Threats to the US Research Enterprise: China's Talent Recruitment

Total Page:16

File Type:pdf, Size:1020Kb

Threats to the US Research Enterprise: China's Talent Recruitment United States Senate PERMANENT SUBCOMMITTEE ON INVESTIGATIONS Committee on Homeland Security and Governmental Affairs Rob Portman, Chairman Tom Carper, Ranking Member Threats to the U.S. Research Enterprise: China’s Talent Recruitment Plans STAFF REPORT PERMANENT SUBCOMMITTEE ON INVESTIGATIONS UNITED STATES SENATE Threats to the U.S. Research Enterprise: China’s Talent Recruitment Plans TABLE OF CONTENTS I. EXECUTIVE SUMMARY .................................................................................. 1 II. FINDINGS OF FACT AND RECOMMENDATIONS ................................... 7 III. BACKGROUND ................................................................................................ 14 A. China’s Goal to be the Science and Technology Leader by 2050 .................. 14 1. From Brain Drain to Brain Gain .............................................................. 15 2. China’s Systematic Targeting of Critical Technologies ........................... 17 3. China’s Military-Civilian Fusion Strategy .............................................. 18 4. China’s Strategic Plan for Talent Recruitment ....................................... 20 B. Congressional Testimony on Chinese Talent Recruitment Plans ................ 30 C. China Deletes References to the Thousand Talents Plan ............................. 32 D. After Implementation of Talent Recruitment Plans, More Chinese Students, Researchers, and Scientists are Returning to China .................................... 35 IV. EFFORTS TO SECURE U.S. RESEARCH .................................................. 37 A. THE NATIONAL SCIENCE FOUNDATION ............................................... 39 1. Fundamental Research ............................................................................. 40 2. The NSF Grant Process ............................................................................ 41 3. Foreign Support and Affiliation Disclosure ............................................. 42 4. The NSF is Unprepared to Stop Foreign Talent Recruitment Plan Members From Misappropriating U.S.-Funded Research ...................... 44 5. Talent Recruitment Plan Members Misappropriated NSF Research .... 48 B. THE NATIONAL INSTITUTES OF HEALTH ............................................. 50 1. NIH Grant Process .................................................................................... 51 2. Disclosure of Foreign Support and Affiliations ....................................... 52 3. NIH’s Division of Grants Compliance and Oversight ............................. 53 4. The HHS IG Identified Weaknesses in Tracking and Reporting Foreign Financial Conflicts of Interest .................................................................. 54 i 5. Weaknesses in NIH’s Internal Controls for Monitoring and Permitting Foreign Access to Sensitive Data ............................................................. 57 6. TTP Members Misappropriated NIH Research ....................................... 58 C. THE DEPARTMENT OF ENERGY .............................................................. 65 1. National Laboratories ............................................................................... 66 2. Foreign Scientists and the Department of Energy .................................. 67 3. Department of Energy Financial Assistance Programs .......................... 68 4. Energy Did Not Implement Policies Prohibiting Involvement in Foreign Talent Recruitment Plans Until 2019 ...................................................... 70 5. TTP Members Likely Stole Energy Research and Intellectual Property 72 D. THE DEPARTMENT OF STATE .................................................................. 75 1. The Nonimmigrant Visa Application Review Process ............................. 75 2. Security Advisory Opinions ...................................................................... 76 3. Consular Affairs Has Limited Authority to Deny Visa Applicants on National Security Grounds Related to Intellectual Property Theft ....... 78 4. Consular Officers Manually Search State’s “Technology Alert List” and Other Supporting Documentation ............................................................ 79 5. Chinese Visa Applicants Comprise a Majority of Visa Mantis Reviews, But Are Rarely Denied .............................................................................. 80 6. Ongoing Criminal Prosecution Highlights Problems with State’s Lack of Scrutiny of Research Scholar Visas .......................................................... 81 E. THE DEPARTMENT OF COMMERCE ........................................................ 83 1. Deemed Export Licensing ......................................................................... 84 2. A Majority of Deemed Export Licenses are for Chinese Nationals ........ 87 3. Commerce Rarely Denies License Applications ...................................... 88 4. Commerce Issued Deemed Export Licenses for Chinese Nationals Linked to Talent Recruitment Plans and Other Concerning Entities .... 88 F. THE FEDERAL BUREAU OF INVESTIGATION ....................................... 92 1. The FBI was Slow to Recognize the Threat ............................................. 93 2. The FBI Took Nearly Two Years to Disseminate Talent Recruitment Plan Information to Federal Grant-Making Agencies ............................. 94 ii 3. The FBI Disbanded its National Security Higher Education Advisory Board ......................................................................................................... 95 4. The FBI Continues to Lack a Coordinated National Outreach Program on the Threat from Talent Recruitment Plans ........................................ 97 G. THE OFFICE OF SCIENCE AND TECHNOLOGY POLICY .................... 100 1. The National Science and Technology Council ...................................... 100 2. Joint Committee on the Research Environment ................................... 101 3. Inconsistent Federal Grant Policies and Outreach Efforts Complicate OSTP’s Ability to Respond to Foreign Talent Recruitment Plans ........ 103 iii I. EXECUTIVE SUMMARY American taxpayers contribute over $150 billion each year to scientific research in the United States. Through entities like the National Science Foundation, the National Institutes of Health and the Department of Energy’s National Labs, taxpayers fund innovations that contribute to our national security and profoundly change the way we live. America built this successful research enterprise on certain values: reciprocity, integrity, merit-based competition, and transparency. These values foster a free exchange of ideas, encourage the most rigorous research results to flourish, and ensure that researchers receive the benefit of their intellectual capital. The open nature of research in America is manifest; we encourage our researchers and scientists to “stand on the shoulders of giants.” In turn, America attracts the best and brightest. Foreign researchers and scholars travel to the United States just to participate in the advancement of science and technology. Some countries, however, seek to exploit America’s openness to advance their own national interests. The most aggressive of them has been China. China primarily does this through its more than 200 talent recruitment plans—the most prominent of which is the Thousand Talents Plan. Launched in 2008, the Thousand Talents Plan incentivizes individuals engaged in research and development in the United States to transmit the knowledge and research they gain here to China in exchange for salaries, research funding, lab space, and other incentives. China unfairly uses the American research and expertise it obtains for its own economic and military gain. In recent years, federal agencies have discovered talent recruitment plan members who downloaded sensitive electronic research files before leaving to return to China, submitted false information when applying for grant funds, and willfully failed to disclose receiving money from the Chinese government on U.S. grant applications. This report exposes how American taxpayer funded research has contributed to China’s global rise over the last 20 years. During that time, China openly recruited U.S.-based researchers, scientists, and experts in the public and private sector to provide China with knowledge and intellectual capital in exchange for monetary gain and other benefits. At the same time, the federal government’s grant-making agencies did little to prevent this from happening, nor did the FBI and other federal agencies develop a coordinated response to mitigate the threat. These failures continue to undermine the integrity of the American research enterprise and endanger our national security. * * * * China aims to be the world’s leader in science and technology (“S&T”) by 2050. To achieve its S&T goals, China has implemented a whole-of-government campaign to recruit talent and foreign experts from around the world. China’s campaign is well financed. According to an analysis by the FBI, China has pledged 1 to spend 15 percent of its gross domestic product on improving human resources from 2008 to 2020. That amounts to an investment of more than $2 trillion. For the Chinese government, international scientific collaboration is not about advancing science, it is to advance China’s national security interests. China’s Talent Recruitment Plans. Foreign trained scientists and experts provide China access to know-how, expertise, and foreign technology—all necessary for China’s economic development
Recommended publications
  • Threat Vector (Thorndike Perss Large Print Basic) by Tom Clancy
    Threat Vector (Thorndike Perss Large Print Basic) by Tom Clancy Ebook Threat Vector (Thorndike Perss Large Print Basic) currently available for review only, if you need complete ebook Threat Vector (Thorndike Perss Large Print Basic) please fill out registration form to access in our databases Download here >> Series:::: Thorndike Perss Large Print Basic+++Paperback:::: 960 pages+++Publisher:::: Large Print Press; Large Print edition (December 3, 2013)+++Language:::: English+++ISBN-10:::: 1594136688+++ISBN-13:::: 978-1594136689+++Product Dimensions::::5.5 x 1 x 8.5 inches++++++ ISBN10 1594136688 ISBN13 978-1594136 Download here >> Description: As China plans to invade Taiwan, and launches a cyber attack on the U.S., President Jack Ryan, his son and the team at the Campus have to act fast if they are going to stop the increasingly rogue nation. (suspense). THREAT VECTOR is a Tom Clancy novel with Jack Ryan written by Mark Greaney. The fact that it’s a Jack Ryan novel makes the story appealing. The book’s relevance to today’s (2016) real world crises with China and Russia makes it even more enticing. As in most Clancy/Greaney novels the first 20 percent of the book is filled with superfluous and boring background narration. If you can wind your way through this early part you will be rewarded. Most of the action takes place in China and the South China Sea. The book is full of exciting, action- packed scenarios. There’s even a couple of good air-to-air battles thrown in to indulge the flyboys among us. President Ryan and Jack Junior play key roles in these scenarios.
    [Show full text]
  • Read Book > Tom Clancy Locked on and Threat Vector
    AXIP4PC16STW ^ PDF ^ Tom Clancy Locked on and Threat Vector (2-In-1 Collection) Tom Clancy Locked on and Th reat V ector (2-In-1 Collection) Filesize: 3.31 MB Reviews Comprehensive guideline! Its such a good read through. It is actually writter in basic words and not confusing. I am just easily could possibly get a enjoyment of reading a composed book. (Lonzo Wilderman) DISCLAIMER | DMCA KQP66MYYB4CV Book < Tom Clancy Locked on and Threat Vector (2-In-1 Collection) TOM CLANCY LOCKED ON AND THREAT VECTOR (2-IN-1 COLLECTION) To save Tom Clancy Locked on and Threat Vector (2-In-1 Collection) PDF, you should click the web link beneath and download the file or have accessibility to other information which are have conjunction with TOM CLANCY LOCKED ON AND THREAT VECTOR (2-IN-1 COLLECTION) book. BRILLIANCE AUDIO, United States, 2015. CD-Audio. Book Condition: New. Unabridged. 170 x 135 mm. Language: English . Brand New. Two Tom Clancy novels in one collection. Locked On Although his father had been reluctant to become a field operative, Jack Ryan Jr. wants nothing more. Privately training with a seasoned Special Forces drill instructor, he s honing his skills to transition his work within The Campus from intelligence analysis to hunting down and eliminating terrorists wherever he can even as Jack Ryan Sr. campaigns for re-election as President of the United States. But what neither father nor son knows is that the political and the personal have just become equally dangerous. A devout enemy of Jack Sr. launches a privately funded vendetta to discredit him by connecting the presidential candidate to a mysterious killing in the past by John Clark, his longtime ally.
    [Show full text]
  • Post 9/11 Maritime Security Measures : Global Maritime Security Versus Facilitation of Global Maritime Trade Norhasliza Mat Salleh World Maritime University
    World Maritime University The Maritime Commons: Digital Repository of the World Maritime University World Maritime University Dissertations Dissertations 2006 Post 9/11 maritime security measures : global maritime security versus facilitation of global maritime trade Norhasliza Mat Salleh World Maritime University Follow this and additional works at: http://commons.wmu.se/all_dissertations Part of the Defense and Security Studies Commons Recommended Citation Mat Salleh, Norhasliza, "Post 9/11 maritime security measures : global maritime security versus facilitation of global maritime trade" (2006). World Maritime University Dissertations. 98. http://commons.wmu.se/all_dissertations/98 This Dissertation is brought to you courtesy of Maritime Commons. Open Access items may be downloaded for non-commercial, fair use academic purposes. No items may be hosted on another server or web site without express written permission from the World Maritime University. For more information, please contact [email protected]. WORLD MARITIME UNIVERSITY Malmö, Sweden POST 9/11 MARITIME SECURITY MEASURES: Global Maritime Security versus the Facilitation of Global Maritime Trade By NORHASLIZA MAT SALLEH Malaysia A dissertation submitted to the World Maritime University in partial fulfilment of the requirements for the award of the degree of MASTERS OF SCIENCE in MARITIME AFFAIRS (MARITIME ADMINISTRATION) 2006 © Copyright Norhasliza MAT SALLEH, 2006 DECLARATION I certify that all material in this dissertation that is not my own work has been identified, and that no material is included for which a degree has previously been conferred on me. The content of this dissertation reflect my own personal views, and are not necessarily endorsed by the University. Signature : …………………………… Date : ……………………………. Supervised by: Cdr.
    [Show full text]
  • China As a "Cyber Great Power": Beijing's Two Voices In
    SECURITY, STRATEGY, AND ORDER APRIL 2021 CHINA AS A “CYBER GREAT POWER” BEIJING’S TWO VOICES IN TELECOMMUNICATIONS RUSH DOSHI, EMILY DE LA BRUYÈRE, NATHAN PICARSIC, AND JOHN FERGUSON CHINA AS A “CYBER GREAT POWER” BEIJING’S TWO VOICES IN TELECOMMUNICATIONS RUSH DOSHI, EMILY DE LA BRUYÈRE, NATHAN PICARSIC, AND JOHN FERGUSON EXECUTIVE SUMMARY External Chinese government and commercial messaging on information technology (IT) speaks in one voice. Domestically, one hears a different, second voice. The former stresses free markets, openness, collaboration, and interdependence, themes that suggest Huawei and other Chinese companies ought to be treated like other global private sector actors and welcomed into foreign networks. Meanwhile, domestic Chinese government, commercial, and academic discourse emphasizes the limits of free markets and the dangers of reliance on foreign technologies — and, accordingly, the need for industrial policy and government control to protect technologies, companies, and networks. Domestic Chinese discourse also indicates that commercial communication networks, including telecommunications systems, might be used to project power and influence offensively; that international technical standards offer a means with which to cement such power and influence; and — above all — that IT architectures are a domain of zero-sum competition. That external Chinese government and corporate messaging might be disingenuous is by no means a novel conclusion. However, the core differences between that messaging and Chinese internal discussion on IT remain largely undocumented — despite China’s increasing development of and influence over international IT infrastructures, technologies, and norms. This report seeks to fill that gap, documenting the tension between external and internal Chinese discussions on telecommunications, as well as IT more broadly.
    [Show full text]
  • Threats to the US Research Enterprise: China's Talent Recruitment
    United States Senate PERMANENT SUBCOMMITTEE ON INVESTIGATIONS Committee on Homeland Security and Governmental Affairs Rob Portman, Chairman Tom Carper, Ranking Member Threats to the U.S. Research Enterprise: China’s Talent Recruitment Plans STAFF REPORT PERMANENT SUBCOMMITTEE ON INVESTIGATIONS UNITED STATES SENATE Threats to the U.S. Research Enterprise: China’s Talent Recruitment Plans TABLE OF CONTENTS I. EXECUTIVE SUMMARY .................................................................................. 1 II. FINDINGS OF FACT AND RECOMMENDATIONS ................................... 7 III. BACKGROUND ................................................................................................ 14 A. China’s Goal to be the Science and Technology Leader by 2050 .................. 14 1. From Brain Drain to Brain Gain .............................................................. 15 2. China’s Systematic Targeting of Critical Technologies ........................... 17 3. China’s Military-Civilian Fusion Strategy .............................................. 18 4. China’s Strategic Plan for Talent Recruitment ....................................... 20 B. Congressional Testimony on Chinese Talent Recruitment Plans ................ 30 C. China Deletes References to the Thousand Talents Plan ............................. 32 D. After Implementation of Talent Recruitment Plans, More Chinese Students, Researchers, and Scientists are Returning to China .................................... 35 IV. EFFORTS TO SECURE U.S. RESEARCH .................................................
    [Show full text]
  • China's Quest for Global Primacy: an Analysis of Chinese International
    C O R P O R A T I O N TIMOTHY R. HEATH, DEREK GROSSMAN, ASHA CLARK China’s Quest for Global Primacy An Analysis of Chinese International and Defense Strategies to Outcompete the United States For more information on this publication, visit www.rand.org/t/RRA447-1 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-1-9774-0615-6 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2021 RAND Corporation R® is a registered trademark. Cover images: prospective56/iStock/ Getty Images Plus; MF3d/iStock/Getty Images Plus Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface This research explores possible international and defense strategies that China might employ to outcompete the United States and achieve a position of international primacy.
    [Show full text]
  • Haiyang Qiangguo: China As a Maritime Power
    15 March 2016 Haiyang Qiangguo: China as a Maritime Power A paper for the “China as a Maritime Power” Conference Revised and updated March 2016 CNA Headquarters Arlington, Virginia By Dr. Thomas J. Bickford Senior Research Scientist China Studies Division of CNA We should pay close attention to both development and security. The former is the foundation of the latter while the latter is a precondition for the former. A wealthy country may build a strong army, and a strong army is able to safeguard a country.1 Xi Jinping pointed out: China is at once a continental power and a maritime power (haiyang daguo) and it possesses broad maritime strategic interests…These achievements have laid a solid foundation for building a strong maritime power (haiyang qiangguo).2 At its 18th Party Congress in November 2012, the Chinese Communist Party adopted a new goal—that China “should enhance our capacity for exploiting marine resources, develop the marine economy, protect the marine ecological environment, resolutely safeguard China’s 1 Xi Jinping, “A Holistic View of National Security,” in The Governance of China, (Beijing: Foreign Languages Press, 2014). 2 “Xi Jinping Stresses the Need To Show Greater Care About the Ocean, Understand More About the Ocean and Make Strategic Plans for the Use of the Ocean, Push Forward the Building of a Maritime Power and Continuously Make New Achievements at the Eighth Collective Study Session of the CPC Central Committee Political Bureau.” Xinhua. July 31, 2013. 1 maritime rights and interests, and build China into a strong maritime power (emphasis added).3 Subsequent commentary by Chinese leaders and national-level documents characterize the goal of becoming a maritime power as essential to China’s national development strategy, the people’s well-being, the safeguarding of national sovereignty, and the rejuvenation of the Chinese nation.4 The 18th Party Congress thus marks an important defining moment.
    [Show full text]
  • He Man the Americans Had Dubbed Target One Sat at His Regular Bistro
    TWO he man the Americans had dubbed Target One sat at This regular bistro table at the sidewalk café in front of the May Hotel on Mimar Hayrettin. Most nights, when the weather was nice, he stopped here for a shot or two of raki in chilled sparkling water. The weather this evening was awful, but the long canopy hung over the sidewalk tables by the staff of the May kept him dry. There were just a few other patrons seated under the can- opy, couples smoking and drinking together before either heading back up to their rooms in the hotel or out to other Old Town nightlife destinations. Target One had grown to live for his evening glass of raki. The anise-fl avored milky white drink made from grape pom- ace was alcoholic, and forbidden in his home country of Libya and other nations where the more liberal Hanafi school of Islam is not de rigueur, but the ex–JSO spy had been forced 99780399160455_ThreatVector_TX1_p1-500.indd780399160455_ThreatVector_TX1_p1-500.indd 1010 110/5/120/5/12 88:23:23 AMAM THREAT VECTOR into the occasional use of alcohol for tradecraft purposes dur- ing his service abroad. Now that he had become a wanted man, he’d grown to rely on the slight buzz from the liquor to help relax him and aid in his sleep, though even the liberal Hanafi school does not permit intoxication. There were just a few vehicles rolling by on the cobble- stone street ten feet from his table. This road was hardly a busy thoroughfare, even on weekend nights with clear skies.
    [Show full text]
  • Strategic Latency: Red, White, and Blue Managing the National and International Security Consequences of Disruptive Technologies Zachary S
    Strategic Latency: Red, White, and Blue Managing the National and International Security Consequences of Disruptive Technologies Zachary S. Davis and Michael Nacht, editors Center for Global Security Research Lawrence Livermore National Laboratory February 2018 Disclaimer: This document was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor Lawrence Livermore National Security, LLC, nor any of their employees makes any warranty, expressed or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States government or Lawrence Livermore National Security, LLC. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States government or Lawrence Livermore National Security, LLC, and shall not be used for advertising or product endorsement purposes. LLNL-BOOK-746803 Strategic Latency: Red, White, and Blue: Managing the National and International Security Consequences of Disruptive Technologies Zachary S. Davis and Michael Nacht, editors Center for Global Security Research Lawrence Livermore National Laboratory February
    [Show full text]
  • Section 2: the China Model: Return of the Middle Kingdom
    SECTION 2: THE CHINA MODEL: RETURN OF THE MIDDLE KINGDOM Key Findings • The Chinese Communist Party (CCP) seeks to revise the inter- national order to be more amenable to its own interests and authoritarian governance system. It desires for other countries not only to acquiesce to its prerogatives but also to acknowledge what it perceives as China’s rightful place at the top of a new hierarchical world order. • The CCP’s ambitions for global preeminence have been con- sistent throughout its existence: every CCP leader since Mao Zedong has proclaimed the Party would ultimately prove the superiority of its Marxist-Leninist system over the rest of the world. Under General Secretary of the CCP Xi Jinping, the Chi- nese government has become more aggressive in pursuing its interests and promoting its model internationally. • The CCP aims to establish an international system in which Beijing can freely influence the behavior and access the mar- kets of other countries while constraining the ability of others to influence its behavior or access markets it controls. The “com- munity of common human destiny,” the CCP’s proposed alter- native global governance system, is explicitly based on histor- ical Chinese traditions and presumes Beijing and the illiberal norms and institutions it favors should be the primary forces guiding globalization. • The CCP has attempted to use the novel coronavirus (COVID-19) pandemic to promote itself as a responsible and benevolent global leader and to prove that its model of governance is su- perior to liberal democracy. Thus far, it appears Beijing has not changed many minds, if any.
    [Show full text]
  • Threat Vector PDF Book
    THREAT VECTOR PDF, EPUB, EBOOK Tom Clancy,Mark Greaney | 598 pages | 03 Dec 2013 | Berkley Books | 9780425262306 | English | United States Threat Vector PDF Book The opposing force, in typical Clancy Characterization really isn't the forte of either of the authors. At the other end of the scale, intentional insider threats are on the rise according to recent industry reports. They could turn off our electric grid, divert our water, interrupt our public transportation and their capabilities to wreak havoc could and probably will improve even more. And operations like the Istanbul operation are dumb -- why would they take so many risks just for vengeance? Caruso convinces Ryan to investigate Kraft to see why she installed the tracker on his phone. They extort him, and when he says he will do anything to keep the incident quiet, he is told to go back home to the US and await instructions. Start your review of Threat Vector Michael Pacino, 6. Save my name, email, and website in this browser for the next time I comment. Tom Clancy has left the building. All kidding aside, I enjoy the Campus series as a delightfully off-kilter spy series about a bunch of heroic do-gooers against EVIL terrorists. Center then arranges for Yao to be killed by a car bomb; however, the CIA officer survives the blast and goes off the grid, investigating Center on his own. And in Russia, a washed up SVR spymaster makes a deal with an unknown devil to give him a new lease of life. If you liked this post, you will enjoy our newsletter.
    [Show full text]
  • Urgent Actions Are Needed to Address Cybersecurity Challenges Facing the Nation
    United States Government Accountability Office Testimony Before the Subcommittees on Government Operations and Information Technology, Committee on Oversight and Government Reform, House of Representatives For Release on Delivery Expected at 2:00 p.m. ET Wednesday, July 25, 2018 HIGH-RISK SERIES Urgent Actions Are Needed to Address Cybersecurity Challenges Facing the Nation Statement of Gene L. Dodaro, Comptroller General of the United States GAO-18-645T July 2018 HIGH-RISK SERIES Urgent Actions Are Needed to Address Cybersecurity Challenges Facing the Nation Highlights of GAO-18-645T, a testimony before the Subcommittees on Government Operations and Information Technology, Committee on Oversight and Government Reform, House of Representatives Why GAO Did This Study What GAO Found Federal agencies and the nation’s GAO has identified four major cybersecurity challenges and 10 critical actions critical infrastructures—such as that the federal government and other entities need to take to address them. energy, transportation systems, GAO continues to designate information security as a government-wide high-risk communications, and financial area due to increasing cyber-based threats and the persistent nature of security services—are dependent on vulnerabilities. information technology systems to carry out operations. The security of Ten Critical Actions Needed to Address Four Major Cybersecurity Challenges these systems and the data they use is vital to public confidence and national security, prosperity, and well-being. The risks to these systems are increasing as security threats evolve and become more sophisticated. GAO first designated information security as a government-wide high-risk area in 1997. This was expanded to include protecting cyber critical infrastructure in 2003 and protecting the privacy of personally identifiable information in 2015.
    [Show full text]