Critical Infrastructure Protection
Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain
Gao ID: GAO-08-119T October 17, 2007
Control systems--computer-based systems that monitor and control sensitive processes--perform vital functions in many of our nation's critical infrastructures such as electric power generation, transmission, and distribution; oil and gas refining; and water treatment and distribution. The disruption of control systems could have a significant impact on public health and safety, which makes securing them a national priority. GAO was asked to testify on portions of its report on control systems security being released today. This testimony summarizes the cyber threats, vulnerabilities, and the potential impact of attacks on control systems; identifies private sector initiatives; and assesses the adequacy of public sector initiatives to strengthen the cyber security of control systems. To address these objectives, GAO met with federal and private sector officials to identify risks, initiatives, and challenges. GAO also compared agency plans to best practices for securing critical infrastructures.
Critical infrastructure control systems face increasing risks due to cyber threats, system vulnerabilities, and the serious potential impact of attacks as demonstrated by reported incidents. Threats can be intentional or unintentional, targeted or nontargeted, and can come from a variety of sources. Control systems are more vulnerable to cyber attacks than in the past for several reasons, including their increased connectivity to other systems and the Internet. Further, as demonstrated by past attacks and incidents involving control systems, the impact on a critical infrastructure could be substantial. For example, in 2006, a foreign hacker was reported to have planted malicious software capable of affecting a water filtering plant's water treatment operations. Also in 2006, excessive traffic on a nuclear power plant's control system network caused two circulation pumps to fail, forcing the unit to be shut down manually. Multiple private sector entities such as trade associations and standards setting organizations are working to help secure control systems. Their efforts include developing standards and providing guidance to members. For example, the electricity industry has recently developed standards for cyber security of control systems and a gas trade association is developing guidance for members to use encryption to secure control systems. Federal agencies also have multiple initiatives under way to help secure critical infrastructure control systems, but more remains to be done to coordinate these efforts and to address specific shortfalls. Over the past few years, federal agencies have initiated efforts to improve the security of critical infrastructure control systems. However, there is as yet no overall strategy to coordinate the various activities across federal agencies and the private sector. Further, the Department of Homeland Security (DHS) lacks processes needed to address specific weaknesses in sharing information on control system vulnerabilities. Until public and private sector security efforts are coordinated by an overarching strategy, there is an increased risk that multiple organizations will conduct duplicative work. In addition, until information-sharing weaknesses are addressed, DHS risks not being able to effectively carry out its responsibility for sharing information on vulnerabilities with the private and public sectors.
GAO-08-119T, Critical Infrastructure Protection: Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain
This is the accessible text file for GAO report number GAO-08-119T
entitled 'Critical Infrastructure Protection: Multiple Efforts to
Secure Control Systems Are Under Way, but Challenges Remain' which was
released on October 17, 2007.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
United States Government Accountability Office:
GAO:
Testimony:
Before the Subcommittee on Emerging Threats, Cybersecurity, and Science
and Technology, Committee on Homeland Security, House of
Representatives:
For Release on Delivery:
Expected at 2:00 p.m. EDT:
Wednesday, October 17, 2007:
Critical Infrastructure Protection:
Multiple Efforts to Secure Control Systems Are Under Way, but
Challenges Remain:
Statement of Gregory C. Wilshusen:
Director, Information Security Issues:
GAO-08-119T:
GAO Highlights:
Highlights of GAO-08-119T, a testimony before the Subcommittee on
Emerging Threats, Cybersecurity, and Science and Technology, Committee
on Homeland Security, House of Representatives.
Why GAO Did This Study:
Control systems”computer-based systems that monitor and control
sensitive processes”perform vital functions in many of our nation‘s
critical infrastructures such as electric power generation,
transmission, and distribution; oil and gas refining; and water
treatment and distribution. The disruption of control systems could
have a significant impact on public health and safety, which makes
securing them a national priority.
GAO was asked to testify on portions of its report on control systems
security being released today. This testimony summarizes the cyber
threats, vulnerabilities, and the potential impact of attacks on
control systems; identifies private sector initiatives; and assesses
the adequacy of public sector initiatives to strengthen the cyber
security of control systems. To address these objectives, GAO met with
federal and private sector officials to identify risks, initiatives,
and challenges. GAO also compared agency plans to best practices for
securing critical infrastructures.
What GAO Found:
Critical infrastructure control systems face increasing risks due to
cyber threats, system vulnerabilities, and the serious potential impact
of attacks as demonstrated by reported incidents. Threats can be
intentional or unintentional, targeted or nontargeted, and can come
from a variety of sources. Control systems are more vulnerable to cyber
attacks than in the past for several reasons, including their increased
connectivity to other systems and the Internet. Further, as
demonstrated by past attacks and incidents involving control systems,
the impact on a critical infrastructure could be substantial. For
example, in 2006, a foreign hacker was reported to have planted
malicious software capable of affecting a water filtering plant‘s water
treatment operations. Also in 2006, excessive traffic on a nuclear
power plant‘s control system network caused two circulation pumps to
fail, forcing the unit to be shut down manually.
Multiple private sector entities such as trade associations and
standards setting organizations are working to help secure control
systems. Their efforts include developing standards and providing
guidance to members. For example, the electricity industry has recently
developed standards for cyber security of control systems and a gas
trade association is developing guidance for members to use encryption
to secure control systems.
Federal agencies also have multiple initiatives under way to help
secure critical infrastructure control systems, but more remains to be
done to coordinate these efforts and to address specific shortfalls.
Over the past few years, federal agencies have initiated efforts to
improve the security of critical infrastructure control systems.
However, there is as yet no overall strategy to coordinate the various
activities across federal agencies and the private sector. Further, the
Department of Homeland Security (DHS) lacks processes needed to address
specific weaknesses in sharing information on control system
vulnerabilities. Until public and private sector security efforts are
coordinated by an overarching strategy, there is an increased risk that
multiple organizations will conduct duplicative work. In addition,
until information-sharing weaknesses are addressed, DHS risks not being
able to effectively carry out its responsibility for sharing
information on vulnerabilities with the private and public sectors.
GAO Recommendations to DHS:
* Develop a strategy to guide efforts for securing control systems,
including agencies‘ responsibilities, as well as overall goals,
milestones, and performance measures.
* Establish a rapid and secure process for sharing sensitive control
system vulnerability information with critical infrastructure control
system stakeholders, including vendors, owners, and operators.
What GAO Recommends:
In its report, GAO recommends that DHS improve coordination of control
systems activities and information sharing (see table). DHS neither
agreed nor disagreed with these recommendations, but stated that it
would take them under advisement. The agency also discussed new
initiatives to develop plans and processes that are consistent with GAO
recommendations.
To view the full product, including the scope and methodology, click on
[hyperlink, http://GAO-08-119T]. For more information, contact Gregory
C. Wilshusen at wilshuseng@gao.gov or at (202) 512-6244.
[End of section]
Mr. Chairman and Members of the Subcommittee:
Thank you for the opportunity to join today's hearing on the cyber
threat to control systems. Control systems perform vital functions in
many of our nation's critical infrastructures, including electric power
generation, transmission, and distribution; oil and gas refining and
pipelines; water treatment and distribution; chemical production and
processing; railroads and mass transit; and manufacturing.
In 2003, the National Strategy to Secure Cyberspace[Footnote 1]
reported that the disruption of control systems could have significant
consequences for public health and safety and made securing these
systems a national priority. This strategy further states that both the
private and public sectors have a role in securing control systems and
directs the Department of Homeland Security (DHS), in coordination with
the Department of Energy (DOE) and other agencies, to work in
partnership with private industry in increasing awareness of the
importance of efforts to secure control systems, developing standards,
and improving policies with respect to control systems security.
As requested, our testimony summarizes portions of a report being
released today that discusses (1) the cyber threats, vulnerabilities,
and the potential impact of attacks on critical infrastructure control
systems; (2) private sector initiatives to strengthen the cyber
security of control systems; and (3) the adequacy of public sector
initiatives to strengthen the cyber security of control
systems.[Footnote 2] In preparing for this testimony, we relied on our
work supporting the report, which contains a detailed overview of our
scope and methodology. All the work on which this testimony is based
was performed in accordance with generally accepted government auditing
standards.
Results in Brief:
Critical infrastructure control systems face increasing risks due to
cyber threats, system vulnerabilities, and the serious potential impact
of attacks as demonstrated by reported incidents. Threats can be
intentional or unintentional, targeted or nontargeted, and can come
from a variety of sources. Control systems are more vulnerable to cyber
attacks than they were in the past for several reasons, including their
increased connectivity to other systems and the Internet. Further, as
demonstrated by past attacks and incidents involving control systems,
the impact on a critical infrastructure could be substantial. For
example, in 2006, a foreign hacker was reported to have planted
malicious software[Footnote 3] capable of affecting a water filtering
plant's water treatment operations; and, also in 2006, excessive
traffic on a nuclear power plant's control system network--possibly
caused by the failure of another control system device--caused two
circulation pumps to fail, forcing the unit to be shut down manually.
Multiple private sector entities such as trade associations and
standards setting organizations specific to the electric, chemical, oil
and gas, and water sectors are working to help secure control systems.
These entities are developing standards, providing guidance to members,
and hosting workshops on control systems security.
Over the past few years, federal agencies--including DHS, DOE, the
National Institute of Standards and Technology (NIST), and others--have
initiated efforts to improve the security of critical infrastructure
control systems. However, there is as yet no overall strategy to
coordinate the various control systems activities across federal
agencies and the private sector. Further, DHS lacks processes needed to
address specific weaknesses in sharing information on control system
vulnerabilities. Until public and private sector security efforts are
coordinated by an overarching strategy, there is an increased risk that
multiple organizations will conduct duplicative work and miss
opportunities to learn from other organizations' activities. In
addition, until information-sharing weaknesses are addressed, DHS risks
not being able to effectively carry out its responsibility for sharing
information on vulnerabilities with the private and public sectors.
Given the importance of these issues, in our report being released
today, we are making recommendations to the Secretary of the Department
of Homeland Security to (1) develop a strategy for coordinating control
systems security efforts and (2) enhance information sharing with
control systems stakeholders. In its comments on our report, DHS
neither agreed nor disagreed with these recommendations, but stated
that it would take them under advisement. The agency also discussed new
initiatives to develop plans and processes that are consistent with our
recommendations.
Background:
Critical infrastructures are physical or virtual systems and assets so
vital to the nation that their incapacitation or destruction would have
a debilitating impact on national and economic security and on public
health and safety. These systems and assets--such as the electric power
grid, chemical plants, and water treatment facilities--are essential to
the operations of the economy and the government. Recent terrorist
attacks and threats have underscored the need to protect our nation's
critical infrastructures. If vulnerabilities in these infrastructures
are exploited, our nation's critical infrastructures could be disrupted
or disabled, possibly causing loss of life, physical damage, and
economic losses.
Although the vast majority of our nation's critical infrastructures are
owned by the private sector, the federal government owns and operates
key facilities that use control systems, including oil, gas, water,
energy, and nuclear facilities.
Control Systems Are Used in Many Critical Infrastructures:
Control systems are computer-based systems that are used within many
infrastructures and industries to monitor and control sensitive
processes and physical functions. Typically, control systems collect
sensor measurements and operational data from the field, process and
display this information, and relay control commands to local or remote
equipment. Control systems perform functions that range from simple to
complex. They can be used to simply monitor processes--for example, the
environmental conditions in a small office building--or to manage the
complex activities of a municipal water system or a nuclear power
plant.
In the electric power industry, control systems can be used to manage
and control the generation, transmission, and distribution of electric
power. For example, control systems can open and close circuit breakers
and set thresholds for preventive shutdowns. The oil and gas industry
uses integrated control systems to manage refining operations at plant
sites, remotely monitor the pressure and flow of gas pipelines, and
control the flow and pathways of gas transmission. Water utilities can
remotely monitor well levels and control the wells' pumps; monitor
flows, tank levels, or pressure in storage tanks; monitor water quality
characteristics such as pH, turbidity, and chlorine residual; and
control the addition of chemicals to the water.
Installing and maintaining control systems requires a substantial
financial investment. DOE cites research estimating the value of the
control systems used to monitor and control the electric grid and the
oil and natural gas infrastructure at $3 billion to $4 billion.
[Footnote 4] The thousands of remote field devices represent an
additional investment of $1.5 billion to $2.5 billion. Each year, the
energy sector alone spends over $200 million for control systems,
networks, equipment, and related components and at least that amount in
personnel costs.
Control Systems: Types and Components:
There are two primary types of control systems: distributed control
systems and supervisory control and data acquisition (SCADA) systems.
Distributed control systems typically are used within a single
processing or generating plant or over a small geographic area, while
SCADA systems typically are used for large, geographically dispersed
operations. For example, a utility company may use a distributed
control system to manage power generation and a SCADA system to manage
its distribution.
A SCADA system is generally composed of six components: (1)
instruments, which sense conditions such as pH, temperature, pressure,
power level, and flow rate; (2) operating equipment, which includes
pumps, valves, conveyors, and substation breakers; (3) local
processors, which communicate with the site's instruments and operating
equipment, collect instrument data, and identify alarm conditions; (4)
short-range communication, which carry analog and discrete signals
between the local processors and the instruments and operating
equipment; (5) host computers, where a human operator can supervise the
process, receive alarms, review data, and exercise control; and (6)
long-range communications, which connect local processors and host
computers using, for example, leased phone lines, satellite, and
cellular packet data.
The Federal Government Plays a Critical Role in Helping Secure Critical
Infrastructures and Their Control Systems:
Several key federal plans focus on securing critical infrastructure
control systems. The National Strategy to Secure Cyberspace[Footnote 5]
calls for DHS and DOE to work in partnership with industry to develop
best practices and new technology to increase the security of critical
infrastructure control systems, to determine the most critical control
systems-related sites, and to develop a prioritized plan for short-term
cyber security improvements for those sites. In addition, DHS's
National Infrastructure Protection Plan[Footnote 6] specifically
identifies control systems as part of the cyber infrastructure,
establishes an objective of reducing vulnerabilities and minimizing the
severity of attacks on these systems, and identifies programs directed
at protecting control systems. Further, in May 2007, the critical
infrastructure sectors issued sector-specific plans to supplement the
National Infrastructure Protection Plan. Twelve sectors, including the
chemical, energy, water, information technology, postal, emergency
services, and telecommunications sectors, identified control systems
within their respective sectors. Of these, most identified control
systems as critical to their sector and listed efforts under way to
help secure them.
Critical Infrastructure Control Systems Face Increasing Risks Due to
Cyber Threats, Vulnerabilities, and the Potentially Serious Impact of
an Attack:
Cyber threats can be intentional and unintentional, targeted or
nontargeted, and can come from a variety of sources. Intentional
threats include both targeted and nontargeted attacks, while
unintentional threats can be caused by software upgrades or maintenance
procedures that inadvertently disrupt systems. A targeted attack is
when a group or individual specifically attacks a critical
infrastructure system and a nontargeted attack occurs when the intended
target of the attack is uncertain, such as when a virus, worm, or
malware is released on the Internet with no specific target.
There is increasing concern among both government officials and
industry experts regarding the potential for a cyber attack on a
national critical infrastructure, including the infrastructure's
control systems. The Federal Bureau of Investigation has identified
multiple sources of threats to our nation's critical infrastructures,
including foreign nation states engaged in information warfare,
domestic criminals, hackers, and virus writers, and disgruntled
employees working within an organization.
Control Systems Are Vulnerable to Cyber Attacks:
Control systems are vulnerable to flaws or weaknesses in system
security procedures, design, implementation, and internal controls.
When these weaknesses are accidentally triggered or intentionally
exploited, they could result in a security breach. Vulnerabilities
could occur in control systems' policies, platform (including hardware,
operating systems, and control system applications), or networks.
Federal and industry experts believe that critical infrastructure
control systems are more vulnerable today than in the past due to the
increased standardization of technologies, the increased connectivity
of control systems to other computer networks and the Internet,
insecure connections, and the widespread availability of technical
information about control systems. Further, it is not uncommon for
control systems to be configured with remote access through either a
dial-up modem or over the Internet to allow remote maintenance or
around-the-clock monitoring. If control systems are not properly
secured, individuals and organizations may eavesdrop on or interfere
with these operations from remote locations.
Reported Control Systems Incidents Reveal the Potential for Substantial
Impact:
Reported attacks and unintentional incidents involving critical
infrastructure control systems demonstrate that a serious attack could
be devastating. Although there is not a comprehensive source for
incident reporting, the following examples, reported in government and
media sources,[Footnote 7] demonstrate the potential impact of an
attack.
* Bellingham, Washington, gasoline pipeline failure. In June 1999,
237,000 gallons of gasoline leaked from a 16-inch pipeline and ignited
an hour and a half later, causing three deaths, eight injuries, and
extensive property damage. The pipeline failure was exacerbated by
poorly performing control systems that limited the ability of the
pipeline controllers to see and react to the situation.
* Maroochy Shire sewage spill. In the spring of 2000, a former employee
of an Australian software manufacturing organization applied for a job
with the local government, but was rejected. Over a 2-month period,
this individual reportedly used a radio transmitter on as many as 46
occasions to remotely break into the controls of a sewage treatment
system. He altered electronic data for particular sewerage pumping
stations and caused malfunctions in their operations, ultimately
releasing about 264,000 gallons of raw sewage into nearby rivers and
parks.
* CSX train signaling system. In August 2003, the Sobig computer virus
shut down train signaling systems throughout the East Coast of the
United States. The virus infected the computer system at CSX
Corporation's Jacksonville, Florida, headquarters, shutting down
signaling, dispatching, and other systems. According to an Amtrak
spokesman, 10 Amtrak trains were affected. Train service was either
shut down or delayed up to 6 hours.
* Los Angeles traffic lights. According to several published reports,
in August 2006, two Los Angeles city employees hacked into computers
controlling the city's traffic lights and disrupted signal lights at
four intersections, causing substantial backups and delays. The attacks
were launched prior to an anticipated labor protest by the employees.
* Harrisburg, Pennsylvania, water system. In October 2006, a foreign
hacker penetrated security at a water filtering plant. The intruder
planted malicious software that was capable of affecting the plant's
water treatment operations. The infection occurred through the Internet
and did not seem to be a direct attack on the control system.
* Browns Ferry power plant. In August 2006, two circulation pumps at
Unit 3 of the Browns Ferry, Alabama, nuclear power plant failed,
forcing the unit to be shut down manually. The failure of the pumps was
traced to excessive traffic on the control system network, possibly
caused by the failure of another control system device.
As control systems become increasingly interconnected with other
networks and the Internet, and as the system capabilities continue to
increase, so do the threats, potential vulnerabilities, types of
attacks, and consequences of compromising these critical systems.
The Private Sector Has Multiple Initiatives Under Way to Help Secure
Control Systems:
Industry-specific organizations in various sectors, including the
electricity, oil and gas, and water sectors, have initiatives under way
to help improve control system security, including developing standards
and publishing guidance. Our report being released today provides a
detailed list of industry initiatives; several of these initiatives are
described below.
* Electricity. In 2007, the North American Electric Reliability
Corporation began implementing cyber security reliability standards
that apply to control systems and the Institute of Electrical and
Electronics Engineers has several standards working groups addressing
issues related to control systems security in the industry.
* Oil and gas. The American Gas Association supported development of a
report that would recommend how to apply encryption to protect gas
utility control systems; and, over the past three years, the American
Petroleum Institute has published two standards related to pipeline
control systems integrity and security and the design and
implementation of control systems displays.
* Water. The water sector includes about 150,000 water, wastewater, and
storm water organizations at all levels of government and has worked
with the Environmental Protection Agency on development of the Water
Sector-Specific Plan, which includes some efforts on control systems
security. In addition, the Awwa Research Foundation is currently
working on two research projects related to the cyber security of water
utility SCADA systems.
Federal Agencies Have Multiple Initiatives to Help Secure Critical
Infrastructure Control Systems, but More Remains to Be Done:
Over the past few years, federal agencies--including DHS, DOE, and
others--have initiated efforts to improve the security of critical
infrastructure control systems. For example, DHS is sponsoring multiple
control systems security initiatives, including the Control System
Cyber Security Self Assessment Tool, an effort to improve control
systems' cyber security using vulnerability evaluation and response
tools, and the Process Control System Forum, to build relationships
with control systems' vendors and infrastructure asset owners.
Additionally, DOE sponsors control systems security efforts within the
electric, oil, and natural gas industries. These efforts include the
National SCADA Test Bed Program, which funds testing, assessments, and
training in control systems security, and the development of a road map
for securing control systems in the energy sector. Our report being
released today provides a more detailed list of initiatives being led
by federal agencies.
DHS, however, has not yet established a strategy to coordinate the
various control systems activities across federal agencies and the
private sector. In 2004, we recommended that DHS develop and implement
a strategy for coordinating control systems security efforts among
government agencies and the private sector.[Footnote 8] DHS agreed and
issued a strategy that focused primarily on DHS's initiatives. The
strategy does not include ongoing work by DOE, the Federal Energy
Regulatory Commission, NIST, and others. Further, it does not include
the various agencies' responsibilities, goals, milestones, or
performance measures. Until DHS develops an overarching strategy that
delineates various public and private entities' roles and
responsibilities and uses it to guide and coordinate control systems
security activities, the federal government and private sector risk
investing in duplicative activities and missing opportunities to learn
from other organizations' activities.
Further, DHS is responsible for sharing information with critical
infrastructure owners on control systems vulnerabilities, but lacks a
rapid, efficient process for disseminating sensitive information to
private industry owners and operators of critical infrastructures. An
agency official noted that sharing information with the private sector
can be slowed by staff turnover and vacancies at DHS, the need to brief
agency and executive branch officials and congressional staff before
briefing the private sector, and difficulties in determining the
appropriate classification level for the information. Until the agency
establishes an approach for rapidly assessing the sensitivity of
vulnerability information and disseminating it--and thereby
demonstrates the value it can provide to critical infrastructure
owners--DHS's ability to effectively serve as a focal point in the
collection and dissemination of sensitive vulnerability information
will continue to be limited. Without a trusted focal point for sharing
sensitive information on vulnerabilities, there is an increased risk
that attacks on control systems could cause a significant disruption to
our nation's critical infrastructures.
Implementation of GAO Recommendations Would Help Improve Federal
Control Systems Security Efforts:
Control systems are an essential component of our nation's critical
infrastructure and their disruption could have a significant impact on
public health and safety. Given the importance of control systems, in
our report being released today, we are recommending that the Secretary
of the Department of Homeland Security implement the following two
actions:[Footnote 9]
* develop a strategy to guide efforts for securing control systems,
including agencies' responsibilities, as well as overall goals,
milestones, and performance measures and:
* establish a rapid and secure process for sharing sensitive control
system vulnerability information with critical infrastructure control
system stakeholders, including vendors, owners, and operators.
In its comments on our report, DHS neither agreed nor disagreed with
these recommendations, but stated that it would take them under
advisement. The agency also discussed new initiatives to develop plans
and processes that are consistent with our recommendations.
In summary, past incidents involving control systems, system
vulnerabilities, and growing threats from a wide variety of sources
highlight the risks facing control systems. The public and private
sectors have begun numerous activities to improve the cyber security of
control systems. However, the federal government lacks an overall
strategy for coordinating public and private sector efforts. DHS also
lacks an efficient process for sharing sensitive information on
vulnerabilities with private sector critical infrastructure owners.
Until DHS completes the comprehensive strategy, the public and private
sectors risk undertaking duplicative efforts. Further, without a
streamlined process for advising private sector infrastructure owners
of vulnerabilities, DHS is unable to fulfill its responsibility as a
focal point for disseminating this information. If key vulnerability
information is not in the hands of those who can mitigate its
potentially severe consequences, there is an increased risk that
attacks on control systems could cause a significant disruption to our
nation's critical infrastructures.
Mr. Chairman, this concludes my statement. I would be happy to answer
any questions that you or members of the subcommittee may have at this
time.
If you have any questions on matters discussed in this testimony,
please contact me at (202) 512-6244, or by e-mail at
wilshuseng@gao.gov. Other key contributors to this testimony include
Scott Borre, Heather A. Collins, Neil J. Doherty, Vijay D'Souza, Nancy
Glover, Sairah Ijaz, Patrick Morton, and Colleen M. Phillips (Assistant
Director).
[End of section]
Footnotes:
[1] The White House, The National Strategy to Secure Cyberspace
(Washington, D.C.: February 2003).
[2] GAO, Critical Infrastructure Protection: Multiple Efforts to Secure
Control Systems Are Under Way, but Challenges Remain, GAO-07-1036
(Washington, D.C.: Oct. 17, 2007).
[3] "Malware" (malicious software) is defined as programs that are
designed to carry out annoying or harmful actions. They often
masquerade as useful programs or are embedded into useful programs so
that users are induced into activating them.
[4] Newton-Evans Research Company, Inc., World Market Study of SCADA,
Energy Management Systems and Distribution Management Systems in
Electrical Utilities: 2005-2007, (Ellicott City, Maryland: June 2005)
as cited in U.S. Department of Energy, Roadmap to Secure Control
Systems in the Energy Sector (Washington, D.C.: January 2006).
[5] The White House, The National Strategy to Secure Cyberspace.
[6] Department of Homeland Security, National Infrastructure Protection
Plan (Washington, D.C.: June 2006).
[7] See National Institute of Standards and Technology, Special
Publication 800-82 Guide to Supervisory Control and Data Acquisition
(SCADA) and Industrial Control Systems Security: Recommendations of the
National Institute of Standards and Technology, (Gaithersburg,
Maryland: September 2006); Los Angeles County District Attorneys Office
(da.co.la.ca.us/mr/010507a.htm), Two City Engineers Charged with
Allegedly Hacking Into City's Traffic Computer (Los Angeles,
California: Jan. 5, 2007); and ISA [hyperlink,
http://www.isa.org/content/contentgroups/news/2006/november29/hackers_hi
t_pennsylvania_water_system.htm], Hackers Hit Pennsylvania Water
System, (Research Triangle Park, North Carolina: Nov. 2, 2006).
[8] GAO, Critical Infrastructure Protection: Challenges and Efforts to
Secure Control Systems, GAO-04-354, (Washington, D.C.: Mar. 15, 2004).
[9] GAO-07-1036.
[End of section]
GAO's Mission:
The Government Accountability Office, the audit, evaluation, and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site [hyperlin, http://www.gao.gov]. Each
weekday, GAO posts newly released reports, testimony, and
correspondence on its Web site. To have GAO e-mail you a list of newly
posted products every afternoon, go to [hyperlink, http://www.gao.gov]
and select "E-mail Updates."
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. Government Accountability Office:
441 G Street NW, Room LM:
Washington, DC 20548:
To order by Phone:
Voice: (202) 512-6000:
TDD: (202) 512-2537:
Fax: (202) 512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]:
E-mail: fraudnet@gao.gov:
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Gloria Jarmon, Managing Director, JarmonG@gao.gov:
(202) 512-4400:
U.S. Government Accountability Office:
441 G Street NW, Room 7125:
Washington, DC 20548:
Public Affairs:
Susan Becker, Acting Manager, BeckerS@gao.gov:
(202) 512-4800:
U.S. Government Accountability Office:
441 G Street NW, Room 7149:
Washington, DC 20548: