[ISN] Remarks of Assistant Secretary of Cybersecurity and Communications Greg Garcia at the New York Metro Infragard Alliance Security Summit

From: InfoSec News (alerts@private)
Date: Thu Dec 13 2007 - 00:04:54 PST


http://www.dhs.gov/xnews/releases/pr_1197409593155.shtm

Release Date: December 11, 2007

New York, NY
(Remarks as prepared)

New York is such a fitting place to hold a security summit. With its 
storied history and thousands of financial institutions, it is the 
world's financial nucleus. All of you, as leaders in your respective 
companies and organizations, understand the full weight of your 
responsibilities to New York City itself, the nation, and quite 
honestly, the world. Because as Wall Street goes, so does the rest of 
the world. That is quite a responsibility to shoulder.

Yet you have continuously demonstrated your understanding and commitment 
to upholding this reputation. Time and again, whether facing a natural 
disaster or terrorist attack, you have found ways to ensure that roughly 
five and a half trillion dollars flows unabated through our financial 
systems each and every day. That's five and a half trillion dollars a 
day in activities that are critical to our citizens' basic needs and our 
Nation's economy.

It's the delivery of paychecks, utility bill payments, ATM withdrawals, 
and the over $733 million of Internet sales that occurred this past 
cyber Monday -- the first Monday after Thanksgiving, which is considered 
the most active online shopping day of the year.

As New Yorkers know, our adversaries will stop at nothing to destroy the 
infrastructures we have all worked so hard to build and protect. Whether 
they are cyber criminals, hacktivists, or nation states, our adversaries 
are pursuing ever more sophisticated and determined cyber attacks on 
U.S. government and private sector networks.

I'm watching as companies – household names with huge market 
capitalization and seemingly tremendous resources – expose their 
networks and data to infiltration and information theft. I'm seeing the 
same with government agencies on a regular basis. So we're all at risk, 
and we're all responsible. We have made some progress but there is much 
more we all have to do to protect our critical systems.

So let me tell you what we're doing at DHS to make the United States the 
most difficult and dangerous place in the world to conduct cyber crime. 
I think you will see that you each have a very important role to play in 
helping to make this happen.

Let me start with an overview of the threats as we see them at DHS. As 
you all know, the threats are real. Hackers are becoming more 
sophisticated and focused in their efforts. Criminal computer code is 
now written at the PhD level, and sold cheaply on the Internet.

Hackers are making massive efforts to compromise computer systems on a 
global scale. What was once a nuisance committed by various individuals 
years ago has now progressed into organized efforts by highly skilled 
professionals.

Today's professional hackers develop and sell malware toolkits to other 
criminals on the black market. In turn, the buyers of these toolkits can 
conduct online scams and spread malware more proficiently than ever 
before.

Why do they do this? Because cyber crime is big business. The number of 
hackers attacking banks worldwide jumped 81 percent over the past year. 
Botnets, spear phishing, key loggers, and other attacks make up the 
more-than-$100 billion global market for cyber-crime –¬ surpassing drug 
trafficking from a monetary perspective. Worst of all, the money 
obtained through cyber crime can be used to finance terrorism.

The numbers don't lie. From October 1, 2006, through September 30, 2007, 
our US-CERT— which I'll describe in more detail in a moment—handled more 
than 37,000 incidents, compared with almost 24,000 the year before. This 
increase can be attributed to not only more attacks on our public and 
private networks, but also better situational awareness levels and 
reporting rates.

I'll tell you now: many of these malicious attacks are designed to steal 
information and disrupt, deny access to, degrade or destroy critical 
federal or private sector information systems. Our adversaries are also 
seeking our intellectual capital and proprietary information, which we 
have spent years— and billions of dollars—developing.

Unfortunately, none of this will dissipate if we do not have the same 
level of organization and coordination that our adversaries are using 
against us. This dynamic underscores the absolute necessity for IT 
security and the importance of a nationwide call to secure cyberspace. 
It's something we can't afford not to do.

Our mission is clear. Securing the systems that maintain and operate 
critical infrastructures is vital to national security, public safety, 
and economic prosperity.

How do we do this? Collaboration and information sharing. It's a common 
theme in many of the speeches you hear because public/private 
partnerships, like InfraGard and the Financial Services and Multi-State 
Information Sharing and Analysis Centers (ISACs), are essential to 
protecting our critical infrastructures.

Let's be realistic. Private industry owns and operates more than 85 
percent of the United States' critical infrastructures. That means the 
Federal Government cannot address cyber threats alone. Obviously, if a 
cyber attack occurs, the larger percentage of potential immediate 
victims will also be in the private sector. This includes the financial 
services industry. So not only does it make sense to collaborate with 
each other, it is an absolute necessity.

At DHS, one of our best information sharing mechanisms is the United 
States Computer Emergency Readiness Team, or US-CERT. The nation's cyber 
watch and warning center, US-CERT coordinates the defense against and 
response to cyber attacks in coordination with the private sector.

It also analyzes and reduces cyber threats and vulnerabilities, 
disseminates cyber threat warning information, and manages incident 
response activities with a wide range of stakeholders. US-CERT's 
activities allow us to see potential trends and coordinate appropriate 
deterrence and response activities across sectors.

A prime example of this occurred just last month when the US-CERT served 
as the key data gathering and distribution center for a potential cyber 
threat to both government and private sector systems maintaining 
critical infrastructures.

By taking advantage of its information-sharing relationships, US-CERT 
distributed a notice defining the malicious activity and addressing how 
partners could detect and prevent it from affecting their networks. This 
directly strengthened the security and resilience of our nation's 
critical infrastructures.

The key lesson here is that by sharing our knowledge, we can better 
protect our nation. But we also know that this information sharing 
relationship is not as mature yet as it can be.

The feedback we received from our private sector partners after this 
information notice was, overall, very positive and appreciative.

But it included a reminder that such notices would be more useful if DHS 
could provide more threat-based context – that is, what is the nature of 
these attacks? Where do they come from? What is their intent?

Well, we continue to be limited in what we can share with partners who 
don't have appropriate security clearances, (indeed that's an issue 
within the U.S. government agencies as well). And we have to find 
better, quicker ways to get you relevant information that you can act 
on.

And, from our perspective, when we provide you information you already 
have, we realize both sides need to better calibrate our exchange of 
information so we make most effective use of our limited time and 
resources.

So we're learning, and we're working to improve our information sharing. 
That's one of InfraGard's key tenets and the ultimate goal for all our 
actions.

As we move into the discussion portion of this event, I'm very 
interested to hear your ideas about other ways we can share useful and 
relevant information between sectors.

In addition to sharing information with its public and private partners, 
one of US-CERT's most important responsibilities is increasing the 
Federal Government's awareness of its own network activity.

We know from our friends in law enforcement that situational awareness 
is the primary method a beat cop uses to protect a neighborhood. As I'm 
sure Joe can recall from his days on the force, a veteran officer works 
to deter crime wherever possible and catches criminals by understanding 
their environment, watching for trends and patterns, and knowing the 
rhythms of the community.

We know the same is true for cyber first responders. So we created an 
early warning system that watches for malicious patterns in network 
traffic and notes irregular activity. Just as in neighborhood policing, 
out-of-the-ordinary events or activities can tip off agency cyber 
responders to potential trouble.

EINSTEIN, as it is known, is that early warning system. It monitors 
participating agencies' network gateways for traffic patterns that 
indicate the presence of computer worms or other unwanted traffic. By 
collecting this information, EINSTEIN gives our analysts a big-picture 
view of potentially malicious activity on federal networks.

Prior to EINSTEIN, it took cyber security responders four to five days 
to gather and share critical data on federal government computer 
security risks. Today, we can produce that information in as little as 
four to five hours.

By analyzing network traffic for potential cyber threats before they can 
exploit vulnerabilities, EINSTEIN makes it more difficult, more time 
consuming, and more expensive for cyber criminals to reach and impact 
their intended targets. EINSTEIN provides us with unique traffic pattern 
analysis that US-CERT, as appropriate, can share with its partners. Now 
another program that exemplifies knowledge sharing in action is the 
National Vulnerability Database.

Sponsored by my office and the National Institute of Standards and 
Technology (NIST), the National Vulnerability Database or NVD puts the 
more than 28,000 known cyber security vulnerabilities into a single 
publicly available resource. NIST analysts then score them according to 
the severity of their risk.

Accessed at a rate of 48 million hits a year, the NVD's data enables all 
organizations to automate their vulnerability management, security 
measurement, and compliance activities through a series of security 
checklists and metrics.

Recently, your colleagues in the payment card industry recognized the 
value of the database to their cyber risk management efforts. Last June, 
the industry's data security standards required that all credit card 
processing vendors use the National Vulnerability Database to evaluate 
the security of their payment systems.

Essentially, it says that vendors must ensure that their systems do not 
include vulnerabilities that score higher than a pre-determined NVD 
number. This greatly enhances the security of every credit card 
transaction, prevents disruptions of key operating systems, and protects 
consumer information.

The value of the NVD is not limited to the credit card processing 
industry. If you haven't investigated the potential beneficial uses of 
this program in your companies, I strongly encourage you to do so 
immediately. You can access it by going to US-CERT's homepage 
(www.USCERT.gov) and searching for “NVD.”

The NVD is a wonderful example of an industry-lead adoption of a 
valuable government tool. And it also underscores our role in the 
federal government, to provide resources that help all of you do your 
jobs more effectively.

Let's move to another example of collaboration and information sharing. 
You know, in many ways, the enemy is already at the gate. So if we are 
going to secure cyberspace, we must marshal our defenses, learn from 
each other, and work together as never before. I'm a true believer in 
the phrase, “you play how you train.” This is why exercises are critical 
to our national and financial security.

InfraGard members already understand this. The Vermont InfraGard is a 
key planner in the state of Vermont's first ever cyber exercise, which 
my office is helping to design and implement. The lessons learned from 
next month's exercise will aid in the development of a cyber annex to 
the state of Vermont's emergency operations plan.

At the national level, we are actively planning for the March 2008 
national cyber exercise, Cyber Storm II, which follows the highly 
successful cyber storm I held in February 2006. This exercise examines 
our response and coordination mechanisms against a simulated cyber event 
affecting international, federal, state, and local governments, and the 
private sector.

By organizing and executing an exercise such as cyber storm, DHS is able 
to test our planning, information sharing and response to attack 
scenarios, assess our strengths and weaknesses in those areas, and learn 
how to improve response capabilities.

I am thrilled that the financial services sector, through the financial 
services ISAC, is once again fully engaged in the planning and execution 
of the cyber storm exercise.

Their participation in the exercise demonstrates their firm commitment 
to cyber preparedness and I hope sends a signal to other sectors that 
cyber security measures need to be taken seriously.

Throughout the country, at every level of government and within the 
private sector, people are dedicating themselves to ending cyber crime. 
To do this at CS&C it's necessary for my office to engage in robust 
collaboration and information sharing with our law enforcement partners. 
We do this through a liaison office in the US-CERT, which houses liaison 
officers from the U.S. Secret Service and FBI.

For example, maintaining the necessary division of authorities, US-CERT 
and the FBI worked closely together to identify and investigate cyber 
criminals and threats during Operation Bot Roast II. An ongoing and 
coordinated initiative, Operation Bot Roast finds and captures the 
criminals that overtake people's computers to conduct criminal 
activities.

Since it began last June, the FBI, with US-CERT's technical input, 
captured eight individuals responsible for infecting over one million 
compromised computers. We estimate the economic loss to be at more than 
$20 million to date. As the investigation continues, I have no doubt 
those numbers will increase.

At DHS, we know that online payment systems are profitable money makers 
for criminals. A recent 24-month Secret Service investigation of e-gold, 
an online payment system favored by criminals, resulted in the seizure 
of over $16 million.

In Miami, a Secret Service's cyber crime fraud investigation recovered 
more than 200,000 stolen credit card account numbers at a potential loss 
exceeding $75 million.

And here in New York, a Secret Service investigation with the Manhattan 
District Attorney's office led to the indictment of 17 people and a 
company called Western Express, a digital currency transmittal service.

The defendants are facing charges related to global trafficking in 
stolen credit card numbers, cyber crime, and identity theft. Based on 
the over 1.3 terabytes of digital evidence it obtained from search 
warrants and subpoenas, the Secret Service estimates that approximately 
$15 million flowed through Western Express' digital currency accounts. 
Additional judicial action is ongoing with respect to targets identified 
overseas.

We're starting to really hurt the criminals. Eventually, they are going 
to realize that it is just too expensive – both financially and in 
potential jail time – to “conduct business” in the United States.

In addition to catching the criminals, my office also works closely with 
the Departments of Justice and Defense to prepare for and, if necessary, 
respond to a national-level cyber incident. As co-chairs of the National 
Cyber Response Coordination Group (NCRCG), we work with 19 different 
federal agencies, including the FBI and the Secret Service, to ensure 
that the full range and weight of the Federal Government's cyber 
capabilities are deployed in a coordinated and effective fashion.

For example, the NCRCG recently convened to address and respond to the 
denial of service attack against the government of Estonia, a NATO ally. 
Additionally, the NCRCG will be an active participant in Cyber Storm II.

Effective cyber and communications risk management requires us to be 
prepared for a national crisis beyond those caused by terrorists or 
criminals. Now, I've talked a lot about cyber viruses. But we still have 
to contend with the more traditional biological virus – that is, the 
potential effects of a public health crisis, such as an outbreak of 
pandemic flu.

The spread of pandemic disease across the U.S. will be rapid and 
unpredictable. We estimate that as much as 40 percent of the workforce 
will be unable to report to work during peak periods of an outbreak – 
and you don't get to pick which 40 percent that could be.

Naturally, telecommuting will be a key mechanism to keeping our 
businesses and government operational during a pandemic flu.

Preparing for the increase in telecommuting is a demonstration of 
public-private collaboration in action. A working group led by my one of 
my components— the National Communications System—and including experts 
from the Federal Reserve Board, the Department of the Treasury, the 
Financial and Banking Information Infrastructure Committee, and the 
Financial Services Sector Coordinating Council, meets monthly to plan 
for the potential communications consequences of a pandemic influenza.

What the working group found is that, while the telecommunications 
backbone is unlikely to experience congestion, the so-called last mile – 
to the home and the enterprise – could experience disruptive congestion. 
But it concluded that this disruption could be mitigated if certain 
safeguards and practices are implemented by enterprises and 
telecommuters.

In collaboration with major internet service providers (ISPs), 
telecommunications carriers, and equipment and service vendors, the 
working group developed the following best practices that we strongly 
encourage businesses and government agencies to consider:
   
1. Limit remote access to users critical to maintaining business 
   continuity;
   
2. Limit access to business critical services through the enterprise 
   connection;
   
3. Adjust or retime automatic desktop backup software and software 
   updates for telecommuters;
   
4. Obtain a telecommunications service priority (TSP) for enterprise;
   
5. Subscribe to government emergency telecommunications service (GETS) 
   cards and/or wireless priority service (WPS) capabilities for 
   critical it staff; and
   
6. Enhance your cyber security posture due to increased reliance on 
   communications and it, reduced support staff, and increased threat of 
   cyber attack.


Implementing these practices will help reduce significant impacts on our 
nation's economy. All of us must do everything possible to keep our 
nation operating and delivering critical services under even the most 
challenging circumstances.

I consider everyone in this room today a key partner in the effort to 
strengthen our nation's cyber infrastructure. You understand that the 
Internet, and the many enterprise networks that depend on it, is one of 
the central platforms for business operations, supply chain management, 
and business continuity.

However, I'm more concerned about the people who aren't in this room 
because, as a recent business roundtable report suggests, they don't 
understand that this is a matter of their own business survival. 
Cyberspace is a profitable marketplace and enabler of market activity. 
But if businesses, whether in the financial services sector or 
otherwise, haven't made the investment in the people, processes, and 
technologies that will keep them operational in a crisis, our economy, 
in fact our very way of life, is at stake. We can't let this happen.

So here's what we all need to do.

First, memorize US-CERT's website address – www.USCERT.gov – and give it 
to everyone who needs it. Tell your partner organizations and businesses 
to sign up for the cyber security alerts and to report any potential 
cyber incident, threat, or attack they find.

We can only act upon the information we know about. The information our 
partners provide increases our understanding and awareness of the health 
of the overall cyber infrastructure and improves our response and 
protective measures.

Second, encourage your partners to participate in public-private 
partnerships like InfraGard and the financial services ISAC. These 
collaborations act as force multipliers for increasing awareness of 
cyber security challenges as well as implementing actionable and 
enduring solutions.

Additionally, they serve as an easily accessible mechanism to educate 
people on how cyber vulnerabilities can have real world consequences to 
our physical infrastructures.

Finally, encourage your colleagues to make security a part of their 
everyday business operations. It doesn't take long for cyber events to 
have real world consequences. Have them look at every step of their 
business lifecycle—from system configuration to in-house software 
development—to see if common security practices are being followed and 
that response plans are prepared accordingly. Help them realize that 
when they build a culture of security within their organizations they 
make great strides in ensuring the resilience of their business 
operations.

Laws such as Sarbanes-Oxley, the Gramm-Leach-Bliley Act, and the Health 
Insurance Portability and Accountability Act (HIPAA) place a fiduciary 
responsibility on them to ensure the security of their customers' 
information and their systems. However, in reality, these 
recommendations are simply the right thing to do for their companies, 
their customers, their fellow citizens, and the nation as a whole. So 
let's work together to make it happen.

Before I close, I would like to make one last comment. Thank you for 
your commitment to cyber security and your active participation in 
InfraGard. I have had a chance to work with members across the country 
and know what an important role you all play in our cyber security 
awareness efforts.

I urge you to use the time at this meeting to learn as much as you can, 
and then share your knowledge with your colleagues, professional 
networks, friends and families.

Cyber security is a complex problem, yes, but the dangers are easily 
understood, and the solution is simple: you can't guard all of 
cyberspace, but you can protect your piece of it.



__________________________________________________________________      
Visit InfoSec News
http://www.infosecnews.org/



This archive was generated by hypermail 2.1.3 : Thu Dec 13 2007 - 00:13:56 PST