Critical Infrastructure Protection
Key Private and Public Cyber Expectations Need to Be Consistently Addressed
Gao ID: GAO-10-628 July 15, 2010
Pervasive and sustained computer-based attacks pose a potentially devastating impact to systems and operations and the critical infrastructures they support. Addressing these threats depends on effective partnerships between the government and private sector owners and operators of critical infrastructure. Federal policy, including the Department of Homeland Security's (DHS) National Infrastructure Protection Plan, calls for a partnership model that includes public and private councils to coordinate policy and information sharing and analysis centers to gather and disseminate information on threats to physical and cyber-related infrastructure. GAO was asked to determine (1) private sector stakeholders' expectations for cyber-related, public-private partnerships and to what extent these expectations are being met and (2) public sector stakeholders' expectations for cyber-related, public-private partnerships and to what extent these expectations are being met. To do this, GAO conducted surveys and interviews of public and private sector officials and analyzed relevant policies and other documents.
Private sector stakeholders reported that they expect their federal partners to provide usable, timely, and actionable cyber threat information and alerts; access to sensitive or classified information; a secure mechanism for sharing information; security clearances; and a single centralized government cybersecurity organization to coordinate government efforts. However, according to private sector stakeholders, federal partners are not consistently meeting these expectations. For example, less than one-third of private sector respondents reported that they were receiving actionable cyber threat information and alerts to a great or moderate extent. Federal partners are taking steps that may address the key expectations of the private sector, including developing new information-sharing arrangements. However, while the ongoing efforts may address the public sector's ability to meet the private sector's expectations, much work remains to fully implement improved information sharing. Public sector stakeholders reported that they expect the private sector to provide a commitment to execute plans and recommendations, timely and actionable cyber threat information and alerts, and appropriate staff and resources. Four of the five public sector councils that GAO held structured interviews with reported that their respective private sector partners are committed to executing plans and recommendations and providing timely and actionable information. However, public sector council officials stated that improvements could be made to the partnership, including improving private sector sharing of sensitive information. Some private sector stakeholders do not want to share their proprietary information with the federal government for fear of public disclosure and potential loss of market share, among other reasons. Without improvements in meeting private and public sector expectations, the partnerships will remain less than optimal, and there is a risk that owners of critical infrastructure will not have the information necessary to thwart cyber attacks that could have catastrophic effects on our nation's cyber-reliant critical infrastructure. GAO recommends that the national Cybersecurity Coordinator and DHS work with their federal and private sector partners to enhance information-sharing efforts. The national Cybersecurity Coordinator provided no comments on a draft of this report. DHS concurred with GAO's recommendations.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
David A. Powner
Team:
Government Accountability Office: Information Technology
Phone:
(202) 512-9286
GAO-10-628, Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed
This is the accessible text file for GAO report number GAO-10-628
entitled 'Critical Infrastructure Protection: Key Private and Public
Cyber Expectations Need to Be Consistently Addressed' which was
released on August 16, 2010.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as
part of a longer term project to improve GAO products' accessibility.
Every attempt has been made to maintain the structural and data
integrity of the original printed product. Accessibility features,
such as text descriptions of tables, consecutively numbered footnotes
placed at the end of the file, and the text of agency comment letters,
are provided but may not exactly duplicate the presentation or format
of the printed version. The portable document format (PDF) file is an
exact electronic replica of the printed version. We welcome your
feedback. Please E-mail your comments regarding the contents or
accessibility features of this document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Report to Congressional Requesters:
United States Government Accountability Office:
GAO:
July 2010:
Critical Infrastructure Protection:
Key Private and Public Cyber Expectations Need to Be Consistently
Addressed:
GAO-10-628:
GAO Highlights:
Highlights of GAO-10-628, a report to congressional requesters.
Why GAO Did This Study:
Pervasive and sustained computer-based attacks pose a potentially
devastating impact to systems and operations and the critical
infrastructures they support. Addressing these threats depends on
effective partnerships between the government and private sector
owners and operators of critical infrastructure. Federal policy,
including the Department of Homeland Security‘s (DHS) National
Infrastructure Protection Plan, calls for a partnership model that
includes public and private councils to coordinate policy and
information sharing and analysis centers to gather and disseminate
information on threats to physical and cyber-related infrastructure.
GAO was asked to determine (1) private sector stakeholders‘
expectations for cyber-related, public-private partnerships and to
what extent these expectations are being met and (2) public sector
stakeholders‘ expectations for cyber-related, public-private
partnerships and to what extent these expectations are being met. To
do this, GAO conducted surveys and interviews of public and private
sector officials and analyzed relevant policies and other documents.
What GAO Found:
Private sector stakeholders reported that they expect their federal
partners to provide usable, timely, and actionable cyber threat
information and alerts; access to sensitive or classified information;
a secure mechanism for sharing information; security clearances; and a
single centralized government cybersecurity organization to coordinate
government efforts. However, according to private sector stakeholders,
federal partners are not consistently meeting these expectations. For
example, less than one-third of private sector respondents reported
that they were receiving actionable cyber threat information and
alerts to a great or moderate extent. (See table below.) Federal
partners are taking steps that may address the key expectations of the
private sector, including developing new information-sharing
arrangements. However, while the ongoing efforts may address the
public sector‘s ability to meet the private sector‘s expectations,
much work remains to fully implement improved information sharing.
Table: Private Sector Expected Services and the Extent to Which They
Are Met:
Service: Timely and actionable cyber threat information;
Greatly or moderately expected: 98%;
Greatly or moderately received: 27%.
Service: Timely and actionable cyber alerts;
Greatly or moderately expected: 96%;
Greatly or moderately received: 27%.
Service: Access to actionable classified or sensitive information
(such as intelligence and law enforcement information);
Greatly or moderately expected: 87%;
Greatly or moderately received: 16%.
Service: A secure information-sharing mechanism;
Greatly or moderately expected: 78%;
Greatly or moderately received: 21%.
Source: GAO analysis based on survey data of 56 private sector
respondents.
[End of table]
Public sector stakeholders reported that they expect the private
sector to provide a commitment to execute plans and recommendations,
timely and actionable cyber threat information and alerts, and
appropriate staff and resources. Four of the five public sector
councils that GAO held structured interviews with reported that their
respective private sector partners are committed to executing plans
and recommendations and providing timely and actionable information.
However, public sector council officials stated that improvements
could be made to the partnership, including improving private sector
sharing of sensitive information. Some private sector stakeholders do
not want to share their proprietary information with the federal
government for fear of public disclosure and potential loss of market
share, among other reasons.
Without improvements in meeting private and public sector
expectations, the partnerships will remain less than optimal, and
there is a risk that owners of critical infrastructure will not have
the information necessary to thwart cyber attacks that could have
catastrophic effects on our nation‘s cyber-reliant critical
infrastructure.
What GAO Recommends:
GAO recommends that the national Cybersecurity Coordinator and DHS
work with their federal and private sector partners to enhance
information-sharing efforts. The national Cybersecurity Coordinator
provided no comments on a draft of this report. DHS concurred with
GAO‘s recommendations.
View [hyperlink, http://www.gao.gov/products/GAO-10-628] or key
components. For more information, contact David A. Powner at (202) 512-
9286 or pownerd@gao.gov.
[End of section]
Contents:
Letter:
Background:
Private Sector Stakeholders Expect Information on Threats, Alerts, and
Other Related Services but Believe Federal Partners Are Not
Consistently Providing:
Public Sector Stakeholders Expect Threat Information and Commitment,
Which the Private Sector Is Generally Providing:
Conclusions:
Recommendations for Executive Action:
Agency Comments and Our Evaluation:
Appendix I: Objectives, Scope, and Methodology:
Appendix II: Comments from the Department of Homeland Security:
Appendix III: GAO Contact and Staff Acknowledgments:
Tables:
Table 1: Sources of Cybersecurity Threats:
Table 2: Types of Cyber Exploits:
Table 3: Sector-Specific Agencies and Assigned Sectors:
Table 4: Key Private Sector Expected Services Based on Survey Results:
Table 5: Private Sector Respondent Views on the Extent to Which
Federal Partners Are Providing Expected Services:
Table 6: Key Government Coordinating Councils' Expected Services from
the Private Sector:
Table 7: Extent to Which the Private Sector Is Providing the
Government Coordinating Councils' Expected Services:
Abbreviations:
CIP: critical infrastructure protection:
DHS: Department of Homeland Security:
DIB: Defense Industrial Base:
DOE: Department of Energy:
DOD: Department of Defense:
HSPD-7: Homeland Security Presidential Directive 7:
IT: information technology:
ISAC: information-sharing and analysis center:
NIPP: National Infrastructure Protection Plan:
PDD-63: Presidential Decision Directive 63:
US-CERT: United States Computer Emergency Readiness Team:
[End of section]
United States Government Accountability Office:
Washington, DC 20548:
July 15, 2010:
Congressional Requesters:
Recent cyber attacks on corporations of the United States and federal
agencies highlight the threats posed by the worldwide connection of
our networks. Because the private sector owns most of the nation's
critical infrastructure--such as banking and financial institutions,
telecommunications networks, and energy production and transmission
facilities--it is vital that the public and private sectors form
effective partnerships to successfully protect these cyber-reliant
critical assets from a multitude of threats including terrorists,
criminals, and hostile nations.[Footnote 1]
Federal policy establishes various mechanisms for the development of
public-private partnerships. The National Infrastructure Protection
Plan (NIPP) describes a partnership model as the primary means of
coordinating government and private sector efforts to protect critical
infrastructure.[Footnote 2] For each sector, the model requires
formation of government coordinating councils (government councils)--
composed of federal, state, local, or tribal agencies with purview
over critical sectors--and encourages voluntary formation of sector
coordinating councils (sector councils)--composed of owner-operators
of these critical assets (some of which may be state or local
agencies) or their respective trade associations.[Footnote 3] These
councils create the structure through which representative groups from
all levels of government and the private sector are to collaborate in
planning and implementing efforts to protect critical infrastructure.
The sector councils are envisioned to be policy-related and to
represent a primary point of contact for government to plan the entire
range of infrastructure protection activities, including those
associated with mitigating cyber threats. The councils' functions are
distinct from those of the private sector information-sharing and
analysis centers (ISAC) that were established to serve an operational
role such as providing mechanisms for gathering, analyzing, and
disseminating information on physical and cyber-related infrastructure
threats and vulnerabilities to and from private infrastructure sectors
and the government.
Our objectives were to determine (1) private sector stakeholders'
expectations for cyber-related, public-private partnerships and to
what extent these expectations are being met and (2) public sector
stakeholders' expectations for cyber-related, public-private
partnerships and to what extent these expectations are being met.
[Footnote 4]
To determine private sector expectations and to what extent these
expectations are being met, we collected and analyzed documents
related to the formation of public-private partnerships and their
actions, conducted structured interviews, and surveyed 56 private
sector representatives from the following cyber-reliant critical
infrastructure sectors: (1) banking and finance, (2) communications,
(3) defense industrial base (DIB), (4) energy, and (5) information
technology (IT). The surveyed representatives were members of the
ISACs and sector councils and were solicited by the leadership of
those organizations to participate in our survey. To determine public
sector stakeholders' expectations for cyber-related, public-private
partnerships and to what extent these expectations are being met, we
collected and analyzed various documents and conducted structured
interviews with government councils' representatives associated with
the same cyber-reliant critical sectors mentioned above. We also
interviewed several additional individuals with specialized expertise
in the cyber-critical infrastructure protection public-private
partnership model. Our findings and conclusions are based on
information gathered from the five cyber-reliant critical sectors and
are not generalizable to a larger population. Further details of our
objectives, scope, and methodology are provided in appendix I.
We conducted this performance audit from June 2009 to July 2010, in
accordance with generally accepted government auditing standards.
Those standards require that we plan and perform the audit to obtain
sufficient, appropriate evidence to provide a reasonable basis for our
findings and conclusions based on our audit objectives. We believe
that the evidence obtained provides a reasonable basis for our
findings and conclusions based on our audit objectives.
Background:
Public and private organizations rely on computer systems to transfer
increasing amounts of money; sensitive, proprietary economic and
commercial information; and classified and sensitive but unclassified
defense and intelligence information. The increased transfer of
critical information increases the risk that malicious individuals
will attempt to disrupt or disable our nation's critical
infrastructures and obtain sensitive and critical information for
malicious purposes. To address the threats to the nation's cyber-
reliant critical infrastructure, federal policy emphasizes the
importance of public-private coordination.
Cyber Threats and Incidents Adversely Affect the Nation's Critical
Infrastructure:
Different types of cyber threats from numerous sources may adversely
affect computers, software, a network, an agency's operations, an
industry, or the Internet itself. Cyber threats can be unintentional
or intentional. Unintentional threats can be caused by software
upgrades or maintenance procedures that inadvertently disrupt systems.
Intentional threats include both targeted and untargeted attacks.
Attacks can come from a variety of sources, including criminal groups,
hackers, and terrorists. Table 1 lists sources of threats that have
been identified by the U.S. intelligence community and others.
Table 1: Sources of Cybersecurity Threats:
Threat: Bot-network operators;
Description: Bot-network operators use a network, or bot-net, of
compromised, remotely controlled systems to coordinate attacks and to
distribute phishing schemes, spam, and malware attacks. The services
of these networks are sometimes made available on underground markets
(e.g., purchasing a denial-of-service attack or servers to relay spam
or phishing attacks).
Threat: Criminal groups;
Description: Criminal groups seek to attack systems for monetary gain.
Specifically, organized criminal groups use spam, phishing, and
spyware/malware to commit identity theft and online fraud.
International corporate spies and organized criminal organizations
also pose a threat to the United States through their ability to
conduct industrial espionage and large-scale monetary theft and to
hire or develop hacker talent.
Threat: Hackers;
Description: Hackers break into networks for the thrill of the
challenge, bragging rights in the hacker community, revenge, stalking
others, and monetary gain, among other reasons. While gaining
unauthorized access once required a fair amount of skill or computer
knowledge, hackers can now download attack scripts and protocols from
the Internet and launch them against victim sites. Thus, while attack
tools have become more sophisticated, they have also become easier to
use. According to the Central Intelligence Agency, the large majority
of hackers do not have the requisite expertise to threaten difficult
targets such as critical U.S. networks. Nevertheless, the worldwide
population of hackers poses a relatively high threat of an isolated or
brief disruption causing serious damage.
Threat: Insiders;
Description: The disgruntled organization insider is a principal
source of computer crime. Insiders may not need a great deal of
knowledge about computer intrusions because their knowledge of a
target system often allows them to gain unrestricted access to cause
damage to the system or to steal system data. The insider threat also
includes contractors hired by the organization, as well as employees
who accidentally introduce malware into systems.
Threat: Nations;
Description: Nations use cyber tools as part of their information-
gathering and espionage activities. In addition, several nations are
aggressively working to develop information warfare doctrine,
programs, and capabilities. Such capabilities enable a single entity
to have a significant and serious impact by disrupting the supply,
communications, and economic infrastructures that support military
power--impacts that could affect the daily lives of U.S. citizens
across the country.
Threat: Phishers;
Description: Individuals, or small groups, execute phishing schemes in
an attempt to steal identities or information for monetary gain.
Phishers may also use spam and spyware/malware to accomplish their
objectives.
Threat: Spammers;
Description: Individuals or organizations distribute unsolicited e-
mail with hidden or false information in order to sell products,
conduct phishing schemes, distribute spyware/malware, or attack
organizations (i.e., denial of service).
Threat: Spyware/malware authors;
Description: Individuals or organizations with malicious intent carry
out attacks against users by producing and distributing spyware and
malware. Several destructive computer viruses and worms have harmed
files and hard drives, including the Melissa Macro Virus, the
Explore.Zip worm, the CIH (Chernobyl) Virus, Nimda, Code Red, Slammer,
and Blaster.
Threat: Terrorists;
Description: Terrorists seek to destroy, incapacitate, or exploit
critical infrastructures in order to threaten national security, cause
mass casualties, weaken the U.S. economy, and damage public morale and
confidence. Terrorists may use phishing schemes or spyware/malware in
order to generate funds or gather sensitive information.
Sources: GAO analysis based on data from the Director of National
Intelligence, Department of Justice, Federal Bureau of Investigation,
the Central Intelligence Agency, and the Software Engineering
Institute's CERTŪ Coordination Center.
[End of table]
Different types of cyber threats can use various cyber exploits that
may adversely affect computers, software, a network, an agency's
operations, an industry, or the Internet itself (see table 2). Groups
or individuals may intentionally deploy cyber exploits targeting a
specific cyber asset or attack through the Internet using a virus,
worm, or malware with no specific target.
Table 2: Types of Cyber Exploits:
Type of exploit: Denial-of-service;
Description: A method of attack from a single source that denies
system access to legitimate users by overwhelming the target computer
with messages and blocking legitimate traffic. It can prevent a system
from being able to exchange data with other systems or use the
Internet.
Type of exploit: Distributed denial-of-service;
Description: A variant of the denial-of-service attack that uses a
coordinated attack from a distributed system of computers rather than
from a single source. It often makes use of worms to spread to
multiple computers that can then attack the target.
Type of exploit: Exploit tools;
Description: Publicly available and sophisticated tools that intruders
of various skill levels can use to determine vulnerabilities and gain
entry into targeted systems.
Type of exploit: Logic bombs;
Description: A form of sabotage in which a programmer inserts code
that causes the program to perform a destructive action when some
triggering event occurs, such as terminating the programmer's
employment.
Type of exploit: Phishing;
Description: The creation and use of e-mails and Web sites--designed
to look like those of well-known legitimate businesses, financial
institutions, and government agencies--in order to deceive Internet
users into disclosing their personal data, such as bank and financial
account information and passwords. The phishers then use that
information for criminal purposes, such as identity theft and fraud.
Type of exploit: Sniffer;
Description: Synonymous with packet sniffer. A program that intercepts
routed data and examines each packet in search of specified
information, such as passwords transmitted in clear text.
Type of exploit: Trojan horse;
Description: A computer program that conceals harmful code. A Trojan
horse usually masquerades as a useful program that a user would wish
to execute.
Type of exploit: Virus;
Description: A program that infects computer files, usually executable
programs, by inserting a copy of itself into the file. These copies
are usually executed when the infected file is loaded into memory,
allowing the virus to infect other files. Unlike a computer worm, a
virus requires human involvement (usually unwitting) to propagate.
Type of exploit: Vishing;
Description: A method of phishing based on voice-over-Internet-
Protocol technology and open-source call center software that have
made it inexpensive for scammers to set up phony call centers and
criminals to send e-mail or text messages to potential victims, saying
there has been a security problem, and they need to call their bank to
reactivate a credit or debit card, or send text messages to cell
phones, instructing potential victims to contact fake online banks to
renew their accounts.
Type of exploit: War driving;
Description: A method of gaining entry into wireless computer networks
using a laptop, antennas, and a wireless network adapter that involves
patrolling locations to gain unauthorized access.
Type of exploit: Worm;
Description: An independent computer program that reproduces by
copying itself from one system to another across a network. Unlike
computer viruses, worms do not require human involvement to propagate.
Type of exploit: Zero-day exploit;
Description: A cyber threat taking advantage of a security
vulnerability on the same day that the vulnerability becomes known to
the general public and for which there are no available fixes.
Sources: GAO analysis of data from GAO and industry reports.
[End of table]
Recent reports of cyber attacks illustrate that such attacks could
have a debilitating impact on national and economic security and on
public health and safety.
* In May 2007, Estonia was the reported target of a denial-of-service
cyber attack with national consequences. The coordinated attack
created mass outages of its government and commercial Web sites.
[Footnote 5]
* In March 2008, the Department of Defense (DOD) reported that, in
2007, computer networks operated by the department, other federal
agencies, and defense-related think tanks and contractors were targets
of computer network intrusion. Although those responsible were not
definitively identified, the attacks appeared to have originated in
China.[Footnote 6]
* In January 2010, it was reported that at least 30 technology
companies--most in Silicon Valley, California--were victims of
intrusions. The cyber attackers gained unauthorized access to files
that may have included the companies' computer security systems,
crucial corporate data, and software source code.[Footnote 7]
* In January 2010, a California-based company filed suit alleging that
two Chinese companies stole software code and then distributed it to
tens of millions of end users as part of Chinese government-sponsored
filtering software. The company is seeking more than $2.2 billion
dollars. Academic researchers found that portions of the company's
software code had been copied and used in initial versions of the
Chinese software.[Footnote 8]
* Based on an 8-month investigation, researchers reported that
computer systems in India were attacked. The suspected cyberattackers
remotely connected to Indian computers using social networks to
install bot-networks that infiltrated and infected Indian computers
with malware. The incidents were reported to have been traced back to
an underground espionage organization that was able to steal sensitive
national security and defense information.[Footnote 9]
Critical Infrastructure Protection Policy Emphasizes Private and
Public Sector Coordination:
Federal law and policy call for critical infrastructure protection
activities that are intended to enhance the cyber and physical
security of both the public and private infrastructures that are
essential to national security, national economic security, and
national public health and safety. Federal policies address the
importance of coordination between the government and the private
sector to protect the nation's computer-reliant critical
infrastructure. These policies establish critical infrastructure
sectors, assign agencies to each sector (sector lead agencies), and
encourage private sector involvement. For example, the Department of
the Treasury is responsible for the banking and finance sector, while
the Department of Energy (DOE) is responsible for the energy sector.
Table 3 lists agencies and their assigned sector.
Table 3: Sector-Specific Agencies and Assigned Sectors:
Sector-specific agency: Department of Agriculture;
Department of Health and Human Services;
Critical infrastructure sector: Agriculture and food.
Sector-specific agency: Department of Defense;
Critical infrastructure sector: DIB.
Sector-specific agency: Department of Energy;
Critical infrastructure sector: Energy.
Sector-specific agency: Department of Health and Human Services;
Critical infrastructure sector: Health care and public health.
Sector-specific agency: Department of the Interior;
Critical infrastructure sector: National monuments and icons.
Sector-specific agency: Department of the Treasury;
Critical infrastructure sector: Banking and finance.
Sector-specific agency: Department of Homeland Security;
Critical infrastructure sector: Chemical; Commercial facilities;
Critical manufacturing; Dams; Emergency services; Nuclear reactors,
materials, and waste IT; Communications; Postal and shipping;
Transportation systems; Government facilities.
Sector-specific agency: Environmental Protection Agency;
Critical infrastructure sector: Water.
Source: National Infrastructure Protection Plan.
[End of table]
In May 1998, Presidential Decision Directive 63 (PDD-63) established
critical infrastructure protection (CIP) as a national goal and
presented a strategy for cooperative efforts by the government and the
private sector to protect the physical and cyber-based systems
essential to the minimum operations of the economy and the government.
[Footnote 10] Among other things, this directive encouraged the
development of ISACs to serve as mechanisms for gathering, analyzing,
and disseminating information on cyber infrastructure threats and
vulnerabilities to and from owners and operators of the sectors and
the federal government. For example, the Financial Services,
Electricity Sector, IT, and Communications ISACs represent sectors or
subcomponents of sectors. However, not all sectors have ISACs. For
example, according to private sector officials, the DIB sector and the
subcomponents of the energy sector, besides electricity, do not have
established ISACs.
The Homeland Security Act of 2002 created the Department of Homeland
Security (DHS).[Footnote 11] In addition, among other things, it
assigned the department the following CIP responsibilities: (1)
developing a comprehensive national plan for securing the key
resources and critical infrastructures of the United States; (2)
recommending measures to protect the key resources and critical
infrastructures of the United States in coordination with other
groups; and (3) disseminating, as appropriate, information to assist
in the deterrence, prevention, and preemption of or response to
terrorist attacks.
In 2003, The National Strategy to Secure Cyberspace was issued, which
assigned DHS multiple leadership roles and responsibilities in this
CIP area.[Footnote 12] They include (1) developing a comprehensive
national plan for CIP, including cybersecurity; (2) developing and
enhancing national cyber analysis and warning capabilities; (3)
providing and coordinating incident response and recovery planning,
including conducting incident response exercises; (4) identifying,
assessing, and supporting efforts to reduce cyber threats and
vulnerabilities, including those associated with infrastructure
control systems; and (5) strengthening international cyberspace
security.
PDD-63 was superseded in December 2003 when Homeland Security
Presidential Directive 7 (HSPD-7) was issued.[Footnote 13] HSPD-7
defined additional responsibilities for DHS, federal agencies focused
on specific critical infrastructure sectors (sector-specific
agencies), and other departments and agencies. HSPD-7 instructs these
sector-specific agencies to identify, prioritize, and coordinate the
protection of critical infrastructure to prevent, deter, and mitigate
the effects of attacks. HSPD-7 makes DHS responsible for, among other
things, coordinating national CIP efforts and establishing uniform
policies, approaches, guidelines, and methodologies for integrating
federal infrastructure protection and risk management activities
within and across sectors.
As part of its implementation of the cyberspace strategy and other
requirements to establish cyber analysis and warning capabilities for
the nation, DHS established the United States Computer Emergency
Readiness Team (US-CERT) to help protect the nation's information
infrastructure. US-CERT is the focal point for the government's
interaction with federal and private-sector entities 24-hours-a-day, 7-
days-a-week, and provides cyber-related analysis, warning, information-
sharing, major incident response, and national-level recovery efforts.
It is charged with aggregating and disseminating cybersecurity
information to improve warning of and response to incidents,
increasing coordination of response information, reducing
vulnerabilities, and enhancing prevention and protection. In addition,
the organization is to collect incident reports from all federal
agencies and assist agencies in their incident response efforts. It is
also to accept incident reports when voluntarily submitted by other
public and private entities and assist them in their response efforts,
as requested.
In addition, as part of its responsibilities, DHS first issued the
NIPP in 2006 and then updated it in 2009. The NIPP is intended to
provide the framework for a coordinated national approach to address
the full range of physical, cyber, and human threats and
vulnerabilities that pose risks to the nation's critical
infrastructure. The NIPP relies on a sector partnership model as the
primary means of coordinating government and private sector CIP
efforts. Under this model, each sector has both a government council
and a private sector council to address sector-specific planning and
coordination. The government and private sector councils are to work
in tandem to create the context, framework, and support for
coordination and information-sharing activities required to implement
and sustain that sector's CIP efforts. The council framework allows
for the involvement of representatives from all levels of government
and the private sector, so that collaboration and information-sharing
can occur to assess events accurately, formulate risk assessments, and
determine appropriate protective measures.
The government councils are to coordinate strategies, activities,
policies, and communications across government entities within each
sector. Each government council is to be composed of representatives
from various levels of government (i.e., federal, state, local, and
tribal) as appropriate to the security needs of each individual
sector. In addition, a representative from the sector-specific agency
is to chair the council and is to provide cross-sector coordination
with each of the member governments. For example, DOE in its role as
the sector-specific agency for the energy sector has established and
chairs a government council.
The establishment of private sector councils (sector councils) is
encouraged under the NIPP model, and these councils are to be the
principal entities for coordinating with the government on a wide
range of CIP activities and issues. Under the model, critical asset
owners and operators are encouraged to be involved in the creation of
sector councils that are self-organized, self-run, and self-governed,
with a spokesperson designated by the sector membership. Specific
membership can vary from sector to sector but should be representative
of a broad base of owners, operators, associations, and other
entities--both large and small--within the sector. For example, the
banking and finance sector has established the Financial Services
Sector Coordinating Council for Critical Infrastructure Protection and
Homeland Security, which is made up of over 40 entities, including
banks, insurance companies, and industry associations.
Most recently, the White House issued the Cyberspace Policy Review
that, among other things, recommended that the White House appoint a
cybersecurity policy official for coordinating the nation's
cybersecurity policies and activities.[Footnote 14] Subsequently, in
December 2009, the President appointed a Special Assistant to the
President and Cybersecurity Coordinator, referred to as the
Cybersecurity Coordinator in this report, to be the central
coordinator of federal government cybersecurity-related activities.
Using the NIPP partnership model, the private and public sectors
coordinate to manage the risks related to cyber CIP. This coordination
includes sharing information, conducting exercises, and providing
resources.
* Sharing information. Information sharing enables both government and
private sector partners to assess events accurately, formulate risk
assessments, and determine appropriate courses of action. This
includes sharing information on cyber threats and vulnerabilities,
providing alerts or warnings about such threats, and recommending
mitigation steps.
* Conducting exercises. Building and maintaining organizational and
sector expertise requires comprehensive exercises to test the
interaction between stakeholders in the context of serious cyber
attacks, terrorist incidents, natural disasters, and other
emergencies. Exercises are conducted by private sector owners and
operators, and across all levels of government.
* Providing resources. Maximizing the efficient use of resources is a
key part of protecting the nation's critical infrastructure. This
includes providing technical and policy expertise, training,
commitment of people, and financial aid through grants.
Previous GAO Work Made Recommendations to DHS and Identified Best
Practices to Improve Public-Private Partnerships:
Over the last several years, we have reported and made recommendations
regarding various aspects of cyber CIP, including identifying
information-sharing practices and bolstering the public-private
partnership. In 2001, we identified the information-sharing practices
of leading organizations and the factors they deemed critical to their
success in building successful information-sharing relationships.
[Footnote 15] All of the organizations identified trust as the
essential underlying element to successful relationships and said that
trust could be built only over time and, primarily, through personal
relationships. Other critical success factors identified included (1)
establishing effective and appropriately secure communication
mechanisms, such as regular meetings and secure Web sites; (2)
obtaining the support of senior managers at member organizations
regarding the sharing of potentially sensitive member information and
the commitment of resources; and (3) ensuring organizational
leadership continuity. In addition, to be successful, information-
sharing organizations provided identifiable membership benefits, such
as current information about threats, vulnerabilities, and incidents.
Without such benefits, according to the representatives we met with,
members would not continue participating.
Over the last several years, we have also made about 30
recommendations in key cybersecurity areas to help bolster private-
public partnerships. In 2008, we reported[Footnote 16] on US-CERT and
found that it faced a number of challenges that impeded it from fully
implementing a cyber analysis and warning capability and thus being
able to coordinate the national efforts to prepare for, prevent, and
respond to cyber threats. The challenges included creating warnings
that are consistently actionable and timely and employing predictive
analysis. We made 10 recommendations to DHS to improve the
department's cyber analysis and warning capabilities. These included,
among others, addressing deficiencies in its monitoring efforts,
including establishing a comprehensive baseline understanding of the
nation's critical information infrastructure and engaging appropriate
private-sector stakeholders to support a national-level cyber
monitoring capability. We also recommended that DHS address the
challenges that impeded it in fully implementing cyber analysis and
warning, including developing close working relationships with federal
and private-sector entities to allow the free flow of information and
ensuring consistent notifications that are actionable and timely. DHS
agreed with most of these recommendations and initiated related
actions.
In 2007 and 2009, we determined the extent to which sector plans for
CIP fully addressed DHS's cyber security requirements and assessed
whether these plans and related reports provided for effective
implementation.[Footnote 17] We found, among other things, that
although DHS reported many efforts under way and planned to improve
the cyber content of sector-specific plans, sector-specific agencies
had yet to update their respective sector-specific plans to fully
address key DHS cybersecurity criteria. The lack of complete updates
and progress reports was further evidence that the sector planning
process had not been effective, thus leaving the nation in the
position of not knowing precisely where it stands in securing cyber-
critical infrastructures. Not following up to address these conditions
also showed DHS was not making sector planning a priority. We
recommended that DHS assess whether the existing sector-specific
planning process should continue to be the nation's approach to
securing cyber and other critical infrastructure and, if so, make the
process an agency priority and manage it accordingly. DHS concurred
with the recommendations. In addition, due to concerns about DHS's
efforts to fully implement its CIP responsibilities, as well as known
security risks to critical infrastructure systems, we added cyber CIP
as part of our federal IT systems security high-risk area in 2003 and
have continued to report on its status since that time.[Footnote 18]
Most recently, we testified in 2009 on the results of expert panels
that identified the importance of bolstering public-private
partnerships.[Footnote 19] In discussions with us, the panel
identified 12 key areas requiring improvement. One of the key
strategies was to bolster public-private partnerships by providing
adequate economic and other incentives for greater investment and
partnering in cybersecurity.
Private Sector Stakeholders Expect Information on Threats, Alerts, and
Other Related Services but Believe Federal Partners Are Not
Consistently Providing:
Private sector stakeholders--sector council and ISAC members--reported
that they expect their federal partners to provide usable, timely, and
actionable cyber threat information and alerts and other related
services. However, according to private sector stakeholders, federal
partners are not consistently meeting these expectations, despite
improvement efforts, such as developing new information-sharing
arrangements and expanding the number of private sector individuals
with security clearances.
Private Sector Stakeholders Expect Usable Threat and Alert Information
and Other Related Services:
Private sector stakeholders reported that they expect their federal
partners to provide usable, timely, and actionable cyber threat
information and alerts, access to sensitive or classified information,
a secure mechanism for sharing information, security clearances, and a
single centralized government cybersecurity organization to coordinate
federal efforts. Some other services were less important, such as
penetration testing of networks and financial support. Table 4
summarizes the extent to which the 56 private sector survey
respondents expect to receive certain services from the federal
government in order of most to least expected.
Table 4: Key Private Sector Expected Services Based on Survey Results:
Services: Timely and actionable cyber threat information;
Great or moderate extent: 98%.
Service: Timely and actionable cyber alerts;
Great or moderate extent: 96%.
Service: Access to actionable classified or sensitive information
(such as intelligence and law enforcement information);
Great or moderate extent: 87%.
Service: A secure information-sharing mechanism;
Great or moderate extent: 78v.
Service: Security clearances;
Great or moderate extent: 74%.
Service: Quick response to recommendations to improve partnership;
Great or moderate extent: 69%.
Service: Participating in and obtaining results from exercises and
simulations;
Great or moderate extent: 59%.
Service: Collaboration with international organizations;
Great or moderate extent: 49%.
Service: Development of exercise and simulation plans;
Great or moderate extent: 44%.
Service: Technical expertise;
Great or moderate extent: 35%.
Service: Training and workforce development opportunities;
Great or moderate extent: 31%.
Service: Assistance conducting vulnerability assessments;
Great or moderate extent: 30%.
Service: Policy expertise;
Great or moderate extent: 29%.
Service: Financial support;
Great or moderate extent: 26%.
Service: Penetration testing of networks;
Great or moderate extent: 25%.
Source: GAO analysis based on survey data of 56 private sector
respondents.
[End of table]
The two most expected services private sector stakeholders want from
their federal partners are timely and actionable cyber threat and
alert information--providing the right information to the right
persons or groups as early as possible to give them time to take
appropriate action. The percentages of private sector survey
respondents reporting that they expect timely and actionable cyber
threat and alert information to a great or moderate extent were 98 and
96, respectively. Private sector council representatives stated that
they expect their federal partners to provide timely and actionable
intelligence on cyber-related issues that they can share within their
membership. For example, one private sector official told us that time
is of the essence when passing information to their members and that
sector members expect to get a response within minutes so they can
take appropriate actions as soon as possible.
Private sector stakeholders also identified access to sensitive
government information, a secure information-sharing mechanism, and
obtaining security clearances as key expectations. The percentages of
survey respondents reporting that they expect these services to a
great or moderate extent were 87, 78, and 74, respectively. Private
sector officials stated that they need access to greater amounts of
sensitive and classified government information. However, a private
sector official indicated that access to classified information is not
valuable because it can not be shared. This official stated that they
would prefer information that is unclassified and actionable that can
be shared. A private sector council member stated that their federal
partners take too long to vet sensitive cyber information before
private sector partners can receive and share it.
In addition, private sector officials and cyber experts stated that
having a single or centralized government source for cyber-related
information is important to (1) avoid confusion about who is the
authoritative source, (2) have a consistent message communicated, and
(3) coordinate a national response. Similarly, in March 2009, we
testified that a panel of cyber security experts identified that
creating an accountable, operational cybersecurity organization would
be essential to improving our national cybersecurity posture.[Footnote
20] The experts told us that there needs to be an independent
cybersecurity organization that leverages and integrates the
capabilities of the private sector, civilian government, law
enforcement, the military, the intelligence community, and the
nation's international allies to address incidents against the
nation's critical cyber systems and functions.
Conversely, private sector survey respondents stated that they expect
some services to a lesser extent from their federal partners,
including policy expertise, financial support, and penetration testing
of their networks. The percentages of survey respondents reporting
that they expect these services to a great or moderate extent were
only 29, 26, and 25, respectively. In addition, government officials
stated that having the government perform penetration testing could be
construed as inappropriate by private entities and their customers
whose information is stored on those systems.
Private Sector Stakeholders Believe That Critical Expectations Are Not
Being Fully Met, Despite Federal Efforts:
Federal partners are not consistently meeting private sector
expectations, including providing timely and actionable cyber threat
information and alerts, according to private sector stakeholders.
Table 5 illustrates the degree to which the 56 private sector survey
respondents reported that they are receiving services from the public
sector in order of most to least expected. For example, only 27
percent of private sector survey respondents reported that they were
receiving timely and actionable cyber threat information and alerts to
a great or moderate extent. In addition, ISAC officials stated that
the federal partners are not providing enough cyber threat information
that is tailored to their sector's needs or analytical alert
information that provides the tactics and techniques being used by
cyber threats. According to these ISAC officials, this more specific
information is needed to understand what actions will likely protect
their networks. Another private sector council official said that a
lot of the information they receive does not have enough detail to be
useful.
Table 5: Private Sector Respondent Views on the Extent to Which
Federal Partners Are Providing Expected Services:
Service: Timely and actionable cyber threat information;
Greatly or moderately provided: 27%.
Service: Timely and actionable cyber alerts;
Greatly or moderately provided: 27%.
Service: Access to actionable classified or sensitive information
(such as intelligence and law enforcement information);
Greatly or moderately provided: 16%.
Service: A secure information-sharing mechanism;
Greatly or moderately provided: 21%.
Service: Security clearances;
Greatly or moderately provided: 33%.
Service: Quick response to recommendations to improve partnership;
Greatly or moderately provided: 10%.
Service: Participating in and obtaining results from exercises and
simulations;
Greatly or moderately provided: 18%.
Service: Collaboration with international organizations;
Greatly or moderately provided: 5%.
Service: Development of exercise and simulation plans;
Greatly or moderately provided: 34%.
Service: Technical expertise;
Greatly or moderately provided: 9%.
Service: Training and workforce development opportunities;
Greatly or moderately provided: 9%.
Service: Assistance conducting vulnerability assessments;
Greatly or moderately provided: 9%.
Service: Policy expertise;
Greatly or moderately provided: 25%.
Service: Financial support;
Greatly or moderately provided: 0.
Service: Penetration testing of networks;
Greatly or moderately provided: 7%.
Source: GAO analysis based on survey data of 56 private sector
respondents.
[End of table]
Private sector stakeholders also reported a lack of access to
classified information, a secure information-sharing mechanism,
security clearances, and a single centralized government cyber-
information source. Private sector survey respondents reported
receiving access to actionable classified information, having access
to a secure information sharing mechanism, and having adequate
security clearances to a great or moderate extent at only 16, 21, and
33 percent, respectively. The private sector councils reported that
they are not getting classified intelligence information that they
perceive as being valuable to their efforts to defend their cyber
resources from sophisticated attacks and that they do not have enough
members with security clearances to receive classified information.
Regarding the lack of a centralized source, an ISAC official stated
that too many Internet-based information-sharing portals exist in the
current cyber-related, public-private partnership and that the
partnership could benefit from a "one-stop" portal. Another official
suggested that one federal agency should be the clearing house for
information and assigning tasks because there are too many government
agencies working independently with their own unique missions.
Further, a sector council official stated that there is too much
duplication of projects and that it is not uncommon to work with six
different groups doing almost the same thing and that these groups are
not always aware of each other.
Federal partners are not meeting private sector stakeholders'
expectations, in part, because of restrictions on the type of
information that can be shared with the private sector. According to
DHS officials, US-CERT's ability to provide information is impacted by
restrictions that do not allow individualized treatment of one private
sector entity over another private sector entity--making it difficult
to formally share specific information with entities that are being
directly impacted by a cyber threat. In addition, because US-CERT
serves as the nation's cyber analysis and warning center, it must
ensure that its warnings are accurate. Therefore, US-CERT's products
are subjected to a stringent review and revision process that can
adversely affect the timeliness of its products--potentially adding
days to the release if classified or law enforcement information must
be removed from the product. In addition, federal officials are
restricted to sharing classified information with only cleared private
sector officials. Federal officials are also hesitant to share
sensitive information with private sector stakeholders, in part, due
to the fear that sensitive information shared with corporations could
be shared openly on a global basis. By contrast, DOE officials stated
that they are willing to share sensitive information with their energy
sector member entities due to the long-standing nature of their
relationships with the sector and the type of information being
shared. In addition, according to federal officials, the limited
number of private sector personnel with national security clearances
makes it difficult to share classified information.
Another issue having an adverse affect on the federal partners'
ability to meet private sector expectations is that federal officials
do not have an adequate understanding of the specific private sector
information requirements. Multiple private sector officials stated
that federal partners could improve their methods of acquiring the
type of information needed by the private sector. For example, more
specific threat information would be focused on the technology being
used by a particular entity or specify that a threat intends to target
a particular entity, rather than including just broad threat
information and alerts. In addition, this more specific information
would focus on the specific needs for each sector rather than all of
the sectors getting the same information. A private sector official
also stated that the federal government often approaches the private
sector on issues that are not a priority to the private sector but are
issues the federal government thinks the private sector is interested
in. Further, a cyber expert suggested that the partnership can improve
if the government articulates what it needs from the private sector
and assists the critical infrastructure sectors in understanding the
direct benefit of their participation.
DOD and DHS have started pilot programs that are intended to improve
the sharing of timely, actionable, and sensitive information with
their private sector partners. Specifically, DOD's Defense Critical
Infrastructure Program has a pilot program with some of its private
sector DIB contractors to improve sharing of information on cyber
threat, alerts, and sensitive data by establishing a new partnership
model. This new program is known as the DIB Cyber Security/Information
Assurance Program and is to facilitate the sharing of sensitive cyber
information between the public and private sector. According to an
agency official, this program involves a voluntary agreement between
DOD and cleared DIB partners. DOD shares classified and unclassified
cyber threat information and best practices. In return, the private
sector partners agree to share cyber intrusion information with the
DOD Cyber Crime Center, which is to serve as the focal point for
information-sharing and digital forensics analysis activities related
to protecting unclassified information on DIB information systems and
networks. DOD's goal is to transition from pilot to program status and
expand the program to all qualified cleared contractors. In addition,
the officials stated that they expect to eventually modify DOD
contractual language to encourage contractors to increase
cybersecurity in their networks.
In addition, DHS, in conjunction with DOD and the financial services
sector, has developed an information sharing pilot program which began
in December 2009. To date, this program has resulted in the federal
government sharing 494 of its products, including sensitive
information, with the Financial Services ISAC, and the Financial
Services ISAC sharing 135 of its products with the government.
According to DHS officials, DHS and the Financial Services ISAC are
sharing sensitive information they did not share before the agreement.
Both of these pilot programs are intended to improve federal partners'
ability to share information over a secure mechanism. For example, DHS
is using its US-CERT portal, and DOD is developing a DIB Net to
communicate with its partners.
DHS and DOE have initiatives that specifically address sharing
classified information with their partners. DHS officials stated that
DHS has a process for clearing individual sector officials at the top
secret and sensitive compartmented information levels. Further, in
November 2009, DHS issued the Cybersecurity Partner Local Access Plan
to improve the sharing of sensitive information between the public and
private sectors. According to DOE officials, DOE also has an effort
under way to increase the number of private officials from the energy
sector with security clearances.
DHS has recently developed an integration center known as the National
Cybersecurity and Communications Integration Center that is composed
of the US-CERT and the National Coordinating Center for
Telecommunications. This center is to provide a central place for the
various federal and private-sector organizations to coordinate efforts
to address cyber threats and to respond to cyber attacks. However,
this center was only established in October 2009, is still in
development, and does not currently have representation from all
relevant federal agencies and private entities as envisioned. In
addition, DHS officials stated that they have taken steps to improve
US-CERT's cyber analysis and warning capabilities in response to our
previous recommendations.[Footnote 21]
While the ongoing efforts may address the public sector's ability to
meet the private sector's expectations, much work remains, and it is
unclear if the efforts will focus on fulfilling the private sector's
most expected services related to information-sharing. If the
government does not improve its ability to meet the private sector's
expectations, the partnerships will remain less than optimal, and the
private sector stakeholders may not have the appropriate information
and mechanisms needed to thwart sophisticated cyber attacks that could
have catastrophic effects on our nation's cyber-reliant critical
infrastructure.
Public Sector Stakeholders Expect Threat Information and Commitment,
Which the Private Sector Is Generally Providing:
Public sector stakeholders reported that they expect the private
sector to provide a commitment to execute plans and recommendations,
timely and actionable cyber threat information, and appropriate staff
and resources. Four of the five government councils reported that the
private sector is committed to executing plans and recommendations and
providing timely and actionable threat information to a "great" or
"moderate" extent. However, government council officials stated that
improvements could be made to the partnership.
Public Sector Stakeholders Expect Usable Threat Information,
Commitment, and Appropriate Staff and Resources:
Public sector stakeholders reported that they expect a commitment to
execute plans and recommendations, timely and actionable cyber threat
information, and appropriate staff and resources to be provided by
private sector stakeholders. All five government councils we met with
stated that they expected these services from their private sector
partners to a "great" or "moderate" extent.
Further, most government council representatives stated that they
expect better communications and increasing trust between them and
their private sector counterparts. For example, they would like the
private sector to develop a strong dialogue with the government and
keep the government informed about suspicious activities on private
sector networks. Table 6 shows the government councils' expected
services.
Table 6: Key Government Coordinating Councils' Expected Services from
the Private Sector:
Service: Commitment to execute plans and recommendations, such as best
practices;
Public sectors:
Banking and finance: Great/moderate;
Communications: Great/moderate;
DIB: Great/moderate;
Energy: Great/moderate;
IT: Great/moderate.
Service: Timely and actionable cyber threat information;
Public sectors:
Banking and finance: Great/moderate;
Communications: Great/moderate;
DIB: Great/moderate;
Energy: Great/moderate;
IT: Great/moderate.
Service: Provide appropriate staff and resources;
Public sectors:
Banking and finance: Great/moderate;
Communications: Great/moderate;
DIB: Great/moderate;
Energy: Great/moderate;
IT: Great/moderate.
Service: Timely and actionable cyber alerts;
Public sectors:
Banking and finance: Some;
Communications: Great/moderate;
DIB: Great/moderate;
Energy: Great/moderate;
IT: Great/moderate.
Service: Technical expertise;
Public sectors:
Banking and finance: Great/moderate;
Communications: Great/moderate;
DIB: Great/moderate;
Energy: Some;
IT: Great/moderate.
Service: Participation in and planning for exercises and simulation;
Public sectors:
Banking and finance: Some;
Communications: Great/moderate;
DIB: Great/moderate;
Energy: Great/moderate;
T: Great/moderate.
Service: Quick response to recommendations to improve partnership;
Public sectors:
Banking and finance: Great/moderate;
Communications: Great/moderate;
DIB: Great/moderate;
Energy: Don't know;
IT: Great/moderate.
Service: Permission to conduct vulnerability assessments;
Public sectors:
Banking and finance: Some;
Communications: Great/moderate;
DIB: Great/moderate;
Energy: Some;
IT: Some.
Service: Collaboration with international organizations;
Public sectors:
Banking and finance: Some;
Communications: Great/moderate;
DIB: Some;
Energy: Great/moderate;
IT: Great/moderate.
Service: Permission to conduct penetration testing of networks;
Public sectors:
Banking and finance: Some;
Communications: Great/moderate;
DIB: Don't know;
Energy: Some;
IT: Some.
Source: GAO analysis of agency data.
[End of table]
Private Sector Is Primarily Meeting Several Public Sector
Expectations, but Some Gaps Exist:
While many government councils reported that the private sector is
mostly meeting their expectations in several areas, they also reported
that improvements could be made. Four of the five government councils
stated that they are receiving commitment to execute plans and
recommendations and timely and actionable cyber threat information to
a great or moderate extent. However, only two of the five government
councils reported that the private sector is providing appropriate
staff and resources. In addition, the extent to which the private
sector is fulfilling the public sector's expectations varies by
sector. Of the five councils, the communications government council
reported most positively on whether the private sector was providing
expected services. Specifically, it reported that its private sector
partners were providing 8 of 10 expected services to a great or
moderate extent. By contrast, the IT sector council reported that the
private sector was providing only 1 of 10 expected services to a great
or moderate extent and 5 of 10 expected services to only some extent.
Table 7 shows the extent to which the private sector is providing
government councils' expected services.
Table 7: Extent to Which the Private Sector Is Providing the
Government Coordinating Councils' Expected Services:
Service: Commitment to execute plans and recommendations, such as best
practices;
Public sectors:
Banking and finance: Great/moderate;
Communications: Great/moderate;
DIB: Great/moderate;
Energy: Great/moderate;
IT: Little/no.
Services: Timely and actionable cyber threat information;
Public sectors:
Banking and finance: Great/moderate;
Communications: Great/moderate;
DIB: Great/moderate;
Energy: Great/moderate;
IT: Some.
Services: Provide appropriate staff and resources;
Public sectors:
Banking and finance: Great/moderate;
Communications: Great/moderate;
DIB: Some;
Energy: Some;
IT: Some.
Services: Timely and actionable cyber alerts;
Public sectors:
Banking and finance: Great/moderate;
Communications: Great/moderate;
DIB: Great/moderate;
Energy: Great/moderate;
IT: Some.
Services: Technical expertise;
Public sectors:
Banking and finance: Great/moderate;
Communications: Great/moderate;
DIB: Great/moderate;
Energy: Some;
IT: Great/moderate.
Services: Participation in and planning for exercises and simulation;
Public sectors:
Banking and finance: Some;
Communications: Great/moderate;
DIB: Great/moderate;
Energy: Great/moderate;
IT: Some.
Services: Quick response to recommendations to improve partnership;
Public sectors:
Banking and finance: Great/moderate;
Communications: Great/moderate;
DIB: Great/moderate;
Energy: Great/moderate;
IT: Little/no.
Services: Permission to conduct vulnerability assessments;
Public sectors:
Banking and finance: Some;
Communications: Some;
DIB: Some;
Energy: Some;
IT: Some.
Services: Collaboration with international organizations;
Public sectors:
Banking and finance: Some;
Communications: Great/moderate;
DIB: Little/no;
Energy: Some;
IT: Little/no.
Services: Permission to conduct penetration testing of networks;
Public sectors:
Banking and finance: Little/no;
Communications: Some;
DIB: Don't know;
Energy: Some;
IT: Little/no.
Source: GAO analysis of agency data.
[End of table]
Although, in general, the private sector is meeting the expectations
of the federal partners, there are still improvements that can be
made. For example, while the government coordinating councils reported
receiving timely and actionable cyber threat and alert information
from the private sector, there are limits to the depth and specificity
of the information provided, according to federal officials. One issue
is that private sector stakeholders do not want to share their
sensitive, proprietary information with the federal government. In
addition, information security companies could lose a competitive
advantage by sharing information with the government which, in turn,
could share it with those companies' competitors. In addition,
according to DHS officials, despite special protections and
sanitization processes, private sector stakeholders are unwilling to
agree to all of the terms that the federal government or a government
agency requires to share certain information. Further, in some cases,
the lack of private sector commitment has had an adverse affect on the
partnership.
Conclusions:
The private-public partnership remains a key part of our nation's
efforts to secure and protect its critical cyber-reliant
infrastructure. For more than a decade, this private-public
partnership has been evolving. While both private and public sector
stakeholders report finding value in the partnership, the degree to
which expectations are being met varies. Private sector stakeholders
expect their federal partners to consistently provide usable, timely,
actionable cyber threat information and alerts and, to a lesser
extent, other related services. However, private sector stakeholders
are not consistently receiving their expected services from their
federal partners because, in part, federal partners are restricted in
the type of information that can be shared with the private sector and
lack an understanding about each sector's specific information
requirements. In addition, many private sector stakeholders interact
with multiple federal entities and multiple information sources, which
can result in duplication of efforts and inconsistent information
being shared.
In turn, federal partners primarily expect their private sector
partners to provide commitment to execute plans and recommendations,
timely and actionable cyber threat and alert information, and
appropriate staff and resources, which the private sector is primarily
providing; however, while most federal partners stated that these
expectations are mostly being met, they identified difficulties with
the private sector sharing their sensitive information and the need
for private sector partners to improve their willingness to engage and
provide support to partnership efforts. Federal and private sector
partners have initiated efforts to improve the partnerships; however,
much work remains to fully implement improved information sharing.
Without improvements in meeting private and public sector
expectations, the partnerships will remain less than optimal, and
there is a risk that owners of critical infrastructure will not have
the appropriate information and mechanisms to thwart sophisticated
cyber attacks that could have catastrophic effects on our nation's
cyber-reliant critical infrastructure.
Recommendations for Executive Action:
We recommend that the Special Assistant to the President and
Cybersecurity Coordinator and the Secretary of Homeland Security, in
collaboration with the sector lead agencies, coordinating councils,
and the owners and operators of the associated five critical
infrastructure sectors, take two actions: (1) use the results of this
report to focus their information-sharing efforts, including their
relevant pilot projects, on the most desired services, including
providing timely and actionable threat and alert information, access
to sensitive or classified information, a secure mechanism for sharing
information, and providing security clearance and (2) bolster the
efforts to build out the National Cybersecurity and Communications
Integration Center as the central focal point for leveraging and
integrating the capabilities of the private sector, civilian
government, law enforcement, the military, and the intelligence
community.
We are not making new recommendations regarding cyber-related analysis
and warning at this time because our previous recommendations directed
to DHS, the central focal point for such activity, in these areas have
not yet been fully implemented.
Agency Comments and Our Evaluation:
The national Cybersecurity Coordinator provided no comments on a draft
of our report. DHS provided written comments on a draft of the report
(see appendix II), signed by DHS's Director of the Departmental
GAO/OIG Liaison Office. In its comments, DHS concurred with our
recommendations and described steps underway to address them.
Regarding our first recommendation, DHS provided an additional example
of and further detail about several pilot programs it has initiated to
enable the mutual sharing of cybersecurity information at various
classification levels. In addition, regarding our second
recommendation, DHS stated that it is integrating government
components and private sector partners into its National Cybersecurity
and Communications Integration Center.
DHS also provided general comments. First, DHS noted that it is
important to distinguish between actionable information and
classified, contextual threat information. Specifically, DHS stated
that sharing classified information with the private sector can pose a
risk to national security and, consequently, such information is
generally non-actionable. While we found that the private-sector
stakeholders we surveyed and interviewed expect such information, we
do not state that the federal government should share classified
information with uncleared individuals. We distinguish in this report
between sharing timely and actionable threat and alert information and
providing access to classified information. In addition, we discuss US-
CERT's review and revision process and identify DHS, DOD, and DOE
efforts to provide clearances to private sector partners in order to
share such information.
Second, DHS stated that the report makes generalizations about private-
sector stakeholders which could be seen to suggest that such views
were held across the entire cross-sector community. We acknowledge
that our findings cannot be generalized across the sectors and clearly
articulate that the scope of our review is limited to representatives
from five critical infrastructure sectors.
Third, DHS also stated that the report focuses on surveyed
participants "expectations," while the survey itself focused on
"needs." DHS further stated that these two terms are not
interchangeable for the concept of information sharing. During our
review, we held numerous structured interviews with private and
government stakeholders and surveyed private-sector stakeholders and
asked separate questions on their expectations and needs. We
acknowledge that the terms are not interchangeable and therefore
appropriately reported on and distinguished both private and public
sectors' expectations and needs.
Finally, DHS provided comments on the progress it has made in its
sector planning approach and its clearance process.
DHS and DOD also provided technical comments, which we incorporated as
appropriate.
As agreed with your offices, unless you publicly announce the contents
of this report earlier, we plan no further distribution until 30 days
from the report date. At that time, we will send copies of this report
to interested congressional committees, the national Cybersecurity
Coordinator, the Secretary of Homeland Security, and other interested
parties. The report also is available at no charge on the GAO Web site
at [hyperlink, http://www.gao.gov].
If you or your staff members have any questions about this report,
please contact me at (202) 512-9286 or pownerd@gao.gov. Contact points
for our Offices of Congressional Relations and Public Affairs may be
found on the last page of this report. GAO staff who made major
contributions to this report are listed in appendix III.
Signed by:
David A. Powner:
Director, Information Technology Management Issues:
List of Congressional Requesters:
The Honorable Bennie G. Thompson:
Chairman:
Committee on Homeland security:
House of Representatives:
The Honorable Yvette D. Clarke:
Chairwoman:
Subcommittee on Emerging Threats, Cybersecurity, and Science and
Technology:
Committee on Homeland Security:
House of Representatives:
The Honorable Shelia Jackson-Lee:
Chairwoman:
Subcommittee on Transportation Security and Infrastructure Protection:
Committee on Homeland Security:
House of Representatives:
[End of section]
Appendix I: Objectives, Scope, and Methodology:
Our objectives were to determine (1) private sector stakeholders'
expectations for cyber-related, public-private partnerships and to
what extent these expectations are being met and (2) public sector
stakeholders' expectations for cyber-related public-private
partnerships and to what extent expectations are being met. We focused
our efforts on five critical infrastructure sectors: Communications,
Defense Industrial Base, Energy, Banking and Finance, and Information
Technology. We selected these five sectors because of their extensive
reliance on cyber-based assets to support their operations. This
determination was based on our analysis and interviews with
cybersecurity experts and agency officials. Our findings and
conclusions are based on information gathered from the five cyber-
reliant critical sectors and are not generalizable to a larger
population.
To determine private sector stakeholders' expectations for cyber-
related public-private partnerships and to what extent these
expectations are being met, we collected and analyzed various
government and private sector reports and conducted structured
interviews with sector coordinating councils representatives from the
five critical infrastructure sectors. In addition, we interviewed
additional experts in critical infrastructure protection from academia
and information technology and security companies to gain a greater
understanding of how the partnership should be working. We also
interviewed representatives from the Communications, Electricity
Sector, Financial Services, Information Technology, and Multi-State
Information Sharing and Analysis Centers to understand their
information-sharing needs. Finally, we conducted a survey of private
sector representatives from the infrastructure sectors. The surveyed
representatives were members of the information sharing and analysis
centers, sector coordinating councils, associations within a sector,
and/or owner/operators within a sector. These surveyed representatives
were solicited by the leadership of those organizations to participate
in our survey in order for them to fulfill their responsibility to
protect the identity of their members. We administered the survey
respondents' use of the electronic survey tool. We received 56 survey
responses from across the five sectors. The survey results were used
to determine the expectations of private sector stakeholders and the
extent to which those expectations were being met.
To determine public sector stakeholders' expectations for cyber-
related public-private partnerships and to what extent these
expectations are being met, we collected and analyzed various
government and private sector reports and conducted structured
interviews with government coordinating councils representatives
familiar with the cyber partnership from the Banking and Finance,
Communications, Defense Industrial Base, Energy, and Information
Technology critical infrastructure sectors. We also met with
representatives from DHS's National Cyber Security Division and Office
of Infrastructure Protection to verify and understand the public
sector's role in partnering with the private sector and encouraging
the protection of the nation's cyber critical infrastructure.
We conducted this performance audit from June 2009 to July 2010 in
accordance with generally accepted government auditing standards.
Those standards require that we plan and perform the audit to obtain
sufficient, appropriate evidence to provide a reasonable basis for our
findings and conclusions based on our audit objectives. We believe
that the evidence obtained provides a reasonable basis for our
findings and conclusions based on our audit objectives.
[End of section]
Appendix II: Comments from the Department of Homeland Security:
U.S. Department of Homeland Security:
Washington, DC 20528:
June 30, 2010:
Mr. David A. Powner:
Director, Information Technology Management Issues:
U.S. Government Accountability Office:
441 G Street, N.W.
Washington, D.C. 20548:
Dear Mr. Powner:
RE: Draft Report GA0-10-628, Critical Infrastructure Protection: Key
Private and Public Cyber Expectations Need to be Consistently
Addressed (Job Code 311205):
The Department of Homeland Security (Department/DHS) appreciates the
opportunity to review and comment on the draft report referenced
above. The Department, particularly the National Protection and
Programs Directorate, agrees with the two recommendations contained
therein.
Recommendation: The Special Assistant to the President and
Cybersecurity Coordinator and the Secretary of Homeland Security, in
collaboration with the other sector lead agencies, coordinating
councils, and the owners and operators of the associated five critical
infrastructure sectors use the results of this report to focus their
information-sharing efforts, including their relevant pilot projects,
on the most desired services, including providing timely and
actionable threat and alert information, access to sensitive or
classified information, a secure mechanism for sharing information,
and providing security clearance.
Response: Concur. The Department agrees that more should be done to
bolster public-private partnership and information sharing. As
recommended, in collaboration with the Special Assistant to the
President and Cybersecurity Coordinator, appropriate agencies, and
private sector stakeholders, DHS will incorporate the applicable
information from this report, as needed, in future action plans.
As we move forward, public-private cooperation is growing ever more
important. We are building on already successful partnerships and
looking forward to new opportunities. DHS is moving toward greater,
more actionable sharing of information with the private sector based
on new analytical insights derived from a comprehensive understanding
of the government-wide cyber domain. DHS has initiated several pilot
programs that enable the mutual sharing of cybersecurity information
at various classification levels:
* DHS and Michigan are conducting a proof-of-concept pilot in which
the EINSTEIN 1 network flow monitoring technology helps secure
Michigan's dot-gov networks. The DHS and Michigan are conducting a
proof-of-concept pilot in which the EINSTEIN 1 network flow monitoring
technology helps secure Michigan's dot-gov networks. The purpose of
this study is to help state governments enhance their cybersecurity
and to increase DRS overall cyber situational awareness.
* DHS, the Department of Defense (DOD), and the Financial Services
Information Sharing and Analysis Center have launched a pilot designed
to help protect key critical networks and infrastructure within the
financial services sector by sharing actionable, sensitive information”
in both directions”to mitigate the impact of attempted cyber
intrusions. This builds on the products and success of DOD's Defense
Industrial Base initiative. This pilot is currently at the For
Official Use Only level, but shortly will be enhanced to include
Secret-level information.
* The Department is also working on a pilot that brings together state
fusion centers and private sector owners and operators of critical
infrastructure to provide access to Secret-level classified
cybersecurity information. The Cybersecurity Partners Local Access
Plan is a pilot initiative allowing security-cleared owners and
operators of Critical Infrastructure and Key Resources (CIKR), as well
as State Chief Information Security Officers and Chief Information
Officers, to access Secret-level cybersecurity information and
participate in Secret-level video teleconference calls via their local
fusion centers, allowing classified information sharing outside of
Washington, D.C.
* DHS has instituted a Top Secret/Sensitive Compartmented Information
(TS/SCI) clearance program for CIKR representatives to enable their
engagement in analysis of the most sensitive cybersecurity threat
information.
The Department also is working in the areas of software assurance and
supply chain management so that government and private sector partners
can work together to solve what is a potentially serious security
issue. We believe software developers must automate security and
institutionalize it from the beginning in an effort to change the
current security posture from reactive to proactive.
Recommendation: The Special Assistant to the President and
Cybersecurity Coordinator and the Secretary of Homeland Security, in
collaboration with the other sector lead agencies, coordinating
councils, and the owners and operators of the associated five critical
infrastructure sectors bolster the efforts to build out the National
Cybersecurity and Communications Integration Center as the central
focal point for leveraging and integrating the capabilities of the
private sector, civilian government, law enforcement, the military,
and the intelligence community.
Response: Concur. The Department is currently completing phases I and
II of operations for the National Cybersecurity and Communications
Integration Center (NCCIC), which involves leveraging and integrating
capabilities of the private sector, civilian government, law
enforcement, the military, and the intelligence community. NCCIC is a
24-hour, DHS-led coordinated watch and warning center that should
improve national efforts to address threats and incidents affecting
the nation's critical information technology and cyber infrastructure.
Specifically, phases I and II, respectively, include the following:
* Integration of the government components National Coordinating
Center for Telecommunications (NCC) and the United States Computer
Emergency Readiness Team (US-CERT) -- brings together the most
successful elements of its predecessors while adding greater
efficiency, transparency, integration, and collaboration. This phase
also includes functionally integrating elements of DHS's Office of
Intelligence and Analysis and the National Cyber Security Center. Over
time, all of these elements will be collocated in the new facility.
Each organization will share information as authorized, build
relationships, and work jointly when situations demand.
* Integration of private sector partners is critical to protect the
nation's information technology and communication infrastructure. The
NCC, the telecommunications operations center, already has a number of
on-site private industry representatives from the communications
sector. These representatives will be incorporated gradually and will
maintain a similar working model until new standard operating
procedures for handling steady-state and crisis operations are created
and adopted by both industry and government. This includes industry
representatives located within the watch and warning center who will
interact with government counterparts to share relevant information.
These actions and activities will facilitate timely and effective
crisis operations in the event of a significant service disruption or
cyber incident.
General Comments:
Generally, it is important to distinguish between actionable
information and classified, contextual threat information. The report
does not clearly identify the difference. There appears to be a sense
that the private sector could better secure its networks if it had
access to actionable classified information. The difficulty is that
sharing classified information in an open environment or with non-
cleared personnel poses risk to national security. As such, classified
information is generally non-actionable, and instead provides
contextual threat information”focusing on the "who." This information
needs to be shared with cleared private sector partners, and
mechanisms are in place and being further developed to enable such
sharing.
Actionable information, on the other hand, focuses on the "what" and
the "how"”what is happening and how is the threat actor (whoever that
actor may be) doing it? Public and private sector partners can better
secure their networks and systems when provided with that information
in a timely manner.
There are several instances where the draft report makes
generalizations such as "according to private sector stakeholders"
which presumes that the view is held across the entire cross-sector
community when it was the response from surveyed representatives of
five sectors. It would be more accurate to name specifically the
actual source(s) of the statements.
The report focuses on surveyed participants' "expectations," when the
survey itself focuses on "needs." The two terms are not
interchangeable for the concept of information sharing.
GAO states that "...sector-specific agencies had yet to update their
respective sector-specific plans to fully address key DHS
cybersecurity criteria. The lack of complete updates and progress
reports was further evidence that the sector planning process has not
been effective, thus leaving the nation in the position of not knowing
precisely where it stands in securing cyber critical infrastructures.
Not following up to address these conditions also showed DHS was not
making sector planning a priority. We recommended that DHS assess
whether the existing sector-specific planning process should continue
to be the nation's approach to securing cyber and other critical
infrastructure and, if so, make the process an agency priority and
implement it accordingly. DHS concurred with the recommendations."
The Department of Homeland Security supports the ongoing assessment
and improvement of the sector planning approach. DHS continually
assesses the effectiveness of this approach and identifies and
implements improvements. The sector specific agencies have conducted a
comprehensive triennial review and rewrite of their Sector Specific
Plans (SSPs) which are due for reissue in 2010. DHS' guidance for the
2010 SSP rewrites is based on the updated 2009 NIPP and incorporates
GAO's cyber criteria”criteria recommended by GAO during the GAO-08-113
audit. As DHS' sector-specific planning approach is based on a public-
private partnership, DHS works with its partners to meet the intent of
DHS guidance in a manner that addresses the unique characteristics and
risks of their sector. This allows the (Sector Specific Agencies) SSAs
to develop and implement appropriate programs and activities that
specifically address their cyber security concerns; this approach
allows the SSAs to work independently with their respective government
and private sector coordinating councils and collaboratively with DHS
to develop and implement Sector-Specific Plans that address sector
needs. The 2010 Sector-Specific Plans are currently undergoing final
reviews and will more fully reflect the integration of cyber
considerations into the planning process, as appropriate to each
sector.
The draft notes that "DHS officials stated that DHS is developing a
process to clear individual sector officials at the TS/SCI levels."
This process is already in place. Two CIKR sector representatives have
already received their TS/SCI designations via the established process.
Again, we appreciate this opportunity to review and comment on the
draft report. In addition to this response, technical comments have
been provided under separate cover.
Sincerely,
Signed by:
Jerald E. Levine:
Director:
Departmental GAO/OIG Liaison Office:
[End of section]
Appendix III: GAO Contact and Staff Acknowledgments:
GAO Contact:
David A. Powner, (202) 512-9286, or pownerd@gao.gov:
Staff Acknowledgments:
In addition to the individual named above, Michael W. Gilmore,
Assistant Director; Rebecca E. Eyler; Wilfred B. Holloway; Franklin D.
Jackson; Barbarol J. James; Lee A. McCracken; Dana R. Pon; Carl M.
Ramirez; Jerome T. Sandau; Adam Vodraska; and Eric D. Winter made key
contributions to this report.
[End of section]
Footnotes:
[1] Critical infrastructures are systems and assets, whether physical
or virtual, so vital to nations that their incapacity or destruction
would have a debilitating impact on national security, national
economic security, national public health or safety, or any
combination of those matters.
[2] Department of Homeland Security, National Infrastructure
Protection Plan: Partnering to enhance protection and resiliency
(2009).
[3] Federal policy established 18 critical infrastructure sectors:
agriculture and food, banking and finance, chemical, commercial
facilities, communications, critical manufacturing, dams, defense
industrial base, emergency services, energy, government facilities,
information technology, national monuments and icons, nuclear
reactors, materials and waste, postal and shipping, public health and
health care, transportation systems, and water.
[4] For the purposes of this report, private sector may include some
nonprivate-sector entities, such as state, local, territorial, and
tribal governments.
[5] Computer Emergency Response Team of Estonia, "Malicious Cyber
Attacks Against Estonia Come from Abroad" (Apr. 29, 2007) and Remarks
by Homeland Security Secretary Michael Chertoff to the 2008 RSA
Conference (Apr. 8, 2008).
[6] Office of the Secretary of Defense, Annual Report to Congress:
Military Power of the People's Republic of China 2008.
[7] The New York Times, Google, Citing Attack, Threatens to Exit China
(Jan. 13, 2010).
[8] The New York Times, Suit Says 2 Chinese Firms Stole Web-Blocking
Code (Jan. 7, 2010).
[9] The New York Times, China Cyber-Spies Target India, Dalai Lama:
Report (Apr. 6, 2010).
[10] The White House, Presidential Decision Directive/NSC 63
(Washington, D.C.: May 1998).
[11] Homeland Security Act of 2002, Pub. L. No. 107-296 (Nov. 25,
2002).
[12] The White House, The National Strategy to Secure Cyberspace
(Washington, D.C.: February 2003).
[13] The White House, Homeland Security Presidential Directive 7
(Washington, D.C.: December 2003).
[14] The White House, Cyberspace Policy Review: Assuring a Trusted and
Resilient Information and Communications Infrastructure (Washington,
D.C.: May 29, 2009).
[15] GAO, Information Sharing: Practices That Can Benefit Critical
Infrastructure Protection, [hyperlink,
http://www.gao.gov/products/GAO-02-24] (Washington D.C: Oct. 15, 2001).
[16] GAO, Cyber Analysis and Warning: DHS Faces Challenges in
Establishing a Comprehensive National Capability, [hyperlink,
http://www.gao.gov/products/GAO-08-588] (Washington D.C.: July 31,
2008).
[17] GAO, Critical Infrastructure Protection: Sector-specific Plans'
Coverage of Key Cyber Security Elements Varies, [hyperlink,
http://www.gao.gov/products/GAO-08-113] (Washington D.C.: Oct. 31,
2007) and Critical Infrastructure Protection: Current Cyber Sector-
Specific Planning Approach Needs Reassessment, [hyperlink,
http://www.gao.gov/products/GAO-09-969] (Washington D.C.: Sept. 24,
2009).
[18] For our most recent high risk report, see GAO, High-Risk Series:
An Update, [hyperlink, http://www.gao.gov/products/GAO-09-271]
(Washington, D.C.: January 2009).
[19] GAO, National Cybersecurity Strategy: Key Improvements Are Needed
to Strengthen the Nation's Posture, [hyperlink,
http://www.gao.gov/products/GAO-09-432T] (Washington D.C.: Mar. 10,
2009).
[20] [hyperlink, http://www.gao.gov/products/GAO-09-432T].
[21] [hyperlink, http://www.gao.gov/products/GAO-08-588].
[End of section]
GAO's Mission:
The Government Accountability Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each
weekday, GAO posts newly released reports, testimony, and
correspondence on its Web site. To have GAO e-mail you a list of newly
posted products every afternoon, go to [hyperlink, http://www.gao.gov]
and select "E-mail Updates."
Order by Phone:
The price of each GAO publication reflects GAO‘s actual cost of
production and distribution and depends on the number of pages in the
publication and whether the publication is printed in color or black and
white. Pricing and ordering information is posted on GAO‘s Web site,
[hyperlink, http://www.gao.gov/ordering.htm].
Place orders by calling (202) 512-6000, toll free (866) 801-7077, or
TDD (202) 512-2537.
Orders may be paid for using American Express, Discover Card,
MasterCard, Visa, check, or money order. Call for additional
information.
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]:
E-mail: fraudnet@gao.gov:
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Ralph Dawn, Managing Director, dawnr@gao.gov:
(202) 512-4400:
U.S. Government Accountability Office:
441 G Street NW, Room 7125:
Washington, D.C. 20548:
Public Affairs:
Chuck Young, Managing Director, youngc1@gao.gov:
(202) 512-4800:
U.S. Government Accountability Office:
441 G Street NW, Room 7149:
Washington, D.C. 20548: