[Senate Hearing 106-838]
[From the U.S. Government Publishing Office]




                                                        S. Hrg. 106-838

         ``CYBER ATTACK: IMPROVING PREVENTION AND PROSECUTION''

=======================================================================

                                HEARING

                               before the

                 SUBCOMMITTEE ON TECHNOLOGY, TERRORISM,
                       AND GOVERNMENT INFORMATION

                                 of the

                       COMMITTEE ON THE JUDICIARY
                          UNITED STATES SENATE

                       ONE HUNDRED SIXTH CONGRESS

                             SECOND SESSION

                                   on

   EXAMINING HOW TO COMBAT CYBER ATTACKS BY IMPROVING PREVENTION AND 
                              PROSECUTION

                               __________

                             SCOTTSDALE, AZ

                               __________

                             APRIL 21, 2000

                               __________

                          Serial No. J-106-79

                               __________

         Printed for the use of the Committee on the Judiciary


                    U.S. GOVERNMENT PRINTING OFFICE
69-335                      WASHINGTON : 2001





                       COMMITTEE ON THE JUDICIARY

                     ORRIN G. HATCH, Utah, Chairman

STROM THURMOND, South Carolina       PATRICK J. LEAHY, Vermont
CHARLES E. GRASSLEY, Iowa            EDWARD M. KENNEDY, Massachusetts
ARLEN SPECTER, Pennsylvania          JOSEPH R. BIDEN, Jr., Delaware
JON KYL, Arizona                     HERBERT KOHL, Wisconsin
MIKE DeWINE, Ohio                    DIANNE FEINSTEIN, California
JOHN ASHCROFT, Missouri              RUSSELL D. FEINGOLD, Wisconsin
SPENCER ABRAHAM, Michigan            ROBERT G. TORRICELLI, New Jersey
JEFF SESSIONS, Alabama               CHARLES E. SCHUMER, New York
BOB SMITH, New Hampshire

             Manus Cooney, Chief Counsel and Staff Director

                 Bruce A. Cohen, Minority Chief Counsel

                                 ______

   Subcommittee on Technology, Terrorism, and Government Information

                       JON KYL, Arizona, Chairman

ORRIN G. HATCH, Utah                 DIANNE FEINSTEIN, California
CHARLES E. GRASSLEY, Iowa            JOSEPH R. BIDEN, Jr., Delaware
MIKE DeWINE, Ohio                    HERBERT KOHL, Wisconsin

           Stephen Higgins, Chief Counsel and Staff Director

        Neil Quinter, Minority Chief Counsel and Staff Director

                                  (ii)




                            C O N T E N T S

                              ----------                              

                    STATEMENTS OF COMMITTEE MEMBERS

                                                                   Page

Kyl, Hon. Jon, U.S. Senator From the State of Arizona............     1

                    CHRONOLOGICAL LIST OF WITNESSES

Panel consisting of Janet Napolitano, Attorney General, State of 
  Arizona; and Guadalupe, Gonzalez, Special Agent In Charge, 
  Phoenix Field Investigation, Federal Bureau of Investigation...     3
Panel consisting of David W. Aucsmith, chief security architect, 
  Intel Corp.; and Jose Grando, senior manager, Ernst & Young 
  LLP, Houston, TX...............................................    89

                ALPHABETICAL LIST AND MATERIAL SUBMITTED

Aucsmith, David W.:
    Testimony....................................................    89
    Prepared statement...........................................    93
Gonzalez, Guadalupe:
    Testimony....................................................    66
    Prepared statement...........................................    71
Granado, Jose:
    Testimony....................................................   102
    Prepared statement...........................................   104
Napolitano, Janet:
    Testimony....................................................     3
    Prepared statement...........................................     5
        Letter from the Attorney General.........................    11
        Summary..................................................    13
        Computer Crimes Act of 2000..............................    15
        Attorney General's Website...............................    54
        News Articles............................................    57

 
         ``CYBER ATTACK: IMPROVING PREVENTION AND PROSECUTION''

                              ----------                              


                         FRIDAY, APRIL 21, 2000

                           U.S. Senate,    
         Subcommittee on Technology, Terrorism,    
                        and Government Information,
                                Committee on the Judiciary,
                                                    Scottsdale, AZ.
    The subcommittee met, pursuant to notice, at 9 a.m., in 
City Council Chambers, Scottsdale, AZ, Hon. Jon Kyl (chairman 
of the subcommittee) presiding.

  OPENING STATEMENT OF HON. JON KYL, A U.S. SENATOR FROM THE 
                        STATE OF ARIZONA

    Senator Kyl. This hearing will please come to order.
    Let me first welcome everyone to this field hearing of the 
Subcommittee on Technology, Terrorism, and Government 
Information of the U.S. Senate Judiciary Committee. It is 
encouraging to see so many people who are interested in this 
critical subject. Before we begin, I want to thank the Mayor of 
Scottsdale, Sam Campana, for hosting us here at the Scottsdale 
City Council chambers and for the assistance of Peggy Carpenter 
from the city of Scottsdale, who helped set up this hearing. I 
also want to thank Ed Denison from the Arizona Software 
Association for his assistance in spreading the word about the 
hearing, and, finally, to say hello to the people watching this 
hearing on the city of Scottsdale's Cable Television channel.
    The danger from cyber attack has recently received a lot of 
attention. The denial-of-service attacks against popular 
Internet sites like Yahoo, eBay, and CNN and the arrest earlier 
this week of a Canadian teenager in the case brought home to 
Americans just how vulnerable we are. This is the seventh 
hearing I have held on the subject in the past 3 years, and it 
won't be the last.
    In examining how to combat cyber attacks, it is important 
to reflect on how the Information Age is rapidly transforming 
our society. Today, virtually every key service is dependent 
upon computers--from electrical power grids, to phone systems, 
air traffic control, banking, military early-warning networks. 
The list goes on and on. Unfortunately, most of these critical 
computer networks were not designed with good security measures 
in mind.
    America's increased dependence on computer networks must 
also be viewed in context of our changing role in the post-cold 
war world. The United States is the world's only superpower, 
and our armed forces enjoy technological superiority on the 
battlefield. I sit on the Senate Intelligence Committee, and I 
receive a lot of briefings from the CIA and others about 
threats facing our country. The overriding trend in these 
briefings is that nations and terrorist groups that are hostile 
to our interests are increasingly choosing not to confront our 
military strengths directly--that is, by trying to field fleets 
of advanced fighter planes or aircraft carriers on a par with 
ours--but, rather, are seeking to exploit our vulner-
abilities, looking hard for our Achilles heel. As the ancient 
Chinese military strategist Sun Tzu said, ``You can be sure of 
succeeding in your attacks if you only attack places which are 
undefended.''
    China's current military strategists appear to have taken 
this lesson to heart. A recent article in the official 
Liberation Army Daily stated that China is considering creating 
a fourth branch of the military for information warriors and 
said ``Internet warfare'' should be equated with air, land, and 
sea combat operations.
    Russia is another country of concern in this area. Last 
year, a series of widespread intrusions were detected on 
computer networks operated by the Defense Department, other 
Federal agencies, and the private sector. The FBI traced these 
intrusions to Russia in an operation dubbed Moonlight Maze. 
According to the FBI, the attacks resulted in the theft of vast 
quantities of unclassified, but still sensitive information 
about defense technological 
research matters. Although the details of the case are 
classified, according to Newsweek Magazine, the primary 
suspects in the intrusions, which have since terminated, are 
``crack cyber spooks from the Russian Academy of Sciences, a 
government-supported organization that interacts with Russia's 
top military labs.'' And Russia and China are not the only 
countries of concern. According to the National Security 
Agency, over a dozen countries are working on information 
warfare techniques.
    U.S. military planners have also begun to try to assess how 
cyber attacks could affect our military's performance and to 
take steps to close those vulnerabilities. In 1997, the Joint 
Chiefs of Staff conducted an exercise called Eligible Receiver 
to find out how easy it would be for an enemy to attack U.S. 
military communication systems and other critical 
infrastructures. During the exercise, a small team of 2 dozen 
people used readily available computer hacking tools to attack 
the military's critical infrastructures and within 4 days 
crippled our ability to respond to a simulated crisis in the 
Pacific theater. They also broke into networks that control the 
electric power grid for the entire United States.
    In addition to being conscious of the threat from foreign 
countries and the need to take steps to improve the security of 
the critical computer networks, we need to combat computer 
hacking by criminals here in the United States, which can also 
have very serious consequences. The number of computer crimes 
is rapidly increasing, and we need to be sure that Federal, 
State, and local law enforcement agencies have the tools they 
need to investigate and prosecute violators.
    Catching and punishing those who commit cyber crimes is 
essential for deterring future attacks. When a cyber attack 
occurs, it is not initially apparent whether the perpetrator is 
a mischievous teenager, a professional hacker, a terrorist 
group, or even a hostile nation. Law enforcement must be 
equipped with the resources and authorities necessary to 
swiftly trace a cyber attack back to its source and 
appropriately prosecute criminals.
    Finally, it is important to recognize that private 
companies own and operate the vast majority of the computer 
networks used to operate our critical infrastructure. We must 
raise awareness in industry about cyber threats, encourage 
companies to take responsible steps to protect themselves, and 
remove roadblocks to effective industry cooperation. For 
example, protection from attack necessitates that information 
about cyber vulnerabilities and threats be communicated among 
companies and with government agencies. Antitrust laws that 
were created to prevent collusion among competitors in an 
industry need to be updated to allow companies to cooperate in 
establishing good cyber security. Furthermore, the Freedom of 
Information Act may need to be updated to encourage companies 
to share information with the Federal Government. Communication 
is critical for protection, and these roadblocks need to be 
removed.
    Our witnesses are well suited to address these issues. On 
our second panel, David Aucsmith, the Intel Corporation's top 
security specialist, will discuss some of the trends and 
challenges in cyber security, and Jose Granado, a senior 
manager of Ernst & Young, will conduct a live computer hacking 
demonstration. Guadalupe Gonzalez, the special agent in charge 
of the FBI's Phoenix Office, will provide the Federal law 
enforcement perspective on cyber crime.
    Before we hear from these three experts, I would like to 
introduce our first witness, Arizona Attorney General Janet 
Napolitano. Ms. Napolitano has served as attorney general since 
January 1999, and prior to her election to this post, she 
served for over 4 years as the U.S. attorney for Arizona.
    Attorney General Napolitano, thank you very much for 
testifying at today's hearing. Your full statement and that of 
all of the witnesses will be included in the record, and I 
would invite you to make any summary remarks at this time.

 PANEL CONSISTING OF JANET NAPOLITANO, ATTORNEY GENERAL, STATE 
 OF ARIZONA; AND GUADALUPE GONZALEZ, SPECIAL AGENT IN CHARGE, 
  PHOENIX FIELD INVESTIGATION, FEDERAL BUREAU OF INVESTIGATION

                 STATEMENT OF JANET NAPOLITANO

    Ms. Napolitano. Thank you, Mr. Chairman, and thank you for 
inviting me to be here today and for your long-time interest in 
the cyber area. You have truly been a national leader in this 
regard, and we are grateful.
    Arizona is one of the leading States, I believe, in 
prosecuting computer crime. In the Attorney General's office, 
we have established a Technology Crimes Unit. The head of that 
unit is with me today, Gail Thackery, who is one of the 
Nation's leading prosecutors in this emerging area.
    We also now have one of the most comprehensive computer 
crime statutes in the country that was passed by the 
legislature this past session, was recently signed into law by 
Governor Jane Hull, and had broad bipartisan support.
    Let me, if I might, divide my summary remarks into three 
brief categories, and I understand my full statement will be 
admitted into the record. But the three categories are what 
kinds of things we're seeing at the State level in Arizona, 
what is in our cyber crime legislation that supports and 
augments what is in some of the proposed Federal legislation, 
and, finally, what we as State prosecutors would like to see 
from the Federal Government.
    But, very briefly, lest we think that all cyber crime takes 
place internationally or in cyberspace somewhere else, we have 
a great deal of it here in Arizona, and it really doesn't 
matter whether you are in urban Arizona or rural Arizona. 
Anywhere you have a PC you have the potential of a cyber crime.
    Currently, we have cases in our office pending involving 
the five following kinds of cyber crime: cyber stalking, online 
school threats, infrastructure attacks and hacker offenses, 
fraud--in fact, in our Consumer Fraud Division in the Attorney 
General's office, we have now created a separate way to track 
the Internet fraud cases so that we can follow the trend line 
more accurately as to what kinds of fraud we are seeing on the 
Internet--and child sexual exploitation cases. We currently 
have task forces involving child sexual exploitation in Tucson 
and Phoenix, and our office is helping Arizona post the 
training agency for law enforcement train investigators and 
prosecutors in this area.
    So you can see we have quite a panoply of different types 
of computer crimes. Some are old kinds of crime committed in 
new ways, i.e., fraud. Some are new crimes that we could not 
have imagined 20 years ago.
    To deal with this, our office proposed the Computer Crime 
Act of 2000 in Arizona, and briefly, Senator, that statute, 
which is attached to part of my testimony, has six parts. One 
is cyber terrorism, and it raises the penalties for disrupting 
operations of things like utilities, emergency services, 
medical institutions, traffic control and the like.
    It contains cyber tools for law enforcement. For the first 
time, for example, our office has the ability to seek the 
source of e-mails through desk subpoenas rather than having to 
go continually to court, a concept I think that the FBI is 
supporting federally.
    It has sections on forgery, fraud, and theft, and 
acknowledges that people have online identities that themselves 
can be the subject of the theft of identity.
    It has a new felony for cyber stalking because the current 
laws were not adequate to deal with the prosecution of those 
offenses.
    It has a felony for computer use and disruption. The denial 
of service attacks you mentioned in your opening statement are 
now felonies in Arizona. I think we are one of the few 
jurisdictions in the country that actually has that.
    And, finally, it has provisions related to child 
pornography on the Internet, and it adds the offense of 
luring--l-u-r-i-n-g--meaning that the offense of sexual 
solicitation of a minor is committed with the solicitation 
itself. It doesn't require any further act in furtherance of 
the crime of meeting the minor in order to be able to charge 
the higher felony. We make the solicitation itself, the luring, 
a crime on the Internet. So that is the new Arizona bill.
    Now, we have a Technology Crimes Unit, as I mentioned, and 
I might like to say that this year the legislature, under the 
leadership of Representative Jim Wyers from the northwest part 
of the valley, passed a bill that provides some monetary 
resources both to the Attorney General's office and to the 
Department of Public Safety to help us meet the increasing 
need. And as good a bill as that is, it is only a first step in 
terms of the resources that State and local prosecutors are 
going to need. The chief thing we need from the Feds, if I can 
use the nickname, right now is training and resources.
    Attorneys, investigators, and prosecutors with computer 
skills are in incredible demand. We are unable to hire people 
with this expertise because State and local public salaries 
simply are not competitive in the current marketplace. That 
means what we need to do and what we are doing is training 
people who are already in public service on how to deal with 
these new kinds of crime. That means training is very, very 
key. It is expensive, and it also requires equipment that is 
continually updated to match what is out there in the field.
    As I have already indicated, the bulk of prosecuting these 
crimes, the bulk of these crimes, be it identity theft, be it a 
child pornography case, be it a luring case, are going to end 
up being prosecuted by State and local authorities because that 
is where the bulk of prosecutions in this country occurs in any 
area. And the same is holding true in cyber crime.
    So we would like to emphasize the need for training 
resources, and there are existing vehicles already in place to 
deliver that training, both through the National District 
Attorneys Association and the National Association of Attorneys 
General. NAAG, by the way, has made cyber crime one of its top 
priorities, and I would ask that the Senate and that you 
consider how we make those training resources available on a 
continual basis, not a one-time thing but continual, because 
the technology keeps changing.
    The other idea I would like to offer to you, Sir, is 
something that is reminiscent of what the Senate and the 
Congress did in the 1970's when they provided seed money to 
Attorneys General to open up or to start antitrust units or 
economic competition units within their offices to handle those 
kinds of cases. Seed money for every Attorney General to have a 
cyber crime unit such as we have in Arizona, or to build on one 
if they already have one, I think would provide a very big bang 
for the buck in the sense of expanding our reach, expanding our 
prosecutorial resources, and expanding what we can do working 
with these new technologies to make sure and to ensure that 
basic law enforcement is being carried out, be it in cyberspace 
or be it on the ground.
    Thank you very much.
    [The prepared statement of Ms. Napolitano follows:]

                 Prepared Statement of Janet Napolitano

    Mr. Chairman, thank you for the opportunity to address your 
subcommittee today. As the Attorney General of Arizona, I am here to 
report on our state's activities in combating and prosecuting 
cybercrime. Cybercrime is an emerging issue in law enforcement as an 
increasing number of crimes are committed using computers and other 
technologies. In fact, while we have seen a decline in violent crime, 
cybercrime has increased exponentially. As crime migrates to the 
Internet and other frontiers of technology, law enforcement must be 
adequately prepared to apprehend and prosecute the criminals.
    Instead, law enforcement has had a difficult time keeping up with 
cybercrime. Laws have been found to be inadequate in dealing with new 
technologies. The speed with which technology advances demands rapid 
and innovative solutions to complex problems. Lastly, there is a 
desperate lack of resources for cybercrime law enforcement. There are 
three issues I want to discuss today--legislation, emerging issues in 
cybercrime and current challenges facing law enforcement.

          ARIZONA LEGISLATION--THE COMPUTER CRIMES ACT OF 2000
    The Office of the Attorney General drafted the Computer Crime Act 
of 2000, which was sponsored and passed by a bi-partisan coalition of 
legislators. HB 2428, recently signed into law by Governor Jane Dee 
Hull, is designed to better protect Arizona citizens from cybercrime, 
which is a threat to private citizens, public infrastructure, 
businesses, and government, as these incidents prove:

     In 1998 a computer user in Arizona hacked his way onto a 
billing database of a public utility, looking to cancel someone's 
account. Once in the system, he gained high-level access to the canal 
controlling system, putting the system at serious risk.
     Just this past year, a young man, angry at his ex-
girlfriend, posted pictures of her and assumed her identity on the 
Internet. Through sexually explicit e-mail with other users, he put the 
young woman in great danger to potentially become a victim of sexual 
assault or worse by inviting people to her home and workplace.
     Phoenix man hacked into the computer of an Internet 
Service Provider in Canada and crashed the server, disabling the entire 
network, including all e-mail services, for a week. Numerous businesses 
and individuals lost valuable information, time and money.

    There are six parts to this legislation:
Cyberterrorism
    We must use every means available to crack-down on attacks on our 
high-tech infrastructure. This section raises judicial penalties for 
disrupting operations of utilities, emergency services, medical 
institutions, traffic control, etc.
Cybertools for law enforcement
    Cybertools strengthen law enforcement's ability to preserve 
electronic evidence and to trace rapidly criminal activity on the 
Internet.
Forgery, fraud and theft
    Private individuals and businesses must be protected from 
electronic forgery, fraud and theft. New provisions such as these 
update our laws, demonstrating that individuals and companies have an 
``online'' identity that can be used by others in criminal or malicious 
activity. Fraud statutes must protect Internet consumers and businesses 
against crimes such as theft of trade secrets, credit card fraud, 
identity theft and forgery.
Cyberstalking
    Current statutes did not provide adequate protection from 
cyberstalking, where physical contact between the victim and stalker 
may never occur. The new legislation includes the unique and technical 
aspect of cyberstalking and provides an effective tool for prosecution 
and prevention.
Computer use and disruption
    When a company or an individual loses their access to the Internet, 
they can lose contact to their customers, business records, financial 
information, and other materials hindering their ability to work, 
retrieve data, and communicate. This section is designed to deter 
several forms of disruption which have not been covered by the current 
statute.
Child pornography
    The section protects computer repair technicians and others who 
report child pornography to the police. It also adds the offense of 
``luring,'' to attack effectively the online solicitation or offering 
of a child with an intent of sexual exploitation. Individuals would be 
held criminally liable for any sexually explicit material knowingly 
transmitted to a school or minor.
    The Computer Crimes Act of 2000 goes into effect July 18, 2000.

                            EMERGING ISSUES
    Law enforcement and the public at large have raised several issues 
that Congress and the states will have to come to terms with in the 
near future. Two of the ones my office is working on are Privacy and 
the Theft of Intellectual Property.
Privacy
    The public is becoming increasingly concerned over the collection 
and ownership of personal identifying information. The traditional 
American model is that organizations that gather information about 
individuals become the owners of that information, and can use it for 
their own purposes or even sell it to others. The phrase seen in hacker 
chat rooms currently is, ``You have no privacy now--get over it.''
    On the other hand, for 25 years or more, many countries have had 
strong privacy protections including transborder data flow statutes 
prohibiting the transfer of personal data across national boundaries, 
and others laws forbidding the ``secondary use'' of personal data 
without permission of the individual. In fact, American corporations 
have just agreed to honor European Union privacy rules which are much 
more stringent than any they observe in this country, in connection 
with our own citizens' data.
    We have made tremendous advances with the use of the Internet in 
numerous fields. But at the same time, the Internet poses a threat to 
individual privacy--and security--on a scale never imaginable in 
earlier times, when records pertaining to individuals were maintained 
by corporations and public agencies in separate files scattered across 
the business and government landscapes.
    The time has come for a comprehensive assessment of our nation's 
business practices with regard to the collection and use of personal 
data. The national epidemic of Identity Theft crimes is proof that we 
also need to establish industry standards for maintaining the security 
and accuracy of information that is collected about individuals. I 
intend to work with Arizona business, consumer and privacy groups in 
the next legislative session to craft legislation that will offer our 
citizens reasonable assurance that they know what information is being 
collected about them, have an opportunity to correct inaccuracies, and 
have some say in what is done with their personal data. I believe that, 
working together, Arizona citizens and businesses can establish a 
reasonable framework for protecting individual privacy in a world where 
all records are online, all the time.
Theft of intellectual property
    The Internet has also caused another revolution--the quick and 
rapid distribution of many perfect copies of the same original. 
Arizona's ``Silicon Desert'' is an important and fast-growing part of 
our economy, and the protection of our information resources is 
critical. Currently, the Federal copyright statute preempts the states 
from enforcing thefts of intellectual property such as software, video 
and music, yet the Federal agencies only have the resources to pursue a 
tiny fraction of the reported offenses. This situation robs our 
American businesses of billions of dollars a year, and allows the 
thieves to flourish.
    As a former United States Attorney, I understand the limitations of 
resources among the Federal agencies. However, every year a number of 
business victims come to our office for help, but the Federal 
preemption of copyright theft leaves us powerless to help them. I know 
that industry would support a change in the copyright law to permit 
enforcement at the state level, and I urge Congress to amend the 
copyright laws to permit enforcement by both Federal and State 
agencies. A strong information economy requires strong protection for 
our information assets.

                     CONCLUSION--CURRENT CHALLENGES
    The Arizona Attorney General's Office is charging ahead in 
partnership with various groups to address Arizona's state of emergency 
regarding cybercrime.

     Law Enforcement--we have created a three-tiered training 
program:

    1. A two-day comprehensive evidence seizure and crime scene 
procedure class. This will be certified by AZ POST and taught by the 
Department of Public Safety, the Attorney General's Office and other 
agencies. The goal is to create regional expert teams, similar to the 
meth lab multi-agency teams, and certify 200 officers in the State.
    2. Police officers training to teach various tools and programs for 
extracting computer evidence and creating a case ready for prosecution.
    3. Detective training to teach the special skills necessary to 
perform investigations in cyberspace.

     Communication Industry--We are working with on-line 
providers to develop standardized policies and forms for legal 
procedures necessary to obtain computer evidence.
     Business--We are working with corporations to assist in 
raising awareness on computer security issues and using their expertise 
to help train law enforcement.
     Schools--We are working closely with schools and school 
districts to deal with the increasing problem of school online threats.
     Public--We are conducting townhalls throughout Arizona to 
educate the public at large particularly seniors and parents, to 
potential dangers on the Internet.

    In addition to the work being done in Arizona, other states have 
also been active: California has established regional task forces; the 
Attorney General of Illinois has established a state level unit to 
investigate and prosecute computer crimes; and the Attorney General of 
South Carolina has, with the assistance of the Office of Juvenile 
Justice and Delinquency Programs in the U.S. Department of Justice, 
created a task force to investigate and prosecute child pornographers 
and pedophiles. In fact, Attorneys General from around the country have 
made cybercrime a high priority for the National Association of 
Attorneys General.
    But like Arizona, states face two major obstacles in setting up 
units or task forces to address computer crimes: staff and equipment. 
Attorneys, investigators and prosecutors with computer skills are in 
high demand. Unable to hire and retain these skilled professionals at 
state salaries, states have turned to grooming these professionals 
within current ranks. Training, however, is expensive and not enough 
police and prosecutors are receiving it. Equipment to investigate these 
crimes is also expensive and must be constantly updated to keep pace 
with technology.
    Participation of the states in protecting the nation's 
infrastructure by investigating and prosecuting computer crimes is 
critical. As in other areas of criminal law, the states will 
undoubtedly carry the bulk of the computer crime investigations and 
prosecutions and, in the area of juvenile prosecutions, the states will 
have the full burden of those cases. This burden is likely to be 
considerable because computers have become ubiquitous in almost every 
type of crime.
    The efforts of Arizona and other states to address computer crimes 
must be nurtured by the Federal Government. The states need direct 
Federal funding to establish computer forensic laboratories.
    The development of a basic curriculum for prosecutors is underway. 
The means to execute the training and to provide ongoing technical 
assistance exists through the National Association of Attorneys General 
and the National District Attorneys Association. Unfortunately, we are 
missing the funding to implement the training and assistance. 
Approximately $1 million a year for 5 years would allow over 100 
prosecutors to be trained each year.
    To combat cybercrime, states need a program to provide seed money 
to assist with hiring knowledgeable staff and buying much needed 
equipment should be established on the Federal level. This program 
would need to provide a minimum of $500,000 per year per state for at 
least 3 years to allow the states to establish programs and begin 
funding them.
    Updates to the law, such as Arizona's Computer Crimes Act 2000, is 
a powerful first step in the battle against cybercriminals. But 
resources, applied intelligently, would revolutionize law enforcement's 
ability to respond swiftly and effectively to cybercrime.
    I look forward to working with this Subcommittee and other Federal 
entities to ensure that we have a coordinated Federal-State effort to 
combat cybercrime.
    Once again, thank you for inviting me to present the perspective of 
the Arizona Attorney General's Office and I would be pleased to answer 
any questions from Subcommittee members.
[GRAPHIC] [TIFF OMITTED] T9335.001

[GRAPHIC] [TIFF OMITTED] T9335.002

[GRAPHIC] [TIFF OMITTED] T9335.003

[GRAPHIC] [TIFF OMITTED] T9335.004

[GRAPHIC] [TIFF OMITTED] T9335.005

[GRAPHIC] [TIFF OMITTED] T9335.006

[GRAPHIC] [TIFF OMITTED] T9335.007

[GRAPHIC] [TIFF OMITTED] T9335.008

[GRAPHIC] [TIFF OMITTED] T9335.009

[GRAPHIC] [TIFF OMITTED] T9335.010

[GRAPHIC] [TIFF OMITTED] T9335.011

[GRAPHIC] [TIFF OMITTED] T9335.012

[GRAPHIC] [TIFF OMITTED] T9335.013

[GRAPHIC] [TIFF OMITTED] T9335.014

[GRAPHIC] [TIFF OMITTED] T9335.015

[GRAPHIC] [TIFF OMITTED] T9335.016

[GRAPHIC] [TIFF OMITTED] T9335.017

[GRAPHIC] [TIFF OMITTED] T9335.018

[GRAPHIC] [TIFF OMITTED] T9335.019

[GRAPHIC] [TIFF OMITTED] T9335.020

[GRAPHIC] [TIFF OMITTED] T9335.021

[GRAPHIC] [TIFF OMITTED] T9335.022

[GRAPHIC] [TIFF OMITTED] T9335.023

[GRAPHIC] [TIFF OMITTED] T9335.024

[GRAPHIC] [TIFF OMITTED] T9335.025

[GRAPHIC] [TIFF OMITTED] T9335.026

[GRAPHIC] [TIFF OMITTED] T9335.027

[GRAPHIC] [TIFF OMITTED] T9335.028

[GRAPHIC] [TIFF OMITTED] T9335.029

[GRAPHIC] [TIFF OMITTED] T9335.030

[GRAPHIC] [TIFF OMITTED] T9335.031

[GRAPHIC] [TIFF OMITTED] T9335.032

[GRAPHIC] [TIFF OMITTED] T9335.033

[GRAPHIC] [TIFF OMITTED] T9335.034

[GRAPHIC] [TIFF OMITTED] T9335.035

[GRAPHIC] [TIFF OMITTED] T9335.036

[GRAPHIC] [TIFF OMITTED] T9335.037

[GRAPHIC] [TIFF OMITTED] T9335.038

[GRAPHIC] [TIFF OMITTED] T9335.039

[GRAPHIC] [TIFF OMITTED] T9335.040

[GRAPHIC] [TIFF OMITTED] T9335.041

[GRAPHIC] [TIFF OMITTED] T9335.042

[GRAPHIC] [TIFF OMITTED] T9335.043

[GRAPHIC] [TIFF OMITTED] T9335.044

[GRAPHIC] [TIFF OMITTED] T9335.045

[GRAPHIC] [TIFF OMITTED] T9335.046

[GRAPHIC] [TIFF OMITTED] T9335.047

[GRAPHIC] [TIFF OMITTED] T9335.048

[GRAPHIC] [TIFF OMITTED] T9335.049

[GRAPHIC] [TIFF OMITTED] T9335.050

[GRAPHIC] [TIFF OMITTED] T9335.051

[GRAPHIC] [TIFF OMITTED] T9335.052

[GRAPHIC] [TIFF OMITTED] T9335.053

[GRAPHIC] [TIFF OMITTED] T9335.054

[GRAPHIC] [TIFF OMITTED] T9335.055

[GRAPHIC] [TIFF OMITTED] T9335.056

[GRAPHIC] [TIFF OMITTED] T9335.057

    Senator Kyl. Thank you very much. That is very helpful, and 
I have got several questions that I have noted.
    But let me first turn to our next witness, Mr. Guadalupe 
Gonzalez, the special agent in charge of the FBI's Phoenix 
Field Office. Mr. Gonzalez has served in his post since August 
1998. Prior to coming to Phoenix, he was the special agent in 
charge of organized crime, drugs, and violent crimes in the 
FBI's Los Angeles office.
    Mr. Gonzalez, thank you very much for testifying at today's 
hearing. As I noted before, your full written statement will be 
placed in the record. I would like to invite you to make any 
summary remarks at this time, and I would note to the people 
who are here, in the hearing that we held a couple of weeks ago 
in Washington, DC, on this same subject, the FBI Director Louis 
Freeh presented his testimony, and in asking him how best to 
relate that testimony to people in Arizona, he suggested that 
we ask Mr. Gonzalez to be his representative here. And we are 
delighted to do that, so thank you.

                STATEMENT OF GUADALUPE GONZALEZ

    Mr. Gonzalez. Good morning, Mr. Chairman. Thank you for 
inviting me to the field hearing to discuss the growing problem 
of cyber crime and our response to it. Our ability in the field 
to deal with this crime problem requires the support of 
Congress. The recent denial-of-service attacks against Yahoo, 
Amazon.com, eBay, CNN, Buy.com, and other e-commerce websites 
have thrust the security of our information infrastructure into 
the spotlight. But they are only one example of a large and 
growing problem of criminal activity in cyberspace. I would 
like to discuss with you the national challenge of battling 
computer intrusions.
    The cyber revolution has permeated virtually every facet of 
our lives, and we see its effects all around us in the way we 
communicate, do business, and even in the way Government 
operates. Unfortunately, that revolution has affected the 
nature of criminal activity as well. Criminals are increasingly 
seeing the utility of cyber tools to facilitate traditional 
crimes such as fraud, extortion, and dissemination of child 
pornography. And they are also inventing new forms of crime 
which make computers and the information stored on them the 
targets of the crime. Thus, we see criminals intruding into 
computers to steal credit card numbers, to abscond with 
proprietary information, and to shut down e-commerce sites. And 
this is not just a criminal problem. It is also a national 
security problem. This is because our Nation's critical 
infrastructures, by which I mean those services that are vital 
to our economy and national security, such as electrical 
energy, telecommunications, banking and finance, 
transportation, and government operations, are now dependent on 
computer technology for their very operations. And this very 
dependence makes them vulnerable to an attack which, if 
successful, could deny service on a broad scale.
    The same basic types of cyber attack tools, therefore, 
become attractive not only to criminals interested in illicit 
financial gain, but also to foreign intelligence services 
seeking new ways to obtain sensitive government or industry 
information and to terrorists of hostile foreign nations bent 
on attacking U.S. interests.
    The difficulty of dealing with this challenge stems from 
the nature of the cyber environment. The cyber environment is 
borderless, afford easy anonymity and methods of concealment to 
bad actors, and provides new tools to allow for remote access 
to targeted computers. A criminal sitting on the other side of 
the planet is now capable of stealthily infiltrating a computer 
network in Arizona to steal money, abscond with proprietary 
information, or shut down 
e-commerce sites.
    To deal with this problem, law enforcement has retooled its 
workforce, its equipment, and its own information 
infrastructure. It must also forge new partnerships with 
private industry, other agencies, and our international 
counterparts.
    We at the FBI have been doing all of these things for the 
last 2 years, but we must continue to build upon our progress 
to ensure that we can perform our responsibilities to protect 
public safety and national security in the information age.
    My written statement provides an overview of the broad 
spectrum of cyber threats which gives a flavor of the 
incredibly varied nature of the threats we face. The examples 
range from insiders bent on revenge against their employers, to 
hackers seeking bragging rights in the hacking community, to 
criminal groups stealing credit card numbers or money, to 
foreign intelligence agencies or foreign military services who 
target U.S. interests.
    The most common threats we face are from hackers and 
criminals stealing for profit. For example, in March, 
authorities in the United Kingdom, acting in coordination with 
the FBI, arrested two individuals for alleged intrusions into 
e-commerce sites in several countries and the theft of credit 
card information on over 26,000 accounts. One subject used the 
Internet alias ``CURADOR.'' Losses from this case could exceed 
$3 million. The FBI cooperated closely with the Dyfed-Powys 
Police Department in the United Kingdom and the Royal Canadian 
Mounted Police in Canada and private industry.
    Here in Arizona, we are investigating a computer intrusion 
case in which a private enterprise was defrauded of several 
hundred thousand dollars in fraudulent telephone calls that 
were placed to a foreign country.
    We are also concerned about the terrorist threat. Terrorist 
groups are increasingly using new information technology and 
the Internet to formulate plans, raise funds, spread 
propaganda, and to communicate securely. Director of Central 
Intelligence George Tenet has testified that terrorist groups, 
``including Hizbollah, Hamas, the Abu Nidal organization, and 
Bin Laden's al Qa'ida organization are using computerized 
files, e-mail, and encryption to support their operations.''
    While we have not yet seen these groups employ cyber tools 
as a weapon to use against critical infrastructures, their 
reliance on information technology and acquisition of computer 
expertise are clear warning signs.
    Finally, given the presence of military research facilities 
in Arizona, we must be concerned with national security 
threats. As you know, the FBI has observed a series of 
intrusions into numerous Department of Defense and other 
Federal Government computer networks and private sector 
entities. An investigation last year determined that the 
intrusions appear to have originated in Russia. The intruder 
successfully accessed U.S. Government networks and took large 
amounts of unclassified but sensitive information, including 
defense technical research information.
    Here in Arizona, we have seen scans of military computer 
systems by outside intruders. Some of the logs indicate that 
the source of some of these scans may be foreign.
    The recent distributed denial-of-service attacks have 
garnered a tremendous amount of interest in the public. Because 
the FBI is actively investigating these attacks, I cannot 
provide a detailed briefing on the status of our efforts. 
However, I can tell you that all FBI field offices, including 
the Phoenix Division, have been asked to assist on a case to 
the extent that entities in our jurisdiction are involved in 
the matter or to the extent that we can cover leads within our 
jurisdiction.
    In February 1998, the National Infrastructure Protection 
Center, NIPC, was established as a focal point for the Federal 
Government's efforts to protect the critical infrastructures. 
On October 2, 1998, the center was designated a branch of the 
FBI's National Security Division, and the National 
Infrastructure Protection and Computer Intrusion Program was 
approved as an investigative program. This program is a tier 
one priority under the FBI's strategic plan and serves as the 
FBI's vehicle for performing the infrastructure protection 
mission assigned to the NIPC under Presidential Decision 
Directive 63. In October 1999, the program was moved to a 
newly-formed Counterterrorism Division of the FBI, reflecting 
the FBI's high priority on protecting the infrastructures from 
terrorist threats.
    At headquarters, the NIPC has a budget of approximately $21 
million. This is not slated to increase in fiscal year 2001. 
There are currently 193 agents in the field devoted to NIPC 
matters as well as 101 personnel at FBI headquarters. The NIPC 
at headquarters also houses 19 interagency detailees, mainly 
from the law enforcement, defense, and intelligence 
communities. The NIPC works closely with foreign counterparts 
on case-related matters.
    Beyond the NIPC at FBI headquarters, a cyber crime 
investigative program has been created in all FBI field 
offices, including the Phoenix Division. We have special agents 
here who are responsible for investigating computer intrusions, 
viruses, or denial-of-service attacks, and for conducting 
critical liaison activities with private industry. Given the 
amount of work we have and the fact that Phoenix is the sixth 
largest city in the United States, we are seeking to establish 
a full computer intrusion squad in the Phoenix Division by the 
year 2002.
    One major difficulty that distinguishes cyber threats from 
physical threats is determining who is attacking your system, 
why, how, and from where. This difficulty stems from the ease 
with which individuals can hide or disguise their tracks by 
manipulating logs and directing their attacks through networks 
in many countries before hitting their ultimate target. This 
will continue to pose a problem as long as the Internet remains 
rife with vulnerabilities and allows easy anonymity and 
concealment.
    Another significant challenge we face is intrusions 
involving multiple jurisdictions. A typical investigation 
involves victim sites in multiple States and often many 
countries. This is the case even when the hacker and the victim 
are both located in the United States. In the United States, we 
can subpoena records, engage in judicially approved electronic 
surveillance, and execute search warrants on suspects' homes, 
seize evidence, and examine it. We can do none of these things 
ourselves overseas; rather, we depend on the local authorities 
to assist us.
    The most difficult situation will arise, however, when a 
foreign country with interests adverse to our own simply 
refuses to cooperate. In such a situation, we could find that 
an investigation is stymied unless we can find an alternative 
method of tracing the activity back to its source.
    Our challenge lies in continuing to expand our computer 
investigative, analytic, training, and outreach programs. Given 
the explosive and continued growth of computer intrusions, the 
Infrastructure Protection and Computer Intrusion Program needs 
to more than double the current number of field investigative 
personnel and headquarters analysts. In addition, we need to 
leverage our resources by expanding our training programs to 
reach more State, local, and international investigators. 
Finally, NIPC investigators need high-speed computer processing 
and large-capacity storage for investigations.
    I have tried to review with you some of the threats and 
challenges we face. Some of the challenges stem from the 
structure of the present loss governing computer crime. For 
example, we should ask whether the sentencing guidelines for 
computer crime are adequate and whether the $5,000 threshold 
for damage is a useful benchmark, because in many cases the 
true damage cannot be measured in monetary terms. Examples of 
damage difficult to measure monetarily are impairment of 
medical diagnosis, threat to public safety, or damage to 
national security, national defense, or administration-of-
justice computers.
    Another problem we face is having to obtain multiple trap 
and trace orders for different jurisdictions. The Kyl-Schumer 
bill addresses these concerns and other concerns. We support 
the goal of Senate bill 2092 to strengthen the general 
deterrence aspects of the Computer Fraud and Abuse Act and to 
provide some needed procedural enhancements to help us confront 
the expanding criminal threat in this dynamic and important 
part of our national economy, while continuing to protect 
individual privacy interests. The FBI looks forward to working 
with this committee on this important legislation.
    Addressing the threat of cyber crime requires teamwork--
teamwork among Government agencies, teamwork between Federal, 
State, and local law enforcement, and teamwork between the 
Government and the private sector. We have made much progress 
in establishing this sort of teamwork on all three fronts over 
the last 2 years. The FBI is also developing cyber crime task 
forces in partnership with State and local law enforcement 
entities within their jurisdiction to leverage the limited 
resources in this area. The first one was founded in Pittsburgh 
in March. We hope that one can be established in our 
jurisdiction in the next few years as the program expands.
    The partnerships we have established with the private 
sector are particularly important for several reasons. Most of 
the victims of cyber crimes are private companies; therefore, 
successful investigation and prosecution of cyber crimes 
depends on private victims reporting incidents to law 
enforcement and cooperating with investigators. Second, the 
network administrator, who alone knows the intricacies of his 
or her network, often must provide critical assistance to the 
investigation leading him to the evidence of the intruder's 
activity.
    Much has been said over the last few years about the 
importance of information sharing. Here in the Phoenix 
Division, we have an excellent working relationship with our 
private sector counterparts and the community in general. We 
share information on a number of areas, including 
infrastructure protection, and receive information from the 
private sector that greatly assists in protecting the 
community.
    As a result of our close working relationship with the 
private sector, we can detect criminal activity in its initial 
stages and in some cases prevent criminal incidents. The NIPC 
also provides the private sector with warning information which 
also lessens their vulnerability. These warnings assist field 
offices like Phoenix to be better prepared and better protect 
our community. They further allow us the opportunity to respond 
quickly and efficiently to cyber threats. I believe that as 
companies continue to gain experience in dealing with the NIPC 
and the FBI field offices, as we continue to provide them with 
important and useful threat information, and as companies 
recognize that cyber crime requires a joint effort by industry 
and Government together, we will continue to make real progress 
in the area.
    Our Key Asset Initiative facilitates response to threats 
and intrusion incidents by building liaison and communication 
links with the owners and operators of individual companies in 
the critical infrastructure sectors and enabling contingency 
planning. The Key Asset Initiative initially will involve 
determining which assets are key within the jurisdiction of 
each FBI field office and obtaining 24-hour points of contact 
at each asset in cases of emergency. Eventually, if future 
resources permit, the initiative will include the development 
of contingency plans to respond to attacks on each asset, 
exercises to test response plans, and modeling to determine the 
effects of an attack on particular assets.
    Here in the Phoenix Division, we have identified dozens of 
key assets around the State for including in the national list. 
These assets include power generation facilities, water storage 
and distribution centers, transportation assets, military 
installations, research institutions, and key public emergency 
service entities.
    The second is the InfraGard initiative. This is an 
initiative that we have developed in concert with private 
companies and academia to encourage information sharing about 
cyber intrusions, exploited vulnerabilities, and physical 
infrastructure threats. A vital component of InfraGard is the 
ability of industry to provide information on intrusions to the 
local FBI field offices using secure e-mail communications in 
both a sanitized and detailed format. We can use the detailed 
version to initiate an investigation, while NIPC headquarters 
can analyze that information in conjunction with other 
information we obtain to determine if the intrusion is part of 
a broader attack on numerous sites. The NIPC can simultaneously 
use the sanitized version to inform other members of the 
intrusion without compromising the confidentiality of the 
reporting company.
    Here in Phoenix, we are planning to roll out our InfraGard 
Chapter on May 9. We expect to have representatives from in-
state universities, businesses, and some of the critical 
infrastructures on hand.
    We look forward to working with Congress to ensure that law 
enforcement can continue to address the cyber crime problem in 
the year ahead.
    Thank you.
    [The prepared statement of Mr. Gonzalez follows:]

                Prepared Statement of Guadalupe Gonzalez

                              INTRODUCTION
    Mr. Chairman, Members of the Subcommittee: Thank you for inviting 
me to discuss the threats to our Nation's critical infrastructures and 
the FBI's approach in the field to meeting those challenges. In 
February 1998 the National Infrastructure Protection Center (NIPC) was 
established as a focal point for the federal government's efforts to 
protect the critical infrastructures. Following the founding of the 
Center, the National Infrastructure Protection and Computer Intrusion 
Program (NIPCIP) was approved as an FBI investigative program. NIPCIP 
is a Tier One priority under the FBI Strategic Plan and serves as the 
FBI vehicle for performing the NIPC's missions under PDD-63. In October 
1999 the NIPCIP was moved to the newly-formed Counterterrorism Division 
of the FBI, reflecting the FBI's high priority on protecting the 
infrastructures from terrorist threats.
    With the support of Congress and in particular the leadership of 
this committee, the NIPCI program has rapidly developed in FBI field 
offices across the United States, including here in Arizona. Today I 
will focus on the nature of the national security and criminal threats 
we face in cyberspace, the progress we have made in meeting those 
threats in the field, and the continuing challenges we face.

                                THE NIPC
    The NIPC is an interagency Center located at the FBI. Created in 
1998, the NIPC serves as the focal point for the government's efforts 
to warn of and respond to cyber attacks, particularly those that are 
directed at our nation's ``critical infrastructures.'' These 
infrastructures include telecommunications and information, energy, 
banking and finance, transportation, government operations, and 
emergency services. Presidential Decision Directive (PDD) 63 directed 
that the NIPC serve as a ``national critical infrastructure threat 
assessment, warning, vulnerability, and law enforcement investigation 
and response entity.'' The PDD further states that the mission of the 
NIPC ``will include providing timely warnings of intentional threats, 
comprehensive analyses and law enforcement investigation and 
response.''
    In field offices such as Phoenix, we have created a cyber crime 
investigative program called the National Infrastructure Protection and 
Computer Intrusion (NIPCI) Program. This program, managed by the NIPC, 
consists of special agents in each FBI Field Office who are responsible 
for investigating computer intrusions, viruses, or denial of service 
attacks, for implementing our key asset initiative, and for conducting 
critical liaison activities with private industry. Cyber crime task 
forces are being developed in partnership with state and local law 
enforcement entities within their jurisdiction to leverage the limited 
resources in this area. The first one opened in Pittsburgh last month.

                     THE BROAD SPECTRUM OF THREATS
Cybercrime threats faced by law enforcement
    Before discussing the FBI's programs and requirements with respect 
to cybercrime, let me take a few minutes to discuss the dimensions of 
the problem. The FBI's case load is increasing dramatically. In fiscal 
year 1998, it opened 547 computer intrusion cases; in fiscal year 1999, 
that had jumped to 1,154. At the same time, because of the opening the 
National Infrastructure Protection Center (NIPC) in February 1998, and 
improving ability to fight cyber crime, more cases were closed. In 
fiscal year 1998, 399 intrusion cases were closed, and in fiscal year 
1999, 912 such cases were closed. However, given the exponential 
increase in the number of cases opened, cited above, the actual number 
of pending cases has increased by 39 percent, from 601 at the end of 
fiscal year 1998, to 834 at the end of fiscal year 1999. In short, even 
though the FBI has markedly improved its capabilities to fight cyber 
intrusions, the problem is growing even faster.
    A few days ago the Computer Security Institute released its fifth 
annual ``Computer Crime and Security Survey.'' The results only confirm 
what we had already suspected given our burgeoning case load, that more 
companies surveyed are reporting intrusions, that dollar losses are 
increasing, that insiders remain a serious threat, and that more 
companies are doing more business on the Internet than ever before.
    The statistics tell the story. Ninety percent of respondents 
detected security breaches over the last 12 months. At least 74 percent 
of respondents reported security breaches including theft of 
proprietary information, financial fraud, system penetration by 
outsiders, data or network sabotage, or denial of service attacks. 
Information theft and financial fraud caused the most severe financial 
losses, put at $68 million and $56 million respectively. The losses 
from 273 respondents totaled just over $265 million. Losses traced to 
denial of service attacks were only $77,000 in 1998, and by 1999 had 
risen to just $116,250. Further, the new survey reports on numbers 
taken before the high-profile February attacks against Yahoo, Amazon 
and eBay. Finally, many companies are experiencing multiple attacks; 19 
percent of respondents reported 10 or more incidents.
    Over the past several years the FBI has seen a range of computer 
crimes from defacement of websites by juveniles to sophisticated 
intrusions that we suspect may be sponsored by foreign powers, and 
everything in between. Some of these are obviously more significant 
than others. The theft of national security information from a 
government agency or the interruption of electrical power to a major 
metropolitan area have greater consequences for national security, 
public safety, and the economy than the defacement of a web-site. But 
even the less serious categories have real consequences and, 
ultimately, can undermine confidence in e-commerce and violate privacy 
or property rights. A website hack that shuts down an e-commerce site 
can have disastrous consequences for a business. An intrusion that 
results in the theft of credit card numbers from an online vendor can 
result in significant financial loss and, more broadly, reduce 
consumers' willingness to engage in e-commerce. Because of these 
implications, it is critical that we have in place the programs and 
resources to investigate and, ultimately, to deter these sorts of 
crimes.
    The following are some of the categories of cyber threats that we 
confront today.
    Insiders. The disgruntled insider (a current or former employee of 
a company) is a principal source of computer crimes for many companies. 
Insiders' knowledge of the target companies' network often allows them 
to gain unrestricted access to cause damage to the system or to steal 
proprietary data. The just-released 2000 survey by the Computer 
Security Institute and FBI reports that 71 percent of respondents 
detected unauthorized access to systems by insiders.
    In January and February 1999 the National Library of Medicine (NLM) 
computer system, relied on by hundreds of thousands of doctors and 
medical professionals from around the world for the latest information 
on diseases, treatments, drugs, and dosage units, suffered a series of 
intrusions where system administrator passwords were obtained, hundreds 
of files were downloaded which included sensitive medical ``alert'' 
files and programming files that kept the system running properly. The 
intrusions were a significant threat to public safety and resulted in a 
monetary loss in excess of $25,000. FBI investigation identified the 
intruder as Montgomery Johns Gray, III, a former computer programmer 
for NLM, whose access to the computer system had been revoked. Gray was 
able to access the system through a ``backdoor'' he had created in the 
programming code. Due to the threat to public safety, a search warrant 
was executed for Gray's computers and Gray was arrested by the FBI 
within a few days of the intrusions. Subsequent examination of the 
seized computers disclosed evidence of the intrusion as well as images 
of child pornography. Gray was convicted by a jury in December 1999 on 
three counts for violation of Title 18 U.S.C. Sec. 1030. Subsequently, 
Gray pleaded guilty to receiving obscene images through the Internet, 
in violation of 47 U.S.C. 223.
    Hackers. Hackers (or ``crackers'') are also a common threat. They 
sometimes crack into networks simply for the thrill of the challenge or 
for bragging rights in the hacker community. Recently, however, we have 
seen more cases of hacking for illicit financial gain or other 
malicious purposes.
    While remote cracking once required a fair amount of skill or 
computer knowledge, hackers can now download attack scripts and 
protocols from the World Wide Web and launch them against victim sites. 
Thus while attack tools have become more sophisticated, they have also 
become easier to use. The distributed denial-of-service (DDOS) attacks 
last month are only the most recent illustration of the economic 
disruption that can be caused by tools now readily available on the 
Internet.
    Another recent case illustrates the scope of the problem. In March, 
authorities in the United Kingdom, acting in coordination with the FBI, 
arrested two individuals for alleged intrusions into e-commerce sites 
in several countries and the theft of credit card information on over 
26,000 accounts. One subject used the Internet alias ``CURADOR.'' 
Losses from this case could exceed $3,000,000. The FBI cooperated 
closely with the Dyfed-Powys Police Service in the United Kingdom, the 
Royal Canadian Mounted Police in Canada, and private industry. This 
investigation involved the Philadelphia Division, seven other FBI field 
offices, our Legal Attache in London, and the NIPC. This case 
demonstrates the close partnerships that we have built with our foreign 
law enforcement counterparts and with private industry.
    We are making some progress in convicting hackers. For example, on 
March 8, 2000, FBI Boston Division and New Hampshire Police arrested 
Dennis M. Moran, aka COOLIO, in association with the unauthorized 
intrusion and changes made to the Drug Abuse Resistance Education's 
(DARE) Web site, violating New Hampshire State Laws 638: 17 and 638: 
18(I), unauthorized access into a computer system, unauthorized changes 
to a computer system and damage to a computer system exceeding 
$1,000.00. It is anticipated that the New Hampshire State Attorney's 
Office will prosecute Moran, who is 17, as an adult. The United States 
Attorney's Office for the District of New Hampshire has therefore 
deferred prosecution of Moran to the State.
    In April, Patrick Gregory, the co-founder of the hacker group known 
as ``Global Hell,'' was convicted of a single count of conspiracy to 
commit telecommunications wire fraud and computer hacking in Texas U.S. 
District Court. He currently awaits sentencing.
    Virus Writers. Virus writers are posing an increasingly serious 
threat to networks and systems worldwide. Last year saw the 
proliferation of several destructive computer viruses or ``worms,'' 
including the Melissa Macro Virus, the Explore.Zip worm, and the CIH 
(Chernobyl) Virus. The NIPC frequently sends out warnings or advisories 
regarding particularly dangerous viruses, which can allow potential 
victims to take protective steps and minimize the destructive 
consequences of a virus.
    The Melissa Macro Virus was a good example of the NIPC's two-fold 
response--encompassing both warning and investigation--to a virus 
spreading in the networks. The NIPC sent out warnings as soon as it had 
solid information on the virus and its effects; these warnings helped 
alert the public and reduce the potential destructive impact of the 
virus. On the investigative side, the NIPC acted as a central point of 
contact for the field offices who worked leads on the case. A tip 
received by the New Jersey State Police from America Online, and their 
follow-up investigation with the FBI's Newark Division, led to the 
April 1, 1999 arrest of David L. Smith. Mr. Smith pleaded guilty to one 
count of violating 18 U.S.C. Sec. 1030 in Federal Court, and to four 
state felony counts. As part of his guilty plea, Smith stipulated to 
affecting one million computer systems and causing $80 million in 
damage. Smith is awaiting sentencing.
    Criminal Groups. We are also seeing the increased use of cyber 
intrusions by criminal groups who attack systems for purposes of 
monetary gain. In September, 1999, two members of a group dubbed the 
``Phonemasters'' were sentenced after their conviction for theft and 
possession of unauthorized access devices (18 USC Sec. 1029) and 
unauthorized access to a federal interest computer (18 USC Sec. 1030). 
The ``Phonemasters'' were an international group of criminals who 
penetrated the computer systems of MCI, Sprint, AT&T, Equifax, and even 
the National Crime Information Center. Under judicially approved 
electronic surveillance orders, the FBI's Dallas Division made use of 
new technology in the investigation. One suspect, Mr. Calvin Cantrell, 
downloaded thousands of Sprint calling card numbers, which he sold to a 
Canadian individual, who passed them on to someone in Ohio. These 
numbers made their way to an individual in Switzerland and eventually 
ended up in the hands of organized crime groups in Italy. Cantrell was 
sentenced to two years as a result of his guilty plea, while one of his 
associates, Cory Lindsay, was sentenced to 41 months.
    The Phonemasters' methods included ``dumpster diving'' to gather 
old phone books and technical manuals for systems. They used this 
information to trick employees into giving up their logon and password 
information. The group then used this information to break into victim 
systems. It is important to remember that often ``cyber crimes'' are 
facilitated by old fashioned guile, such as calling employees and 
tricking them into giving up passwords. Good cyber security practices 
must therefore address personnel security and ``social engineering'' in 
addition to instituting electronic security measures.
    Beyond criminal threats in cyber space, we also face a variety of 
significant national security threats
    Terrorists. Terrorists groups are increasingly using new 
information technology and the Internet to formulate plans, raise 
funds, spread propaganda, and to communicate securely. In his statement 
on the worldwide threat in 2000, Director of Central Intelligence 
George Tenet testified that terrorists groups, ``including Hizbollah, 
HAMAS, the Abu Nidal organization, and Bin Laden's al Qa'ida 
organization are using computerized files, e-mail, and encryption to 
support their operations.'' In one example, convicted terrorist Ramzi 
Yousef, the mastermind of the World Trade Center bombing, stored 
detailed plans to destroy United States airliners on encrypted files on 
his laptop computer. While we have not yet seen these groups employ 
cyber tools as a weapon to use against critical infrastructures, their 
reliance on information technology and acquisition of computer 
expertise are clear warning signs. Moreover, we have seen other 
terrorist groups, such as the Internet Black Tigers (who are reportedly 
affiliated with the Tamil Tigers), engage in attacks on foreign 
government websites and e-mail servers. ``Cyber terrorism''--by which I 
mean the use of cyber tools to shut down critical national 
infrastructures (such as energy, transportation, or government 
operations) for the purpose of coercing or intimidating a government or 
civilian population--is thus a very real, though still largely 
potential, threat.
    Foreign intelligence services. Not surprisingly, foreign 
intelligence services have adapted to using cyber tools as part of 
their espionage tradecraft. Even as far back as 1986, before the 
worldwide surge in Internet use, the KGB employed West German hackers 
to access Department of Defense systems in the well-known ``Cuckoo's 
Egg'' case. Foreign intelligence services increasingly view computer 
intrusions as a useful tool for acquiring sensitive U.S. Government and 
private sector information.
    More recently, we observed a series of intrusions into numerous 
Department of Defense and other federal government computer networks 
and private sector entities. Investigation last year determined that 
the intrusions appear to have originated in Russia. The intruder 
successfully accessed U.S. Government networks and took large amounts 
of unclassified but sensitive information, including defense technical 
research information. The NIPC coordinated a multi-agency 
investigation, working closely with FBI field offices, the Department 
of Defense, and the Intelligence Community.
    Information Warfare. The prospect of ``information warfare'' by 
foreign militaries against our critical infrastructures is perhaps the 
greatest potential cyber threat to our national security. We know that 
several foreign nations are developing information warfare doctrine, 
programs, and capabilities for use against the United States or other 
nations. Knowing that they cannot match our military might with 
conventional or ``kinetic'' weapons, some nations see cyber attacks on 
our critical infrastructures or military operations as a way to hit 
what they perceive as America's Achilles heel--our growing dependence 
on information technology in government and commercial operations. For 
example, two Chinese military officers recently published a book that 
called for the use of unconventional measures, including the 
propagation of computer viruses, to counterbalance the military power 
of the United States. And a Russian official has also commented that an 
attack on a national infrastructure could, ``by virtue of its 
catastrophic consequences, completely overlap with the use of [weapons] 
of mass destruction.''
Distributed denial of service tools
    The recent distributed denial of service (DDOS) attacks on e-
commerce sites have garnered a tremendous amount of interest in the 
public and in the Congress. While we do not yet have official damage 
estimates, the Yankee Group, a research firm, estimates the impact of 
the attacks at $1.2 billion due to lost capitalization losses, lost 
revenues, and security upgrades. Because we are actively investigating 
these attacks, I cannot provide a detailed briefing on the status of 
our efforts. However, I can provide an overview of our activities to 
deal with the DDOS threat beginning last year and of our investigative 
efforts. These attacks illustrate the growing availability of 
destructive, yet easy-to-use, exploits that are widely available on the 
Internet. They also demonstrate the NIPC's two-fold mission: sharing 
information with the private sector and warning of possible threats, 
and responding to actual attacks.
    In the fall of last year, the NIPC began receiving reports about a 
new set of ``exploits'' or attack tools collectively called distributed 
denial of service (or DDOS) tools. DDOS variants include tools known as 
``Trin00,'' ``Tribal Flood Net'' (TFN), ``TFN2K,'' and ``Stacheldraht'' 
(German for ``barbed wire''). These tools essentially work as follows: 
hackers gain unauthorized access to a computer system(s) and place 
software code on it that renders that system a ``master'' (or a 
``handler''). The hackers also intrude into other networks and place 
malicious code which makes those systems into agents (also known as 
``zombies'' or ``daemons'' or ``slaves''). Each Master is capable of 
controlling multiple agents. In both cases, the network owners normally 
are not aware that dangerous tools have been placed and reside on their 
systems, thus becoming third-party victims to the intended crime.
    The ``Masters'' are activated either remotely or by internal 
programming (such as a command to begin an attack at a prescribed time) 
and are used to send information to the agents, activating their DDOS 
ability. The agents then generate numerous requests to connect with the 
attack's ultimate target(s), typically using a fictitious or 
``spoofed'' IP (Internet Protocol) address, thus providing a falsified 
identity as to the source of the request. The agents act in unison to 
generate a high volume of traffic from several sources. This type of 
attack is referred to as a SYN flood, as the SYN is the initial effort 
by the sending computer to make a connection with the destination 
computer. Due to the volume of SYN requests the destination computer 
becomes overwhelmed in its efforts to acknowledge and complete a 
transaction with the sending computers, degrading or denying its 
ability to complete service with legitimate customers--hence the term 
``Denial of Service''. These attacks are especially damaging when they 
are coordinated from multiple sites--hence the term Distributed Denial 
of Service.
    An analogy would be if someone launched an automated program to 
have hundreds of phone calls placed to the Capitol switchboard at the 
same time. All of the good efforts of the staff would be overcome. Many 
callers would receive busy signals due to the high volume of telephone 
traffic.
    In November and December, the NIPC received reports that 
universities and others were detecting the presence of hundreds of 
agents on their networks. The number of agents detected clearly could 
have been only a small subset of the total number of agents actually 
deployed. In addition, we were concerned that some malicious actors 
might choose to launch a DDOS attack around New Year's Eve in order to 
cause disruption and gain notoriety due to the great deal of attention 
that was being paid to the Y2K rollover. Accordingly, we decided to 
issue a series of alerts in December to government agencies, industry, 
and the public about the DDOS threat.
    Moreover, in late December, it was determined that a detection tool 
that was developed by the NIPC for investigative purposes might also be 
used by network operators to detect the presence of DDOS agents or 
masters on their operating systems, and thus would enable them to 
remove an agent or master and prevent the network from being 
unwittingly utilized in a DDOS attack. Moreover, at that time there 
was, to our knowledge, no similar detection tool available 
commercially. The NIPC therefore decided to take the unusual step of 
releasing the tool to the Department of Defense, other government 
agencies, and to the public in an effort to reduce the level of the 
threat. The first variant of our software was made available on the 
NIPC web site on December 30, 1999. To maximize the public awareness of 
this tool, we announced its availability in an FBI press release that 
same date. Since the first posting of the tool, we have posted three 
updated versions that have perfected the software and made it 
applicable to different operating systems.
    The public has downloaded these tools tens of thousands of times 
from the web site, and has responded by reporting many installations of 
the DDOS software, thereby preventing their networks from being used in 
attacks and leading to the opening of criminal investigations both 
before and after the widely publicized attacks of the last few weeks. 
The work with private companies has been so well received that the 
trade group SANS awarded their yearly Security Technology Leadership 
Award to members of the NIPC's Special Technologies Applications Unit.
    In February, reports were received that a new variation of DDOS 
tools was being found on Windows operating systems. One victim entity 
provided us with the object code to the tool found on its network. On 
February 18 the binaries were made available to anti-virus companies 
(through an industry association) and the Computer Emergency Response 
Team (CERT) at Carnegie Mellon University for analysis and so that 
commercial vendors could create or adjust their products to detect the 
new DDOS variant. Given the attention that DDOS tools have received in 
recent weeks, there are now numerous detection and security products to 
address this threat, so it was determined that the NIPC could be most 
helpful by giving them the necessary code rather than deploying a 
detection tool ourselves.
    Unfortunately, the warnings that we and others in the security 
community had issued about DDOS tools last year, while alerting many 
potential victims and reducing the threat, did not eliminate the 
threat. Quite frequently, even when a threat is known and patches or 
detection tools are available, network operators either remain unaware 
of the problem or fail to take necessary protective steps. In addition, 
in the cyber equivalent of an arms race, exploits evolve as hackers 
design variations to evade or overcome detection software and filters. 
Even security-conscious companies that put in place all available 
security measures therefore are not invulnerable. And, particularly 
with DDOS tools, one organization might be the victim of a successful 
attack despite its best efforts, because another organization failed to 
take steps to keep itself from being made the unwitting participant in 
an attack.
    On February 7, 2000, the NIPC received reports that Yahoo had 
experienced a denial of service attack. In a display of the close 
cooperative relationship that we have developed with the private 
sector, in the days that followed, several other companies (including 
Cable News Network, eBay, Amazon.com, Buy.com, and ZDNET), also 
reported denial of service outages to the NIPC or FBI field offices. 
These companies cooperated with us by providing critical logs and other 
information. Still, the challenges to apprehending the suspects are 
substantial. In many cases, the attackers used ``spoofed'' IP 
addresses, meaning that the address that appeared on the target's log 
was not the true address of the system that sent the messages. In 
addition, many victims do not keep complete network logs.
    The resources required in an investigation of this type are 
substantial. Companies have been victimized or used as ``hop sites'' in 
numerous places across the country, meaning that we must deploy special 
agents nationwide to work leads. We currently have seven FBI field 
offices with cases opened and all the remaining offices are supporting 
the offices that have opened cases. Agents from these offices are 
following up literally hundreds of leads. The NIPC is coordinating the 
nationwide investigative effort, performing technical analysis of logs 
from victims sites and Internet Service Providers (ISP's), and 
providing all-source analytical assistance to field offices. Moreover, 
parts of the evidentiary trail have led overseas, requiring us to work 
with our foreign counterparts in several countries through our Legal 
Attaches (Legats) in U.S. embassies. Here in Phoenix we followed up on 
leads resulting from the DDOS attacks.
    While the crime may be high tech, investigating it involves a 
substantial amount of traditional investigative work as well as highly 
technical work. Interviews of network operators and confidential 
sources can provide very useful information, which leads to still more 
interviews and leads to follow-up. And victim sites and ISP's provide 
an enormous amount of log information that needs to be processed and 
analyzed by human analysts.

                CHALLENGES IN COMBATING CYBER INTRUSIONS
    The burgeoning problem of cyber intrusions, viruses, and denial of 
service attacks poses unique challenges to the NIPC. These challenges 
require novel solutions, close teamwork among agencies and with the 
private sector, and adequate human and technical resources.
    Identifying the Intruder. One major difficulty that distinguishes 
cyber threats from physical threats is determining who is attacking 
your system, why, how, and from where. This difficulty stems from the 
ease with which individuals can hide or disguise their tracks by 
manipulating logs and directing their attacks through networks in many 
countries before hitting their ultimate target. The ``Solar Sunrise'' 
case illustrates this point. This will continue to pose a problem as 
long as the Internet remains rife with vulnerabilities and allows easy 
anonymity and concealment.
    Jurisdictional Issues. Another significant challenge we face is 
intrusions involving multiple jurisdictions. A typical investigation 
involves victim sites in multiple states and often many countries. This 
is the case even when the hacker and victim are both located in the 
United States. In the United States, we can subpoena records, engage in 
judicially approved electronic surveillance, and execute search 
warrants on suspects' homes, seize evidence, and examine it. We can do 
none of those things ourselves overseas; rather, we depend on the local 
authorities to assist us. However, some local police forces do not have 
the technical resources or expertise to provide assistance. In other 
cases, these nations may not have laws against computer intrusions and 
are therefore limited in their ability to help us. FBI Legal Attaches 
in 35 embassies abroad provide critical help in building bridges with 
local law enforcement to enhance cooperation on cyber crime and in 
working leads on investigations. As the Internet spreads to even more 
countries, we will see greater demands placed on the Legats to support 
computer crime investigations. The NIPC also has held international 
computer crime conferences and offered cyber crime training classes to 
foreign law enforcement officials to develop liaison contacts and bring 
these officials up to speed on cyber crime issues.
    The most difficult situation will arise, however, in which a 
foreign country with interests adverse to our own simply refuses to 
cooperate. In such a situation, we could find that an investigation is 
stymied unless we find an alternative method of tracing the activity 
back to its source.

                          THE LEGAL LANDSCAPE
    To deal with this crime problem, we must look at whether changes to 
the legal procedures governing investigation and prosecution of cyber 
crimes are warranted. The problem of Internet crime has grown at such a 
rapid pace that the laws have not kept up with the technology. The FBI 
is working with the Department of Justice to propose a legislative 
package for your review to help keep our laws in step with these 
advances.
    One example of some of the problems law enforcement is facing is 
the jurisdictional limitation of pen registers and trap-and-trace 
orders issued by federal district courts. These orders allow only the 
capturing of tracing information, not the content of communications. 
Currently, in order to track back a hacking episode in which a single 
communication is purposely routed through a number of Internet Service 
Providers that are located in different states, we generally have to 
get multiple court orders. This is because, under current law, a 
federal court can order communications carriers only within its 
district to provide tracing information to law enforcement. As a result 
of the fact that investigators typically have to apply for numerous 
court orders to trace a single communication, there is a needless waste 
of time and resources, and a number of important investigations are 
either hampered or derailed entirely in those instances where law 
enforcement gets to a communications carrier after that carrier has 
already discarded the necessary information. For example, Kevin Mitnick 
evaded attempts to trace his calls by moving around the country and by 
using cellular phones, which routed calls through multiple carriers on 
their way to the final destination. It was impossible to get orders 
quickly enough in all the jurisdictions to trace the calls.
    Finally, we should consider whether current sentencing provisions 
for computer crimes provide an adequate deterrence. Given the degree of 
harm that can be caused by a virus, intrusion, or a denial of service--
in terms of monetary loss to business and consumers, infringement of 
privacy, or threats to public safety when critical infrastructures are 
affected--it would be appropriate to consider, as S. 2092 does, whether 
penalties established years ago remain adequate.
    Evaluation of the effectiveness of 18 U.S.C. Sec. 1030 and the 
tools to enforce it under both current law and under S. 2092.--
Generally, 18 U.S.C. Sec. 1030 has enabled the FBI and other law 
enforcement agencies to investigate and prosecute persons who would use 
the power of the Internet and computers for criminal purposes. 
Nonetheless, just as computer crime has evolved over the years, so too 
must our laws and procedures evolve to meet the changing nature of 
these crimes.
    One persistent problem is the need under current law to demonstrate 
at least $5,000 in damage for certain hacking offenses enumerated by 18 
U.S.C. Sec. 1030(a)(5). In some of the cases investigated by the FBI, 
damages in excess of $5,000 on a particular system are difficult to 
prove. In other cases, the risk of harm to individuals or to the public 
safety posed by breaking into numerous systems and obtaining root 
access, with the ability to destroy the confidentiality or accuracy of 
crucial--perhaps lifesaving information--is very real and very serious 
even if provable monetary damages never approach the $5,000 mark. In 
investigations involving the dissemination or importation of a virus or 
other malicious code, the $5,000 threshold could potentially delay or 
hinder early intervention by Federal law enforcement.
    S. 2092 significantly adjusts the $5,000 threshold and other 
provisions in the current law by: (1) creating a misdemeanor offense 
for those cases where damages are below $5,000, while simultaneously 
adjusting the minimum mandatory sentences under the Sentencing 
Guidelines; and (2) moving the aggravating factors previously included 
in the definition of``damage'' under 18 U.S.C. Sec. 1030(e)(8) (such as 
impairment of medical diagnosis, physical injury to any person, threat 
to public health or safety or damage to nation security, national 
defense or administration of justice computers) to the general 
sentencing provisions of Sec. 1030(c) (where they will be on par in 
serious cases with the existing $5,000 threshold requirement and will 
expose offenders to an enhanced 10-year period of imprisonment up from 
the current maximum of 5 years). The critical element here is that the 
criminal intended to cause damage, not the specific amount of damage he 
intended to cause
    Another issue involves the alarming number of computer hackers 
encountered in our investigations who are juveniles. Under current law, 
Federal authorities are not able to prosecute juveniles for any 
computer violations of 18 U.S.C. Sec. 1030. S. 2092 would authorize 
(but not require) the Attorney General to certify for juvenile 
prosecution in Federal court youthful offenders who commit the more 
serious felony violations of section 1030. Recognizing that this change 
will, over time, result in the prosecution of repeat offenders, S. 2092 
also defines the term ``conviction'' under Sec. 1030 to include prior 
adjudications of juvenile delinquency for violations of that section. 
This is intended to provide greater specific deterrence to juveniles 
who are adjudicated delinquent for computer hacking. Similarly, a 
majority of the States have enacted criminal statutes prohibiting 
unauthorized computer access analogous to the provisions of section 
1030. As State prosecutions for these offenses increase, the likelihood 
of encountering computer offenders in Federal investigations who have 
prior State convictions will similarly rise. The Department is studying 
whether prior state adult convictions for comparable computer crimes 
justify enhanced penalties for violations of section 1030, just as 
prior State convictions for drug offenses trigger enhanced penalties 
for comparable Federal drug violations.
    Law enforcement also needs updated tools to investigate, identify, 
apprehend and successfully prosecute computer offenders. Today's 
electronic crimes, which occur at the speed of light, cannot be 
effectively investigated with procedural devices forged in the last 
millennium during the infancy of the information technology age. 
Statutes need to be rendered technology neutral so that they can be 
applied regardless of whether a crime is committed with pen and paper, 
e-mail, telephone or geosynchronous orbit satellite personal 
communication devices.
    As discussed above, a critical factor in the investigation of 
computer hacking cases is law enforcement's ability to swiftly identify 
the source and the direction of a hacker's communications. Like all law 
enforcement agencies, the FBI relies upon the pen register and trap and 
trace provisions contained in 18 U.S.C. Sec. 3121 et seq. to seek court 
approval to acquire data identifying non-content information relating 
to a suspect's communications. Our ability to identify the perpetrators 
of crimes like computer hacking is directly proportional to our ability 
to quickly acquire the necessary court orders and quickly serve them 
upon one or more service providers in a communications chain. Under 
current law, however, valuable time is consumed in acquiring individual 
court orders in the name of each communications company for each newly 
discerned link in the communications chain even though the legal 
justification for the disclosure remains unchanged and undiminished. S. 
2092 would amend 18 U.S.C. Sec. 3123(a) to authorize Federal courts to 
issue one nation-wide order which may then be served upon one or more 
service providers thereby substantially reducing the time necessary to 
identify the complete pathway of a suspect's communication. Second, S. 
2092 makes the statute more technology neutral by, among other things, 
inserting the terms ``or other facility'' wherever ``telephone'' 
appears. This change codifies Federal court decisions that apply the 
statute's provisions not merely to traditional telephone, but to an 
ever expanding array of other, communications facilities. Together, 
these are important changes that do not alter or lower the showing 
necessary for the issuance of the court order but which do enhance the 
order's usefulness to law enforcement.
    We support the goal of S. 2092 to strengthen the general deterrence 
aspects of the Computer Fraud and Abuse Act, and to provide some needed 
procedural enhancements to help us confront the expanding criminal 
threat in this dynamic and important part of our national economy while 
continuing to protect individual privacy interests. The FBI looks 
forward to working with the Committee on this important legislation.

                        INTERAGENCY COOPERATION
    The broad spectrum of cyber threats described earlier, ranging from 
hacking to foreign espionage and information warfare, requires not just 
new technologies and skills on the part of investigators, but new 
organizational constructs as well. In most cyber attacks, the identity, 
location, and objective of the perpetrator are not immediately 
apparent. Nor is the scope of his attack--i.e., whether an intrusion is 
isolated or part of a broader pattern affecting numerous targets. This 
means it is often impossible to determine at the outset if an intrusion 
is an act of cyber vandalism, organized crime, domestic or foreign 
terrorism, economic or traditional espionage, or some form of strategic 
military attack. The only way to determine the source, nature, and 
scope of the incident is to gather information from the victim sites 
and intermediate sites such as ISP's and telecommunications carriers. 
Under our constitutional system, such information typically can be 
gathered only pursuant to criminal investigative authorities. This is 
why the NIPC is part of the FBI, allowing us to utilize the FBI's legal 
authorities to gather and retain information and to act on it, 
consistent with constitutional and statutory requirements.
    But the dimension and varied nature of the threats also means that 
this is an issue that concerns not just the FBI and law enforcement 
agencies, but also the Department of Defense, the Intelligence 
Community, and civilian agencies with infrastructure-focused 
responsibility such as the Departments of Energy and Transportation. It 
also is a matter that greatly affects state and local law enforcement. 
This is why the NIPC is an interagency center, with representatives 
detailed to the FBI from numerous federal agencies and representation 
from state and local law enforcement as well. These representatives 
operate under the direction and authority of the FBI, but bring with 
them expertise and skills from their respective home agencies that 
enable better coordination and cooperation among all relevant agencies, 
consistent with applicable laws.
    In Phoenix, we work closely with the U.S. military as well as other 
government agencies. For example, we have worked with U.S. military 
installations located in Arizona on attempted intrusions into their 
systems. The expansion of cyber task forces, such as the one just 
started in Pittsburgh, to other field divisions such as Phoenix, should 
assist us with interagency cooperation.

                       PRIVATE SECTOR COOPERATION
    Our success in battling cyber crime also depends on close 
cooperation with private industry. This is the case for several 
reasons. First, most of the victims of cyber crimes are private 
companies. Therefore, successful investigation and prosecution of cyber 
crimes depends on private victims reporting incidents to law 
enforcement and cooperating with the investigators. Contrary to press 
statements by cyber security companies that private companies won't 
share information with law enforcement, many private companies have 
reported incidents and threats to the NIPC or FBI field offices. While 
there are undoubtedly companies that would prefer not to report a crime 
because of the subsequent loss of consumer confidence, the situation 
has improved markedly. Companies increasingly realize that deterrence 
of crime depends on effective law enforcement, and that the long-term 
interests of industry depend on establishing a good working 
relationship with government to prevent and investigate crime.
    Second, the network administrator at a victim company or ISP is 
critical to the success of an investigation. Only that administrator 
knows the unique configuration of their system, and the administrator 
typically must work with an investigator to find critical transactional 
data that will yield evidence of a criminal's activity.
    Third, the private sector has the technical expertise that is often 
critical to resolving an investigation. It would be impossible for us 
to retain experts in every possible operating system or network 
configuration, so private sector assistance is critical. In addition, 
many investigations require the development of unique technical tools 
to deal with novel problems. Private sector assistance has been 
critical there as well.
    We have several other initiatives devoted to private sector 
outreach that bear mentioning here. The first is called ``InfraGard.'' 
This is an initiative that we have developed in concert with private 
companies and academia to encourage information-sharing about cyber 
intrusions, exploited vulnerabilities, and physical infrastructure 
threats. A vital component of InfraGard is the ability of industry to 
provide information on intrusions to the local FBI field office using 
secure e-mail communications in both a ``sanitized'' and detailed 
format. The local FBI field offices can, if appropriate, use the 
detailed version to initiate an investigation; while NIPC Headquarters 
can analyze that information in conjunction with other information we 
obtain to determine if the intrusion is part of a broader attack on 
numerous sites. The NIPC can simultaneously use the sanitized version 
to inform other members of the intrusion without compromising the 
confidentiality of the reporting company. The key to this system is 
that whether, and what, to report is entirely up to the reporting 
company. A secure web site also contains a variety of analytic and 
warning products that we make available to the InfraGard community. The 
success of InfraGard is premised on the notion that sharing is a two-
way street: the NIPC will provide threat information that companies can 
use to protect their systems, while companies will provide incident 
information that can be used to initiate an investigation and to warn 
other companies.
    Here in Phoenix, we are planning to roll-out our InfraGard Chapter 
on May 9. We expect to have representatives from in state universities, 
businesses, and some of the critical infrastructures on hand.
    Our Key Asset Initiative (KAI) is focused more specifically on the 
owners and operators of critical components of each of the 
infrastructure sectors. It facilitates response to threats and 
incidents by building liaison and communication links with the owners 
and operators of individual companies and enabling contingency 
planning. The KAI began in the 1980's and focused on physical 
vulnerabilities to terrorism. Under the NIPC, the KAI has been 
reinvigorated and expanded to focus on cyber vulnerabilities as well. 
The KAI currently involves determining which assets are key within the 
jurisdiction of each FBI Field Office and obtaining 24-hour points of 
contact at each asset in cases of emergency. Eventually, if future 
resources permit, the initiative will include the development of 
contingency plans to respond to attacks on each asset, exercises to 
test response plans, and modeling to determine the effects of an attack 
on particular assets. FBI field offices are responsible for developing 
a list of the assets within their respective jurisdictions, while the 
NIPC maintains the national database. The KAI is being developed in 
coordination with DOD and other agencies. Currently the database has 
about 2,600 entries. This represents 2,600 contacts with key private 
sector nodes made by the NIPC and FBI field offices.
    Here in the Phoenix Division, we have identified dozens of key 
assets around the state for inclusion in the national list. These 
assets include power generation facilities, water storage and 
distribution centers, transportation assets, military installations, 
research institutions, and key public emergency service entities.
    Much has been said over the last few years about the importance of 
information sharing. Here in the Phoenix Division, we have an excellent 
working relationship with our private sector counterparts and the 
community in general. We share information on a number of areas, 
including infrastructure protection, and receive information from the 
private sector that greatly assist us in protecting the community. As a 
result of our close working relationship with the private sector we can 
detect criminal activity in its initial stages and in some cases 
prevent criminal incidents. The NIPC also provides the private sector 
with warning information which also lessens their vulnerability. These 
warnings assist field offices like Phoenix to be better prepared and 
better protect our community. They further allow us the opportunity to 
respond quickly and efficiently to cyber threats. I believe that as 
companies continue to gain experience in dealing with the NIPC and FBI 
field offices, as we continue to provide them with important and useful 
threat information, and as companies recognize that cyber crime 
requires a joint effort by industry and government together, we will 
continue to make real progress in this area.

                    MEETING THE GROWING CYBER THREAT
    As Internet use continues to soar, the number of cyber attacks is 
also increasing exponentially. Nationally there are over 1000 open 
computer intrusion cases. Further, this figure does not count computer 
facilitated crimes such as Internet fraud, child pornography, or e-mail 
extortion efforts. In these cases, the NIPC and NIPCI squads often 
provide technical assistance to traditional investigative programs 
responsible for these categories of crime.
    We can clearly expect these upward trends to continue, and for the 
threats to become more serious. While insiders, hackers, and criminal 
groups make up much of our case load at the moment, we can anticipate a 
growing number of national security cases in the near future. To meet 
this challenge, we must ensure that we have adequate resources, 
including both personnel and equipment, both at the NIPC and in FBI 
field offices. We currently have 193 agents nationwide dedicated to 
investigating computer intrusion and virus cases. In order to maximize 
investigative resources the FBI has taken the approach of creating 
regional squads in 16 field offices that have sufficient size to work 
complex intrusion cases and to assist those field offices without a 
NIPCI squad. In those field offices without squads, the FBI is building 
a baseline capability by having one or two agents work NIPC matters, 
i.e. computer intrusions (criminal and national security), viruses, 
InfraGard, state and local liaison, etc.
    The Phoenix office has a three agent team working on infrastructure 
protection and computer intrusion matters. Three agents are assigned to 
investigate cyber child pornography, and additional four agents are 
assigned to the Computer Assisted Response Team (CART), which is 
responsible to provide cyber forensics in support of all the cyber 
investigations in the Phoenix office. Since January 1, 2000 the Phoenix 
office has opened 9 new computer intrusion cases. This represents an 
almost 100 percent increase in computer intrusion cases opened in 1999.
    Currently, at NIPC Headquarters, there are 101 personnel on board, 
including 82 FBI employees and 19 detailees from other government 
agencies. This cadre of investigators, computer scientists, and 
analysts perform the numerous and complex tasks outlined above, and 
provide critical coordination and support to field office 
investigations. As the crime problem grows, we need to make sure that 
we keep pace by bringing on board additional personnel, including from 
other agencies and the private sector.
    In addition to putting in place the requisite number of agents, 
analysts, and computer scientists in the NIPC and in FBI field offices, 
we must fill those positions by recruiting and retaining personnel who 
have the appropriate technical, analytical, and investigative skills. 
This includes personnel who can read and analyze complex log files, 
perform all-source analysis to look for correlations between events or 
attack signatures and glean indications of a threat, develop technical 
tools to address the constantly changing technological environment, and 
conduct complex network investigations. There is a very tight market 
for information technology professionals. The Federal Government needs 
to be able to recruit the very best people into its programs. 
Fortunately, we can offer exciting, cutting-edge work in this area and 
can offer agents, analysts, and computer scientists the opportunities 
to work on issues that no one else addresses, and to make a difference 
to our national security and public safety. In addition, Congress 
provided the FBI with a pilot program that exempts certain technical 
personnel from the Title V civil service rules, which allows us to pay 
more competitive salaries and recruit and retain top notch personnel. 
Unfortunately, this pilot is scheduled to expire in November unless 
extended
    Training and continuing education are also critical, and we have 
made this a top priority at the NIPC. In fiscal year 1999, we trained 
383 FBI and other-government-agency students in NIPC sponsored training 
classes on network investigations and infrastructure protection. The 
emphasis for 2000 is on continuing to train federal personnel while 
expanding training opportunities for state and local law enforcement 
personnel. During fiscal year 2000, we plan to train approximately 740 
personnel from the FBI, other federal agencies, and state and local law 
enforcement.
    Developing and deploying the best equipment in support of the 
mission is also very important. Not only do investigators and analysts 
need the best equipment to conduct investigations in the rapidly 
evolving cyber system but the NIPC must be on the cutting edge of cyber 
research and development. Conducting a network intrusion or denial-of-
service investigation often requires analysis of voluminous amounts of 
data. For example, one network intrusion case involving an espionage 
matter currently being investigated has required the analysis of 17.5 
Terabytes of data. To place this into perspective, the entire 
collection of the Library of Congress, if digitized, would comprise 
only 10 Terabytes. The Yahoo DDOS attack involved approximately 630 
Gigabytes of data, which is equivalent to enough printed pages to fill 
630 pickup trucks with paper. Technical analysis requires high capacity 
equipment to store, process, analyze, and display data. Again, as the 
crime problem grows, we must ensure that our technical capacity keeps 
pace. We are also working closely with other agencies to ensure that we 
leverage existing resources to the fullest extent possible.

                      THE ROLE OF LAW ENFORCEMENT
    Finally, I would like to conclude by emphasizing two key points. 
The first is that our role in combating cyber crime is essentially two-
fold: (1) preventing cyber attacks before they occur or limiting their 
scope by disseminating warnings and advisories about threats so that 
potential victims can protect themselves; and (2) responding to attacks 
that do occur by investigating and identifying the perpetrator. This is 
very much an operational role. Our role is not to determine what 
security measures private industry should take, or to ensure that 
companies or individuals take them. It is the responsibility of 
industry to ensure that appropriate security tools are made available 
and are implemented. We certainly can assist industry by alerting them 
to the actual threats that they need to be concerned about, and by 
providing information about the exploits that we are seeing criminals 
use. But network administrators, whether in the private sector or in 
government, are the first line of defense.
    Second, in gathering information as part of our warning and 
response missions, we rigorously adhere to constitutional and statutory 
requirements. Our conduct is strictly limited by the Fourth Amendment, 
statutes such as Title III and ECPA, and the Attorney General 
Guidelines. These rules are founded first and foremost on the 
protection of privacy inherent in our constitutional system. Respect 
for privacy is thus a fundamental tenet in all of our activities.

                               CONCLUSION
    I want to thank the subcommittee again for giving me the 
opportunity to testify here today. The cyber threat is real, 
multifarious, and growing. The FBI is moving aggressively to meet this 
challenge by training investigators and analysts to investigate 
computer intrusion cases, equipping them with the latest technology, 
developing our analytic capabilities and warning mechanisms to head off 
or mitigate attacks, and closely cooperating with the private sector. 
We have already made considerable progress in developing our 
capabilities to protect public safety and national security in the 
Information Age. I look forward to working with Congress to ensure that 
we continue to be able to meet the threat as it evolves and grows. 
Thank you.

    Senator Kyl. Thank you very much, Mr. Gonzalez.
    Let me begin by asking both of you a question. Mr. 
Gonzalez, you mentioned the multiple trap and trace issue, and 
I would like to ask both of you a question about that. For the 
benefit of those who aren't familiar with it, currently Federal 
law requires that law enforcement obtain a separate court order 
for trap and trace authority in each jurisdiction through which 
a cyber attack travels. Obviously, it is important for law 
enforcement to be able to quickly trace a source of an attack, 
as both witnesses have mentioned.
    Could either of you give some examples of how 
investigations have been bogged down by the need to get this 
trap and trace authority in each jurisdiction and how the 
legislation that Senator Schumer and I have introduced, which 
would provide for national trap and trace authority, would 
resolve that issue? Mr. Gonzalez.
    Mr. Gonzalez. Yes, Sir. Well, in terms of the ability to 
obtain the national trap and trace orders, as you mentioned, 
timeliness is of the essence. And because of the different 
nature of how companies involved in information technology deal 
with their records and their record systems, some records are 
destroyed faster than others, it is imperative that we be able 
to get those orders in a timely fashion and be able to get out 
to the place where we need to deliver the orders to recoup the 
information.
    If in the cases we mentioned--we talked about a case, for 
example, where the hacker's victims are in three different 
States and to get there we go through, say, multiple providers 
of either communications services or Internet technology 
services in different jurisdictions, we have to individually go 
to each one of those areas, provide the necessary information 
to get the court order. If we were able to do it at one time, 
it would save us a tremendous amount of time, and we could 
almost simultaneously be at all those different locations at 
one time and obtaining the information we need.
    Senator Kyl. Attorney General Napolitano.
    Ms. Napolitano. Yes, Senator, in response to your question, 
there is a very big need for a Federal hot pursuit statute in 
cyberspace, and the bill that you and Senator Schumer have put 
forward I think is going to be very, very valuable in that 
respect for many of the problems that Special Agent Gonzalez 
has mentioned.
    Let me give you two examples of cases where we have gotten 
bogged down and have had to do an inordinate amount of work to 
get a result.
    One is the very recent case in Scottsdale where a juvenile 
sent a threat via e-mail and basically shut down one of the 
middle schools in Scottsdale while the police department and 
the bomb dogs came out and looked to see whether there was 
anything to the threat. While that was going on, our office was 
tracking down and working with law enforcement to track down 
the source of the 
e-mail, and we were trying to do it very, very quickly both 
because of the school disruptions and because we didn't know 
whether it was a serious threat or not a serious threat.
    To do that, we ultimately in the course of that 
investigation had to obtain separate court orders in both 
California and Virginia to identify the source of the e-mail. 
It would have been much better as a State if we had access to a 
Federal hot pursuit law that would have allowed us to get 
basically nationwide service of an order to track that source.
    A second example is one you may be familiar with, and it 
involved hacking into a local utility company. That ultimately 
required the prosecutors to get orders in very many States all 
over the country to identify the source of the hacking into a 
utility company here.
    So two concrete examples where we have been slowed down, 
have had to do a lot of extra work, and it illustrates the need 
for us to be able to speed up the process.
    Senator Kyl. And just to ensure that there is no invasion 
of privacy or inhibition of exercise of constitutional rights, 
would this nationwide trap and trace authority in any way 
diminish the constitutional rights of any of the entities from 
whom you are trying to obtain information?
    Ms. Napolitano. No, it would not. You would still have to 
comply with the fourth amendment.
    Senator Kyl. And the fourth amendment requirements would 
require that the law enforcement officials do what with respect 
to obtaining an order?
    Ms. Napolitano. In terms of getting a trap and trace order?
    Senator Kyl. Yes.
    Ms. Napolitano. You would still have to get an order issued 
by a court. The difference would be it would have nationwide 
application.
    Senator Kyl. So you would still have to prove the same kind 
of probable cause to a judge for the issuance of the warrant 
that would exist in any other situation?
    Ms. Napolitano. Yes. I assume the basic statutory and 
constitutional requirements for obtaining orders for traps and 
traces would apply. The difference would be that we wouldn't 
have to do it over and over again for basically the same 
search.
    Senator Kyl. Right. This is a good example, it seems to me, 
of the law needing to evolve with technology, or technology is 
going to get way ahead of law enforcement's ability to protect 
the citizens of the country.
    Ms. Napolitano. That is right, because even a delay of a 
few hours while you go to another courthouse in Virginia or 
California can be very critical in these kinds of cases.
    Senator Kyl. Now, I gather it would be safe to say, from 
what both of you have testified, that in Arizona you have seen 
a significant increase in the amount of cyber crime. Would that 
be fair, Mr. Gonzalez?
    Mr. Gonzalez. Yes, Sir. We have had a significant increase, 
in fact, specifically since the beginning of this year. Our 
caseload has increased probably 5 times, and we suspect it will 
continue to increase.
    Senator Kyl. One of the cases that I believe you alluded to 
in your prepared testimony but you didn't mention in your 
summary was a situation involving a very potentially dangerous 
situation with the dams in the State of Arizona. Could you 
describe that in just a little bit of detail?
    Ms. Napolitano. Yes. This is a case--I believe it happened 
in 1995. There is a typo in the testimony. But what happened in 
this instance was a computer user hacked his way into the 
billing database of the Salt River Project. He was looking to 
cancel someone's account. He then thereafter gained access, 
high-level access to the canal controlling system.
    Now, when that crime occurred, we didn't have the bill I 
was describing to you, Senator. He was actually, I think, 
charged with a class III computer fraud felony. He subsequently 
provided a great deal of cooperation in some other cases, and 
so he pled down to a probation-eligible offense. And I believe, 
ironically, he is working in computer security in the private 
sector now, be that as it may.
    Under the new law in Arizona, such hacking into a vital 
infrastructure, which is a defined term in the law, would be a 
class II felony. Under our statutory scheme, that is the next 
most serious offense to a first-degree murder.
    Senator Kyl. And when will this new law take effect?
    Ms. Napolitano. July 18.
    Senator Kyl. OK. Great.
    Just a few more questions here. Are there any--I alluded to 
this in my opening statement, the possibility that there are 
legal impediments to the sharing of information, particularly 
by the private sector, with law enforcement. How would you 
characterize the cooperation between industry and law 
enforcement during the investigation of cyber crimes? And are 
there any disincentives that you are aware of that need to be 
removed for companies to come forward once they have 
experienced an attack? I will address that to both of you.
    Mr. Gonzalez. Well, Sir, I think the cooperation is good. 
It is getting better. There is a tendency sometimes on the part 
of the private sector to be a little hesitant, maybe, in say 
reporting either attempted intrusions or intrusions because of 
the fear of the impact that it may have on their status in the 
community where they are working. However, I think as part of 
the InfraGard program that we talked about where we are 
basically being able to--we are starting to form partnerships 
with the private sector to where they have an ability to 
anonymously join that program and provide us information that 
we can either use specifically with detail to initiate case or 
sanitize for NIPC to use to disseminate to other members of the 
program in terms of potential either attempted intrusions or 
intrusions. I think as we work more through that system and 
basically show and convince the industry that it is a viable 
system and it can only help in terms of deterring attempted 
intrusions and in the case of where the intrusions are 
successful prosecuting the offenders, I think as we develop 
more of a track record in that area the industry will be much 
more willing to continue and move forward with that cooperative 
effort.
    Senator Kyl. Now, some people in industry have expressed a 
concern that their computers could be confiscated or critical 
components of their operations could be brought down during the 
course of an investigation, which would essentially paralyze 
their ability to do business. What kind of assurance can you 
give them that this would not occur?
    Mr. Gonzalez. Actually, it would be almost the opposite. 
What we need from the industry is, first of all, if they have 
either an attempted intrusion or an intrusion, we need a timely 
notification almost immediately so that we can respond. And the 
other thing is we need their assistance in terms of whether it 
be their systems administrators or people from their companies 
or businesses that have the expertise in their systems to help 
us go through their system and identify the information and the 
evidence that can either provide leads for us, investigative 
leads, or determine how the intrusion occurred.
    We do not seize their computers. We will not seize their 
computers, and we do our best to be as unobtrusive in terms of 
affecting their business operations. But we need their help and 
assistance in doing that, one, in the timeliness of the 
reporting of the 
intrusions and, two, in the use of their technical expertise 
for their systems to get us through the investigative process.
    Senator Kyl. Now, another related concern is going public 
with information, and, General Napolitano, let me ask you as 
well as Mr. Gonzalez this. Let's say a classic bank fraud 
intrusion occurs, or, as you say, somebody hacks into the 
utility to cancel out their bill, but let's say it is a bank 
and there is a suggestion here that the bank is potentially 
exposed to lose hundreds of millions of dollars as a result of 
this intrusion. They discover that internally. They obviously 
don't want the evening news to carry the story: ABC Bank losing 
hundreds of millions of dollars to a hacker. That would suggest 
to their customers that it is not a safe place to keep their 
money and so on.
    How can the law enforcement and prosecution authorities 
ensure that that won't happen and, therefore, provide a good 
incentive for people to cooperate with law enforcement as soon 
as possible to get the critical information to law enforcement 
so that the perpetrators can be brought to justice?
    Ms. Napolitano. Senator, that is a difficult question 
because we find it in a lot of different areas where entities 
that are actually the victims of crime are reluctant to report 
it because of likely media attention. And certainly you 
sometimes cannot control the media. I know this will come as a 
shock, but sometimes they find their own things of interest.
    But a couple of very concrete things can be done to 
increase, I think, the security that a business can have in 
working with law enforcement. One is to make greater use of and 
have the ability to make greater use of sealing orders in court 
to protect things like trade secret information, proprietary, 
computer security information, and the like. After all, the 
long-term damage to an institution or a business is not the 
one-day news story. It is having the actual data put into the 
public domain that would enable someone else to commit a 
similar crime. The new bill in Arizona that I described 
actually has some express statutory provisions in that regard. 
I believe in terms of sealing trade secret information, Federal 
law already had a provision. Most States don't have something 
similar.
    Senator Kyl. Mr. Gonzalez, anything to add?
    Mr. Gonzalez. I would offer a couple of comments, Sir. In 
terms of publicity and public awareness, generally speaking, 
with the FBI and with the numerous Attorney General guidelines 
we have regarding the contacts with the media, information that 
is relayed to us or is reported to us a potential crime does 
not necessarily intimate that it is going to be made public any 
time soon or any time in the near future.
    Senator Kyl. Well, they would need a lot better assurance 
than that, though.
    Mr. Gonzalez. That is generally--that is our process.
    The other thing that I would intimate is there is a 
particular case that I am pretty sure has been resolved where a 
bank, in fact, was defrauded of about 10 or so million dollars, 
and we were able to recover all that money based on the 
company's willingness to report. I think we recovered all but 
$800,000 of the $10 million or so that were taken.
    So I think the upside or the benefits to private industry 
and to these companies that have the potential of being 
defrauded is much better in joining forces with law enforcement 
to try to resolve the issue as opposed to not reporting.
    Senator Kyl. I believe that, you believe that, and it makes 
intuitively good sense. Obviously, it is going to be necessary 
to continue to operate in a way that assures the public that 
this kind of protection of their sensitive information will 
occur with law enforcement so that they will have an incentive 
to fully cooperate.
    Let me ask you about the arrest earlier this year. Maybe 
you are not totally familiar with the inside details of it, but 
perhaps you could share some information with us here about the 
Canadian law enforcement officials' arrest of the young man in 
Canada, a 15-year-old teenager, as I understand it, who is 
suspected of being at least one of the people responsible for 
the recent denial-of-service attacks on the Internet sites in 
the United States. Can you tell us a little bit more about how 
the investigation of that case was conducted by the FBI and 
what the status of it is?
    Mr. Gonzalez. I can tell you in general terms the processes 
that we went through that I think resulted in some of the 
successes.
    First of all, there was an almost immediate reporting of 
the intrusions or the denial-of-service attacks by the 
companies affected, which obviously triggered a response from 
the FBI. With the FBI's structure as it is nationwide, where we 
have nationwide offices, in each of those offices we may not 
have fully fledged computer intrusion squads, but we have 
agents that are assigned to those matters across the country. 
We were able to almost simultaneously develop information that 
had leads, as we call them, all over the country and able to 
address those simultaneously with the use of the National 
Infrastructure Protection Center, which one of their roles is 
the coordination of these types of investigations because of 
their national scope and international scope.
    So all those things occurred almost, again, I will use the 
term simultaneously, because once it was reported, it put 
several processes into action, including the coordination 
efforts by NIPC, the individual field divisions getting out and 
addressing the particular leads they had, which we had some in 
Phoenix, and at the same time, once it was determined that 
there was a nexus to Canada, our legal attache office in Canada 
was able to have liaison with the RCMP and able to make the 
information either available or pass it and a lot for the 
successful processing of the information to the Canadian 
authorities so they could make the arrest.
    But as you can see, it is a multifaceted process that we 
went through. It would be extremely difficult to do that if we 
didn't have the national resources available and on hand to 
conduct the adequate investigation.
    Senator Kyl. It sounds like another good example for the 
need for a multiple or nationwide trap and trace authority as 
well.
    Mike Vatis in Washington, DC, in our hearing there, the 
Director of the FBI's National Information Protection Center, 
the NIPC----
    Mr. Gonzalez. Infrastructure.
    Senator Kyl. Yes, I misstated that. He discussed two 
programs called InfraGard and Key Asset Initiative. Can you 
describe those two programs and how they are being carried out 
here?
    Mr. Gonzalez. Yes, Sir. The Key Asset Initiative involves 
each field division of the FBI within their jurisdiction in 
identifying key assets that are involved, whether it be 
providing infrastructure services, whether it be 
communications, transportation, academia, identifying these 
assets and making contact with them and obtaining--and setting 
up with them a system whereby we have 24-hour points of contact 
with those different assets so that in the event there is 
either an intrusion or an attempted intrusion, that we can be--
we will have access to those different entities.
    The InfraGard program involves an information-sharing 
initiative that is coming out--that is actually in place in a 
lot of areas. We are getting ready to implement it in Arizona. 
But what we do is, we offer anonymity to any company that wants 
to join us, and it will do things. It will give them the 
ability to provide the FBI and NIPC with information regarding 
either intrusions or potential--or attempted intrusions into 
their system through an encrypted e-mail capability, and also 
as being part of that program, it will allow them to receive 
warnings or threat warnings or intrusion warnings from NIPC as 
they are doing their national review of these particular 
incidents.
    So the Key Asset Initiative identifies areas in industry 
and in business that have potential for being either attacked 
or have potential of affecting our infrastructure and our 
commerce, and then the InfraGard initiative includes those 
entities and other entities in private business, private 
enterprise, that have a need to be advised of either threats or 
potential threats through the encrypted e-mail system.
    Senator Kyl. So are you actually going out to industry and 
visiting with them about their potential participation?
    Mr. Gonzalez. Yes, Sir. We are currently in the process of 
doing that.
    Senator Kyl. Let me ask each of you a last question just to 
indicate to the audience here we have to conclude the hearing 
by 11 o'clock. We have two more witnesses. So even though I 
can--I love getting information from these folks, and I could 
sit here all day. But we will have to close it off and move on 
to our next witnesses here.
    But let me ask both of you, Attorney General Napolitano, 
you mentioned desk subpoenas in your testimony, and Director 
Louis Freeh testified about administrative subpoenas necessary 
to effectively track cyber crime. Could you describe what those 
are and how that relates to our need for modifying law or 
procedures?
    Mr. Gonzalez. In terms of the FBI, they are referred to as 
administrative subpoenas. The FBI currently has that and some 
other Federal law enforcement agencies have that ability in 
drug investigations, in health care fraud investigations, and 
in crimes against children investigations. It basically allows 
the head of an office or one of his designees to issue a 
subpoena for information when it regards one of those types of 
investigations.
    What that does, it is actually two-fold: Again, it goes to 
the timeliness. We have an ability to do that almost at a 
moment's notice if needed in a particular investigation; and, 
No. 2, the information we gain from those subpoenas, there are 
no restraints in terms of us sharing it with other State and 
local law enforcement agencies or anyone else that would have a 
need to know in terms of getting that information as opposed to 
comparing it to a Federal grand jury.
    Senator Kyl. Is there a difference between an 
administrative subpoena and a desk subpoena?
    Ms. Napolitano. Well, we use the term desk subpoena as 
shorthand for a subpoena that a prosecutor signs as opposed to 
continually going back to the grand jury to get another 
subpoena duces tecum. So what Arizona law will provide when 
this provision takes effect is that on the certification of the 
prosecutor that this is relevant to an ongoing criminal 
investigation, we can issue based on that signature on a 
subpoena duces tecum to a service provider without having to 
continually go back to the grand jury and get a subpoena. It is 
very important because in a lot of these cases, as you see, we 
are following, say, for example, an e-mail to its source, and 
we can literally go around the country and end up in Glendale. 
But this way we can do it very quickly. We can do it at night. 
We can do it on weekends when the grand jury is not in session, 
and oftentimes we need to be able to do that.
    Senator Kyl. And the legal protection is that the evidence 
is obviously not usable if it has exceeded the probable cause 
requirements that you would ordinarily have to seek from a 
judge.
    Ms. Napolitano. Right. And the purpose is not to get the 
content of the e-mail. This is simply to be able to track where 
it--the chain of where it is coming from. So that is the 
primary purpose of this, not to get the actual content but to 
be able to find out the source of the e-mail. And as I 
mentioned earlier, Senator, many times we have to do that at 
night and over the weekends where continually going back to get 
a subpoena is impossible.
    Senator Kyl. I hope if our viewers have picked up anything 
from this hearing, they will appreciate the challenge that law 
enforcement is faced with in investigating these kinds of 
crimes because of the huge technological challenges that are 
presented and the very limited resources that you alluded to, 
Ms. Napolitano, and some of the legal--the very strict legal 
requirements that we impose in this country to make sure that 
people's constitutional rights are not in any way invaded, and 
that sets up some very high barriers for law enforcement but 
that obviously we intend to continue to abide by those 
requirements. It makes it tough for law enforcement, but you 
can still get your job done if you have adequate cooperation 
with the people who are reporting the crimes, and from the 
Congress perhaps and the State legislature, as you have noted, 
in providing the kind of legal authority and resources 
necessary to do the job.
    It is a very difficult challenge. It will evolve as time 
goes on, and I commend both of you and your offices for the way 
that you have jumped on this very quickly. And certainly as you 
have pointed out, General Napolitano, Arizona being the leader 
in developing both the legal authority and within your office 
the ability to quickly deal with these kinds of cyber attacks.
    I commend you both, and I appreciate you testifying here. 
We will have the record open for a period of time for any other 
comments you would like to make, and naturally I am always 
appreciative of your advice on the subject. So thank you very, 
very much.
    Mr. Gonzalez. Thank you.
    Ms. Napolitano. Thank you, Senator.
    Senator Kyl. Our next witness is David Aucsmith, the chief 
security architect for the Intel Corporation. Mr. Aucsmith is a 
recognized expert in the computer security field and will be 
making the U.S. industry presentation at the upcoming G-8 
summit on cyber crime in May in Paris, France.
    Mr. Aucsmith, your full statement will be placed in the 
record, and I would invite you to make summary remarks at this 
time. And, again, I very much appreciate your presence here.

     PANEL CONSISTING OF DAVID W. AUCSMITH, CHIEF SECURITY 
ARCHITECT, INTEL CORP.; AND JOSE GRANADO, SENIOR MANAGER, ERNST 
                    & YOUNG LLP, HOUSTON, TX

                 STATEMENT OF DAVID W. AUCSMITH

    Mr. Aucsmith. Thank you very much, Senator.
    The purpose, I think, of my presentation is to talk about 
the technological trends and challenges facing the protection 
of critical infrastructures as we move forward.
    Intel's former CEO, Andy Grove, was very fond of starting a 
lot of his presentations with the statement that we are rapidly 
approaching a time of a billion connected computers. That is 
actually a fairly fantastic statement. He said there are 
roughly a billion connected computers simultaneously exchanging 
data. And the computers that we are talking about are not just 
PC's. As was mentioned earlier, we are talking about the 
controls to an irrigation system. We are talking about national 
power grids, airline reservations, financial information from 
Wall Street, accessible by a billion connected computers.
    Why is this done? The obvious reason is to improve cost and 
efficiency. It lowers the cost if there are common 
infrastructures 
allowing communications and information to take place, and it 
significantly raises the efficiency. In fact, a year or so ago, 
the Department of Commerce credited that efficiency with 
keeping the level of inflation a whole percentage point lower 
than it would have been otherwise.
    However, this same efficiency also created quite a number 
of vulnerabilities, which is what this hearing is basically 
about. Those efficiencies mean that we have just-in-time 
inventory management, we have just-in-time commission and 
movement. That leaves very, very little room for error when 
that system is disrupted. That just-in-time inventory also 
applies to critical components of the national power grid and 
transportation sectors.
    Basically what we have seen so far is vandals on the 
Internet, as another way of putting it. That is the majority of 
the cases. If you have a billion connected computers, one way 
to look at that is you have a billion minus one potential 
attackers to your particular computer system.
    Another way from my end that we look at this is that we 
basically have a billion connected computers each of which has 
a billion different security policies. We actually can't seem 
to agree on precisely what is the right way to defend or to 
state even how we should defend each of the individuals sites.
    The statistics are rather frightening. It includes major 
companies such as Intel and others attacked somewhere around 
the neighborhood of 6,000 a day. You have cable modem users who 
would reflect around 250 attacks or so a week. And it is a 
fairly phenomenal amount.
    Now, most of these attacks are the equivalent of vandalism. 
I like to point out it is somewhat like spray painting in 
cyberspace. It is about the same equivalent. The problem, of 
course, is that you really can't tell which of those are 
potential spray painters and which of those are potentially 
serious fraud or an intelligence-
gathering operation.
    One way to look at it is if you were a business you 
wouldn't tolerate a few thousand people a day walking up and 
rattling your front doors or trying to see if there is an open 
window where they could come into your business, yet in 
cyberspace, we have sort of grown up and accept these just as a 
matter of fact. We can't live with this as a basic problem. In 
fact, when vandalism gets out of hand, you end up with the 
distributed denial-of-service attacks that we have just had. 
That's what happens if several thousand people show up at your 
front door at once.
    There are other problems which is just essentially the 
cascading destruction that occurs when one part of the system 
fails due to a vandalism or a malicious attack or a terrorist 
incident or whatever. The interconnectivity causes a great deal 
of things to happen all through.
    But I don't want to dwell on vandalism. There is a great 
statement from the bank robber of the 1950's, Willie Sutton. 
When he was asked why did he rob banks, he said, ``Because 
that's where the money is.'' Well, right now e-commerce is 
where the money is. In fact, it is very likely that we will see 
serious criminals--and we are beginning to see them--move into 
cyberspace because that is where the money is.
    We have seen this in the case of credit card theft and a 
number of others. Basically cyberspace offers precisely the two 
things that criminals need: anonymity and mobility. Those 
happen to be the things that generally e-commerce also needs, 
but they do facilitate the bad guys.
    Most security domains as they are set up now approach what 
we call the nougat method of security, which is they have a 
very hard shell on the outside and they are soft and chewy on 
the inside. So all you have to do is break through that outer 
barrier and people do not practice defense in depth in general.
    That is not to say that people aren't trying. There is a 
great deal of standards development going on within the 
industry. The international standards is essentially the glue 
that binds cyberspace together, and there is a lot of work, 
including IP security standards for telecommunications, use of 
better identification methods like smart cards and biometrics. 
All of those things are happening, but it is important to 
stress that standards development is extremely slow. Because it 
is an international endeavor, it does not move at cyber speed.
    Also, security is traditionally a form of insurance. We 
didn't put up metal detectors in airports until after airlines 
were hijacked. We are unlikely to put in strong security in 
cyberspace until after major incidents. It is just very hard to 
get people motivated otherwise.
    One of the perhaps best things that we can do is to provide 
some assistance for law enforcement and others in dealing with 
the current problems. The technology that we deal with is 
extremely complex. Its very efficiencies frequently frustrate 
the ability to catch criminals in cyberspace. It is complex and 
esoteric. Experts typically are hard to find and have to be 
paid a great deal. It is very difficult for law enforcement to 
deal with that.
    Intel might be regarded as being at the forefront of this 
technological revolution, certainly one of the companies, and 
it is very difficult for us to keep up with the technology, and 
we dedicate a great number of people to doing that.
    The best thing that we can do is to have good cooperation 
amongst industry components and with governments to help make 
the Internet a safer place and to protect the critical 
infrastructures. There are several good examples of that 
cooperative effort. Some of them have already been alluded to. 
There are others such as the information technology study 
group, which is a joint industry and FBI initiative to look at 
strategic directions in solving these problems.
    However, there are problems with that cooperation. Some of 
them have been alluded to. We are now having a collection of 
industry competitors coming together to share information. That 
brings up antitrust issues. Certainly from the strategic 
standpoint, we have companies disclosing vulnerabilities and 
other intellectual property about their products that is 
subject to discovery and may end up in a court of law. That is 
not something generally wanted by industry.
    There are problems with funding of those cooperative 
efforts. Industry is pretty much consenting to do this on a pro 
bono basis, gratis, if you will, but the government sectors of 
those require funding in order to do the Administration and 
make the best use of that.
    Congress also will have to address other problems. The 
biggest problem looming on the horizon is that having to do 
with jurisdictional issues. Cyber crime occurs all over the 
world. It is very difficult to figure out who exactly has 
jurisdiction and in what cases. Some of that is being 
addressed.
    So, basically, in closing, though I don't want to leave you 
with too bleak a view here, the technology is basically amoral. 
It is just moving at a very rapid pace. It is being used for 
good and, of course, bad guys will move in, too. Traditionally, 
law enforcement and national security interests have been able 
to adapt to changes in technology from the automobile, the 
telephone, and others over time. I am sure that in time we will 
be able to adapt to create effective order in the new 
technologies. It is perhaps fitting, if you will, that this is 
being held in Arizona. It somewhat resembles the Wild West at 
this point of view, and it is merely a need to slowly but 
surely civilize it. That is one way to look at it.
    Thank you very much, Senator.
    [The prepared statement of Mr. Aucsmith follows:]
    [GRAPHIC] [TIFF OMITTED] T9335.058
    
    [GRAPHIC] [TIFF OMITTED] T9335.059
    
    [GRAPHIC] [TIFF OMITTED] T9335.060
    
    [GRAPHIC] [TIFF OMITTED] T9335.061
    
    [GRAPHIC] [TIFF OMITTED] T9335.062
    
    [GRAPHIC] [TIFF OMITTED] T9335.063
    
    [GRAPHIC] [TIFF OMITTED] T9335.064
    
    [GRAPHIC] [TIFF OMITTED] T9335.065
    
    [GRAPHIC] [TIFF OMITTED] T9335.066
    
    Senator Kyl. Well, thank you very much, Mr. Aucsmith. Of 
course, we wanted to put one of our premier corporations on 
display as well, and since you are a leading technology expert 
in the area, we thought this would be a good forum in which to 
discuss this. I am not sure whether we should have had you 
before or after our next witness, though, because our next 
witness is going to demonstrate to us how this hacking is done.
    Now, I have some assurances that with the law enforcement 
officials here, this will all be done in a quasi-legal way, but 
I take no--I give no assurances in that regard. Let me properly 
introduce to you Jose Granado. He is a senior manager at Ernst 
& Young, a highly qualified accounting firm in the country, no 
fly-by-night hacking outfit, I would hasten to point out. And 
recently it was named as the outstanding information security 
organization, as I understand it, by the Information Systems 
Security Association. So Jose also comes by his expertise 
rightly.
    He has been involved with information security for the last 
12 years. He is a frequent speaker on the topic. We thank you 
for testifying today, and as I have mentioned to the others, 
your full statement will be placed in the record, and we would 
appreciate a summary of your remarks at this time.

                   STATEMENT OF JOSE GRANADO

    Mr. Granado. Good morning, Mr. Chairman. Thank you for the 
opportunity to testify today regarding improving prevention and 
prosecution against cyber attacks. As you mentioned, I am a 
senior manager with Ernst & Young's eSecurity Services group. I 
direct a team of ``white hat hackers'' who perform network 
assessments on client networks. Their objective is to identify 
existing weaknesses in computer systems that will lead to 
unauthorized access. My perspective comes from having led over 
100 network security assessments over the past several years. 
Assisting me today is Ron Nguyen, a manager with our eSecurity 
Services group. Today we will describe and demonstrate the 
process we utilize to perform these assessments.
    When performing these assessments, we obtain a snapshot in 
time of an organization's network security posture. This 
snapshot allows us to identify potential points of entry to 
gain unauthorized access to a network. The demand for these 
assessments has been generated by several factors: increased e-
commerce initiatives, increased Internet dependency, which has 
generated a need for independent security reviews, increased 
discovery of operating system and application level 
vulnerabilities, and increased publicity, as we have seen 
recently with the denial-of-service attacks on eBay, Yahoo, and 
others.
    Although our team is extremely skilled, over 75 percent of 
our initial access into client networks is gained via 
relatively simple methods and techniques. Our success is 
facilitated by three factors: poor selection of user ID's and 
passwords, poor system configuration from a security 
perspective, and the inability for organizations to implement 
solutions on a realtime basis to existing vulnerabil-
ities.
    Hundreds of websites exist that contain system security 
information. The network used to exchange this type of 
information transcends physical, geographical, and cultural 
boundaries. Internet chat sites, informal gatherings, and 
conferences also help to facilitate the flow of information.
    During today's online demonstration, we will identify a 
live computer system, scan the computer system for potential 
entry points, gain access to the system, eavesdrop and control 
the system remotely, crack the password file, and, finally, 
execute a denial-of-service attack.
    Our demonstration network is comprised of two Windows NT 
laptop computers. The computer labeled ``attack,'' the one on 
the larger screen, will be performing the hacking activity. The 
computer labeled ``victim,'' the one on the smaller screen, 
will be the recipient of the attacks. Although these computers 
comprise their own mini network, the techniques demonstrated 
today can be performed against any live computer on the 
Internet that is in a similar security state as our victim 
system.
    An attacker can run a ping utility to randomly identify a 
range of targets on the Internet. The attacker can also target 
a specific victim to attack. For our demonstration, we will 
ping www.
victim.com.
    The ping utility has identified one live system on our 
network designated by the IP address 192.168.10.10. An IP 
address is a numerical designation that identifies a computer 
on a network. Once we identify a live target, there are a 
number of freely available vulnerability scanning tools that 
can be used to identify potential entry points. For our 
demonstration, we will use the freeware tool called 
``Superscan'' on our attack system to scan our victim.
    The scanner has identified potential entry points on our 
target system--specifically, ports 21, 80, 135, and 139. A port 
is a numerical designation for a specific network function. 
Part of the system access process is mapping vulnerabilities 
associated with these open ports to exploit tools. Our scan 
identified port 80, which is associated with Web browsing, as 
open. For our demonstration, we will launch the iishack tool on 
our attack system to gain access to our victim.
    We now have gained access to our victim system. The attack 
was successful. The iishack tool the attacker used exploited a 
buffer overflow vulnerability on the target system. A buffer 
overflow condition is caused by the transmission of unexpected 
data to a target system, causing it to accept commands from an 
attack system. The hack tool launched a listening service that 
the attacker can now use to remotely control the system. This 
listening service allows the attacker to eavesdrop on the 
victim system by using a standard Web browser. For our 
demonstration, the attack system will monitor a letter being 
typed by the victim system.
    As you can see, the attack system now actually has the 
screen of the victim system displayed on it. The victim 
computer is typing a letter with the notepad function, and what 
he is typing keystroke by keystroke is now appearing on the 
bigger screen, which is the attack system.
    With remote control access, the attacker can leverage the 
target system as a launchpad to attack other systems, start 
programs, access and view files. For our demonstration, we will 
access and view files on the victim system from our attack 
system.
    As you can see, the attack system here is going through the 
contents of the C drive on the victim system and actually 
bringing up documents that are on the victim system and 
actually appearing on the screen of the attack system. The 
documents, as you can see, appear in their complete entirety.
    Now that the attacker has full control of the target 
system, one of the most popular activities is password 
cracking. The attacker can download the password file from the 
remote system and run a password cracker to discover user 
passwords. For our demonstration, we will download the password 
file to our attack system and using the lopht crack program 
demonstrate how quickly passwords can be cracked.
    We have located the password file on the victim system. We 
have dragged it to the desktop of our attack system. We are now 
bringing up the lopht crack tool and feeding that password file 
to the cracking tool. And as you can see, in a matter of 
seconds 18 of 21 passwords were cracked, and that took probably 
2 or 3 seconds.
    If the attacker is simply looking for targets to crash, 
they can easily launch a denial-of-service attack directed 
specifically at the target system. For our demonstration today, 
we will launch a denial-of-service attack on our attack system 
to disable our victim.
    The IP address of the victim system is being inputted into 
the denial-of-service tool, and after pressing the nuke button, 
we see that our victim system has been disabled as evidenced by 
the blue screen with all the error messages that are on it. And 
now that that system is disabled, it needs to be restarted to 
get back to its original state.
    Thank you for the opportunity to testify today at this 
hearing, and subject to your questions, this concludes our 
quick demonstration.
    [The prepared statement of Mr. Granado follows:]

                   Prepared Statement of Jose Granado

                         POWERPOINT TITLE SLIDE
Introduction
    Mr. Chairman and distinguished members of the Subcommittee, thank 
you for the opportunity to testify today regarding improving prevention 
and prosecution against Cyber Attacks.
    My name is Jose Granado. I am a Senior Manager with Ernst & Young's 
eSecurity Services group. I direct a team of ``white hat hackers'' who 
perform network assessments on client networks. Their objective is to 
identify existing weaknesses in computer systems that will lead to 
unauthorized access. My perspective comes from having led over 100 
network security assessments over the past several years. Assisting me 
today is Ron Nguyen, a manager with our eSecurity Services group. Today 
we will describe and demonstrate the process we utilize to perform 
these assessments.
                          POWERPOINT SLIDE ONE
Introduction to White Hat Hacking
    When performing these assessments we obtain a ``snapshot'' in time 
of an organization's network security posture. This snapshot allows us 
to identify potential points of entry to gain unauthorized access to a 
network. The demand for these assessments has been generated by several 
factors:

     Increased eCommerce initiatives.
     Increased Internet dependency--which has generated a need 
for independent security reviews.
     Increased discovery of operating system and application 
level vulnerabilities.
     Increased publicity--as we have seen recently with the 
Denial of Service Attacks on eBay, Yahoo and others.

    Although our team is extremely skilled, over 75 percent of our 
initial access into client networks is gained via relatively simple 
methods and techniques. Our success is facilitated by three factors:

     Poor selection of userids and passwords.
     Poor system configuration from a security perspective.
     Challenges organizations face in keeping up the large 
volume of vulnerabilities discovered on a daily basis.
                          POWERPOINT SLIDE TWO
    Hundreds of web sites exist that contain system security 
information. The network used to exchange this type of information 
transcends physical, geographical, and cultural boundaries. Internet 
Chat sites, informal gatherings and conferences also help to facilitate 
the flow of information.
                         POWERPOINT SLIDE THREE
    During today's online demonstration we will:

     Identify a ``live'' computer system.
     Scan the computer system for potential entry points.
     Gain access to the system.
     Eavesdrop and control the system remotely.
     Crack the password file.
     Execute a denial of service attack.
                               START DEMO
Demonstration
    Our demonstration network is comprised of 2 Windows NT laptop 
computers. The computer labeled ``attack'' will be performing the 
hacking activity. The computer labeled ``victim'' will be the recipient 
of the attacks. Although these computers comprise their own mini 
network, the techniques demonstrated today can be performed against any 
``live'' computer on the Internet that is in a similar security state 
as our victim system.
Identifying a ``live system''
    An attacker can run a ping utility to randomly identify a range of 
targets on the Internet. The attacker can also target a specific victim 
to attack. For our demonstration we will ping www.victim.com.
Scanning a system for potential vulnerabilities
    The ping utility has identified one live system on our network 
designated by the IP address 192.168.10. 10 An IP address is the 
numerical designation that identifies a computer on a network. Once we 
identify a live target, there are a number of freely available 
vulnerability scanning tools that can be used to identify potential 
entry points. For our demonstration, we will use the freeware tool 
``Superscan'' on our attack system to scan our victim.
Gaining access to a system
    The scanner has identified potential entry points on our target 
system. Specifically, ports 21, 80, 135 and 139. A port is a numerical 
designation for a specific 
network function. Part of the system access process is mapping 
vulnerabilities associated with these open ports to exploit tools. Our 
scan identified port 80 which is associated with web browsing as open. 
For our demonstration we will launch the iishack tool on our attack 
system to gain access to our victim.
Eavesdropping on a system remotely
    The iishack tool the attacker used exploited a buffer overflow 
vulnerability on the target system. A buffer overflow condition is 
caused by the transmission of unexpected data to a target system, 
causing it to accept commands from an attack system. The hack tool 
launched a listening service that the attacker can now use to remotely 
control the system. This listening service allows the attacker to 
eavesdrop on the victim system by using a standard web browser. For our 
demonstration the attack system will monitor a letter typed by the 
victim system.
Controlling a system remotely
    With remote control access, the attacker can leverage the target 
system as a launchpad to attack other systems, start programs, access 
and view files. For our demonstration we will access and view files on 
the victim system from our attack system.
Cracking passwords
    Now that the attacker has full control of the target system, one of 
the most popular activities is password cracking. The attacker can 
download the password file from the remote system, and run a password 
cracker to discover user passwords. For our demonstration we will 
download the password file to our attack system and using the lopht 
crack program demonstrate how quickly the passwords are cracked.
Executing a Denial of Service Attack
    If the attacker is simply looking for targets to crash, they can 
easily launch a denial of service attack directed specifically at the 
target system. For our demonstration, we will launch a denial of 
service attack on our attack system to disable our victim.
    Subject to any questions this concludes the presentation.

    Senator Kyl. Thank you very much.
    Did the FBI get all of that down? [Laughter.]
    You were taking good notes.
    Obviously, this simulation attack is designed to illustrate 
how people with a little bit of expertise--and I know that our 
witness here has a lot of expertise, but I am going to ask him 
as kind of a first question how much expertise you need to do 
this--can quickly get into, can disable, can secure information 
from or deface a system, whether it be a business or commercial 
system, a government computer, a research or university 
computer, or certainly a private computer.
    Let me begin by asking, Mr. Granado, just how experienced 
do you have to be to be able to do the kind of thing that you 
just now did?
    Mr. Granado. The experience is not what one would think. We 
often find that individuals involved in this kind of activity 
have a love for technology. These are folks that stay up until 
2, 3 or 4 a.m. reading everything they can get their hands on 
on systems and vulnerabilities and things of that nature. These 
kind of folks aren't individuals that have to go to Harvard to 
get this kind of experience. So the love for technology, a 
basic understanding of computer systems and networks is really 
at the foundation level all that is required.
    Now, as I mentioned during my testimony, the voluminous 
amount of information that is out there on the Internet on how 
to go at these systems actually helps to facilitate the 
knowledge process for folks that want to get involved in this 
kind of activity. But the experience needed to do this is not 
great. It is just a general understanding of computers and 
networks, and then all the information that is available out 
there kind of helps snowball your experience level so that you 
can perform these kind of activities.
    Senator Kyl. I think illustrative of that is the fact that 
the first person arrested in connection with the denial of 
service of the various sites in the United States, the young 
Canadian, was 15 years old. And I will mention another 
operation. During the time the United States was preparing an 
attack on Iraq, there was an intrusion into some U.S. 
Government computers that was serious enough that it got the 
highest levels of our Government. We dubbed the exercise 
``Solar Sunrise.'' We eventually found that there were three 
people under the age of 20 in I think two different countries 
that were involved in that attack. They were fortunately 
brought to justice.
    But the point is that this seems to be coming a lot from 
young people who obviously don't have the college degree you 
are speaking of but have acquired the capability to cause great 
mischief.
    Mr. Granado. Absolutely.
    Senator Kyl. Let me ask Mr. Aucsmith, at our hearing in 
Washington, DC, Harris Miller, who I am sure you know--he is 
president of the Information Technology Association of 
America--testified and he said one of the inhibitions of 
sharing information between the private sector and the 
Government regarding these vulnerabilities and threats is that 
companies naturally don't want their vulnerabilities and the 
attacks that have actually occurred against them to be publicly 
known since this could easily impact on consumer confidence in 
their particular sites and people then might not want to use 
their website. He said that unless companies are given an 
exemption from the Freedom of Information Act so that 
information they disclose to the Government can't be obtained 
by any other person that files the paperwork, that they would 
not want to voluntarily submit information to the Government in 
the name of cyber security.
    Do you share this view? Do you think we need that kind of 
protection of private information from being acquired under the 
Freedom of Information Act?
    Mr. Aucsmith. Yes, Sir, I actually do, very much so. There 
are two issues at stake here, and it depends on for what the 
information is being used. If it is tactical information, the 
FBI may be needed to solve the problem.
    Senator Kyl. Meaning on how to--sort of to understand the 
kind of thing that Mr. Granado just now did, how does this 
system work so that we can track back the perpetrator.
    Mr. Aucsmith. Right. And for that, our concern is if we 
share that information, we may end up as a witness in a 
discovery process. No company wants to end up in a criminal 
proceeding with their product. The second, somewhat longer 
range, has to do with we are aware--as much as we may try, we 
can't produce perfectly secure systems. It is just not 
economically feasible. In many cases, it is not even 
technically feasible. So we are made aware of vulnerabilities, 
but we are sort of constantly trying to fix those 
vulnerabilities in each new product revolution. So what you 
basically have is a sliding window of vulnerabilities that go 
along, and industry is very reluctant to make that public 
because, clearly, that is only helping the bad guy. It 
certainly could be used by your competition to weaken your 
product. So there is some need--there is a need to come up with 
some solution for allowing--sharing the strategic 
vulnerabilities, helping your practical situation with 
knowledge that we have in a way that doesn't adversely affect 
the security of a company or the infrastructure that are built 
off of those products. Something needs to be done.
    Senator Kyl. Well, Congress is looking--I was involved in 
the Y2K legislation which gave some temporary time-outs for 
liability on sharing of information in order to ensure that in 
that run-up to the Y2K turnover that we wouldn't have an excess 
of problems. And that seemed to work pretty well.
    So you would be supportive of Congress looking into the 
Freedom of Information Act, the potential for class action 
liability, antitrust liability, in a way to try to balance the 
need to share this information with the protections needed if 
the information is shared.
    Mr. Aucsmith. That is correct. Clearly, we are not 
advocating removal of FOIA. But what we are advocating is 
giving some level of protection where such vulnerabilities are 
so terribly sensitive.
    Senator Kyl. Now, Mr. Granado, one of the issues here is 
insider threat. In addition to hacking in from the outside, 
clearly there are some problems of the insiders. Could you 
comment a little bit about your concern there?
    Mr. Granado. Yes, Sir, absolutely. I mentioned during my 
testimony that our access into computer networks 75 percent of 
the time is through simple methods and techniques, and that 
specific statistic was for attacks from the outside in. When we 
are invited into an organization to perform our assessments, 
our success rate is 100 percent. The reasoning there is 
obviously there is a certain level of trust that is assumed 
when an individual or a group of individuals are inside an 
organization, the security problem I think becomes twice as 
difficult because of that assumed level of trust, and the 
security controls that an organization implements, they need to 
be perimeter-based for external threat, but there also needs to 
be auditing and monitoring tools on the inside so that the 
activities of users on the inside could be monitored so that if 
any weird activities are occurring they can be flagged and 
acted upon.
    Senator Kyl. This is the so-called defense in depth concept 
that Mr. Aucsmith mentioned.
    Mr. Granado. So there is no question that the insider 
threat is greater from my perspective than the outside threat. 
Again, that assumed level of trust of someone that you let 
inside your facility, they have already beaten one hurdle. They 
now just have to get to your network and access systems.
    Senator Kyl. I want to ask both of you a question here, and 
this goes right to the point Mr. Aucsmith made a minute ago. 
Maybe neither one of you want to reveal this nasty little 
secret to the public here, but I think it is important to do so 
in order to help do the job that both of you do.
    I would like for you to describe just how vulnerable anyone 
on the Internet is, and let me put it in this context. Suppose 
I buy one of the new encryption products and let's call it 
pretty good security, and I buy that and I think, great, I am 
encrypted now, and unless some organization like the CIA tried 
to crack it, it is not going to be crackable. So I am home free 
here.
    How foolish is that attitude? Just how vulnerable is anyone 
on the Internet? How easy is it and how many different ways are 
there to break into these kind of systems?
    Mr. Aucsmith. You have actually gone a reasonable step 
towards achieving security from a particular type of threat. 
That particular type of threat is collecting tactics at some 
intermediate point. What you have done nothing for is to 
protect the endpoint systems where that information originates 
or the destination of where it goes. In fact, given most 
encryption systems, the vulnerability is actually to break into 
the system and record the information before it is ever 
encrypted, which basically could be done in the attack you just 
saw here, or to go hunting around in the computer itself for 
the keystrokes that were used to invoke the unknown--or the 
key, the encryption key. You would solve one of the problems, 
but probably not the hardest one, quite frankly. And how 
vulnerable are they? If you were to take this scenario that I 
just went through here, and instead of launching the particular 
attack I did, but start downloading the swap file, which is 
where the operating system puts intermediate material as it is 
being processed for efficiency, and then scan that for the 
invocation of your particular encryption program and the 
keystrokes that were used to invoke it, you will most likely 
recover the key.
    Senator Kyl. Can you describe this in terms of an analogy? 
I know you used the analogy of leaving the window open in the 
home. But can you think of a good analogy to bring home to 
people how you may have provided security at points D through 
F, but that is not all the way from A to Z.
    Mr. Aucsmith. The analogy that we frequently talk about is 
putting an armory on a screen door. I think basically you have 
armored the front door and left all the windows open.
    Senator Kyl. Mr. Granado, do you want to add anything to 
that?
    Mr. Granado. Sure. The way I would like to comment on that, 
Senator, Ernst & Young is very active in providing this kind of 

information to the IT community. We have a website, www. 
esecurityonline.com, which provides vulnerability information 
for IT folks who are interested on what the latest threats are. 
And we also provide a separate section for clients. We give 
them customized vulnerability information based on the types of 
computers they have.
    Anyway, my point is, for anyone to think that if they have 
a security product that they just purchased today and that 
makes them secure for the rest of time, it is extremely 
foolish. From a statistical perspective, we discover about 7 to 
10 vulnerabilities a day that we either discover through our 
research labs or that we just gain information from other 
folks.
    So as you can see, you think you are secure today, 
tomorrow, and the next day, but next week you may not be. You 
know, this issue is something that organizations need to 
consider a more proactive approach versus a reactive approach 
to security. And security is a process. It is not a matter of 
plugging a hole and then you are done. It is a process where 
you need to test, you need to implement solutions, and then you 
need to monitor those solutions. And that needs to be 
recurring. And that is the only way that we are going to be 
able to get ahead of the game with respect to these kinds of 
attacks.
    Mr. Aucsmith. Senator, one more follow-up to that. What the 
people from Ernst & Young are talking about is exactly correct. 
But I think we need to emphasize that the scenario they just 
painted is that for an IT organization or business. The same 
scenario is very difficult to work when you are talking about a 
home user. And one of our problems is my industry has been 
pushing very much to get everybody online all the time, always 
connected. We have been a little bit behind on sharing with 
them the vulnerabilities of being online and always connected. 
And the same set of methodologies that work for businesses are 
unlikely to work in the home users. I can't imagine my mother 
being able to discern the information required to make a system 
secure.
    So what we have to do as an industry is make security 
somewhat more seamless and automatic and easier to deal with. 
We have a ways to go on that. We are working very hard, but it 
is a very hard problem.
    Senator Kyl. I think that is a very candid and excellent 
statement of the state of play right now in the industry coming 
from one of the leading industry drivers here, acknowledging 
that in making this wonderful new tool so available to so many 
people so fast, we have got to catch up in terms of security 
and that that is going to require a significant degree of 
effort.
    I think that our hearing today, if it will do nothing else, 
will be to demonstrate to people that there is a significant 
lack of security, but that shouldn't deter people from using 
the Internet, but that they should be very, very careful to the 
extent that what they have on there is private and they want to 
keep it private, and that industry generally and individuals 
are going to have to make good recommendations to the 
Government about what kind of protections they need in order to 
provide the fullest possible cooperation with law enforcement 
for law enforcement to do its job.
    This is something that we want to do our best to cooperate 
on, and I just would reiterate to the audience here, my 
subcommittee deals with three subjects, and in this one area 
they all tie together: technology, terrorism, and Government 
information. And so we are right on the cusp of this. I have 
introduced several pieces of legislation, some of which have 
already been signed into law, some of which are pending, as you 
heard before, and designed to try to begin to resolve these 
issues. But perhaps the biggest point that I would make--and I 
would like to have the witnesses comment on this, and then we 
will--again, I could talk to these guys all day long. I 
wouldn't understand a lot of what they say, but I can at least 
appreciate the point they are trying to make. But we will need 
to cut our hearing off here in a moment.
    We need to create an atmosphere of understanding and mutual 
commitment and trust that will enable private users, the 
private commercial sector, and the Government policymakers and 
Government law enforcement people to work together in order to 
ensure that there is the maximum protection so that there can 
be the maximum use. And if we do that, I think we will continue 
to lead the world and improve the quality of life in this 
country dramatically.
    But to the extent that there continues to be a residue of 
mistrust and an unwillingness to work together, it inhibits 
this wonderful opportunity that we have.
    Actually, there is one last question I would like to ask 
both of you because I think it is important for particularly 
our viewers and people who came to this hearing to appreciate. 
If you want to know more about how to make your own systems 
secure, let's say you are a small business here in Arizona, 
what is the best advice you have to individuals or small 
businesses? I am sure big businesses have found their way to 
your doorstep, but how does a small business do the best it can 
in an economic way to provide the security that it needs?
    Mr. Granado. There are a lot of organizations that folks 
and small businesses can join--Information Systems Security 
Organization is just one--where members of small businesses can 
join these organizations, and they have monthly meetings of 
security professionals within that specific community to 
discuss vulnerability issues, strategic issues, tactical issues 
with respect to systems security. So that would be one good 
economic avenue to gain knowledge on this issue.
    Then the other point, again, what I alluded to earlier, the 
Internet is just full of information that is free and easily 
accessible. You know, I described today the hacking-related 
information. There is just as much information out there on how 
to secure your system, and step by step how to secure it, that 
people can just do searches on the Internet, pull that 
information, pull out what is specific to their machines, and 
work on securing their systems, again, free and all that is 
required is Internet access.
    Mr. Aucsmith. And that is the nice thing about the 
Internet, its opportunities. There are bad guys out there, but 
there are also good guys. You can find lists of places to go 
for the good guys. There is a variety of sources for finding 
that, just a general search will probably help, but you can 
start with CERT, which is an organization at Carnegie Mellon. 
The Computer Emergency Response Team has a wide range of links 
that you can go to where the good guys are. The problem with 
all of that is it is necessary to have the technical competence 
to make that a reality in small business, and many small 
businesses lack that resource, in which case, much as you might 
call a locksmith or a burglar alarm company to help protect 
your physical security, you may very well need to make the 
investment of contacting a security professional to help you 
with your cyber security.
    Senator Kyl. And probably one of the most important points 
is, even though you develop what you think is a secure system, 
always understand that there are numerous vulnerabilities, and 
you have got to constantly be alert to the little things, you 
know, leaving your password taped to the top of your computer, 
as I saw one time, by the way--I mean, it sounds silly, but 
there are a lot of vulnerabilities that people just don't stop 
to think, basically, about what they need to do to make their 
systems secure.
    Mr. Aucsmith. We put them underneath the keyboards.
    Senator Kyl. Yes, right. [Laughter.]
    That is a good metaphor for the need to always be alert 
that there could be a problem, even though you have secured 
what you think is a pretty good system. But the first step is 
to try to take advantage of this.
    I am informed and we learned at our hearing in Washington 
that this Carnegie Mellon entity which Mr. Aucsmith alluded to 
had developed good counter-software to the kind of denial-of-
service attack that occurred against some of the sites that we 
have been referring to today. Some entities took advantage of 
that software. Some did not. Those that did didn't experience 
that denial of service.
    So take advantage of that which is available to you as has 
been described and remain alert to the possibility that even 
that won't necessarily deter a determined hacker. I guess those 
would be the two watch words.
    I really appreciate your demonstration, Mr. Granado, and, 
Mr. Aucsmith, your expertise in this. I will hope to continue 
to plumb the depths of that expertise as we try to fashion the 
kind of national policy and legislative solution to develop 
this cooperation that is going to be so essential to the 
future, and I look forward to continuing to cooperate with you.
    I thank all of you who have joined us at this hearing 
today. As I said at the beginning, this is an official hearing 
of the U.S. Senate Judiciary Committee's subcommittee which I 
chair, and anyone who wishes to communicate with us, we can put 
your comments in the record if they are appropriate. If you 
have questions, obviously submit them through me, and perhaps 
we will have an opportunity to share those with our witnesses 
here today.
    If there is nothing further, then I will declare this 
meeting adjourned.
    [Whereupon, at 10:30 a.m., the subcommittee was adjourned.]