Computer & Communication Industry Association

Cybersecurity Concerns Lead to House Support for Senate Leiberman-Collins-Carper Cybersecurity Bill

The U.S. House of Representatives’ Committee on Homeland Security (“HSC”) held a Wednesday morning hearing on “Cybersecurity: DHS’s Role, Federal Efforts and National Policy.” Archived video of the hearing is available here(Windows Media). A single panel appeared before HSC:

(1) Greg Schaffer, Assistant Secretary, Cybersecurity and Communications, Department of Homeland Security (“DHS”)

(2) Richard Skinner, Inspector General, DHS

(3) Gregory Wilshusen, Director, Information Technology, Government Accountability Office (“GAO”)

(4) Stewart Baker, Partner, Steptoe & Johnson, LLP

The hearing showed bi-partisan support for the recently introduced Senate cybersecurity bill. On June 10, 2010, Sens. Joseph Lieberman (ID-CT), Susan Collins (R-ME), and Thomas Carper (D-DE) introduced the Protecting Cyberspace as a National Asset Act of 2010 (S.3480). Reps. Jane Harman (D-CA), chair of HSC’s Intelligence, Information Sharing and Terrorism Risk Assessment Subcommittee, and Peter King (R-NY), HSC’s Ranking Member, both indicated support for the Senate bill and said they planned to introduce a similar bill in the House. Rep. Charles Dent (R-PA) also expressed support.

Chairman Bennie G. Thompson (D-MS) discussed current Department of Homeland Security (“DHS”) cybersecurity deficiencies and urged DHS to work with state, local and tribal governments, as well as the private sector, to ensure protection of national cyber infrastructure. Schaffer noted that improving cybersecurity is one of DHS’s top five mission goals. Skinner sees DHS, and particularly the U.S. Computer Emergency Readiness Team (“US-CERT”), as coming a long way since 9/11, but feels a lot more needs to be done, especially concerning five issues: (1) the program is still under the same leadership; (2) money was not in place to start building infrastructure until 2010; (3) DHS lacks any mechanism to enforce recommendations; (4) DHS must remember that it’s not in this alone and can partner with the private sector and other federal agencies; (5) DHS should improve outreach efforts, such as education and training. Wilshusen noted that some GAO recommendations were being implemented, but DHS still must do more. Similarly, Baker, acknowledged that DHS is acting, but it is not acting quickly enough and it needs more authority to adequately protect the nation’s cyber infrastructure.

Throughout its questioning of the panelists, the HSC raised several concerns with the security in place for the nation’s cyber infrastructure. The panelists could not be sure of how many times federal systems were attacked on a daily basis, nor to what percentage such attacks were being deterred, but Schafer noted that Einstein II showed 278,000 malicious acts (not all of which were necessarily successful) at the perimeter of federal networks. In response to Rep. Smith’s asking the panelists to compare the private and federal sector’s abilities to deter malicious activity, Baker thought the private sector has a stronger system in place as the federal sector was just starting to implement programs that detect, but not reject, malicious activity. Further, the panelists noted uncertainty as to who or what agency would take charge in the case of a cyber attack also troubled HSC members.
Wilshusen also expressed doubt when Rep. Dan Lungren (R-CA) asked whether DHS was doing the best it could with the personnel, funding and authority it has right now. Instead, he feels protective mechanisms do exist, but often remain unimplemented and employees remain untrained in how to use them. Wilshusen also guestimated that DHS had implemented only approximately 30-40 percent of the GAO’s recommendations contained in its March 10, 2009 “National Cybersecurity Strategy” report.

US-CERT staffing served as another recurring concern throughout the hearing. Schaffer noted the difficulties inherent in trying to find people to fill open spots. The positions US-CERT is trying to fill require highly qualified, and thus highly competitive, hires. Rep. Zoe Lofgren (D-CA) emphasized the importance of getting appropriately qualified people to fill DHS staffing requirements and supported the use of contractors to have access to more competitive hires who may not even consider applying for a lower paying federal job.

Privacy and civil liberties remained muted issues until Rep. Jane Harman (D-CA) raised them during her comments and questions. Rep. Harman emphasized that, while we must protect our cyber infrastructure, we must not overprotect it at the cost of losing privacy and civil liberties. When asked where privacy and civil liberties fit into the equation, Schaffer noted that consideration of civil liberties is critical in forming programs at DHS. Skinner confirmed that DHS takes into account civil rights and civil liberties when implementing programs. Baker acknowledged that mechanisms to deal with privacy should be in place, but such mechanisms should act quickly so as to not hang up important implementations of the protective measures.
A final recurring theme of the hearing was DHS authority. The panelists expressed concern over DHS’s lack of authority to enforce other agencies to follow its recommendations. Schaffer explained that, when DHS sees an attack, it provides information about the attack to the effected agency, provides ways to stop the attack, and works with the agency to understand and implement any processes to address the attack. However, if the agency does not want to implement the recommended measures, DHS cannot force them. As Baker later went on to explain, it is difficult to tell an agency it must implement computer protection software as doing so will cost money. The Chairman closed the hearing asking all four panelists whether DHS needs more authority. Schaffer explained that he could not comment, but the remaining three panelists all answered affirmatively.