[House Hearing, 113 Congress]
[From the U.S. Government Publishing Office]



 FACILITATING CYBER THREAT INFORMATION SHARING AND PARTNERING WITH THE 
                  PRIVATE SECTOR TO PROTECT CRITICAL 
           INFRASTRUCTURE: AN ASSESSMENT OF DHS CAPABILITIES

=======================================================================

                                HEARING

                               before the

                     SUBCOMMITTEE ON CYBERSECURITY,
                       INFRASTRUCTURE PROTECTION,
                       AND SECURITY TECHNOLOGIES

                                 of the

                     COMMITTEE ON HOMELAND SECURITY
                        HOUSE OF REPRESENTATIVES

                    ONE HUNDRED THIRTEENTH CONGRESS

                             FIRST SESSION

                               __________

                              MAY 16, 2013

                               __________

                           Serial No. 113-17

                               __________

       Printed for the use of the Committee on Homeland Security


[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]



      Available via the World Wide Web: http://www.gpo.gov/fdsys/

                                _____

                  U.S. GOVERNMENT PRINTING OFFICE

85-613 PDF                WASHINGTON : 2013
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing 
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC 
area (202) 512-1800 Fax: (202) 512-2250  Mail: Stop SSOP, Washington, DC 
20402-0001





















                     COMMITTEE ON HOMELAND SECURITY

                   Michael T. McCaul, Texas, Chairman
Lamar Smith, Texas                   Bennie G. Thompson, Mississippi
Peter T. King, New York              Loretta Sanchez, California
Mike Rogers, Alabama                 Sheila Jackson Lee, Texas
Paul C. Broun, Georgia               Yvette D. Clarke, New York
Candice S. Miller, Michigan, Vice    Brian Higgins, New York
    Chair                            Cedric L. Richmond, Louisiana
Patrick Meehan, Pennsylvania         William R. Keating, Massachusetts
Jeff Duncan, South Carolina          Ron Barber, Arizona
Tom Marino, Pennsylvania             Dondald M. Payne, Jr., New Jersey
Jason Chaffetz, Utah                 Beto O'Rourke, Texas
Steven M. Palazzo, Mississippi       Tulsi Gabbard, Hawaii
Lou Barletta, Pennsylvania           Filemon Vela, Texas
Chris Stewart, Utah                  Steven A. Horsford, Nevada
Richard Hudson, North Carolina       Eric Swalwell, California
Steve Daines, Montana
Susan W. Brooks, Indiana
Scott Perry, Pennsylvania
Vacancy
                       Greg Hill, Chief of Staff
          Michael Geffroy, Deputy Chief of Staff/Chief Counsel
                    Michael S. Twinchek, Chief Clerk
                I. Lanier Avant, Minority Staff Director
                                 ------                                

SUBCOMMITTEE ON CYBERSECURITY, INFRASTRUCTURE PROTECTION, AND SECURITY 
                              TECHNOLOGIES

                 Patrick Meehan, Pennsylvania, Chairman
Mike Rogers, Alabama                 Yvette D. Clarke, New York
Jason Chaffetz, Utah                 William R. Keating, Massachusetts
Steve Daines, Montana                Filemon Vela, Texas
Scott Perry, Pennsylvania            Steven A. Horsford, Nevada
Vacancy                              Bennie G. Thompson, Mississippi 
Michael T. McCaul, Texas (ex             (ex officio)
    officio)
               Alex Manning, Subcommittee Staff Director
                    Dennis Terry, Subcommittee Clerk














                            C O N T E N T S

                              ----------                              
                                                                   Page

                               Statements

The Honorable Patrick Meehan, a Representative in Congress From 
  the State of Pennsylvania, and Chairman, Subcommittee on 
  Cybersecurity, Infrastructure Protection, and Security 
  Technologies...................................................     1
The Honorable Yvette D. Clarke, a Representative in Congress From 
  the State of New York, and Ranking Member, Subcommittee on 
  Cybersecurity, Infrastructure Protection, and Security 
  Technologies:
  Oral Statement.................................................    19
  Prepared Statement.............................................     4
The Honorable Bennie G. Thompson, a Representative in Congress 
  From the State of Mississippi, and Ranking Member, Committee on 
  Homeland Security..............................................     2

                               Witnesses

Ms. Roberta Stempfley, Acting Assistant Secretary, Office of 
  Cybersecurity and Communications, U.S. Department of Homeland 
  Security, Accompanied by Larry Zelvin, Director, National 
  Cybersecurity and Communications Integration Center, U.S. 
  Department of Homeland Security:
  Oral Statement.................................................     5
  Joint Prepared Statement.......................................     8
Mr. Charles K. Edwards, Acting Inspector General, U.S. Department 
  of Homeland Security:
  Oral Statement.................................................    14
  Prepared Statement.............................................    16

 
 FACILITATING CYBER THREAT INFORMATION SHARING AND PARTNERING WITH THE 
PRIVATE SECTOR TO PROTECT CRITICAL INFRASTRUCTURE: AN ASSESSMENT OF DHS 
                              CAPABILITIES

                              ----------                              


                         Thursday, May 16, 2013

             U.S. House of Representatives,
                    Committee on Homeland Security,
 Subcommittee on Cybersecurity, Infrastructure Protection, 
                                 and Security Technologies,
                                                    Washington, DC.
    The subcommittee met, pursuant to call, at 9:05 a.m., in 
Room 311, Cannon House Office Building, Hon. Patrick Meehan 
[Chairman of the subcommittee] presiding.
    Present: Representatives Meehan, Clarke, Vela, Horsford, 
and Thompson.
    Also present: Representative Jackson Lee.
    Mr. Meehan. The Committee on Homeland Security Subcommittee 
on Cybersecurity, Infrastructure Protection, and Security 
Technologies will come to order. The subcommittee is meeting 
today to examine the Department of Homeland Security's National 
Cyber and Communications Integration Center, better known as 
the NCCIC, and its capabilities to protect critical 
infrastructure from cyber attack.
    I would like to welcome everybody to today's hearing, which 
will give Members an opportunity to examine in-depth the work 
of the Department and Homeland Security's National 
Cybersecurity Communications and Integration Center.
    The NCCIC is one of the U.S. Government's key civilian 
interfaces with the private sector for cyber-threat information 
sharing, incident response, and protecting the U.S. critical 
infrastructure. The NCCIC is a collaborative method for Federal 
agencies, State and local governmental entities, the private 
sector, all to communicate cyber-threat information, analysis, 
and prevention methods in real time.
    The subcommittee has been crafting a body of work that will 
help establish key areas where we can improve the Department's 
critical infrastructure protection from cyber attack. We have 
examined the threat, particularly from nation states. We have 
looked at protecting U.S. citizens from civil liberty 
violations. Today we look at the threat mitigation capabilities 
at the Department of Homeland Security.
    The director of the National Intelligence, James Clapper, 
testified before Congress this year, stating that cyber is the 
No. 1 National security threat facing our country. On March 12, 
Director Clapper stated, and I quote: ``We assess that highly 
networked business practices and information technology are 
providing opportunities for foreign intelligence and security 
services, trusted insiders, hackers, and others to target and 
collect sensitive United States National security and economic 
data.''
    In addition, the director for the National Security Agency, 
General Keith Alexander, has said that cyber espionage has 
caused the ``greatest transfer of wealth in history.''
    Our Nation is in a new era and our security is no longer 
protected by oceans and borders. Indeed, American achievement 
in the 21st Century will be intricately tied to our ability to 
secure our networks, primarily our critical infrastructure 
networks.
    While our military protects our Nation from foreign 
adversaries, the security of our critical infrastructure--our 
economy, our roads and bridges, domestic energy, water and 
public utility systems--must be a collaborative effort between 
the private sector, the local, State, and Federal Government. 
We need a civilian agency to facilitate this partnership, and 
that agency is the Department of Homeland Security.
    Today's hearing will give us an opportunity to hear from 
our expert panel regarding ways the NCCIC currently brings a 
collaborative, National response to cybersecurity. Our capacity 
within the Committee on Homeland Security is to provide proper 
oversight to ensure that the NCCIC is functioning properly and 
is capable of leading in the protection of Federal agencies in 
cyberspace; it is capable of partnering with critical 
infrastructure owners and operators to share information and 
reduce risk; and providing the necessary intelligence elements 
to assure that State and local critical infrastructure 
operators are mitigating cyber threats and, I would add, 
responding appropriately in the aftermath of any kind of 
activity.
    I am looking forward to hearing from our witnesses, 
particularly in areas that will help the committee as 
legislators strengthen the Department's capabilities.
    We must examine ways to encourage increased participation 
from owners and operators of critical infrastructure, many of 
those--most of it--in the private sector. We need to ensure the 
Department is successfully disseminating threat data with other 
Federal agencies--in particularly, the Department of Justice 
and Defense. Most importantly, we must make sure that there are 
sufficient privacy protections in place to ensure that the 
Department is able to anonymize data for both personally 
identifiable information and stakeholder identifiable 
information.
    I look forward to hearing from our panel.
    The Chairman now recognizes the Ranking Member of the 
overall Committee on Homeland Security, Mr. Thompson.
    Mr. Thompson. Thank you, Mr. Chairman. Thank you for 
holding today's hearing.
    I also want to thank the witnesses for testifying here 
today.
    Over the past few years the cybersecurity mission of the 
Department of Homeland Security has undergone an unprecedented 
expansion in funding and a change in organizational structure. 
Today I look forward to hearing the testimony from some of the 
officials responsible for implementing these expanded programs 
and activities and overseeing the change in the organizational 
structure and culture.
    I also look forward to hearing about how these changes will 
assist DHS in its efforts to become, in perception and reality, 
the civilian lead for cybersecurity in the Federal sector. 
Though once in doubt, it now appears that DHS is bringing 
together the necessary elements to solidify its leadership 
role.
    In support of these efforts, last month Chairman McCaul and 
I sponsored an amendment to cyber information-sharing 
legislation, CISPA, that would establish a center within DHS as 
the Federal hub for information sharing. I hope this amendment 
sent a clear signal that any cybersecurity legislation passed 
by Congress during this session should have a strong role for 
DHS as a Federal leader in areas where Government and the 
private sector must work together to prevent cyber attacks and 
mitigate their impacts.
    Today, I want to hear more about DHS's human capital 
resources. It is my understanding that DHS, like all Federal 
agencies, is suffering from a shortage of cyber personnel.
    As DHS works to ensure its role as a Federal lead for 
domestic cybersecurity, we cannot ignore our Nation's ability 
to prepare for, respond to, and recover from advanced cyber 
threats in a forward-looking endeavor that cannot succeed 
without sufficient, qualified personnel. We cannot rely on 
other countries to develop our cyber workforce.
    While we cannot predict what cyber threats may occur, we 
can certainly be prepared and be ready. Be prepared and be 
ready is a philosophy DHS encourages the public to adopt for 
natural disasters. Yes, when the oncoming disaster may be a 
man-made cyber threat, the Department seems to have adopted a 
``let tomorrow take care of itself'' philosophy. Surely this is 
not acceptable.
    DHS must adopt a preparedness philosophy in all aspects of 
its work. In the world of cyber threats, a part of preparation 
must be capacity-building programs that include education, 
outreach, and awareness initiatives.
    This year, as hundreds of millions of dollars are poured 
into Einstein and continuous diagnostic programs, the 
administration's budget request slashed funding for National 
initiative for cybersecurity education by $4.8 million, cutting 
the program by one-third. These cuts will delay efforts to 
provide cyber outreach and education to 1.7 million high school 
students.
    We cannot continue to complain about the lack of skilled 
cybersecurity professionals in the American workforce if we are 
willing to allow DHS to cut the funding it uses to develop the 
cyber workforce. Again, let me say: We cannot rely on other 
countries to develop our cyber workforce.
    Mr. Chairman, I look forward to hearing from the witnesses 
and hope that we can work together to restore this funding and 
ensure that DHS is properly building a defense-in-depth 
strategy to protect the Nation far into the future.
    I yield back.
    Mr. Meehan. Let me thank the gentleman from Mississippi.
    Let me also let the other Members of the committee 
appreciate that opening statements may be submitted for the 
record, and we are pleased today to have a distinguished panel 
of witnesses before us on this very, very important topic.
    [The statement of Ranking Member Clarke follows:]
              Statement of Ranking Member Yvette D. Clarke
                              May 16, 2013
    After a significant expansion of the Department of Homeland 
Security's cybersecurity mission and programs, beginning in fiscal year 
2012, I am glad that we are finally holding a hearing to look at these 
programs in depth and to assess the progress of the Department in 
carrying out that mission.
    This is the subcommittee's third hearing on cybersecurity this 
Congress--first, we held a hearing on the threats in cyberspace to our 
critical infrastructure from state and non-state actors. Next, we 
learned about how DHS protects the privacy of our citizens in 
cyberspace.
    And with that background in place, today we will hear from the 
witnesses about whether the Department has the people, programs, and 
resources in place to successfully address the significant cyber 
threats to our critical infrastructure while protecting privacy. It is 
high time that our subcommittee takes a closer look at these programs, 
some of which did not even exist just a few years ago.
    The continuous diagnostics and EINSTEIN programs, in particular, 
have undergone rapid expansion, and I am pleased that the Department is 
fulfilling its role as the protector of the dot-gov domain, with the 
resources to match. But though these Federal network security programs 
get the majority of the funding and attention, I believe the 
Department's responsibilities for protecting critical infrastructure, 
most of which is found in the private sector, is equally important.
    For this reason, I am particularly pleased that we are joined by 
Deputy Inspector General Charles Edwards, who can discuss recent work 
done by the OIG to assess the progress that ICS-CERT has made to brand 
itself as the Cyber 9-1-1 for critical infrastructure before, during, 
and after cyber incidents.
    ICS-CERT, recently incorporated as an operational arm of the NCCIC, 
has done great work in mitigating cyber risks to critical 
infrastructure, and I look forward to learning more about this mission 
and the challenges that still remain to share information with the 
private sector quickly and efficiently.
    Finally, I want to register my concerns over the continuing drain 
of senior cybersecurity leadership at the Department, a trend that has 
gotten particularly bad in the last 6 months, with the departures of 
the assistant secretary and the deputy under secretary.
    We have been hearing about the difficulties DHS faces in attracting 
and retaining skilled junior and mid-level cyber employees for a long 
time, but what does it say about the Department's cyber organization 
when it cannot retain its senior leaders, either? Rumors are 
circulating about future replacements for these losses, and I am sure 
DHS would like to make a splash with these appointments, getting 
leaders who command respect in the information security and critical 
infrastructure worlds. But most of all, DHS needs to find leaders who 
believe in the mission and will stay on board as a steady hand on the 
wheel during this period of immense expansion and evolution of our 
cybersecurity efforts.
    As part of this process, I believe DHS needs to do some soul-
searching and identify why their senior officials have been leaving, 
and if changes need to be made to ensure future leaders will be more 
empowered to do their job, I expect that the Department will do so. I 
hope to work with the Department in this endeavor to guarantee that the 
vital cybersecurity mission gets the leadership it needs.

    Mr. Meehan. I have had the chance to visit the NCCIC and to 
see the great work that is done there, and to listen first-hand 
to the explanation of what they do, and as a result, it is a 
great privilege for us today to have the people who are at the 
front end of that.
    First, Ms. Roberta Stempfley is the acting assistant 
secretary of the Office of Cybersecurity and Communications, 
where she plays a leading role in developing the strategic 
direction of the cyber communications and security. A lot of 
the problem is you have got to figure out all of these letters 
in operating things, but it oversees five strategic divisions.
    She has previously served as the deputy assistant secretary 
for the CS&C and as the director of the National Cybersecurity 
Division. Prior her to work at the CS&C, Ms. Stempfley served 
as the chief information officer for the Defense Information 
Systems Agency, where she was responsible for supporting the 
director in decision making, strategy development, and 
communication, and management of information technology 
resources at that agency.
    Mr. Larry Zelvin is the director of the National 
Cybersecurity and Communications Integration Center, the NCCIC, 
which is housed at the Department of Homeland Security. The 
NCCIC is comprised of several components, including the U.S. 
Computer Emergency Readiness team, the National Coordination 
Center for Telecommunications, the Industrial Control Systems 
Cyber Emergency Response team, and a 24/7 operations center. 
Mr. Zelvin is a retired U.S. Navy captain and naval aviator 
with 26 years of active service.
    Mr. Charles Edwards is the deputy inspector general of the 
Department of Homeland Security. Mr. Edwards is the head of the 
Office of Inspector General, a role he first attained when 
named acting inspector general in February 2011. Mr. Edwards 
has over 20 years of experience in the Federal Government and 
has held leadership positions at several agencies, including 
the TSA, United States Postal Office, Inspector--the Office of 
the Inspector General, and the United States Postal Service.
    The witnesses' full written statements appear in the 
record, and I know that Ms. Stempfley and Mr. Zelvin have 
offered a joint statement.
    So the Chairman now recognizes Ms. Stempfley for 5 minutes 
to testify, but I do want you to make sure that you hit the 
important points you have in your testimony. So thank you, Ms. 
Stempfley. The Chairman now recognizes you for your testimony.

  STATEMENT OF ROBERTA STEMPFLEY, ACTING ASSISTANT SECRETARY, 
OFFICE OF CYBERSECURITY AND COMMUNICATIONS, U.S. DEPARTMENT OF 
   HOMELAND SECURITY, ACCOMPANIED BY LARRY ZELVIN, DIRECTOR, 
 NATIONAL CYBERSECURITY AND COMMUNICATIONS INTEGRATION CENTER, 
              U.S. DEPARTMENT OF HOMELAND SECURITY

    Ms. Stempfley. Thank you very much, Chairman Meehan, 
Ranking Member Thompson, and distinguished Members of the 
committee. I appreciate the time you have taken today and it is 
certainly our pleasure to appear before you to discuss the 
Department of Homeland Security's National Cybersecurity and 
Communications Integration Center and its role in protecting 
critical infrastructure from cyber attacks, securing our 
Federal networks, and coordinating cybersecurity information 
sharing with the private sector.
    Before I begin, I want to thank you for your leadership, 
sir--Mr. Thompson commented in his opening statement, as well--
during the recent legislation debate over the Cyber 
Intelligence Sharing and Protection Act, and especially in 
supporting the passing of that amendment designating DHS as the 
lead civil Federal entity to receive cyber threat information.
    Cybersecurity puts the confidentiality, integrity, and 
availability of critical services at risk. DHS, along with its 
Government and private-sector partners, work to counter these 
threats while supporting a cyber ecosystem that is open, 
transparent, and less vulnerable to manipulation. The NCCIC 
supports this effort by providing comprehensive and robust 
information sharing, incident response, technical assistance, 
and analysis capabilities to and with our private sector, 
Government, and international partners. While coordinating with 
these partners, our goal is to ensure that privacy, 
confidentiality, civil rights, and civil liberties are not 
diminished by our security initiatives.
    The Department's transparency and public accountability 
allow us to act as a pipeline to get cyber threat information 
in the hands of critical infrastructure owners and operators. 
We are able to share experiences and trends with law 
enforcement and intelligence communities while preventing 
malicious actors from gaining access to sensitive sources and 
methods.
    Within DHS's National Protection and Programs Directorate, 
the Office of Cybersecurity and Communications focuses on 
managing the risk to communications and information technology 
infrastructures and the sectors that depend on them. Our role 
is to enable timely response and recovery of these 
infrastructures under all circumstances.
    The Department manages and facilitates cybersecurity 
information-sharing efforts, analysis, and incident response 
activities through the NCCIC. It is a round-the-clock 
organization where Government, private-sector, and 
international partners work together towards a whole-of-Nation 
approach to address cybersecurity and communications issues at 
the operational level.
    We thank those of you who have come out for a tour and 
invite those who have yet to to do so to come and see the 
center in operation, with our private-sector partners shoulder-
to-shoulder with us in the capabilities.
    The NCCIC has experienced over the last year a 68 percent 
increase from 2011 to 2012 in incidents reported. In 2012 we 
received 190,000 cyber incidents reported to the NCCIC.
    Recently we have been working with the Departments of 
State, Justice, Treasury, and other interagency partners as 
well as our industry partners, such as the Financial Services 
Information Sharing and Analysis Center, to respond to the 
series of denial-of-service attacks against our financial 
services industry that have occurred over the past few months. 
US-CERT has worked, along with the FBI and other interagency 
partners, to provide technical data, on-site assistance, 
classified and unclassified briefings in order to help 
financial institutions and their information technology service 
providers improve their defensive capabilities.
    In addition to sharing with the private-sector entities, we 
have provided this information to over 120 international 
partners, many of whom have contributed to the mitigation 
efforts. These efforts have not only helped financial 
institutions blunt the impact of these attacks, but have helped 
the industry develop new strategies that DHS is sharing with 
other sectors of critical infrastructure should they face 
similar attacks.
    The Industrial Control Systems Computer Emergency 
Response--Cyber Emergency Response Team's mission is to reduce 
the risk to the Nation's critical infrastructure and the 
control systems that operate within it by strengthening those 
control systems. We have responded to almost 200 incidents over 
the last year with 89 on-site visits and 15 teams deployed 
jointly with the US-CERT to assist in significant private-
sector engagements.
    In March 2012, the Control Systems--the ICS-CERT identified 
a campaign of cyber intrusions targeting natural gas pipeline 
sector with spear phishing e-mails that dated back to December 
2011. Responding quickly, we immediately began an action 
campaign with the Department of Energy and other partners to 
conduct classified and unclassified briefings across the 
country providing warnings and mitigation. These entities have 
been very--have benefitted from this rapid information sharing.
    The third entity in the NCCIC is the National Coordination 
Center for Telecommunications. It leads and coordinates 
initiation, restoration, and reconstitution of National 
security emergency preparedness telecommunication services 
under all conditions.
    It has recently collaborated with industry in response to 
Hurricane Sandy, which enhanced wireless coverage to emergency 
responders providing emergency services to the 33,400 citizens 
in Long Beach, New York, the 1.4 million citizens in Nassau 
County, and the 130,000 citizens in faraway Queens. Their 
effort supported the recovery of communications to the U.S. 
financial sector by coordinating fuel and power restoration to 
key facilities in New York City, ensuring no impact to 
international financial trading.
    The Department's efforts to protect critical infrastructure 
are enhanced by the recently-issued cybersecurity Executive 
Order and Presidential Policy Directive on critical 
infrastructure security and resilience. Both of these documents 
improve the NCCIC's ability to execute its mission in support 
of the private sector by strengthening and securing the 
resilience of critical infrastructure, increasing the role of 
cybersecurity and securing physical assets, and expanding the 
coordination and information sharing with critical 
infrastructure partners.
    The Executive Order also supports DHS's strong privacy and 
civil liberty goals by reinforcing those protections and their 
incorporation in every aspect of our cybersecurity efforts. The 
Department believes, however, that the comprehensive suite of 
cybersecurity legislation is still an essential to improving 
the Nation's cybersecurity and we are pleased that the 
administration will continue to work with Congress to achieve 
this.
    Thank you so much for your support and continued attention 
to this critical issue, and I look forward to your questions.
    [The joint prepared statement of Ms. Stempfley and Mr. 
Zelvin follows:]
   Joint Prepared Statement of Roberta Stempfley and Lawrence Zelvin
                              May 16, 2013
                              introduction
    Chairman Meehan, Ranking Member Clarke, and distinguished Members 
of the committee, it is a pleasure to appear before you today to 
discuss the Department of Homeland Security's (DHS) National 
Cybersecurity and Communications Integration Center (NCCIC). 
Specifically, I will discuss the NCCIC's role, responsibilities, and 
future planning to protect our Nation's critical infrastructure from 
cyber attacks, secure Federal networks, and coordinate private-sector 
cyber-threat information sharing.
    Before I begin, I would like to thank the committee for its 
leadership during the recent legislative debate over the Cyber 
Intelligence Sharing and Protection Act, especially in support of 
passing an amendment to designate DHS as the lead civilian Federal 
entity to receive cyber threat information. Cybersecurity threats put 
the confidentiality, integrity, and availability of critical services 
at risk. DHS, along with its Government and private-sector partners, 
works to counter these threats while supporting a cyber ecosystem that 
is open, transparent, and less vulnerable to manipulation. The NCCIC 
supports this effort by providing comprehensive and robust information 
sharing, incident response, technical assistance, and analysis 
capabilities to private-sector, Government, and international partners.
                        current threat landscape
    Cyberspace is woven into the fabric of our daily lives. According 
to recent estimates, this global network of networks encompasses more 
than 2 billion people with at least 12 billion computers and devices, 
including global positioning systems, mobile phones, satellites, data 
routers, ordinary desktop computers, and industrial control computers 
that run power plants, water systems, and more. While this increased 
connectivity has led to significant transformations and advances across 
our country--and around the world--it also has increased the importance 
and complexity of our shared risk. Our daily life, economic vitality, 
and National security depend on cyberspace. A vast array of 
interdependent IT networks, systems, services, and resources are 
critical to communicating, traveling, powering our homes, running our 
economy, and obtaining Government services. No country, industry, 
community, or individual is immune to cyber risks.
    The United States confronts a dangerous combination of known and 
unknown vulnerabilities in cyberspace and strong and rapidly expanding 
adversary capabilities. Cyber crime also has increased significantly 
over the last decade. Sensitive information is routinely stolen from 
private-sector and Government networks, undermining the integrity of 
the data contained within these systems. The Department currently sees 
malicious cyber activity from foreign nations and non-state actors 
engaged in intellectual property theft and information operations, 
terrorists, organized crime, and insiders. Their methods range from 
distributed denial of service (DDoS) attacks and social engineering to 
viruses and other malware introduced through remote access, thumb 
drives, supply chain exploitation, and leveraging trusted insiders' 
access.
    The Department has seen motivations for attacks vary from 
intellectual property theft to criminals seeking financial gain and 
hackers who may seek bragging rights in the hacker community. 
Industrial control systems also are targeted by a variety of malicious 
actors who may have intentions to damage equipment and facilities or 
steal data. Foreign actors also are targeting intellectual property 
with the goal of stealing trade secrets or other sensitive corporate 
data from U.S. companies in order to gain an unfair competitive 
advantage in the global market.
    Successful response to dynamic cyber threats requires leveraging 
homeland security, law enforcement, and military authorities and 
capabilities, which respectively provide for domestic preparedness, 
criminal deterrence and investigation, and National defense. DHS, the 
Department of Justice (DOJ), and the Department of Defense (DOD) each 
play a key role in responding to cybersecurity incidents that pose a 
risk to the United States. To achieve a whole-of-Government response, 
DHS, DOJ, and DOD coordinate continuously to effectively respond to 
specific incidents. While each agency operates within the parameters of 
its authorities, the U.S. Government's response to cyber incidents of 
consequence is coordinated among these three agencies such that ``a 
call to one is a call to all.''
                     nccic's cybersecurity mission
    DHS coordinates the overall Federal effort to promote the security 
and resilience of the Nation's critical infrastructure by ensuring 
maximum coordination and partnership with the private sector while 
ensuring that privacy, confidentiality, and civil rights and civil 
liberties are not diminished by its security initiatives. Accordingly, 
the Department has implemented rigorous privacy and civil rights and 
civil liberties standards, which apply to all of its cybersecurity 
programs and initiatives. In order to protect privacy while 
safeguarding and securing cyberspace, DHS institutes layered privacy 
responsibilities throughout the Department, embeds fair information 
practice principles into cybersecurity programs and privacy compliance 
efforts, and fosters collaboration with cybersecurity partners.
    Within DHS's National Protection and Programs Directorate (NPPD), 
the Office of Cybersecurity and Communications (CS&C) focuses on 
managing risk to the communications and information technology 
infrastructures and the sectors that depend upon them, as well as 
enabling timely response and recovery of these infrastructures under 
all circumstances. CS&C executes its mission by supporting 247 
information sharing, analysis, and incident response; facilitating 
interoperable emergency communications; advancing technology solutions 
for private and public-sector partners; providing tools and 
capabilities to ensure the security of Federal civilian executive 
branch networks; and engaging in strategic-level coordination for the 
Department with private-sector organizations on cybersecurity and 
communications issues.
    To better manage and facilitate cybersecurity information-sharing 
efforts, analysis, and incident response activities, the Department 
established the NCCIC, a round-the-clock information sharing, analysis, 
and incident response center where Government, private-sector, and 
international partners all work together. The NCCIC is comprised of 
four branches: The United States Computer Emergency Readiness Team (US-
CERT), the Industrial Control Systems Cyber Emergency Response Team 
(ICS-CERT), the National Coordinating Center for Telecommunications 
(NCC), and Operations Integration (O&I). As mutually-supporting and 
integrated elements of the NCCIC, these branches provide the unique 
authorities, capabilities, and partnerships needed to drive a whole-of-
Nation approach to addressing cybersecurity and communications issues 
at the operational level.
   US-CERT provides advanced information sharing, incident 
        response, and analysis expertise for malicious cyber activity 
        targeting private-sector and Government networks. US-CERT's 
        global partnerships allow it to work directly with analysts 
        from across multiple sectors and international borders to 
        develop a comprehensive picture of malicious activity and 
        mitigation options. US-CERT's mission focuses specifically on 
        computer network defense, and it is able to apply its full 
        resources to supporting prevention, protection, mitigation, 
        response, and recovery efforts.
   ICS-CERT reduces risk to the Nation's critical 
        infrastructure by strengthening the cybersecurity of systems 
        that operate our Nation's critical infrastructure. It carries 
        out this mission by performing incident response to support 
        asset owners with discovery, analysis, and recovery efforts as 
        well as providing situational awareness through training, 
        alerts, and advisories to warn of cyber-based threats and 
        vulnerabilities affecting critical infrastructure assets. In 
        addition, ICS-CERT conducts assessments and technical analysis 
        of malware, digital media, system vulnerabilities, and emerging 
        exploits and partners with the control systems community to 
        coordinate risk management activities.
   NCC leads and coordinates the initiation, restoration, and 
        reconstitution of the National Security/Emergency Preparedness 
        (NS/EP) telecommunications services or facilities during any 
        human-caused or natural event where physical communications 
        infrastructure is damaged or vulnerable. NCC leverages 
        partnerships across Government, industry, and international 
        partners to gain situational awareness and determine priorities 
        for protection and response. NCC's presence in the NCCIC allows 
        DHS to synchronize operational processes supporting both the 
        physical and the virtual components of our Nation's information 
        and communications technology infrastructure.
   O&I applies planning, coordination, and integration 
        capabilities to synchronize analysis, information sharing, and 
        incident response efforts, ensuring effective synchronization 
        across the NCCIC.
                            strategic goals
    The NCCIC works to proactively analyze cybersecurity and 
communications threats and vulnerabilities and coordinate their 
findings with partners to manage risks to critical systems; create 
shared situational awareness among public-sector, private-sector, and 
international partners by collaboratively developing and sharing timely 
and actionable cybersecurity and communications information; and 
rapidly respond to routine and significant cybersecurity and 
communications incidents and events to mitigate harmful activity, 
manage crisis situations, support recovery efforts, and assure NS/EP.
    To accomplish its strategic goals, NCCIC relies on the voluntary 
coordination, collaboration, capabilities, and resources of its 
partners. The center works closely with those Federal agencies most 
responsible for securing the Government's cyber and communications 
systems, including the Departments of Treasury and Energy. The NCCIC 
also actively engages with the appropriate private-sector entities, 
information-sharing and analysis centers, State, local, Tribal, and 
territorial governments, and international partners. As integral parts 
of the cyberspace and communications community, these groups work 
together to protect the portions of critical information technology 
that they interact with, operate, manage, or own. These groups of 
stakeholders represent natural communities of practice providing the 
foundation for effective information sharing and response.
Threat Analysis
    NCCIC collaborates with private-sector, Government, and 
international partners to identify, research, and verify suspicious, 
malicious, or potentially harmful cybersecurity and communications 
activity, events, or incidents. For example, US-CERT operates NCCIC's 
Advanced Malware Analysis Center, which receives malware samples and 
other potentially malicious files from around the world. The Advanced 
Malware Analysis Center analyzes those files, shares that analysis 
broadly to alert partners to malicious activity, and provides them with 
actionable indicators and recommendations to improve their ability to 
protect themselves.
    By understanding the nature of attacks, vulnerabilities, and risks, 
NCCIC is able to determine possible impacts, set priorities, and 
proactively develop and share effective mitigation strategies. NCCIC 
strives to anticipate potentially harmful activity and provide 
actionable alert and warning information to partners before they are 
impacted. NCCIC's analysis efforts, whether focused on a new piece of 
malware or a tropical storm with the potential to damage critical 
communications systems, contribute directly to its information sharing, 
response, and protection and prevention capabilities.
Situational Awareness
    The success of the NCCIC's mission is heavily reliant on its 
ability to establish shared situational awareness of potentially 
harmful activity, events, or incidents across multiple constituencies 
to improve the ability of diverse and distributed partners to protect 
themselves. To do this, NCCIC integrates analysis and data received 
through its own analysis, intelligence community and law enforcement 
reporting, and data shared by private-sector and international partners 
into a comprehensive series of actionable information products, which 
are shared with partners in easy-to-digest machine-readable formats.
    Multidirectional sharing of alerts, warnings, analysis products, 
and mitigation recommendations among Federal, State, local, Tribal, and 
territorial governments, private sector, including information sharing 
and analysis centers, and international partners is a key element of 
NCCIC's cyber and communications protection and prevention framework. 
The NCCIC continuously works with a broad range of partners to explore 
and innovate new ways to enhance information sharing and move closer to 
network speed communications.
Rapid Response
    The NCCIC applies the collective capabilities of its partners and 
constituents to identify, prioritize, and escalate confirmed 
cybersecurity incidents in order to minimize impacts to critical 
information infrastructure. To ensure a 247 capability, NCCIC 
maintains cross-functional incident response teams, which draw from the 
capabilities of NCCIC's branches, along with expertise from elsewhere 
in DHS such as the United States Secret Service (USSS) and Immigration 
and Customs Enforcement (ICE). Working under a voluntary request for 
technical assistance, these incident response teams analyze malware, 
review network logs, and assess security posture to identify possible 
malicious activity, its impacts, as well as mitigation and recovery 
options.
    Recognizing the possibility of a cyber incident with physical 
impacts or a physical incident with cyber implications, NCCIC works 
increasingly closely with NPPD's National Infrastructure Coordinating 
Center (NICC). This collaboration, directed by Presidential Policy 
Directive 21 (PPD-21), helps to ensure strong synchronization between 
DHS's infrastructure protection efforts in both the cyber and physical 
realms. In addition, the NCCIC assists in the initiation, coordination, 
restoration, and reconstitution of the NS/EP telecommunications 
services or facilities under all conditions, crises, or emergencies 
including executing Emergency Support Function 2--Communications 
responsibilities under the National Response Framework.
    These efforts provide a whole-of-Nation approach to incident 
response, efficiently and effectively leveraging capabilities from 
across DHS's partner base while implementing key policies.
                   protecting critical infrastructure
    Protecting critical infrastructure against growing and evolving 
cyber threats requires a layered approach. DHS actively collaborates 
with public and private-sector partners every day to improve the 
security and resilience of critical infrastructure while responding to 
and mitigating the impacts of attempted disruptions to the Nation's 
critical cyber and communications networks and to reduce adverse 
impacts on critical network systems.
    DHS coordinates the National protection, prevention, mitigation, 
and recovery from cyber incidents and works regularly with business 
owners and operators to take steps to strengthen their facilities and 
communities, and through collaboration between the NCCIC and the NICC, 
integrates efforts across the physical and cyber domains. The 
Department also conducts on-site risk assessments of critical 
infrastructure and shares risk and threat information with State, 
local, and private-sector partners. NCCIC enhances situational 
awareness among stakeholders, including those at the State and local 
level, as well as industrial control system owners and operators, by 
providing critical cyber threat, vulnerability, and mitigation data. 
These efforts provide unique value to private-sector partners by 
integrating data from companies and industries that might not normally 
communicate.
    In 2011, DHS launched the Cyber Information Sharing and 
Collaboration Program (CISCP), which is specifically designed to 
elevate the cyber awareness of all critical infrastructure sectors 
through close and timely cyber threat information sharing and direct 
analytical exchange. Through the CISCP, participating private-sector 
partners are able to share data directly with Government. When 
requested, these datasets are covered by the Protected Critical 
Infrastructure Information (PCII) program, which protects the name of 
the company that shared the information from disclosure through Freedom 
of Information Act requests, regulatory processes, civil litigation, 
and other sunshine law requirements. Submitted datasets are analyzed in 
the context of other data received from across sectors, and based on 
this analysis regular analytical products are shared back out with 
partners. CISCP has signed 40 Cooperative Research and Development 
Agreements (CRADAs), and is in the process of finalizing agreements 
with 66 additional entities to formalize a streamlined information-
sharing process. Since December 2011, CISCP has released over 900 
products containing approximately 18,000 cyber threat indicators, which 
are based on information the Department has gleaned from participant 
submissions, open-source research, and from sensitive Government 
information.
    NCCIC has also benefited from close collaboration with the USSS and 
ICE, which have complementary jurisdiction over the investigation of 
computer crime violations that they exercise to protect the Nation's 
leaders and critical infrastructure and strategically target 
transnational organized criminals who are exploiting the financial 
system through cybercrimes. By working closely together, NCCIC and its 
law enforcement partners are able to leverage each organization's 
expertise and unique authorities to more effectively and efficiently 
execute DHS's cybersecurity mission.
                      responding to cyber threats
    As the civilian Department at the intersection of public-private 
information sharing, DHS is a focal point for coordinating 
cybersecurity information sharing with the private sector, the 
Department engages with owners and operators, based on their requests 
for technical assistance, by providing on-site analysis, mitigation 
support, and assessment assistance. The Department has repeatedly 
demonstrated its ability to expeditiously support private-sector 
partners with cyber intrusion mitigation and incident response. 
Initiating technical assistance with any private company to provide 
analysis and mitigation advice is a sensitive endeavor that requires 
trust and strict confidentiality. DHS's efforts focus on civilian 
computer network defense and protection rather than law enforcement, 
military, or intelligence functions in order to mitigate threats to the 
networks and reduce future risks.
    Since 2009, the NCCIC has responded to nearly half-a-million 
incident reports and released more than 26,000 actionable cybersecurity 
alerts to the Department's public- and private-sector partners. An 
integral player within the NCCIC, the US-CERT also provides response 
support and defense against cyber attacks for Federal civilian agency 
networks as well as private-sector partners upon request. In 2012, US-
CERT processed approximately 190,000 cyber incidents involving Federal 
agencies, critical infrastructure, and the Department's industry 
partners. This represents a 68 percent increase from 2011. In addition, 
US-CERT issued over 7,455 actionable cyber-alerts in 2012 that were 
used by private sector and Government agencies to protect their 
systems, and had over 6,400 partners subscribe to the US-CERT portal to 
engage in information sharing and receive cyber-threat warning 
information.
    The Department's ICS-CERT also responded to 177 incidents last year 
while completing 89 site assistance visits and deploying 15 teams with 
US-CERT to respond to significant private-sector cyber incidents, which 
includes analyzing data and sharing results, developing mitigation 
recommendations, and providing alerts and warning to potential future 
victims. DHS also empowers owners and operators through a cyber self-
evaluation tool, the Cyber Security Evaluation Tool (CSET), which was 
used by over 1,000 companies last year. In addition, DHS provides in-
person and on-line training sessions that focus on network security.
    The NCCIC, and its Federal partners, works with the private sector 
and international partners in preventing intellectual property theft 
with a whole-of-Government approach. For example, the United States 
Secret Service--which brings together over 6,000 partners from across 
sectors through its 29 domestic Electronic Crimes Task Forces (ECTFs)--
investigates cyber crimes within its jurisdiction, and the United 
States Coast Guard contains a component of U.S. Cyber Command and U.S. 
Strategic Command for the conduct of military missions. In each case, 
DHS focuses not only on responding to the incident at hand, but also on 
identifying trends, warning potential victims, and proactively engaging 
with partners. DHS, in collaboration with FBI and other partners, 
released a series of Joint Indicator Bulletins, containing cyber-threat 
indicators to help private-sector partners take action to stop this 
activity and protect them from theft of intellectual property, trade 
secrets, and sensitive business information.
    Most recently, and in close collaboration with interagency partners 
as well as industry partners like the Financial Services Information 
Sharing and Analysis Center, DHS has been engaged with private-sector 
and international partners during the series of DDoS incidents over the 
past few months. DHS has provided technical data and assistance, 
including identifying hundreds of thousands of DDoS-related IP 
addresses and supporting contextual information in order to help 
financial institutions and their information technology security 
service providers improve their defensive capabilities. In addition to 
sharing with these private-sector entities, DHS has provided this 
information to over 120 international partners, many of whom have 
contributed to our mitigation efforts. DHS, along with the FBI and 
other interagency partners, has also deployed on-site technical 
assistance to provide in-person support, and has conducted numerous 
classified briefings on the nature of the threat and mitigation 
strategies to hundreds of financial-sector IT security specialists. 
These efforts have helped to increase the U.S. Government's sharing and 
coordination efforts internally and with private-sector partners. 
Additionally, the mitigation strategies provided have not only helped 
financial institutions significantly blunt the impact of these attacks, 
but they have also helped the industry develop new strategies of their 
own that DHS hopes to share with other sectors of critical 
infrastructure to help mitigate similar attacks.
    NCCIC's NCC played a vital role in response to Hurricane Sandy 
recovery efforts. The NCC, as the coordinator for Emergency Support 
Function No. 2 under the National Response Framework, provided a wide 
range of communications support in partnership with industry to support 
responders, citizens, and industry response and recovery. NCC worked to 
improve first-responder actions by assisting in radio network 
infrastructure restoration such as microwave connectivity supporting 
local fire department dispatch and coordination. They also coordinated 
aid to citizens through more than 170 instances of emergency 
provisioning of communications installations supporting response 
organizations such as the American Red Cross, Army Corps of Engineers, 
Social Security Administration, and the Federal Emergency Management 
Agency. Collaborating with industry, NCC enhanced wireless coverage to 
first responders who provide emergency services to approximately 33,400 
citizens in Long Beach, New York; 1,400,000 citizens in Nassau County 
and 130,000 citizens in Far Rockaway, Queens. Their efforts also 
supported the recovery of communications to the U.S. financial sector 
by coordinating fuel and power restoration to a key facility in New 
York City, ensuring no impact to international financial trading.
    Finally, in March 2012, DHS identified a campaign of cyber 
intrusions targeting natural gas pipeline sector companies with spear-
phishing e-mails that dated back to December 2011. The attacks were 
highly-targeted, tightly-focused, and well-crafted. Stolen information 
could provide an attacker with sensitive knowledge about industrial 
control systems, including information that could allow for 
unauthorized operation of the systems. While there is no evidence that 
anyone has tried to subvert the operation of these industrial control 
systems, the intent of the attacker remains unknown. DHS immediately 
began an action campaign to alert the oil and natural gas pipeline 
sector community of the threat and offered to provide assistance. 
Industry partners have been responsive to these threats, and in May and 
June 2012, DHS deployed on-site assistance to two of the organizations 
targeted in this campaign: An energy company that operates a gas 
pipeline in the United States and a manufacturing company who 
specializes in producing materials specific to pipeline construction. 
DHS also partnered with the Department of Energy and others to conduct 
briefings across the country. Over 500 private-sector individuals 
attended the classified briefings and hundreds more received 
unclassified briefings providing warnings and mitigation strategies.
                        recent executive actions
    As today's physical and cyber infrastructures become increasingly 
linked, critical infrastructure and emergency response functions grow 
ever more inseparable from the information technology systems that 
support them. The Government's role in this effort is to share 
information and encourage enhanced security and resilience, while 
identifying and addressing gaps not filled by the marketplace. These 
policies work in conjunction with Executive Order 13618 of July 6, 
2012, Assignment of National Security and Emergency Preparedness 
Communications Functions, which improves how the Executive branch 
handles NS/EP Communications and ties cyber into emergency response 
communications.
    In February 2013, President Obama issued EO 13636, as well as PPD-
21 on Critical Infrastructure Security and Resilience, which will work 
to strengthen the security and resilience of critical infrastructure 
through an updated and overarching National framework that acknowledges 
the increased role of cybersecurity in securing physical assets, and 
will improve NCCIC's ability to execute its mission in support of the 
private sector. The President's actions mark an important milestone in 
the Department's on-going efforts to coordinate the National response 
to significant cyber incidents while enhancing the efficiency and 
effectiveness of our work to strengthen the security and resilience of 
critical infrastructure, and these policies will further enable NCCIC's 
mission. EO 13636 supports more efficient sharing of cyber-threat 
information with the private sector and directs the National Institute 
of Standards and Technology to develop a Cybersecurity Framework to 
identify and implement better security practices among critical 
infrastructure sectors. EO 13636 directs DHS to establish a voluntary 
program to promote the adoption of the Cybersecurity Framework in 
conjunction with Sector-Specific Agencies and to work with industry to 
assist companies in implementing the framework.
    EO 13636 also expands the DHS Enhanced Cybersecurity Services (ECS) 
program, key aspects of which are operated by the NCCIC. ECS is a 
voluntary information-sharing program that assists critical 
infrastructure owners and operators to improve protection of their 
systems from unauthorized access, exploitation, or data exfiltration. 
DHS works with cybersecurity organizations from across the USG to gain 
access to a broad range of cyber-threat information. ECS consists of 
the operational processes and security oversight required to share 
sensitive and classified cyber-threat information with qualified 
Commercial Service Providers (CSPs) that will enable them to better 
protect their customers who are critical infrastructure entities. CSPs 
can deliver approved services to validated critical infrastructure 
entities through commercial relationships. The ECS program is not 
involved in establishing commercial relationships between CSPs and CI 
entities. ECS augments, but does not replace, entities' existing 
cybersecurity capabilities. The ECS information-sharing process 
protects Critical Infrastructure (CI) entities against cyber threats 
that could otherwise harm their systems. ECS program participation is 
voluntary and designed to protect Government intelligence, corporate 
information security, and the privacy of participants, while enhancing 
the security of critical infrastructure. Validated CI entities from all 
16 CI sectors are eligible to participate in the ECS program and 
receive ECS services from an eligible CSP.
    In addition, the Presidential Policy Directive directs the 
Executive branch to strengthen our capability to understand and 
efficiently share information about how well critical infrastructure 
systems are functioning and the consequences of potential failures. It 
calls for a comprehensive research and development plan for critical 
infrastructure to guide the Government's effort to enhance market-based 
innovation. The strategic imperatives in PPD-21 also direct the NCCIC 
and the NICC to ``function in an integrated manner and serve as focal 
points for critical infrastructure partners to obtain situational 
awareness and integrated, actionable information to protect the 
physical and cyber aspects of critical infrastructure.'' As such, NPPD 
is enhancing the existing coordination of its two critical 
infrastructure operations centers, the NCCIC and the NICC.
                    continuing need for legislation
    We continue to believe that carefully-crafted information-sharing 
provisions, as part of a comprehensive suite of cybersecurity 
legislation, are essential to improve the Nation's cybersecurity to an 
acceptable level, and we will continue to work with Congress to achieve 
this.
    The administration's legislative priorities for the 113th Congress 
build upon the President's 2011 Cybersecurity Legislative Proposal and 
take into account 2 years of public and Congressional discourse about 
how best to improve the Nation's cybersecurity. Congress should enact 
legislation to incorporate privacy, confidentiality, and civil 
liberties safeguards into all aspects of cybersecurity; strengthen our 
critical infrastructure's cybersecurity by further increasing 
information sharing and promoting the establishment and adoption of 
standards for critical infrastructure; give law enforcement additional 
tools to fight crime in the digital age; and create a National Data 
Breach Reporting requirement.
                               conclusion
    Set within an environment characterized by a dangerous combination 
of known and unknown vulnerabilities, rapidly-evolving adversary 
capabilities, and a lack of comprehensive threat and vulnerability 
awareness, the cybersecurity mission is truly a National one requiring 
broad collaboration. DHS is committed to creating a safe, secure, and 
resilient cyber environment while promoting cybersecurity knowledge and 
innovation and protecting privacy, confidentiality, civil rights, and 
civil liberties in collaboration with its public, private, and 
international partners. Thank you for your continued support and 
attention to the critical issue of cybersecurity and I look forward to 
your questions.

    Mr. Meehan. [Off mike.]
    One of us thinks we have to get technology as my button to 
work.
    Thank you, Ms. Stempfley, for your testimony. As I 
identified at the outset, Mr. Zelvin joins in that testimony on 
behalf of the Department of Homeland Security.
    So now the Chairman recognizes Mr. Edwards, Inspector 
General's Office of DHS, for your testimony.

STATEMENT OF CHARLES K. EDWARDS, ACTING INSPECTOR GENERAL, U.S. 
                DEPARTMENT OF HOMELAND SECURITY

    Mr. Edwards. Good morning, Chairman Meehan, Ranking Member 
Clarke, Ranking Member Thompson, and Members of the 
subcommittee. Thank you for the opportunity to discuss DHS 
efforts to secure the Nation's industrial control systems. The 
majority of information that I will provide is contained in our 
February 2013 report, ``DHS Can Make Improvements to Secure 
Industrial Control Systems.''
    Industrial control systems, or ICS, are systems that manage 
and monitor the Nation's critical infrastructure and key 
resources, or CIKR. ICS are increasingly under attack by a 
variety of malicious sources, ranking from hackers looking for 
attention and reputation to sophisticated nation states intent 
on damaging equipment and facilities, disgruntled employees, or 
competitors.
    Successful attacks on ICS can give malicious users direct 
control of operational systems, creating the potential for 
large-scale power outages or man-made environmental disasters 
and can cause physical damage, loss of life, and other 
cascading effects.
    DHS has strengthened the security of ICS by addressing the 
need to share critical cybersecurity information, analysis 
vulnerabilities, verify emerging threats, and disseminate 
mitigation strategies. DHS has taken a number of actions to 
improve ICS security and foster better partnership within 
Federal and private sectors.
    For example, DHS has established the ICS-CERT Incident 
Response Team, also known as the fly-away team, to support the 
public and private sectors through on-site and remote incident 
response services on a variety of cyber threats. DHS has 
improved the quality of its alerts and bulletins by including 
actionable information regarding vulnerabilities and 
recommended mitigations and best practices for securing ICS. 
Finally, the Department has strengthened its outreach efforts 
with the ICS community, including vendors, owners, operators, 
and academic community and other Federal agencies.
    Although DHS has made improvements, more needs to be done 
to reduce the cybersecurity risks for the Nation's ICS. Many of 
the private-sector partners we interviewed use portals such as 
the Homeland Security Information Network, or HSIN, to retrieve 
advisories, vulnerability information, and best practices. 
There are 55 communities of interest on the HSIC Critical 
Sectors portal intended to facilitate communication and 
collaboration among all CIKR sectors and the Federal 
Government.
    However, DHS does not have a consolidated summary overview 
page on the HSIN Critical Sectors portal that highlights new 
information and activities to ensure that ICS cybersecurity 
information is shared effectively. As a result, the content of 
each of the CIKR sectors must be searched individually for 
pertinent and updated information. These searches can be time-
consuming for the stakeholders.
    In addition, all the sector-specific agencies senior 
officials that we interviewed expressed a need to be notified 
in advance when ICS-CERT is performing on-site or remote 
technical assistant assessments with private companies within 
their sectors. For example, these officials suggested that ICS-
CERT publish a heads-up or a quick anonymous informational 
alert regarding an on-going investigative or pending event, 
sectors and devices affected, and whether a potential fix 
exists. Such notification would be helpful and would allow them 
to react more accordingly if other companies call them with 
questions.
    Overall, officials acknowledge that DHS had improved the 
quality of alerts and bulletins that address various cyber 
topics. However, they expressed concern regarding the 
timeliness of ICS-CERT's information sharing and 
communications. ICS-CERT management acknowledged that sector-
specific agencies, councils, and private sectors concerning 
regarding the sharing of active incidents and threats, such as 
identified cyber intrusions and spear phishing e-mails.
    However, proprietary information and on-going law 
enforcement investigations sometimes limit the amount of 
information ICS-CERT can disseminate. The report included two 
recommendations and NPPD concurred with both.
    Mr. Chairman, this concludes my prepared remarks, and I 
would be happy to answer any questions that you or the Members 
may have.
    Thank you.
    [The prepared statement of Mr. Edwards follows:]
                Prepared Statement of Charles K. Edwards
                              May 16, 2013
    Good morning Chairman Meehan, Ranking Member Clarke, and Members of 
the subcommittee: Thank you for the opportunity to discuss DHS' efforts 
to secure the Nation's industrial control systems. The majority of 
information that I will provide today is contained in our February 2013 
report, DHS Can Make Improvements to Secure Industrial Control Systems 
(OIG-13-39).
    Industrial control systems (ICS) are systems that include 
supervisory control and data acquisition, process control, and 
distributed control that manage and monitor the Nation's critical 
infrastructure and key resources (CIKR).\1\ ICS are an integral part of 
our Nation, and help facilitate operations in vital sectors. Beginning 
in 1990, companies began connecting their operational ICS with 
enterprise systems that are connected to the internet. This allowed 
access to new and more efficient methods of communication, as well as 
more robust data, and gain quicker time to market and interoperability. 
However, security for ICS was inherently weak because it allowed remote 
control of processes and exposed ICS to cybersecurity risks that could 
be exploited over the internet. As a result, ICS are increasingly under 
attack by a variety of malicious sources. These attacks range from 
hackers looking for attention and notoriety to sophisticated nation-
states intent on damaging equipment and facilities, disgruntled 
employees, competitors, and even personnel who inadvertently bring 
malware into the workplace by inserting an infected flash drive into a 
computer. A recent survey revealed that a majority of the companies in 
the energy sector had experienced cyber attacks, and about 55 percent 
of these attacks targeted ICS. These attacks involved large-scale 
denial-of-service and network infiltrations. Successful attacks on ICS 
can give malicious users direct control of operational systems, 
creating the potential for large-scale power outages or man-made 
environmental disasters and cause physical damage, loss of life, and 
other cascading effects that could disrupt services.
---------------------------------------------------------------------------
    \1\ There are 18 CIKR sectors: Agriculture and Food, Banking and 
Finance, Chemical, Commercial Facilities, Communications, Critical 
Manufacturing, Dams, Defense Industrial Base, Emergency Services, 
Energy, Government Facilities, Healthcare and Public Health, 
Information Technology, National Monuments and Icons, Nuclear Reactors, 
Material and Waste, Postal and Shipping, Transportation Systems, and 
Water.
---------------------------------------------------------------------------
    Some recent cyber attacks have included the following:
   In February 2011, the media reported that hackers had stolen 
        proprietary information worth millions of dollars from the 
        networks of six energy companies in the United States and 
        Europe.
   In December 2011, a sophisticated threat actor targeted the 
        oil and natural gas subsector. Affected asset owners across the 
        sector voluntarily worked with DHS during the investigation.
   Throughout 2011, there were reports of spear-phishing via 
        email in the energy sector; no negative impacts occurred to the 
        companies' control processes and operations.
   In March 2012, an alert was issued regarding phone-based 
        social engineering attempts at two or more power distribution 
        companies. The callers attempted to direct the company 
        personnel to take action to correct a problem that would have 
        allowed the attacker to gain access to their ICS.
   In April 2012, media reported that a Canadian ICS 
        manufacturing company inadvertently planted a backdoor login 
        account in its own operating systems, which contain switches 
        and servers used in mission-critical communications networks 
        that operate power grids and railway and traffic control 
        systems. This account could have allowed attackers to access 
        the devices via the internet.
    The Industrial Control Systems--Cyber Emergency Response Team's 
(ICS-CERT) operational capabilities focus on the private-sector CIKR 
ICS and networks, which is essential to the Department's mission to 
protect the Nation's critical infrastructure, particularly against 
emerging cyber threats. Additionally, ICS-CERT uses the Request Tracker 
Ticketing System to capture analytical and status information regarding 
vulnerabilities and incidents. The ticketing system maintains the 
incident response team's remote technical assistance and on-site 
assessment status and reports. Tickets are color-coded based on age. 
The ticketing system notifies the assigned personnel when the status of 
a ticket is changed or further action is needed. Additionally, ICS-CERT 
coordinates control systems-related security incidents and information 
sharing with Federal, State, and local agencies and organizations, as 
well as private-sector constituents, including vendors, owners, and 
operators of ICS.
    ICS-CERT exchanges information with stakeholders via the Homeland 
Security Information Network (HSIN)--Critical Sector. The Office of the 
Chief Information Officer (OCIO) develops and maintains HSIN and serves 
as data governance steward for HSIN policy documents, including the 
HSIN Model Charter and HSIN Terms of Service. Although OCIO is the data 
steward, the office is not responsible for maintaining the content that 
users and communities of interest post to any element of HSIN.\2\ Each 
community of interest sponsor is responsible for maintaining and 
sharing the content within the community of interest and through the 
community of interest shared space.\3\ The administration and 
governance of the communities of interest, including creation of 
individual sites within the community, is at the discretion of their 
sponsors. OCIO works in cooperation with each community of interest to 
enforce the rules in the charter and terms of services. OCIO conducts 
regular reviews of communities of interest to validate and justify its 
purpose, objectives, and operational need. National Protection and 
Programs Directorate (NPPD) sponsors and manages the critical sector 
communities of interest.
---------------------------------------------------------------------------
    \2\ HSIN communities of interest are separate environments wherein 
users involved in the same subject matter area or industry may post and 
view potentially relevant news and information and use collaborative 
tools.
    \3\ The HSIN shared space allows authorized stakeholders and 
content contributors to publish finished products and relevant 
documents that: (1) Have appropriate markings providing sharing 
permissions at the document level, and (2) are targeted to an 
authorized audience based on their credentials and related community of 
interest and system-wide rules for sharing.
---------------------------------------------------------------------------
 dhs' progress in improving the security of industrial control systems
    We reported that Department needed to improve the security of ICS 
and information sharing to enhance program effectiveness. DHS has 
strengthened the security of ICS by addressing the need to share 
critical cybersecurity information, analyze vulnerabilities, verify 
emerging threats, and disseminate mitigation strategies. For example, 
DHS has taken the following actions to improve ICS security and foster 
better partnerships between the Federal and private sectors:
   Establishing ICS-CERT Incident Response Team, also known as 
        the fly-away teams, to support the public and private sectors 
        through on-site and remote incident response services on a 
        variety of cyber threats, ranging from general malicious code 
        infections to advanced persistent threat intrusions. 
        Additionally, in March 2012, NPPD released the Cyber Security 
        Evaluation Tool Version 4.1. The updated tool assists users in 
        identifying devices connected to their networks, as well as 
        external connections, by creating a diagram of their systems.
   Operating a malware lab that provides testing capabilities 
        to analyze vulnerabilities and malware threats to control 
        system environments. The team verifies vulnerabilities for 
        researchers and vendors, performs impact analysis, and provides 
        patch validation and testing prior to deployment to the asset-
        owner community.
   Improving the quality of its alerts and bulletins by 
        including actionable information regarding vulnerabilities and 
        recommended mitigations and best practices for securing ICS.
   Providing products to the ICS community on a daily, weekly, 
        monthly, quarterly, and as-needed basis, through email, 
        website, and portal postings. These products help ICS-CERT to 
        improve the situational awareness of ICS and provide status 
        updates of its working groups, articles of interest, and 
        upcoming events and training.
   Implementing a virtual private network solution to allow 
        NPPD program officials to access program applications and 
        systems (e.g., the ICS-CERT ticketing system) located at the 
        Idaho National Laboratory (INL).\4\
---------------------------------------------------------------------------
    \4\ A virtual private network is a technology for using the 
internet or another intermediate network to connect computers to 
isolated remote computer networks that would otherwise be inaccessible. 
Users can access resources on remote networks, such as files, printers, 
databases, or internal websites.
---------------------------------------------------------------------------
   Assisting in developing various roadmaps for the cross-
        sector, dams, nuclear, water, and transportation. The road maps 
        provide vision and framework for mitigating cybersecurity risk 
        to the wide variety of systems critical to each sector's 
        operations.
    Finally, the Department has strengthened its outreach efforts with 
the ICS community, including vendors, owners/operators, academia, and 
other Federal agencies. These efforts include participating in the 
periodic meetings with the Cross-Sector Cyber Security Working Group; 
Government Coordinating Council and Sector Coordinating Council; and 
various sector-specific groups.
                            major challenges
    Despite these actions, NPPD still faces challenges in reducing the 
cybersecurity risks for the Nation's ICS. Further, NPPD can improve its 
efforts to protect and secure control systems that are essential to the 
Nation's security and economy. Specifically, ICS-CERT needs to 
consolidate its information-sharing and communication efforts with 
Sector-Specific Agencies and the private sector to ensure that these 
stakeholders are provided with potential ICS threats and 
vulnerabilities to mitigate security threats timely. In addition, DHS 
needs to improve communications with Sector-Specific Agencies and the 
private sector by providing advanced notification of ICS-CERT's remote 
technical and on-site incident assessments.
Consolidation of Multiple Information-Sharing Communities of Interest
    Many of the private-sector partners we interviewed (e.g., owners/
operators, regulators, and working groups) use the HSIN, ICS-CERT, and 
United States Computer Emergency Readiness Team (US-CERT) portals to 
retrieve advisories, vulnerability information, and best practices. 
There are 55 communities of interest on the HSIN-Critical Sectors 
intended to facilitate communication and collaboration among all CIKR 
sectors and the Federal Government. However, DHS does not have a 
consolidated summary overview page on HSIN-Critical Sectors that 
highlights new information and activities to ensure that ICS 
cybersecurity information is shared effectively. As a result, the 
content for each of the CIKR sectors and must be searched individually 
for pertinent and updated information. For example, the Dams, Emergency 
Management, and Electricity and Oil and Natural Gas subsector 
communities of interest, which are used by companies that belong to 
multiple sectors, have to be searched individually and may contain non-
cybersecurity information, such as physical security, emergency 
response, and planning. These searches can be time-consuming for the 
stakeholders.
    Additionally, each community of interest is arranged differently, 
making it more cumbersome for the users to retrieve useful information. 
For example, some HSIN users told us that the various communities of 
interest contain duplicate information. As a result, some Sector-
Specific Agencies want to build additional portals for their 
stakeholders to streamline the information DHS provides.
    ICS-CERT officials acknowledged that existing communities of 
interest could confuse owners/operators. To eliminate duplicate 
information from the communities of interest, ICS-CERT created a 
subcommittee to address stakeholder concerns regarding the communities 
of interest. ICS-CERT officials said that ICS-CERT only contributed 
content to the communities of interest and does not have the 
responsibility for site set up. However, NPPD plans to hold discussions 
with OCIO to determine whether these communities of interest could be 
consolidated to better serve stakeholder needs.
    We recommended that the Under Secretary, NPPD collaborate with OCIO 
to streamline the HSIN portal to ensure that ICS cyber information is 
shared effectively.
Advance Notification of Remote Technical and On-site Assessments
    All the Sector-Specific Agencies senior officials that we 
interviewed expressed a need to be notified in advance when ICS-CERT is 
performing on-site or remote technical assistance assessments with 
private companies within their sectors. For example, these officials 
suggested that ICS-CERT publish a ``heads-up'' or ``quick anonymous'' 
informational alert regarding an on-going investigative/pending event, 
sectors and devices affected, and whether a potential fix exists. The 
Sector-Specific Agency officials told us that such notifications would 
be helpful and would allow them to react more appropriately if other 
companies call them with questions. For example, according to Nuclear 
Sector-Specific Agency officials, the Department's Domestic Nuclear 
Detection Office sends an email alert to State authorities and its 
offices regarding upcoming site visits.
    DHS does not communicate timely the results of its remote technical 
and on-site assessments to the public. We interviewed officials from 
three Sector-Specific Agencies, six Government and private-sector 
councils, and 23 private companies from the dams, energy, and nuclear 
sectors to evaluate whether ICS-CERT shared sufficient information and 
communicated effectively. Overall, these officials acknowledged that 
DHS had improved the quality of alerts and bulletins that addressed 
various cyber topics. However, they expressed concerns regarding the 
timeliness of ICS-CERT's information sharing and communications. As a 
result, the stakeholders are concerned that a great deal of time might 
elapse until stakeholders were made aware of the same or similar 
incident that could affect their systems.
    Additionally, both Sector-Specific Agencies and private-sector 
officials said that an advance notification would be helpful to 
increase dialogue with ICS-CERT on an event or threat that has not been 
made public. The private-sector officials suggested that advance 
notification can allow them to assist ICS-CERT in developing solutions 
and mitigating strategies as well as determining whether an incident is 
isolated or systemic.
    ICS-CERT management acknowledged the Sector-Specific Agencies', 
councils', and private sector's concerns regarding the sharing of 
active incidents and threats, such as identified cyber intrusions and 
spear-phishing emails. Additionally, ICS-CERT management told us that 
the private sector perceives that ICS-CERT has more useful information 
available than it is willing to share. However, ICS-CERT management 
said that proprietary information and on-going law enforcement 
investigations limit the amount of information ICS-CERT can 
disseminate. For example, there were instances in which the Federal 
Bureau of Investigation was engaged in an on-going investigation and 
had withheld sensitive law enforcement information. Additionally, the 
protected critical infrastructure information between DHS and the 
private-sector owner prohibits ICS-CERT from sharing vulnerability and 
malware assessment information.
    We recommended that the Under Secretary, NPPD promote collaboration 
with Sector-Specific Agencies and private-sector owners/operators by 
communicating preliminary technical and on-site assessment results to 
address and mitigate potential security threats on ICS.
    Mr. Chairman, this concludes my prepared statement. I appreciate 
your time and attention and welcome any questions from you or Members 
of the subcommittee.

    Mr. Meehan. Thank you, Mr. Edwards, for your testimony.
    Before we go to the opportunity for my colleagues to 
present their questions to you, I am pleased to be joined by 
the Ranking Member of our committee, the gentlelady from New 
York, and I recognize her now for opening comments that she may 
have?
    Ms. Clarke. Thank you very much, Mr. Chairman, and thank 
you to the Ranking Member and my colleagues.
    Mr. Chairman, I want to thank you once again for holding 
this morning's hearing. After significant expansion of the 
Department of Homeland Security's cybersecurity mission and 
programs beginning in fiscal year 2012, I am glad that this 
morning we have had the opportunity to examine these programs 
and are now able to assess the progress of the Department in 
carrying out the mission.
    As you are aware, this is the subcommittee's third hearing 
on cybersecurity in this Congress. First we held a hearing on 
the threats in cyberspace through our critical infrastructure 
from state and non-state actors. Next we learned about the 
DHS--how DHS protects the privacy of our citizens in 
cyberspace. With the background in place, today we have heard 
from the witnesses about the Department and has the--about 
whether the Department has people, programs, and resources in 
place to successfully address the significant cyber threats to 
our critical infrastructure while protecting privacy.
    It is high time that our subcommittee take a closer look at 
these programs, some of which did not even exist just a few 
years ago. The continuous diagnostics and Einstein programs in 
particular have undergone rapid expansion, and I am pleased 
that the Department is fulfilling its role as the protector of 
the dot-gov domain with the resources to match.
    But though these Federal network security programs get the 
majority of the funding and attention, I believe the 
Department's responsibilities for protecting critical 
infrastructure, most of which is found in the private sector, 
is equally important. For this reason, I am particularly 
pleased that we have been joined this morning by Deputy 
Inspector Charles Edwards and that he has discussed the recent 
work done by the OIG to assess the progress that ICS-CERT has 
made to brand itself as the cyber 9-1-1 for critical 
infrastructure before, during, and after cyber incidents.
    ICS-CERT, recently incorporated as an operational arm of 
the NCCIC, has done great work in mitigating cyber risks to 
critical infrastructure and it was important that we learned 
more about this mission and the challenges that still remain to 
share information with the private sector quickly and 
efficiently.
    Finally, I want to register my concerns about the 
continuing drain of senior cybersecurity leadership at the 
Department, a trend that has gotten particularly bad in the 
last 6 months, with the departures of the assistant secretary 
and the deputy under secretary. We have been hearing about the 
difficulties DHS faces in attracting and retaining skilled 
junior and mid-level cyber employees for a long time, but 
this--but what does it say about the Department's cyber 
organization when it cannot retain its senior leaders as well?
    Rumors are circulating about the future replacements of 
these losses, and I am sure DHS would like to make a splash 
with these appointments, getting leaders who command respect in 
information security and critical infrastructure worlds. But 
most of all, DHS needs to find leaders who believe in the 
mission, that will stay on-board as a steady hand on the wheel 
during this period of immense expansion and evolution of our 
cybersecurity efforts.
    As part of this process, I believe DHS needs to do some 
soul searching and identify with why their senior officials 
have been leaving. If changes need to be made to ensure future 
leaders will be more empowered to do their job, I expect that 
the Department will do so. I hope to work with the Department 
in this endeavor to guarantee that vital cybersecurity mission 
gets the leadership it needs.
    Once again, I would like to thank all of you for testifying 
before us this morning.
    I yield back the balance of my time.
    Mr. Meehan. I thank the Ranking Member for her opening 
comments.
    We are grateful, again, for your presence here today, of 
this distinguished panel.
    So I now recognize myself for 5 minutes of questioning.
    Let me begin by sharing an observation that I believe we in 
Congress, and in fact, across the Governmental sector, aren't 
doing a good enough job of really alerting the citizens in 
general about the true nature and scope of the threat that we 
face. We often respond in the aftermath of an incident and 
spend time analyzing what we could have done better.
    I believe the work that you are doing is not only vital to 
the security of our Nation, but you have done some tremendous 
things in the form of anticipating and sharing and 
communicating.
    So please, if I can just ask Mr. Zelvin and Ms. Stempfley, 
quickly, what is your assessment of the true nature of the 
threat that we face today in the world of cybersecurity?
    Ms. Stempfley.
    Ms. Stempfley. I had to figure the button out, too.
    Thank you very much for the opportunity to answer that 
question. As we have all recognized, cyber pervades almost 
every facet of our life--we do banking on-line, we do--I renew 
my driver's license on-line, our workplace has gone entirely 
on-line--and a recognition of that important part that the 
cyber landscape plays in this is certainly not something I 
think is widely known. So I agree with your point.
    We in the Department have been very focused on sharing 
actionable information, those threat indicators that can be put 
out there, whether it from a criminal source, whether it come 
from a hacktivist source, whether it comes from an intelligence 
source--putting that in the hands of the people who can do the 
most with it. I know Mr. Zelvin will give you very specific 
indications of that as he goes through his response to this 
question.
    But we have to pair that with raising the overall 
understanding of the population of the role that cyber plays, 
and so some of the other programs that are outside the 
technology programs that the Office of Cybersecurity and 
Communication has in things like the ``Stop, Think, Connect'' 
campaign and other broad awareness campaigns will raise that--
serves to raise that awareness so that consumers can understand 
what the impact is to them and will live up to some of their 
obligations, as well.
    Mr. Meehan. Mr. Zelvin, it is consumers, and Ms. Stempfley 
focused to some extent on the impact on the everyday American, 
but it is much broader than that, is it not, with respect to 
the very infrastructure that we have in this Nation, including 
our grids and other things of that nature?
    Mr. Zelvin. It is, Mr. Chairman. When I look at the 
challenge I look at the threats, I look at the victims, and I 
look at the mitigation capabilities. So as you look at the 
threats, it is as Ms. Stempfley said, it can affect the 
individuals.
    But there is also nation states. There are also criminal 
actors. There are nefarious actors and there are just people 
who want to see if they can do it for the sake of doing it.
    When you look at the victims, you have companies that are 
worth billions of dollars internationally. You have victims 
such as my aunt, who called me on a weekend and said, ``Why is 
DHS locking my computer and want $400 to unlock it?'' She was a 
victim of something called ransomware. Some virus got on and 
she couldn't unlock it.
    So the victims are very sophisticated or they are an 
elderly woman who doesn't understand why her computer isn't 
working.
    As you look at the mitigation capabilities, they are also 
varied. Some companies have magnificent capabilities, and 
probably we need the Government to provide information and a 
warning of what is happening and some suggestions on what to 
do, and then they are off and running and can deal with the 
challenges.
    Other places, they have no capability. They are not sure 
what to do. They are very confused by the threat and they know 
it is a problem, but they are not really sure what to do.
    In many cases they buy products from the commercial 
sector--anti-virus vendors--and hope that can be the solution. 
But it many cases it won't as they are stealing personal 
identifiable information, potentially financial information.
    Mr. Meehan. Would you jump off of that point, because I 
think it gets to the heart of what is so important about the 
work you do in the NCCIC, and particularly the fact that we 
have a moldable--or we have a broad range of capabilities, as 
you identified, very sophisticated capacities that not only 
rival but probably work in concert with the capacities--the 
highest level of capacities that we have in the Government 
sector, and I am talking about the banking sector, in some ways 
the communication sector and others.
    In other places we have systems that are dramatically 
behind, and I am talking about things like water systems or 
other kinds of municipal authorities, but all of which today 
are tied to the internet, and therefore, the operating systems 
are capable of being influenced and attacked.
    At some point, Mr. Edwards, you have done work into looking 
at that.
    But, Mr. Zelvin, explain the important role that the NCCIC 
plays in being more or less a junction that is able to tie 
together the capacity to take the best of what we have and 
allow it to be available to support those industries which are 
lagging dramatically behind.
    Mr. Zelvin. Mr. Chairman, as I look at the--you know, you 
mentioned what is it going to take for people to understand 
this cyber challenge? I will tell you, there is a variety of 
experiences, and those who have been attacked the most are 
obviously the most aware and the most prepared, and that, I 
think are the financial services sector and the communications 
sector and the information technology sector. These are the 
folks that are living and breathing attacks on a daily basis 
and they are becoming more sophisticated by the day.
    There are other sectors, as you mentioned, that haven't had 
these attacks. So what we do in the NCCIC is we look across the 
16 critical infrastructures and we try and raise the water to 
keep all the boats at the same level, if you will.
    So we highlight across the sectors. That is, what is 
happening in one sector today could be happening in another 
sector tomorrow. So we want to increase the awareness.
    We are also sharing those mitigation strategies. In some 
cases--in many cases--these are things that companies can do 
themselves, so we just want to reinforce. There is a friction 
within the critical infrastructure because in many cases--I 
apologize--the information technology and the security folks, 
they are not part of the profit, so--and there is money that 
needs to be brought into this solution.
    So what we try to do is we tell those that are in the 
leadership position to really listen to these security 
professionals and really deal with these cyber practices 
because they can affect your core businesses.
    I would also like to mention that we also work with State, 
local, and Tribal, territorial governments. We work with 
international partners. There are over 200 countries that we 
deal with almost on a weekly basis.
    So it is the critical infrastructure, it is our State, 
local, Tribal, territorial, it is our Federal Department's 
agencies, international, and as I said, the individuals. But 
the cyber threat is literally global in nature and we are 
trying to make sure we have awareness and help with the 
prevention mitigation across the board.
    Mr. Meehan. Well, my time is expired but I look forward to 
following up on some of that with the second line of questions.
    Now the Chairman recognizes the ranking lady from--the 
gentlelady from New York, the Ranking Member, Ms. Clarke?
    Ms. Clarke. Thank you, Mr. Chairman.
    Ms. Stempfley, I wanted to delve into Einstein 3. DHS has 
requested large funding increases to build out Einstein 3, 
which will help prevent intrusions into civilian Federal 
networks. While I am supportive of this program, I am concerned 
about the progress of such a large initiative and want to make 
sure it is carried out properly to ensure that our Federal 
networks are secured and to keep the cost to the taxpayers 
down.
    A recent report by GCN Magazine raised concerns that 
Einstein may be over budget and behind in implementation. For 
the record, can you give the subcommittee an update on 
Einstein, particularly Einstein 3? What is the schedule for 
deploying it at all departments and agencies, and do you expect 
there to be cost and time frame overruns?
    Ms. Stempfley. Thank you, ma'am.
    Einstein 3 is a part of a comprehensive set of capabilities 
for perimeter protection known as the National Cybersecurity 
Protection System. Just about a year ago we transitioned 
Einstein 3 from being a consolidated, Government-provided 
hardware and data capability--classified capability to be 
deployed at the internet service providers--to one that takes 
advantage of the innovation that the internet service providers 
can provide into this environment, so that classified 
Government information and countermeasures can be deployed in 
an environment where the ISPs, who are most knowledgeable of 
their own infrastructure and of the ability to transmit 
traffic, can absorb that and innovate with the Government in 
this environment.
    We are pleased to have notified Congress, I believe 5 weeks 
ago, of the award of the first of those contracts with 
CenturyLink, the first internet service provider, and we are in 
process of transitioning Federal departments onto that 
capability.
    An important piece of information here is that we 
transition Federal departments who are using that service 
provider. So we are not asking departments to move from 
whichever internet service provider provides their connection; 
we are employing this protection measure in place within that 
mechanism.
    So we are targeting those departments who are--whose 
service provider is CenturyLink. We are continuing to actively 
engage with the other four internet service providers for 
contract award in those instances, and that has been 
negotiation that is on-going. So we are very happy about that.
    We are still on target to reach our final operational 
capability in the end of 2015. This transition that we made a 
year ago actually moved our final operational capability from 
2018 back to 2015, so we saw that as a very beneficial 
capability for us to employ this protection across the entire 
Federal enterprise.
    Ms. Clarke. Fabulous. With that efficiency in time is there 
an efficiency in cost, as well?
    Ms. Stempfley. As it turned out in the analysis, the cost 
was identical between the two transitions within a small 
margin. It did not actually save us money but it also did not 
cost additional money over the life-cycle cost of the program.
    Ms. Clarke. Very well. Thank you for that update.
    Mr. Edwards, you released a report just yesterday detailing 
serious information security deficiencies at CBP. Is this--a 
little point of departure but I think it is critical when we 
look at our vulnerabilities.
    Some of the--what you outlined in your report is that there 
are some poor practices, including computers that were not 
locked or not password protected, a failure to require that 
employees sign in--or sign nondisclosure agreements for 
sensitive systems they received access to. Making matters 
worse, many of these issues had been previously identified by 
the OIG. Your recommendations based on these findings were 
directed to the CBP chief information officer and the DHS chief 
information officer but there is no role for the Office of 
Cybersecurity Communications within NPPD to play to help the 
rest of the Department improve their cyber practices.
    Could you give us a little more of a sense of what your 
observations and what this level of vulnerability can mean to 
the overall cyber environment that we find ourselves in?
    Mr. Edwards. Thank you, ma'am.
    The report that I released yesterday was in reference to 
the CBP I.T. management letter. Part of the financial statement 
audit--we use KPMG to do our financial statement audits, and 
part of that, we also do the I.T. part of it, we look at the 
FISCAM functions. There are five controls that we look at. We 
look at security management, access controls, integration 
management, segregation of duties, and contingency planning.
    So as we go through not only CBP but various different 
components, we identified I.T. control weaknesses. Even though 
CBP has fixed some of those weaknesses in the previous year 
that we identified, there are still additional controls and 
weaknesses that we have found that they need to address.
    So as, you know, part of the password protection and people 
being able to get into the systems, we have found not only in 
CBP but other parts of--even when we did within one of the 
components within NPPD we found almost a similar situation, so 
it is prominent throughout the Department.
    So I think sending a guidance to the entire Department on 
best practices and, you know, one would think instead of having 
a password as ``newuser1'' one would change it as soon as they 
are able to log in, and then maintain that, as well. Not, you 
know, quite often you find people, you know, writing the 
username and password and leaving it under the keyboard and 
other places where people can find it.
    So the--part of the review, what we did was we looked to, 
as the help desk we call up the component that we are doing the 
audit on and say, ``I am from the help desk. Can you give me 
your username and password?'' and without hesitation people 
tend to just give that up.
    Ms. Clarke. Mr. Chairman, I know that my time is lapsed 
here. I just wanted to add that, you know, we can put all of 
the new technologies we want in place but if cyber hygiene has 
not become a practice, the vulnerabilities remain perilous to 
us.
    So I want to thank you for your report.
    I yield back the balance--yield back to you, Mr. Chairman.
    Mr. Meehan. I thank the gentlelady, and I share that same 
observation.
    We are hearing--I know it is something you are talking 
about across the sector and we have heard testimony that more 
than 80 percent of our vulnerabilities could be addressed with 
better cyber hygiene. I think that is something--again, we talk 
about this process of educating America and the role that they 
can play with us. There is more sophisticated things and that 
is what you are dealing with, but we need the Nation to join us 
in battling the threat by doing better cyber hygiene.
    Ms. Clarke. We start with our own agencies, right?
    Mr. Meehan. We start with our own agencies, that is right, 
by setting the example.
    I am very grateful for that testimony, and now the Chairman 
recognizes the gentleman from Texas, Mr. Vela, for any 
questions he may have.
    Mr. Vela. Yes. Yes. On the issue of workforce, can you 
begin by explaining to us how your different divisions 
interact?
    Ms. Stempfley. Thank you, sir.
    In the Office of Cybersecurity and Communication we have 
five divisions, and those divisions span responsibility from 
National security emergency preparedness communications--that 
is the Office of Emergency Communications; the Office of 
Stakeholder Engagement and Critical Infrastructure Resilience, 
which is principally responsible for our outreach efforts, for 
our engagement with critical infrastructure to raise their 
understanding at a macro level, which is obviously supportive 
of the operational role that the NCCIC plays; as well as our 
Network Security Deployment Division, which is responsible 
primarily for the building and deployment of the--and operation 
of the National Cybersecurity Protection System; and finally, 
our Federal Network Resilience Division, which is focused on 
the dot-gov protections. That is both in terms of direct 
interaction with Federal departments and agencies and the 
building of the capability that you discussed earlier, the 
continuous diagnostics and mitigation capability, which is 
focused on the cyber hygiene for the Federal enterprise.
    Those five divisions operate together under the Office of 
Cybersecurity and Communications. You can see the mutually 
supportive role that they pay.
    For example, the communications infrastructure is moving to 
being I.P.-based. With an I.P.-based communications 
infrastructure you bring with it particular risks and 
opportunities. The technology awareness mechanisms of that are 
shared, then with the Stakeholder Engagement Organization and 
the threat information provided from the NCCIC is then 
disseminated and distributed.
    That data all support the requirements that go into the 
National Security--excuse me, the Network Security Deployment 
Division, and the Federal--and we want the Federal Government 
to be the best example of the right things to do within the 
Federal Network Resilience Organization. We realigned this 
structure last November, so not quite a year ago. It has been a 
very beneficial activity for the Office of Cybersecurity and 
Communication.
    Within the Department, the deputy secretary chairs a panel 
that ensures that we are--excuse me--coordinating across the 
Department. There is both operational engagement on the NCCIC 
floor from our Department colleagues for Secret Service, from 
Coast Guard, and others. We have policy conversations across 
the Department to ensure that we are sharing. We have a strong 
partnership with the CIO so that those FISMA requirements that 
we--the operational requirements that we publish in partnership 
with OMB are coordinated with and shared with the CIO 
organization to understand what that might mean to a large 
department that is informing back to us.
    Mr. Vela. The Ranking Member mentioned--or referenced a 
problem with retention of workforce, and are you seeing that in 
each of those five divisions, or--can you explain that?
    Ms. Stempfley. Absolutely. It is a competitive landscape 
for cybersecurity professionals. We are actively recruiting.
    If you look at the growth in terms of civilians that we 
have had in the Office of Cybersecurity and Communications in 
the 3 years I have been here, we have been actively engaged in 
this recruiting process. Mr. Zelvin shared earlier today with 
me a fact that, you know, for each announcement that we put out 
there we get candidates applying in numbers close to 100.
    The issues that we have in this competitive landscape are 
that the Department of Homeland Security's authorities for 
meeting the hiring needs are not commensurate with the other 
Federal departments' authorities, and so both in terms of pay 
and retention capabilities, we are competing against our own 
colleagues in the Federal Government and continue to compete 
against our colleagues in the broad commercial landscape, as 
well.
    We have a phenomenal mission and we keep people in part 
based on the mission responsibilities that we have. We do not 
have an exorbitant attrition rate at the operational level, 
certainly. People leave; they leave on, you know, based on 
their family and life desires. We don't see this, you know, 
exceptional attrition rate.
    But we do see that strong competition.
    Mr. Vela. So are you saying that you can't pay people 
enough, essentially?
    Ms. Stempfley. That is part of the issues, yes, sir.
    Mr. Vela. I noticed that your title is you are an acting 
assistant secretary. At the levels of leadership are there many 
spots that have not been permanently filled?
    Ms. Stempfley. Within the Office of Cybersecurity and 
Communication the acting assistant secretary is the only 
leadership position that has not been filled--or the assistant 
secretary. I have full-time career leadership. I am permanently 
the deputy assistant secretary so I am the full-time careerist 
in that position. At each of the division director level I have 
full-time fill in, you know, all of those as career positions.
    Mr. Meehan. I thank the gentleman for yielding back.
    We now recognize the gentleman from Nevada, Mr. Horsford, 
for his questions.
    Mr. Horsford. Thank you, Mr. Chairman.
    Appreciate very much this panel. You know, we have been 
meeting, as one of the new Members on this committee, a lot of 
the people in the private sector, and I want to commend the 
Center on its collaboration with a number of key private-sector 
entities and sectors.
    My question pertains to this collaboration with the private 
sector.
    You mentioned in your testimony the work with the over 
6,400 private-sector firms that work with the Center, and 
inevitably some of those have to be competitors, of course. So 
can you discuss the protocols and measures that you all have in 
place to ensure that one company's sensitive data does not pass 
on to another, particularly to a competitor, and what 
procedures are in place should such an incident occur?
    Mr. Zelvin. Yes. Thank you, Congressman.
    Last year alone, as Ms. Stempfley said, we had 190,000 
incidents reported and we put out almost 8,000 reports. This 
year we are going to exceed that just in--by May about 68 
percent.
    So when we get information there is a variety of ways a 
business can report. They can tell us that it is okay to say it 
is their company, and that is not an often occasion; they can 
ask us to anonymize, and we have this thing called traffic 
light protocol, and it is literally just an agreement between 
friends that we will not share. When I first saw it I was 
somewhat skeptical but it actually works, and we have a variety 
of ways of quantifying using a stop light protocol--red, 
yellow, green, so on and so forth, and it is actually an 
effective means.
    We have statutory capabilities under PII, Protected 
Infrastructure Information--I think I have the acronym right. 
But there is a statutory basis that we can anonymize 
information, and let's say, you know, you work for a financial 
sector. I will just refer to you as ``financial sector seven,'' 
or ``FIN7,'' or ``FIN8.'' What is important is not the identity 
of the company but the ability to port across cross-sector what 
is happening and, more importantly, what do you do about it.
    So we have folks on the floor at the NCCIC, so we have NSA, 
we have FBI, we have Secret Service, we have Cybercom. We also 
have all the information sharing and analysis centers of the 
financial services, communications, information technology, and 
also folks from individual companies that have full access to 
the floor even when we are at Top Secret or above 
classification. They have full access to all our computer 
systems, both the highly classified all the way down to below.
    So as you have these folks on board we are very cognizant 
of the competitor aspect, so we have abilities to put a label 
that anonymizes it that is either done through agreement or 
through statutory. In the agreement, why do--you know, why 
wouldn't we share? Well No. 1, I don't really need the 
information; the second thing is I don't want to betray your 
trust because if I do you will never talk to me again.
    So, you know, we are very cognizant of it and we are very 
successful at it, as well.
    Mr. Horsford. So my other part of my question is, it seems 
like some sectors are better at this than others, so how 
concentrated are certain sectors in working with the centers 
and do you see gaps? If so, what can we as Congress do to help 
facilitate bringing the sectors who aren't doing their part, 
you know, into the resources that you all have available?
    Mr. Zelvin. Yes, sir. Who has really focused on meeting the 
challenges really depends on their experience, as I mentioned, 
in cybersecurity and the attacks. There are certain sectors 
that have had a large number of attacks; there are others that 
haven't yet. It is all of our challenge to go out to them and 
say, ``Hey, this is really what others are facing, these are 
the things that you could be facing, and these----''
    Mr. Horsford. If I could be more specific----
    Mr. Zelvin. Sir.
    Mr. Horsford. So these people come into my office every day 
and my job is to, you know, encourage them to participate. You 
all have great capacity among Federal agencies, but as I have 
heard it, as the Chairman and the Ranking Member have educated 
us, the vulnerability is on the private-sector side and the 
private sector isn't always doing its part, and there are key 
sectors that seem to be completely kind of disengaged. So what 
do you need from us as Congress specifically to get those 
sectors to be more involved?
    Mr. Zelvin. In my view it is the continued dialogue and the 
continued conversation that we are having. I think, as I look--
you know, as I have briefed senior leaders, as I have briefed 
staff, you know, people generally understand there is a problem 
but they don't understand what to do about it, and when you 
talk about the problem they don't really--they know there is 
something wrong but they really have trouble quantifying what 
is it.
    The other thing I will tell you--and I say this often--the 
lexicon in cyber is not English, so if I say ``phishing,'' if I 
say ``D-DOS,'' if I say ``Trojan''--when I say ``phishing'' 
most people go to a lake someplace and think about, you know, 
maybe catching a fish but that is not when I am speaking of.
    I have often said also is that if I told you there was a 
Category 4 hurricane that hit the Gulf Coast you would go, 
``Oh, that is bad.'' Category 1? It is bad, but 4 is worse.
    If I told you there was an 8.0 earthquake on the West Coast 
you would automatically go, ``That is incredibly bad.'' 1.0? 
Most Californians probably wouldn't do anything.
    What is that in cyber? How do we get that imagery? How do 
we get the awareness across to the public of, ``Boy, this is 
something that is bad but we could probably be okay,'' or, 
``This is catastrophic and we need you to do these measures 
such as leave, you know, other precautions.''
    So we are still working that and I am hopeful, but we are 
not there yet.
    Mr. Horsford. Thank you, Mr. Chairman.
    Mr. Meehan. I thank the gentleman. I certainly, you know, 
one of the aspects are the ISACs and other things that can be 
present, and I think the gentleman's questioning was right on 
target about those that are engaged and those we have to do a 
better job of attracting.
    It is important to appreciate the vital role that you play 
and the interplay among our Governmental agencies at the outset 
before we get down to dealing with the various private-sector 
industries that are part of it, so I want to ask you to go for 
a moment off of this important observations, and it comes from 
General Alexander, who is the head of the NSA, and I use it in 
his words, and he says, ``I see the Department of Homeland 
Security as the entry point for working with industry,'' and 
there is great reasons for it: Transparency, having everybody 
doing exactly the right thing together to work as a team.
    The FBI, NSA, Cyber Command--the FBI would lead law 
enforcement and the attributions; NSA will work with foreign 
intelligence; Cyber Command are defending the Nation. But they 
have a civilian agency, by his own testimony, at the core of 
the ability for us to have a communications infrastructure that 
works across the Governmental sectors first and then 
simultaneously work effectively in real time with our civilian 
sectors.
    So please give me your observations with regards to 
somebody as significant as General Alexander looking at DHS as 
the center point for the engagement of our approach to 
cybersecurity.
    Mr. Zelvin. Thank you, Mr. Chairman.
    I agree with the general's assessment so much so I joined 
the Department. DHS is purely that civilian entity, and when 
folks come to us they know--and there is important other roles 
in Government, but within DHS we are really about that 
protection, prevention, mitigation, response, and recovery. We 
really do want to help understand the problem not only 
technically but through the tactics, techniques, and 
procedures, and then work through those mitigations, and then 
share that information, as I said, with the partners I have 
mentioned--State, local, critical infrastructure, 
international, other Federal departments and agencies.
    So when folks come to us--and it has been interesting. A 
number of private-sector partners have come to us because they 
see us as that place in Government where they can have a 
discussion where it is purely technical, there is not concerns 
potentially of being asked a lot more questions that will lead 
to other things and it is important for Government to do.
    As you look at vulnerabilities in cyberspace, there are 
things that have the potential for malicious activity but 
haven't quite matured to that point yet, and I look at things 
like have happened to a number of companies in that we discover 
a vulnerability that if somebody did something it could be 
catastrophic, but they haven't done it yet. Those are really 
the areas that we want to get ahead of.
    We don't always want to be responding. We don't always want 
to be catching up to our adversaries. We want to get ahead of 
those.
    For companies it can be often uncomfortable to say, ``We 
discovered a problem,'' and they don't want to be attributed--
they don't want their competitors to say, ``See, look. They are 
having yet another problem.'' So they come to us and we have 
the ability to provide the anonymity, work through the 
technical solutions, and then get it across the Nation and 
across the world so people can understand the threat and 
mitigate it without the fear of additional questions about who 
did it and where did they do it and how.
    Mr. Meehan. Effectively, you are a civilian agency so it 
removes some of the concern that legitimately people have 
outside that we are having private sector share either back and 
forth with our more sophisticated Governmental agencies like 
the NSA or FBI.
    Mr. Zelvin. That is correct, sir. It is absolutely a 
civilian organization and I don't have the challenges that some 
of my partners do in that I am not being pushed for things like 
attribution; I am not being pushed for bringing prosecution. 
There are other important entities that do that; that is not my 
role. My role is just to understand the problem and come up 
with the solutions.
    Mr. Meehan. Let me jump into one other piece, because we 
have done a good job of identifying the important role we place 
vis-a-vis the other Governmental--critical Governmental 
agencies, and of course, that extends down through the entire 
Governmental structure. But at the same time, we have 
relationships with the private sector.
    Now, those looking from the outside can get lost in forest, 
but there has been a lot of thought into how we are organized 
and I am impressed by it. Explain quickly: We have 16 different 
sectors--17 different sectors in which industries are 
organized, and they have their own sector communication 
coordinating councils in which they themselves look at the 
unique nature of threats, such as something that may go 
uniquely to banks, the denial of services as an example.
    Within those coordinating councils some--and this goes to 
Mr. Horsford's line of questioning--some have created what we 
call the ISAACs, these information sector analysis coordinating 
teams--very sophisticated for their--and they are housed with 
you. But my recollection is we have only got about four that 
are in there. They are some of the best, but we have got a lot 
of agencies or private-sector entities that may be lagging.
    Can you give me your observations with regard to how it is 
that, you know, we are effectively organized in that way but 
what we can do to begin to attract the collaboration of all of 
the other entities?
    Mr. Zelvin. Yes, Mr. Chairman.
    We deal with all of the critical infrastructures. We are 
working across the board. But I will tell you, as I look across 
the financial services sector, and specifically the Financial 
Services Information Sharing and Analysis Center, the FS-ISAC, 
they have done an absolutely extraordinary job helping us work 
through the recent distributed denial of services hacks that 
have been going against the financial institutions.
    So the Financial Services ISAC has not only been able to 
coordinate with Government, but also among itself. They provide 
extraordinary information not only with each other but also 
with Government. Some of the best information I get from the 
distributed denial-of-services comes from the private sector, 
and it is not only the sharing with us but also sharing within 
each other.
    The Communications ISAC, the Information Technology ISAC 
have similar experiences. I will also tell you, the Multi-State 
ISAC, so the sharing between all the States and the possessions 
and the territories--that information mechanism is very 
effective.
    There are others that we need to build up to that capacity, 
but I would tell you, I don't see that as a negative; I see it 
as a positive. We have learned a lot since these distributed 
denial-of-services attacks, and also the malware attacks that 
have affected Saudis and also in Qatar.
    This has changed the dynamic in cybersecurity just in the 
last few months. So ideas that were really well-thought-out 
earlier are really being developed and we need to catch back up 
with the others as we stay focused on the financial services 
sector, the comms, and----
    Mr. Meehan. You mean you are learning things with financial 
services that could apply to other sectors.
    Mr. Zelvin. That is exactly right, sir. I often tell folks 
that we need to share this across because the financial 
services sector needs power, they need water, they need 
transportation, they need health. They say, ``Why would we 
share with you? Why would you tell DHS?'' Well, because we have 
the ability that is unique in that we can share with these 
other sectors and we can make them aware of the challenges and 
we can share the mitigations, so why would you rebuild that 
capacity when it already exists?
    Mr. Meehan. Well, thank you.
    My time is expired and I now recognize the gentlelady from 
New York for her follow-up questions.
    Ms. Clarke. Let me thank you, Mr. Chairman, and acknowledge 
that we have been joined by our colleague on the Homeland 
Security Committee, the gentlelady from Texas, Ms. Jackson Lee, 
and ask for unanimous consent that she be authorized to sit and 
question the witnesses at today's hearing.
    Mr. Meehan. Pleased to do so. Unanimous consent, the 
gentlelady will be recognized in order, and I thank her for 
coming today.
    Ms. Clarke. Thank you very much, Mr. Chairman.
    I want to question each of you, just get your perspective 
on the dichotomy between the Enhanced Cybersecurity Services 
and Einstein. I support the expansion of the Enhanced 
Cybersecurity Services program to make sure that our critical 
infrastructure companies can benefit from U.S. Government 
intelligence on cyber threats. However, in the privacy impact 
assessment the Department states that Federal agencies as well 
as critical infrastructure may use ECS while the Einstein 
intrusion prevention capabilities are still being built out.
    My question is: Doesn't it seem a bit backwards or 
redundant, and how is it that you could build a cutting-edge 
cybersecurity program and have it available to the private 
sector before the Government itself adopts it? What is it about 
ECS that will make it available much more quickly than Einstein 
3?
    Ms. Stempfley. Thank you, ma'am.
    The Enhanced Cybersecurity Services is, as you point out, a 
cutting-edge capability in that it is the first time we have 
been able to provide effectively classified and sensitive 
countermeasures and indicators to commercial entities through a 
trusted cybersecurity provider, I think is very important. So 
we are very excited about this opportunity and engagement in 
both growing the number of service providers and the market 
that it generates with critical infrastructure partners.
    It provides, as you point out, in the privacy impact 
assessment, protection against--with two countermeasures: 
Domain name service and e-mail protection. Those are not in the 
traffic flow kinds of protection, which is the requirement for 
Einstein 3, and so there is a fairly important distinction 
there.
    While we will work to enhance the Enhanced Cybersecurity 
Services, enabling it to keep up with the threat environment 
and to provide new countermeasures into that capability, we are 
certainly in progress in that environment. We will reach that 
in a much more rapid manner in the Einstein 3 capability 
because its baseline requirement is to provide that in a real-
time capability inflow.
    That is a very technical way of describing--a technical way 
of describing it, the difference being inflow means you are 
actually affecting through the pipe as it is going on; out of 
line effectively means it gets stored, processed, and then 
forwarded on.
    Mr. Zelvin. Ma'am, I will tell you, there is some--I have a 
truly exciting job, and one of the really exciting parts is as 
you look at that dot-gov domain and the security awareness that 
I have, it is unlike any of others--so you have the dot-com, 
the dot-gov, and the dot-mil.
    So right now on the dot-gov I have extraordinary awareness 
of the traffic that is going on and we are watching that in 
almost a real-time basis in my center at the NCCIC. I have met 
with the Defense Department and we are building an awareness of 
the dot-mil similar to what we have on the dot-gov. So between 
the two of us we will have really strong awareness of what is 
going on.
    The dot-com will remain a challenge, but DHS has that dot-
gov responsibility. We are able to watch it, as I said, on a 
near real-time basis, and as we get these new enhancements, 
what we are able to do now is just to be able to see there is 
malicious activity and warn. What we will able to be doing here 
shortly is just not warn but actually mitigate and investigate 
and analyze.
    Because right now it is sort of like you know there is 
something bad in the mail but you let it get to the mailbox. 
Well, now we are going to be able to stop that and do 
appropriate measures to make sure that that bad delivery isn't 
made.
    Mr. Edwards. I will just agree with both Larry and Bobbie 
on this.
    Ms. Clarke. Very well.
    So is it anticipated that at some point the ECS will be 
phased out or become obsolete, or is there a unique capability 
within that instrument that is compatible or can partner with 
Einstein 3?
    Ms. Stempfley. Certainly. The ECS is intended to be a 
program for that information sharing and protection for the 
critical infrastructure. It has very, very limited report back 
to Government, obviously. Only, ``Did that indicator work? Is 
that a valuable piece of information for protection measures?''
    We would anticipate that to continue and that we would 
employ more countermeasures as we go through the legal, 
privacy, and other considerations for employment of those 
countermeasures in the unique situation of critical 
infrastructure.
    E3, and E3 Accelerated in particular, and its wide set of 
capabilities for the Federal enterprise we anticipate existing, 
as well. The specific countermeasures and which one would come 
forward into the Government space or the critical 
infrastructure space is really based on the very different 
legal models that are appropriate for us in that space.
    Mr. Meehan. I thank the Ranking Members.
    The Chairman now recognizes the gentlelady, Ms. Jackson 
Lee, for any questions she may have.
    Ms. Jackson Lee. Let me thank, first of all, the Chairman 
and the Ranking Member for holding the hearing and your 
courtesies of allowing me to come and to ask questions for 
something that I think is crucial for the entire Homeland 
Security Committee.
    Let me start out--and I am going to just offer for you to 
answer the questions who can answer it, and I will then ask the 
particular person if no one jumps in. The CERT teams that we 
have--this is enormously important, this whole idea of 
communication, the whole idea of reacting to the cyber threat--
with respect to the CERT systems, do we have the capacity to 
have a particularly defined CERT for each of the industries? I 
think of oil and gas; I think of the health-care industry, 
which is massive.
    That is my first question: Do we--are they defined so 
specifically that they focus on the needs of a particular 
industry?
    Madam Secretary.
    Ms. Stempfley. Ma'am, if I may take a----
    Ms. Jackson Lee. Yes. Thank you.
    Ms. Stempfley [continuing]. A first crack at your question, 
the technologies that are in use across these industries are 
very similar, and because of that the organization of our cyber 
emergency response teams or computer emergency readiness teams 
are oriented to be useful to all of the sectors, versus a 
particular emergency readiness team focused on any one sector. 
So you see the information technology infrastructure largely 
covered by the US-CERT, then the operational technology control 
systems community operated by the Industrial Control Systems 
CERT.
    So the infrastructures in the oil and natural gas, or in 
transportation, or in those mechanisms are largely produced by 
the same companies and in the same environment. This has proven 
to be one of the most effective and efficient organization 
models.
    Ms. Jackson Lee. Let me follow it with two questions, and 
maybe I will have time to make a comment. Thank you for that.
    We all understand that finding a problem in computer 
security or cybersecurity is like finding a needle in a 
haystack, and so have we developed the sophistication to be 
able to target where the problem is, to target where there is 
activity?
    My other question is on the Einstein 3 I notice that there 
is certainly a need for skilled individuals, and my question 
is: Do we as the Government have the capacity to bring people 
in laterally? It speaks to my issue of the STEM and 
diversifying. STEM education is great but it starts at 
kindergarten. If we need people right now, do we have the 
ability to cross-train them in the Government, which adds to 
the diversity and the skills that we need?
    I will--those are the two questions I will pose.
    Mr. Zelvin. Congresswoman, if I can maybe finish your first 
question and get to the second and----
    Ms. Jackson Lee. Yes.
    Mr. Zelvin [continuing]. Ask Ms. Stempfley to do the third. 
So on the first question on the specific CERTs for each of the 
sectors, I will tell you that when we operate in a sector we do 
it in intimate partnership with the sector-specific agency and 
the sector-specific coordination councils. So if there is an 
energy problem we are with the Department of Energy; if it is 
oil and natural gas, Department of TSA; Finance; Treasury; so 
on and so forth. We are fully partnered.
    So we bring the technical skills, the ability to understand 
the virtual and I.T. environment. They bring the experience and 
wealth of knowledge within----
    Ms. Jackson Lee. Do we have the capacity to target if there 
is activity that is in essence piercing our cyber framework 
involving our proprietary information? If somebody is attacking 
our system, you have that capacity?
    Mr. Zelvin. We have the--some capacity. We do not have 
absolute capacity.
    Ms. Jackson Lee. What would you need to get absolute 
capacity?
    Mr. Zelvin. Extraordinary intelligence and information. So, 
you know, in many cases there is vulnerability. So there was a 
mistake made and then found, and so there are things you do to 
correct that mistake.
    There are attacks. There are people who are purposely 
trying to do something you do not wish them to do. In many 
cases and not all--in many cases you are there reacting to the 
challenge and then building that technical mitigation to 
prevent.
    However, there are times they are are going to be--you 
know, we have to be good every time; they have to be good just 
some of the time. So I would never say that we are ever going 
to get to that place where we will be able to protect 
everything, but we have a great deal of information but it 
doesn't mean that we don't have vulnerabilities.
    I would ask Ms. Stempfley to follow up.
    Ms. Stempfley. We want to certainly thank Members of this 
committee and others for supporting the resource request that 
the Department has had over a number of years. You have seen 
the build-out of the capabilities in the National Cybersecurity 
and Communications Integration Center, which has been directly 
to your capacity question. We operate every day in that center, 
sharing information as a part of it.
    There is a responsibility the private sector has for 
adoption of best practices and adoption of cybersecurity 
principles, and we continue to work with them for further 
movement in that area.
    Your final question was on hiring and, in particular, is 
there--if I understood your question correctly----
    Ms. Jackson Lee. Cross-training.
    Ms. Stempfley. Right. So is there an ability for lateral 
hiring, I believe is what you said. One of the things that I 
think is universally recognized is that, given the importance 
of cybersecurity and the need for cybersecurity professionals 
in this area, we--all of the Federal enterprise and our 
commercial partners are engaged in trying to build the 
capabilities to ensure we have that.
    The Secretary chartered, through the Homeland Security 
Advisory Council, a cyber skills study that looked at the 
Department itself. The Department also has important 
responsibilities under the National Initiative for 
Cybersecurity Education, which continue to engage raising that 
lateral mechanism, that cross-skills.
    We certainly have to focus not only on, as you point out, 
STEM starting young--I am raising several kids who I am trying 
to direct into the technical workforce, as well--but to ensure 
that we have the capacity at a lateral level.
    We do this cross-training support in the Office of 
Cybersecurity and Communications. When we have an incident the 
NCCIC can call on individuals from across the SNC, can call on 
individuals from across the Department. One of the findings out 
of the Cyber Skills Task Force was the creation of a cyber 
surge capacity within the Federal Government and the Department 
specifically, to address your question.
    Ms. Jackson Lee. I would like to follow up with you.
    I thank the Chairman and Ranking Member for their 
courtesies. Thank you very much.
    Mr. Meehan. I thank the gentlelady for her attendance here 
and for her questions.
    I just have one--a couple of closing questions based on 
your testimony here today.
    Mr. Edwards, you identified something which goes to the 
reality that while we are dealing with a lot of these issues 
and the need for collaboration across sectors in the Government 
and, simultaneously, with the private sector, one thing you 
focused on that is the reality of this threat is speed. It is 
happening in real time and there is a need for us to be 
responsive in real time.
    Now, you have looked critically at the challenges that we 
face, so the first issue is, as you stated, sometimes 
information has gotten to our partners in the private sector 
but we have got to do a better job of organizing it so it 
allows them to get to the heart of what they need to know. The 
second thing is that we have got to try to find ways to be able 
to coordinate with our partners more in the sense of: ``Hey, we 
are seeing something in your systems and we are going onto 
it.''
    So how do we both maximize our ability to get the 
information that people need to know across sectors, not just 
in sectors? Then how do you tell people--when you are not even 
sure what you are looking yourself, where do you find the right 
balance of telling somebody you might be looking at something 
in their systems versus creating an alarm that may not be 
realized because you don't know what you have yet?
    Mr. Edwards. Thank you, sir.
    The Department has done a good job in advancing 
cybersecurity. One of the recommendations that we made was when 
you are passing out this information through--whether it is 
HISN, and now they are going to move to HISN-3--is to--for the 
entities to be able to share that information, you know, and 
also not to drill down to get to a particular question they are 
trying to answer. So I think HISN-3 is going to help towards 
that.
    But also the communication part of it. You know, there is 
excellent collaboration between the private sectors and the 
public sectors.
    But among the folks that we interviewed, quite often we 
found is a lot of this is also based on relationships, and the 
Department has senior leadership positions where people from 
the private sector pick up the phone and establish a 
relationship to somebody by name and now that person has moved 
on, they don't know who to contact. So rather than establishing 
relationship based on individuals, it needs to be based on 
processes and procedures, and I think the Department is moving 
towards that.
    But also, there is--private sector does a really good job 
in handling best practices. Larry's team, you know, by the 
reorganization and putting ICS and US-CERT and ISAC and C3O-I, 
all of them at one level is moving toward that. But you also 
find information and trend analysis that the CERT team is going 
to help towards that.
    Mr. Meehan. Well, I thank you.
    Let me just ask Mr. Zelvin and Ms. Stempfley, how about the 
private-sector companies themselves sharing information with 
the Government? What kinds of challenges do we have in that 
area?
    Mr. Zelvin. Thank you, Mr. Chairman.
    The biggest challenge, I will tell you, is a lack of 
clarity, of understanding what information can be shared. So it 
is quite often that we will meet with private sector entities 
and we are--we believe we have the ability to share information 
but there is anxiety. There is absolute determination not to 
violate law, regulatory guidance.
    Mr. Meehan. Is this information coming from you to them or 
from them to you?
    Mr. Zelvin. From them to me, sir. There is also, you know, 
lack of clarity as to what I can share with them but, you know, 
as we have looked across Government I have been given the 
thumbs-up from leadership and also those who look at what we 
are sharing in--across Government and says, ``No, this is 
appropriate and this is okay.''
    But that lack of clarity of what information can be shared 
is--still exists and there is anxiety, so----
    Mr. Meehan. What is the anxiety related to? Things like 
liability protection or otherwise?
    Mr. Zelvin. It is, sir. The ability to, as I said, that 
they are not breaking law, that they are not breaking 
regulatory compliance. They are just not sure so they err on 
the side of caution.
    As you mentioned, Mr. Chairman, speed is of the essence, so 
as the folks review all this data it is taking up precious 
time. We have, in our--many of our products and what we are 
starting to receive from the private sector and just recently 
this week an international partner is machine-readable 
information. That is wonderful because it is starting to take 
the humans out of the information exchange between us. What 
would be even better someday would be that machine-to-machine 
real-time information sharing.
    But I will tell you, the technical challenge is not, in my 
opinion, as great as the policy challenge. We first have to 
define what is it that we are sharing, and then we can design 
the machines to share it.
    Mr. Meehan. Well, with the tremendous scope of information, 
ultimately it is going to have to get to machine-to-machine 
because of the computing capacity that could go through 
something in hundredths of a second that would take days for 
humans to be able to analyze.
    Mr. Zelvin. Mr. Chairman, I agree. Right now there is a 
great deal of time spent preparing the information, sending the 
information, understanding the information, and then making the 
information actionable. We need to compress that loop of 
decision-making as small as we can get. I don't know if we will 
ever get to zero but we sure as heck can do a lot better than 
we are now.
    Mr. Meehan. Okay.
    Ms. Stempfley.
    Ms. Stempfley. Sir, one of the important things that the 
I.G. recognized and Mr. Zelvin spoke to is that this 
information sharing is in part based on trust, and you have to 
have a sense that the information will be used in the best 
interest of all parties as we go forward. That trust used to be 
person-to-person. We have moved it from person-to-person to 
organization-to-organization and we will continue to do so.
    One of the important ways that we are moving forward in 
this model is to communicate with our private-sector partners 
in ways that are most beneficial to them, which means that we 
have to be able and willing to ingest that information in the 
method that is most appropriate from our private-sector 
partner, and we must be able to produce our indicators, our 
alerts in methods that are appropriate without a--with a 
recognition that it may not be identical. We talk about the 
financial sector and the financial sector ISAC being one of our 
mature ISACs, and there being other sectors who are not at that 
level yet.
    So providing a piece of information to a high, capable 
organization may prove for it to be not as useful to an 
organization that isn't ready to ingest that. So we have had a 
real focus, not only in the NCCIC but across the entire Office 
of Cybersecurity and Communications, to release this 
information in a multitude of platforms and in a multitude of 
formats. So this machine-consumable output is formatted in a 
way that can be consumed by these different entities.
    This two-way dialogue helps to build that trust, which is a 
part of what we have to overcome is that sort of initial 
distrust that comes in any relationship.
    Mr. Meehan. Well, I thank you for the good work that each 
of you is doing, and on behalf of all of your entities, for not 
only creating the framework for this sharing of communication 
but by virtue of the collaboration that you are doing, 
enhancing that trust and enhancing our ability to protect our 
home front from the serious threat. We opened this hearing with 
discussing the very real concern about cybersecurity here in 
the Nation.
    Is there any closing thought that you--any of you have 
before we close the record this morning?
    Ms. Stempfley. If I may, I want to thank you again for this 
hearing. I think it is--the topic is one of absolute import for 
us as a Nation and we are grateful for your attention and your 
time here.
    I hope that you heard the commitment the Department has to 
this important mission and to ensure that we account for those 
mechanisms that are so vital: That inextricable tie between 
privacy, civil rights and civil liberties, and cybersecurity; 
the need for adoption of security principles across our 
critical infrastructure partners for information sharing.
    We talked about some of the important needs for hiring 
authorities for some of the programs that I know you are 
supportive of in Einstein. Our law enforcement colleagues in 
the Department continue to seek tools they need to fight crimes 
in the digital age, and that National breach reporting 
requirements that I know you are discussing.
    So thank you so much for your time and attention on this 
matter, as well.
    Mr. Meehan. Thank you.
    Mr. Zelvin. Mr. Chairman and Ranking Member, I would just 
also like to thank you for having us today. Really appreciate 
the opportunity to talk to you.
    You, your colleagues, your staff, and their colleagues are 
welcome at the NCCIC any time. We would welcome the opportunity 
to show you what the great men and women within the NCCIC, 
within CC&C and DHS are doing.
    I served 26 years in uniform in the Defense Department and 
I will tell you, the people that I work with at DHS every day 
are as good as fine as anyone I served with in uniform. Their 
passion and their patriotism are just as high as those I served 
with in uniform.
    I would also like to say that our partnership with our 
closest colleagues, both in the FBI and NSA, is critical. So it 
is truly a unity-of-effort approach, and that integration 
continues to grow and we look forward to the opportunity of 
having it grow not only within Government but also private 
sector and international.
    So thank you.
    Mr. Meehan. Thank you.
    Mr. Edwards.
    Mr. Edwards. Well, we live in a virtual world so, you know, 
DHS has matured and it is improving and it is moving in the 
right direction, but much work still needs to be done. The 
threat is not only going to be coming from nation states, but 
from hackers, but also the threat within. We have to be mindful 
of that.
    I hope I can come back and issue a report and say the 
Department has done perfectly everything right and there are no 
findings and no recommendations. That is what I hope I can do, 
but still there is much work to be done.
    Thank you.
    Mr. Meehan. Well, we would all love to be able to do that, 
but that is the important responsibility we have on oversight 
and we thank you for the good work that you are all doing to 
try to aspire to that standard.
    So I thank all of you for your testimony. The Members of 
the committee may have additional questions, and if they do we 
will ask you to respond in writing in the appropriate time.
    So without objection, the subcommittee stands adjourned. 
Thank you.
    [Whereupon, at 10:32 a.m., the subcommittee was adjourned.]