Information Week (Recent DDOS) — White House (CyberSecurity Chief Melissa Hathaway) — DHS Data Privacy and Integrity Advisory Committee — Videos — Cyberspace Policy Review


This is very serious stuff folks.  It does not matter which side of the fence you are politically.  Our government’s first responsibility is to protect its citizens.

For those who remember, U.S. government cyber experts confirmed that the computer systems of  several well known government agencies and both the Obama and McCain campaign teams were hacked last year by a foreign government.  It is widely known that the hackers downloaded large quantities of files from both campaign networks, which officials believed was an attempt to gather information on the evolution of both camps’ policy positions. The information could also have been useful in negotiations with a future administration.

Newsweek magazine stated that the FBI and Secret Service had been called in, with one agent warning the Obama campaign: “You have a problem way bigger than what you understand. You have been compromised, and a serious amount of files have been loaded off your system.” As originally published by CBSNews:

President Obama on Friday confirmed that his presidential campaign suffered a cyber intrusion in which hackers gained access to a range of files.

In a speech in which he unveiled a plan for a comprehensive national cybersecurity strategy, the president said he understands what it is like to be a victim of a cyberattack because “it has happened to me and the people around me.”

Between the months of August and October, Obama said, hackers accessed files including policy papers and travel plans.  Files pertaining to fundraising information were left untouched, he assured his supporters in a joking manner.

Now, for those that attended government briefings last year on potential “backdoor” access to both hardware and software products by foreign governments, I can attest to the fact that I saw “fear” in top IT managers’ faces.  As others have pointed on various internet security chat rooms, a lot of folks who had dark hair before the briefings, had “gray hair when they left” the room.

If memory serves me, there were several “unclassified” briefings to the private sector and industry that were widely known around the Washington DC beltway.  As an example, this FBI presentation on the fake Cisco Routers made its way on the internet.  Again, no matter who you voted for, this subject matter is very important to the American people and the protection of our intellectual property.


logo_infoweek

Malware that targeted Web sites of The White House, Department of Homeland Security, the FAA, and others appears to be a MyDoom variant.

Details Emerge In U.S. Cyber Attacks

InformationWeek, By J. Nicholas Hoover July 8, 2009 05:25 PM (Emphasis mine)

The distributed denial of service (DDOS) attack that has hit more than two dozen United States and South Korean government agencies and companies since the weekend does not make use of some of the latest developments in malware and was likely developed for this specific attack, according to researchers in possession of the malware source code.

The attack, which attempts to flood Web servers with initial requests to connect, temporarily took down several federal government Web sites in the United States and Korea over the past few days, though most are back online.

The targets, according to a list compiled by Verisign iDefense, include the Web sites of The White House, the Department of Homeland Security, the Department of Defense and the Federal Aviation Administration as well as The New York Stock Exchange, NASDAQ, and The Washington Post.

Several agencies, including two not on Verisign’s list of 24 targets, confirmed to InformationWeek Government that they had been under attack. The Department of Treasury said it has experienced denial of service attacks over the past few days. The Department of Transportation, meanwhile, said it has been “experiencing network incidents” since the weekend and is cooperating with the United States Computer Emergency Response Team (US-CERT), one of the parties working to mitigate the attacks.

“US-CERT has issued a notice to federal departments and agencies, as well as other partner organizations, on this activity and advised them of steps to take to help mitigate against such attacks,” a Department of Homeland Security spokeswoman said in an e-mailed statement. “We see attacks on federal networks every day, and measures in place have minimized the impact to federal websites.”…


wh_logo

THE WHITE HOUSE

Office of the Press Secretary

__________________________________________________

For Immediate Release                    May 26, 2009

Statement by the President on the White House Organization for Homeland Security and Counterterrorism

As President, my highest priority is the safety and security of the American people. That is why, in February, I issued a Presidential Study Directive to look at how the White House should be organized to deal with the critical issues of homeland security and counterterrorism.  I have carefully reviewed the findings and recommendations of that study, and am announcing a new approach which will strengthen our security and the safety of our citizens. These decisions reflect the fundamental truth that the challenges of the 21st Century are increasingly unconventional and transnational, and therefore demand a response that effectively integrates all aspects of American power.

Key decisions that I have made include:

  • The full integration of White House staff supporting national security and homeland security.  The new “National Security Staff” will support all White House policymaking activities related to international, transnational, and homeland security matters.  The establishment of the new National Security Staff, under the direction of the National Security Advisor, will end the artificial divide between White House staff who have been dealing with national security and homeland security issues.
  • Maintaining the Homeland Security Council as the principle venue for interagency deliberations on issues that affect the security of the homeland such as terrorism, weapons of mass destruction, natural disasters, and pandemic influenza.  The Homeland Security Council, like its National Security Council counterpart, will be supported by the National Security Staff.
  • The establishment of new directorates and positions within the National Security Staff to deal with new and emerging 21st Century challenges associated with cybersecurity, WMD terrorism, transborder security, information sharing, and resilience policy, including preparedness and response.
  • Retaining the position of Assistant to the President for Homeland Security and Counterterrorism (AP/HSCT) as my principal White House advisor on these issues, with direct and immediate access to me.  The security of our homeland is of paramount importance to me, and I will not allow organizational impediments to stand in the way of timely action that ensures the safety of our citizens.
  • Creating a new Global Engagement Directorate to drive comprehensive engagement policies that leverage diplomacy, communications, international development and assistance, and domestic engagement and outreach in pursuit of a host of national security objectives, including those related to homeland security.

The United States faces a wide array of challenges to its security, and the White House must be organized to effectively and efficiently leverage the tremendous talent and expertise of the dedicated Americans who work within it.  The creation of the National Security Staff and the other recommendations from the study that I have approved will help to keep our country safe and our Homeland secure.

__________________________________________________

THE White House BLOG

FRIDAY, MAY 29TH, 2009 AT 10:00 AM

Securing Our Digital Future Posted by Melissa Hathaway

Melissa Hathaway, Cybersecurity Chief at the National Security Council, discusses securing our nation’s digital future:

The globally-interconnected digital information and communications infrastructure known as cyberspace underpins almost every facet of modern society and provides critical support for the U.S. economy, civil infrastructure, public safety and national security.  The United States is one of the global leaders on embedding technology into our daily lives and this technology adoption has transformed the global economy and connected people in ways never imagined.

My boys are 8 and 9 and use the Internet daily to do homework, blog with their friends and teacher, and email their mom; it is second nature to them.  My mom and dad can read the newspapers about their daughter on-line and can reach me anywhere in the world from their cell phone to mine.  And people all over the world can post and watch videos and read our blogs within minutes of completion.  I can’t imagine my world without this connectivity and I would bet that you cannot either.

Now consider that the same networks that provide this connectively also increasingly help control our critical infrastructure.  These networks deliver power and water to our households and businesses, they enable us to access our bank accounts from almost any city in the world, and they are transforming the way our doctors provide healthcare.  For all of these reasons, we need a safe Internet with a strong network infrastructure and we as a nation need to take prompt action to protect cyberspace for what we use it for today and will need in the future.

Protecting cyberspace requires strong vision and leadership and will require changes in policy, technology, education, and perhaps law.  The 60-day cyberspace policy review summarizes our conclusions and outlines the beginning of a way forward in building a reliable, resilient, trustworthy digital infrastructure for the future.  T

here are opportunities for everyone—individuals, academia, industry, and governments—to contribute toward this vision.  During the review we engaged in more than 40 meetings and received and read more than 100 papers that informed our recommendations.   As you will see in our review there is a lot of work for us to do together and an ambitious action plan to accomplish our goals.  It must begin with a national dialogue on cybersecurity and we should start with our family, friends, and colleagues.

We are late in addressing this critical national need and our response must be focused, aggressive, and well-resourced.  We have garnered great momentum in the last few months, and the vision developed in our review is based on the important input we received from industry, academia, the civil liberties and privacy communities, others in the Executive Branch, State governments, Congress, and our international partners.

We now have a strong and common view of what is needed to achieve change.   Ensuring that cyberspace is sufficiently resilient and trustworthy to support U.S. goals of economic growth, civil liberties and privacy protections, national security, and the continued advancement of democratic institutions requires making cybersecurity a national priority.


Cybersecurity

Watch experts from the public and private sectors discuss the Administration’s combined arms approach to securing our nation’s digital future:


As previously mentioned in this posting (White House Cyberspace Policy Review Requires Full Implementation of HSPD-12), the White House Cyberspace Policy Review (76 Pages, pdf) requires the Federal implementation of HSPD-12. This review resulted from President Obama directing a 60-day, comprehensive review to assess U.S. policies and structures for cybersecurity. Page 34 Specifically states (Emphasis mine):

The Federal government, following the guidance of Homeland Security Presidential Directive 12 (HSPD-12), is seeking to leverage the federal interoperable identity credentialing mechanism across the federal enterprise.

The Federal government should ensure resources are available for full federal implementation of HSPD-12. The Federal government also should consider extending the availability of federal identity management systems to operators of critical infrastructure and to private-sector emergency response and repair service providers for use during national emergencies.

Related Post:  (NIST: Developing ADP Standards/Guidelines For Federal Computer Systems)


DHS_logo

Privacy Office – DHS Data Privacy and Integrity Advisory Committee

The DHS Data Privacy and Integrity Advisory Committee provides advice at the request of the Secretary of Homeland Security and the DHS Chief Privacy Officer on programmatic, policy, operational, administrative, and technological issues within the DHS that relate to personally identifiable information, as well as data integrity and other privacy-related matters. The committee was established by the Secretary of Homeland Security under the authority of 6 U.S.C. section 451 and operates in accordance with the provisions of the Federal Advisory Committee Act (FACA) (5 U.S.C. App)

Please Note: The below webpages are offered as a reading room of materials related to this Federal Advisory Committee. All materials including meeting minutes, draft and final reports, agendas, etc. are either for or by the Committee and do not necessarily reflect the opinions and/or positions of the DHS Privacy Office or the Department. The Committee may choose to use these materials and others to provide advice to the Privacy Office and the Department on privacy and data integrity issues and ultimately the Department may choose to consider that advice. These materials are offered purely to provide transparency into the Committee’s process.

Meeting Information

Request for Applicants for Appointment

The Department of Homeland Security Privacy Office is seeking applicants for membership terms on the DHS Data Privacy and Integrity Advisory Committee to expire in 2012 and 2013.  If you are interested in applying for membership on the DHS Data Privacy and Integrity Advisory Committee, please submit the following documents to Martha K. Landesberg, Executive Director, at the address provided below by June 8, 2009:

  1. A letter explaining your qualifications for service on the Committee; and
  2. A resume that includes a detailed description of your experience that it is relevant to the Committee’s work.

Please send your documents to Martha K. Landesberg, Executive Director, DHS Data Privacy and Integrity Advisory Committee, by either of the following methods:E-mail: PrivacyCommittee@dhs.gov Fax: 703-235-0442

In support of the Department of Homeland Security’s policy on gender and ethnic diversity, qualified women and minorities are encouraged to apply for membership.For additional information please see the Federal Register Notice.

Request for Comments

Please provide any comments in writing to privacycommittee@dhs.gov, by postal mail, or by fax. All comments will be considered on an ongoing basis.

Reports, Recommendations, & Communications

Advisory Committee Leadership

Privacy Advisory Committee members have diverse expertise in privacy, security, and emerging technology, and come from large and small companies, the academic community, and the non-profit sector.  The members also reflect a depth of knowledge on issues of data protection, openness, technology, and national security.  Members for the first term will serve staggered terms of two years, three years, or four years and all subsequent members will serve for a period of four years.

Committee Resources


Another Privacy View?


Cyberspace Policy Review Links

Documents

Size

File Format

Accenture, “Secure Enterprise Network Consortium: Helping Provide Comprehensive Cyber Security Approaches for High Performance” (undated) N/A HTML
Aliant, “Developing a Telecommunications Roadmap: Preparing for the promise of convergence” (undated) 342 K PDF
American Chemistry Council, ChemITC, “Making Strides to Improve Cyber Security in the Chemical Sector,” 2009 Update, March 2009 94 K PDF
American Chemistry Council, Christine Adams, untitled memorandum of the Chemical Sector Cyber Security Program’s responses to four questions from the White House 60-day Cyber Policy Review (undated) 33 K PDF
Board of Governors of the Federal Reserve System, Office of the Comptroller of the Currency, and Securities and Exchange Commission, “Interagency Paper on Sound Practices To Strengthen the Resilience of the U.S. Financial System,” Federal Register, Volume 68, Number 70, April 18, 2003 149 K PDF
Booz Allen Hamilton, “Commercial/Civil Cyber Community Snapshot” (undated) 4,307 K PDF
Booz Allen Hamilton, “National Cybersecurity Center Policy Capture” (undated) 1,505 K PDF
Brecht, Lyle A., Capital Markets Research, “National Cyber Systems Infrastructure Security Review Concept Paper,” February 15, 2009 257 K PDF
Business Executives for National Security, “Cyber Strategic Inquiry: Enabling Change Through a Strategic Simulation and Megacommunity Concept”, December 2008 604 K PDF
Business Executives for National Security, “Cybersecurity Roundtable, March 19, 2009, City Club, Washington DC,” March 26, 2009 57 K PDF
Business Software Alliance, “National Security & Homeland Security Councils Review of National Cyber Security Policy,” March 19, 2009 47 K PDF
Carnegie Mellon University, Lynn Robert Carter, “Computing Infrastructure Risk: Issue, Analysis, and Recommendation,” December 23, 2008 218 K PDF
Carnegie Mellon CyLab, Pradeep Khosla, “Information Security for the Next Century: Why we need an information-centric approach to data protection” (undated) 194 K PDF
Center for Applied Cybersecurity Research, Indiana University, Fred H. Cate, “Comments to the White House 60-Day Cybersecurity Review,” March 27, 2009 209 K PDF
Center for Democracy and Technology, “Comprehensive Privacy and Security: Critical for Health Information Technology,” Version 1.0, May 2008 451 K PDF
Center for Democracy and Technology, letter from Ari Schwartz and Gregory T. Nojeim, March 20, 2009 103 K PDF
Center for Education and Research in Information Assurance and Security, Purdue University, presentation by Eugene Spafford entitled “NITRD Strategic Plan Forum,” February 2009 778 K PDF
Center for Infrastructure Protection, George Mason University, “The CIP Report,” Volume 7, Number 8, February 2009 2,243 K PDF
Center for National Security Studies, letter from Kate Martin, April 4, 2009 28 K PDF
Center for Progressive Regulation, Rena Steinzor, “Democracies Die Behind Closed Doors: The Homeland Security Act and Corporate Accountability,” March 12, 2003 256 K PDF
Center for Strategic and International Studies Commission on Cybersecurity for the 44th Presidency, “Securing Cyberspace for the 44th Presidency,” December 2008 999 K PDF
Center for the Development of Technological Leadership, University of Minnesota, presentation by S. Massoud Amin entitled “Smart Grid: Opportunities and Challenges Toward a Stronger and Smarter Grid” at the 2009 MIT Energy Conference – Accelerating Change in Global Energy, Cambridge, Massachusetts, March 6, 2009 2,642 K PDF
Computing Research Association, paper by Stuart Zweben entitled “Computing Degree and Enrollment Trends: From the 2007-2008 CRA Taulbee Survey” (undated) 454 K PDF
Congressional Research Service, report by Harold C. Relyea entitled “The Executive Office of the President: An Historical Overview,” updated November 26, 2008 N/A HTML
Congressional Research Service, report by John Rollins and Anna C. Henning entitled “Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations,” March 10, 2009 N/A HTML
Davidson, Mary Ann, Oracle Corporation, “The Monroe Doctrine in Cyberspace”, March 2009 39 K PDF
Defense Advanced Research Projects Agency, “The National Cyber Range: A National Testbed for Critical Security Research” (undated) 1,782 K PDF
Department of Defense, “Defense Security Information Exchange (DSIE) A partnership for the Defense Industrial Base” (undated) 24 K PDF
Department of Health & Human Services, Office of the National Coordinator for Health Information technology, “The ONC-Coordinated Federal Health IT Strategic Plan: 2008-2012,” June 3, 2008 N/A HTML
Department of the Treasury, “2008 Update to Banking and Finance Sector-Specific Plan: Sector Profile and Goals” (undated) 65 K PDF
Department of the Treasury, “2008 Update to Banking and Finance Sector-Specific Plan: Appendix B: Statutory Authorities” (undated) 331 K PDF
Department of the Treasury, FSSCC/FBIIC Cyber Security Intelligence and Information Sharing Work Groups, “Roadmap for Improved Information Sharing: Situational Analysis and Recommendations for Action” (undated) 122 K PDF
Department of the Treasury, memorandum regarding 60-day cyber review questions (undated) 50 K PDF
Economist Intelligence Unit, The, “The means to compete: Benchmarking IT Industry Competitiveness”, July 2007 153 K PDF
Electronic Frontier Foundation, letter from Lee Tien and Peter Eckersley (undated) 355 K PDF
Financial Services Information Sharing and Analysis Center, letter from William B. Nelson, March 23, 2009 175 K PDF
Gourley, Bob, Crucial Point LLC, “Cloud Computing and Cyber Defense,” March 21, 2009 39 K PDF
Gourley, Bob, Crucial Point LLC, “Open Source Software and Cyber Defense,” March 30, 2009 142 K PDF
Harper, Jim, Cato Institute, “Government-Run Cyber Security? No, Thanks,” TechKnowledge Newsletter, Issue #123, March 13, 2009 N/A HTML
Harris Interactive, “Online Security and Privacy Study”, conducted on behalf of Microsoft and the National Cyber Security Alliance, March 2009 233 K PDF
Information Systems Audit and Control Association, “IS Standards, Guidelines and Procedures for Auditing and Control Professionals,” January 15, 2009 1,762 K PDF
Information Technology Information Sharing and Analysis Center, letter from Brian Willis, February 27, 2009 1,203 K PDF
Information Technology Sector Coordinating Council and Communications Sector Coordinating Council, “Response to White House Cyber Review Questions,” March 20, 2009 174 K PDF
Intelligence and National Security Alliance, “60 Day Cyber Study INSA Response,” March 26, 2009 17 K PDF
Intelligence and National Security Alliance, “Critical Issues for Cyber Assurance Policy Reform: An Industry Assessment,” March 26, 2009 433 K PDF
Intelligence and National Security Alliance, “The Missing Link in U.S. Cybersecurity,” March 21, 2009 33 K PDF
Internet Security Alliance, “ISA Comments to Hathaway on creating an International Cyber Security Anchor Program” (undated) 21 K PDF
Internet Security Alliance, “ISA Initial Comments on Hathaway 60-Day review – a top 10 list of Cyber Principles” (undated) 19 K PDF
Internet Security Alliance, “The Cyber Security Social Contract Policy Recommendations for the Obama Administration and 111th Congress: A Twenty-First Century Model for Protecting and Defending Critical Technology Systems and Information” (undated) 302 K PDF
Internet Security Alliance, “The Economic and Security Costs of Obsolescent Computer Laws” March 24, 2009 93 K PDF
Internet Security Alliance, paper by Jeff Brown, Raytheon Company, entitled “A National Model for Cyber Protection Through Disrupting Attacker Command and Control Channels,” March 2009 122 K PDF
Internet Security Alliance, paper by Larry Clinton entitled “Cross cutting Issue #2 How Can we create public private partnerships that extend to action plans that work?” (undated) 29 K PDF
Internet Security Alliance, paper by Larry Clinton entitled “Cyber-Insurance Metrics and Impact on Cyber-Security” (undated) 47 K PDF
Internet Security Alliance, paper by Larry Clinton entitled “Issue Area 3: Norms of Behavior— Hathaway Questions” (undated) 51 K PDF
Internet Security Alliance, paper by Scott Borg entitled “Securing the Supply Chain for Electronic Equipment: A Strategy and Framework” (undated) 31 K PDF
Internet Security Alliance, paper by Sentar, Inc., “Position paper for Obama 60 Day review on Cyber Security: Utilization of Small Business (SBs) for Innovative Cyber Security Research and Development”, March 26, 2009 17 K PDF
Jackson, William, “Agency Award’Federal Aviation Administration: Protect and serve,” Government Computer News, October 7, 2007 N/A HTML
Kellermann, Tom, Core Security Technologies, “Proactive Public Policy per Cybersecurity,” March 18, 2009 28 K PDF
Kellermann, Tom, Core Security Technologies, “Red teaming idea in detail,” March 11, 2009 11 K PDF
Khater, Rami and Rachel Schaffer, Georgetown University, untitled memorandum, April 13, 2009 28 K PDF
Markle Foundation, “Nation at Risk: Policy Makers Need Better Information to Protect the Country,” March 10, 2009 455 K PDF
National Association of State Chief Information Officers, NASCIO State CIO-CISO Cybersecurity Priorities Survey Summary, March 3, 2009 50 K PDF
National Coordination Office for Networking and Information Technology Research and Development, Sally E. Howe, presentation entitled “Workshop Deliverables: Roadmap, Hard Problems, and Report” at the HCSS-Sponsored National Workshop on Beyond SCADA: Networked Embedded Control for Cyber Physical Systems, November 8, 2008 755 K PDF
National Cyber Forensics & Training Alliance and Cyber Initiative & Resource Fusion Unit, “Cyber Fusion Center, Pittsburgh, PA: Executive Briefing” (undated) 3,202 K PDF
National Cyber Security Alliance and Symantec, “NCSA-Symantec National Cyber Security Awareness Study: Newsworthy Analysis,” October 2008 52 K PDF
National Cyber Security Alliance, “National Cyber Security Alliance in Brief” (undated) 122 K PDF
National Research Council, report edited by Robert W. Lucky and Jon Eisenberg entitled “Renewing U.S. Telecommunications Research,” 2006 N/A HTML
National Science and Technology Council, Subcommittee on Biometrics and Identity Management, “Identity Management Task Force Report 2008,” 2008 2,959 K PDF
National Science Foundation, “Notes for White House 60-day Cyber-Policy Review,” March 25, 2009 151 K PDF
National Science Foundation, “NSF Security Program Overview,” March 26, 2009 3,290 K PDF
National Science Foundation, “Responses to Questions Posed by Ms. Melissa Hathaway During Her Presentation at the National Science Foundation on March 18, 2009,” March 31, 2009 128 K PDF
National Security Telecommunications Advisory Committee, “NSTAC Response to the Sixty-Day Cyber Study Group,” March 12, 2009 190 K PDF
Networking and Information Technology Research and Development Program, High Confidence Software and Systems Coordinating Group, “High-Confidence Medical Devices: Cyber-Physical Systems for 21st Century Health Care,” February 2009 1,341 K PDF
Office of the Director of National Intelligence, Joint Interagency Cyber Task Force, Steven R.Chabinsky, presentation entitled “Intrusion Detection and Prevention (What, Where, How and Who)” (undated) 40 K PDF
Pederson, Perry, Wurldtech Labs, “Project Aurora and the Smart Grid” (undated) 491 K PDF
Pinkney, Kevin R., “Putting Blame Where Blame is Due: Software Manufacturer and Customer Liability for Security-related Software Failure,” Albany Law Journal of Science & Technology, Volume 13, 2002 N/A HTML
Raduege, Harry D., Jr., “Evolving Cybersecurity Faces a New Dawn,” SIGNAL Magazine, December 2008 115 K PDF
Raduege, Harry D., Jr., “Future Defense Department Cybersecurity Builds on the Past,” SIGNAL Magazine, February 08 116 K PDF
SANS Institute, “The United States Cyber Challenge,” May 8, 2009 174 K PDF
Schneider, Fred B., and Birman, Kenneth P., Cornell University, “The Monoculture Risk put into Context,” IEEE Security & Privacy, January/February 2009 453 K PDF
Spoonamore, Stephen and Ronald L. Krutz, “Smart Grid and Cyber Challenges: National Security Risks and Concerns of Smart Grid”, March 2009 174 K PDF
SRI International, Computer Science Laboratory, technical report addendum by Phillip Porras, Hassen Saidi, and Vinod Yegneswaran entitled “Conficker C Analysis,” March 19, 2009 N/A HTML
TechAmerica, “TechAmerica Response to 60-Day Cyber Security Review,” March 2009 202 K PDF
Trevithick, Paul, William Coleman, John Clippinger, and Kim Taipale, “Identity and Resilience” (undated) 43 K PDF
U.S. Chamber of Commerce, letter from Ann Beauchesne, March 27, 2009 176 K PDF
United States Congress, American Recovery and Reinvesment Act of 2009, Public Law 111-5 1,198 K PDF
United States Congress, Year 2000 Information and Readiness Disclosure Act, Public Law 105-271 181 K PDF
United States Government Accountability Office, David A. Powner, “Information Technology: Federal Laws, Regulations, and Mandatory Standards for Securing Private Sector Information Technology Systems and Data in Critical Infrastructure Sectors,” September 16, 2008 1,018 K PDF
United States House of Representatives, 111th Congress, “A bill to authorize the Secretary of Homeland Security to establish a program to award grants to institutions of higher education for the establishment or expansion of cybersecurity professional development programs, and for other purposes.” (H.R.266), as introduced in the House, January 7, 2009 168 K PDF
United States House of Representatives, hearing before the Armed Services Committee, Subcommittee on Strategic Forces, “Status of US Strategic Programs,” March 17, 2009 243 K PDF
United States House of Representatives, hearing before the Armed Services Committee, Subcommittee on Strategic Forces, “Statement of General Kevin P. Chilton, Commander, United States Strategic Command,” March 17, 2009 43 K PDF
United States House of Representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, “Statement of Chairman Bennie G. Thompson, ‘Reviewing the Federal Cybersecurity Mission,’” March 10, 2009 43 K PDF
United States House of Representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, “Testimony of Amit Yoran, Netwitness Corporation, ‘Reviewing the Federal Cybersecurity Mission,’” March 10, 2009 179 K PDF
United States House of Representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, “Federal Cybersecurity Mission,” March 10, 2009 140 K PDF
United States House of Representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, “Statement for the Record of Seán P. McGurk, Director, Control Systems Security Program, National Cyber Security Division, National Protection and Programs Directorate, Department of Homeland Security,” March 24, 2009 20 K PDF
United States House of Representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, Science and Technology, “Statement of Chairwoman Yvette D. Clarke,” March 10, 2009 24 K PDF
United States House of Representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, “Statement of David Powner, Director, Information Technology Management Issues, United States Government Accountability Office, ‘National Cybersecurity Strategy: Key Improvements are Needed to Strengthen the Nation’s Posture,’” March 10, 2009 275 K PDF
United States House of representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, “Statement of James A. Lewis, Center for Strategic and International Studies, ‘Reviewing the Federal Cybersecurity Mission,’” March 10, 2009 60 K PDF
United States House of Representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, “Testimony of Mary Ann Davidson, Chief Security Officer, Oracle Corporation,” March 10, 2009 31 K PDF
United States House of Representatives, hearing before the Committee on Homeland Security, Subcommittee on Emerging Threats, Cybersecurity, Science and Technology, “Written Testimony of Scott Charney, Corporate Vice President, Microsoft Corporation’s Trustworthy Computing, ‘Securing America’s Cyber Future: Simplify, Organize and Act,’” March 10, 2009 567 K PDF
United States House of Representatives, hearing before the Committee on Science and Technology, “Statement of Dr. Christopher L. Greer, Director, National Coordination Office for Networking and Information Technology Research and Development,” April 1, 2009 1,987 K PDF
United States House of Representatives, hearing before the Committee on Transportation and Infrastructure, Subcommittee on Aviation, “Statement of James C. May, President and CEO, Air Transport Association of America, Inc., ‘Air Traffic Control Modernization and NextGen: Near-Term Achievable Goals,’” March 18, 2009 289 K PDF
United States House of Representatives, hearing before the Committee on Transportation and Infrastructure, Subcommittee on Aviation, “Statement of The Honorable Calvin L. Scovel III, Inspector General, U.S. Department of Transportation, ‘Federal Aviation Administration: Actions Needed to Achieve Mid-term NextGen Goals,’” March 18, 2009 119 K PDF
United States House of Representatives, hearing before the Permanent Select Committee on Intelligence, “Annual Threat Assessment” by Dennis C. Blair, Director of National Intelligence, February 25, 2009 168 K PDF
United States House of Representatives, Permanent Select Committee on Intelligence, “HPSCI White Paper on Cyber security,” December 10, 2008 45 K PDF
United States Secret Service, memorandum entitled “Electronic Crime task Forces (ECTF)” (undated) 18  K PDF
United States Senate, 111th Congress, Senate Bill S.773, “Cybersecurity Act of 2009”, as introduced in the Senate, April 1, 2009 N/A HTML
United States Senate, 111th Congress, Senate Bill S.778, “A bill to establish, within the Executive Office of the President, the Office of the National Cybersecurity Advisor”, as introduced in the Senate, April 1, 2009 N/A HTML
United States Senate, hearing before the Committee on Energy and Natural Resources, “Questions for Patrick Gallagher, National Institute of Standards and Technology,” March 3, 2009 136 K PDF
United States Senate, hearing before the Committee on Energy and Natural Resources, “Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability, U.S. Department of Energy,” March 3, 2009 136 K PDF
United States Senate, hearing before the Committee on Energy and Natural Resources “Testimony of Patrick D. Gallagher, Ph.D., Deputy Director, National Institute of Standards and Technology, United States Department of Commerce,” March 3, 2009 118 K PDF
Vijayan, Jaikumar, “PCI security standard gets flayed at House hearing,” Computerworld, April 1, 2009 N/A HTML

End

Advertisements