. Mrs. Watson Coleman. Thank you, Mr. Chairman. Thank you for the generosity you demonstrated with the information sharing that we have been doing here today. First of all, let me just acknowledge the fact that this has been an incredible experience for me, information that you have given me today. I am really very, very proud that there are two women at this helm. I get to say that without possibly being a discrimination complaint, being a woman. But it is unusual, and it is an illustration that women should really be in these areas much more. You all are fantastic. So are you, Mr. Fischer. You are fantastic too. But even so, I have so many questions I just don't even know where to begin. First of all, let me ask this. There is the--this CTIIC, which is being proposed. There is the NCCIC, which exists. Thank you so--oh, NCCIC. Sure enough is. CTIIC and NCCIC. So what is the guarantee that the new proposal, this CTIIC, doesn't wander out there and become the face of the interaction with businesses and companies and stuff and basically infringes upon the NCCIC? Ms. Spaulding. Congresswoman, first of all, let me echo your plug for encouragement for more women to get into STEM fields. I think it is critically important. So thank you for that. With regard to the CTIIC and the NCCIC, the CTIIC is very clearly defined in the President's roll-out of this, which I believe occurred this morning, just a couple of hours ago. As a place for integrating the intelligence information, it is really to help Government. It is a Government-to-Government. To help the centers that exist already, including the NCCIC, to have a common operating picture and all sorts of intelligence analysis that we can provide to the private sector. Again, we will also be taking in information from the private sector and with appropriate safeguards for privacy and civil liberty, sharing that with both the intelligence community and law enforcement as appropriate to help enrich the common picture that we all have. So it--its responsibilities and its role are pretty clearly defined, and I think very distinct from the role of the NCCIC which, again, has been defined both by this committee and again in the President's legislative proposal as the central place for interacting with the private sector with regard to indicator information. Mrs. Watson Coleman. Should we not come up with the funding, should there not be a funding solution on the 27th of February? Will the two of you be working on the 28th? Ms. Spaulding. We will, Congresswoman. We will be working without a paycheck. But we are under the statutory definition. But I will tell you in my organization, the National Protection Programs Directorate, which is responsible for critical infrastructure security and resilience, we will be down to 57 percent of our workforce. Mrs. Watson Coleman. Are you at full force right now? Ms. Spaulding. Right now we are at full force. But of our a little over 3,000 employees, if there is a funding hiatus, we will be down to 1,748. So it will be, again, 57 percent. I want to point out that those numbers include--most of those numbers are the Federal Protective Service, which engages on a daily basis in the critical mission of protecting Federal facilities, and our office of biometrics and identity management, which uses biometrics to particularly keep known and suspected terrorists out of the country. Mrs. Watson Coleman. That is pretty scary. Ms. Spaulding. Two critical important missions, they will be on the job. But the rest of my workforce that worries about critical infrastructure in the private sector, cyber, will be down to about 9 percent--normal strength---- Mrs. Watson Coleman. So I have two quick questions, because that is pretty scary. I need to know the difference between ISAOs and ISACs. Ms. Spaulding. Yes. Mrs. Watson Coleman. My other questions is to Mr. Fischer real fast. What is it that this new proposal that the White House has put out, what does it address that is deficient in what exists now? Did we need to do this in an entirely new legislative approach, or could there have been some tweaking to what already existed? Thank you. Ms. Spaulding. So I should point out under the--in a funding hiatus, our--again, we are gonna make sure that we have in place everything we need to have in place to protect lives and property on a daily basis. So our NCCIC will continue to function. But the analytic support that feeds that and helps prioritize those activities will be hampered, and the roll-out of the things that I mentioned earlier will be hampered. The ISAC, ISAO--ISACs information and analysis centers are a kind of information sharing and analysis organization. So they are a subset, ISACs share a subset of ISAOs. What the administration's Executive Order hopes to do is to encourage additional coming together of private-sector entities to share information. Mrs. Watson Coleman. Thank you. Mr. Fischer. Mr. Fischer. So what the--there are, I should preface by saying that there are some observers who would argue that, in fact, new legislation is not really necessary; that current mechanisms are sufficient. But there are plenty of people who actually think the opposite, as well. With respect to what the new legislation would do, the White House proposal, it would create some mechanisms, including the establishment of these ISAOs for the receiving and sharing of information that don't really exist now, or that exists in another form; like, for example, the ISACs exist now but they are--the ISAOs are somewhat different from that. It specifically designates the NCCIC as a particular role with respect to receiving and sharing this kind of information. It also would provide certain--it tries to remove these barriers that have been mentioned that private-sector organizations may have for sharing information and make sure to--and provide protections for things like privacy and---- Mrs. Watson Coleman. So you said, I believe, that there is both the issue of barriers, and there is the issue of incentives; incentives perhaps doing something, eliminating or minimizing some of the barriers. So is the incentive just simply the value of the sharing of the information, or is there some other kind of incentive that needs to use to encourage these businesses to engage in this? Mr. Fischer. Right. So, I mean, one of the questions is what would the--why would a company want to share information? One way, of course, to encourage them to share information is to reduce the risks to them of sharing that information. But at the same time, what are they going to get out of sharing it? Are they doing it as simply a--something that they think is for the public good, or are they gonna get something back? So one of the ways that they might get something back is through reciprocity. So, for example, if they are a member of an ISAC or perhaps an ISAO, they may have some relationship with that organization that ensures that if they provide information, they will be able to get information. But of course, with respect to the Federal Government, there have been enough concerns about, you know, forcing organizations to give information to the Federal Government that, in fact, all of the legislative proposals say that they are voluntary. Mrs. Watson Coleman. Thank you, Mr. Chairman. I yield back. Chairman McCaul. The Chairman now recognizes the Chairman of the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies, Mr. Ratcliffe. Mr. Ratcliffe. Thank you, Mr. Chairman. Ms. Spaulding, I would like to start with you. The administration's proposal discusses how Federal agencies--and I will quote--``through an open and competitive process will choose a private entity to identify and develop a common set of best practices for the creation and operation of private information sharing and analysis organizations.'' The NIST, the National Institute of Standards and Technology led a collaborative process last year to develop the cybersecurity framework. Why isn't this NIST framework, why isn't it being utilized in the process here? Ms. Spaulding. Congressman, I think it will be utilized in the process here. What the NIST framework does is provide a framework, a way for companies to think about their cybersecurity and how to achieve better cybersecurity. So it breaks it down into five key functions; identify, identify the assets you want to protect and the risks that it faces, ways to protect, ways to detect, ways to respond, and ways to recover. It pulled together from the private sector their best practices in each of those categories. So that is the cybersecurity framework. What this standards organization will do is to look at what are the best practices for these ISAOs. Of the ISACs, of the ISAOs, of the information-sharing organizations that are out there today, which are the best ones, what are the best practices that we see out there? Let's pull that together as a guideline for private-sector groups that want to come together to say here are some of the best practices in terms of ways in which they are protecting the information that has been given-- that is being shared in there. So that I know that if I give it to you, you are only going to share it within this ISAC, for example. Or ways in which you are going to protect privacy information, et cetera; ways in which you are gonna get it out quickly to me, get back to me, so that I get information for information I give in. How do I know I am going to get something good back from it? So it is a different set of best practices. But the process for developing that will be very similar to the one NIST used. This third-party standards organization, will be canvassing the private sector, the existing public and private-sector sharing organizations to say to them tell us what you think are the best practices. Very collaborative is what we envision. Mr. Ratcliffe. Sure. So I want to talk a little bit about this--a single portal for information sharing. As a former terrorism prosecutor after 9/11, while we would have liked the information to come through one single avenue, what was more important was that people would share information. So whether it was with the FBI or whether it was with Secret Service, we encouraged information sharing. So I am wondering if you can expound on the process here, the thought process behind there just being one single portal for sharing information. Ms. Spaulding. Yes, absolutely. We totally agree. The highest priority is on information sharing. Again, that is such a high priority, that even if it is only sharing between private-sector companies and they don't share with the Government, we think that is worth promoting, because sharing of information is gonna significantly advance the ball here. But with respect to sharing with the Government, again, we want to make sure that existing relationships are not disrupted here. So companies that have relationships with the FBI, with Treasury, with other parts of the Government and are comfortable picking up the phone and calling them, they should continue to reach out and say we think we see something, you know, that looks a little strange on our system; we think we may have some intrusion activity here. That kind of information sharing across Government we hope will continue to take place. What we are trying to do--and even sharing of cyber threat indicators can be shared--you know, we are not saying you can't share it with other departments and agencies. We are creating a newly-incentivized program. If we are doing that, we want to use that to help us create a common operating picture. So rather than have that information coming in in a distributed, dispersed way all across the Government and hope that it comes together somewhere at some point, sometime, we want to say we would really like to incentivize you to bring it in to this one place, and we will take responsibility for making sure that it gets to the people who need it very quickly. But this way, we are--greater confidence, both that we have a common operating picture and that privacy protections are clearly in place. Mr. Ratcliffe. Terrific. Thank you, Ms. Spaulding. Very quickly, Dr. Schneck, I wanted to give you an opportunity. Ms. Spaulding and Dr. Fischer were able to expand on Congresswoman Watson Coleman's question about privacy. Just very quickly, I want to give you an opportunity. Can you explain the processes in which NCCIC protects privacy and explain that relationship with DHS privacy office? Ms. Schneck. So thank you. Very quickly, DHS has one of the first statutory privacy officers. We work not only with the front office at that level, but the under secretary has for our directorate her own privacy officer that reports up. Every program that we have engages them. When I came in I actually asked--because I write code. Or I used to--the people that write code, I asked them; are you getting rid of the extra memory so that there isn't--because this is one of the famous ways that attackers attack--so that there isn't a gap that we didn't know about that is actually storing information that we didn't know about. Every step of the way in how we build our programs, we work with those teams on privacy. We also do impact assessments, which means a document is published on our website. What we do, what we collect, what we are doing with it, and why we do it. As we grow these capabilities, that is an ingrained philosophy in who we do at DHS. There has never been a harder time to want companies, as we heard before and it is true, to share with Government. There has also never been a more urgent time to put the indicators together to respond to an adversary that candidly has an infinite appropriation and does whatever they want. We need to make sure that we have our defensive capabilities as strong as they are. That means putting this data together. It is speed and privacy and the balance therein. It takes all hands on deck, everybody to work this. Part of the reason it is taking us more than just a few months to build this capability is because we have to build it with the right privacy, the right policy, and the right equities to make it light speed and get it right. Does that answer your question? Mr. Ratcliffe. It does. Thank you. I am out of time. But I do want to thank you all of you for being here and for better informing the committee Members so that we can hopefully move forward with cyber legislation in this Congress. I yield back. Chairman McCaul. Thank the gentleman. Excuse me. The Chairman now recognizes Mrs. Torres. Mrs. Torres. Thank you, Mr. Chairman. and I also want to join my colleagues in thanking the panel--or the witnesses for being here. Most of all, for spending an entire hour with some of us, ensuring that we understand and that we somehow feel at peace that you are collecting data that is absolutely necessary, but actually being very cautious at ensuring that individual privacy rights are being abided by. We have also heard a lot from the perspective of corporate America. But what I haven't heard yet coming from you is how you plan to communicate everything that you are doing with the general public. So someone like myself at home, where my computer gets hacked and my IP address gets duplicated 15 times, how is my information as an individual victim or survivor of a hack attack in my personal network, how are you going to protect me from sharing my personal information with anyone else? I haven't heard it from a perspective that I think the general public can relate to. We have been speaking at this level, and we haven't really simplified it in a way that my constituents could be comfortable with what we are doing here. So could you explain a little bit as to--in the private session, you know, we heard specific information of what would be pulled. Can you speak to that here? Ms. Spaulding. Congresswoman, thank you for the question. As I hear it, it involves at least two aspects. One is as a private citizen, what does this mean to me; right? How is what you have just been describing here for the last couple of hours relevant to protecting my identity information---- Mrs. Torres. Right. Ms. Spaulding [continuing]. For example, my PII? What I would say to that is that by protecting the networks and systems that hold your information, we are protecting you-- and your--against identity theft, for example. One of the pieces of legislation that the administration proposed--we have talked about their information-sharing legislation, but they also proposed breach notification legislation. That is very much designed to protect consumers; to make sure that companies have a single standard across the country for being required to notify individuals when there is reasonable basis to believe that their personal information may have been stolen, and to do so promptly. So that is very much geared toward the individual and the consumer. In terms of how do we reassure them that this work that we are doing on their behalf is not interfering with their privacy interests? As we have talked today, we are very much focused on the specific information that we need to defend networks. We are very precise. The legislation the administration has proposed defines that information very carefully. The automation that we are building will have a structured way of providing that information that will minimize the likelihood that information we don't need could be included. We place a very high priority on making sure that we are--we have no interest, it does not help our network defense to gather a lot of personal information about Americans or others. I will let the deputy address that, as well. Ms. Schneck. I would only add that it is my hope that we can use campaigns like our ``Stop. Think. Connect.'' messaging or the awareness that we do every October in cybersecurity awareness month. I think every month should be cyber awareness month. But we focus that month to get out on the road and talk to everyone. I am hoping that the public will start to understand this. We have to work to take some of our technical terms and make them actually English. But start to understand that Government is working very hard to protect them. It starts with getting our own agencies talking, which we are doing. It starts with building into the private sector. Then making sure that through its providers of theirs of other programs with agencies in the Federal Government that work directly with citizens, that we get that right. But we need to really enhance the trust relationship in the cyber area. Mrs. Torres. So I am almost out of time. I just want to make sure that I get my two other questions answered. To this issue though, my final word on this is that we need to ensure that that community outreach is part of whatever legislation that we can produce; that community grants and opportunities to include the public in this discussion happens. Mr. Fischer, the fair information practice principles we have been talking about, mentioned in the President's--in his security Executive Order, how are they incorporated into the Department procedures, from your perspective? Mr. Fischer. Well, I think the Department people would probably be better-situated to answer the specifics with respect to that. But I think on the question of how privacy is incorporated, it is a--one of the difficulties--and this also gets back to your earlier question a little bit--that the general public has various views of what privacy means. There isn't any one really universal kind of understanding. I mean, there is something called, you know, ``personally identifiable information,'' which is kind of interpreted as being something that, you know, could actually identify a person specifically. But when people think about privacy, they don't necessarily think about it in the same way as Government may think about privacy. So, you know, if one is going to develop a set of principles or use a set of principles or, in fact, incorporate something like privacy by design, which has been around for a long time, or something that people have tried to do, it is-- there--it can become very complicated very quickly. I think one of the things that is very important is to be able to create a way of letting people understand specifically what the issues are so that there can become really a consensus among consumers about what it is that we are really trying to protect. Because one more point here, which is, you know, people are always worried about--understandably, about Government and its role. But, in fact, people willingly give huge amounts of information to private companies. Mrs. Torres. We do. Mr. Fischer. If you get software that is free, it just means you are the product. Because the company is getting something out of it. Usually, that means they are getting information from you; right? Well, people don't even often realize this. You know, the service agreements that we sign, I mean, who has time to read through them or can understand them? So I think it is very important that there be a--you know, a dialogue, really, about how to characterize privacy more clearly for everybody so there can be consensus. Mrs. Torres. Thank you. I think I am out of time. I yield back. Chairman McCaul. Recognize the Ranking Member for closing comments. Mrs. Watson Coleman. Thank you. I just want to thank the entire panel for giving us this time today and the information. Particularly, I want to thank you, Honorable, Honorable, Honorable Spaulding and Dr. Schneck, because you have given us the majority of the day when I knew you could be doing some other things, including preparing for what might be a furlough of some very important people. I hope you don't have to do that. But I want you to know and I thank you, Chairman, for guiding me through this very moment of being next to you. Thank you. Chairman McCaul. Well, you did quite well, I must say. Let me thank the witnesses. Let me thank Ms. Spaulding and Dr. Schneck for your service to our country on a very important issue. I think the education process is very important for Members of Congress and for the American people to identify that this is a real and valid threat that we need to defend the Nation from. The hearing will be open for 10 days, the record I should say. Without objection, the committee stands adjourned. [Whereupon, at 1:51 p.m., the committee was adjourned.] A P P E N D I X ---------- Questions From Ranking Member Bennie G. Thompson for Suzanne E. Spaulding and Phyllis Schneck Question 1. According to the testimony of the under secretary, the White House legislative proposal on information sharing would immunize against civil or criminal liability entities that voluntarily disclose to or receive lawfully obtained cyber threat indicators from the NCCIC or a private ISAO that has adopted certain best practices. Please explain the scope of the liability protection, including a delineation of the circumstances in which liability protections would not be afforded to an entity that chooses to disclose or receive information from the NCCIC or a certified ISAO. Answer. The President's information-sharing legislative proposal provides targeted liability protection to private entities that voluntarily disclose or receive lawfully obtained cyber threat indicators from a private information security and analysis organization (ISAO) or the National Cybersecurity and Communications Integration Center (NCCIC). It affords such entities protection from public disclosure, and from use of disclosed indicators as evidence in a regulatory enforcement action. The proposal directs DHS to select a non-governmental Standards Organization for the purpose of identifying a common set of best practices for the creation and operation of private ISAOs. The Standards Organization will work directly with the public to identify and develop best practices. To receive the liability protection afforded by the President's proposal, private-sector entities must share with the NCCIC or an ISAO that has self-certified that it adheres to these best practices. Question 2a. To receive liability protection, does a private entity need any kind of certification from the NCCIC or an ISAO to which it disclosed or from which it received cyber threat indicators? If so, what standards would guide an NCCIC or ISAO in issuing such a certification? Answer. There is no NCCIC- or ISAO-issued certification. The proposal directs DHS to select a non-governmental Standards Organization for the purpose of identifying a common set of best practices for the creation and operation of private ISAOs. The Standards Organization will work directly with the private sector to identify and develop best practices. To receive the liability protection afforded by the President's proposal, private-sector entities must share with the NCCIC or an ISAO that has self-certified that it adheres to these best practices. The proposed independent standards organization for ISAOs would not promulgate Government-determined standards or require a compliance certification. It would be an independent organization that sets forth voluntary standards that it will develop in consultation with the public. Question 2b. If no certification were required or issued, would a court in the first instance have to assess whether a private entity deserves immunity under Section 106? Answer. ISAOs would have to self-certify under Section 106 of the information-sharing proposal. That self-certification is distinct from any acknowledgement of receipt that the NCCIC or the ISAO might generate as a way to reassure an entity sharing threat indicators that it has submitted the information to the correct place. Question 3. What are the limitations of the ISAC model that necessitate the effort to increase the proliferation of ISAOs? Answer. An ISAC is a type of ISAO. In practice, as ISACs have evolved, they are sector-specific entities that encourage information sharing within specific critical infrastructure sectors. While ISACs have had a great deal of success and lessons learned that will serve ISAOs as they form, many companies do not fall within a designated sector or fall within multiple sectors. And some companies want to share with partners outside of their sector for a wider scope of situational awareness. Encouraging ISAOs beyond just ISACS will provide for more organizational flexibility. ISAOs can be organized around a particular region, community of interest, or concern about a particular type of cybersecurity risk. ISAOs could include companies regardless of their sector affiliation. Question 4. What are the risks and rewards of an information- sharing environment that is dominated by ISAOs? Answer. Critical infrastructure includes both physical and cyber infrastructure, publicly- and privately-owned. The ISAO model builds upon the successes of existing models. The formulation of ISAOs allows and encourages organizations to participate in cyber threat information sharing to proactively detect and prevent cybersecurity incidents before they can cause damage to their networks by applying the knowledge, capabilities, and experiences of a wider community. Sharing cyber threat information broadly and with sufficient timeliness can improve the Nation's cybersecurity writ large by reducing our cyber adversaries' advantages of speed and stealth. Questions From Honorable Jim Langevin for Suzanne E. Spaulding and Phyllis Schneck Question 1. In reviewing the President's information-sharing proposal, I was drawn to the phrase ``lawfully obtained'' as it relates to cyber threat indicators. Due to ambiguities in anti-hacking statutes, courts have not yet settled whether the work of many well- intentioned security researchers--so-called white-hat hackers--is lawfully obtained. How can we work to ensure that information-sharing legislation does not chill vital security research while at the same time not opening the door to companies ``hacking back''? Answer. The President's information-sharing proposal aims to emphasize that activities conducted to obtain cyber indicators should comply with the law. The Department of Justice is best positioned to answer questions pertaining to the relevant statutes and to what extent they apply to the activities of cybersecurity researchers. Question 2. It is vitally important that we incent private-to- private information sharing, something the President's proposal does through the use of Information Sharing and Analysis Organizations (ISAOs). However, ISAOs need only self-certify to be able to receive threat indicators. Without any independent oversight to be sure that best practices are being followed, are you concerned that this could lead to a reduction in privacy? Answer. Having publically-available standards for ISAOs, including standards for privacy protection, will help ISAO member companies hold their ISAO accountable. ISAOs that are transparent and accountable are likely to attract more members, providing an incentive to clearly demonstrate compliance with the standards. Question 3. We know that cyber threat information is most valuable when shared expeditiously, which, in this domain, essentially means at machine speed. How can DHS lead efforts to ensure that the stripping of PII is accomplished as thoroughly and quickly as possible so that the information shared is timely? Answer. DHS requests that, before sharing cyber threat information with the Department, partners filter out any PII, content, and other information that is not necessary to describing the cyber threat. In addition, currently, DHS Analysts are required to review cyber threat indicator information for PII and handle it as outlined in US-CERT standard operating procedures. Generally, DHS's policy is to minimize or redact any personal information that is not necessary to understand or analyze a threat. As we move to automated threat indicator sharing, DHS and interagency partners are studying privacy-by-design technical safeguards as well as policy and process approaches to minimization that include a combination of automated removal and/or filtering of sensitive data, oversight capabilities, and where necessary, manual review. Technical safeguard requirements may also be required. To safeguard Americans' personal privacy, the administration's cybersecurity legislative proposal requires private entities to comply with certain privacy restrictions, such as removing unnecessary personal information and taking measures to protect any personal information that must be shared, in order to qualify for liability protection. The proposal further requires the Attorney General, in coordination with the Secretary of Homeland Security and in consultation with the Privacy and Civil Liberties Oversight Board and others, to develop receipt, retention, use, and disclosure guidelines for the Federal Government. Any future cybersecurity legislation will incorporate strong privacy, confidentiality, and civil liberties safeguards while strengthening our critical infrastructure's security and resilience DHS is committed to furthering information sharing and promoting cybersecurity standards for critical infrastructure. Question From Ranking Member Bennie G. Thompson for Eric A. Fischer Question. What are the risks and rewards of an information-sharing environment that is dominated by ISAOs? Answer.\1\ This question cannot be answered definitively at present. Such an answer would depend on several factors that are currently unknown or uncertain. However, the analysis below may be useful in helping to determine the potential benefits and disadvantages of the ISAO model in such an environment. --------------------------------------------------------------------------- \1\ Some responses were prepared in consultation with other CRS experts. --------------------------------------------------------------------------- ISAOs (Information Sharing and Analysis Organizations) are defined in the Homeland Security Act (6 U.S.C. 131(5)) as ``any formal or informal entity or collaboration created or employed by public or private sector organizations'' created to assist in securing critical infrastructure and protected systems by acquiring, analyzing, or sharing ``critical infrastructure information,'' which refers to non- public information relating to threats to and defense and recovery of critical infrastructure or protected systems. Information Sharing and Analysis Centers (ISACs) are more familiar to most observers. They may also be considered ISAOs but have a different origin, having been initially formed pursuant to a 1998 Presidential directive (PPD 63) on critical infrastructure protection.\2\ The directive called for a single ISAC but also for a National Infrastructure Protection Center (somewhat analogous to the National Cybersecurity and Communications Integration Center [NCCIC]) that would ``establish its own relations directly with others in the private sector and with any information sharing and analysis entity that the private sector may create.''\3\ Also, the directive stated that the ``actual design and functions'' of the ISAC would ``be determined by the private sector, in consultation with and with assistance from the Federal Government.'' The result was the creation of several sector-focused ISACs, rather than a single entity. Many of today's ISACs are associated with Federally-recognized critical infrastructure sectors. Eighteen are listed as members of the National Council of ISACs (NCI).\4\ There are currently 16 Federally-recognized critical infrastructure sectors.\5\ The table below shows the relationships between those sectors and the ISACs. --------------------------------------------------------------------------- \2\ The White House, ``Presidential Decision Directive 63: Critical Infrastructure Protection,'' May 22, 1998, http://www.fas.org/irp/ offdocs/pdd/pdd-63.htm. \3\ It is not clear what ``others in the private sector'' refers to, as the NIPC was a Federal entity. Presumably, this was a drafting error. \4\ National Council of ISACs, ``Member ISACs,'' 2015, http:// www.isaccouncil.org/memberisacs.html. \5\ The White House, ``Critical Infrastructure Security and Resilience,'' Presidential Policy Directive 21, (February 12, 2013), http://www.whitehouse.gov/the-press-office/2013/02/12/presidential- policy-directive-critical-infrastructure-security-and-resil. ------------------------------------------------------------------------ Information Sharing and Critical Infrastructure Sector Analysis Center ------------------------------------------------------------------------ Chemical................................. Commercial Facilities.................... Real Estate ISAC Communications........................... Communications ISAC (National Coordinating Center for Communications-NCC) Critical Manufacturing................... Dams..................................... Defense Industrial Base.................. DIB-ISAC Emergency Services....................... EMR-ISAC Energy................................... ES-ISAC (electric sector) Oil and Gas ISAC Financial Services....................... Financial Services ISAC Food and Agriculture..................... Government Facilities.................... Multi-State ISAC Healthcare and Public Health............. Health ISAC Information Technology................... IT-ISAC Nuclear Reactors, Materials, and Waste... Nuclear Energy Institute Transportation Systems................... Aviation ISAC Maritime ISAC Public Transit ISAC Surface Transportation ISAC Water and Wastewater Systems............. Water ISAC No specific critical-infrastructure Research and Education ISAC sector. Supply-Chain ISAC ICS-ISAC (industrial control systems) ------------------------------------------------------------------------ Source.--See text. Notes.--A Food and Agriculture ISAC and a Chemical ISAC were established in 2002 (Government Accountability Office, Critical Infrastructure Protection: Improving Information Sharing with Infrastructure Sectors, July 2004, http://www.gao.gov/assets/250/243318.pdf) but appear to be no longer operational. The NCC, within DHS, has served as the Communications ISAC since 2000 (http://www.dhs.gov/national- coordinating-center-communications). The ICS-ISAC is not listed as a member of the NCI. Other entities such as State governments may also have ISACs. As the table shows, ISACs currently exist for 12 of the designated critical infrastructure sectors.\6\ There are also three ISACs that are cross-sectoral. There appear to be few organizations that call themselves ISAOs at present.\7\ The concept increased in prominence following a legislative proposal and an Executive Order from the Obama administration in January and February of 2015 fostering their development and use.\8\ The White House described the intent as ``expand[ing] information sharing by encouraging the formation of communities that share information across a region or in response to a specific emerging cyber threat. An ISAO could be a not-for-profit community, a membership organization, or a single company facilitating sharing among its customers or partners.'' The Executive Order specifies that ``ISAOs may be organized on the basis of sector, sub- sector, region, or any other affinity,'' that members may be public sector, private sector, or both, and that an ISAO may be ``a not-for- profit community, a membership organization, or a single company facilitating sharing among its customers or partners.''\9\ Under the proposed legislation, ISAOs that wish to protect members from liability risks for sharing information would need to be self-certified according to standards to be developed under a process to be established by DHS. --------------------------------------------------------------------------- \6\ Some caution should be exercised with respect to the completeness of this list, as there may also be organizations that have ISAC-like functions but do not call themselves ISACs. \7\ One example is the HITRUST Alliance (see Testimony of HITRUST Alliance CEO Dan Nutkis, Cybersecurity: The Evolving Nature of Cyber Threats Facing the Private Sector, 2015, http://oversight.house.gov/wp- content/uploads/2015/03/3-18-2015-IT-Hearing-on-Cybersecurity-Nutkis- HITRUST.pdf). Some organizations may function like ISAOs or ISACs but not call themselves that. \8\ The White House, Updated Information Sharing Legislative Proposal, 2015, http://www.whitehouse.gov/sites/default/files/omb/ legislative/letters/updated-information-sharing-legislative- proposal.pdf; The White House, ``Fact Sheet: Executive Order Promoting Private Sector Cybersecurity Information Sharing,'' Press Release, (February 12, 2015), http://www.whitehouse.gov/the-press-office/2015/ 02/12/fact-sheet-executive-order-promoting-private-sector- cybersecurity-inform; Executive Order 13691, ``Promoting Private Sector Cybersecurity Information Sharing,'' Federal Register 80, no. 34 (February 20, 2015): 9349-53, http://www.gpo.gov/fdsys/pkg/FR-2015-02- 20/pdf/2015-03714.pdf. \9\ The Homeland Security Act definition is both broader, in that ISAOs can be ``any formal or informal entity or collaboration created or employed by public or private sector organizations'', and narrower, in that under the act, the organizations must be ``created or employed'' for ``gathering and analyzing,'' ``communicating or disclosing,'' and ``voluntarily disseminating'' critical infrastructure information as specified in the act (6 U.S.C. 131(5)). The administration proposal does not appear to limit ISAOs to information about critical infrastructure, although its focus is on cybersecurity, rather than on the all-hazards emphasis in the act. --------------------------------------------------------------------------- If this approach were adopted by Congress, ISAOs could possibly become dominant entities in the information-sharing environment. Given the uncertainties associated with their anticipated impacts, it may be best to examine possible effects through a series of questions: Would ISAOs lead to more information sharing among private- sector entities and between the NCCIC and the private sector? The broad and flexible nature of the ISAOs envisioned in the administration proposal, as opposed to ISACs as currently configured, could lead to the creation of ISAOs for affinity groups for which ISACs are not viewed as applicable--for example, the entertainment industry, with companies such as Sony.\10\ That could lead to much broader information sharing among private-sector entities that join the ISAOs and with the NCCIC. Yet, there is no guarantee that new ISAOs would be established, or, if they were, that they would lead to increased information sharing either among the members or with the NCCIC. Even for a few CI sectors, some former ISACs are no longer in operation, and the degree to which existing ISACs are active in information sharing is considered variable by many observers. Furthermore, the degree to which the NCCIC could process and usefully disseminate the volume and variety of information it may likely receive from a large number of ISAOs is uncertain. --------------------------------------------------------------------------- \10\ However, the IT-ISAC already lists Sony as a member (https:// www.it-isac.org/). --------------------------------------------------------------------------- Would increases in information sharing through ISAOs improve cybersecurity? The relationship between the volume of information shared and improved cybersecurity is not straightforward. Both providers and recipients--whether they are businesses, ISAOs, or Government agencies--will incur various costs, including developing, assessing, processing, sharing, and applying the information. For sharing to be effective, information from the provider must be relevant to recipients' needs and in forms that can be readily applied in their IT and security environments. Recipients must also have the capacity and willingness to assess and use the information received in a timely fashion. A large increase in the amount of information received may in fact be counterproductive, especially if much of the information proves to be of little use to the recipient. In theory, ISAOs can be closely tailored to the needs of their members and therefore help ensure that those needs are met. However, a closely-tailored ISAO might not provide information relevant to all the lines of business in which members may engage, and membership in several organizations might be preferred.\11\ --------------------------------------------------------------------------- \11\ For example, Sony is involved in electronics, gaming, movies, and music. However, it is not clear whether Sony would have been better protected against recent attacks against it if it had been a member of ISAOs in any of those subsectors in addition to its membership in the IT-ISAC. --------------------------------------------------------------------------- Would ISAOs provide overlapping or duplicative services? One potential advantage of the sector-focused approach taken by the ISACs is that it can minimize such duplication. However, it can also create gaps for entities that do not fall clearly into one or another ISAC sector or that are multi-sectoral. Addressing such gaps is one of the stated purposes of the administration's ISAO proposal. In addition, the potential for duplication creates the potential for market competition, and such market forces would ideally yield more innovation and more rapid improvement in information sharing than would a more restricted approach. Market forces might also lead to lower costs, and cost is often cited as an impediment to improved information sharing, especially for small businesses. Yet market forces might also lead to higher costs, and a proliferation of ISAOs might also make decisions about which one or ones to join more difficult for potential members. It also creates the possibility that members could receive conflicting information or even recommendations from different ISAOs. At present, there appear to be few examples of potentially overlapping information-sharing entities. One possible case is in the health sector, which has both the Health ISAC \12\ and an ISAO, the HITRUST Alliance.\13\ Services provided by the two appear to be both complementary and potentially competitive.\14\ --------------------------------------------------------------------------- \12\ National Health Information Sharing and Analysis Center, ``NH- ISAC,'' 2015. \13\ Nutkis, Testimony at COGR Hearing. \14\ See, for example, Marianne Kolbasuk McGee, ``NH-ISAC Offers Cyber-Intelligence Tool,'' Data Breach Today, December 5, 2014, http:// www.databreachtoday.com/nh-isac-offers-cyber-intelligence-tool-a-7642. --------------------------------------------------------------------------- Would for-profit ISAOs be beneficial or disadvantageous for improving information sharing? The administration proposal states that for-profit entities that share information can be ISAOs. That would presumably include internet and cybersecurity service providers, for example. Such entities might be particularly well-positioned to share information efficiently and effectively with customers and to bring market forces to bear favorably in the information-sharing environment. However, unintended adverse impacts are also possible. For example, for- profit companies might have a resource and marketing advantage over non-profit organizations, and some may perceive such an advantage as unfair or counterproductive. It is also possible that competitive pressures may impede information sharing involving more than one company. Some entities that could potentially be ISAOs are currently members of ISACs and could also be members of other ISAOs, creating possible conflicts of interest. Would a cybersecurity environment dominated by ISAOs complement or encumber improvement of cybersecurity risk management? The NIST Cybersecurity Framework,\15\ developed to assist critical-infrastructure and other entities in adopting effective cybersecurity risk management, discusses the role of information sharing in cybersecurity, including the roles played by ISACs and other entities in helping organizations determine their desired levels--called tiers--of cybersecurity implementation. Each of the four tiers includes descriptions of risk-management processes and programs, and ``external participation,'' which largely describes the level of information sharing in which the organization engages.\16\ Broad availability of involvement with ISAOs could help organizations that so desire to move to higher tiers with respect to information sharing. However, as the Framework makes clear, that is only one facet of cybersecurity implementation. There may be a risk, therefore, that a proliferation of ISAOs would lead to an overemphasis on information sharing to the detriment of other, possibly more critical cybersecurity needs, thereby resulting paradoxically in a decline in overall cybersecurity preparedness. --------------------------------------------------------------------------- \15\ National Institute of Standards and Technology, Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0, February 12, 2014, http://www.nist.gov/cyberframework/upload/cybersecurity- framework-021214-final.pdf. \16\ A Tier-2 organization ``knows its role in the larger ecosystem, but has not formalized its capabilities to interact and share information externally,'' whereas a Tier-4 organization `` . . . actively shares information with partners to ensure that accurate, current information is being distributed and consumed to improve cybersecurity before a cybersecurity event occurs (ibid., 10, 11). --------------------------------------------------------------------------- Would the proposed ISAO standards process sufficiently address concerns such as those raised above? Both the legislative proposal and the Executive Order call for designation of a nongovernmental organization whose purpose would be to specify a ``common set'' of ``best practices'' or ``voluntary standards or guidelines'' for creating and operating ISAOs. Such standards and practices may help address some but not all of the issues discussed above. For example, standards may be helpful in determining what kinds of information may be most useful to share for different purposes and different kinds of entities, as well as how best to use such information, but it seems unlikely that they can address concerns about overlapping or duplicative services, or problems such as gaps in coverage for key groups caused by economic factors. If ISAOs do in fact proliferate, it is very likely that substantial changes will occur in the information-sharing environment, but many of those effects may be difficult or even impossible to predict accurately. However, there appear to be few independent assessments of the performance and effectiveness of current information-sharing entities and their relationships.\17\ Some studies have concluded that measuring the effectiveness of information sharing is difficult in the current environment,\18\ and the creation of a large number of ISAOs could further complicate any assessments. Such concerns might be addressed by options such as on-going independent research and evaluation activities designed to determine the effectiveness of ISAOs, perhaps as a part of or complementary to the standards-development and revision process envisioned by the administration. That could potentially be started in conjunction with another option-staged implementation of the ISAO model, perhaps including pilot programs.\19\ --------------------------------------------------------------------------- \17\ One example is Government Accountability Office, Public Transit Security Information Sharing: DHS Could Improve Information Sharing Through Streamlining and Increased Outreach, September 2010, http://www.gao.gov/assets/310/309903.pdf. \18\ See, for example, Matthew H. Fleming, Eric Goldstein, and John K. Roman, Evaluating the Impact of Cybersecurity Information Sharing on Cyber Incidents and Their Consequences (Homeland Security Studies and Analysis Institute, March 31, 2014), http://papers.ssrn.com/sol3/ papers.cfm?abstract_id=?2418357; Brian A. Jackson, ``How Do We Know What Information Sharing Is Really Worth?,'' Product Page, (2014), http://www.rand.org/pubs/research_reports/RR380.html. \19\ These options are provided for purposes of illustration. CRS does not make recommendations or take positions on legislative issues. --------------------------------------------------------------------------- Questions From Honorable Jim Langevin for Eric A. Fischer Question 1. In reviewing the President's information-sharing proposal, I was drawn to the phrase ``lawfully obtained'' as it relates to cyber threat indicators. Due to ambiguities in anti-hacking statutes, courts have not yet settled whether the work of many well- intentioned security researchers--so-called white-hat hackers--is lawfully obtained. How can we work to ensure that information-sharing legislation does not chill vital security research while at the same time not opening the door to companies ``hacking back''? Answer. The current cybersecurity environment creates a number of dilemmas, and one of them is captured by this question. The problem is that the complexities of cyberspace--whether hardware, software, networks, or the people using them--combined with its rapid technological evolution and the changing threat environment, create significant challenges for distinguishing appropriate and inappropriate behavior, especially by those pursuing protective and defensive activities. Such ambiguity can create problems for legal and ethical interpretation of such actions and is believed by at least some observers to have a potentially chilling effect on needed research. This is not a new issue,\20\ but some legislative proposals to improve cybersecurity have led to increased attention to the concern.\21\ --------------------------------------------------------------------------- \20\ Aaron J. Burstein, ``Conducting Cybersecurity Research Legally and Ethically,'' April 4, 2008, https://www.usenix.org/legacy/event/ leet08/tech/full_papers/burstein/burstein_html/index.html. \21\ See, for example, Jan Ellis, ``Will the President's Cybersecurity Proposal Make Us More Secure?,'' Security Street, January 23, 2015, https://community.rapid7.com/community/infosec/blog/2015/01/ 23/will-the-president-s-cybersecurity-proposal-make-us-more-secure; Mark Jaycox and Lee Tien, ``Obama's Computer Security Solution Is a Mishmash of Old, Outdated Policy Solutions,'' January 16, 2015, https:/ /www.eff.org/deeplinks/2015/01/obamas-computer-security-solution-mish- mash-old-outdated-policy-solutions. --------------------------------------------------------------------------- In addition, researchers who are part of an established and recognized enterprise, such as a university or research institution, are likely to have different opportunities and constraints than those who operate independently, without either the benefits or the strictures of an institutional environment. Also, research may refer to many different activities, from the acquisition of fundamental knowledge about threats, vulnerabilities, and defenses, to the development of hardware, software, and procedures to address cybersecurity needs, to the investigation of specific incidents for purposes of attribution and response. Constraints on research are likely to apply to such different classes of researchers and activities in significantly different ways. One of the core challenges in finding ways to reduce the risk that the legal environment will chill needed research is in reaching a clear consensus among stakeholders about what constitutes proper and improper research activity. If such a consensus can be reached, legal ambiguities might be much more easily resolved. Without a consensus, resolution is likely to be very difficult. For example, some may argue that a research exception should be provided in communications privacy laws,\22\ but without agreement on what is and is not appropriate behavior, such an exception may be difficult to scope. --------------------------------------------------------------------------- \22\ Burstein, ``Conducting Cybersecurity Research.'' --------------------------------------------------------------------------- Another issue that may be worth considering is lack of understanding and education among researchers about what they can and cannot do under current law and regulations. Researchers may be reluctant to take some actions that are lawful solely because of uncertainty about their legality.\23\ One way to address this issue is to provide researchers with access to appropriate education resources that can clarify what is permitted and also provide guidance for reducing the risk of violating legal requirements.\24\ For example, the legal risks associated with the use of honeypots--websites or other information resources specifically designed to attract attacks--may depend, some have argued, on how they are implemented.\25\ --------------------------------------------------------------------------- \23\ Ibid. \24\ See, for example, Jody R. Westby, Legal Guide to Cybersecurity Research (Chicago, IL: American Bar Association, Section of Science & Technology Law, 2013). \25\ Burstein, ``Conducting Cybersecurity Research.'' --------------------------------------------------------------------------- Finally, an option available for some research problems is the use of isolated testbeds or ``cyber ranges.'' Such facilities are designed for research and training, can mimic many features of cyberspace, and permit a wide range of actions that could possibly be illegal if done in ``the wild.'' However, they are limited in scale and may otherwise be unable to mimic the environment of cyberspace sufficiently for some kinds of research. In addition, if they are not completely isolated from the internet, the risk of impacts on external systems would need to be considered. Question 2. I think I can safely speak for everyone on this panel in saying that we agree that cyber threat information sharing is important. I believe that the President's proposal will help lower legal barriers to information sharing. What are other obstacles that could continue to keep information sharing from being as ubiquitous as we'd like? Answer. Awareness of the potential utility of information sharing in cybersecurity appears to be increasing. As the question points out, legal barriers are only one set of obstacles that would need to be overcome for ubiquitous and effective use of this cybersecurity tool. Several additional potential obstacles are discussed below.\26\ --------------------------------------------------------------------------- \26\ The list is not intended to be definitive or exhaustive. That would require a comprehensive, objective study of all aspects of information sharing in the broader cybersecurity context. In addition, any such list is likely to change significantly as cyber space and its component threat and information-sharing environments continue to evolve. The items in this list are not presented in any order of priority or desirability. --------------------------------------------------------------------------- Resources The costs of information sharing vary, but may be prohibitive for some entities. The costs of obtaining information from an entity such as an ISAC may be comparatively low,\27\ but that is only for a mechanism to receive information. The information must be processed by the recipient and applied where appropriate. That will require staff time and perhaps additional hardware and software, especially for implementation of so-called ``real-time'' information sharing, which often involves machine-to-machine communication and action. Such costs may be particularly problematic for small businesses, which may be of concern not only because of their broad role in the economy, but also because the sector includes many innovators that can be inviting targets for cyber espionage, and because many are contractors with larger organizations that may be inviting targets for cyber crime.\28\ --------------------------------------------------------------------------- \27\ See, for example, N. Eric Weiss, Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis, CRS Report R43821. \28\ In the attack on Target, the criminals accessed the store's computer system through a compromised system of an HVAC contractor (see N. Eric Weiss and Rena S. Miller, The Target and Other Financial Data Breaches: Frequently Asked Questions, CRS Report R43496). --------------------------------------------------------------------------- Awareness Concerns about the lack of awareness about cybersecurity in general and information sharing in particular, especially within the private sector, have been long-standing. While the NIST Cybersecurity Framework \29\ and other efforts, along with media attention to major breaches, appear to have resulted in some increased awareness of the need for better cybersecurity, it is not yet clear the degree to which awareness has improved as a result. Awareness of a problem or need is also not sufficient on its own. To be effective, it must be translated into appropriate action, which often may not be the case. For example, according to a 2012 survey, three-quarters of small businesses believe that cybersecurity is important, but only 10% have a written policy on it.\30\ --------------------------------------------------------------------------- \29\ National Institute of Standards and Technology, ``Cybersecurity Framework,'' August 26, 2014, http://www.nist.gov/ cyberframework/index.cfm. \30\ About a quarter have an ``informal'' policy (National Cyber Security Alliance, Symantec, and JZ Analytics, 2012 NCSA/Symantec National Small Business Study, October 2012, https:// www.staysafeonline.org/ . . . /2012_ncsa_symantec_small_business_ study.pdf). --------------------------------------------------------------------------- Usefulness of Information Many kinds of information can be shared, from threat intelligence \31\ to business strategies and best practices. In addition, the same information may have different utility for different users--for example, threat signatures relating to attacks on one critical infrastructure sector may be of marginal concern for another, and best practices may be much more useful for small businesses than signatures associated with advanced targeted threats. Also, shared information may prove of little use if it is delayed, provided without relevant contextual detail, or provided in a form that requires substantial additional processing to determine its applicability. If recipients find that the information they are provided is of little use to them, they may be less likely to participate in or continue with information- sharing initiatives. --------------------------------------------------------------------------- \31\ This can be described as ``indicators (i.e., an artifact or observable that suggests that an attack is imminent, that an attack is underway, or that a compromise may have already occurred); the TTPs [tactics, techniques and procedures] of an adversary; and recommended actions to counter an attack'' Chris Johnson, Lee Badger, and David Waltermire, Guide to Cyber Threat Information Sharing (Draft), SP 800- 150 [National Institute of Standards and Technology, October 2014], 4, http://csrc.nist.gov/publications/drafts/800-15sp800_150_draft.pdf. --------------------------------------------------------------------------- Application of Information Information sharing by itself is not sufficient to improve cybersecurity. Not only must it be actionable--presented in a form that can be usefully applied--but the recipient must also have processes, including equipment and software, in place to use the information effectively. If such processes are not in place and utilized properly, the net effect is the same as if the information were not shared at all.\32\ --------------------------------------------------------------------------- \32\ See, for example, Johnson, Badger, and Waltermire, Guide to Cyber Threat Information Sharing (Draft). --------------------------------------------------------------------------- Reliability of Sources There are several reasons why sources of information may not be considered reliable by potential recipients. For example, the source may be a competitor, such as another business. The kinds of information the source provides may focus on a set of entities other than the one to which the recipient belongs. Or the source might have a reputation for providing erroneous, outdated, or otherwise useless information. If no sources are available to an entity that it deems reliable, it may be reluctant to participate in information-sharing activities. Mechanisms for Information Sharing Currently, there appear to be two general models for information sharing--a decentralized, ``peer-to-peer,'' often informal approach between entities with complementary needs, and a more centralized ``hub-and-spoke'' model such as the ISACs.\33\ Organizations such as ISACs are generally sector-specific. Not all sectors have such organizations, and other affiliations other than sector may also be important for some kinds of information sharing. Filling such gaps appears to be part of the rationale behind the administration's ISAO proposal.\34\ On the one hand, the absence of an appropriate mechanism can be a barrier to information sharing for an entity. On the other hand, a proliferation of mechanisms, such as some observers fear the administration's ISAO model might result in, could also serve as a barrier if it makes information sharing inefficient or confusing for possible participants. --------------------------------------------------------------------------- \33\ Denise E. Zheng and James A. Lewis, Cyber Threat Information Sharing: Recommendations for Congress and the Administration (CSIS, March 2015), https://csis.org/files/publication/ 150310_cyberthreatinfosharing.pdf. \34\ The White House, Updated Information Sharing Legislative Proposal; The White House, ``Fact Sheet: Executive Order Promoting Private Sector Cybersecurity Information Sharing''; Executive Order 13691, ``Promoting Private Sector Cybersecurity Information Sharing.'' --------------------------------------------------------------------------- Standards The adoption of standards for information sharing is one way to help address concerns about reliability and utility of information received. Dozens of standards exist relating to information sharing.\35\ The Department of Homeland Security has been developing a single set applicable to sharing of threat intelligence.\36\ Lack of a broadly-accepted set of consensus standards or a framework for information sharing might impede more wide-spread adoption of information-sharing activities. --------------------------------------------------------------------------- \35\ European Union Agency for Network and Information Security, Standards and Tools for Exchange and Processing of Actionable Information, November 2014, https://www.enisa.europa.eu/activities/ cert/support/actionable-information/standards-and-tools-for-exchange- and-processing-of-actionable-information. \36\ Department of Homeland Security, ``Information Sharing Specifications for Cybersecurity,'' 2015, https://www.us-cert.gov/ Information-Sharing-Specifications-Cybersecurity. --------------------------------------------------------------------------- Economic Incentives Some observers have noted that the benefits of receiving cybersecurity information tend to outweigh the benefits of providing such information for many organizations.\37\ In addition to legal issues that may be associated with providing information, businesses may be concerned about reputation costs, if they provide information showing that they have been victims of cyber attacks. In the absence of incentives for reciprocity, it is hard to see what benefit an organization would gain from providing information, unless it is a Government entity whose mission is to provide such data or a provider of cybersecurity services. Government measures such as requirements for data-breach notification, as enacted in most States, can provide incentives for organizations to share information about attacks that may be used to help prevent future attacks on other entities or to capture and prosecute cyber criminals. --------------------------------------------------------------------------- \37\ See, for example, N. Eric Weiss, Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis, CRS Report R43821; Zheng and Lewis, Cyber Threat Information Sharing: Recommendations for Congress and the Administration. --------------------------------------------------------------------------- Reducing the Need for Information Sharing Some observers have expressed concern about risks associated with an overemphasis on the role of information sharing in cybersecurity. It is only one of many cybersecurity tools. For example, it is a relatively small part of the NIST Cybersecurity Framework, and target levels of sharing vary among the tiers the Framework identified.\38\ In addition, information sharing tends to focus on immediate concerns such as cyber attacks and imminent threats. While those must be addressed, that does not diminish the need to reduce risks through design and implementation of more secure systems and networks--sometimes referred to as ``building security in''--and finding ways to change the incentive structure within cyber space to increase the costs and reduce the potential for profit from cyber crime and activities of other adversaries. --------------------------------------------------------------------------- \38\ National Institute of Standards and Technology, Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0. --------------------------------------------------------------------------- [all]