Information Security
Coordination of Federal Cyber Security Research and Development
Gao ID: GAO-06-811 September 29, 2006
Research and development (R&D) of cyber security technology is essential to creating a broader range of choices and more robust tools for building secure, networked computer systems in the federal government and in the private sector. The National Strategy to Secure Cyberspace identifies national priorities to secure cyberspace, including a federal R&D agenda. GAO was asked to identify the (1) federal entities involved in cyber security R&D; (2) actions taken to improve oversight and coordination of federal cyber security R&D, including developing a federal research agenda; and (3) methods used for technology transfer at agencies with significant activities in this area. To do this, GAO examined relevant laws, policies, budget documents, plans, and reports.
Several federal entities are involved in federal cyber security research and development. The Office of Science and Technology Policy and OMB establish high-level research priorities. The Office of Science and Technology Policy is to coordinate the development of a federal research agenda for cyber security and oversee the National Science and Technology Council, which prepares R&D strategies that are to be coordinated across federal agencies. The Council operates through its committees, subcommittees, and interagency working groups, which oversee and coordinate activities related to specific science and technology disciplines. The Subcommittee on Networking and Information Technology Research and Development and the Cyber Security and Information Assurance Interagency Working Group are prominently involved in the coordination of cyber security research. In addition, other groups provide mechanisms for coordination of R&D efforts on an informal basis. The National Science Foundation and the Departments of Defense and Homeland Security fund much of this research. Federal entities have taken several important steps to improve the oversight and coordination of federal cyber security R&D, although limitations remain. Actions taken include chartering an interagency working group to focus on cyber security research, publishing a federal plan for guiding this research, reporting budget information for this research separately, and maintaining repositories of information on R&D projects. However, a federal cyber security research agenda has not been developed as recommended in the National Strategy to Secure Cyberspace and the federal plan did not fully address certain key elements. Further, the repositories do not contain information about all of the federally funded cyber security research projects in part because OMB had not issued guidance to ensure that agencies provided all information required for the repositories. As a result, information needed for oversight and coordination of cyber security research activities was not readily available. Federal agencies use a variety of methods for sharing the results of cyber security research with federal and private organizations (technology transfer), including sharing information through agency Web sites. Other methods include relying on the researcher to disseminate information about his or her research, attending conferences and workshops, working with industry to share information about emerging threats and research, and publishing journals to help facilitate information sharing.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-06-811, Information Security: Coordination of Federal Cyber Security Research and Development
This is the accessible text file for GAO report number GAO-06-811
entitled 'Information Security: Coordination of Federal Cyber Security
Research and Development' which was released on October 31, 2006.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Report to the Chairman, Committee on Government Reform, House of
Representatives:
United States Government Accountability Office:
GAO:
September 2006:
Information Security:
Coordination of Federal Cyber Security Research and Development:
GAO-06-811:
GAO Highlights:
Highlights of GAO-06-811, a report to Chairman, Committee on Government
Reform, House of Representatives
Why GAO Did This Study:
Research and development (R&D) of cyber security technology is
essential to creating a broader range of choices and more robust tools
for building secure, networked computer systems in the federal
government and in the private sector. The National Strategy to Secure
Cyberspace identifies national priorities to secure cyberspace,
including a federal R&D agenda.
GAO was asked to identify the
(1) federal entities involved in cyber security R&D; (2) actions taken
to improve oversight and coordination of federal cyber security R&D,
including developing a federal research agenda; and (3) methods used
for technology transfer at agencies with significant activities in this
area. To do this, GAO examined relevant laws, policies, budget
documents, plans, and reports.
What GAO Found:
Several federal entities are involved in federal cyber security
research and development. The Office of Science and Technology Policy
and OMB establish high-level research priorities. The Office of Science
and Technology Policy is to coordinate the development of a federal
research agenda for cyber security and oversee the National Science and
Technology Council, which prepares R&D strategies that are to be
coordinated across federal agencies. The Council operates through its
committees, subcommittees, and interagency working groups, which
oversee and coordinate activities related to specific science and
technology disciplines. The Subcommittee on Networking and Information
Technology Research and Development and the Cyber Security and
Information Assurance Interagency Working Group are prominently
involved in the coordination of cyber security research. In addition,
other groups provide mechanisms for coordination of R&D efforts on an
informal basis. The National Science Foundation and the Departments of
Defense and Homeland Security fund much of this research.
Federal entities have taken several important steps to improve the
oversight and coordination of federal cyber security R&D, although
limitations remain. Actions taken include chartering an interagency
working group to focus on cyber security research, publishing a federal
plan for guiding this research, reporting budget information for this
research separately, and maintaining repositories of information on R&D
projects. However, a federal cyber security research agenda has not
been developed as recommended in the National Strategy to Secure
Cyberspace and the federal plan did not fully address certain key
elements. Further, the repositories do not contain information about
all of the federally funded cyber security research projects in part
because OMB had not issued guidance to ensure that agencies provided
all information required for the repositories. As a result, information
needed for oversight and coordination of cyber security research
activities was not readily available.
Federal agencies use a variety of methods for sharing the results of
cyber security research with federal and private organizations
(technology transfer), including sharing information through agency Web
sites. Other methods include relying on the researcher to disseminate
information about his or her research, attending conferences and
workshops, working with industry to share information about emerging
threats and research, and publishing journals to help facilitate
information sharing.
What GAO Recommends:
GAO recommends that the Office of Science and Technology Policy
establish timelines for developing a federal agenda for cyber security
research. GAO also recommends that the Office of Management and Budget
(OMB) issue guidance to agencies for providing cyber security research
data to repositories. In commenting on a draft of this report, OMB
stated that it would review the need for such guidance.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-06-811].
To view the full product, including the scope and methodology, click on
the link above. For more information, contact Gregory C. Wilshusen at
(202) 512.6244 or wilshuseng@gao.gov.
[End of Section]
Contents:
Letter:
Results in Brief:
Background:
Numerous Federal Entities Involved in Cyber Security Research and
Development:
Federal Entities Have Improved Oversight and Coordination, but
Limitations Remain:
Federal Agencies Use Various Methods for Technology Transfer:
Conclusions:
Recommendations for Executive Action:
Agency Comments and Our Evaluation:
Appendix I: Objectives, Scope, and Methodology:
Appendix II: GAO Contacts and Staff Acknowledgments:
Tables:
Table 1: Key Federal Government Actions on Cyber Security R&D:
Table 2: Federal Organizations Involved in Oversight and Coordination
of Cyber Security Research:
Figures:
Figure 1: Security Vulnerabilities, 1995-2005:
Figure 2: Organization of Federal Cyber Security R&D Oversight and
Coordination:
Abbreviations:
CERT/CC: CERT Coordination Center:
OMB: Office of Management and Budget:
NITRD: Networking and Information Technology Research and Development:
R&D: research and development:
RaDiUS: Research and Development in the United States:
United States Government Accountability Office:
Washington, DC 20548:
September 29, 2006:
The Honorable Tom Davis:
Chairman:
Committee on Government Reform:
House of Representatives:
Dear Mr. Chairman:
Dramatic increases in computer interconnectivity, especially in the use
of the Internet, continue to revolutionize the way our government, our
nation, and much of the world communicate and conduct business.
However, computers, networks, and their infrastructures were not always
designed with security in mind. As a result, these systems can have
significant vulnerabilities[Footnote 1] that can be exploited by
malicious users to gain unauthorized access to systems and obtain
sensitive information, commit fraud, disrupt operations, or launch
attacks against Web sites.
Because of concerns about these malicious attacks from individuals and
groups, protecting both the public and private systems that support
critical operations and infrastructures of the federal government has
never been more important. Federal law and policy call for critical
infrastructure protection activities to enhance the cyber[Footnote 2]
and physical security of the infrastructures that are essential to
national security, national economic security, and national public
health and safety. These activities include building public-private
partnerships, identifying critical infrastructure sectors, identifying
federal agencies to work with the sectors to coordinate efforts to
strengthen the security of critical infrastructures, and research and
development (R&D) of cyber security tools and techniques. Research in
cyber security technology is essential to creating a broader range of
choices and more robust tools for building secure, networked computer
systems in the federal government and in the private sector. In this
regard, the National Strategy to Secure Cyberspace recommends the
development of an annual federal government cyber security research
agenda.
In response to your request, our objectives were to identify the:
² federal agencies involved in cyber security R&D;
² actions taken to improve oversight and coordination of cyber security
R&D, including the development of a federal research agenda; and:
² methods used for technology transfer at the agencies with significant
activities in cyber security R&D.
To address these objectives, we researched key reports by federal
groups on cyber security R&D to determine which agencies are involved
in federal cyber security R&D. We identified and interviewed officials
at agencies that provide funding for cyber security R&D to determine
their decision-making processes, examined policies and procedures,
analyzed budget documentation, and determined the extent to which the
agencies coordinate their activities. We conducted our work from August
2005 through August 2006 in accordance with generally accepted
government auditing standards. Appendix I contains additional details
on the objectives, scope, and methodology of our review.
Results in Brief:
Numerous entities are involved in federal cyber security research and
development. The Office of Science and Technology Policy and Office of
Management and Budget (OMB) in the Executive Office of the President
provide high-level oversight for federal research and development,
including cyber security. The Office of Science and Technology Policy
coordinates the development of a federal agenda for cyber security
research and oversees the National Science and Technology Council,
which prepares R&D strategies that are to be coordinated across federal
agencies. The council operates through its committees, subcommittees,
and interagency working groups, which oversee and coordinate activities
related to specific science and technology disciplines. The
Subcommittee on Networking and Information Technology Research and
Development (NITRD) and the Interagency Working Group on Cyber Security
and Information Assurance are key entities responsible for coordinating
federal cyber security R&D activities. In addition, other groups
provide mechanisms for coordination of R&D efforts on an informal
basis. Much of the government's cyber security R&D activities are
funded or conducted by the National Science Foundation and the
Departments of Defense and Homeland Security. Other agencies that also
fund or conduct cyber security R&D activities include the Department of
Energy, the National Institute of Standards and Technology, and
agencies within the intelligence community.
Federal entities have taken several important steps to improve the
oversight and coordination of federal cyber security R&D, although
limitations remain. Actions taken to facilitate oversight and
coordination of cyber security research include (1) chartering an
interagency working group to focus on this type of research, (2)
publishing a federal plan for cyber security and information assurance
that is to provide baseline information and a framework for planning
and conducting this research, (3) reporting budget information for
cyber security research separately from other types of research, and
(4) developing and maintaining governmentwide repositories of
information on R&D projects. However, a federal cyber security research
agenda has not been developed, as recommended in the National Strategy
to Secure Cyberspace and the federal plan does not fully address
certain key elements. Further, the governmentwide repositories are
incomplete and not fully populated, in part, because OMB has not issued
guidance to ensure that agencies provide all information required for
the repositories. As a result, key information needed for the effective
oversight and coordination of cyber security research activities is not
readily available.
The three primary agencies that fund or conduct cyber security R&D use
a variety of methods for sharing the results of the research
(technology transfer). These methods include relying on the researcher
to disseminate information about his or her research, attending
conferences and workshops and working with industry to share
information about emerging threats and research, and using published
peer review journals to facilitate information sharing.
We are recommending that the Director, Office of Science and Technology
Policy, establish firm timelines for the completion of the federal
cyber security R&D agenda. We are also recommending that the Director,
OMB, issue guidance to agencies on reporting information about
federally funded cyber security research projects to the governmentwide
repositories. The Office of Science and Technology Policy provided
technical comments on a draft of this report, but did not comment on
our recommendation. We also received oral comments on a draft of our
report from officials at OMB. They stated that they would review the
need for issuing guidance. The National Science Foundation and the
National Institute of Standards and Technology also provided technical
comments, which we have incorporated into the report as appropriate.
Background:
The speed, functionality, and accessibility that create the enormous
benefits of the computer age can, if not properly controlled, allow
individuals and organizations to inexpensively eavesdrop on or
interfere with computer operations from remote locations for
mischievous or malicious purposes, including fraud or sabotage. As
public and private organizations use computer systems to transfer more
and greater amounts of money, sensitive economic and commercial
information, and critical defense and intelligence information, the
likelihood increases that malicious individuals will attempt to
penetrate current security technologies, disrupt or disable our
nation's critical infrastructures, and use sensitive and critical
information for malicious purposes.
In a May 2004 report,[Footnote 3] we discussed how cyber security
technologies can provide a near-term solution for improving critical
infrastructure security vulnerabilities. However, these technologies
offer only single-point solutions by addressing individual
vulnerabilities; they do not provide a complete solution. For example,
firewalls can control the flow of traffic between networks but cannot
protect against threats from within the network; antivirus software can
provide some protection against viruses and worms but cannot protect
the confidentiality of the data residing on the system. As a result,
many researchers have described the use of these types of near-term
solutions as being short-sighted. They argue that it is necessary to
design systems with built-in security because it is difficult to deploy
secure systems based on insecure components. In addition, researchers
have indicated that long-term efforts are needed, such as researching
cyber security vulnerabilities, developing technological solutions, and
transitioning research results into commercially available products.
Research in cyber security technology can help create a broader range
of choices and more robust tools for building secure, networked
computer systems.
Recent cyber attacks and threats have underscored the need to
strengthen and coordinate the federal government's cyber security R&D
efforts. Examples of recent attacks include the following:
² In November 2005, the U.S. government issued a warning about a virus
disguised in an e-mail purportedly sent from the Federal Bureau of
Investigation. The e-mail tells users that they have been visiting
illegal Web sites and directs them to open an attachment with a
questionnaire that contains a variant of the w32/sober virus. If the
attachment is opened, the virus is executed.
² In October 2005, information security specialists reported that the
Zotob worm, which had adversely affected computer networks in mid-
August, had cost infected organizations an average of $97,000. Variants
of the worm were capable of attacks that included logging keystrokes,
stealing authentication credentials, and performing mass mailings. It
was estimated that it took 61 percent of the impacted organizations
more than 80 hours of work to clean up the infected systems.
² In March 2005, security consultants within the electric industry
reported that hackers were targeting the U.S. electric power grid and
had gained access to electronic control systems. Computer security
specialists reported that, in a few cases, these intrusions had "caused
an impact." While officials stated that hackers had not caused serious
damage to the systems that feed the nation's power grid, the constant
threat of intrusion has heightened concerns that electric companies may
not have adequately fortified defenses against a potential catastrophic
strike.
² In January 2005, a major university reported that a hacker had broken
into a database containing 32,000 student and employee social security
numbers, potentially compromising the identities and finances of the
individuals. In similar incidents during 2003 and 2004, it was reported
that hackers had attacked the systems of other universities, exposing
the personal information of more than 1.8 million people.
The number of malicious attacks has increased with the growing number
of vulnerabilities. In 2000, the Software Engineering Institute's CERT®
Coordination Center (CERT/CC)[Footnote 4] received 1,090 reports of
security vulnerabilities. By 2005, this number had more than quadrupled
to 5,990. Figure 1 illustrates the number of security vulnerabilities
reported from 1995 through 2005.
Figure 1: Security Vulnerabilities, 1995-2005:
[See PDF for image]
Source: GAO analysis based on CERT/CC data.
[End of figure]
Over the years, the federal government has taken these and other
actions to improve cyber security efforts:
* publishing best practices and guidelines that assist in the planning,
selection, and implementation of cyber security technologies;
* partnering with private sector counterparts to assess vulnerabilities
and develop plans to eliminate those vulnerabilities; and:
* awarding grants to support cyber security R&D.
Federal Cyber Security Research and Development Policies:
Research associated with enhancing the cyber security of critical
infrastructures has been reinforced through federal requirements aimed
at improving the nation's cyber security posture. Additional
requirements for research can be found in legislation that establishes
agency responsibilities. For example, the act that establishes the
Office of Science and Technology Policy gives the office the
responsibility of assisting the President in providing general
leadership and coordination of the research programs of the federal
government.[Footnote 5] To provide a historical perspective, table 1
summarizes the key federal cyber security R&D actions that have shaped
the development of the federal government's cyber security R&D
policies.
Table 1: Key Federal Government Actions on Cyber Security R&D:
Actions: Cyber Security Research and Development Act[A];
Date: November 2002;
Description: Enacted to enhance cyber security research efforts.
Authorizes the National Science Foundation and the National Institute
of Standards and Technology to award grants and establish programs
aimed at enhancing computer security and related research partnerships;
Defines the responsibility of the Director of the Office of Science and
Technology Policy in working with the directors of the National Science
Foundation and the National Institute of Standards and Technology to
ensure programs authorized by the act are accounted for in
governmentwide cyber security research efforts.
Actions: National Strategy to Secure Cyberspace;
Date: February 2003;
Description: Provides direction to the federal government's departments
and agencies that have roles in cyberspace security and outlines an
initial framework for both organizing and prioritizing efforts. It
identifies five national priorities, one of which includes reducing
cyberspace threats and vulnerabilities. As part of this priority, the
Director of the Office of Science and Technology Policy is to
coordinate the development, and update on an annual basis, a federal
government R&D agenda for cyber security.
Actions: President's Information Technology Advisory Committee report;
Date: February 2005;
Description: The President's Information Technology Advisory Committee
is a federally chartered advisory committee operating under the Federal
Advisory Committee Act[B] whose members were appointed by the President
to provide independent, expert advice on advanced information
technology issues. It conducted a review of the focus, balance, and
effectiveness of federally funded cyber security R&D projects. The
results of the review were published in a February 2005 report[C] that
recommends several changes in the federal government's cyber security
R&D portfolio. One of the report's recommendations was to strengthen
coordination and oversight of federal cyber security efforts.
Source: GAO analysis of federal policy documents and report.
[A] Pub. L. 107-305, Cyber Security Research and Development Act,
November 27, 2002.
[B] Pub. L. 92-463, Federal Advisory Committee Act, October 6, 1972.
[C] President's Information Technology Advisory Committee, Cyber
Security: A Crisis of Prioritization (Washington, D.C.: Feb. 28, 2005).
[End of table]
Numerous Federal Entities Involved in Cyber Security Research and
Development:
Numerous federal agencies and organizations are involved in federally
funded cyber security R&D. Several entities oversee and coordinate
federal cyber security research; other groups support coordination on
an informal basis; and multiple federal agencies fund or conduct this
research.
Federal Structure for Oversight and Coordination of Cyber Security
Research and Development:
The Office of Science and Technology Policy and OMB, both in the
Executive Office of the President, provide high-level oversight of
federal R&D, including cyber security. The Office of Science and
Technology Policy oversees the National Science and Technology Council,
which prepares R&D strategies that are coordinated across federal
agencies. The council operates through its committees, subcommittees,
and interagency working groups, which coordinate activities related to
specific science and technology disciplines. The Subcommittee on NITRD
and the Interagency Working Group on Cyber Security and Information
Assurance are the key entities responsible for coordinating cyber
security R&D activities among federal agencies. The organization chart
in figure 2 depicts the federal organizations involved.
Figure 2: Organization of Federal Cyber Security R&D Oversight and
Coordination:
[See PDF for image]
Source: GAO analysis of NITRD information.
[End of figure]
While this chart illustrates that several organizations are involved,
much of the coordination for cyber security research is actually
accomplished at lower level working groups and subcommittees by content
matter experts from different agencies. Table 2 contains a brief
description of the roles and responsibilities of the federal
organizations and groups involved in the oversight and coordination of
cyber security research.
Table 2: Federal Organizations Involved in Oversight and Coordination
of Cyber Security Research:
Organization: Office of Management and Budget;
Description: The OMB evaluates, formulates, and coordinates budget and
management policies and objectives among federal departments and
agencies, including cyber security policies and objectives. Some of its
primary responsibilities are to assist the President in developing and
maintaining effective government, to develop efficient coordinating
mechanisms to expand interagency cooperation, and to develop regulatory
reform proposals and programs. In addition, the office has
responsibility for developing and maintaining a governmentwide
repository of R&D projects.
Organization: Office of Science and Technology Policy;
Description: The Office of Science and Technology Policy serves as a
primary advisor to the President for policy formation and budget
development on all questions in which science and technology are
important elements. The office also leads an interagency effort to
develop and implement science and technology policies and budgets that
are coordinated across federal agencies; The directors of the Office of
Science and Technology Policy and OMB jointly release an annual
memorandum to the heads of executive departments and agencies that
specifies general R&D budget priorities. Agencies are encouraged to
give these priorities full consideration when developing their budget
requests, including those related to cyber security. In addition to
general program guidance, the memorandums have made interagency R&D
efforts (such as the federal NITRD program) a continuing priority.
Organization: National Science and Technology Council;
Description: The National Science and Technology Council, established
in 1993, is the principal means for the administration to coordinate
science and technology policy among the diverse parts of the federal
areas. The Office of Science and Technology Policy works through the
National Science and Technology Council to research and develop
strategies that are coordinated across federal agencies. The council
operates through its committees, which include the Committee on
Homeland and National Security and the Committee on Technology, among
others. Each committee oversees a number of subcommittees and
interagency working groups focused on science and technology.
Organization: Committee on Homeland and National Security;
Description: The Committee on Homeland and National Security of the
National Science and Technology Council increases the productivity and
effectiveness of federal science and technology R&D efforts related to
homeland and national security. The committee includes representatives
from several federal departments, agencies, and organizations within
the Executive Office of the President. One of its primary functions is
to assist in identifying, defining, and advising the National Science
and Technology Council on federal priorities and plans for homeland or
national security R&D.
Organization: Committee on Technology;
Description: The Committee on Technology addresses policy matters that
cut across agency boundaries and provides a formal mechanism for
interagency policy coordination and balanced and comprehensive
technology R&D programs. Senior-level representatives from federal
departments and agencies comprise the committee. The committee is
currently being co-chaired by the Department of Commerce and the Office
of Science and Technology Policy. Several other agencies or components
are members of the committee including the Departments of Homeland
Security, Justice, Transportation, and Treasury; and the Central
Intelligence Agency.
Organization: Subcommittee on Infrastructure;
Description: The Subcommittee on Infrastructure is a joint subcommittee
that operates under the guidance of the Committee on Homeland and
National Security and the Committee on Technology. The subcommittee
serves as a forum within the National Science and Technology Council
for resolving issues related to the coordination of R&D agendas,
policy, and programs associated with the nation's infrastructure. One
of the subcommittee's main areas of focus is research related to
critical information infrastructure protection.
Organization: Subcommittee on NITRD;
Description: Under the guidance of the National Science and Technology
Council's Committee on Technology, the Subcommittee on NITRD serves as
an internal deliberative organization for networking and information
technology R&D policy, program, and budget guidance for the executive
branch. Subcommittee members include representatives from 15 federal
agencies or components, including the National Science Foundation,
Department of Defense, National Security Agency, Defense Advanced
Research Projects Agency, and National Institute of Standards and
Technology; The Subcommittee on NITRD coordinates the planning,
budgeting, and assessment activities of the multi-agency federal NITRD
program. This program was chartered under the High-Performance
Computing Act of 1991 (Pub.L. 102-194), as amended by the Next
Generation Internet Research Act of 1998 (Pub.L. 105-305), to help
sustain U.S. leadership in cutting-edge science, engineering, and
technology through investments from federal agencies involved in
information technology R&D; During fiscal year 2006, agencies
participating in NITRD coordinated information technology R&D
activities in eight research areas, including cyber security,
information assurance, and high-confidence software and systems. Each
area has an associated interagency working group or coordinating group
of agency program managers that coordinates the planning and activities
of its respective research area projects.
Organization: National Coordination Office for NITRD;
Description: The National Coordination Office for NITRD is responsible
for providing technical and administrative support for the Subcommittee
on NITRD and interagency activities of the federal NITRD program. This
includes helping identify research needs by coordinating interagency
meetings as well as conferences and workshops with academia and
industry. The National Coordination Office aids information
dissemination by publishing reports, including reports produced by the
President's Information Technology Advisory Committee, and the annual
supplements to the President's budget. To develop the supplements, the
National Coordination Office works with OMB to perform a budget
analysis of participating NITRD agencies. Technical program and
coordination information included in the supplement was gathered during
a series of interagency meetings; Although the National Coordination
Office assists in the coordination of interagency activities, some
coordination responsibilities are conducted at the agency level. For
example, while the National Coordination Office collects agency
research activities for the development of the budget supplement, it
does not provide feedback on program duplication or adherence to
strategic priorities. Agencies are expected to weigh other factors
during their own prioritization process, including activities of other
agencies and perceived research needs from the academic and private-
sector research communities. In addition, while agencies participating
in classified research provide a valuable threat perspective and
additional guidance to interagency meetings, the coordination of
classified research is beyond the scope of the NITRD program.
Organization: Interagency Working Group for Cyber Security and
Information Assurance;
Description: The Cyber Security and Information Assurance Interagency
Working Group was chartered in August 2005 to facilitate more
coordination of federal cyber security R&D. The working group reports
to both the Subcommittee on NITRD and the Subcommittee on
Infrastructure; The new charter gives the working group several
responsibilities concerning cyber security and information assurance
R&D, including facilitating interagency program planning, developing
and periodically updating an interagency roadmap, developing
recommendations for establishing federal policies and priorities,
summarizing annual activities for the NITRD program's supplement to the
President's budget, and identifying potential opportunities for
collaboration and coordination; Members include the National Science
Foundation, the Department of Defense's research organizations, the
National Security Agency, the Defense Advanced Research Projects
Agency, and the National Institute of Standards and Technology. Other
participants include the Central Intelligence Agency and the
Departments of Homeland Security, Energy, Justice, State,
Transportation, and the Treasury.
Source: GAO analysis of NITRD-provided information.
[End of table]
Other Groups Support Coordination on Informal Basis:
Participation by federal entities in other interagency groups provides
opportunities for enhanced coordination of cyber security R&D efforts
on an informal basis.
InfoSec Research Council:
The InfoSec Research Council (the Council) is a voluntary organization
that is to facilitate coordination and communication of federal
information security research among its members.[Footnote 6] The
Council meets regularly to discuss current research projects, proposed
future research initiatives, and critical information security issues.
It is also responsible for producing a "hard problems list" that
describes what it considers to be the most critical information
security problems that, from a government perspective, should be
addressed within the next 5 to 10 years. The latest version of the hard
problems list was released in November 2005 and includes problems such
as addressing insider threats, building secure systems, and improving
information security without sacrificing privacy.[Footnote 7] The
development of the list was intended to create consensus on
particularly challenging information security issues that can be
addressed through federal government coordination, but the Council
recognizes that its members also have their own research priorities.
Technical Support Working Group:
The Technical Support Working Group also provides a means for
coordination of cyber security R&D. Under the supervision of the
Departments of Defense and State, the group operates with the
collaboration and voluntary participation of more than 80 federal
organizations in its 10 subgroups. In fulfilling its mission to conduct
the national interagency R&D program for combating terrorism, the group
facilitates interagency communication by serving as a forum for
developing user-based counterterrorism technology requirements across
the federal government. Its Infrastructure Protection subgroup[Footnote
8] meets once a year and is responsible for identifying, prioritizing,
and executing R&D projects that satisfy interagency infrastructure
protection requirements, including cyber security.
Ad Hoc Cooperation:
Research and development officials at several agencies noted that,
through other informal activities, they maintained additional contact
with personnel at other agencies conducting cyber security R&D. Many
mentioned that they participated in other agencies' project selection
and technical review panels. For example, experts from the Department
of Homeland Security served on the review panel for the National
Science Foundation's 2005 Cyber Trust program. In addition, officials
noted the relatively small size of the federal cyber security research
community--many of the same officials attend the coordination meetings
and a few officials within the community have worked at other agencies.
This familiarity among cyber security experts has allowed for informal
knowledge sharing and communication among agencies.
Key Agencies Fund and Conduct Cyber Security Research:
While there are multiple agencies involved, three agencies fund and
conduct much of cyber security R&D: the National Science Foundation and
the Departments of Homeland Security and Defense.
In 2004, the National Science Foundation established the Cyber Trust
program to complement ongoing cyber security investments in each of its
core research areas: computer and networked systems, computing and
communication foundations, information and intelligence systems, shared
cyber infrastructure, and information technology research. In
accordance with the Cyber Security Research and Development Act, the
National Science Foundation awards Cyber Trust grants for projects that
(1) advance the relevant knowledge base; (2) creatively integrate
research and education for the benefit of technical specialists and the
general populace; and (3) effectively integrate the study of technology
with the policy, economic, institutional, and usability factors that
often determine its deployment and use. Recent Cyber Trust grants
include research in areas such as approaches to Internet security,
system behavior monitoring, and information security risk management
architecture. The President's budget for fiscal year 2006 provides
about $94 million to the National Science Foundation for cyber security
research, education, and training.
The Department of Homeland Security's R&D efforts are aimed at
countering threats to the homeland by making evolutionary improvements
to current capabilities and by developing revolutionary new
capabilities. The Department of Homeland Security's cyber security R&D
program resides in the agency's Science and Technology Directorate.
According to Department of Homeland Security officials, the cyber
security R&D program was funded--out of the department's $1 billion
science and technology budget--with approximately $10 million in fiscal
year 2004, $18 million in fiscal year 2005, and $17 million in fiscal
year 2006. The Department of Homeland Security's cyber security R&D
activities are largely unclassified and near-term.[Footnote 9] In
addition, some work is funded in partnership with the National Science
Foundation.
Several agencies within the Department of Defense have cyber security
R&D programs. The Department of Defense's Office of the Director,
Defense Research and Engineering, provides coordination and oversight
in addition to supporting some cyber security research activities
directly. The office is responsible for the Department of Defense's
science and technology as well as for oversight of research and
engineering. According to Department of Defense officials, its cyber
security research programs totaled about $150 million in fiscal year
2005. Although the Department of Defense's research organizations (the
Office of Naval Research, Army Research Laboratory, and Air Force
Research Laboratory) have cyber security programs, the largest
investments within its cyber security program are with the Defense
Advanced Research Projects Agency and the National Security Agency.
The Defense Advanced Research Projects Agency is the central R&D
organization of the Department of Defense. Its mission is to identify
revolutionary, high-risk, high-payoff technologies of interest to the
military--and then to support their development through transition. Its
portfolio has shifted toward classified and short-term R&D, and it has
the authority to award cash prizes to encourage and accelerate
technical accomplishments. There are two types of offices at the
agency: technology offices and systems offices. The technology offices
focus on new knowledge and component technologies that might have
significant national security applications. Systems offices focus on
technology development programs leading to products that more closely
resemble a specific military end-product; that is, an item that might
be in the military's inventory. One of the technology offices (the
Information Processing Technology Office) and one of the systems
offices (the Advanced Technology Office) focus on cyber security
research and development.
The National Security Agency also performs extensive cyber security
research. The research is conducted and supported by its National
Information Assurance Research Group. Two of the agency's programs--the
Information Systems Security Program and Consolidated Cryptologic
Program--fund the majority of its cyber security research. The research
focuses on high-speed encryption and certain defense capabilities,
among other things.
Other Agencies Fund or Conduct Cyber Security Research and Development:
In addition to the three primary agencies that fund or conduct cyber
security R&D, other agencies, including the Department of Energy, the
National Institute of Standards and Technology, and the Disruptive
Technology Office, also fund or conduct this research.
The Department of Energy also conducts and funds cyber security R&D.
Nearly all of the Department of Energy's cyber security R&D investments
are directed toward short-term or military and intelligence
applications. This work is conducted principally at the national
laboratories.
The National Institute of Standards and Technology's cyber security
research program is multi-disciplinary and focuses on a range of long-
term to applied R&D in the creation of security standards, guidelines,
and new technologies. The National Institute of Standards and
Technology's fiscal year 2006 budget estimate for cyber security was
$9.1 million. The National Institute of Standards and Technology also
receives funding from other agencies such as the Departments of
Homeland Security and Transportation and the General Services
Administration, to work on projects that are consistent with its cyber
security mission. For example, it is producing, for the Department of
Homeland Security, the National Vulnerability Database. According to
the National Institute of Standards and Technology, it is mandated
under the Federal Information Security Management Act, the Cyber
Security Research and Development Act, the Uniting and Strengthening
America by Providing Appropriate Tools Required to Intercept and
Obstruct Terrorism (USA PATRIOT ACT) Act (for biometrics), and OMB's
Circular A-130, to develop standards, guidelines, and tests for use by
federal agencies. Under the Federal Information Security Management
Act, the National Institute of Standards and Technology also conducts
security research in support of future standards and guidelines.
The Disruptive Technology Office[Footnote 10] supports the development
of technologies to improve the information systems and networks that
are used primarily by the intelligence community. Its budget for cyber
security research amounts to about $17 million; one third of this
amount supports mostly unclassified academic research. However, the
office typically classifies the results of this research once it is
mature enough to be incorporated into tools for the intelligence
community.
Federal Entities Have Improved Oversight and Coordination, but
Limitations Remain:
Federal entities have taken several important steps to improve the
oversight and coordination of federal cyber security R&D. These include
(1) chartering an interagency working group to focus on this type of
research, (2) publishing a federal plan for cyber security and
information assurance research that is to provide baseline information
and a framework for planning and conducting this research, (3)
separating the reporting of budget information for cyber security
research from other types of research, and (4) maintaining
governmentwide repositories of information on R&D projects. However,
limitations exist with the development of a federal cyber security
research agenda, the federal plan, and populating the governmentwide
repositories that, if not remedied, could diminish the effectiveness of
oversight and coordination of cyber security R&D.
Interagency Working Group on Cyber Security Research Provides
Coordination Opportunities:
In August 2005, the National Science and Technology Council chartered
the Interagency Working Group for Cyber Security and Information
Assurance. This working group succeeds the Interagency Working Group on
Critical Information Infrastructure Protection, which reported to the
Subcommittee on Infrastructure. The working group reports jointly to
the Subcommittee on NITRD and the Subcommittee on Infrastructure. This
change is to facilitate better integration of cyber security R&D with
the NITRD program and reflect the broader impact of cyber security and
information assurance beyond critical information infrastructure
protection. According to a NITRD official, the charter of the
Interagency Working Group for Cyber Security and Information Assurance
was made in response to the February 2005 recommendation of the
President's Information Technology Advisory Committee to strengthen and
integrate the working group under the NITRD program.
Federal Plan for Cyber Security Research and Development Has Been
Developed but Cyber Security Agenda Still Needed:
In February 2003, the National Strategy to Secure Cyberspace was issued
to provide a framework for organizing and prioritizing efforts to
protect our nation's cyberspace. The strategy recommended that the
Director of the Office of Science and Technology Policy coordinate the
development of an annual federal government cyber security research
agenda that includes near-term (1-3 years), mid-term (3-5 years), and
long-term (5 years and longer) research for fiscal years 2004 and
beyond.
In April 2006, the Cyber Security and Information Assurance Interagency
Working Group released an interagency plan for cyber security research
and development.[Footnote 11] The plan provides baseline information
and a technical framework for coordinated multi-agency research in
cyber security and information assurance. The Federal Plan for Cyber
Security and Information Assurance Research and Development addresses:
* types of vulnerabilities, threats, and risks;
* analysis of recent calls for federal research and development;
* strategic federal objectives;
* technical topics in cyber security and information assurance
research;
* current technical and investment priorities of federal agencies in
cyber security and information assurance research;
* results of technical and funding gaps analysis;
* findings and recommendations;
* research of technical topic perspectives, including assessments of
the state of the art and key technical challenges; and:
* a summary of roles and responsibilities, by agency.
According to the Interagency Working Group for Cyber Security and
Information Assurance, which operates under the auspices of the Office
of Science of Technology Policy and the National Science and Technology
Council, the Federal Plan for Cyber Security and Information Assurance
Research and Development is the first step towards developing a federal
agenda for cyber security research. The plan specifies the need to
develop a road map for addressing identified gaps in cyber security
research, but has not committed to a date when the road map would be
developed or completed.
Key activities for the development of an agenda have not been
completed. For instance, mid-term and long-term cyber security research
goals have not been defined. Further, the following activities
necessary for the agenda have also not been completed: (1) specifying
timelines and milestones for conducting research and development
activities; (2) specifying goals and measures for evaluating research
and development activities; (3) assigning responsibility for
implementation, including the accomplishment of the focus areas and
suggested research priorities; and (4) aligning the funding priorities
with technical priorities.
Until a federal agenda as called for in the National Strategy to Secure
Cyberspace is developed, increased risk exists that agencies will focus
on their individual priorities for cyber security research and
development, which may not be the most important national research
priorities. Better coordination of research and development efforts
will enable the most important topics to receive priority funding and
resources and avoid duplication of effort.
Reporting of Budget Information Increases Visibility of Cyber Security
Research:
For the first time, the NITRD program, in response to the President's
Information Technology Advisory Committee recommendation to strengthen
coordination,[Footnote 12] reported budget information for cyber
security research separately from other types of research in its
supplement to the President's fiscal year 2007 budget. This important
change was made possible with the addition of a new NITRD program
component area for cyber security and information assurance. Before
this addition, budget amounts for cyber security research projects were
difficult to identify because they were often grouped with the non-
cyber security research projects in other program component areas. Now,
program member agencies are to report budget amounts for cyber security
research separately. For example, the National Science Foundation,
Department of Defense agencies, and National Institute of Standards and
Technology, among others, reported budget amounts for cyber security
and information assurance research in the NITRD Supplement to the
President's Fiscal Year 2007 Budget.
Although the NITRD supplement included budget amounts for cyber
security research, this information was limited. Budget amounts for
certain cyber security research activities were reported in another
NITRD program component area, and budget information on cyber security
research for non-NITRD members--such as the Department of Homeland
Security and elements within the Department of Energy--was not included
in the supplement. However, in his February 2006 testimony before the
House Committee on Science, the former Department of Homeland Security
Under Secretary for Science and Technology testified that the science
and technology division of the Department of Homeland Security is now
participating in NITRD. Further, in June 2006, the OMB issued its
annual Circular A-11 budget submission guidance, which requires that
agencies submit separate budget amounts for cyber security R&D as part
of their 2008 budget submissions. These new requirements should
increase the visibility of federal cyber security research and could
provide a mechanism for determining the total federal budget in cyber
security research and development.
Federal Agencies and Public Could Benefit from Fully Populated
Governmentwide Repository:
In order to improve the methods by which government information is
organized, preserved, and made accessible to the public, the E-
Government Act of 2002[Footnote 13] mandated that the Director of OMB
(or the Director's delegate) ensure the development and maintenance of
a governmentwide repository and Web site that integrates information
about federally funded R&D. The Director delegated this responsibility
to the National Science Foundation. According to the E-Government Act,
the repository is to integrate information about each separate R&D task
or award, including: the dates on which the task or award is expected
to start and end, a brief summary describing the objective and the
scientific and technical focus of the task or award, the entity
performing the task or award, the amount of federal funds to be
provided, and any restrictions that would prevent the sharing of
information related to the task with the public. In addition, the Web
site on which all or part of the repository resides is to be made
available to, and be searchable by, federal agencies and non-federal
entities, including the general public, and is to facilitate:
* the coordination of federal R&D activities;
* collaboration among those entities conducting federal R&D;
* the transfer of technology among federal agencies, and between
federal agencies and non-federal entities; and:
* access by policy makers and the public to information concerning
federal R&D activities.
The E-Government Act also requires agencies that fund federal R&D to
provide the information needed to populate the repository in the manner
prescribed by the Director of OMB.
The federal government has established, and currently funds, two
governmentwide repositories and Web sites for R&D information that are
available to, and searchable by, federal agencies and the public:
Research and Development in the United States (RaDiUS)[Footnote 14] and
Science.gov.[Footnote 15] RaDiUS is a database that contains
information on federally funded R&D projects. Science.gov provides
information on federal research through links to science Web sites and
scientific databases. The repositories generally contain the type of
information about R&D tasks or awards required by the E-Government Act.
Both are intended to provide the public and agencies with information
about federally funded R&D activities and results.
However, the RaDiUS and Science.gov repositories were incomplete and
not fully populated with information about all federally funded tasks
and awards. Query searches for cyber security research projects on the
RaDiUS repository produced limited results. For example, we found that
(1) as of March 2006, all searches on RaDiUS were limited to awards
that were made during or prior to fiscal year 2004, (2) searches on
RaDiUS for the Department of Homeland Security did not return any cyber-
related results and returned only one project when searching for all
projects, (3) searches on RaDiUS for the National Science Foundation's
Cyber Trust program produced only 8 of the 35 Cyber Trust awards listed
for 2004. In addition, the Federal R&D Project Summaries database at
Science.gov does not include R&D project summaries for the Departments
of Homeland Security and Defense and the National Institute for
Standards and Technology. As a result, the usefulness of the
repositories and Web sites to facilitate the coordination of cyber
security R&D activities, collaboration among researchers, and access to
research information in a timely and efficient manner was limited.
The governmentwide repositories were incomplete and not fully
populated, in part, because OMB had not issued guidance to ensure that
agencies had provided all information required for the repositories.
Although OMB has issued guidance related to improving the public's
access to, and dissemination of, government information and policies
for federal agency public Web sites,[Footnote 16] this guidance does
not specifically address reporting information on all federally funded
research and development projects to the governmentwide repositories.
The E-Government Act specifies that OMB shall issue any guidance
determined necessary to ensure that agencies provide all the
information required by the act. Our search query results (previously
described), and the fact that research and development officials at
several federal agencies were not aware of the RaDiUS repository or Web
site when asked about the existence of a governmentwide repository for
research and development projects indicates that such guidance is
necessary.
Federal Agencies Use Various Methods for Technology Transfer:
Each of the three primary agencies that fund or conduct cyber security
R&D has established technology transfer methods for sharing the results
of the research. The following are examples of how each agency conducts
technology transfer.
* The National Science Foundation essentially relies on the researcher
or grantee to disseminate information about National Science
Foundation- funded research. In accordance with the Bayh-Dole Act, the
National Science Foundation allows grantees to retain principal legal
rights to intellectual property developed under its grants. According
to an agency official, the Grant Policy Manual provides the incentive
to develop and disseminate inventions, software, and publications that
can enhance their usefulness, accessibility, and upkeep. The official
stated that the National Science Foundation's policy does not, however,
reduce the responsibilities of researchers and organizations to make
results, data, and collections available to the research community. It
was the National Science Foundation's expectation that grantees would
share data, collections, software, and inventions, making their
products widely available and useful. The National Science Foundation
grantees are required to submit annual and final project reports to the
agency; these reports include information on dissemination activities
such as publications and conferences.
* The Department of Homeland Security has several methods for
technology transfer, such as attending conferences and workshops and
working with industry in several areas to share information about
emerging threats and R&D needs. In addition, agency officials stated
that their Web site is another way that they share information about
R&D activities.
* The Department of Defense has several programs to encourage the
transfer of technology information. For example, within the academic
world, the Department of Defense uses published peer review journals to
help facilitate information sharing. Within the classified community,
research is shared among the Departments of Defense and Homeland
Security and the intelligence community. The Department of Defense's
small business innovation research and small business technology
transfer programs are used to encourage the transfer of information to
the private sector. In addition, every Armed Service research
laboratory has a technology transfer office. While technology transfer
exists within the Department of Defense, there are instances in which
the Department of Defense does not want research information to be
available to the public because the information could expose
organizational and technological vulnerabilities.
Conclusions:
Several federal entities led by the Office of Science and Technology
Policy and OMB are involved in overseeing, coordinating, funding, or
conducting cyber security R&D. These entities have acted to enhance the
oversight and coordination of federal cyber security R&D, including the
formation of an interagency working group that developed a federal plan
to provide a baseline of information and a technical framework for
coordinated multi-agency R&D in cyber security and information
assurance. However, key elements of the federal research agenda called
for in the National Strategy to Secure Cyberspace have not been
developed, thereby increasing the risk that mid-and longer-term
research priorities may not be achieved. Without sufficient guidance on
reporting R&D information for governmentwide repositories, the
repositories cannot be fully populated with data on all cyber security
research projects, diminishing their usefulness for coordinating
research activities and facilitating technology transfer of research
results. Until these issues are addressed, federal research for cyber
security and information assurance may not keep pace with the
increasing number of threats and vulnerabilities.
Recommendations for Executive Action:
To strengthen cyber security research and development programs, we
recommend that the Director of the Office of Science and Technology
Policy take the following action:
* Establish firm timelines for the completion of the federal cyber
security R&D agenda that includes near-term, mid-term, and long-term
research. Such an agenda should include the following elements:
* timelines and milestones for conducting research and development
activities;
* goals and measures for evaluating research and development
activities;
* assignment of responsibility for implementation, including the
accomplishment of the focus areas and suggested research priorities;
and:
* the alignment of funding priorities with technical priorities.
We also recommend that the Director of the Office of Management and
Budget implement the following action:
* Issue guidance to agencies on reporting information about federally
funded cyber security R&D projects to the governmentwide repositories.
Agency Comments and Our Evaluation:
A Senior Policy Analyst in the Office of Science and Technology Policy
provided technical comments on a draft of this report, but did not
comment on our recommendation that the office establish timelines for
the completion of the federal cyber security R&D agenda. We have
considered and incorporated the technical comments into the report as
appropriate.
In providing oral comments on a draft of this report, OMB officials
stated that OMB's August 2006 Fiscal Year 2006 E-Government Act
Reporting Instructions require agencies that fund federal R&D
activities to describe how they fulfill their responsibilities under
section 207(g) of the E-Government Act, including how their R&D
information is available through RaDiUS, science.gov, or other means.
The officials stated that after reviewing the agencies' reports and
other information, they will consider whether specific guidance is
necessary to further ensure agencies provide all R&D information as
required under section 207(g) of the E-Government Act.
In addition, they were concerned with the report's limited scope--cyber
security R&D--and stated that the requirement to specify and report
cyber security as a separate category of R&D is a recent change and
therefore might bias the report's findings. We acknowledge that the
scope of our review was limited to cyber security R&D which is why we
limited the scope of our findings and recommendations to cyber security
R&D. The recent change in reporting requirements relates to the
reporting of budgetary information and does not affect our finding on
reporting project information to the central repositories.
The National Science Foundation and the National Institute of Standards
and Technology provided technical comments, which we have incorporated
into the report as appropriate.
As agreed with your offices, unless you publicly announce the contents
of this report earlier, we plan no further distribution until 30 days
from the date of this letter. At that time, we will then send copies of
this report to the Directors of the Office of Science and Technology
Policy, OMB, and National Science Foundation; to the Secretaries of the
Departments of Homeland Security and Defense; and to other interested
parties. In addition, the report will be available at no charge on the
GAO Web site at [Hyperlink, http://www.gao.gov].
If you or members of your staff have questions about this report,
please contact Gregory C. Wilshusen at (202) 512-6244 or Keith A.
Rhodes at (202) 512-6412. We can also be reached by e-mail at
wilshuseng@gao.gov and rhodesk@gao.gov, respectively. Contact points
for our Offices of Congressional Relations and Public Affairs may be
found on the last page of this report. GAO staff who made major
contributions to this report are listed in appendix II.
Sincerely yours,
Signed by:
Gregory C. Wilshusen:
Director, Information Security Issues:
Signed by:
Keith A. Rhodes:
Chief Technologist:
[End of section]
Appendix I: Objectives, Scope, and Methodology:
Our objectives were to identify the (1) federal agencies that are
involved with cyber security research and development (R&D); (2)
actions taken to improve oversight and coordination of cyber security
research and development, including the development of a federal
research agenda; and (3) methods used for technology transfer at the
agencies with significant activities in cyber security research and
development.
To identify which agencies are involved in federal cyber security R&D,
we researched a key report on cyber security R&D from the President's
Information Technology Advisory Committee. We also analyzed relevant
federal law and policy, including the Cyber Security Research and
Development Act, the National Strategy to Secure Cyberspace, and
Homeland Security Presidential Directive 7; we also reviewed our prior
reports. We then reviewed budget documents from the Subcommittee on
Networking and Information Technology Research and Development (NITRD)
to determine the key agencies that fund and conduct cyber security R&D.
To identify actions taken to improve oversight and coordination of
federal cyber security R&D, including the development of a
governmentwide research agenda, we interviewed officials at the
National Science Foundation, the National Institute of Standards and
Technology, the National Security Agency, the Departments of Defense
and Homeland Security, the Subcommittee on NITRD, the Technical Support
Working Group, the Office of Science and Technology Policy, and the
Infosec Research Council. We also reviewed NITRD budgetary documents,
examined federal policy, reviewed the Office of Management and Budget
reports and guidance, observed meetings and reviewed meeting agendas
and minutes to determine the extent of coordination for federal cyber
security R&D. To evaluate the development of a governmentwide research
agenda, we reviewed the National Strategy to Secure Cyberspace to
determine the requirements for the annual federal cyber security R&D
agenda and compared them to the Federal Plan for Cyber Security and
Information Assurance Research and Development issued by the
Interagency Working Group on Cyber Security and Information Assurance.
To evaluate the completeness of the RaDiUS repository, in March 2006,
we executed search queries on "cybersecurity", "cyber security",
"cyber", "cyber trust" and "information assurance" to determine whether
the database contained cyber-related program data for the federal
agencies. To evaluate the completeness of the Science.gov repositories,
in August and September 2006, we executed search queries on
"cybersecurity", "cyber security", and "information assurance" to
determine whether the database contained cyber-related program data for
the federal agencies. We compared the results to the list of cyber
projects provided by the individual agencies. We did not validate the
data returned with the agencies conducting cyber security research. In
addition, we analyzed relevant laws, including the E-Government Act of
2002 and interviewed officials at the National Science Foundation, the
National Institute of Standards and Technology, the National Security
Agency, and the Departments of Defense and Homeland Security to
evaluate the completeness of the two mandated governmentwide
repositories.
To identify methods used for technology transfer at the agencies with
significant cyber security research activities, we identified the
agencies and other groups that have responsibility for management and
oversight of federal cyber security R&D, interviewed officials at these
agencies to determine their methods for technology transfer, and
reviewed agency policies on technology transfer. We also analyzed
relevant laws, including the Bayh-Dole Act.
We conducted our work from August 2005 through August 2006 in
accordance with generally accepted government auditing standards.
[End of section]
Appendix II: GAO Contacts and Staff Acknowledgments:
GAO Contacts:
Gregory C. Wilshusen, (202) 512-6244 or wilshuseng@gao.gov:
Keith A. Rhodes, (202) 512-6412 or rhodesk@gao.gov:
Staff Acknowledgments:
In addition to the individuals named above, Kristi Dorsey, Nalani
Fraser, Nancy Glover, Richard Hung, Anjalique Lawrence, and Suzanne
Lightman were key contributors to this report.
(310563):
[End of section]
FOOTNOTES
[1] A vulnerability is a flaw or weakness in hardware or software that
can be exploited, resulting in a violation of an implicit or explicit
security policy.
[2] Cyber security refers to the defense against attacks on the
information technology infrastructure of an organization, or, in this
case, of the federal government and agencies. Cyber security is
intertwined with the physical security of assets--from computers,
networks, and their infrastructure to the environment surrounding these
systems. While both parts of security are necessary to achieve overall
security, this report focuses on protecting software and data from
attacks that are electronic in nature and that typically arrive over a
data communication link. Cyber security is a major concern of both the
federal government and the private sector.
[3] GAO, Technology Assessment: Cyber Security for Critical
Infrastructure Protection, GAO-04-321 (Washington, D.C.: May 28, 2004).
[4] The CERT®/CC is a center of Internet security expertise at the
Software Engineering Institute, a federally funded research and
development center operated by Carnegie Mellon University.
[5] Pub. L. 94-282, Presidential Science and Technology Advisory
Organization Act, May 11, 1976.
[6] The Council's membership includes the Disruptive Technology Office,
the Central Intelligence Agency, component agencies of the Department
of Defense, the Departments of Energy and Homeland Security, the
Federal Aviation Administration, the National Aeronautics and Space
Administration, the National Institutes of Health, the National
Institute of Standards and Technology, the National Science Foundation,
and the Technical Support Working Group.
[7] The November 2005 InfoSec Research Council Hard Problems List is
publicly available at: http://www.infosec-research.org/documents.html.
[8] Infrastructure Protection subgroup members include the
Environmental Protection Agency, the Nuclear Regulatory Commission, and
component agencies of the Departments of Agriculture, Commerce,
Defense, Energy, Homeland Security, Justice, and Transportation.
[9] Near-term is defined as 1-3 years.
[10] The Disruptive Technology Office, formerly the Advanced Research
and Development Activity, moved to the office of the Director of
National Intelligence in January 2006. The budget source has also
moved.
[11] Interagency Working Group on Cyber Security and Information
Assurance, Federal Plan for Cyber Security and Information Assurance
Research and Development (Washington, D.C.: April 2006).
[12] The President's Information Technology Advisory Committee listed,
as an objective for achieving its recommendation, the systematic
collection of data on cyber security R&D efforts throughout the federal
government.
[13] Section 207 (g) Pub. L. 107-347, December 17, 2002.
[14] Access to RaDiUS is available at https://radius.rand.org.
[15] The Science.gov Federal R&D Project Summaries provides a portal to
more than 750,000 Federal research projects, complete with full-text
single-query searching across databases residing at different agencies.
The portal, a product of the Department of Energy's Office of
Scientific and Technical Information, uses research summary and awards
data from the Department of Energy, the National Institutes of Health,
the National Science Foundation, the Environmental Protection Agency,
the Small Business Administration, and the U.S. Department of
Agriculture. Access to Science.gov is available at
http://www.science.gov.
[16] The Office of Management and Budget, Improving Public Access to
and Dissemination of Government Information and Using the Federal
Enterprise Architecture Data Reference Model (Washington, D.C.: Dec.
16, 2005) and Policies for Federal Agency Public Websites (Washington,
D.C.: Dec. 17, 2004).
GAO's Mission:
The Government Accountability Office, the investigative arm of
Congress, exists to support Congress in meeting its constitutional
responsibilities and to help improve the performance and accountability
of the federal government for the American people. GAO examines the use
of public funds; evaluates federal programs and policies; and provides
analyses, recommendations, and other assistance to help Congress make
informed oversight, policy, and funding decisions. GAO's commitment to
good government is reflected in its core values of accountability,
integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through the Internet. GAO's Web site ( www.gao.gov ) contains
abstracts and full-text files of current reports and testimony and an
expanding archive of older products. The Web site features a search
engine to help you locate documents using key words and phrases. You
can print these documents in their entirety, including charts and other
graphics.
Each day, GAO issues a list of newly released reports, testimony, and
correspondence. GAO posts this list, known as "Today's Reports," on its
Web site daily. The list contains links to the full-text document
files. To have GAO e-mail this list to you every afternoon, go to
www.gao.gov and select "Subscribe to e-mail alerts" under the "Order
GAO Products" heading.
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. Government Accountability Office
441 G Street NW, Room LM
Washington, D.C. 20548:
To order by Phone:
Voice: (202) 512-6000:
TDD: (202) 512-2537:
Fax: (202) 512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: www.gao.gov/fraudnet/fraudnet.htm
E-mail: fraudnet@gao.gov
Automated answering system: (800) 424-5454 or (202) 512-7470:
Public Affairs:
Jeff Nelligan, managing director,
NelliganJ@gao.gov
(202) 512-4800
U.S. Government Accountability Office,
441 G Street NW, Room 7149
Washington, D.C. 20548: