Critical Infrastructure Protection
Department of Homeland Security Faces Challenges in Fulfilling Cybersecurity Responsibilities
Gao ID: GAO-05-434 May 26, 2005
Increasing computer interconnectivity has revolutionized the way that our government, our nation, and much of the world communicate and conduct business. While the benefits have been enormous, this widespread interconnectivity also poses significant risks to our nation's computer systems and, more importantly, to the critical operations and infrastructures they support. The Homeland Security Act of 2002 and federal policy established DHS as the focal point for coordinating activities to protect the computer systems that support our nation's critical infrastructures. GAO was asked to determine (1) DHS's roles and responsibilities for cyber critical infrastructure protection, (2) the status and adequacy of DHS's efforts to fulfill these responsibilities, and (3) the challenges DHS faces in fulfilling its cybersecurity responsibilities.
As the focal point for critical infrastructure protection (CIP), the Department of Homeland Security (DHS) has many cybersecurity-related roles and responsibilities that we identified in law and policy. DHS established the National Cyber Security Division to take the lead in addressing the cybersecurity of critical infrastructures. While DHS has initiated multiple efforts to fulfill its responsibilities, it has not fully addressed any of the 13 responsibilities, and much work remains ahead. For example, the department established the United States Computer Emergency Readiness Team as a public/private partnership to make cybersecurity a coordinated national effort, and it established forums to build greater trust and information sharing among federal officials with information security responsibilities and law enforcement entities. However, DHS has not yet developed national cyber threat and vulnerability assessments or government/industry contingency recovery plans for cybersecurity, including a plan for recovering key Internet functions. DHS faces a number of challenges that have impeded its ability to fulfill its cyber CIP responsibilities. These key challenges include achieving organizational stability, gaining organizational authority, overcoming hiring and contracting issues, increasing awareness about cybersecurity roles and capabilities, establishing effective partnerships with stakeholders, achieving two-way information sharing with these stakeholders, and demonstrating the value DHS can provide. In its strategic plan for cybersecurity, DHS identifies steps that can begin to address the challenges. However, until it confronts and resolves these underlying challenges and implements its plans, DHS will have difficulty achieving significant results in strengthening the cybersecurity of our critical infrastructures.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-05-434, Critical Infrastructure Protection: Department of Homeland Security Faces Challenges in Fulfilling Cybersecurity Responsibilities
This is the accessible text file for GAO report number GAO-05-434
entitled 'Critical Infrastructure Protection: Department of Homeland
Security Faces Challenges in Fulfilling Cybersecurity Responsibilities'
which was released on June 27, 2005.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Report to Congressional Requesters:
May 2005:
Critical Infrastructure Protection:
Department of Homeland Security Faces Challenges in Fulfilling
Cybersecurity Responsibilities:
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-05-434]
GAO Highlights:
Highlights of GAO-05-434, a report to congressional requesters:
Why GAO Did This Study:
Increasing computer inter-connectivity has revolutionized the way that
our government, our nation, and much of the world communicate and
conduct business. While the benefits have been enormous, this
widespread interconnectivity also poses significant risks to our
nation‘s computer systems and, more importantly, to the critical
operations and infrastructures they support. The Homeland Security Act
of 2002 and federal policy established DHS as the focal point for
coordinating activities to protect the computer systems that support
our nation‘s critical infrastructures. GAO was asked to determine (1)
DHS‘s roles and responsibilities for cyber critical infrastructure
protection, (2) the status and adequacy of DHS‘s efforts to fulfill
these responsibilities, and (3) the challenges DHS faces in fulfilling
its cybersecurity responsibilities.
What GAO Found:
As the focal point for critical infrastructure protection (CIP), the
Department of Homeland Security (DHS) has many cybersecurity-related
roles and responsibilities that we identified in law and policy (see
table below for 13 key responsibilities). DHS established the National
Cyber Security Division to take the lead in addressing the
cybersecurity of critical infrastructures.
While DHS has initiated multiple efforts to fulfill its
responsibilities, it has not fully addressed any of the 13
responsibilities, and much work remains ahead. For example, the
department established the United States Computer Emergency Readiness
Team as a public/private partnership to make cybersecurity a
coordinated national effort, and it established forums to build greater
trust and information sharing among federal officials with information
security responsibilities and law enforcement entities. However, DHS
has not yet developed national cyber threat and vulnerability
assessments or government/industry contingency recovery plans for
cybersecurity, including a plan for recovering key Internet functions.
DHS faces a number of challenges that have impeded its ability to
fulfill its cyber CIP responsibilities. These key challenges include
achieving organizational stability, gaining organizational authority,
overcoming hiring and contracting issues, increasing awareness about
cybersecurity roles and capabilities, establishing effective
partnerships with stakeholders, achieving two-way information sharing
with these stakeholders, and demonstrating the value DHS can provide.
In its strategic plan for cybersecurity, DHS identifies steps that can
begin to address the challenges. However, until it confronts and
resolves these underlying challenges and implements its plans, DHS will
have difficulty achieving significant results in strengthening the
cybersecurity of our critical infrastructures.
DHS‘s Key Cybersecurity Responsibilities:
* Develop a national plan for critical infrastructure protection,
including cybersecurity.
* Develop partnerships and coordinate with other federal agencies,
state and local governments, and the private sector.
* Improve and enhance public/private information sharing involving
cyber attacks, threats, and vulnerabilities.
* Develop and enhance national cyber analysis and warning capabilities.
* Provide and coordinate incident response and recovery planning
efforts.
* Identify and assess cyber threats and vulnerabilities.
* Support efforts to reduce cyber threats and vulnerabilities.
* Promote and support research and development efforts to strengthen
cyberspace security.
* Promote awareness and outreach.
* Foster training and certification.
* Enhance federal, state, and local government cybersecurity.
* Strengthen international cyberspace security.
* Integrate cybersecurity with national security.
Source: GAO analysis of law and policy.
[End of table]
What GAO Recommends:
GAO is making recommendations to the Secretary of Homeland Security to
strengthen the department‘s ability to implement key cybersecurity
responsibilities by completing critical activities and resolving
underlying challenges. In written comments on a draft of this report,
DHS agreed with our recommendation to engage stakeholders to prioritize
its responsibilities, but disagreed with and sought clarification on
recommendations to resolve its challenges.
www.gao.gov/cgi-bin/getrpt?GAO-05-434.
To view the full product, including the scope and methodology, click on
the link above. For more information, contact David Powner at (202) 512-
9286 or pownerd@gao.gov.
[End of section]
Contents:
Letter:
Results in Brief:
Background:
DHS's Roles and Responsibilities for Cybersecurity in Support of
Critical Infrastructure Protection Are Many and Varied:
DHS Has Initiated Efforts That Begin to Address Its Responsibilities,
but More Work Remains:
DHS Continues to Face Challenges in Establishing Itself as a National
Focal Point for Cyberspace Security:
Conclusions:
Recommendations for Executive Action:
Agency Comments and Our Evaluation:
Appendixes:
Appendix I: Objectives, Scope, and Methodology:
Appendix II: DHS Organizations with Cyber-Related Roles:
Appendix III: Comments from the Department of Homeland Security:
Appendix IV: GAO Contact and Staff Acknowledgments:
Tables:
Table 1: Sources of Emerging Cybersecurity Threats:
Table 2: Likely Sources of Cyber Attacks, According to Respondents to
the CSI/FBI 2003 Computer Crime and Security Survey:
Table 3: Types of Cyber Attacks:
Table 4: Federal Government Actions in Developing CIP Policy:
Table 5: Infrastructure Sectors Identified by the National Strategy for
Homeland Security and HSPD-7:
Table 6: Thirteen DHS Cybersecurity Responsibilities:
Table 7: DHS Partnership and Information-Sharing Initiatives:
Table 8: DHS Initiatives to Enhance Analytical Capabilities:
Table 9: Incident Response and Recovery Initiatives:
Table 10: DHS Cybersecurity Awareness and Outreach Initiatives:
Table 11: Key Initiatives in Cybersecurity Education:
Table 12: DHS's Intergovernmental Cybersecurity Initiatives:
Table 13: International Cybersecurity Initiatives:
Figures:
Figure 1: Security Vulnerabilities, 1995-2004:
Figure 2: NCSD Organization Chart:
Abbreviations:
CERT/CC: CERT® Coordination Center:
CIP: critical infrastructure protection:
DHS: Department of Homeland Security:
HSPD: Homeland Security Presidential Directive:
ISAC: information sharing and analysis center:
IT: information technology:
NCSD: National Cyber Security Division:
NIPP: National Infrastructure Protection Plan:
US-CERT: United States-Computer Emergency Response Team:
Letter May 26, 2005:
Congressional Requesters:
Since the early 1990s, increasing computer interconnectivity--most
notably growth in the use of the Internet--has revolutionized the way
that our government, our nation, and much of the world communicate and
conduct business. While the benefits have been enormous, this
widespread interconnectivity also poses significant risks to the
government's and our nation's computer systems and, more importantly,
to the critical operations and infrastructures they support. The speed
and accessibility that create the enormous benefits of the computer
age, if not properly controlled, allow unauthorized individuals and
organizations to inexpensively eavesdrop on or interfere with these
operations from remote locations for mischievous or malicious purposes,
including fraud or sabotage. Recent terrorist attacks and threats have
further underscored the need to manage and bolster the cybersecurity of
our nation's critical infrastructures.
Federal law and policy call for critical infrastructure protection
(CIP) activities that are intended to enhance the cyber and physical
security of both the public and private infrastructures that are
essential to national security, national economic security, and
national public health and safety.[Footnote 1] Federal policy
recognizes the importance of building public/private partnerships and
identifies several critical infrastructure sectors as well as federal
agencies to work with the sectors to coordinate efforts to strengthen
the security of the nation's public and private, computer-dependent
critical infrastructure. In addition, it establishes the Department of
Homeland Security (DHS) as the focal point for the security of
cyberspace--including analysis, warning, information sharing,
vulnerability reduction, mitigation, and recovery efforts for public
and private critical infrastructure information systems. To accomplish
this mission, DHS is to work with the federal agencies, state and local
governments, and the private sector.
In response to your request, we determined (1) DHS's roles and
responsibilities for cyber critical infrastructure protection and
national information security, as established in law and policy, and
the specific organizational structures DHS has created to fulfill them;
(2) the status of DHS's efforts to protect the computer systems that
support the nation's critical infrastructures and to strengthen
information security--both inside and outside the federal government--
and the extent to which such efforts adequately address its
responsibilities; and (3) the challenges DHS faces in fulfilling its
cybersecurity roles and responsibilities. To accomplish these
objectives, we reviewed relevant law, policy, directives, and documents
and interviewed officials from DHS, other federal agencies, and the
private sector who are involved in efforts to enhance the cybersecurity
of critical infrastructures. Appendix I provides further details on our
objectives, scope, and methodology. We performed our work from July
2004 to April 2005 in accordance with generally accepted government
auditing standards.
Results in Brief:
As the focal point for critical infrastructure protection, DHS has many
cybersecurity-related roles and responsibilities that are called for in
law and policy. These responsibilities include developing plans,
building partnerships, and improving information sharing, as well as
implementing activities related to the five priorities in the national
cyberspace strategy: (1) developing and enhancing national cyber
analysis and warning, (2) reducing cyberspace threats and
vulnerabilities, (3) promoting awareness of and training in security
issues, (4) securing governments' cyberspace, and (5) strengthening
national security and international cyberspace security cooperation. To
fulfill its cybersecurity role, in June 2003, DHS established the
National Cyber Security Division to serve as a national focal point for
addressing cybersecurity and coordinating the implementation of
cybersecurity efforts.
While DHS has initiated multiple efforts, it has not fully addressed
any of the 13 key cybersecurity-related responsibilities that we
identified in federal law and policy, and it has much work ahead in
order to be able to fully address them. For example, DHS (1) has
recently issued the Interim National Infrastructure Protection Plan,
which includes cybersecurity elements; (2) operates the United States
Computer Emergency Readiness Team to address the need for a national
analysis and warning capability; and (3) has established forums to
foster information sharing among federal officials with information
security responsibilities and among various law enforcement entities.
However, DHS has not yet developed national threat and vulnerability
assessments or developed and exercised government and
government/industry contingency recovery plans for cybersecurity,
including a plan for recovering key Internet functions. Further, DHS
continues to have difficulties in developing partnerships--as called
for in federal policy--with other federal agencies, state and local
governments, and the private sector.
DHS faces a number of challenges that have impeded its ability to
fulfill its cyber CIP responsibilities. Key challenges include
achieving organizational stability; gaining organizational authority;
overcoming hiring and contracting issues; increasing awareness about
cybersecurity roles and capabilities; establishing effective
partnerships with stakeholders (other federal agencies, state and local
governments, and the private sector); achieving two-way information
sharing with these stakeholders; and demonstrating the value DHS can
provide. In its strategic plan for cybersecurity, DHS has identified
steps that can begin to address these challenges. However, until it
effectively confronts and resolves these underlying challenges, DHS
will have difficulty achieving significant results in strengthening the
cybersecurity of our nation's critical infrastructures, and our nation
will lack the strong cybersecurity focal point envisioned in federal
law and policy.
We are making recommendations to the Secretary of Homeland Security to
strengthen the department's ability to implement key cybersecurity
responsibilities by completing critical activities and resolving
underlying challenges.
DHS provided written comments on a draft of this report (see app. III).
In brief, DHS agreed that strengthening cybersecurity is central to
protecting the nation's critical infrastructures and that much remains
to be done. In addition, DHS concurred with our recommendation to
engage stakeholders in prioritizing its key cybersecurity
responsibilities. However, DHS did not concur with our recommendations
to identify and prioritize initiatives to address the challenges it
faces, or to establish performance metrics and milestones for these
initiatives. Specifically, DHS reported that its strategic plan for
cybersecurity already provides a prioritized list, performance
measures, and milestones to guide and track its activities. The
department sought additional clarification of these recommendations.
While we agree with DHS that its plan identifies activities (along with
some performance measures and milestones) that will begin to address
the challenges, this plan does not include specific initiatives that
would ensure that the challenges are addressed in a prioritized and
comprehensive manner. For example, the strategic plan for cybersecurity
does not include initiatives to help stabilize and build authority for
the organization. Further, the strategic plan does not identify the
relative priority of its initiatives and does not consistently identify
performance measures for completing its initiatives. As DHS moves
forward in identifying initiatives to address the underlying challenges
it faces, it will be important to establish performance measures and
milestones for fulfilling these initiatives.
DHS officials (as well as others who were quoted in our report) also
provided detailed technical corrections, which we have incorporated in
this report as appropriate.
Background:
Critical Infrastructure Protection (CIP) involves activities that
enhance the cyber and physical security of the public and private
infrastructures that are critical to national security, national
economic security, and national public health and safety. Because a
large percentage of the nation's critical infrastructures is owned and
operated by the private sector, public/private partnerships are crucial
for successful critical infrastructure protection. Recent terrorist
attacks and threats have further underscored the need to encourage and
manage CIP activities. Vulnerabilities are being identified on a more
frequent basis and, if these vulnerabilities are exploited, several of
our nation's critical infrastructures could be disrupted or disabled.
Sources of Potential Cyber Attacks on Critical Infrastructures Are
Proliferating:
Several types of organizations and individuals are capable of
conducting attacks on our nation's critical infrastructures.
Historically, attacks on our infrastructures could be conducted only by
a relatively small number of entities. However, with critical
infrastructures' increasing reliance on computers and networks, more
organizations and individuals can cause harm using cyber attacks.
Further, U.S. authorities are becoming increasingly concerned about the
prospect of combined physical and cyber attacks, which could have
devastating consequences. Table 1 lists sources of threats that have
been identified by the U.S. intelligence community and others.
Table 1: Sources of Emerging Cybersecurity Threats:
Threat: Bot-network operators;
Description: Bot-network operators are hackers; however, instead of
breaking into systems for the challenge or bragging rights, they take
over multiple systems in order to coordinate attacks and to distribute
phishing[A] schemes, spam, and malwareb attacks. The services of these
networks are sometimes made available on underground markets (e.g.,
purchasing a denial-of-service attack, servers to relay spam or
phishing attacks, etc.)
Threat: Criminal groups;
Description: Criminal groups seek to attack systems for monetary gain.
Specifically, organized crime groups are using spam, phishing, and
spyware/malware to commit identity theft and online fraud.
International corporate spies and organized crime organizations also
pose a threat to the United States through their ability to conduct
industrial espionage and large-scale monetary theft and to hire or
develop hacker talent.
Threat: Foreign intelligence services;
Description: Foreign intelligence services use cyber tools as part of
their information- gathering and espionage activities. In addition,
several nations are aggressively working to develop information warfare
doctrine, programs, and capabilities. Such capabilities enable a single
entity to have a significant and serious impact by disrupting the
supply, communications, and economic infrastructures that support
military power--impacts that could affect the daily lives of U.S.
citizens across the country.
Threat: Hackers;
Description: Hackers break into networks for the thrill of the
challenge or for bragging rights in the hacker community. While remote
cracking once required a fair amount of skill or computer knowledge,
hackers can now download attack scripts and protocols from the Internet
and launch them against victim sites. Thus, while attack tools have
become more sophisticated, they have also become easier to use.
According to the Central Intelligence Agency, the large majority of
hackers do not have the requisite expertise to threaten difficult
targets such as critical U.S. networks. Nevertheless, the worldwide
population of hackers poses a relatively high threat of an isolated or
brief disruption causing serious damage.
Threat: Insiders;
Description: The disgruntled organization insider is a principal source
of computer crime. Insiders may not need a great deal of knowledge
about computer intrusions because their knowledge of a target system
often allows them to gain unrestricted access to cause damage to the
system or to steal system data. The insider threat also includes
outsourcing vendors as well as employees who accidentally introduce
malware into systems.
Threat: Phishers;
Description: Individuals, or small groups, that execute phishing
schemes in an attempt to steal identities or information for monetary
gain. Phishers may also use spam and spyware/malware to accomplish
their objectives.
Threat: Spammers;
Description: Individuals or organizations that distribute unsolicited e-
mail with hidden or false information in order to sell products,
conduct phishing schemes, distribute spyware/malware, or attack
organizations (i.e., denial of service).
Threat: Spyware/malware authors;
Description: Individuals or organizations with malicious intent carry
out attacks against users by producing and distributing spyware and
malware. Several destructive computer viruses and worms have harmed
files and hard drives, including the Melissa Macro Virus, the
Explore.Zip worm, the CIH (Chernobyl) Virus, Nimda, Code Red, Slammer,
and Blaster.
Threat: Terrorists;
Description: Terrorists seek to destroy, incapacitate, or exploit
critical infrastructures in order to threaten national security, cause
mass casualties, weaken the U.S. economy, and damage public morale and
confidence. Terrorists may use phishing schemes or spyware/malware in
order to generate funds or gather sensitive information.
Source: GAO analysis based on data from the Federal Bureau of
Investigation, Central Intelligence Agency, and the Software
Engineering Institute's CERT® Coordination Center.
[A] Phishing involves the creation and use of e-mails and Web sites
that are designed to look like those of well-known legitimate
businesses or government agencies, in order to deceive Internet users
into disclosing their personal data for criminal purposes, such as
identity theft and fraud.
[B] Malware is software designed with malicious intent, such as a
virus.
[End of table]
Government officials are increasingly concerned about attacks from
individuals and groups with malicious intent--such as crime, terrorism,
foreign intelligence gathering, and acts of war. For example, in
February 2005, the Federal Bureau of Investigation Director testified
before the Senate Select Committee on Intelligence about current
threats--including cyber threats--to the United States.[Footnote 2] He
stated that the cyber threat to the United States is serious, and the
number of actors with both the ability and the desire to use computers
for illegal and harmful purposes continues to rise. The Director added
that individuals or groups from foreign states, including foreign
governments, continue to pose threats to our national and economic
security because they have the resources to support advanced network
exploitation and attack. In addition, he stated that "terrorists show a
growing understanding of the critical role of information technology in
the day-to-day operations of our economy and national security and have
expanded their recruitment to include people studying math, computer
science and engineering." The Director further stated that although
individual hackers do not pose a great threat, hackers intent on
stealing information or motivated by money are a concern--adding that
"if this pool of talent is utilized by terrorists, foreign governments
or criminal organizations, the potential for a successful cyber attack
on our critical infrastructures is greatly increased."
Analyses by various organizations have also demonstrated the increasing
threats that are faced by critical infrastructure sectors in the United
States. For example, in May 2004, the E-Crime Watch™ survey of security
and law enforcement executives found that 43 percent of the respondents
reported "an increase in electronic crimes and intrusions over the
previous year and 70 percent reported at least one electronic crime or
intrusion being committed against their organization." Regarding the
source of the electronic crime or intrusion, 70 percent of respondents
reported that they knew the source. The respondents most frequently
identified hackers (40 percent), followed by current and former
employees and contractors (31 percent), as the greatest threats to
cybersecurity.[Footnote 3] Similarly, respondents to the 2003 Computer
Security Institute and Federal Bureau of Investigation Computer Crime
and Security Survey identified independent hackers as the most likely
source of cyber attacks, as shown in table 2.[Footnote 4]
Table 2: Likely Sources of Cyber Attacks, According to Respondents to
the CSI/FBI 2003 Computer Crime and Security Survey:
Potential source: Independent hackers;
Percentage of respondents: 82%.
Potential source: Disgruntled employees;
Percentage of respondents: 77%.
Potential source: U.S. competitors;
Percentage of respondents: 40%.
Potential source: Foreign governments;
Percentage of respondents: 28%.
Potential source: Foreign corporations;
Percentage of respondents: 25%.
Source: 2003 CSI/FBI Computer Crime and Security Survey.
[End of table]
As larger amounts of money are transferred through computer systems, as
more sensitive economic and commercial information is exchanged
electronically, and as the nation's defense and intelligence
communities increasingly rely on commercially available information
technology, the likelihood increases that information attacks will
threaten vital national interests.
Types of Attacks Are Expanding and Tools Are Readily Available:
According to the Federal Bureau of Investigation, terrorists,
transnational criminals, and intelligence services are quickly becoming
aware of and using tools such as computer viruses, Trojan horses,
worms, logic bombs, and eavesdropping programs ("sniffers") that can
deny access, degrade the integrity of, intercept, or destroy data (see
table 3).
Table 3: Types of Cyber Attacks:
Type of attack: Denial of service;
Description: A method of attack from a single source that denies system
access to legitimate users by overwhelming the target computer with
messages and blocking legitimate traffic. It can prevent a system from
being able to exchange data with other systems or use the Internet.
Type of attack: Distributed denial of service;
Description: A variant of the denial-of-service attack that uses a
coordinated attack from a distributed system of computers rather than
from a single source. It often makes use of worms to spread to multiple
computers that can then attack the target.
Type of attack: Exploit tools;
Description: Publicly available and sophisticated tools that intruders
of various skill levels can use to determine vulnerabilities and gain
entry into targeted systems.
Type of attack: Logic bombs;
Description: A form of sabotage in which a programmer inserts code that
causes the program to perform a destructive action when some triggering
event occurs, such as terminating the programmer's employment.
Type of attack: Phishing;
Description: The creation and use of e-mails and Web sites--designed to
look like those of well-known legitimate businesses, financial
institutions, and government agencies--in order to deceive Internet
users into disclosing their personal data, such as bank and financial
account information and passwords. The phishers then take that
information and use it for criminal purposes, such as identity theft
and fraud.
Type of attack: Sniffer;
Description: Synonymous with packet sniffer. A program that intercepts
routed data and examines each packet in search of specified
information, such as passwords transmitted in clear text.
Type of attack: Trojan horse;
Description: A computer program that conceals harmful code. A Trojan
horse usually masquerades as a useful program that a user would wish to
execute.
Type of attack: Virus;
Description: A program that infects computer files, usually executable
programs, by inserting a copy of itself into the file. These copies are
usually executed when the infected file is loaded into memory, allowing
the virus to infect other files. Unlike the computer worm, a virus
requires human involvement (usually unwitting) to propagate.
Type of attack: War dialing;
Description: Simple programs that dial consecutive telephone numbers
looking for modems.
Type of attack: War driving;
Description: A method of gaining entry into wireless computer networks
using a laptop, antennas, and a wireless network adaptor that involves
patrolling locations to gain unauthorized access.
Type of attack: Worm;
Description: An independent computer program that reproduces by copying
itself from one system to another across a network. Unlike computer
viruses, worms do not require human involvement to propagate.
Source: GAO analysis of reports by the Department of Justice and GAO.
[End of table]
Viruses and worms are commonly used to launch denial-of-service
attacks, which generally flood targeted networks and systems by
transmitting so much data that regular traffic is either slowed or
stopped. Such attacks have been used ever since the groundbreaking
Morris worm, which brought 10 percent of the systems connected to the
Internet to a halt in November 1988. In 2001, the Code Red worm used a
denial-of-service attack to affect millions of computer users by
shutting down Web sites, slowing Internet service and disrupting
business and government operations.[Footnote 5]
As the number of individuals with computer skills has increased,
intrusion tools have become more readily available and relatively easy
to use. Frequently, skilled hackers develop exploitation tools and post
them on Internet hacking sites. These tools are then readily available
for others to download, allowing even inexperienced programmers to
create a computer virus or to literally point and click to launch an
attack. According to the National Institute of Standards and
Technology, 30 to 40 new attack tools are posted on the Internet every
month.[Footnote 6] Experts also agree that there has been a steady
advance in the sophistication and effectiveness of attack technologies.
Intruders quickly develop attacks to exploit vulnerabilities that have
been discovered in products, use these attacks to compromise computers,
and share them with other attackers. In addition, they can combine
these attacks with other forms of technology to develop programs that
automatically scan the network for vulnerable systems, attack them,
compromise them, and use them to spread the attack even further.
Cyber Vulnerabilities Have Increased:
In addition to the growing threat from terrorists, transnational
criminals, foreign intelligence services, and hackers, there has been a
growing number of software vulnerabilities. Flaws in software code that
could cause a program to malfunction generally result from programming
errors that occur during software development. The increasing
complexity and size of software programs contribute to an increase in
software flaws. For example, Microsoft Windows 2000 reportedly contains
about 35 million lines of code, compared with about 15 million lines
for Windows 95. As reported by the National Institute of Science and
Technology, based on studies of code inspections, there can be as many
as 20 flaws per thousand lines of software code. While most flaws do
not create security vulnerabilities,[Footnote 7] the potential for
these errors reflects the difficulty and complexity of delivering
trustworthy code.[Footnote 8] By exploiting software vulnerabilities,
hackers and others who spread malicious code can cause significant
damage, ranging from defacing Web sites to taking control of entire
systems and thereby being able to read, modify, or delete sensitive
information; disrupt operations; launch attacks against other
organizations' systems; or destroy systems.
Between 1995 and 2004, the Software Engineering Institute's CERT®
Coordination Center (CERT/CC)[Footnote 9] reported that 16,726 security
vulnerabilities had resulted from software flaws. Figure 1 illustrates
the increase in security vulnerabilities over these years.
Figure 1: Security Vulnerabilities, 1995-2004:
[See PDF for image]
[End of figure]
Taking Advantage of Vulnerabilities, Attackers Are Able to Cause
Serious Consequences:
The growing number of known vulnerabilities increases the potential
number of attacks. As vulnerabilities are discovered, attackers attempt
to exploit them. Attacks can be launched against specific targets or
widely distributed through viruses and worms. The risks posed by this
increasing and evolving threat are demonstrated in media and other
reports of actual and potential attacks and disruptions, such as those
cited below.
* In March 2005, security consultants within the electric industry
reported that hackers were targeting the U.S. electric power grid and
had gained access to U.S. utilities' electronic control systems.
Computer security specialists reported that, in a few cases, these
intrusions had "caused an impact." While officials stated that hackers
had not caused serious damage to the systems that feed the nation's
power grid, the constant threat of intrusion has heightened concerns
that electric companies may not have adequately fortified their
defenses against a potential catastrophic strike.
* In January 2005, a major university reported that a hacker had broken
into a database containing 32,000 student and employee Social Security
numbers, potentially compromising their finances and identities. In
similar incidents during 2003 and 2004, it was reported that hackers
had attacked the systems of other universities, exposing the personal
information of over 1.8 million people.
* On August 11, 2003, the Blaster worm was launched, and it infected
more than 120,000 computers in its first 36 hours. The worm was
programmed to launch a denial-of-service attack against Microsoft's
Windows Update Web site, and it affected a wide range of systems and
caused slowdowns and disruptions in users' Internet services. For
example, the Maryland Motor Vehicle Administration was forced to shut
down its computer systems.
* In June 2003, the U.S. government issued a warning concerning a virus
that specifically targeted financial institutions. Experts said the
BugBear.b virus was programmed to determine whether a victim had used
an e-mail address for any of the roughly 1,300 financial institutions
listed in the virus's code. If a match was found, the software
attempted to collect and document user input by logging keystrokes and
then provide this information to a hacker, who could use it in attempts
to break into the banks' networks.
* In May 2004, we reported that according to a preliminary study
coordinated by the Cooperative Association for Internet Data Analysis,
on January 25, 2003, the SQL Slammer worm (also known as "Sapphire" and
"SQL Hell") infected more than 90 percent of vulnerable computers
worldwide within 10 minutes of its release on the Internet.[Footnote
10] As the study reports, exploiting a known vulnerability for which a
patch had been available since July 2002, Slammer doubled in size every
8.5 seconds and achieved its full scanning rate (55 million scans per
second) after about 3 minutes, causing considerable harm through
network outages. Further, the study emphasized that the effects would
likely have been more severe had Slammer carried a malicious payload,
exploited a more widespread vulnerability, or targeted a more popular
service. Despite its lack of malicious payload, Slammer caused
significant damage, exacting a toll on several large companies and
municipalities that found their internal networks deluged with data
from the virus. Major financial institutions reported problems; for
example, one reported that a majority of its automatic teller machines
were unable to process customer transactions for several hours. The
attack disrupted operations for several hours at a 911 call center that
served two suburban police departments and at least 14 fire
departments. A commercial airline had flights delayed or canceled
because of online ticketing and electronic check-in problems.
* In November 2002, a British computer administrator was indicted on
charges that he accessed and damaged 98 computers in 14 states between
March 2001 and March 2002, causing some $900,000 in damage. These
networks belonged to the Department of Defense, the National
Aeronautics and Space Administration, and private companies. The
indictment alleges that the attacker was able to gain administrative
privileges on military computers, copy password files, and delete
critical system files. The attacks rendered the networks of the Earle
Naval Weapons Station in New Jersey and the Military District of
Washington inoperable.
The CERT/CC has noted that attacks that once took weeks or months to
propagate over the Internet now take just hours--or even minutes--
because automated tools are now available. For instance, while Code Red
achieved an infection rate of over 20,000 systems within 10 minutes in
July 2001, about a year and a half later, in January 2003, the Slammer
worm successfully attacked at least 75,000 systems, infecting more than
90 percent of vulnerable systems within 10 minutes.
According to CERT/CC, due to the widespread use of automated tools that
have made attacks against Internet-connected systems so commonplace, it
no longer publishes the number of incidents that are reported. For
historical perspective, the number of computer security incidents
reported to CERT/CC rose from just under 10,000 in 1999 to over 52,000
in 2001, to about 82,000 in 2002, and to 137,529 in 2003--when CERT/CC
stopped reporting the number of incidents. Moreover, the Director of
the CERT Centers stated that he estimates that as much as 80 percent of
security incidents go unreported, in most cases because (1) the
organization was unable to recognize that its systems had been
penetrated or there were no indications of penetration or attack or (2)
the organization was reluctant to report.
Concerns Regarding the Impact of Cyber Threats on Infrastructure
Control Systems Are Growing:
Since September 11, 2001, the critical link between cyberspace and
physical space has been increasingly recognized. In July 2002, the
National Infrastructure Protection Center reported that the potential
for compound cyber and physical attacks, referred to as "swarming
attacks," is an emerging threat to our nation's critical
infrastructures. Swarming attacks can slow down or complicate the
response to a physical attack. For instance, a cyber attack that
disabled the water supply or the electrical system, in conjunction with
a physical attack, could deny emergency services the necessary
resources to manage the consequences of the physical attack--such as
controlling fires, coordinating actions, and generating light.
There is a general consensus--and increasing concern--among government
officials and experts on control systems, about potential cyber threats
to the control systems that govern our critical infrastructures. In his
November 2002 congressional testimony, the Director of the CERT Centers
at Carnegie Mellon University noted that supervisory control and data
acquisition systems and other forms of networked computer systems had
been used for years to control power grids, gas and oil distribution
pipelines, water treatment and distribution systems, hydroelectric and
flood control dams, oil and chemical refineries, and other physical
infrastructure systems.[Footnote 11] These control systems are
increasingly being connected to communications links and networks to
enhance performance and to reduce operational costs by supporting
remote maintenance, remote control, and remote update functions. They
are potential targets for individuals intent on causing massive
disruption and physical damage. The use of commercial-off-the-shelf
technologies for these systems--without adequate security enhancements--
can significantly limit available approaches to protection and may
increase the number of potential attackers.
As components of control systems increasingly make critical decisions
that were once made by humans, the potential effect of a cyber attack
becomes more devastating. For example, a failed control system was a
contributing factor in the widespread east coast electrical blackout of
August 2003. While investigations later found that this incident was
not the result of a deliberate attack, DHS officials stated that the
significant involvement of a control system highlighted the fact that a
physical system or location could be accessed through a cyber
connection. Another example occurred in August 2003; the Nuclear
Regulatory Commission confirmed that earlier that year the Slammer worm
had infected a private computer network at a nuclear power plant,
disabling a safety monitoring system for nearly 5 hours. The plant's
process computer failed, and it took about 6 hours for it to become
available again. The worm reportedly also affected communications on
the control networks of at least five other utilities by propagating so
quickly that control system traffic was blocked. Looking ahead, 66
percent of the technology experts and scholars who responded to a 2004
survey on the future of the Internet believe that at least one
devastating cyber attack will occur on the networked information
infrastructure or the country's power grid within the next 10
years.[Footnote 12]
In March 2004, we reported on the significant challenges of securing
controls systems, including technical limitations, perceived lack of
economic justification, and conflicting organizational
priorities.[Footnote 13] We recommended that the Secretary of DHS
develop and implement a strategy for coordinating with the private
sector and other government agencies to improve the security of control
systems. This strategy was issued in December 2004.
Critical Infrastructure Protection Policy Has Continued to Evolve Since
the Mid-1990s:
Over the years, the federal government and critical infrastructure
representatives have sponsored working groups, written reports, issued
policies, and created organizations to address CIP. To provide a
historical perspective, table 4 summarizes the key developments in
federal CIP policy since 1997.
Table 4: Federal Government Actions in Developing CIP Policy:
Policy action: Critical Foundations: Protecting America's
Infrastructures[A]; Date: Oct. 1997;
Description: Described the potentially devastating effects of poor
information security on the nation and recommended measures to achieve
a higher level of CIP that included industry cooperation and
information sharing, a national organizational structure, a revised
program of research and development, a broad program of awareness and
education, and a reconsideration of related laws.
Policy action: Presidential Decision Directive 63;
Date: May 1998;
Description: Established CIP as a national goal and presented a
strategy for cooperative efforts by government and the private sector
to protect the physical and cyber-based systems essential to the
minimum operations of the economy and the government; Established
government agencies to coordinate and support CIP efforts; Identified
lead federal agencies to work with coordinators in eight infrastructure
sectors and five special functions; Encouraged the development of
information-sharing and analysis centers; Required every federal
department and agency to be responsible for protecting its own critical
infrastructures, including both cyber-based and physical assets;
Superseded by HSPD-7 (see details on HSPD-7 below).
Policy action: National Plan for Information Systems Protection[B];
Date: Jan. 2000;
Description: Provided a vision and framework for the federal government
to prevent, detect, and respond to attacks on the nation's critical
cyber-based infrastructure and to reduce existing vulnerabilities by
complementing and focusing existing federal computer security and
information technology requirements.
Policy action: Executive Order 13228;
Date: Oct. 2001;
Description: Established the Office of Homeland Security, within the
Executive Office of the President, to develop and coordinate the
implementation of a comprehensive national strategy to secure the
United States from terrorist threats or attacks; Established the
Homeland Security Council to advise and assist the President with all
aspects of homeland security and to ensure coordination among executive
departments and agencies.
Policy action: Executive Order 13231;
Date: Oct. 2001;
Description: Established the President's Critical Infrastructure
Protection Board to coordinate cyber-related federal efforts and
programs associated with protecting our nation's critical
infrastructures and to recommend policies and coordinating programs for
protecting CIP-related information systems.
Policy action: National Strategy for Homeland Security[C];
Date: July 2002;
Description: Identified the protection of critical infrastructures and
key assets as a critical mission area for homeland security; Expanded
the number of critical infrastructures from the 8 identified in
Presidential Decision Directive 63 to 13 and identified lead federal
agencies for each.
Policy action: Homeland Security Act of 2002[D];
Date: Nov. 2002;
Description: Created the Department of Homeland Security and assigned
it the following CIP responsibilities: (1) developing a comprehensive
national plan for securing the key resources and critical
infrastructures of the United States; (2) recommending measures to
protect the key resources and critical infrastructures of the United
States in coordination with other groups; and (3) disseminating, as
appropriate, information to assist in the deterrence, prevention, and
preemption of or response to terrorist attacks.
Policy action: The National Strategy to Secure Cyberspace[E];
Date: Feb. 2003;
Description: Provided the initial framework for both organizing and
prioritizing efforts to protect our nation's cyberspace; Provided
direction to federal departments and agencies that have roles in
cyberspace security and identified steps that state and local
governments, private companies and organizations, and individual
Americans can take to improve our collective cybersecurity.
Policy action: The National Strategy for the Physical Protection of
Critical Infrastructures and Key Assets[F];
Date: Feb. 2003;
Description: Provided a statement of national policy to remain
committed to protecting critical infrastructures and key assets from
physical attacks; Built on Presidential Decision Directive 63 with its
sector-based approach and called for expanding the capabilities of
information sharing and analysis centers; Outlined three key
objectives: (1) identifying and assuring the protection of the most
critical assets, systems, and functions; (2) assuring the protection of
infrastructures that face an imminent threat; and (3) pursuing
collaborative measures and initiatives to assure the protection of
other potential targets.
Policy action: Executive Order 13286;
Date: Feb. 2003;
Description: Superseded Executive Order 13231 but maintained the same
national policy statement regarding the protection against disruption
of information systems for critical infrastructures; Dissolved the
President's Critical Infrastructure Protection Board and eliminated the
board's chair, the Special Advisor to the President for Cyberspace
Security; Designated the National Infrastructure Advisory Council to
continue to provide the President with advice on the security of
information systems for critical infrastructures supporting other
sectors of the economy through the Secretary of Homeland Security.
Policy action: Homeland Security Presidential Directive 7;
Date: Dec. 2003;
Description: Superseded Presidential Decision Directive 63 and
established a national policy for federal departments and agencies to
identify and prioritize U.S. critical infrastructure and key resources
and to protect them from terrorist attack; Defined roles and
responsibilities for the Department of Homeland Security and sector-
specific agencies to work with sectors to coordinate CIP activities;
Established a CIP Policy Coordinating Committee to advise the Homeland
Security Council on interagency CIP issues.
Source: GAO analysis of documents listed above.
[A] President's Commission on Critical Infrastructure Protection,
Critical Foundations: Protecting America's Infrastructures (Washington,
D.C.: October 1997).
[B] The White House, Defending America's Cyberspace: National Plan for
Information Systems Protection: Version 1.0: An Invitation to Dialogue
(Washington, D.C.: January 2000).
[C] The White House, Office of Homeland Security, National Strategy for
Homeland Security.
[D] Homeland Security Act of 2002, Public Law 107-296 (November 25,
2002).
[E] The White House, The National Strategy to Secure Cyberspace
(Washington, D.C.: February 2003).
[F] The White House, The National Strategy for the Physical Protection
of Critical Infrastructures and Key Assets.
[End of table]
DHS's Roles and Responsibilities for Cybersecurity in Support of
Critical Infrastructure Protection Are Many and Varied:
While policies and strategies for protecting our nation's critical
infrastructures have evolved over recent years, three key documents (a
law, a national policy, and a national strategy) currently guide
federal and nonfederal cybersecurity-related CIP efforts. The law
establishes DHS's responsibilities for critical infrastructure
protection, a role that includes strengthening the security of our
nation's information infrastructure. The policy and strategy are
consistent with the law, and reinforce and expand on it. Together, the
three guiding documents contain numerous and varied requirements levied
on DHS, of which 13 key responsibilities address cybersecurity. To
fulfill its cybersecurity roles and responsibilities, DHS has
established the National Cyber Security Division (NCSD).
Federal Law and Policies Guide Critical Infrastructure Protection and
Cybersecurity:
Federal law and policies establish CIP as a national goal and describe
a strategy for cooperative efforts by government and the private sector
to protect the physical and cyber-based systems that are essential to
the minimum operations of the economy and the government. These include
(1) the Homeland Security Act of 2002, (2) Homeland Security
Presidential Directive-7 (HSPD-7), and (3) the National Strategy to
Secure Cyberspace. A discussion of each follows.
The Homeland Security Act of 2002 Created the Department of Homeland
Security:
The Homeland Security Act of 2002, signed by the President on November
25, 2002, established DHS and gave it lead responsibility for
preventing terrorist attacks in the United States, reducing the
vulnerability of the United States to terrorist attacks, and minimizing
the damage and assisting in recovery from attacks that do occur. To
help DHS accomplish its mission, the act establishes, among other
entities, five under secretaries with responsibility over directorates
for management, science and technology, information analysis and
infrastructure protection, border and transportation security, and
emergency preparedness and response.
The act also assigns the department a number of CIP responsibilities,
including (1) developing a comprehensive national plan for securing the
key resources and critical infrastructure of the United States; (2)
recommending measures to protect the key resources and critical
infrastructure of the United States in coordination with other federal
agencies and in cooperation with state and local government agencies
and authorities, the private sector, and other entities; and (3)
disseminating, as appropriate, information analyzed by the department-
-both within the department and to other federal, state, and local
government agencies and private-sector entities--to assist in the
deterrence, prevention, preemption of, or response to terrorist
attacks.
Homeland Security Presidential Directive 7 Defines Federal CIP
Responsibilities:
In December 2003, the President issued HSPD-7, which superseded
Presidential Decision Directive-63 and established a national policy
for federal departments and agencies to identify and prioritize
critical infrastructures and key resources and to protect them from
terrorist attack. HSPD-7 defines responsibilities for DHS, sector-
specific federal agencies that are responsible for addressing specific
critical infrastructure sectors, and other departments and agencies.
These responsibilities are briefly discussed below.
DHS--HSPD-7 requires, among other things, that the Secretary of
Homeland Security:
* coordinate the national effort to enhance CIP;
* identify, prioritize, and coordinate the protection of critical
infrastructure, emphasizing protection against catastrophic health
effects or mass casualties;
* establish uniform policies, approaches, guidelines, and methodologies
for integrating federal infrastructure protection and risk management
activities within and across sectors;
* serve as the focal point for securing cyberspace, including analysis,
warning, information sharing, vulnerability reduction, mitigation, and
recovery efforts for critical infrastructure information systems; and:
* produce a comprehensive and integrated national plan for critical
infrastructure and key resources protection that outlines national
goals, objectives, milestones, and key initiatives.
Sector-specific agencies--HSPD-7 designated certain federal agencies as
lead federal points of contact for the critical infrastructure sectors
identified in the National Strategy for Homeland Security (see table
5). These agencies are responsible for infrastructure protection
activities in their assigned sectors and are to coordinate and
collaborate with relevant federal agencies, state, and local
governments, and the private sector to carry out related
responsibilities.
Table 5: Infrastructure Sectors Identified by the National Strategy for
Homeland Security and HSPD-7:
Sector: Agriculture;
Description: Provides for the fundamental need for food. The
infrastructure includes supply chains for feed and crop production;
Lead agency: Department of Agriculture.
Sector: Banking and finance;
Description: Provides the financial infrastructure of the nation. This
sector consists of commercial banks, insurance companies, mutual funds,
government-sponsored enterprises, pension funds, and other financial
institutions that carry out transactions, including clearing and
settlement;
Lead agency: Department of the Treasury.
Sector: Chemicals and hazardous materials;
Description: Transforms natural raw materials into commonly used
products benefiting society's health, safety, and productivity. The
chemical industry produces more than 70,000 products that are essential
to automobiles, pharmaceuticals, food supply, electronics, water
treatment, health, construction, and other necessities;
Lead agency: Department of Homeland Security.
Sector: Commercial facilities;
Description: Includes prominent commercial centers, office buildings,
sports stadiums, theme parks, and other sites where large numbers of
people congregate to pursue business activities, conduct personal
commercial transactions, or enjoy recreational pastimes;
Lead agency: Department of Homeland Security.
Sector: Dams;
Description: Comprises approximately 80,000 dam facilities, including
larger and nationally symbolic dams that are major components of other
critical infrastructures that provide electricity and water;
Lead agency: Department of Homeland Security.
Sector: Defense industrial base;
Description: Supplies the military with the means to protect the nation
by producing weapons, aircraft, and ships and providing essential
services, including information technology and supply and maintenance;
Lead agency: Department of Defense.
Sector: Drinking water and water treatment systems;
Description: Sanitizes the water supply with the use of about 170,000
public water systems. These systems depend on reservoirs, dams, wells,
treatment facilities, pumping stations, and transmission lines;
Lead agency: Environmental Protection Agency.
Sector: Emergency services;
Description: Saves lives and property from accidents and disaster. This
sector includes fire, rescue, emergency medical services, and law
enforcement organizations;
Lead agency: Department of Homeland Security.
Sector: Energy;
Description: Provides the electric power used by all sectors, including
critical infrastructures, and the refining, storage, and distribution
of oil and gas. The sector is divided into electricity and oil and
natural gas;
Lead agency: Department of Energy.
Sector: Food;
Description: Carries out the post-harvesting of the food supply,
including processing and retail sales;
Lead agency: Department of Agriculture and Department of Health and
Human Services.
Sector: Government;
Description: Ensures national security and freedom and administers key
public functions;
Lead agency: Department of Homeland Security.
Sector: Government facilities;
Description: Includes the buildings owned and leased by the federal
government for use by federal entities;
Lead agency: Department of Homeland Security.
Sector: Information technology and telecommunications;
Description: Provides communications and processes to meet the needs of
businesses and government;
Lead agency: Department of Homeland Security.
Sector: National monuments and icons;
Description: Includes key assets that are symbolically equated with
traditional American values and institutions or U.S. political and
economic power;
Lead agency: Department of the Interior.
Sector: Nuclear reactors, materials, and waste;
Description: Includes 104 commercial nuclear reactors; research and
test nuclear reactors; nuclear materials; and the transportation,
storage, and disposal of nuclear materials and waste;
Lead agency: Department of Homeland Security working with the Nuclear
Regulatory Agency and Department of Energy.
Sector: Postal and shipping;
Description: Delivers private and commercial letters, packages, and
bulk assets. The U.S. Postal Service and other carriers provide the
services of this sector;
Lead agency: Department of Homeland Security.
Sector: Public health and healthcare;
Description: Mitigates the risk of disasters and attacks and also
provides recovery assistance if an attack occurs. The sector consists
of health departments, clinics, and hospitals;
Lead agency: Department of Health and Human Services.
Sector: Transportation systems;
Description: Enables movement of people and assets that are vital to
our economy, mobility, and security with the use of aviation, ships,
rail, pipelines, highways, trucks, buses, and mass transit;
Lead agency: Department of Homeland Security in collaboration with the
Department of Transportation.
Source: GAO analysis based on the President's National Strategy
documents and HSPD-7.
[End of table]
Other federal agencies--HSPD-7 instructs all federal departments and
agencies to identify, prioritize, and coordinate the protection of
their own critical infrastructures in order to prevent, deter, and
mitigate the effects of attacks. In addition, this national policy
recognizes that certain other federal entities have special functions
related to critical infrastructure and key resources protection, such
as the Department of Justice's law enforcement function, the State
Department's foreign affairs function, and the Executive Office of the
President's Office of Science and Technology's research and development
policy-setting function.
The National Strategy to Secure Cyberspace Provides an Initial
Framework for Cybersecurity:
The National Strategy to Secure Cyberspace (cyberspace strategy), a
national policy issued in February 2003, provides a framework for both
organizing and prioritizing efforts to protect our nation's cyberspace.
It also provides direction to federal departments and agencies that
have roles in cyberspace security and identifies steps that state and
local governments, private companies and organizations, and individual
Americans can take to improve our collective cybersecurity. In
addition, the cyberspace strategy identifies DHS as the central
coordinator for cyberspace security efforts. As such, DHS is
responsible for coordinating and working with other federal and
nonfederal entities that are involved in cybersecurity.
The cyberspace strategy is organized according to five national
priorities, and it identifies major actions and initiatives for each.
The five priorities are (1) providing national cyber analysis, warning,
and incident response; (2) reducing cyberspace threats and
vulnerabilities; (3) promoting awareness and training; (4) securing
governments' cyberspace; and (5) strengthening national security and
international cyberspace security cooperation.
DHS Has 13 Key Cybersecurity Responsibilities:
Among the many CIP roles and responsibilities established for DHS
identified in federal law and policy are 13 key cybersecurity-related
responsibilities. These include general CIP responsibilities that have
a cyber element (such as developing national plans, building
partnerships, and improving information sharing) as well as
responsibilities that relate to the five priorities established by the
cyberspace strategy. Table 6 provides a description of each
responsibility.
Table 6: Thirteen DHS Cybersecurity Responsibilities:
DHS cybersecurity responsibilities: General CIP responsibilities with a
cyber element: Develop a national plan for critical infrastructure
protection that includes cybersecurity;
Description: Developing a comprehensive national plan for securing the
key resources and critical infrastructure of the United States,
including information technology and telecommunications systems
(including satellites) and the physical and technological assets that
support such systems. This plan is to outline national strategies,
activities, and milestones for protecting critical infrastructures.
DHS cybersecurity responsibilities: General CIP responsibilities with a
cyber element: Develop partnerships and coordinate with other federal
agencies, state and local governments, and the private sector;
Description: Fostering and developing public/private partnerships with
and among other federal agencies, state and local governments, the
private sector, and others. DHS is to serve as the "focal point for the
security of cyberspace.".
DHS cybersecurity responsibilities: General CIP responsibilities with a
cyber element: Improve and enhance public/private information sharing
involving cyber attacks, threats, and vulnerabilities;
Description: Improving and enhancing information sharing with and among
other federal agencies, state and local governments, the private
sector, and others through improved partnerships and collaboration,
including encouraging information sharing and analysis mechanisms. DHS
is to improve sharing of information on cyber attacks, threats, and
vulnerabilities.
DHS cybersecurity responsibilities: Responsibilities related to the
cyberspace strategy's five priorities: Develop and enhance national
cyber analysis and warning capabilities;
Description: Providing cyber analysis and warnings, enhancing
analytical capabilities, and developing a national indications and
warnings architecture to identify precursors to attacks.
DHS cybersecurity responsibilities: Responsibilities related to the
cyberspace strategy's five priorities: Provide and coordinate incident
response and recovery planning efforts;
Description: Providing crisis management in response to threats to or
attacks on critical information systems. This entails coordinating
efforts for incident response, recovery planning, exercising
cybersecurity continuity plans for federal systems, planning for
recovery of Internet functions, and assisting infrastructure
stakeholders with cyber- related emergency recovery plans.
DHS cybersecurity responsibilities: Responsibilities related to the
cyberspace strategy's five priorities: Identify and assess cyber
threats and vulnerabilities;
Description: Leading efforts by the public and private sector to
conduct a national cyber threat assessment, to conduct or facilitate
vulnerability assessments of sectors, and to identify cross-sector
interdependencies.
DHS cybersecurity responsibilities: General CIP responsibilities with a
cyber element: Support efforts to reduce cyber threats and
vulnerabilities;
Description: Leading and supporting efforts by the public and private
sector to reduce threats and vulnerabilities. Threat reduction involves
working with the law enforcement community to investigate and prosecute
cyberspace threats. Vulnerability reduction involves identifying and
remediating vulnerabilities in existing software and systems.
DHS cybersecurity responsibilities: General CIP responsibilities with a
cyber element: Promote and support research and development efforts to
strengthen cyberspace security;
Description: Collaborating and coordinating with members of academia,
industry, and government to optimize cybersecurity related research and
development efforts to reduce vulnerabilities through the adoption of
more secure technologies.
DHS cybersecurity responsibilities: General CIP responsibilities with a
cyber element: Promote awareness and outreach;
Description: Establishing a comprehensive national awareness program to
promote efforts to strengthen cybersecurity throughout government and
the private sector, including the home user.
DHS cybersecurity responsibilities: General CIP responsibilities with a
cyber element: Foster training and certification;
Description: Improving cybersecurity-related education, training, and
certification opportunities.
DHS cybersecurity responsibilities: General CIP responsibilities with a
cyber element: Enhance federal, state, and local government
cybersecurity;
Description: Partnering with federal, state, and local governments in
efforts to strengthen the cybersecurity of the nation's critical
information infrastructure to assist in the deterrence, prevention,
preemption of, and response to terrorist attacks against the United
States.
DHS cybersecurity responsibilities: General CIP responsibilities with a
cyber element: Strengthen international cyberspace security;
Description: Working in conjunction with other federal agencies,
international organizations, and industry in efforts to promote
strengthened cybersecurity on a global basis.
DHS cybersecurity responsibilities: General CIP responsibilities with a
cyber element: Integrate cybersecurity with national security;
Description: Coordinating and integrating applicable national
preparedness goals with its National Infrastructure Protection Plan.
Source: GAO analysis of the Homeland Security Act of 2002, the Homeland
Security Presidential Directive-7, and the National Strategy to Secure
Cyberspace.
[End of table]
DHS Has Established an Organizational Structure to Fulfill Its
Cybersecurity Requirements:
In June 2003, DHS established the National Cyber Security Division
(NCSD), under its Information Analysis and Infrastructure Protection
Directorate, to serve as a national focal point for addressing
cybersecurity issues and to coordinate implementation of the
cybersecurity strategy. NCSD also serves as the government lead on a
public/private partnership supporting the U.S. Computer Emergency
Response Team (US-CERT) and as the lead for federal government incident
response.
NCSD is headed by the Office of the Director and includes a
cybersecurity partnership program as well as four branches: US-CERT
Operations, Law Enforcement and Intelligence, Outreach and Awareness,
and Strategic Initiatives. Table 7 displays the NCSD organization chart
and the major functions of each organization; it is followed by a brief
description of each organization's roles and responsibilities.
Figure 2: NCSD Organization Chart:
[See PDF for image]
[End of figure]
NCSD/US-CERT Director:
The NCSD/US-CERT Director is responsible for issues related to the
operation of the NCSD, such as human resources, policy, and budget, as
well as international coordination efforts. The director is responsible
for managing US-CERT--which is a partnership between NCSD and the
public and private sectors to make cybersecurity a coordinated,
national effort; increase public awareness of cyber threats and
vulnerabilities; and improve computer security preparedness and
response to cyber threats.
DHS Cyber Security Partnership Program:
This program is to foster effective public/private partnership among
and between industry, government, and academia. It is intended to
facilitate and leverage stakeholder collaboration to drive measurable
progress in addressing cybersecurity issues and mitigating cyber
vulnerabilities. Under the auspices of the partnership program, DHS
works jointly with software developers, academic institutions,
researchers, and communities of interest--including the information
sharing and analysis centers (ISAC)--as well as with DHS's federal,
state, local, and international government counterparts.
US-CERT Operations Branch:
NCSD's US-CERT Operations branch focuses on situational awareness,
analytical cells, and federal coordination. It is to provide
capabilities to US-CERT and coordinate all cyber incident warnings and
responses across both the government and the private sector through US-
CERT. A key component of US-CERT is the National Cyber Security
Response System (Response System), which provides a nationwide, real-
time collaborative information-sharing network to enable communication
and collaboration among DHS and federal, state, local, and
international government and law enforcement entities. Components of
the Response System include the following:
* The US-CERT Operations Center serves as a 24-hour-a-day/7-day-a-week,
real-time focal point for cybersecurity, conducting daily conference
calls with U.S.-based watch and warning centers to share classified and
unclassified security information.
* The US-CERT Portal provides a Web-based collaborative system that
allows US-CERT to share sensitive cyber-related information with
members of government and industry.
* The US-CERT Control Systems Security Center serves as an operational
and strategic component of US-CERT's capability to address the complex
security issues associated with the use of control systems.
* The US-CERT public Web site provides government, the private sector,
and the public with information they need to improve their ability to
protect their information systems and infrastructures.
* The National Cyber Alert System is to deliver targeted, timely, and
actionable information to Americans to allow them to secure their
computer systems.
* The National Cyber Response Coordination Group brings together
officials from federal agencies to coordinate public/private cyber
preparedness and incident response.[Footnote 14]
* The Government Forum of Incident Response and Security Teams is a
community of government response teams that are responsible for
securing government information technology systems. This forum works to
understand and handle computer security incidents and to encourage
proactive and preventative security practices.
Law Enforcement and Intelligence Branch:
The Law Enforcement and Intelligence branch of NCSD has two primary
responsibilities: managing the National Cyber Response Coordinating
Group and facilitating the coordination of law enforcement and
intelligence cyber-related efforts for NCSD. This branch provides a
mechanism for information sharing among the components concerned with
cyber issues of law enforcement, intelligence, and the private sector.
This information sharing includes all levels of information
(classified, law enforcement sensitive, and unclassified). The branch
coordinates clearing classified information of its sensitive content
and shares it with private sector partners.
Outreach and Awareness Branch:
NCSD's Outreach and Awareness branch is responsible for outreach,
awareness, and messaging. The branch promotes cybersecurity awareness
among the general public and within key communities, maintains
relationships with governmental cybersecurity professionals to
coordinate and share information about cybersecurity initiatives, and
develops partnerships to promote public/private coordination and
collaboration on cybersecurity issues.
The branch is organized into three functional areas: Stakeholder
Outreach, Communications and Messaging, and Coordination. The
Stakeholder Outreach team serves to build and maintain relationships
among and between industry, government, and academia in order to raise
cybersecurity awareness and secure cyberspace. The Communications and
Messaging team focuses on coordination of internal and external
communications. The Coordination team works to ensure collaboration on
events and activities across NCSD and with other DHS entities,
including the public affairs, legislative affairs, and private-sector
offices and others, as appropriate. In addition, the team works to
foster the department's role as a focal point and coordinator for
securing cyberspace and implementing the National Strategy to Secure
Cyberspace.
Strategic Initiatives Branch:
NCSD's Strategic Initiatives branch is organized into six teams with
different responsibilities, as follows:
* The CIP Cybersecurity team is jointly responsible (with DHS's
National Communications System) for developing a CIP plan for the
Information Technology (IT) Sector, including the Internet, that will
identify critical assets and vulnerabilities, map interdependencies,
and promote cyber awareness throughout other federal sector plans.
* The Control Systems team is responsible for facilitating control
system incident management and security awareness, establishing an
assessment capability for vulnerability reduction and incident
response, creating a self-sustaining security culture within the
control systems community, focusing attention on the protection of
legacy control systems, and making strategic recommendations for the
future of control systems and security products.
* The Software Assurance initiative presents a framework for promoting
and coordinating efforts to improve the security, reliability, and
safety of software.
* The Training and Education team is responsible for promoting the
development of an adequate number of effective cybersecurity
professionals, enhancing cybersecurity capability within the federal
workforce by identifying the skills and abilities necessary for
specific job tasks, and working with other organizations to develop
content standards for training products and for certifications.
* The Exercise Plans and Programs team is charged with improving the
nation's ability to respond to cyber incidents by creating, sponsoring,
and learning from international, national, regional, and interagency
exercises. The team is responsible for planning and coordinating
cybersecurity exercises with internal and external DHS stakeholders.
* The Standards and Best Practices/Research and Development
Coordination team works to encourage technology innovation efforts. The
team is responsible for identifying cybersecurity research and
development requirements and cybersecurity standards issues and for
assembling and distributing information on best practices.
NCSD Collaborates with Other DHS Entities to Accomplish Its Mission:
DHS has additional directorates, branches, and offices with CIP
responsibilities. In its role as the cybersecurity focal point, NCSD
collaborates with these other DHS entities, including the
Infrastructure Coordination Division, which runs the Protected Critical
Infrastructure Information program to encourage sharing of sensitive
information (including cybersecurity-related information), and the
National Communications System, a federal interagency group, which is
responsible for, among other things, improving the effectiveness of the
management and use of national telecommunications resources to support
the federal government during emergencies. In appendix II, we discuss
other DHS entities with responsibilities for CIP-related activities
that impact cybersecurity.
DHS Has Initiated Efforts That Begin to Address Its Responsibilities,
but More Work Remains:
DHS has initiated efforts that begin to address each of its 13 key
responsibilities for cybersecurity; however, the extent of progress
varies among these responsibilities, and more work remains to be done
on each. For example, DHS (1) has recently issued an interim plan for
infrastructure protection that includes cybersecurity plans, (2) is
supporting a national cyber analysis and warning capability through its
role in US-CERT, and (3) has established forums to build greater trust
and to encourage information sharing among federal officials with
information security responsibilities and among various law enforcement
entities. However, DHS has not yet developed national cyber threat and
vulnerability assessments or developed and exercised government and
government/industry contingency recovery plans for cybersecurity,
including a plan for recovering key Internet functions. The department
also continues to have difficulties in developing partnerships, as
called for in federal policy, with other federal agencies, state and
local governments, and the private sector. Without such partnerships,
it is difficult to develop the trusted, two-way information sharing
that is essential to improving homeland security.
We discuss below the steps that DHS has taken related to each of the
department's 13 key responsibilities and the steps that remain.
DHS Recently Issued National Plan For Improving Critical Infrastructure
Protection That Includes Cybersecurity, but This Plan Is Not Yet
Comprehensive and Complete:
In February 2005, DHS issued a national plan for critical
infrastructure protection that includes cybersecurity-related
initiatives. This plan, the Interim National Infrastructure Protection
Plan (Interim NIPP), addresses many of the requirements identified in
federal law and policy, but it does not yet comprise a comprehensive
and complete plan.
Specifically, the Interim NIPP provides a strategy for protecting
critical infrastructures by integrating physical security and
cybersecurity in its goals, objectives, and planned actions. Key
actions include developing and implementing sector-specific and cross-
sector protection plans; conducting cross-sector interdependency
analysis; conducting and updating vulnerability assessments at the
asset, sector, and cross-sector levels; and establishing performance
metrics. In addition, the Interim NIPP establishes a national
organizational structure to provide effective partnerships,
communications, and coordination between DHS and infrastructure
stakeholders.
However, the plan does not yet comprise the comprehensive national plan
envisioned in federal law and policy, for several reasons, including
the following.
* The Interim NIPP lacks sector-specific cybersecurity plans. This plan
does not yet include detailed plans for addressing cybersecurity in the
infrastructure sectors. Agency officials acknowledge that many of the
detailed plans for addressing cybersecurity will be included in the
sector-specific annexes that are to be provided in the next version of
the plan. To ensure that cybersecurity will be appropriately and
consistently addressed in the next version of the plan, NCSD has
provided guidance to sector-specific agencies regarding the inclusion
of cybersecurity issues in their respective sector-specific plans. In
addition, NCSD continues to review and provide feedback on the sector-
specific plans, which will become annexes to the next NIPP.
* The Interim NIPP is not yet a final plan. The development of this
plan is an ongoing, evolving process that requires the participation of
key stakeholders, including other federal agencies, state and local
governments, the private sector, foreign countries, and international
organizations. DHS expects to obtain and incorporate stakeholder
comments and to issue a more complete NIPP in November 2005.
* The Interim NIPP lacks required milestones. Specifically, this plan
does not include any national-level milestones for completing efforts
to enhance the security of the nation's critical infrastructures.
According to a DHS official, these milestones will be incorporated in
the sector-specific plans.
DHS acknowledges the need to address these issues with the Interim NIPP
and plans to do so in subsequent versions. According to DHS officials,
as the NIPP evolves and as the sector-specific plans are developed, the
level of specificity will increase to include key initiatives and
milestones.
DHS Has Taken Positive Steps Toward Building Partnerships and Improving
Information Sharing, but Additional Work Is Needed:
DHS has undertaken numerous initiatives to foster partnerships and
enhance information sharing with other federal agencies, state and
local governments, and the private sector about cyber attacks, threats,
and vulnerabilities; but more work is needed to address underlying
barriers to sharing information.
DHS and NCSD have multiple initiatives under way to enhance
partnerships and information sharing. Descriptions of selected
initiatives are provided in table 7.
Table 7: DHS Partnership and Information-Sharing Initiatives:
Initiative: National Cyber Response and Coordination Group;
Description:
* Facilitates coordination of intragovernmental and public/private
preparedness and operations in order to respond to and recover from
incidents that have significant cyber consequences;
* Brings together officials from national security, law enforcement,
defense, intelligence, and other government agencies that maintain
significant cybersecurity responsibilities and capabilities.
Initiative: National Cyber Security Response System;
Description:
* Provides a nationwide, real-time, collaborative information-sharing
network that enables state and local government officials, federal
agencies, the private sector, international counterparts, and law
enforcement entities to communicate and collaborate with DHS and each
other about cyber issues;
* Includes a number of different mechanisms for sharing information
between and among federal and nonfederal entities, including the US-
CERT operations center, the US-CERT portal, the US-CERT Control Systems
Security Center, the US-CERT public Web site, and the National Cyber
Alert System.
Initiative: Expanded use of Cyber Warning Information Network;
Description:
* Expands DHS's use of the Cyber Warning Information Network, a private
communications network (voice and data) with no logical dependency on
the Internet or the public switched network in order to provide a
backup mechanism for information sharing.
Initiative: Government Forum of Incident Response and Security Teams;
Description:
* Brings together technical and tactical practitioners from government
agency security response teams. Forum members work together to
understand and handle computer security incidents reported by federal
agencies and to encourage proactive and preventative security
practices;
* Shares specific technical details regarding incidents within a
trusted U.S. government environment on an agency-to- peer level.
Initiative: Chief Information Security Officers Forum;
Description:
* Brings together federal officials responsible for the information
security of their respective agencies and provides a trusted venue for
them to collaborate; leverage each other's experiences, capabilities
and programs, and lessons learned; and address and discuss particularly
problematic or challenging areas.
Initiative: DHS Cyber Security Partnership Program;
Description:
* Develops and enhances strategic partnerships with 32 industry
associations and hundreds of small, medium, and large enterprises,
establishing an outreach channel of over 1 million constituents;
* Facilitates improved information sharing, including the interchange
of lessons learned and best practices.
Initiative: ISAC partnerships;
Description:
* Enhances partnerships with the ISACs--including the ISACs for
electricity, telecommunications, and states, and with information
technology vendors. DHS officials reported that all of the critical
infrastructure sectors' ISACs are part of the US-CERT portal and that
they participate in information sharing exercises--including regularly
scheduled daily or biweekly meetings.
Initiative: US-CERT Control Systems Security Center Outreach;
Description:
* Fosters public/private collaboration to improve the security of
critical infrastructure control systems. NCSD reports that it has
established relationships with more than 25 potential partners for
future participation in the center.
Initiative: Internal DHS collaboration;
Description:
* Entails NCSD collaborating with the Protected Critical Infrastructure
Information program office to establish procedures for the private
sector to electronically submit critical infrastructure information.
These offices have developed a process for companies and other entities
to use to facilitate sharing protected information on a continual
basis.
Source: GAO analysis based on DHS information.
[End of table]
Although NCSD has taken steps to develop partnerships and information-
sharing mechanisms, the organization has not effectively leveraged its
partnerships to increase the sharing of information. For example,
although the Multi-State ISAC and US-CERT have established an effective
working relationship, according to officials from both organizations,
their ability to share classified information has been hindered by ISAC
members' lack of security clearances. Further, DHS officials reported
that only limited information has been shared by the private sector
under the Protected Critical Infrastructure Information
program[Footnote 15] because of private sector concerns about what
information DHS would share with other federal agencies.
Additionally, key stakeholders in NCSD partnerships have expressed
concerns about information sharing. For example, while officials from
several CIP-related federal agencies found the Chief Information
Security Officers forum to be valuable, officials from one agency
stated that it had been largely ineffective in improving communications
among federal agencies. Regarding NCSD's efforts with the private
sector, one ISAC reported publicly that its information sharing with
DHS was disintegrating. Further, a representative from that ISAC stated
that DHS had abruptly stopped sending notices to ISAC managers and no
longer called the ISAC about new terrorism activity. Further, an ISAC
official stated that when the ISAC recently contacted DHS's Homeland
Security Operations Center about rumors of a dirty bomb during a
national event, ISAC officials were told to obtain the information from
the media.
Issues related to the development of partnerships and of appropriate
information-sharing relationships are not new. In July 2004, we
recommended actions to improve the effectiveness of DHS's information-
sharing efforts.[Footnote 16] We recommended that officials within the
Information Analysis and Infrastructure Protection Directorate (1)
proceed with and establish milestones for developing an information-
sharing plan and (2) develop appropriate DHS policies and procedures
for interacting with ISACs, sector coordinators (groups or individuals
designated to represent their respective infrastructure sectors' CIP
activities), and sector-specific agencies and for coordination and
information sharing within the Information Analysis and Infrastructure
Protection Directorate and other DHS components. Moreover, we recently
designated establishing appropriate and effective information-sharing
mechanisms to improve homeland security as a new high-risk
area.[Footnote 17] We reported that the ability to share security-
related information can unify the efforts of federal, state, and local
government agencies and the private sector in preventing or minimizing
terrorist attacks.
In its strategic plan for cybersecurity, DHS acknowledges the need to
build better partnerships and information-sharing relationships. Among
the actions that DHS identified are enhancing the US-CERT Operations
Center's capabilities and increasing participation in information-
sharing mechanisms such as the National Cyber Alert System. For the
nonfederal sector, DHS's strategic plan for cybersecurity includes
actions to develop effective public/private partnerships through
associations, ISACs, Internet service providers, and improved
international partnerships. For federal agency information security,
the strategic plan identifies efforts to improve government mechanisms,
such as the National Cyber Response Coordination Group and the
Government Forum of Incident Response and Security Teams. In addition,
the Interim NIPP acknowledges as a goal, the importance of building
partnerships among stakeholders to implement critical infrastructure
protection programs and identifies related objectives, including
establishing mechanisms for coordination and information exchange among
partners.
DHS Provides National Cyber Analysis and Warning Capabilities but Has
Not Yet Developed an Architecture to Support Strategic Capabilities,
and Analytical Tools Require Further Maturity:
DHS has collaborated on, developed, and is working to enhance tools and
communication mechanisms for providing analysis and warning of
occurring and potential cyber incidents, but it has not yet developed
the indications and warning architecture required by HSPD-7, and
important analytical tools are not yet mature.
Through NCSD's involvement in US-CERT, DHS provides cyber analysis and
warning capabilities by providing continuous operational support in
monitoring the status of systems and networks. When a new vulnerability
or exploit is identified, US-CERT evaluates its severity; determines
what actions should be taken and what message should be disseminated;
and provides information through NCSD's multiple communications
channels, including its daily telephone call with other U.S.-based
watch and warning centers, the US-CERT portal, the US-CERT public Web
site, and the National Cyber Alert System. It produces the following
types of warnings:
* Technical cybersecurity alerts--provide real-time information about
current security issues, vulnerabilities, and exploits.
* Cybersecurity bulletins--provide technical audiences with weekly
summaries of security issues and new vulnerabilities.
* Cybersecurity alerts--provide nontechnical audiences with real-time
information about current issues, vulnerabilities, and exploits and
include steps and actions that nontechnical users can take.
* Cybersecurity tips--describe common security issues and offer advice
for nontechnical users.
* Vulnerability notes--provide warnings about vulnerabilities that do
not meet the severity threshold required to issue an alert.
Additionally, when a situation warrants direct contact with a federal
agency, an infrastructure sector, or a nonfederal entity, NCSD contacts
the entity and provides relevant information prior to making public
announcements about the situation. This includes collaborating with
relevant software vendors on a particular vulnerability or exploit.
DHS is also involved in several initiatives to enhance cyber analytical
capabilities. Key initiatives are identified in table 8.
Table 8: DHS Initiatives to Enhance Analytical Capabilities:
Initiative: Intelligence sharing;
Description: US-CERT serves as a conduit for sharing information from
the intelligence and law enforcement communities to the civilian
federal and nonfederal communities. According to an NCSD official, its
law enforcement and intelligence branch works to share declassified
information about threats, malicious activities, or vulnerabilities
with US-CERT members. In addition, US-CERT can share information with
the law enforcement and intelligence communities that might not reach
these groups by other means.
Initiative: Situational awareness tools;
Description: NCSD's US-CERT Einstein Program, which is currently in
pilot testing at the Department of Transportation, is to obtain network
flow data from federal agencies and analyze the traffic patterns and
behavior. This information is to be combined with other relevant data
to (1) detect potential deviations and identify how Internet activities
are likely to affect federal agencies and (2) provide insight into the
health of the Internet and suspicious activities.
Initiative: Malicious Code Analysis Program;
Description: This program includes (1) a laboratory for analyzing
malicious code and developing countermeasures and (2) a common
vulnerabilities and exposures dictionary system to correlate
information across vendor products.
Initiative: Cyber-incident repository;
Description: NCSD officials are collaborating with multiple partners
(including the Department of Defense, the intelligence community, law
enforcement, academia, private industry, and the public) to develop a
repository for cyber-related intelligence data.
Source: GAO analysis based on DHS information.
[End of table]
Despite its progress in providing analysis and warning capabilities,
DHS has not yet developed or deployed a national indications and
warning architecture for infrastructure protection that would identify
the precursors to a cyber attack, and NCSD's analytical capabilities
are still evolving and are not yet robust. For example, the US-CERT
Einstein program, identified in table 8, is in the early stages of
deployment and is currently being pilot tested at one agency. In
addition, NCSD officials acknowledge that the program's current
analytical capabilities are not expected to provide national-level
indicators and precursors to a cyber attack, as called for in HSPD-7's
requirement that DHS provide an indications and warning architecture.
DHS is still facing the same challenges in developing strategic
analysis and warning capabilities that we reported on 4 years ago
during a review of NCSD's predecessor, the National Infrastructure
Protection Center. In 2001, we reported on the analysis and warnings
efforts within the center and identified several challenges that were
impeding development of an effective strategic analysis and warning
capability.[Footnote 18] We reported that a generally accepted
methodology for analyzing strategic cyber-based threats did not exist.
Specifically, there was no standard terminology, no standard set of
factors to consider, and no established thresholds for determining the
sophistication of attack techniques. We also reported that the Center
did not have the industry-specific data on factors such as critical
systems components, known vulnerabilities, and interdependencies.
We therefore recommended that the responsible executive-branch
officials and agencies establish a capability for strategic analysis of
computer-based threats, including developing a methodology, acquiring
expertise, and obtaining infrastructure data. However, officials have
taken little action to establish this capability, and therefore our
recommendations remain open today.
In its strategic plan for cybersecurity, DHS acknowledges that it has
more to do to enhance its analytical capability and to leverage
existing capabilities. Specifically, it establishes objectives and
activities to:
* enhance the US-CERT Operations Center capability,
* expand the US-CERT Einstein Program pilot to a total of six agencies,
* promote consistency across federal civilian incident-response teams,
* develop a vulnerability assessment methodology and compile
vulnerability information, and:
* improve its coordinated cyber intelligence capability.
DHS Has Improved Its Ability to Coordinate Incident Response, but More
Recovery Planning and Exercises Are Needed:
DHS has improved its ability to coordinate a response to cyber attacks
with federal, state, and local governments and private-sector entities
through the communications capabilities that it has developed for US-
CERT, the continued expansion of backup communication capabilities, and
the establishment of collaboration mechanisms. However, DHS's plans and
exercises for recovering from attacks are not yet complete and
comprehensive.
As a partnership between DHS and the public and private sectors to make
cybersecurity a coordinated national effort, US-CERT is an essential
mechanism for coordinating information and activity on a real-time
basis. US-CERT's Operations Center, secure portal, public Web site, and
National Cyber Alert System not only provide means for disseminating
alerts and warnings--as discussed above--but they also support incident
response and recovery efforts.
Additionally, DHS is expanding its incident response and recovery
capabilities through the use of the Critical Infrastructure Warning
Information Network, a survivable communications network that does not
rely on public telecommunications networks or the Internet. DHS has
installed these network terminals in key government network operations
centers, in several private industry network operations centers, and in
the United Kingdom's National Infrastructure Security Coordination
Centre. In addition, it is considering placing additional network nodes
at critical government agencies, companies, and trusted foreign
partners.
Additional initiatives to expand incident response and recovery
capabilities, including mechanisms for collaboration, are identified in
table 9.
Table 9: Incident Response and Recovery Initiatives:
Initiative: National Cyber Response Coordination Group;
Description: The National Cyber Response Coordination Group was
formalized in the Cyber Annex of the National Response Plan and is
cochaired by NCSD, the Department of Justice's Computer Crime and
Intellectual Property Section, and the Department of Defense. In the
event of a significant incident (including cyber incidents and physical
incidents that affect cyber networks), this group would play a major
role in coordinating responses and recovery planning. Specifically, it
is expected to develop and provide a strategic assessment of the impact
on the information infrastructure and a coordinated response, through
its close association with others in private industry, academia, and
international and local governments; The National Cyber Response
Coordination Group brings together officials from all agencies that
have a statutory responsibility for cybersecurity and the sector-
specific agencies identified in HSPD-7. The group meets monthly and is
developing cyber preparedness and response plans that will help it
support the overarching mission of the DHS Interagency Incident
Management Group. To date, the group has conducted two exercises to
test its concept of operations and communications mechanisms and has
held a workshop to analyze the thresholds for convening the group.
Initiative: National Exercise Program Office;
Description: DHS established the National Exercise Program Office to
improve response planning and coordination between public and private
incident response and recovery capabilities by having them undertake
exercises; To date, NCSD has sponsored several exercises that test
cyber readiness in various geographic locations and critical
infrastructure sectors across the nation. In September and October
2004, regional exercises were held in Seattle and New Orleans. Both
exercises highlighted dependencies between cyber and physical
infrastructures and interdependencies among critical infrastructures.
These exercises also identified and tested the coordination and
cooperation among federal, state, and local governments and the private
sector that would be necessary in the case of attacks (both physical
and cyber) on the critical infrastructures in those regions of the
United States. According to NCSD officials, these regional exercises
have pointed out the importance of regional response capabilities and
have spurred activity in both regions to develop working groups to
improve response capabilities within those regions; NCSD, along with
DHS's Office of Domestic Preparedness, sponsored two cyber-focused
tabletop exercises[A] in Connecticut and New Jersey. According to NCSD
officials, these tabletop exercises offered an opportunity for key
state agencies, including information technology, emergency
preparedness, and law enforcement, to address cybersecurity issues and
increase coordination within their state governments as well as with
the federal government. In addition, NCSD prepared the cyber- related
portion for the Top Officials 3 exercise, referred to as TOPOFF 3, that
occurred in March and April 2005. This exercise tested not only
response to attacks, but also continuity of government and operations;
emergency response at the state, regional, and local levels; and
containment and mitigation of chemical, nuclear, and other attacks;
Further, according to NCSD officials, the NCSD Exercise Team is working
closely with the National Cyber Response Coordination Group to sponsor
a series of four tabletop exercises in fiscal year 2005 that are
intended to mature and refine the interagency body's Concept of
Operations and to accelerate the development of detailed procedures
under the Cyber Annex to the National Response Plan; The lessons
learned from these and other exercises will form the building blocks
for an NCSD-sponsored National Cyber Exercise, CYBER STORM, planned for
November 2005, which is expected to include private-sector, as well as
state government, participation.
Initiative: US-CERT Control Systems Security Center;
Description: NCSD established the US-CERT Control Systems Security
Center to reduce vulnerabilities and to respond to threats to control
systems. The center compiled a list of the control system technologies
in use, including the underlying platforms, so that the US-CERT could
rapidly identify the impact of cyber vulnerabilities on control
systems.
Initiative: Internet Disruption Working Group;
Description: In order to coordinate cybersecurity contingency plans,
including a plan for recovering key Internet functions, DHS formed the
Internet Disruption Working Group. Among other things, this group is to
determine the operational dependency of critical infrastructure sectors
on the Internet, assess the consequences of the loss of Internet
functionality, and work with stakeholders to identify and prioritize
short-term protective measures and reconstitution measures to be used
in the event of a major disruption.
Source: GAO analysis of DHS information.
[A] A tabletop exercise is a focused practice activity that places the
participants in a simulated situation requiring them to function in the
capacity that would be expected of them in a real event. Its purpose is
to promote preparedness by testing policies and plans and by training
personnel.
[End of table]
While DHS has made clear progress in planning for incident response,
key steps remain to be taken in order to fulfill requirements for
exercising continuity plans for federal systems and for coordinating
the development of government/industry contingency recovery plans for
cybersecurity--as recommended in the cyberspace strategy. Specifically,
DHS does not yet have plans (or associated performance measures or
milestones) for testing federal continuity plans, for recovering key
Internet functions, or for providing technical assistance to both
private-sector and other government entities as they develop their own
emergency recovery plans. Without continuity planning exercises,
federal agencies will not be able to coordinate efforts to ensure that
the critical functions provided by federal systems would continue
during a significant event and that recovery from such an event would
occur in an effective and timely manner. In addition, without plans to
address the recovery of key Internet functions, it is unclear how
recovery would be performed and how federal capabilities could be used
to assist with recovery.
In commenting on a draft of this report, NCSD officials stated that
although the division is not currently sponsoring any exercises to test
other department and agencies' continuity plans or plans for recovering
key Internet functions, they are participating in and offering
cybersecurity expertise to already existing department and agency
exercises that test continuity of operations and plans for recovery.
DHS Has Begun Efforts to Identify and Assess Threats and
Vulnerabilities, but Much Remains to Be Done to Complete These
Assessments:
DHS has participated in national efforts to identify and assess cyber
threats and has begun taking steps to facilitate sector-specific
vulnerability assessments, but it has not yet completed the
comprehensive cyber threat and vulnerability assessments--or the
identification of cross-sector interdependencies--that are called for
in the cyberspace strategy.
In late 2003 and early 2004, DHS assisted in coordinating the cyber-
related issues for the National Intelligence Estimate of Cyber Threats
to the U.S. Information Infrastructure. The resulting classified
document issued in February 2004 details actors (nation-states,
terrorist groups, organized criminal groups, hackers, etc.),
capabilities, and, where known, associated intent. National
intelligence estimates provide America's highest integrated national
threat assessment and are used throughout the defense, intelligence,
and homeland security communities.
Regarding ongoing threat identification, DHS's Infrastructure
Protection Office, Information Analysis Office, and NCSD coordinate
efforts on a daily basis. For example, NCSD works closely with the
Information Analysis Office to coordinate the exchange of threat
information, discussions of the potential threat to critical
infrastructures based on reported information, and the creation of
cyber-based intelligence requirements to gather additional information.
In addition, as discussed earlier, information is shared between the
private sector and the intelligence community through US- CERT.
According to NCSD officials, because there are restrictions on the
ability of some parts of the intelligence communities to collect
information within the United States, information properly shared
through US-CERT could help the intelligence community to develop better
situational awareness.
DHS has also taken a number of foundational steps toward developing the
comprehensive vulnerability assessment mandated by HSPD-7. Three key
initiatives are discussed below:
* Development of a Baseline Methodology for Vulnerability Assessment--
As the designated entity for fulfilling DHS's responsibility as the
sector-specific agency for the IT infrastructure sector, NCSD is
currently identifying the IT sector's critical assets and developing a
baseline methodology for performing vulnerability assessments within
the sector. To do so, NCSD is studying existing vulnerability
assessment methodologies with the idea of developing a flexible
baseline methodology that can be used by members of the IT sector who
do not yet have established methodologies. An NCSD official stated that
a secondary use for this methodology would be as baseline guidance for
cyber assessments across the other critical infrastructures, to be
carried out by the sector-specific agencies and their sectors.
* Development of a Cyber Assessment Template--NCSD is assisting DHS's
Information Analysis and Infrastructure Protection Directorate's
Protective Security Division by developing a cyber assessment template
for their "site assistance visits" to be used to assess the security of
critical infrastructure facilities. The cyber-related segment of these
visits includes an assessment of process control systems, including
supervisory control and data acquisition, and business information
technology. According to NCSD officials, they have developed the
process control template and are currently developing the business
information technology template.
* Development of Sector Guidance--As the subject matter expert for the
cyber aspects of the National Infrastructure Protection Plan and
associated sector-specific plans, NCSD has developed and distributed
guidance to assist sector-specific agencies in addressing the cyber
components of their sectors.
While NCSD's plans are focused on important issues, it has not yet
completed the national cyber threat assessment and the sector
vulnerability assessments--or the identification of cross-sector
interdependencies--that are called for in the cyberspace strategy.
Further, its assessment efforts are still in early stages. For example,
according to an NCSD official, efforts to develop a vulnerability
assessment methodology for the IT Sector are in early development. As
part of its next steps, NCSD plans to involve the private sector in
completing the methodology and then give a larger group of stakeholders
in the IT Sector an opportunity to review and comment on it. NCSD also
plans to assist the IT sector in conducting its cybersecurity-related
vulnerability assessment. Once these assessments are complete, NCSD
plans to coordinate a thorough analysis of the impact that
interdependencies have on sectors and entities within the sectors.
The Interim NIPP and DHS's strategic plan for cybersecurity acknowledge
that much remains to be done in the areas of threat and vulnerability
assessment. The Interim NIPP recognizes that DHS is responsible for
analyzing specific threats, providing threat warnings, and conducting
general threat assessments. It also reports that the Information
Analysis and Infrastructure Protection Directorate's Office of
Infrastructure Protection will conduct vulnerability assessments for a
number of purposes, including investigating interdependencies, filling
selected gaps, and testing new methodologies. Additionally, one of
NCSD's strategic goals is to work with the public and private sectors
to reduce vulnerabilities and to minimize the severity of cyber
attacks. As part of this goal, NCSD plans to define and execute
methodologies to identify critical assets and to identify and assess
vulnerabilities. It established a milestone of developing a
vulnerability assessment methodology for the IT Sector by the third
quarter of fiscal year 2005. However, neither DHS nor NCSD has defined
plans, performance measures, or milestones for completing the required
national cyber-related threat and sector vulnerability assessments, or
for identifying cross-sector interdependencies.
In commenting on a draft of this report, NCSD officials noted that
because of the IT sector's recent formation and its complexity, NCSD
has not set strict milestones or performance measures for completing
plans. NCSD officials noted, however, that milestones have been set for
(1) defining the sector, (2) creating a public/private collaboration
mechanism, and (3) developing methodologies for identifying assets and
vulnerability assessments. NCSD officials stated that these steps must
be fulfilled in order to ensure accurate assessments and to identify
cross-sector interdependences.
Performing infrastructure sector-level vulnerability assessments and
developing related remedial plans have been long-standing issues that
were identified as requirements in Presidential Decision Directive 63
in 1998. From a planning perspective, it is important to perform
comprehensive vulnerability assessments of all of our nation's critical
infrastructures because such assessments can enable authorities to
evaluate the potential effects of an attack on a given sector and then
invest accordingly to protect that sector. Without a vulnerability
assessment and remedial plan, it will be difficult to know with any
certainty that those vulnerabilities that could cause the greatest
harm--or are most likely to be exploited--have been addressed. In
September 2001, we reported that substantive, comprehensive analysis of
infrastructure sector vulnerabilities and the development of remedial
plans had not yet been performed because sector coordinators were still
establishing the necessary relationships, identifying critical assets
and entities, and researching and identifying appropriate
methodologies.[Footnote 19] In May 2004, we reported that some sectors
had taken steps to perform sector-wide vulnerability assessments or to
require individual entities to perform vulnerability assessments for
their facilities and operations.[Footnote 20] However, others--
including the IT sector--still have not taken such actions. Until a
comprehensive threat assessment and sector-specific vulnerability
assessments are completed and cross-sector dependencies are identified,
DHS cannot ensure that all threats and vulnerabilities have been
identified and addressed.
In commenting on a draft of this report, NCSD officials stated that
because of the IT sector's recent formation and its complexity, NCSD
and the sector face challenges in defining the sector, developing
effective partnerships, and identifying critical assets. The officials
also stated that significant progress has been made in developing
methodologies to identify assets and assess vulnerabilities in the IT
sector; however, continued collaborative efforts are necessary to
ensure that all threats and vulnerabilities are identified and
addressed.
DHS Has Several Threat and Vulnerability Reduction Efforts Under Way,
but More Action Is Needed:
DHS has initiated efforts to reduce threats by enhancing its
collaboration with the law enforcement community and to reduce
vulnerabilities by shoring up guidance on software and system security,
but much remains to be done.
To support efforts to reduce cyber threats, NCSD has restructured its
organization to improve its coordination with the law enforcement
community and has initiated numerous outreach initiatives.
Specifically, NCSD restructured its organization to establish a law
enforcement and intelligence branch. It currently has representatives
from the cyber components of five different agencies: the National
Security Agency, U.S. Immigration and Customs Enforcement, U.S. Secret
Service, Federal Bureau of Investigation, and Central Intelligence
Agency. This branch provides an information-sharing mechanism among the
intelligence, law enforcement, and network security communities. For
example, there have been at least two instances where the intelligence
community had discovered cyber-related issues that it wanted to report
to the public, but it was unable to do so because it would potentially
reveal sources and methods, according to an NCSD official. In those
cases, NCSD and the intelligence community collaborated to develop and
release a public alert that conveyed the threat without revealing
sensitive information. In addition, the law enforcement and
intelligence branch has provided information from the law enforcement
community to the intelligence community. For example, according to an
NCSD official, in August 2004, the organization received information
about a potential software vulnerability from a law enforcement partner
that it shared with the intelligence community.
Additionally, NSCD's law enforcement and intelligence branch has taken
steps to improve its domestic and international outreach efforts to
support threat reduction; and, according to an NCSD official, the
interaction and coordination among the branch and other agencies on
cyber-related issues have been effective. Key outreach initiatives
include the following:
* Within the federal government, NCSD's law enforcement and
intelligence branch has developed a relationship with other law
enforcement entities, including entities within the Departments of
Energy and Defense and the federal inspector general community.
* DHS supports the Cybercop Portal, which is a secure, internet-based
information-sharing mechanism that allows members of local, state, and
federal government law enforcement organizations to discuss issues
related to electronic/cyber crime and threat reduction. At the time of
our review, according to an NCSD official, there were over 6,000
members from the 50 states, most government agencies, and over 40
countries.
* According to an NCSD official, NCSD has entered into a partnership
with the Department of Justice's Bureau of Justice Statistics to
conduct a joint survey to study the amount and scope of cyber crime in
the United States. The survey will be distributed to 36,000 businesses,
including small businesses covering all critical infrastructure
sectors.
* NCSD is reviewing the possibility of enhancing the U.S. computer
crime statute (18 U.S.C. 1030). Specifically, according to NCSD
officials, it is trying to determine the effect of criminalizing the
development and possession (with criminal intent) of malicious computer
code, such a change would provide law enforcement with a proactive
mechanism to address certain cyber crimes. NCSD has entered into
preliminary discussions with the Department of Justice's Computer
Crimes and Intellectual Property Section and with other federal, state,
and local law enforcement agencies. In addition, NCSD has solicited
opinions from the private sector and from academia.
To reduce vulnerabilities, NCSD is encouraging the development of
better quality and more secure software. It has established a plan
targeting four areas: (1) people (including software developers and
users), (2) processes (including best practices and practical software
development guidelines), (3) software evaluation tools, and (4)
acquisition--creating software security improvements through
acquisition specifications and guidelines. To accomplish its plans,
NCSD has undertaken the following initiatives:
* NCSD has hosted and cohosted various forums and workshops that
focused on topics such as developing a common body of knowledge for
software assurance and improving the quality, reliability, and
dependability of software. For example:
* NCSD has hosted three workshops, with subject matter experts from
academia and the private sector, to begin the process of developing a
common body of knowledge on software assurance that could be used by
educators across the country to develop curricula for academic programs
in software engineering, information assurance, and various other
disciplines.
* DHS and the Department of Defense have cosponsored two Software
Assurance Forums to bring together representatives from industry,
government, and academia to address the challenges in software security
and quality.
* NCSD is inventorying existing software assurance-related efforts in
public and private industry to develop and publish practical guidance,
reference materials, and best practices for training software
developers.
* NCSD is conducting a software assurance security tools evaluation to
support and promote the development of technological advances in
software assurance. In coordination with the National Institute of
Science and Technology, NCSD has created a set of studies and
experiments to measure the effectiveness of various tools and classes
of tools.
* NCSD is working with the Department of Defense and other government
agencies to examine successful models and to develop and publish best
practices for acquisition language and evaluation. NCSD also is working
to develop and publish common or sample statement of work/procurement
language, which includes provisions on liability, for federal
acquisition managers.
* According to an NCSD official, the organization has also formed a
working group to address the issue of preventing a major disruption on
the Internet. The working group is composed of federal agencies with an
interest in preventing a major interruption on the Internet. These
agencies are the Department of the Treasury, the Department of Defense,
the National Communication System, and NCSD (including US-CERT and
CERT/CC). The working group has also tried to include key private-
sector individuals. The group's initiatives include efforts to (1)
create various scenarios for disruptions in order to determine whom to
work with to solve the problem, how to respond and what to do, and what
protective measures should be put in place; and (2) determine what
infrastructure sectors are functionally dependent on the Internet.
While NCSD has many efforts under way to coordinate threat reduction
activities, it is limited in what it can do on vulnerability reduction
until the cyber-related vulnerability assessments (discussed in the
previous section) are completed. Since DHS is now planning a
methodology for conducting vulnerability assessments, it will likely be
some time before stakeholders can conduct the assessments--and even
longer before they are able to develop a comprehensive plan for
reducing vulnerabilities.
In its strategic plan for cybersecurity, DHS acknowledges that there is
more to do to coordinate both threat and vulnerability reduction
efforts. Specifically, NCSD has established a strategic goal to
coordinate with the intelligence and law enforcement communities to
identify and reduce threats to cyberspace. As part of this goal, NCSD
identified a number of actions to improve the available information on
cyber incidents, publish the results of the planned cyber incident
survey, improve the Cybercop Portal, and reach out to other law
enforcement entities. Regarding vulnerability reduction, NCSD has
established a goal to reduce vulnerabilities and a list of action
items, including actions to improve the security within the IT
infrastructure sector; to address cybersecurity issues for control
systems; to improve software assurance efforts; and to promote
cybersecurity standards and best practices.
DHS Is Collaborating on Cybersecurity Research and Development, but a
Comprehensive Plan and Associated Milestones are Not Yet in Place:
DHS is collaborating with the Executive Office of the President's
Office of Science and Technology Policy and with many other federal
departments and agencies, including the Departments of Agriculture,
Commerce, Defense, and Energy, to develop a national research and
development plan for CIP, including cybersecurity. However, a complete
plan is not yet in place, and the milestones for key activities under
this plan have not yet been developed.
NCSD coordinates with DHS's Science and Technology Directorate to
develop (1) the Cyber Security Research and Development Portfolio and
(2) the CIP Portfolio that targets process control system security and
includes some research and development projects. Research programs
include efforts to develop operational analysis tools to enhance the
security of domain name systems, establish secure routing protocols,
and improve Internet security. In addition, NCSD participates in the
Critical Information Infrastructure Protection Interagency Working
Group, which is cochaired by the Executive Office of the President's
Office of Science and Technology Policy and DHS's Science and
Technology Directorate, to identify critical cyber research and
development requirements for inclusion in the federal research and
development effort. As part of this requirement identification process,
NCSD determines where the private sector has already done research and
development, in order to minimize overlap and wasted effort. An NCSD
official reports that requirements come from software developers and
from the agency's work with industry, academia, and other government
agencies.
Although DHS is working to identify cyber research requirements and to
support and coordinate cybersecurity-related research and development
projects, the working group cochaired by DHS and the Executive Office
of the President's Office of Science and Technology Policy that was
required to lead the effort to issue a national research and
development plan for CIP (including cybersecurity) has not yet
developed a comprehensive plan. Also, while the Interim NIPP
acknowledges the importance of research and development to a variety of
cybersecurity initiatives--including improving Internet security
protocols and developing a next generation security architecture
featuring autonomic, self-aware, and self-healing systems--it does not
identify goals or milestones associated with developing a prioritized
plan for these initiatives.
In commenting on a draft of this report, DHS Science and Technology
Directorate officials stated that the first public version of the
national research and development plan supporting CIP had recently been
released.[Footnote 21] They acknowledged, however, that this is a
baseline plan and does not include an investment plan and road map that
are to be added next year. In addition, these officials commented that
milestones have not yet been established because planning activities
are in progress.
DHS Has Made Progress in Implementing an Awareness and Outreach
Strategy, but More Remains to Be Done:
DHS has made progress in increasing cybersecurity awareness by
implementing numerous awareness and outreach initiatives, but the
effectiveness of its activities is unclear because many CIP
stakeholders are still uncertain of DHS's cybersecurity roles. Table 10
identifies key DHS awareness and outreach initiatives.
Table 10: DHS Cybersecurity Awareness and Outreach Initiatives:
Initiative: National Cyber Alert System;
Description: DHS established the National Cyber Alert System (NCAS) to
deliver targeted, timely, and actionable information to the public on
how to secure computer systems. Information provided by the alert
system is designed to be understandable by all computer users, both
technical and nontechnical. More than 270,000 users have subscribed to
the system and are receiving regular alerts and updates that enhance
their ability to prepare for, mitigate, and respond to adverse cyber
events. To date, NCAS has issued several alerts as well as "best
practices" and "how-to" guidance messages. In addition, its "cyber
tips" help to educate home users on basic security practices and
increase overall awareness.
Initiative: US-CERT public Web site;
Description: DHS manages the US- CERT public Web site, which provides
information on cyber incidents and cybersecurity. According to NCSD
officials, it receives about 3.5 million hits per month.
Initiative: National Cyber Security Awareness Month;
Description: DHS partnered with the public and private sector to
establish October as the National Cyber Security Awareness Month and
participated in activities to raise awareness of cybersecurity
nationwide.
Initiative: Webcasts;
Description: In partnership with the Multi-State ISAC, NCSD has hosted
a series of national Webcasts that examine critical and timely
cybersecurity issues. The Chair of the Multi-State ISAC stated that the
recent Webcasts have been viewed by over 3,000 individuals from nine
countries.
Initiative: National Cyber Security Alliance/StaySafeOnline Program;
Description: DHS, along with other federal and private sector
organizations, sponsors the National Cyber Security Alliance, a
public/private partnership to promote cybersecurity and safe behavior
online. It provides tools and resources through the StaySafeOnline
program, a Web site for home users, small businesses, and educational
institutions.
Initiative: Cybersecurity awareness brochures;
Description: NCSD is developing informational materials to promote
cybersecurity awareness, including brochures, fact sheets, and an
electronic newsletter.
Source: GAO analysis of DHS information.
[End of table]
Although DHS has an active awareness and outreach program under way,
more remains to be done to expand awareness of the department's roles,
responsibilities, and capabilities. Multiple CIP stakeholders have
reported that they were unaware of DHS's cybersecurity
responsibilities. For example, officials from one federal agency
indicated they have not independently interacted with NCSD about their
sector's cybersecurity efforts. In addition, at a recent regional
security exercise, state and local government officials were not clear
on DHS's role in cybersecurity. NCSD acknowledges that it has more to
do to expand awareness of its cybersecurity roles and capabilities and
to increase its outreach efforts. In its strategic plan for
cybersecurity, DHS has outlined goals, objectives, activities, and
milestones for improving in these areas.
DHS Has Made Progress in Its Efforts to Encourage Cybersecurity
Education but Lags in Developing Certification Standards:
DHS has initiated multiple efforts to improve the education of future
cybersecurity analysts, but much work remains to be done to develop
certification standards. Key DHS cyber education initiatives are listed
in table 11.
Table 11: Key Initiatives in Cybersecurity Education:
Initiative: National Centers of Academic Excellence in Information
Assurance;
Description: DHS and the National Security Agency cosponsor the
National Centers of Academic Excellence in Information Assurance
Program to reduce vulnerabilities in our national information
infrastructure by promoting higher education in information assurance
and producing a growing number of professionals with information
assurance expertise in various disciplines. Under this program, 4-year
colleges and graduate-level universities are eligible to apply to be
designated as a National Center of Academic Excellence in Information
Assurance Education. Colleges and universities that achieve this
designation receive formal recognition from the U.S. government and are
eligible to apply for scholarships and grants through the Department of
Defense Information Assurance Scholarship Program and the Federal Cyber
Service Scholarship for Service Program.
Initiative: Scholarship for Service program;
Description: DHS and the National Science Foundation cosponsor the
Scholarship for Service program, which is also known as the Cyber Corps
program. This program provides scholarship grant money to selected
universities to fund the final 2 years of student bachelors, masters,
or doctoral study in information assurance.
Initiative: Job Fair;
Description: In January 2005, DHS, the National Science Foundation, the
federal Chief Information Officers Council, and the Office of Personnel
Management cosponsored the first annual winter job fair for Scholarship
for Service students in Washington, D.C. Approximately 300 students
attended the job fair, representing all 26 of the colleges and
universities within the Scholarship for Service program. Twenty-nine
federal agencies and national laboratories, including DHS's Information
Analysis and Infrastructure Protection Directorate and the Office of
the Chief Information Officer, the Central Intelligence Agency, the
Department of Agriculture, the National Aeronautics and Space
Administration, and the Idaho National Engineering and Environmental
Laboratory, attended the job fair and interviewed students.
Source: GAO analysis of DHS information.
[End of table]
While DHS has made progress in expanding education and training in
cybersecurity, it has more to do to develop baseline standards for
cybersecurity certification. According to NCSD's progress report, each
cyber-related industry certification currently is based on a different
notion of what tasks information assurance employees perform. This
leads to confusion on the part of employers when they attempt to assess
what skill set they are getting when they hire a certified
professional. DHS acknowledges this issue and has begun to take steps
to address it. Specifically, DHS has partnered with the Department of
Defense on an initiative to create a national-level job task analysis
and information assurance professional skill standards. The job task
analysis and skill standards are expected to identify the knowledge,
skills, and abilities associated with information assurance jobs across
all sectors, and to provide a clear baseline for comparing and
evaluating existing industry certifications and developing future
certifications. The final goal is to produce a job task analysis and
skill standard that reflects all sectors, is national in scope, and can
be used to compare existing professional certifications and provide for
future certifications.
In addition, in its strategic plan for cybersecurity, DHS identifies a
number of actions and milestones for making progress in cybersecurity
education, including promoting the creation of widely recognized,
industry-led, vendor-neutral cybersecurity professional certifications
based on a nationally recognized skill baseline.
DHS Interacts with Other Entities to Enhance Intergovernmental
Cybersecurity, but Concerns Exist about the Scope and Effectiveness of
These Efforts:
DHS supports multiple interagency groups' efforts to improve government
cybersecurity through communication and collaboration, but state and
local government stakeholders have expressed concerns about the scope
of these efforts.
DHS participates in numerous initiatives to enhance intergovernmental
coordination. Key initiatives are listed in table 12.
Table 12: DHS's Intergovernmental Cybersecurity Initiatives:
Initiative: Chief Information Security Officers Forum;
Description: NCSD created the Chief Information Security Officers Forum
to "bring together federal officials responsible for the information
security of their respective agencies" and provide a "trusted venue for
them to collaborate, leverage one another's experiences, capabilities
and programs, lessons learned, and address and discuss particularly
problematic or challenging areas." This forum has established working
groups to study and draft best practices for specific areas of concern,
such as patch management.
Initiative: National Cyber Response Coordination Group (NCRCG);
Description: The National Cyber Response Coordination Group was
formalized in the Cyber Annex of the National Response Plan and is
cochaired by NCSD, the Department of Justice's Computer Crime and
Intellectual Property Section, and the Department of Defense. It brings
together agency management for response purposes during a significant
national incident. The group coordinates intragovernmental and
public/private preparedness and response to and recovery from national
level cyber incidents and physical attacks that have significant cyber
consequences. During such an incident, the NCRCG's senior level
membership is responsible for ensuring that the full-range of federal
capabilities are deployed in a coordinated and effective fashion. NCRCG
includes members from national security, law enforcement, defense,
intelligence, and other government agencies.
Initiative: Government Forum of Incident Response and Security Teams
(GFIRST);
Description: GFIRST is a group of technical and tactical practitioners
of government agency security response teams responsible for securing
government information technology systems.
Initiative: Federal Information Notice;
Description: NCSD established Federal Information Notices to
disseminate information to relevant federal authorities, such as
federal chief information officers, federal chief information security
officers, information system security managers and officers, system
administrators, and other federal employees and contractors. The
notices are to help keep federal agencies and departments aware of
emerging threats and vulnerabilities, as well as to provide them with
the information needed to mitigate, respond to, and recover from cyber
attacks. DHS reports that the notices provide warnings of Internet
security problems and offer explanations of potential problems that
have not yet become serious enough to warrant public alert.
Initiative: Office of Management and Budget's Security Line of Business
Group;
Description: NCSD is the cochair of the Office of Management and
Budget's recently formed security line of business effort. It is an
effort to raise the level of cybersecurity posture of federal agencies
and save funds by coming up with common security solutions across the
government.
Initiative: Coordination with states;
Description: DHS interacts with state governments through the Multi-
State ISAC. Formed in 2003, this ISAC provides a central resource for
gathering information on cyber threats to critical infrastructure from
the states and providing two- way sharing of information between and
among the states and ultimately with local government. The Multi-State
ISAC also analyzes information and intelligence to support readiness
and response efforts by federal, state, and local first responders and
law enforcement. DHS, including NCSD, DHS's Office of State and Local
Government Coordination, and US- CERT, are included in this ISAC's
monthly conference calls. The ISAC also partners with NCSD on a
national Webcast for increased awareness and education. Multi-State
ISAC officials reported that DHS provides information that is useful
and actionable for the state government sector; In addition, NCSD
cosponsored a State of the State Conference with the National White
Collar Crime Center that brought together state cyber enforcement
officials to discuss (1) cyber activities in their respective states,
(2) successful and unsuccessful mechanisms used to address cyber
activities, and (3) ways that NCSD can assist states in their
cybersecurity activities.
Initiative: Incident support;
Description: DHS supports individual government entities, providing
resources and expertise during major incidents. For example, according
to NCSD officials, the organization recently provided direct support to
a state that had suffered a serious cybersecurity incident. NCSD's
support included sending a team of experts to provide on-site
resources, coordinating with federal law enforcement and intelligence
communities, and providing advice for security practice improvements.
In addition, NCSD officials stated that they had provided similar
support to federal agencies.
Source: GAO analysis of DHS information.
[End of table]
While DHS has made concerted efforts to form and support
intergovernmental partnerships, several governmental entities have
expressed concerns about the scope of these efforts and their
effectiveness. For example, officials representing a state government
organization noted that DHS has not provided adequate attention to the
states regarding cybersecurity and has not included local government IT
officials in cybersecurity-related discussions. State officials also
noted that DHS's focus on cybersecurity has been secondary to its
physical security efforts; for example, there have been only limited
grants to assist states with cybersecurity. As a result, these
representatives have reported that there is a "fundamental lack of
appreciation" for cybersecurity by state and local governments.
The Interim NIPP and DHS's strategic plan for cybersecurity acknowledge
the importance of continually enhancing the security of federal, state,
and local government systems through partnerships and information
sharing. For example, the Interim NIPP includes a goal to build
partnerships with federal, state, local, tribal, international, and
private-sector stakeholders to implement CIP programs. In addition,
DHS's strategic plan for cybersecurity establishes goals, objectives,
and actions that involve securing governments' cyberspace through
collaboration with key stakeholders in other federal, state, and local
governments and in the private sector.
DHS Has Initiated Efforts in the International Community, but More
Remains to Be Done:
DHS is working in conjunction with other governments to promote a
global culture of security but acknowledges that more remains to be
done to accomplish its goals.
In recent years, NCSD has participated with its international
counterparts in several initiatives to improve interaction and
coordination. Table 13 lists key international cybersecurity
initiatives, including multilateral and bilateral efforts.
Table 13: International Cybersecurity Initiatives:
Multilateral initiatives:
Cybersecurity Collaboration with Close Allies;
Description: NCSD established and chaired three international
information sharing conference calls with government cybersecurity
policymakers and emergency response operations representatives from
United States, United Kingdom, Australia, Canada, and New Zealand. The
purpose of these calls was to share information and to establish
cooperation to help participants prepare for and manage cyber incidents
globally, improve overall situational awareness, and foster
collaborative efforts on common strategic initiatives. According to
NCSD officials, these calls led to the five countries agreeing to
undertake a collaborative effort on cybersecurity/critical information
infrastructure protection.
Asia Pacific Economic Committee;
Description: NCSD actively participates in the Committee's
Telecommunications Working Group, which has engaged in (1) an outreach
program to educate member countries about computer emergency response
teams and (2) a capacity-building program to provide training to member
countries as they develop their own computer emergency response teams.
G-8 High Tech Crime Working Group;
Description: NCSD participates in the G-8 High Tech Crime Working
Group. For example, it sent representatives as part of the U.S.
delegation to the G-8 sponsored International Exercise in New Orleans
in May 2005.
Organization of American States;
Description: NCSD participates in the Organization of American States'
work program on cybersecurity, including a cybersecurity practitioners'
workshop that was held in March 2005. The program is working toward
building computer emergency response capabilities and an information
sharing and watch and warning framework in the hemisphere.
International Watch and Warning Framework/Multilateral Conference;
Description: NCSD developed and organized a multilateral conference in
Berlin, Germany, which was cohosted by DHS and the German Ministry of
Interior in October 2004. The conference brought together cybersecurity
policy, operations, and law enforcement representatives from 15
countries[A] to discuss vision, challenges, and watch and warning
models and to consider establishing an international watch and warning
framework. The conference included interactive discussions and a cyber
tabletop exercise, and resulted in a set of intermediate agreements for
information sharing and future work toward a more mature framework. As
a follow up, a working group of the participating countries met in
Paris in March 2005 to pursue the action plan from the conference and
to take steps to build an International Watch and Warning Network.
Bilateral initiatives:
Canada and Mexico;
Description: NCSD has partnered with counterpart agencies in Canada and
Mexico to launch new Cyber Security Working Groups to address critical
information infrastructure issues of mutual concern, under the CIP
Framework for Cooperation efforts with both Canada and Mexico, which
are known as the Smart Border Action Plan and Border Partnership Action
Plan, respectively.
US-India Cyber Security Forum;
Description: NCSD participates in the U.S.-India Cyber Security Forum,
established in 2002. In addition, the forum created a new Watch,
Warning, and Emergency Response Working Group to reflect collaboration
between US-CERT and the newly established CERT-India. According to NCSD
officials, the working group's action plan includes information-sharing
objectives to improve situational awareness and incident response
abilities between the United States and India, and to share experience
and expertise on computer emergency response.
U.S.-United Kingdom Joint Contact Group;
Description: NCSD participates in the U.S.-United Kingdom Joint Contact
Group, established between DHS and the United Kingdom's Home Office.
According to NCSD officials, its action plan for cybersecurity includes
information sharing and collaboration on watch and warning, threat
analysis, incident response, exercise, and outreach efforts.
Source: GAO analysis of DHS information.
[A] Participating countries included Australia, Canada, Finland,
France, Germany, Hungary, Italy, Japan, Netherlands, New Zealand,
Norway, Sweden, Switzerland, United Kingdom, and the United States.
[End of table]
While NCSD has initiated numerous outreach and coordination efforts
with the international community, important actions remain ahead. DHS's
strategic plan for cybersecurity includes two objectives related to
national security and international cyberspace security cooperation, to
(1) create and pursue an international strategy to secure cyberspace
and (2) promote collaboration, coordination, and information sharing
with international communities. In addition, NCSD's January 2005
progress report described plans to work with its counterparts in
Australia, Canada, New Zealand and the United Kingdom "to formulate a
framework for on-going policy and operational cooperation and
collaboration" that will "incorporate shared efforts on key strategic
issues to address cybersecurity over the long term, including software
assurance, research and development, attribution, control systems, and
others." This framework is expected to enhance the allies' current
information-sharing and incident-response efforts and to foster
collaboration in other international activities.
In commenting on a draft of this report, DHS Science and Technology
Directorate officials stated that the directorate had entered into
international agreements with Canada and the United Kingdom for
collaborative science and technology activities and had engaged in
bilateral meetings with those countries on the topic of cybersecurity
research and development.
NCSD Is Working to Integrate Cybersecurity with National Security, but
Important Testing Remains to Be Done:
DHS formed the National Cyber Response Coordination Group to coordinate
the federal response to cyber incidents of national significance. It is
a forum of national security, law enforcement, defense, intelligence,
and other government agencies that coordinates intragovernmental and
public/private preparedness and response to and recovery from national-
level cyber incidents and physical attacks that have significant cyber
consequences. During a significant national incident, the coordinating
group's senior level membership is responsible for ensuring that the
full range of federal capabilities are deployed in a coordinated and
effective fashion. However, at the time of our review, there had not
been a cyber incident of national significance to activate these
procedures, and, according to NCSD officials, early tests of this
coordination identified some lessons and showed the need to make
improvements. For example, officials learned that they need to improve
communication protocols and mechanisms.
DHS Continues to Face Challenges in Establishing Itself as a National
Focal Point for Cyberspace Security:
DHS faces a number of challenges that have impeded its ability to
fulfill its cyber CIP responsibilities. Key challenges include
achieving organizational stability; gaining organizational authority;
overcoming hiring and contracting issues; increasing awareness about
cybersecurity roles and capabilities; establishing effective
partnerships with stakeholders (other federal, state, and local
governments and the private sector); achieving two-way information
sharing with these stakeholders; and providing and demonstrating the
value DHS can provide.
Organizational stability: Over the last year, multiple senior DHS
cybersecurity officials--including the NCSD Director, the Deputy
Director responsible for Outreach and Awareness, and the Director of
the US-CERT Control Systems Security Center, the Under Secretary for
the Information Analysis and Infrastructure Protection Directorate and
the Assistant Secretary responsible for the Information Protection
Office--have left the department. Infrastructure sector officials
stated that the lack of stable leadership has diminished NCSD's ability
to maintain trusted relationships with its infrastructure partners and
has hindered its ability to adequately plan and execute activities.
According to one private-sector representative, the importance of
organizational stability in fostering strong partnerships cannot be
over emphasized.
Organizational authority: NCSD does not have the organizational
authority it needs to effectively serve as a national focal point for
cybersecurity. Accordingly, NCSD officials lack the authority to
represent and commit DHS to efforts with the private sector.
Infrastructure and cybersecurity officials, including the chairman of
the sector coordinators and representatives of the cybersecurity
industry, have expressed concern that the NCSD's relatively low
position within the DHS organization hinders its ability to accomplish
cybersecurity-related goals. NCSD's lack of authority has led to some
missteps, including DHS canceling an important cyber event without
explanation and taking almost a year to issue formal responses to
private sector recommendations resulting from selected National Cyber
Security Summit task forces--even though responses were drafted within
months.
A congressional subcommittee also expressed concern that DHS's
cybersecurity office lacks the authority to effectively fulfill its
role. In 2004, the subcommittee proposed legislation to elevate the
head of the cybersecurity office to an assistant secretary position.
Among other benefits, the subcommittee reported that such a change
could:
* provide more focus and authority for DHS's cybersecurity mission,
* allow higher level input into national policy decisions, and:
* provide a single visible point of contact within the federal
government to improve interactions with the private sector.
Hiring and contracting: Ineffective DHS management processes have
impeded the department's ability to hire employees and maintain
contracts. We recently reported that since its inception, DHS's
leadership has provided a foundation for maintaining critical
operations while undergoing transformation.[Footnote 22] However, in
managing its transformation, we noted that DHS still needed to overcome
a number of significant challenges, including addressing systemic
problems in human capital and acquisition systems. Federal and
nonfederal officials expressed concerns with DHS's hiring and
contracting processes. For example, an NCSD official reported that the
division has had difficulty in hiring personnel to fill vacant
positions. These officials stated that once they found qualified
candidates, some candidates decided not to apply and another withdrew
his acceptance because they felt that the DHS hiring process took too
long. In addition, an NCSD official stated that there had been times
when DHS did not renew NCSD contracts in a timely manner, requiring
that key contractors work without pay until approvals could be
completed and payments could be made. In other cases, NCSD was denied
services from a vendor, because DHS had repeatedly failed to pay for
its services. External stakeholders, including an ISAC representative,
also noted that NCSD is hampered by how long it takes DHS to award a
contract.
Awareness of DHS roles and capabilities: Many infrastructure
stakeholders are not yet aware of DHS's cybersecurity roles and
capabilities. Department of Energy critical infrastructure officials
stated that the roles and responsibilities of DHS and the sector-
specific agencies need to be better clarified in order to improve
coordination. In addition, during a regional cyber exercise, private-
sector and state and local government officials reported that the
mission of NCSD and the capabilities that DHS could provide during a
serious cyber-threat were not clear to them. NCSD's manager of cyber
analysis and warning operations acknowledged that the organization has
not done an adequate job in reaching out to the private sector
regarding DHS's role and capabilities.
Effective partnerships: NCSD is responsible for leveraging the assets
of key stakeholders, including other federal, state, and local
governments and the private sector, in order to facilitate effective
protection of cyber assets. The ability to develop partnerships greatly
enhances the agency's ability to identify, assess, and reduce cyber
threats and vulnerabilities, establish strategic analytical
capabilities, provide incident response, enhance government
cybersecurity, and improve international efforts. According to one
infrastructure sector representative, effective partnerships require
building relationships with mutually developed goals, shared benefits
and responsibilities, and tangible, measurable results. However, this
individual reported that DHS has not typically adopted these principles
in pursuing partnerships with the private sector, which dramatically
diminishes cybersecurity gains that government and industry could
otherwise achieve. For example, DHS has often informed the
infrastructure sectors about government initiatives or sought input
after most key decisions have been made. Also, DHS has not demonstrated
that it recognizes the value of leveraging existing private sector
mechanisms, such as information-sharing entities and processes already
in place and working. In addition, the instability of NCSD's leadership
positions to date has led to problems in developing partnerships.
Representatives from two ISACs reported that turnover at NCSD has
hindered partnership efforts. Additionally, IT sector representatives
stated that NCSD needs continuity of leadership, regular
communications, and trusted policies and procedures in order to build
the partnerships that will allow the private sector to share
information.
Information sharing: We recently identified information sharing in
support of homeland security as a high-risk area, and we noted that
establishing an effective two-way exchange of information to help
detect, prevent, and mitigate potential terrorist attacks requires an
extraordinary level of cooperation and perseverance among federal,
state, and local governments and the private sector.[Footnote 23]
However, such effective communications are not yet in place in support
of our nation's cybersecurity. Representatives from critical
infrastructure sectors stated that entities within their respective
sectors still do not openly share cybersecurity information with DHS.
As we have reported in the past, much of the concern is that the
potential release of sensitive information could increase the threat to
an entity. In addition, sector representatives stated that when
information is shared, it is not clear whether the information will be
shared with other entities, such as other federal entities, state and
local entities, law enforcement, or various regulators, or how it will
be used or protected from disclosure. Representatives from the banking
and finance sector stated that the protection provided by the Critical
Infrastructure Information Act and the subsequently established
Protected Critical Infrastructure Information Program is not clear and
has not overcome the trust barrier. Alternatively, sector
representatives have expressed concerns that DHS is not effectively
communicating information with them. According to one infrastructure
representative, DHS has not matched private sector efforts to share
valuable information with a corresponding level of trusted information
sharing. An official from the water sector noted that when
representatives called DHS to inquire about a potential terrorist
threat, they were told that DHS could not share any information and
that they should "watch the news."
Providing value: According to sector representatives, even when
organizations within their sectors have shared information with NCSD,
the entities do not consistently receive useful information in return.
They noted that without a clear benefit, they are unlikely to pursue
further information sharing with DHS. Federal officials also noted
problems in identifying the value that DHS provides. According to
Department of Energy officials, DHS does not always provide analysis or
reports based on the information that agencies provide. Federal and
nonfederal officials also stated that most of US-CERT's alerts have not
been useful because the alerts lack essential details or have been
based on already available information. Further, Treasury officials
stated that US-CERT needed to provide relevant and timely feedback
regarding the incidents reported to it.
Clearly, these challenges are not mutually exclusive. That is,
addressing challenges in organizational stability and authority will
help NCSD build the credibility it needs in order to establish
effective partnerships and achieve two-way information sharing.
Similarly, effective partnerships and ongoing information sharing with
its stakeholders will allow DHS to better demonstrate the value it can
add.
DHS has identified steps in its strategic plan for cybersecurity that
can begin to address these challenges. Specifically, DHS has
established goals and plans for improving human capital management,
which should help stabilize the organization. Further, DHS has
developed plans for communicating with stakeholders, which are intended
to increase awareness of its roles and capabilities and to encourage
information sharing. Also, DHS has established plans for developing
effective partnerships and improving analytical and watch and warning
capabilities, which could help build partnerships and begin to
demonstrate added value. However, until it begins to address these
underlying challenges, DHS cannot achieve significant results in
coordinating cybersecurity activities and our nation will lack the
effective focal point it needs to better ensure the security of
cyberspace for public and private critical infrastructure systems.
Conclusions:
As our nation has become increasingly dependent on timely, reliable
information, it has also become increasingly vulnerable to attacks on
the information infrastructure that supports the nation's critical
infrastructures (including the energy, banking and finance,
transportation, telecommunications, and drinking water
infrastructures). Federal law and policy acknowledge this by
establishing DHS as the focal point for coordinating cybersecurity
plans and initiatives with other federal agencies, state and local
governments, and private industry. DHS has made progress in planning
and coordinating efforts to enhance cybersecurity, but much more work
remains to be done to fulfill its basic responsibilities--including
conducting important threat and vulnerability assessments and recovery
plans.
As DHS strives to fulfill its mission, it faces key challenges in
building its credibility as a stable, authoritative, and capable
organization and in leveraging private/public assets and information in
order to clearly demonstrate the value it can provide. Until it
overcomes the many challenges it faces and completes critical
activities, DHS cannot effectively function as the cybersecurity focal
point intended by law and national policy. As such, there is increased
risk that large portions of our national infrastructure are either
unaware of key areas of cybersecurity risks or unprepared to
effectively address cyber emergencies.
Recommendations for Executive Action:
In order to improve DHS's ability to fulfill its mission as an
effective focal point for cybersecurity, we recommend that the
Secretary of Homeland Security implement the following three steps:
* engage appropriate stakeholders to prioritize key cybersecurity
responsibilities so that the most important activities are addressed
first, including responsibilities that are not detailed in the
cybersecurity strategic plan: (1) perform a national cyber threat
assessment; (2) facilitate sector cyber vulnerability assessments--to
include identification of cross-sector interdependencies; and (3)
establish contingency plans for cybersecurity, including recovery plans
for key Internet functions;
* require NCSD to develop a prioritized list of key activities for
addressing the underlying challenges that are impeding execution of its
responsibilities; and:
* identify performance measures and milestones for fulfilling its
prioritized responsibilities and for performing activities to address
its challenges, and track organizational progress against these
measures and milestones.
We are not making new recommendations regarding cyber-related analysis
and warning and cybersecurity information sharing at this time because
our previous recommendations in these areas have not yet been fully
implemented.
Agency Comments and Our Evaluation:
We received written comments on a draft of this report from DHS (see
app. III). In DHS's response, the Director of the Departmental GAO/OIG
Liaison Office stated that DHS agrees that strengthening cybersecurity
is central to protecting the nation's critical infrastructures and that
much remains to be done. In addition, DHS concurred with our
recommendation to engage stakeholders in prioritizing its key
cybersecurity responsibilities. The director stated that continued and
expanded stakeholder involvement is critical and identified some of
NCSD's significant activities--many of which are discussed in the body
of this report. However, the director noted that DHS does not agree
that the challenges it has experienced have prevented it from achieving
significant results in improving the nation's cybersecurity posture. In
addition, DHS did not concur with our recommendations to (1) develop a
prioritized list of key activities for addressing the underlying
challenges and (2) identify performance measures and milestones for
fulfilling its prioritized responsibilities and for performing
activities to address its challenges and track organizational progress.
Specifically, the director reported that DHS already uses a prioritized
list, performance measures, and milestones to guide and track its
activities and sought additional clarification of these
recommendations. The director also noted that our report makes a
reference to previous recommendations involving cyber-related
information sharing and strategic analysis and warning capabilities
that have not been fully implemented, but he disagreed that there were
any valid outstanding recommendations.
Because most of the nation's information infrastructure is owned by the
private-sector, developing trusted partnerships and information-sharing
relationships between the federal government and the private sector are
critical. We agree that DHS has initiated many efforts as a focal point
for the nation's efforts to secure cyberspace and have acknowledged
these in our report, but the challenges it faces-
-including achieving organizational stability, achieving two-way
information sharing with stakeholders, and demonstrating value--have
hindered its progress to date. This view was reiterated by the federal
and nonfederal stakeholders we interviewed.
Regarding our recommendations, while we agree with DHS that its
strategic plan for cybersecurity identifies a number of activities
(along with some performance metrics and milestones) that will begin to
address the challenges, this plan does not include specific initiatives
that would ensure that the challenges are addressed in a prioritized
and comprehensive manner. For example, the strategic plan for
cybersecurity does not include initiatives to help stabilize and build
authority for the organization. Further, the strategic plan does not
identify the relative priority of its initiatives and does not
consistently identify performance measure for completing its
initiatives. As DHS moves forward in identifying initiatives to address
the underlying challenges it faces, it will be important to establish
performance metrics and milestones for fulfilling these initiatives. In
fact, in its strategic plan for cybersecurity, DHS acknowledges that it
needs to establish performance measures and milestones and to collect
performance data for its key initiatives.
Regarding our previous recommendations related to information sharing,
DHS identified plans for fulfilling our recommendations but did not
provide any evidence that these efforts were completed. For example, in
November 2004, DHS reported that by June 2005, it planned to develop an
information-sharing plan including the elements we recommended;
however, DHS has not yet completed this plan and has not provided any
evidence that this plan will include the key elements we had
recommended. In addition, in regard to our recommendation that DHS
develop appropriate policies and procedures for information sharing and
coordination within DHS and with other federal and nonfederal entities,
DHS reported that it has many information sharing initiatives and high-
level documents. However, DHS did not specify any DHS-level policies or
procedures for information sharing. NCSD procedures, including the US-
CERT Concept of Operations and Standard Operating Procedure, were still
in draft at the time of our review. Thus, these recommendations remain
open.
As for our previous recommendations to develop a strategic analysis and
warning capability, we reported that DHS is still facing the same
challenges in developing strategic analysis and warning capabilities
that we reported on 4 years ago during a review of NCSD's predecessor.
In 2001, we reported that a generally accepted methodology for
analyzing strategic cyber-based threats did not exist. We also reported
that the center did not have the industry-specific data on factors such
as critical systems components, known vulnerabilities, and
interdependencies. Therefore, we recommended that responsible executive-
branch officials and agencies establish a capability for strategic
analysis of computer-based threats, including developing a methodology
and obtaining infrastructure data. In response to specific questions on
these topics in April 2005, NCSD officials acknowledged that work
remains to be done in developing cyber-related strategic analysis and
warning capabilities. They stated that there is still no generally
accepted methodology for analyzing strategic cyber-based threats and
that NCSD is in the process of developing industry-specific data. In
addition, these officials discussed a number of ongoing initiatives to
address various aspects of the methodology. Because these efforts are
incomplete, our recommendations remain open.
DHS officials as well as others who were quoted in our report also
provided technical corrections, which we have incorporated in this
report as appropriate.
We are sending copies of this report to interested congressional
committees, the Secretary of Homeland Security, and other interested
parties. In addition, this report will be available at no charge on
GAO's Web site at [Hyperlink, http://www.gao.gov].
If you have any questions on matters discussed in this report, please
contact me at (202) 512-9286, or by e-mail at [Hyperlink,
pownerd@gao.gov]. Contact points for our Offices of Congressional
Relations and Public Affairs may be found on the last page of this
report. GAO staff who made major contributions to this report are
listed in appendix IV.
Signed by:
David A. Powner:
Director, Information Technology Management Issues:
List of Congressional Requesters:
The Honorable Joseph I. Lieberman:
Ranking Member:
Committee on Homeland Security and Governmental Affairs:
United States Senate:
The Honorable Christopher Cox:
Chairman:
The Honorable Bennie G. Thompson:
Ranking Member:
Committee on Homeland Security:
House of Representatives:
The Honorable Daniel E. Lungren:
Chairman:
The Honorable Loretta Sanchez:
Ranking Member:
Subcommittee on Economic Security, Infrastructure Protection, and
Cybersecurity:
Committee on Homeland Security:
House of Representatives:
The Honorable Tom Davis:
Chairman:
Committee on Government Reform:
House of Representatives:
The Honorable Mac Thornberry:
House of Representatives:
The Honorable Zoe Lofgren:
House of Representatives:
[End of section]
Appendixes:
Appendix I: Objectives, Scope, and Methodology:
Our objectives were to determine (1) the Department of Homeland
Security's (DHS) roles and responsibilities for cyber critical
infrastructure protection (CIP) and national information security, as
established in law and policy, and determine the specific
organizational structures DHS has created to fulfill them; (2) the
status of DHS's efforts to protect the computer systems supporting the
nation's critical infrastructures and to strengthen information
security both inside and outside the federal government and the extent
to which such efforts and DHS's organizational structures adequately
address its responsibilities; and (3) the challenges DHS faces in
fulfilling its cybersecurity roles and responsibilities.
To determine DHS's cyber roles and responsibilities supporting CIP, we
analyzed relevant law and policy, including the Homeland Security Act
of 2002, Homeland Security Presidential Directive (HSPD) 7, and the
National Strategy to Secure Cyberspace. Because many of the roles and
responsibilities in the law and policies are overlapping, we focused on
identifying responsibilities related to cybersecurity that could be
used to gauge DHS's progress and grouped them into 13 key
responsibilities. We shared the 13 key responsibilities with DHS
officials responsible for cybersecurity, and the officials concurred
that these are important responsibilities. We also compared the key
responsibilities with the activities that DHS identified in its
cybersecurity plans and progress reports, to ensure that no key
responsibilities were missed. To identify DHS's organizational
structure for fulfilling its responsibilities, we analyzed DHS and
National Cyber Security Division (NCSD) organizational charts and
interviewed DHS officials.
To determine the status and adequacy of DHS's efforts, we analyzed key
documents, including the Interim National Infrastructure Protection
Plan, NCSD's cyber strategies and plans, and NCSD's policies and
procedures, and we interviewed key DHS and NCSD officials. We compared
DHS's efforts and plans with the 13 responsibilities to identify what
has been accomplished and what more needs to be done. In addition, we
gathered documents and performed structured interviews with officials
from other federal agencies with established CIP roles. We included
officials responsible for each agency's efforts to enhance CIP and the
officials responsible for their respective agency's information
security efforts. We spoke with officials from the Departments of
Agriculture; Energy; Health and Human Services (including the Food and
Drug Administration); Justice (including the Federal Bureau of
Investigation); the Treasury; and the Environmental Protection Agency.
We also interviewed representatives from the following infrastructure
sectors: banking and finance, electricity, water, and information
technology. In addition, we interviewed representatives from the
Information Sharing and Analysis Center (ISAC) council. We also
interviewed officials from entities representing state governments,
including the Multi-State ISAC and the National Association of State
Chief Information Officers.
To identify the challenges facing DHS and NCSD as they attempt to
fulfill their cybersecurity responsibilities, we analyzed our prior
work on CIP as well as reports by the cybersecurity industry that
offered recommendations for improving cybersecurity and CIP. We also
interviewed DHS and NCSD officials, representatives from other federal
agencies with CIP roles, infrastructure sector officials, and officials
of an organization representing state governments. We also observed a
regional infrastructure security tabletop exercise focusing on
cybersecurity and identified challenges in achieving effective
collaboration among public/private partners from discussions by the
participants of this exercise. We performed our work from July 2004 to
April 2005 in accordance with generally accepted government auditing
standards.
[End of section]
Appendix II: DHS Organizations with Cyber-Related Roles:
DHS established NCSD as the primary organization with responsibility
for cybersecurity. However, multiple other organizations have roles and
responsibilities that impact cybersecurity and require close
coordination with NCSD. These include the following offices and
suboffices:
* Information Analysis Office--which is to provide actionable
intelligence essential for preventing acts of terrorism and, with
timely and thorough analysis and dissemination of information about
terrorists and their activities, improve the federal government's
ability to disrupt and prevent terrorist acts and to provide useful
warning to state and local governments, the private sector, and our
citizens.
* Homeland Security Operations Center--which provides real-time
situational awareness and monitoring of the homeland, coordinates
incidents and response activities and, in conjunction with the DHS
Office of Information Analysis, issues advisories and bulletins
concerning threats to homeland security, as well as specific protective
measures.
* Infrastructure Protection Office--which is to coordinate national
efforts to secure America's critical infrastructure, including
vulnerability assessments, strategic planning efforts, and exercises.
* Infrastructure Protection Office's Infrastructure Coordination
Division--which plays a key role in coordinating with sector
coordinating mechanisms (e.g., sector coordinating councils and
government coordinating councils) concerning information sharing. In
addition, it operates the National Infrastructure Coordination Center.
* Infrastructure Coordination Division's Protected Critical
Infrastructure Information Program Office--which was established to
encourage private industry and others with knowledge about the nation's
critical infrastructure to share sensitive and proprietary business
information about this critical infrastructure with the government in
accordance with the Critical Infrastructure Information Act of 2002
(CII Act). Protected CII is designed so that members of the private
sector can voluntarily submit sensitive information regarding the
nation's critical infrastructure to DHS with the assurance that the
information will be protected from public disclosure as long as it
satisfies the requirements of the CII Act.
* Infrastructure Protection Office's Protective Security Division--
which is to coordinate strategies for protecting the nation's critical
physical infrastructure.
* Infrastructure Protection Office's National Communications System--
which was established by executive order in 1982 as a federal
interagency group responsible for national security and emergency
preparedness telecommunications and was transferred to DHS by the
Homeland Security Act of 2002. Its responsibilities include planning
for, developing, and implementing enhancements to the national
telecommunications infrastructure, which includes the Internet, to
achieve effectiveness in managing and using national telecommunication
resources to support the federal government during any emergency. In
addition, through the National Coordinating Center for
Telecommunications,[Footnote 24] the National Communications System
sponsors the Telecommunications Information Sharing and Analysis
Center. The National Communications System is also jointly responsible
with NCSD for developing the IT infrastructure sector plan.
* DHS's Science and Technology Directorate--which serves as the primary
research and development arm of DHS. It uses our nation's scientific
and technological resources to provide federal, state, and local
officials with the technology and capabilities to protect the homeland.
It focuses on catastrophic terrorism--threats to the security of our
homeland that could result in large-scale loss of life and major
economic impact.
* Office of State and Local Coordination--which was established to
serve as a single point of contact for facilitation and coordination of
departmental programs that impact state, local, territorial, and tribal
governments.
* Private Sector Office--which works directly with individual
businesses, trade associations, and other professional and
nongovernmental organizations to share department information,
programs, and partnership opportunities.
[End of section]
Appendix III: Comments from the Department of Homeland Security:
[U.S. Department of Homeland Security:
Washington, DC 20528:
May 3, 2005:
Mr. David A. Powner:
Director, Information Technology Management Issues:
Government Accountability Office:
Washington, DC 20548:
Dear Mr. Powner:
Re: Draft Report GAO-05-434, Critical Infrastructure Protection:
Department of Homeland Security Faces Challenges in Fulfilling
Cybersecurity Responsibilities.
Thank you for the opportunity to review the draft report. We agree that
strengthening cybersecurity is central to protecting the nation's
critical infrastructures and concur that much remains to be done. We do
not, however, agree with the report's implication that the challenges
experienced to date have prevented us from achieving significant
results in improving the nation's cybersecurity posture. The recent
(January 2005) National Cyber Security Division Progress Report
detailed the significant progress that has been made across the broad
spectrum of our cybersecurity responsibilities. Nevertheless, we
welcome GAO's review and comments on our initial efforts. We note the
report also makes a reference to "previous recommendations in these
areas." We do not agree that there are any valid, outstanding
recommendations in this area. The following represents the Departmental
response to the recommendations contained in the draft report.
Recommendation:
Engage with appropriate stakeholders to prioritize key cybersecurity
responsibilities so that the most important activities are addressed
fast, including responsibilities that are not detailed in the
cybersecurity strategic plan: (1) perform a national cyber threat
assessment, (2) facilitate sector cyber vulnerability assessments-to
include identification of cross-sector interdependencies, and (3)
establish contingency plans for cybersecurity, including recovery plans
for key Internet functions.
Response: Concur. While stakeholder input has already been a
contributing factor in the establishment of National Cyber Security
Division's (NCSD) priorities, continued and expanded stakeholder
involvement is critical in reviewing and revising these priorities in
the future. Some of the significant NCSD activities in this area are
noted below:
NCSD has made significant progress toward completing comprehensive
threat assessments and sector specific vulnerability assessments, but
we agree that more must be done. Establishing and formalizing the 1T
Sector, as the Sector Specific Agency/Responsibility (SSA/R) under the
National Infrastructure Protection Plan (NIPP), has been challenging,
given its breadth, complexity, and relative maturity. It is important
to recognize the nature of these challenges, as it helps to understand
the considerable progress made to date. The challenges include defining
the boundaries of the Sector, developing effective partnerships, and
identifying critical IT assets. This work is charting new territory in
government and private sector collaboration. Because most of the IT
Sector is privately owned, the government must ensure that the
collaboration includes all the principal actors and that the
collaboration is maintained and strengthened over time.
It is important that the work of the IT Sector be deliberate and
comprehensive. Failing to identify and address all threats and
vulnerabilities can have serious consequences. However, significant
progress has been made, specifically in the development of appropriate
IT Sector asset identification and vulnerability assessment
methodologies, in establishing the IT Sector Government Coordinating
Council (IT-GCC), and assisting the IT Sector in its efforts to
establish the IT Sector Coordinating Council (IT-SCC).
For cross-sector interdependencies, NCSD has worked with the Sector
Specific Agencies (SSA) to ensure the thoroughness of the cyber aspects
of their Sector Specific Plans (SSP), and is improving the IT Sector
asset identification and vulnerability assessment methodologies to
address SSA cross-sector cyber efforts. NCSD is working with each SSA
to ensure the quality and effectiveness of its cyber planning, and to
ensure cross-sector consistency. In addition, NCSD has been fully
engaged with OMB, as subject matter expert, to ensure the quality,
consistency, and effectiveness of the federal agency Critical
Infrastructure Protection plans. Lastly, NCSD has established a Control
Systems Security program to identify control systems in critical
infrastructure across all sectors, to understand their vulnerabilities
and interdependencies, and develop and recommend effective near-term
protective measures for legacy systems.
With respect to recovery, the Office of Infrastructure Protection (IP)
has formed a strategic partnership in the form of the Internet
Disruption Working Group (IDWG) that will leverage past efforts of the
federal government and the private sector while combining resources and
avoiding duplication and conflict. Currently, IDWG is building on past
efforts of IP, reaching out to key Internet companies in the private
sector, and drawing on US Computer Emergency Readiness Team (US-CERT)
resources to determine: (1) the degree of critical infrastructure
sectors' business and operational dependency on the Internet; (2) which
private sector companies the government needs to work with to prevent a
major disruption; and (3) what surge capabilities would be needed to
assist the National Cyber Response Coordination Group (NCRCG) in
managing a crisis and reconstituting service in the event of a
significant disruption. These efforts contribute to and will measure
progress through the Interagency Security Planning Effort for FY 2005,
within the Risk Management/Protective Measures Working Group of the
National Infrastructure Protection Plan Senior Leadership Council.
Recommendation:
Develop a prioritized list of key activities for addressing the
underlying challenges that are impeding NCSD's execution of its
responsibilities.
Response: Non-concur. NCSD's strategic plan already provides a
prioritized list of key activities that are reviewed, updated, and
revised on a quarterly basis. Through regular communication with the
Assistant Secretary for Infrastructure Protection, obstacles are
already being identified and prioritized. This recommendation, as
written, does not explain why these efforts are insufficient or what
specific additional actions GAO would like to see accomplished. Pending
further definition of GAO's intent, we non-concur with this
recommendation.
Recommendation:
Identify performance measures and milestones for fulfilling its
prioritized responsibilities and for performing activities to address
its challenges, and track organizational progress against these
measures and milestones.
Response: Non-concur. Performance measures and milestones are already
identified in NCSD's strategic plan. Unlike organizations that have
been in place for a significant period of time, the milestones facing
NCSD are primarily the development of new programs and establishment of
a system for monitoring the success of these programs. In its initial
strategic plan, NCSD has defined milestones that are measurable,
although often not in quantitative terms. That is, the initial
milestones direct the implementation of programs within a specified
period of time, or the implementation of stages in program development
in a specified time. The initial measure of success is whether or not
the programs got off the ground in a timely manner and are moving ahead
on schedule. As the programs become more established, performance
measures will increasingly shift towards quantitative measures to
evaluate the relative success of the program.
In addition to already having identified its performance measures and
milestones in its strategic plan, NCSD has already implemented
procedures to systematically track organizational progress. Early in
each quarter NCSD program managers are reminded of impending deadlines
at the end of the quarter. Action is taken at the start of each quarter
to ensure that a milestone is met or that obstacles to success are
addressed and overcome.
This recommendation, as written, does not explain why these efforts are
insufficient or what specific additional actions GAO would like to see
accomplished. Pending further definition of GAO's intent, we non-concur
with this recommendation.
We thank you again for the opportunity to review the report and provide
comments.
Sincerely,
Signed by:
Steven J. Pecinovsky:
Director:
Departmental GAO/OIG Liaison Office:
[End of section]
Appendix IV: GAO Contact and Staff Acknowledgments:
GAO Contact:
David A. Powner, (202) 512-9286 or [Hyperlink, pownerd@gao.gov].
Staff Acknowledgments:
In addition to those named above, Joanne Fiorino, Michael Gilmore,
Barbarol James, Colleen M. Phillips, and Nik Rapelje made key
contributions to this report.
(310543):
FOOTNOTES
[1] This includes the Homeland Security Act of 2002, Homeland Security
Presidential Directive 7, and the National Strategy to Secure
Cyberspace.
[2] Testimony of Robert S. Mueller, III, Director, Federal Bureau of
Investigation, before the Senate Select Committee on Intelligence (Feb.
16, 2005).
[3] CSO magazine, "2004 E-Crime Watch--Survey Shows Significant
Increase in Electronic Crime" (Framingham, MA: May 25, 2004).
[4] Computer Security Institute, 2003 CSI/FBI Computer Crime and
Security Survey (2003).
[5] GAO, Information Security: Code Red, Code Red II, and SirCam
Attacks Highlight Need for Proactive Measures, GAO-01-1073T
(Washington, D.C.: Aug. 29, 2001).
[6] GAO, Information Security: Weaknesses Place Commerce Data and
Operations at Serious Risk, GAO-01-751 (Washington, D.C.: Aug. 13,
2001).
[7] A vulnerability is a flaw or weakness in hardware or software that
can be exploited, resulting in a violation of an implicit or explicit
security policy.
[8] National Institute for Standards and Technology, Procedures for
Handling Security Patches: Recommendations of the National Institute of
Standards and Technology, National Institute of Science and Technology
Special Publication 800-40 (Gaithersburg, MD: August 2002).
[9] The CERT/CC is a center of Internet security expertise at the
Software Engineering Institute, a federally funded research and
development center operated by the Carnegie Mellon University. CERT and
CERT® Coordination Center are registered in the U.S. Patent and
Trademark Office by Carnegie Mellon University.
[10] GAO, Technology Assessment: Cybersecurity for Critical
Infrastructure Protection, GAO-04-321 (Washington, D.C.: May 28, 2004).
[11] Testimony of Richard D. Pethia, Director, CERT Centers, Software
Engineering Institute, Carnegie Mellon University, before the House
Committee on Government Reform, Subcommittee on Government Efficiency,
Financial Management and Intergovernmental Relations (November 19,
2002).
[12] Pew Internet and American Life Project, "The Future of the
Internet: In a survey, technology experts and scholars evaluate where
the network is headed in the next 10 years." (Washington, D.C.: January
9, 2005)
[13] GAO, Critical Infrastructure Protection: Challenges and Efforts to
Secure Control Systems, GAO-04-354 (Washington, D.C.: March 15, 2004).
[14] This group, operating under the authority granted by the Cyber
Annex to the National Response Plan, is a forum of national security,
law enforcement, defense, intelligence, and other government agencies
that coordinates intragovernment and public/private preparedness and
response to and recovery from national level cyber incidents and
physical attacks that have significant cyber consequences.
[15] The Protected Critical Infrastructure Information program was
established to encourage private industry to share sensitive and
proprietary business information about its critical infrastructures
with the government with the assurance that the information would be
protected from public disclosure, in accordance with the Critical
Infrastructure Information Act of 2002.
[16] GAO, Critical Infrastructure Protection: Improving Information
Sharing with Infrastructure Sectors, GAO-04-780 (Washington, D.C.: July
9, 2004).
[17] GAO, High-Risk Series: An Update, GAO-05-207 (Washington, D.C.:
January 2005).
[18] GAO, Critical Infrastructure Protection: Significant Challenges in
Developing National Capabilities, GAO-01-323 (Washington, D.C.: Apr.
25, 2001).
[19] GAO, Combating Terrorism: Selected Challenges and Related
Recommendations, GAO-01-822 (Washington, D.C.: Sept. 20, 2001).
[20] GAO-04-321.
[21] The Executive Office of the President, Office of Science and
Technology Policy and The Department of Homeland Security Science and
Technology Directorate, The National Plan for Research and Development
In Support of Critical Infrastructure Protection, 2004 (Washington,
D.C.: Apr. 8, 2005).
[22] GAO-05-207.
[23] GAO-05-207.
[24] The National Coordinating Center for Telecommunications is open to
companies that provide telecommunications or network services,
equipment, or software to the communications and information sector;
select, competitive local exchange carriers; Internet service
providers; vendors; software providers; telecommunications professional
organizations and associations; or companies with participation or
presence in the communications and information sector. Membership is
also allowed for National Coordinating Center member federal
departments and agencies, and for national security/emergency
preparedness users.
GAO's Mission:
The Government Accountability Office, the investigative arm of
Congress, exists to support Congress in meeting its constitutional
responsibilities and to help improve the performance and accountability
of the federal government for the American people. GAO examines the use
of public funds; evaluates federal programs and policies; and provides
analyses, recommendations, and other assistance to help Congress make
informed oversight, policy, and funding decisions. GAO's commitment to
good government is reflected in its core values of accountability,
integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through the Internet. GAO's Web site ( www.gao.gov ) contains
abstracts and full-text files of current reports and testimony and an
expanding archive of older products. The Web site features a search
engine to help you locate documents using key words and phrases. You
can print these documents in their entirety, including charts and other
graphics.
Each day, GAO issues a list of newly released reports, testimony, and
correspondence. GAO posts this list, known as "Today's Reports," on its
Web site daily. The list contains links to the full-text document
files. To have GAO e-mail this list to you every afternoon, go to
www.gao.gov and select "Subscribe to e-mail alerts" under the "Order
GAO Products" heading.
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. Government Accountability Office
441 G Street NW, Room LM
Washington, D.C. 20548:
To order by Phone:
Voice: (202) 512-6000:
TDD: (202) 512-2537:
Fax: (202) 512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: www.gao.gov/fraudnet/fraudnet.htm
E-mail: fraudnet@gao.gov
Automated answering system: (800) 424-5454 or (202) 512-7470:
Public Affairs:
Jeff Nelligan, managing director,
NelliganJ@gao.gov
(202) 512-4800
U.S. Government Accountability Office,
441 G Street NW, Room 7149
Washington, D.C. 20548: