The Decision to Attack: Military and Intelligence

Total Page:16

File Type:pdf, Size:1020Kb

The Decision to Attack: Military and Intelligence THE DECISION TO ATTACK: MILITARY AND INTELLIGENCE CYBER DECISION-MAKING by AARON FRANKLIN BRANTLY (Under the Direction of Loch K. Johnson) ABSTRACT The debate over the importance of cyber has resulted in the consideration of a new domain of operation vital to national security. States find themselves in an increasingly interconnected world with a diverse threat spectrum and little understanding of how decisions are made within this amorphous domain. Much of the literature on cyber has focused on defining what cyber is. This dissertation examines how states decide to employ cyber in military and intelligence operations against other states. The research question this work seeks to answer is: do states rationally decide to employ cyber in military and intelligence operations against other states? This work contextualizes broader cyber decision-making processes into a systematic expected utility - rational choice approach to provide a mathematical understanding behind the use of cyber weapons at the state level. INDEX WORDS: Cyber, Intelligence, National Security, Decision-Making THE DECISION TO ATTACK: MILITARY AND INTELLIGENCE CYBER DECISION-MAKING by AARON FRANKLIN BRANTLY B.A., Queens University of Charlotte, 2004 M.P.P., The American University, 2008 A Dissertation Submitted to the Graduate Faculty of the University of Georgia in Partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSOPHY ATHENS, GEORGIA 2012 © 2012 AARON FRANKLIN BRANTLY All Rights Reserved THE DECISION TO ATTACK: MILITARY AND INTELLIGENCE CYBER DECISION-MAKING by AARON FRANKLIN BRANTLY Major Professor: Loch K. Johnson Committee: Jeffrey Berejikian Han S. Park Michael Warner Christopher Bronk Electronic Version Approved: Maureen Grasso Dean of the Graduate School The University of Georgia December 2012 iv DEDICATION I dedicate this work to my wife and best friend Nataliya. She has stood by me and waited for more than 5 years while I finished my formal academic education. She has read, commented on, and reread more of my words than anyone. It is her patient and enduring support, which have enabled me to make it as far as I have. v ACKNOWLEDGEMENTS This work would not have been possible without the support and dedication of the diverse committee standing behind me and pushing me forward. In particular, I would like to thank Dr. Loch K. Johnson for his constant feedback and assistance in helping me to develop the ideas presented in this work. Dr. Johnson has inspired me both as a professor and as a mentor. I would also like to thank Dr. Jeffrey Berejikian, Dr. Han S. Park, Dr. Michael Warner, and Dr. Christopher Bronk each of whom have given enormous amounts of time to help me with my academic and professional pursuits. vi TABLE OF CONTENTS ACKNOWLEDGEMENTS ......................................................................................................... v LIST OF TABLES ........................................................................................................................ x LIST OF FIGURES & CHARTS ............................................................................................... xi GLOSSARY ................................................................................................................................ xii INTRODUCTION ........................................................................................................................ 1 CHAPTER 1 Introduction to Cyber Decision-making ....................................................................... 2 What is cyber and why is it important? ................................................................................................ 3 Cyber and International Relations ...................................................................................................... 15 Understanding decisions of states: the logic of rational choice modeling ......................................... 18 How this work is organized ................................................................................................................ 35 CHAPTER 2 .......................................................................................................................................... 37 The Key Concepts of Cyber ................................................................................................................. 37 Why is cyber important to national security? ..................................................................................... 38 Why is cyber an inherently asymmetric domain? .............................................................................. 53 CHAPTER 3 .......................................................................................................................................... 62 The Motivation and Utility for Covert Action ................................................................................... 62 The motivation and rationality for conflict ........................................................................................ 64 Political utility and the literature ........................................................................................................ 73 The use of covert action for political utility ....................................................................................... 75 vii Afghanistan 1980s .............................................................................................................................. 82 Italy 1948 ............................................................................................................................................ 83 Estonia 2007 ....................................................................................................................................... 84 Syria 2007 ........................................................................................................................................... 86 Stuxnet 2009 ....................................................................................................................................... 87 The Utility of Covert Action .............................................................................................................. 89 Section II - The foundations of a rational decision .................................................................. 90 CHAPTER 4 .......................................................................................................................................... 91 Digital Power ......................................................................................................................................... 91 Defining the components of digital hard power ................................................................................. 94 Cyber and its vulnerabilities ............................................................................................................. 106 Conceptualizing cyber power ........................................................................................................... 110 CHAPTER 5 ........................................................................................................................................ 113 Anonymity and Attribution in Cyberspace ...................................................................................... 113 The importance of anonymity .......................................................................................................... 114 Political action and anonymity ......................................................................................................... 119 The value of anonymity .................................................................................................................... 120 Anonymity, attribution, and decisions ............................................................................................. 124 Summarizing the debate ................................................................................................................... 126 CHAPTER 6 ........................................................................................................................................ 128 Cyber and Conventional: The Dynamics of Conflict ...................................................................... 128 The language of conflict ................................................................................................................... 129 Combinatory attacks ......................................................................................................................... 134 Stand-alone conflict .......................................................................................................................... 139 Cyber and conventional tools a tale of objectives ............................................................................ 141 viii CHAPTER 7 ........................................................................................................................................ 144 Defining the Role of Intelligence in Cyber ....................................................................................... 144 Defining Intelligence ........................................................................................................................ 150 Intelligence and the cyber battlespace .............................................................................................. 158 Policy considerations .......................................................................................................................
Recommended publications
  • 2016 8Th International Conference on Cyber Conflict: Cyber Power
    2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 31 MAY - 03 JUNE 2016, TALLINN, ESTONIA 2016 8TH International ConFerence on CYBER ConFlict: CYBER POWER Copyright © 2016 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1626N-PRT ISBN (print): 978-9949-9544-8-3 ISBN (pdf): 978-9949-9544-9-0 CopyriGHT AND Reprint Permissions No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, and for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: [Article author(s)], [full article title] 2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 2016 © NATO CCD COE Publications PrinteD copies OF THIS PUBlication are availaBLE From: NATO CCD COE Publications Filtri tee 12, 10132 Tallinn, Estonia Phone: +372 717 6800 Fax: +372 717 6308 E-mail: [email protected] Web: www.ccdcoe.org Head of publishing: Jaanika Rannu Layout: Jaakko Matsalu LEGAL NOTICE: This publication contains opinions of the respective authors only. They do not necessarily reflect the policy or the opinion of NATO CCD COE, NATO, or any agency or any government.
    [Show full text]
  • Download Thesis
    This electronic thesis or dissertation has been downloaded from the King’s Research Portal at https://kclpure.kcl.ac.uk/portal/ Cyber security and the politics of time Stevens, Timothy Charles Awarding institution: King's College London The copyright of this thesis rests with the author and no quotation from it or information derived from it may be published without proper acknowledgement. END USER LICENCE AGREEMENT Unless another licence is stated on the immediately following page this work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International licence. https://creativecommons.org/licenses/by-nc-nd/4.0/ You are free to copy, distribute and transmit the work Under the following conditions: Attribution: You must attribute the work in the manner specified by the author (but not in any way that suggests that they endorse you or your use of the work). Non Commercial: You may not use this work for commercial purposes. No Derivative Works - You may not alter, transform, or build upon this work. Any of these conditions can be waived if you receive permission from the author. Your fair dealings and other rights are in no way affected by the above. Take down policy If you believe that this document breaches copyright please contact [email protected] providing details, and we will remove access to the work immediately and investigate your claim. Download date: 25. Sep. 2021 1 ] Cyber Security and the Politics of Time Timothy Charles Stevens Thesis submitted in accordance with the requirements for the degree of Doctor of Philosophy King’s College London Department of War Studies November 2013 2 Abstract Time is an under-represented topic in security studies and International Relations (IR).
    [Show full text]
  • Beyond Cyber Doom
    No. 11-01 January 2011 WORKING PAPER BEYOND CYBER-DOOM: Cyberattack Scenarios and the Evidence of History By Sean Lawson The ideas presented in this research are the author’s and do not represent official positions of the Mercatus Center at George Mason University. 1 Beyond Cyber-Doom: Cyberattack Scenarios and the Evidence of History Sean Lawson, Ph.D. Department of Communication University of Utah “[T]hese war games are about the real effects of a cyberwar . about causing chaos in our streets at home due to sudden crashes in our critical infrastructure through manipulation of our banking, transportation, utilities, communications, and other critical infrastructure industries. These are all real scenarios.” (Patterson, 2010b) “In seeking a prudent policy, the difficulty for decision-makers is to navigate the rocky shoals between hysterical doomsday scenarios and uninformed complacency.” (Cavelty, 2007: 144) Introduction Recently, news media and policy makers in the United States have turned their attention to prospective threats to and through an ethereal and ubiquitous technological domain referred to as “cyberspace.” “Cybersecurity” threats include attacks on critical infrastructures like power, water, transportation, and communication systems launched via cyberspace, but also terrorist use of the Internet, mobile phones, and other information and communication technologies (ICTs) for fundraising, recruiting, organizing, and carrying out attacks (Deibert & Rohozinski, 2010). Frustration over a perceived lack of public and policy maker attention to these threats, combined with a belief that “exaggeration” and “appeals to emotions like fear can be more compelling than a rational discussion of strategy” (Lewis, 2010: 4), a number of cybersecurity proponents have deployed what one scholar has called “cyber-doom scenarios” (Cavelty, 2007: 2).
    [Show full text]
  • Cyber Threats to National Security
    DEALING WITH TODAY’S ASYMMETRIC THREAT Cyber Threats to National Security S YMPOSIUM F IVE Keeping the Nation’s Industrial Base Safe From Cyber Threats The Asymmetric Threat website (asymmetricthreat.net) includes downloadable reports from all symposia in both series and serves as a knowledge network to advance the dialogue on national and global security, presenting resources and original research, and providing a forum for review and discussion of pertinent themes and events. S ERIES O NE S ERIES T WO UNCLASSIFIED Cyber Threats to National Security Symposium Five: Keeping the Nation’s Industrial Base Safe From Cyber Threats This document is intended only as a summary of the personal remarks made by participants at the March 1, 2011 symposium, “Keeping the Nation’s Industrial Base Safe From Cyber Threats,” held at the Carnegie Institution for Science, Washington, D.C., and co-sponsored by CACI International Inc (CACI), the U.S. Naval Institute (USNI), and the Center for Security Policy (CSP). It is published as a public service. It does not necessarily reflect the views of CACI, USNI, CSP, the U.S. government, or their officers and employees. The pro bono Asymmetric Threat symposia series was started in 2008 to contribute to the national discourse on the topic of asymmetric threats facing the United States. CACI and the National Defense University sponsored Symposium One in the series, and CACI and USNI sponsored Symposia Two and Three. With Symposium Four, also sponsored by CACI and USNI, a new Asymmetric Threat series was initiated focusing on Cyber Threats. With new sponsor CSP,“Keeping the Nation’s Industrial Base Safe From Cyber Threats” is the fifth symposium in the Asymmetric Threat series and the second in the Cyber Threat series.
    [Show full text]
  • Cyber Security—2010 Hearings Committee On
    S. Hrg. 111–1103 CYBER SECURITY—2010 HEARINGS BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE ONE HUNDRED ELEVENTH CONGRESS SECOND SESSION JUNE 15, 2010 PROTECTING CYBERSPACE AS A NATIONAL ASSET: COMPREHENSIVE LEGISLATION FOR THE 21ST CENTURY NOVEMBER 17, 2010 SECURING CRITICAL INFRASTRUCTURE IN THE AGE OF STUXNET Available via the World Wide Web: http://www.fdsys.gov/ Printed for the use of the Committee on Homeland Security and Governmental Affairs ( U.S. GOVERNMENT PRINTING OFFICE 58–034 PDF WASHINGTON : 2011 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Nov 24 2008 14:00 Nov 14, 2011 Jkt 058034 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 P:\DOCS\58034.TXT SAFFAIRS PsN: PAT COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS JOSEPH I. LIEBERMAN, Connecticut, Chairman CARL LEVIN, Michigan SUSAN M. COLLINS, Maine DANIEL K. AKAKA, Hawaii TOM COBURN, Oklahoma THOMAS R. CARPER, Delaware SCOTT P. BROWN, Massachusetts MARK L. PRYOR, Arkansas JOHN MCCAIN, Arizona MARY L. LANDRIEU, Louisiana GEORGE V. VOINOVICH, Ohio CLAIRE MCCASKILL, Missouri JOHN ENSIGN, Nevada JON TESTER, Montana LINDSEY GRAHAM, South Carolina ROLAND W. BURRIS, Illinois EDWARD E. KAUFMAN, Delaware * CHRISTOPHER A. COONS, Delaware * MICHAEL L. ALEXANDER, Staff Director DEBORAH P. PARKINSON, Senior Professional Staff Member ADAM R, SEDGEWICK, Professional Staff Member BRANDON L. MILHORN, Minority Staff Director and Chief Counsel ROBERT L. STRAYER, Minority Director of Homeland Security Affairs DEVIN F.
    [Show full text]
  • Simulated Crisis Shows Potential Gaps in U.S. Cyber Defenses 18 February 2010, by Bob Drogin
    Simulated crisis shows potential gaps in U.S. cyber defenses 18 February 2010, By Bob Drogin The crisis began when college basketball fans Katrina struck in 2005. "The biggest danger," he downloaded a free March Madness application to declared, "is if we're ineffective." their smart phones. The app hid spyware that stole passwords, intercepted e-mails and created havoc. Panelists brought verisimilitude to their roles. Stewart Baker, former general counsel of the Soon 60 million cell phones were dead. The National Security Agency, said he would urge the Internet crashed and commerce collapsed. White White House to shut down cell phone networks House aides discussed declaring martial law. even if no law specifically allows it. That formed some of the doomsday scenario when "We will be criticized if we don't do everything we 10 former White House advisers and other top can," Baker said. "We can straighten out the (legal) officials met Tuesday in a rare public cyber war- authorities over time." game designed to highlight the potential vulnerability of the nation's digital infrastructure to Francis Fragos Townsend, who served as attack. counterterrorism adviser in the Bush White House, called for rationing of gasoline and other supplies if The results were hardly reassuring. necessary. "We're in uncharted territory here," was the most John Negroponte, who spent most of his career as common refrain during a three-hour simulated a diplomat before becoming the first director of crisis meeting of the National Security Council, the national intelligence, urged a diplomatic approach. crux of the Cyber Shockwave exercise.
    [Show full text]
  • The Cyber-Doom Effect: the Impact of Fear Appeals in the US Cyber Security Debate
    2016 8th International Conference on Cyber Conflict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profit or non-commercial Cyber Power purposes is granted providing that copies bear this notice and a full citation on the N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. 2016 © NATO CCD COE Publications, Tallinn The Cyber-Doom Effect: The Impact of Fear Appeals in the US Cyber Security Debate Sean T. Lawson Haoran Yu Department of Communication Department of Communication University of Utah University of Utah Salt Lake City, Utah, USA Salt Lake City, Utah, USA [email protected] Sara K. Yeo Ethan Greene Department of Communication Department of Communication University of Utah University of Utah Salt Lake City, Utah, USA Salt Lake City, Utah, USA [email protected] Abstract: In the US cyber security debate, observers have noted there is a tendency for policymakers, military leaders, and media, among others, to use frightening ‘cyber-doom scenarios’ when making the case for action on cyber security (Dunn Cavelty, 2008, p. 2). Some have conjectured that these fictional cyber-doom scenarios, which exemplify ‘fear appeals’ in communication research, have the potential to undermine productive debate aimed at addressing genuine cyber security challenges (Valeriano and Ryan, 2015, pp. 7, 196). Yet, few have directly investigated the impacts of such rhetoric. Here, we assess the impact of cyber-doom scenarios by contextualising them within existing scholarship on the impact of fear appeals, a well-studied phenomenon in communication science.
    [Show full text]
  • Cyber-Attacks and the Exploitable Imperfections of International Law
    Cyber-Attacks and the Exploitable Imperfections of International Law Cyber-Attacks and the Exploitable Imperfections of International Law By Yaroslav Radziwill LEIDEN | BOSTON Library of Congress Cataloging-in-Publication Data Radziwill, Yaroslav, author. Cyber-attacks and the exploitable imperfection of international law / by Yaroslav Radziwill. pages cm Based on author’s thesis (doctoral — University of Warwick, 2014) issued under title: Cyber-attacks and international law : imperfections of a stagnant legal regime. Includes bibliographical references and index. ISBN 978-90-04-29833-0 (hardback : alk. paper) — ISBN 978-90-04-29830-9 (e-book) 1. Information warfare (International law) 2. Cyberspace operations (Military science) I. Title. KZ6718.R33 2015 341.6’3—dc23 2015023019 This publication has been typeset in the multilingual “Brill” typeface. With over 5,100 characters covering Latin, ipa, Greek, and Cyrillic, this typeface is especially suitable for use in the humanities. For more information, please see brill.com/brill-typeface. isbn 978-90-04-29833-0 (hardback) isbn 978-90-04-29830-9 (e-book) Copyright 2015 by Koninklijke Brill nv, Leiden, The Netherlands. Koninklijke Brill NV incorporates the imprints Brill, Brill Hes & De Graaf, Brill Nijhoff, Brill Rodopi and Hotei Publishing. All rights reserved. No part of this publication may be reproduced, translated, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior written permission from the publisher. Authorization to photocopy items for internal or personal use is granted by Koninklijke Brill nv provided that the appropriate fees are paid directly to The Copyright Clearance Center, 222 Rosewood Drive, Suite 910, Danvers, ma 01923, usa.
    [Show full text]
  • Crisis and Escalation in Cyberspace
    CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that EDUCATION AND THE ARTS helps improve policy and decisionmaking through ENERGY AND ENVIRONMENT research and analysis. HEALTH AND HEALTH CARE This electronic document was made available from INFRASTRUCTURE AND www.rand.org as a public service of the RAND TRANSPORTATION Corporation. INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY Skip all front matter: Jump to Page 16 POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY Support RAND Purchase this document TERRORISM AND HOMELAND SECURITY Browse Reports & Bookstore Make a charitable contribution For More Information Visit RAND at www.rand.org Explore RAND Project AIR FORCE View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity. Crisis and Escalation in Cyberspace Martin C. Libicki Prepared for the United States Air Force Approved for public release; distribution unlimited PROJECT AIR FORCE The research described in this report was sponsored by the United States Air Force under Contract FA7014-06-C-0001.
    [Show full text]
  • Cyber Meltdown
    ® Copyrighted material Cyber Meltdown.indd 1 4/19/11 4:04 PM Except where noted, Scripture quotations are from The Holy Bible, English Standard Version, copy- right © 2001 by Crossway Bibles, a division of Good News Publishers. Used by permission. All rights reserved. Verses marked nasb are taken from the New American Standard Bible®, © 1960, 1962, 1963, 1968, 1971, 1972, 1973, 1975, 1977, 1995 by The Lockman Foundation. Used by permission. (www.Lock man.org) Verses marked niv are taken from the Holy Bible, New International Version®, NIV®. Copyright © 1973, 1978, 1984, 2011 by Biblica, Inc.™ Used by permission of Zondervan. All rights reserved worldwide. Cover by Dugan Design Group, Bloomington, Minnesota Cover photos © Argus, Alx / Fotolia CYBER MELTDOWN Copyright © 2011 by Ron Rhodes Published by Harvest House Publishers Eugene, Oregon 97402 www.harvesthousepublishers.com Library of Congress Cataloging-in-Publication Data Rhodes, Ron. Cyber meltdown / Ron Rhodes. p. cm. Includes bibliographical references. ISBN 978-0-7369-4417-5 (pbk.) ISBN 987-0-7369-4423-6 (eBook) 1. Bible—Prophecies—Cyberterrorism. 2. Cyberterrorism—Biblical teaching. 3. Bible— Prophecies—End of the world. 4. End of the world—Biblical teaching. I. Title. BS649.C83R46 2011 236'.9—dc22 2010052597 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means—electronic, mechanical, digital, photocopy, recording, or any other—except for brief quotations in printed reviews, without the prior permission of the publisher. Printed in the United States of America 11 12 13 14 15 16 17 18 19 / LB-SK / 10 9 8 7 6 5 4 3 2 1 Copyrighted material Cyber Meltdown.indd 2 4/19/11 4:04 PM CONTENTS Introduction: Technologies That Amaze ...................
    [Show full text]
  • Can Lessons from the Nuclear Experience Provide Answers in Cyberspace?
    CYBER WEAPONS AND NUCLEAR OPTIONS: CAN LESSONS FROM THE NUCLEAR EXPERIENCE PROVIDE ANSWERS IN CYBERSPACE? GEORGETOWN UNIVERSITY A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARD OF HONORS IN SCIENCE, TECHNOLOGY, & INTERNATIONAL AFFAIRS, EDMUND A. WALSH SCHOOL OF FOREIGN SERVICE, GEORGETOWN UNIVERSITY, SPRING 2013. JAYANT GANDHI – CLASS OF 2013 THESIS ADVISOR: PROFESSOR MATTHEW KROENIG 1 2 ABSTRACT Cyber security is one of the latest hot button issues to affect the national security of states across the world. The new technology has yet to be readily placed in any established military doctrine, but there has been a clear preference of how strategists and policy makers desire to treat cyber weapons. Nuclear weapons, and more specifically nuclear deterrence, represent one of the greatest policy issues of the 20 th century with regards to international security. The success of deterrence in preventing not only the use of nuclear weapons, but also the outbreak of war between the major nuclear powers is seen as a major triumph. Modern policy makers look at this success and seek to emulate it in the cyber realm. This has caused the necessary comparison of cyber weapons to nuclear weapons to be made over and over. Arguments have been made on both sides as to whether or not cyber deterrence is possible, but little time has been spent looking at the basis of this discussion: are cyber and nuclear technologies comparable? This paper goes through the early histories of each technology and explores their technical characteristics in order to fully understand the foundations of this analogy.
    [Show full text]
  • Cybersecurity: Next Steps to Protect Our Critical Infrastructure
    S. HRG. 111–667 CYBERSECURITY: NEXT STEPS TO PROTECT OUR CRITICAL INFRASTRUCTURE HEARING BEFORE THE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION UNITED STATES SENATE ONE HUNDRED ELEVENTH CONGRESS SECOND SESSION FEBRUARY 23, 2010 Printed for the use of the Committee on Commerce, Science, and Transportation ( U.S. GOVERNMENT PRINTING OFFICE 57–888 PDF WASHINGTON : 2010 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Nov 24 2008 14:15 Nov 04, 2010 Jkt 057888 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 S:\WPSHR\GPO\DOCS\57888.TXT SCOM1 PsN: JACKIE SENATE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION ONE HUNDRED ELEVENTH CONGRESS SECOND SESSION JOHN D. ROCKEFELLER IV, West Virginia, Chairman DANIEL K. INOUYE, Hawaii KAY BAILEY HUTCHISON, Texas, Ranking JOHN F. KERRY, Massachusetts OLYMPIA J. SNOWE, Maine BYRON L. DORGAN, North Dakota JOHN ENSIGN, Nevada BARBARA BOXER, California JIM DEMINT, South Carolina BILL NELSON, Florida JOHN THUNE, South Dakota MARIA CANTWELL, Washington ROGER F. WICKER, Mississippi FRANK R. LAUTENBERG, New Jersey GEORGE S. LEMIEUX, Florida MARK PRYOR, Arkansas JOHNNY ISAKSON, Georgia CLAIRE MCCASKILL, Missouri DAVID VITTER, Louisiana AMY KLOBUCHAR, Minnesota SAM BROWNBACK, Kansas TOM UDALL, New Mexico MIKE JOHANNS, Nebraska MARK WARNER, Virginia MARK BEGICH, Alaska ELLEN L. DONESKI, Staff Director JAMES REID, Deputy Staff Director BRUCE H. ANDREWS, General Counsel ANN BEGEMAN, Acting Republican Staff Director BRIAN M. HENDRICKS, Republican General Counsel NICK ROSSI, Republican Chief Counsel (II) VerDate Nov 24 2008 14:15 Nov 04, 2010 Jkt 057888 PO 00000 Frm 00002 Fmt 5904 Sfmt 5904 S:\WPSHR\GPO\DOCS\57888.TXT SCOM1 PsN: JACKIE C O N T E N T S Page Hearing held on February 23, 2010 ......................................................................
    [Show full text]