Emerging Cyber Threats to the United States Hearing
Total Page:16
File Type:pdf, Size:1020Kb
EMERGING CYBER THREATS TO THE UNITED STATES HEARING BEFORE THE SUBCOMMITTEE ON CYBERSECURITY, INFRASTRUCTURE PROTECTION, AND SECURITY TECHNOLOGIES OF THE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED FOURTEENTH CONGRESS SECOND SESSION FEBRUARY 25, 2016 Serial No. 114–55 Printed for the use of the Committee on Homeland Security Available via the World Wide Web: http://www.gpo.gov/fdsys/ U.S. GOVERNMENT PUBLISHING OFFICE 21–527 PDF WASHINGTON : 2016 For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 COMMITTEE ON HOMELAND SECURITY MICHAEL T. MCCAUL, Texas, Chairman LAMAR SMITH, Texas BENNIE G. THOMPSON, Mississippi PETER T. KING, New York LORETTA SANCHEZ, California MIKE ROGERS, Alabama SHEILA JACKSON LEE, Texas CANDICE S. MILLER, Michigan, Vice Chair JAMES R. LANGEVIN, Rhode Island JEFF DUNCAN, South Carolina BRIAN HIGGINS, New York TOM MARINO, Pennsylvania CEDRIC L. RICHMOND, Louisiana LOU BARLETTA, Pennsylvania WILLIAM R. KEATING, Massachusetts SCOTT PERRY, Pennsylvania DONALD M. PAYNE, JR., New Jersey CURT CLAWSON, Florida FILEMON VELA, Texas JOHN KATKO, New York BONNIE WATSON COLEMAN, New Jersey WILL HURD, Texas KATHLEEN M. RICE, New York EARL L. ‘‘BUDDY’’ CARTER, Georgia NORMA J. TORRES, California MARK WALKER, North Carolina BARRY LOUDERMILK, Georgia MARTHA MCSALLY, Arizona JOHN RATCLIFFE, Texas DANIEL M. DONOVAN, JR., New York BRENDAN P. SHIELDS, Staff Director JOAN V. O’HARA, General Counsel MICHAEL S. TWINCHEK, Chief Clerk I. LANIER AVANT, Minority Staff Director SUBCOMMITTEE ON CYBERSECURITY, INFRASTRUCTURE PROTECTION, AND SECURITY TECHNOLOGIES JOHN RATCLIFFE, Texas, Chairman PETER T. KING, New York CEDRIC L. RICHMOND, Louisiana TOM MARINO, Pennsylvania LORETTA SANCHEZ, California SCOTT PERRY, Pennsylvania SHEILA JACKSON LEE, Texas CURT CLAWSON, Florida JAMES R. LANGEVIN, Rhode Island DANIEL M. DONOVAN, JR., New York BENNIE G. THOMPSON, Mississippi (ex officio) MICHAEL T. MCCAUL, Texas (ex officio) BRETT DEWITT, Subcommittee Staff Director JOHN DICKHAUS, Subcommittee Clerk CHRISTOPHER SCHEPIS, Minority Subcommittee Staff Director (II) C O N T E N T S Page STATEMENTS The Honorable John Ratcliffe, a Representative in Congress From the State of Texas, and Chairman, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies: Oral Statement ..................................................................................................... 1 Prepared Statement ............................................................................................. 3 The Honorable Cedric L. Richmond, a Representative in Congress From the State of Louisiana, and Ranking Member, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies: Oral Statement ..................................................................................................... 4 Prepared Statement ............................................................................................. 5 The Honorable Michael T. McCaul, a Representative in Congress From the State of Texas, and Chairman, Committee on Homeland Security: Prepared Statement ............................................................................................. 47 The Honorable Bennie G. Thompson, a Representative in Congress From the State of Mississippi, and Ranking Member, Committee on Homeland Security: Prepared Statement ............................................................................................. 49 The Honorable Sheila Jackson Lee, a Representative in Congress From the State of Texas: Prepared Statement ............................................................................................. 6 WITNESSES Mr. Frank J. Cilluffo, Associate Vice President and Director, Center for Cyber and Homeland Security, The George Washington University: Oral Statement ..................................................................................................... 10 Prepared Statement ............................................................................................. 13 Ms. Jennifer Kolde, Lead Technical Director, FireEye Threat Intelligence: Oral Statement ..................................................................................................... 21 Prepared Statement ............................................................................................. 23 Mr. Adam Bromwich, Vice President, Security Technology and Response, Symantec, Testifying on Behalf of the Cyber Threat Alliance: Oral Statement ..................................................................................................... 27 Prepared Statement ............................................................................................. 29 Mr. Isaac R. Porche, III, Associate Director, Forces and Logistics Program, The Rand Army Research Division, The Rand Company: Oral Statement ..................................................................................................... 35 Prepared Statement ............................................................................................. 37 FOR THE RECORD The Honorable Cedric L. Richmond, a Representative in Congress From the State of Louisiana, and Ranking Member, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies: Statement of Tom Patterson, VP/GM Security, Unisys Corporation ............... 50 Letter From the Society for Maintenance & Reliability Professionals ............ 51 The Honorable Sheila Jackson Lee, a Representative in Congress From the State of Texas: Article, ConsumerAffairs ..................................................................................... 55 Article, Slate Magazine ........................................................................................ 57 (III) EMERGING CYBER THREATS TO THE UNITED STATES Thursday, February 25, 2016 U.S. HOUSE OF REPRESENTATIVES, COMMITTEE ON HOMELAND SECURITY, SUBCOMMITTEE ON CYBERSECURITY, INFRASTRUCTURE PROTECTION, AND SECURITY TECHNOLOGIES, Washington, DC. The subcommittee met, pursuant to call, at 2:06 p.m., in Room 311, Cannon House Office Building, Hon. John Ratcliffe [Chairman of the subcommittee] presiding. Present: Representatives Ratcliffe, McCaul, Marino, Donovan, Richmond, and Jackson Lee. Mr. RATCLIFFE. Good afternoon. The Committee on Homeland Se- curity Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies will come to order. The subcommittee is meeting today to examine the evolving cy- bersecurity threats from nation-states such as China, Russia, North Korea, and Iran, as well as cyber threats from criminal orga- nizations and terrorist groups such as ISIS. Over the last several years, we have seen these actors continue to develop and build even more sophisticated cyber capabilities. In 2016, these hackers pose an even greater threat to the U.S. home- land and our critical infrastructure. To put it simply, cybersecurity is National security. In 2015, the Nation was victim to one of the most significant cyber attacks in our history. The breach at the Office of Personnel Management exposed the personal and extremely sensitive security clearance information of 21.5 million current and former Govern- ment employees. In 2014, we saw North Korea conduct a cyber at- tack on Sony Pictures that not only destroyed computers, but also sought to muzzle free speech and threaten American ideals. Unfortunately, the administration’s lack of proportional re- sponses to these cyber attacks has demonstrated to the world that there are no real consequences for such actions. Without a com- prehensive National cybersecurity strategy that addresses deter- rence effectively, I worry that 20l6 could bring an increasing num- ber of those willing to push the boundaries. In recent news, a lot of attention was directed at the Hollywood Presbyterian Medical Center in Los Angeles that was a victim of a ransomware attack. This type of malware infects victims’ com- puters and locks them until a payment, or a ‘‘ransom,’’ is made. The medical center was forced to pay $17,000 to restore its sys- tems. (1) 2 But this isn’t a problem unique to Hollywood. In my own district in Northeast Texas, the Titus Regional Medical Center suffered a similar attack. Their electronic health record system was locked, and they weren’t able to access patient information. Of the nation states, Russia continues to rank near the top in terms of capabilities, with increasing aggression across the globe that may continue to manifest itself in cyber space. The director of national intelligence, James Clapper, told the Senate Armed Serv- ices Committee in September that the Russian government is es- tablishing its own central cyber command that will be responsible for carrying out offensive cyber operations. China also ranks high in terms of capability, and it continues to pose a significant threat to the United States in terms of cyber es- pionage and the theft of intellectual property. In September, the administration announced an agreement with the Chinese govern- ment to refrain from engaging in hacking of our intellectual prop- erty. I look forward to hearing today from our industry witnesses on their thoughts about the success of this agreement. Iran continues to emerge as a top cybersecurity threat, as well. While many would argue that its intent to carry out its attacks is