Cybersecurity

Date: June 16, 2011
Location: Washington, DC

BREAK IN TRANSCRIPT

Mr. WHITEHOUSE. Mr. President, I rise today to speak about a serious issue that touches on our national security, our economic well-being, the safety of our families, and our privacy; that is, America's cybersecurity.

I look forward to conducting an in-depth examination of the aspects of this issue that falls within the Senate Judiciary Committee's jurisdiction during the Subcommittee on Crime and Terrorism's June 21, 2011, hearing, ``Cybersecurity: Evaluating the Administration's Proposals.'' However, because of the importance of improving our cybersecurity, as demonstrated by the recent Gmail spear-fishing attacks and hacks at Sony, Epsilon, Lockheed Martin, and even the Senate itself, I rise to make some initial remarks today.

American technological innovation ushered in the Internet age, bringing with it Facebook, YouTube, and the rest of the World Wide Web. It set off an explosion of new commerce, freedom of expression, and economic opportunity even in the smallest details of our lives--allowing a car company, for instance, to unlock your car doors remotely if you have locked yourself out of your car.

However, this increased connectivity allows criminals, terrorists, and hostile nations to exploit cyberspace, to attack America, to invade our privacy, to loot our intellectual property, and to expose America's core critical infrastructure to cyber sabotage. Entire online communities are dedicated to stealing and selling American credit card numbers. Consider the disturbing fact that the price of your credit card number stolen online actually goes up if the criminal also is selling your mother's maiden name. Some criminals have learned how to spy on Americans, hacking into our home computers and looking out through the video camera attached to the screen. Others run Web sites selling stolen entertainment without paying the American companies that created it. And millions of American computers--millions of American computers--have been compromised by malware slaved to botnets that can record your every keystroke and send it instantaneously across the world to a criminal's laptop.

I firmly believe that cyber crime has put our country on the losing end of the largest illicit transfer of wealth in world history. Whether by copying source code, by industrial espionage of military product designs, by identity theft, by online piracy, or by outright old-fashioned stealing from banks--just doing it the electronic way--cyber crime cripples American innovation, kills jobs here at home, and undermines our economic and national security.

Congress must act to protect Americans from these Internet dangers and to protect our civil liberties. Let me say at the outset that the government must not be allowed to snoop indiscriminately into our online activity, to read our e-mail, or to watch us online. There simply is no need for such an invasion of privacy, and we must move forward with that firmly in mind.

The majority leader has introduced a leadership bill

that will be a vehicle for our work. The Commerce Committee, led by Chairman Rockefeller and Ranking Member Snowe, both of whom I had the privilege to serve with on the Intelligence Committee, and the Homeland Security Committee, led by Chairman Lieberman and Ranking Member Collins, reported key bills last year. Chairman Leahy and the Judiciary Committee have reported important legislation on data breach and other issues central to cybersecurity. The Armed Services, Energy, and other committees have studied the issue from the perspective of their particular jurisdictions and expertise, and under the leadership of Chairman Feinstein, the Intelligence Committee Cybersecurity Task Force completed its classified report last July, authored by me, Senator Mikulski, and Senator Snowe. So we have been ready in Congress.

The administration has now weighed in with its own proposal, recognizing that we need cybersecurity legislation to make our Nation safer and launching in earnest our legislative process.

We have hard work ahead to find the best possible solutions to this complex and grave challenge to our national and economic security. As we begin, I would like to flag five issues that I believe must be addressed as this legislation goes forward.

First, we need to build greater public awareness of cybersecurity threats going forward.

What is the problem? The problem is that information affecting the dot.gov and the dot.mil domains--the government domains--is largely classified. And in the dot.com, dot.net, and dot.org domains, threat information is often kept proprietary by the victim business so as not to worry shareholders, customers, and regulators, or give ammunition to competitors. The result is that Americans are left in the dark about the level of danger that is actually out there on the Internet.

The administration's proposal would require covered businesses to notify customers if their personal information is stolen, expand reporting of cybersecurity threats, and require some public assessments of cyber readiness.

I believe more can still be done on these fronts. I have had the pleasure of working with Senator Kyl to introduce S. 931, the Cyber Security Public Awareness Act. I would like to urge interested colleagues to review it and consider including it as part of our larger cybersecurity legislation. That is first.

Second, the Senate needs to ensure that we give private industry the tools necessary for self-defense against cyber attacks.

Proper sharing among and within industries of cybersecurity threat information is vital. The administration took an important step by recommending, subject to various safeguards, enhanced sharing of cybersecurity threat information by the government with private industry. But we may also need to remove legal impediments that unnecessarily limit the sharing of threat information within industries, and we should be prepared to listen here to the private sector's needs as they set up those areas for safe communications about the cyber threats they share.

Third, our Nation does not have basic rules of the road for end users, ISPs, and software and hardware suppliers.

The administration proposal includes important provisions that would move us in the right direction. Assuming that ISPs--Verizon and Comcast and the companies that are actually providing the service--assuming that these companies qualify as critical infrastructure, which is an assumption we should clarify before getting too far down this path, the administration's proposal would require them to develop a standardized framework to address cybersecurity.

Sensible laws and regulations have made our highways safe, and we need similarly to make our information highways safe. Federal procurement can encourage effective cybersecurity standards with appropriate supply chain security so as to improve cybersecurity across the hardware and software industries. These improvements will benefit the government directly, but it will also improve the security of all products on which business and consumers rely.

Americans are too often unaware of dangerous malware that has been surreptitiously inserted into our own computers, and we do not take readily available measures to protect ourselves and those with whom we link.

One leading ISP, Comcast, deserves credit for developing a new mechanism to notify and assist its customers when their computers have been compromised by malicious software or botnets. All other ISPs should work together to join, strengthen, and standardize this program. In Australia, ISPs have developed a code of conduct that may be a model for their American counterparts in this regard.

The fourth point: It is vital that the government have an instant response plan that clearly allocates responsibilities for responding to a major cyber attack or breach. The administration proposal puts the responsibility for such incident response with the Department of Homeland Security Cybersecurity Center envisioned by the proposal. I look forward to working with the administration and my colleagues on that aspect of the proposal.

More generally, the administration proposal, like bills that have been reported in the Senate, gives the Department of Homeland Security a leadership role in our Nation's cybersecurity. We have to remember this is a relatively new role for the Department of Homeland Security. It is one of a great many different responsibilities that the Department of Homeland Security bears, and it is a role in which much of the government's expertise resides in other agencies than the Department of Homeland Security.

The Department of Homeland Security's role must be configured to attract sufficiently high-caliber cybersecurity professionals to ensure that DHS properly leverages the cybersecurity expertise at those other agencies and to assure sufficient independence and credibility of the Cybersecurity Center to perform this vital mission, even as administration change and attention to cybersecurity waxes and wanes. Cybersecurity is a real and present danger, so we must also plan for and minimize the interim period in which DHS builds up its cybersecurity expertise, promulgates necessary regulations, and otherwise grows into any new role with which it is tasked.

Cyber attacks happen at the speed of light, so the best defense requires that we preposition some of our defensive capabilities. Many of our Nation's leading experts who have seen the dark heart of the Internet's dangers and understand the cyber threat in its dimensions recommend rapidly creating secure domains for our most critical infrastructure--our electric grid being the most obvious example. These would be domains in which our Nation's best cybersecurity defenses could be both lawful and effective. Obviously, this would need to be done in a very transparent manner, subject to strict oversight. But we as a country have impressive capabilities in this area, and we need to make sure those impressive capabilities protect our critical infrastructure as soon as possible. They are not deployed to protect critical infrastructure now.

Fifth, countries around the world, including countries that dedicate significant resources to exploiting our cyber vulnerabilities, are working hard to build their cyber workforces. We must not fall behind.

This means enabling our colleges and universities, in partnership with private companies, government agencies, and other cybersecurity innovators, to research the next great cybersecurity technology and to build the cyber human capital our Nation needs to defend itself and continue to flourish on the Internet.

Academic and technological leaders in my State, such as the University of Rhode Island and Brown University, have been hard at work developing new cybersecurity technologies and strengthening our Nation's cyber expertise. I look forward to working with them as we go forward.

There are other vital issues we must address, many of which I have spoken about previously on this floor. We must work, for example, to scale up our Nation's cybersecurity and law enforcement resources to match the seriousness of the threat posed by cyber criminals, by terrorist organizations, and by hostile nation states using cyberspace to attack our Nation.

The bottom line is we have a lot of important work to do. I am glad there is every indication that it will be bipartisan work, undertaken with the country's best interests in mind. I look forward to taking on this task with my colleagues in the months ahead.

I yield the floor.

BREAK IN TRANSCRIPT


Source
arrow_upward