[House Hearing, 112 Congress] [From the U.S. Government Publishing Office] CYBER SECURITY: PROTECTING AMERICA'S NEW FRONTIER ======================================================================= HEARING BEFORE THE SUBCOMMITTEE ON CRIME, TERRORISM, AND HOMELAND SECURITY OF THE COMMITTEE ON THE JUDICIARY HOUSE OF REPRESENTATIVES ONE HUNDRED TWELFTH CONGRESS FIRST SESSION __________ NOVEMBER 15, 2011 __________ Serial No. 112-80 __________ Printed for the use of the Committee on the JudiciaryAvailable via the World Wide Web: http://judiciary.house.gov _____ U.S. GOVERNMENT PRINTING OFFICE 71-238 PDF WASHINGTON : 2012 ----------------------------------------------------------------------- For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC 20402-0001 COMMITTEE ON THE JUDICIARY LAMAR SMITH, Texas, Chairman F. JAMES SENSENBRENNER, Jr., JOHN CONYERS, Jr., Michigan Wisconsin HOWARD L. BERMAN, California HOWARD COBLE, North Carolina JERROLD NADLER, New York ELTON GALLEGLY, California ROBERT C. ``BOBBY'' SCOTT, BOB GOODLATTE, Virginia Virginia DANIEL E. LUNGREN, California MELVIN L. WATT, North Carolina STEVE CHABOT, Ohio ZOE LOFGREN, California DARRELL E. ISSA, California SHEILA JACKSON LEE, Texas MIKE PENCE, Indiana MAXINE WATERS, California J. RANDY FORBES, Virginia STEVE COHEN, Tennessee STEVE KING, Iowa HENRY C. ``HANK'' JOHNSON, Jr., TRENT FRANKS, Arizona Georgia LOUIE GOHMERT, Texas PEDRO R. PIERLUISI, Puerto Rico JIM JORDAN, Ohio MIKE QUIGLEY, Illinois TED POE, Texas JUDY CHU, California JASON CHAFFETZ, Utah TED DEUTCH, Florida TIM GRIFFIN, Arkansas LINDA T. SANCHEZ, California TOM MARINO, Pennsylvania [Vacant] TREY GOWDY, South Carolina DENNIS ROSS, Florida SANDY ADAMS, Florida BEN QUAYLE, Arizona MARK AMODEI, Nevada Sean McLaughlin, Majority Chief of Staff and General Counsel Perry Apelbaum, Minority Staff Director and Chief Counsel ------ Subcommittee on Crime, Terrorism, and Homeland Security F. JAMES SENSENBRENNER, Jr., Wisconsin, Chairman LOUIE GOHMERT, Texas, Vice-Chairman BOB GOODLATTE, Virginia ROBERT C. ``BOBBY'' SCOTT, DANIEL E. LUNGREN, California Virginia J. RANDY FORBES, Virginia STEVE COHEN, Tennessee TED POE, Texas HENRY C. ``HANK'' JOHNSON, Jr., JASON CHAFFETZ, Utah Georgia TIM GRIFFIN, Arkansas PEDRO R. PIERLUISI, Puerto Rico TOM MARINO, Pennsylvania JUDY CHU, California TREY GOWDY, South Carolina TED DEUTCH, Florida SANDY ADAMS, Florida SHEILA JACKSON LEE, Texas MARK AMODEI, Nevada MIKE QUIGLEY, Illinois [Vacant] Caroline Lynch, Chief Counsel Bobby Vassar, Minority Counsel C O N T E N T S ---------- NOVEMBER 15, 2011 Page OPENING STATEMENTS The Honorable Louis Gohmert, a Representative in Congress from the State of Texas, and Vice-Chairman, Subcommittee on Crime, Terrorism, and Homeland Security............................... 1 The Honorable Robert C. ``Bobby'' Scott, a Representative in Congress from the State of Virginia, and Ranking Member, Subcommittee on Crime, Terrorism, and Homeland Security........ 3 WITNESSES Richard W. Downing, Deputy Chief, Computer Crime and Intellectual Property Section, Criminal Division, United States Department of Justice Oral Testimony................................................. 5 Prepared Statement............................................. 8 The Honorable Michael Chertoff, Co-Founder and Managing Principal, The Chertoff Group Oral Testimony................................................. 16 Prepared Statement............................................. 19 James A. Baker, Lecturer on Law, Harvard University Oral Testimony................................................. 31 Prepared Statement............................................. 33 Orin S. Kerr, Professor of Law, George Washington University Oral Testimony................................................. 38 Prepared Statement............................................. 40 APPENDIX Material Submitted for the Hearing Record Response to Post-Hearing Questions from Richard W. Downing, Deputy Chief, Computer Crime and Intellectual Property Section, Criminal Division, United States Department of Justice......... 76 Response to Post-Hearing Questions from the Honorable Michael Chertoff, Co-Founder and Managing Principal, The Chertoff Group 82 Response to Post-Hearing Questions from Orin S. Kerr, Professor of Law, George Washington University........................... 83 CYBER SECURITY: PROTECTING AMERICA'S NEW FRONTIER ---------- TUESDAY, NOVEMBER 15, 2011 House of Representatives, Subcommittee on Crime, Terrorism, and Homeland Security, Committee on the Judiciary, Washington, DC. The Subcommittee met, pursuant to call, at 10:03 a.m., in room 2141, Rayburn House Office Building, the Honorable Louie Gohmert (Vice-Chairman of the Subcommittee) presiding. Present: Representatives Gohmert, Scott, Deutch, Forbes, Marino, Gowdy, Lungren, Jackson Lee, and Goodlatte. Staff present: (Majority) Caroline Lynch, Subcommittee Chief Counsel; Arthur Radford Baker, Counsel; Sam Ramer, Counsel; Lindsay Hamilton, Clerk; Vishal Amin, Counsel; (Minority) Joe Graupensberger, Counsel; Veronica Eligan, Professional Staff Member. Mr. Gohmert. The Subcommittee will come to order. Welcome to today's hearing on cyber security. I would especially like to welcome my witnesses and thank you for joining us today. I am joined today by the distinguished Ranking Member of the Subcommittee, Bobby Scott, and by the most recent Chairman Emeritus, Mr. Conyers, who as I understand will be coming shortly. I want to welcome everybody to the hearing on ``Cyber Security: Protecting America's New Frontier.'' The Internet revolutionized our society in many ways. While its benefits abound and extend from our largest corporations to remote rural regions throughout the Nation, individuals in the United States and abroad have unfortunately been able to exploit the Internet for criminal means. Cyber crime often is faceless and has proven to defy traditional investigative prosecutorial tools. As a result, the frequency of cyber crime is growing rapidly and now includes many international criminal syndicates and is threatening our economy, our safety and our prosperity. Even more worrisome are the national security implications of cyber intrusion. We in Congress are concerned that we are witnessing the opening salvos of a new kind of conflict waged in cyberspace. As we learned in the Wikileaks case, one individual with access to classified data can threaten America's national operational security, and as we saw from China's cyber attack on Google and other companies, America's edge in innovation and technical superiority can be compromised by competing countries who make theft of intellectual property a national strategy. As recently reported in the Fiscal Times, China's brazen use of cyber espionage stands out because the focus is often corporate and part of a broader government strategy to help the develop or help develop the country's economy. Quote, I've been told that if you use an iPhone or a BlackBerry everything on it--contacts, calendar, emails--can be downloaded in a second. All it takes is someone sitting near you on a subway waiting for you to turn it on and they have got it, said Kenneth Lieberthal, a former senior White House official for Asia who is at the Brookings Institution. One security expert reported that he buys a new iPad for each visit to China and then never uses it again. The problem remains that the United States government does not own the networks through which all data flows, as totalitarian regimes like China do. Your government and industry must team up at times to secure the networks and create digital shields to protect our country and our business. The Administration has recently released a cyber security initiative proposal which aims to make changes to the cyber security structure and laws of the United States. We will look at the proposal today and we have a distinguished panel of experts here to help guide the Committee on what changes should be made to protect citizens from cyber criminals. One thing is clear. We have learned that computer crime is just as important as ordinary crime and should be treated just as harshly by our criminal justice system. The risks to our national infrastructure and our national wealth are profound and we must protect them. Besides our national security, we have something in this country as precious as wealth--our civil liberties. When it comes to cyber crime, Americans are fully engaged on the issue of protecting our civil liberties and privacy. They are correct to be so concerned, and we on this side of the aisle share their concern. Sometimes it seems like a dilemma. By using Facebook and other websites, Americans are putting more of their private lives on the Internet than ever before. Yet, more Americans are concerned about privacy than ever before. But it is understandable the more Americans rely on the Internet for their work, their entertainment, their relationships, the more productive and connected they become. But they also become vulnerable in new ways. It is truly a new frontier for our country and this Committee is determined that this new frontier will not be a Wild West. Our challenge is to create a legal structure flexible enough to protect our interests while allowing the freedom of thought and expression that made this country great. I am convinced we can thread this needle. I look forward to hearing more about this issue and thank all of our witnesses for participating in this hearing. It is now my pleasure to recognize for his opening statement the Ranking Member of the Subcommittee, Congressman Bobby Scott of Virginia. Mr. Scott. Thank you, Mr. Chairman. I am pleased that we are conducting a hearing today on the important issue of cyber security. It is a critical issue. It is critical that we work together in Congress with the Administration and with the business community and with private advocates to find ways to enhance the security of our government information systems, our business computer networks and the personal use of the Internet. Last spring, the Administration sent to Congress a comprehensive cyber security legislative proposal. I was, frankly, disappointed that they called for mandatory minimum sentences for certain crimes of damaging critical infrastructure computers because mandatory minimums have been found to waste the taxpayers' money, do nothing about crime and require sentences that often violate common sense. Resolving the significant issues relating to cyber security including protecting network access and operating aspects of our critical infrastructure is a very challenging problem. We must not shrink from the challenge but sentencing individuals who have been convicted of serious crimes is also a serious challenge as it requires individualized determination of what the person actually did, the harm they caused and the circumstances of the crime. And that's why Congress actually did something right in this area when it created the U.S. Sentencing Commission whose job it is to establish sentencing guidelines to be used by judges in imposing appropriate sentences. Calling for mandatory minimum sentences shrinks from the challenge of doing this right. While the crime involved may involve--may indeed be serious, imposing mandatory minimum sentences on everyone will not make us more secure. The code section of the offense violated does not often-- often does not accurately reflect the seriousness of the crime. This practice ultimately leads to injustice, cynicism and distress in our criminal justice system and the imposition of sentences that make no sense at all. Another issue that we need to talk about is the provision requiring notification of the government of certain breaches of sensitive personal information stored in the computer networks of businesses. The bill requires that an entity as of yet unnamed in the Department of Homeland Security shall be notified and that entity should also notify the FBI and Secret Service. Both of these agencies have specialized expertise that may be called upon depending, for example, whether the crime is one that threatens national security or the integrity of our financial systems. We need to hear more from the Administration and these agencies on how this would--how this coordination would take place. In addition, it is important that we examine whether the laws have maintained an appropriate focus on behavior we all believe rises to the level of criminal--Federal criminal liability. The Computer Fraud and Abuse Act was originally enacted to deal with intrusions into computers, what we now call hacking. Since that time, we have expanded the scope of the law on several occasions which has led to a disturbing expansive use in recent years which have generated concerns on both sides of the aisle. For example, now it is possible for someone to be prosecuted for violating the user agreement in a social networking site. One of our witnesses is the distinguished law professor who has written extensively about these concerns. I hope this hearing will give us a chance to discuss these issues and the best approach for refocusing our efforts in this area. Finally, I note concern about proposals to expand the ability of private companies to share information with government and ultimately with law enforcement for the purpose of protecting against cyber security threats. If we allow vastly overbroad sharing of information, we actually may undermine the very privacy rights which should be at the forefront of our concern. So I thank all of our witnesses for being with you and thank you, Mr. Chairman, for calling the hearing. Mr. Gohmert. And thank you, Mr. Scott. We now will proceed and it is my pleasure to introduce today's witnesses. Richard Downing is the Chief Deputy or Deputy Chief for computer crime at the Computer Crime and Intellectual Property Section of the United States Department of Justice in Washington, D.C. Mr. Downing supervises the section's computer crime work including the prosecution of computer hacking, identity theft and other online crimes. Mr. Downing also supervises a wide range of legislative and policy issues relating to computer crime. These issues include the modernization of the Federal Computer Hacking Statute policy and legislation aimed at improving cyber security, the development of the electronic evidence-gathering laws and efforts to enhance international cooperation in cyber crime investigations. Mr. Downing received his Bachelor of Arts in political science from Yale University in 1989 and his Juris Doctor from Stanford Law School in 1992. I will go ahead and introduce all of the witnesses and so we will just take one after the other without your having to be interrupted by me. The Honorable Michael Chertoff is co-founder and managing principal at the Chertoff Group in Washington, D.C. In addition to his role at Chertoff Group, Mr. Chertoff is also senior of counsel at Covington & Burling LLP and a member of the firm's white-collar defense and investigations practice group. Prior to his work at Chertoff Group, Mr. Chertoff served as Secretary of the United States Department of Homeland Security from 2005 to 2009. Before heading up the Department of Homeland Security, Mr. Chertoff served as a Federal judge on the U.S. Court of Appeals for the Third Circuit. Before serving as a judge, he was a Federal prosecutor for over a decade. Mr. Chertoff received his undergraduate degree from Harvard College in 1975 and his Juris Doctor from Harvard Law in 1978. Mr. James Baker is currently a lecturer on law at Harvard Law School. He most recently served as an Associate Deputy Attorney General with the United States Department of Justice from 2007 until last month, ending a 17-year career at the Department. In 2007, Mr. Baker was a Fellow at the Institute of Politics at the John F. Kennedy School of Government at Harvard University and was a lecturer on law at Harvard Law School. From 2001 to 2007, Mr. Baker served as counsel for intelligence policy at the Justice Department where he was the head of the Office of Intelligence Policy Review. Mr. Baker is a former Federal prosecutor. He received his Bachelor of Arts in government from the University of Notre Dame in 1983 and his Master of Arts in political science and Juris Doctor from the University of Michigan in 1988. He received--okay. And Professor Orin Kerr--Professor Kerr is a professor of law at George Washington University where he teaches criminal law, criminal procedure and computer crime law. Before joining the faculty in 2001, Professor Kerr was an honors program trial attorney in the Computer Crime and Intellectual Property Section of the criminal division at the United States Department of Justice as well as a Special Assistant U.S. Attorney for the Eastern District of Virginia. He is a former law clerk for Justice Anthony M. Kennedy of the U.S. Supreme Court and Judge Leonard Garth of the U.S. Court of Appeals for the Third Circuit. In the summer of 2009 and 2010, he served as special counsel for the Supreme Court nominations to Senator John Cornyn on the Senator Judiciary Committee. He has been a visiting professor at the University of Chicago Law School and the University of Pennsylvania Law School. Professor Kerr received his Bachelor of Science degree in engineering from Princeton University and his Masters of Science from Stanford University while earning his Juris Doctor from Harvard Law School. All of the witnesses' written statements will be entered into the record in its entirety and I ask that each witness summarize his testimony in 5 minutes or less. And at this time then, Mr. Downing, thank you for your patience. Please proceed with your opening statement. TESTIMONY OF RICHARD W. DOWNING, DEPUTY CHIEF, COMPUTER CRIME AND INTELLECTUAL PROPERTY SECTION, CRIMINAL DIVISION, UNITED STATES DEPARTMENT OF JUSTICE Mr. Downing. Good morning, Chairman Gohmert, Ranking Member Scott and Members of the Committee. Thank you for the opportunity to testify on behalf of the Department of Justice regarding the Administration's cyber legislation proposals. This Committee knows well that the United States confronts serious and complex cyber security threats. The critical infrastructure of our Nation is vulnerable to cyber intrusions that could damage vital national resources and put lives at risk, and intruders have also stolen vast databases of financial information and valuable intellectual property. At the Department of Justice, we see cyber crime on the rise with criminal syndicates operating with increasing sophistication to steal from innocent Americans. That is why President Obama has made cyber security a high priority. The Justice Department has done its part. For example, we have brought a series of important prosecutions, including cases against offenders from overseas, in an effort to build real deterrence. Despite this good work, the problem is far from solved. It is clear that new legislation can help to improve cyber security substantially. To that end, the Administration's legislative proposal contains a number of ideas and I would like to take a moment to highlight the parts of that package aimed at improving the tools we use to punish and deter computer crimes. First, the Administration's proposal includes reasonable and focused changes to ensure that computer crimes are punished to the same extent as other traditional criminal activity. For example, because cyber crime has become a big business for organized crime groups, the Administration proposal would make it clear that the Racketeering Influenced and Corrupt Organizations Act, or RICO, applies to computer crimes. Prosecutors have used this statute in the past to charge the leaders of organized crime families for their roles in their criminal enterprises, even where they did not themselves commit a predicate crime such as theft or extortion. In a similar way, RICO could be used to dismantle criminal enterprises focused on online theft and extortion and not just the people with their fingers on the keyboard. Also, the proposal would increase certain penalties in the Computer Fraud and Abuse Act, which is the statute used to prosecute hacking offenses so as to harmonize them with analogous traditional laws. For example, the crime of wire fraud carries a maximum penalty of 20 years in prison, but violations of the Computer Fraud and Abuse Act that involve very similar conduct carry a maximum penalty of only 5 years. Such disparities make no sense. The Computer Fraud and Abuse Act also currently has limitations that have prevented it from being fully used by prosecutors against criminals who traffic in computer passwords, and these shortcomings should be corrected. We propose that the scope of the offense for trafficking in passwords should cover not only passwords, but other methods of confirming a user's identity such as biometric data, single-use pass codes, or smart cards used to access an account. This new language should cover log-in credentials used to access any protected computer, not just government systems or computers at financial institutions. Finally, some have argued that the definition of ``exceeds authorized access'' in the Computer Fraud and Abuse Act should be restricted so as to disallow prosecutions based solely upon a violation of an employee use agreement or a website's terms of service. While we appreciate this view, we are concerned that restricting the statute in this way could make it difficult or impossible to deter and punish serious threats from malicious insiders. The reality of the modern workplace is that employees in both the private and public sectors require access to databases containing large amounts of highly personal and sensitive data. We need look no further than bank customer service representatives, government employees processing tax returns, and intelligence analysts handling sensitive material. Because they need access in order to do their jobs, it is impossible to restrict their access through passwords or other security mechanisms. In most cases, employers communicate clear and reasonable restrictions on the purposes for which that data may be accessed. Employers should be able to set such access restrictions with the confidence that the law will protect them when their employees exceed these restrictions. Improperly accessing personal or commercial information is a serious matter that requires serious criminal consequences. We must not impair these prosecutions based on unsubstantiated fears that the Department will expend its limited resources on trivial cases such as prosecuting people who lie about their age on an Internet dating site. Mr. Chairman and Members of the Committee, this is an important topic. The country is at risk and there is a lot of work to be done to stop computer crimes from victimizing and threatening Americans throughout the country. I look forward to answering your questions here today. Thank you. [The prepared statement of Mr. Downing follows:]
__________ Mr. Gohmert. Thank you very much. At this time, Mr. Chertoff, we will hear from you. TESTIMONY OF THE HONORABLE MICHAEL CHERTOFF, CO-FOUNDER AND MANAGING PRINCIPAL, THE CHERTOFF GROUP Mr. Chertoff. Thank you, Mr. Chairman. Thank you, Ranking Member Scott and Members of the Committee. I am delighted to testify here today. It is actually my first return to Congress as a witness since I left office 3 years ago and I used to testify in this room about border security. Mr. Gohmert. Yes, you did, and I knew you couldn't stay away. Mr. Chertoff. Right. It is hard to stay away. This is a very important look at an important topic. It is a topic that includes, obviously, concerns about criminal behavior but is much broader than that. I would argue that the issue of cyber security is now at the very top of the list of security threats faced by the United States. We have seen multiple dimensions of the threat. Some of them involve massive acts of criminality. I remember when I was Secretary we prosecuted the theft of literally tens of millions of credit card numbers which were used to steal money from credit card companies and from individual customers. But beyond that, we have seen the use of cyber attacks as a way of stealing very valuable intellectual property including national security secrets and these are reported almost on a daily or weekly basis. Beyond that, there is the obvious concern about our industrial control systems which could in some circumstances be attacked in a way that might actually cause serious damage to property and serious loss of life. We have seen examples back in 2007 and 2008 that are declassified of attacks against Estonia or Georgia, which are really part of what you could very well argue is a new way of war making. So this has got to be dealt with in a number of different dimensions. Certainly, the criminal law is part of it but I would argue there are some other elements as well. Broadly speaking, I would say there are three concerns we have in terms of vulnerability. One is the network itself and how to protect the network, and that is in many respects a technical problem. But the supply chain is also a problem. We are living in a global environment in which hardware and software is fabricated around the world and our degree of confidence about whether there are malicious bits of code or other malicious tools embedded in our hardware or software is not what it needs to be. And perhaps most significantly is the insider threat. While many people think the biggest problem with cyber security is somebody hacking across a network, experience shows that in many cases it is the insider who wittingly or unwittingly introduces malware into the system in a way that causes an enormous amount of damage. To this end, I would commend an article written a couple years ago in Foreign Affairs by then-Deputy Secretary Bill Lynn who described a major intrusion into our defense networks as having been caused by somebody picking up a thumb drive and putting it into a laptop as an act of negligence. So we have got to deal with all of these problems and one of my observations over the years I have worked on this issue is a tendency to believe there is a magic bullet. There is no magic bullet. So I would argue that there are several things that we need to do. I think the current Administration proposal is a good start but it is a start. It is not an end. First, I think we need to have tougher penalties and I in the main approve and applaud the proposals put forward by the Administration in that respect. Second, we need to make information sharing much easier. Time and again, when the private sector suffers an intrusion, the ability to get technical assistance about the nature of what that intrusion is is hampered by uncertainties in the law about whether the U.S. government and the private sector can share information. This has got to be made much easier and much more streamlined and I think, again, the proposal here is a good start. Third issue is how do we build standards of cyber security in our critical infrastructure. If we have a failure of critical infrastructure in, let's say, the electric grid, there will be enormous collateral consequences. Unfortunately, the value of the damage often exceeds the value of the asset, which means that there is no market incentive for the asset owner to invest in protecting the asset. We have got to change that. Again, I think the Administration has begun with a good start in talking about having standards for cyber security. I am concerned about two things. One, how do we enforce the standards. I am not sure naming and shaming is sufficient. And second, we are talking about a very complicated and detailed rulemaking process which may take a considerable amount of time to complete, and the problem is time is not on our side. Finally, I conclude by observing that there is a larger national security dimension here involving the problem of cyber warfare, the actual use of cyber tools as an adjunct to military operations, and here we need to be clear about what our policy is in responding to those acts of war and we need to have a declared policy of deterrence, how we are going to prevent these from happening. This is work that is beginning but it has got a ways to go. I would be happy to answer questions. [The prepared statement of Mr. Chertoff follows:]
__________ Mr. Gohmert. Thank you very much. Mr. Baker? TESTIMONY OF JAMES A. BAKER, LECTURER ON LAW, HARVARD UNIVERSITY Mr. Baker. Mr. Chairman, good morning. Ranking Member Scott and Members of the Committee, it is an honor to appear before you today to discuss the cyber security challenges that the country is facing. I would like to focus my remarks on a very few key points today. First, as you know and as we have already discussed here this morning, the United States faces a significant cyber threat today. The threat comes from many sources, nation states, non-state actors such as organized crime groups, terrorist organizations and lone individuals. As folks have said this morning, the money in our banks, our intellectual property and our critical infrastructure are threatened. There is a very real risk that at a time of crisis some parts of our critical infrastructure such as electrical, water, financial, transportation and telecommunications systems will not function as designed or at all. Presently, the United States is not fully prepared to deal with the cyber threat that we face. In other words, our defensive capabilities are insufficient to address the malicious activities that are directed against the United States. This includes Federal, state and local governments, civilian and military authorities and the private sector. At the present time, we cannot stop the theft of funds, intellectual property or personally identifiable information and we cannot ensure the malicious actors will not be able to degrade or destroy elements of our critical infrastructure at a time and in a manner of their own choosing. Although many people in the government and the private sector are working overtime to find more effective ways to address these vulnerabilities, right now we cannot guarantee our cyber security. All we can do is mitigate the risks. There are many reasons why we are not fully prepared to address the cyber threat today and these include technological, organizational, policy and legal issues. My written statement addresses these matters so in the interest of time I won't discuss them all now. I will note, however, that one of the problems we must confront is that the Federal Government is not where it needs to be organizationally to address the cyber threat. There has been much progress in this sphere and the Administration's proposal contains some important provisions in this regard. But the government is not where it needs to be in terms of clearly delineating agency roles and providing for robust but appropriate information sharing. Next, I would like to address some of the Administration's proposals to amend the Computer Fraud and Abuse Act, or CFAA, and related provisions. Standing alone, as some have mentioned, these proposals will not address fully all of our--excuse me, all of our cyber security requirements. They are important, however, and likely will assist law enforcement agencies and prosecutors in better ensuring that cyber crime is deterred effectively and punished appropriately. I know that some Members have concerns about aspects of this proposal but I urge Congress to work with the Administration to find a set of mutually acceptable provisions to modify the CFAA and related laws as quickly as you can. What Congress should not do, however, in my view, is to take steps that would weaken rather than strengthen the Computer Fraud and Abuse Act. I am concerned that some proposals to modify the terms of the existing act, in particular, those directed at modifying the scope of the term ``exceeds authorized access'', would have the unintentional effect of undermining the CFAA in certain respects. I understand the concerns that some have raised about the scope of the act, that it may be ambiguous and that government overreaching could result in individuals being prosecuted for what essentially are innocent or harmless violations of the terms of service of particular websites or services. I do not believe, however, that the case has been made that Federal prosecutors have regularly misused the CFAA, and to the extent that Congress is concerned that such abuses might occur, it strikes me that it might make more sense to use your oversight powers to ensure that enforcement of the CFAA is properly focused on the worst offenders. But do we really want to make it harder for the government to prosecute individuals who abuse their authorized access to immense databases at financial institutions, social networking sites and email providers to steal money or sensitive personal information? In closing, I recommend that the Subcommittee work quickly to enact some version of the Administration's proposal. Cyber security is not a problem that is amenable to simple solutions but we need to start moving in the right direction as quickly as possible. Our adversaries are not waiting for us to act. Thank you, Mr. Chairman. [The prepared statement of Mr. Baker follows:]
__________ Mr. Gohmert. Thank you, Mr. Baker. Professor Kerr? TESTIMONY OF ORIN S. KERR, PROFESSOR OF LAW, GEORGE WASHINGTON UNIVERSITY Mr. Kerr. Thank you, Judge Gohmert, Ranking Member Scott for the invitation to appear here this morning. I am going to begin by doing something that is probably unusual for a witness before you. I am going to admit that I am a criminal, at least according to the United States Department of Justice's interpretation of the Computer Fraud and Abuse Act. Mr. Gohmert. Sir, you have the right to remain silent. [Laughter.] Anything you say may--could be used against you. Mr. Kerr. I will waive that right. Mr. Gohmert. You have the right to consult an attorney if you wish. Mr. Kerr. In fact, I would like to speak about this. Why am I---- Mr. Gohmert. If you can't afford an attorney one will be appointed for you. [Laughter.] Mr. Kerr. Why am I a criminal? Well, I have a Facebook account. Facebook requires its terms of service--in its terms of service that you cannot provide any false information on Facebook. However, I do so. I say in my profile that I live in Washington, D.C. In fact, that is a blatant lie. I live in Arlington, Virginia. Therefore, I am in blatant violation of the terms of service, and according to the Justice Department I violate Federal criminal law every time I log in. Those of you may have children or grandchildren who are under the age of 18 who use Google to conduct searches. According to the Justice Department, they are also all criminals. Why? Well, because Google's terms of service say you have to be of legal age to enter into a contract in order to use Google. The legal age to enter into a contract in most states is 18. Therefore, anybody under the age of 18 who uses Google is, according to the United States Department of Justice, a criminal. Tens of millions of Americans have Internet dating profiles. Those Internet dating profiles typically say the terms of service of the Internet dating services say that individuals must give all truthful information and cannot give misleading information. According to one study, more than 80 percent of Internet dating profiles give misleading information. Somebody might say they are an inch taller than they are, maybe five pounds less. Maybe they might say they go to the gym every week when they don't. According to the United States Department of Justice, that makes them criminals. In fact, probably most people in this room, most of the witnesses, Members, counsel, members of the audience, most if not all are criminals under the United States Department of Justice's interpretation of the Computer Fraud and Abuse Act. What is the government's position here in how to amend the statute? My understanding is that the Justice Department wants to further broaden the statute so that it encompasses more cases and is more punitive than before. I think the answer is to narrow the scope of this act to ensure that routine computer usage is not criminalized rather than to further broaden and enhance the penalties of the statute. The reason why this is a problem--the reason how we got into this situation--is that Section 1030 of the Computer Fraud and Abuse Act treats computers differently than it treats the physical world. If you think about you are an employee at a job, your boss says don't go into the personnel files without a good work-related reason, you might--someone might look into those personnel files and might be disciplined for that. The boss might fire them or might not give them a raise but it wouldn't be a crime just to look into the folder. On the Internet or in the case of computers, it is a different rule. The law says you cannot exceed authorized access, which the Justice Department sees as saying that any term of use or term of service by an employer or an Internet service provider is binding as a matter of law. If an employer says you can't use the workplace computers for personal reasons and you do so, you are a criminal, again, a different rule in the case of using computers than there is in the case of offline real-world conduct. I think we need to amend the statute to eliminate those overly broad readings of the Computer Fraud and Abuse Act and that it is actually quite simple to do so. I have put in my written testimony two different ways of amending the statute which would narrow it and yet also preserve the Justice Department's authority to prosecute the kinds of cases that they mention when they explain why they want existing law to be as it is. In particular, the Justice Department, when it talks about prosecuting cases under the ``exceeds authorized access'' prong, always talks about cases in which the data that is obtained is very valuable or very private information. However, the statute does not contain any such limitation. The statute applies to any act of exceeding authorized access to obtain any information at all. One simple way of fixing the statute would be to limit the Computer Fraud and Abuse Act so that the ``exceeding authorized access'' prong only applies to efforts to obtain personal information or valuable information. That would preserve the Justice Department's ability to prosecute the kinds of cases it wants to prosecute and yet also preserve civil liberties of every other American who might, for good reasons, violate Internet terms of service of websites which it looks like most Americans who use the Internet and a computer probably do. Thank you. I look forward to your questions. [The prepared statement of Mr. Kerr follows:]
__________ Mr. Gohmert. Thank you. At this time, we will go to questions and I will reserve mine to allow other Members to go ahead. So let's see, Mr. Forbes of Virginia? Mr. Forbes. Thank you, Mr. Chairman. Gentlemen, thank you all for your expertise and willingness to come here, and I understand Professor Kerr's desire to want to be able to lie on his Facebook account and that is okay. My concern is this. I realize that we can have death by a thousand cuts with all these small cyber attacks but my big concern from sitting on the Armed Services Committee is the major gaping wounds that can happen to us if we were to have cyber warfare. And the question I would ask for all of you gentlemen who would like to respond is are our laws in any way hampering the Department of Defense from developing the technologies that we need to defend and protect against that major kind of attack if it was coming, which I believe one day we will see it in some portion or the other. And secondly, are our laws in any way hampering DOD from developing the kind of strategies we would need to be able to use that same kind of attack if, you know, heaven help us, we would have to do it? And then can you give me a little insight on how we even know when such a war would be launched against us? How do we know who is doing it and how do we possibly say okay, now this is the time when we can launch a counter action against that? And I will defer to any of you who would like to go first. But I really respect and appreciate your insight on it. Mr. Chertoff. Well, thank you--thank you for the question. It is a broad set of questions. Mr. Forbes. I know it is. Mr. Chertoff. I will address maybe the last question, which is what is often referred to as the issue of attribution, and it is a complicated issue because the reality is many of the attacks we suffer, if you--if you follow the attack back the point at which you're proximate to, the target may be in the United States but it may be a computer that has been taken over and is being operated remotely from China or someplace else in the world. And the difficulty is proving that connection is often very difficult. It is compounded by the fact that some of the ways we might prove it make reference to sophisticated and secret sources and methods that we are not going to want to reveal. So there is a huge challenge unlike what we faced in the Cold War when, if a missile was launched, we could demonstrate where the missile comes from. I think the answer there is a-- the laws are really not the issue here. The issue here is for us to develop a doctrine and to be very clear about, first of all, what we believe our response ought to be to an attack--distinguishing between a theft of property, which is espionage which we have traditionally not viewed as an act of war, and an attack on a system that might destroy the system itself like the electric power grid. And once we have determined what we want our response to be, we have got to do two things. We have got to, first of all, make sure the law permits us to respond, and second, I believe we need to have a declared policy of deterrence. We need to, for example, tell the world that if there is an attack upon our electric grid that results in a loss of life we reserve the right to respond by, A, eliminating the servers that launched the attack, we may reserve the right to do so physically as well as in cyberspace and we need to explain what our red lines are. If we don't do that, then we run the risk of a miscalculation where somebody launches on us without a clear understanding of our response, and experience shows that that is how people get into wars, when there is an unclarity of doctrine. Mr. Baker. I would agree with that completely. I think that the key problems are making the tough policy choices first, and once you have the policy, both the policy in terms of what do we want to do as a country to respond to these kinds of attacks. And when I am talking about an attack here in this setting I am talking about something that when it is directed at us would constitute a use of force against the United States if it was done by kinetic means. So that is--so when I talk about an attack that is what I mean, not an exploitation or espionage or something along those lines. But I think we need to get the policy right in terms of what we want our military to do. We need to get the technology right in terms of what it is that we think we are going to be doing, what are the collateral effects of that kind of activity. For example, if you launch something will you be able to restrict it narrowly or will it spread more broadly? How confident are we going to be in that? I think those are the tough questions. Once the policy makers figure out what they want to do, then the lawyers can help figure out how to do this legally either under the existing regimes with the, you know, the laws of war, the laws of armed conflict, the very statute they have to deal with, or that we need to make some kinds of changes and so on. Just one other quick question to address the last part of what you said, knowing whether we are actually under attack may be difficult in some circumstances because a smart adversary might just degrade our systems in a way that make them difficult for us to use and make us--make it hard for us to respond to a threat somewhere in the physical world but that we can't quite figure out whether it is actually being destroyed or not or whether there is an attack that is underfoot. Mr. Forbes. Mr. Downing, my time is up but I would love at some point in time to hear your response to that maybe for the record or maybe if you could give it to me in person. Mr. Gohmert. Without objection, we will go ahead and extend the time to allow an answer to that question. Mr. Forbes. Thank you, Mr. Chairman. Mr. Downing. So I guess what I would add to these other comments that have gone before is that I am not aware of any particular laws that are holding the military back at this time, although to be clear I work in the Computer Crime Section of the Department of Justice so perhaps that question is best asked to members of our Department of Defense. But what I would emphasize here is that unlike other sorts of defenses of the Nation, the victims of these attacks are going to be in the hands of our private infrastructures for the most part and thus it is not possible for the Defense Department to defend in the traditional way. And so that is very much why we see the comprehensive cyber security package as being very important because it provides the incentives we need to help industry to defend itself, since the Defense Department is not going to be able to put up, you know, ships on the sea and planes in the air to defend that. Mr. Gohmert. Okay. Thank you, Mr. Forbes. At this time, Mr. Scott was going to defer and we will hear from Mr. Deutch. Mr. Deutch. Thank you, Mr. Chairman. Mr. Downing, the Administration's proposal for information sharing states, if I understand it correctly, that notwithstanding any other provision of law, businesses can share their customers' private information with Department of Homeland Security. I presume that means Internet and email information. What else are you trying to get at? What else is there that will be shared and could this information potentially include medical records and all sorts of other personal information that would violate the privacy laws? Mr. Downing. So the idea of that is shared for the purpose of securing cyber security. So I think the primary areas would be things like threat and vulnerability information. A Internet service provider discovers a new exploit that is allowing people to access computers without authority. It is able to report it to the government and also to spread that information to help defend other networks as well. It is true, though, that sometimes there will be a narrow set of private information that would have to be disclosed. For example, in certain kinds of phishing attacks there is an email that is sent to a particular person in an effort to get them to give up their password. So there may be some cases where there is a need for that sharing of private information. What the bill does, though, is contain a number of ways that would protect the privacy of that information, so it would have sharing restrictions once it reaches the government. The attorney general would have a set of rules that would require that it be treated in a protected way. It also requires that the person giving the information to take out all other sorts of private information as well. Mr. Deutch. Just going back to what you just said, though, when you referred to phishing expeditions that we should be concerned then about the possibility, understanding that there are--there are requirements that would be imposed and guidelines that this could include all kinds of information about individuals. The sorts of things that these criminals are looking for are all of the sorts of things that may be turned over to the government including bank account numbers, credit card numbers, passwords for all of those accounts. Might all of that be included in the information that is going to be turned over? Mr. Downing. I think it is important to make sure that there are appropriate privacy restrictions because there will be some, I think, fairly limited situations where that sort of information may need to be turned over. So I think attention to the need to protect that information appropriately is proper, and we feel we have done a pretty good job of putting into the bill protections for that. But, of course, if there are other needs here, we are happy to work with Congress to sharpen them as well. Mr. Deutch. All right. I appreciate that. Mr. Baker, I have a question for you. You said--you said we can't stop theft, and we can't ensure that elements of our infrastructure won't be destroyed. You refer to the technological problems and policy issues. Can you speak to the extent to which lawmakers, policy makers can partner with the technology community to approach some of these issues? Does that--is that happening? Should that be happening? Mr. Baker. Partner--I am sorry. Mr. Deutch. Please. Mr. Baker. No. I was just going to say partnering directly on those kinds of issues. I mean, I think the main thing is to be informed and so calling hearings and bringing folks up to explain exactly what the problems are and what is going on--I mean, as Secretary Chertoff explained, the supply chain problem and the insider problem. The zero-day threat is a significant one. But I think one of the main things to do in terms of lawmakers is to figure out the boxes in terms of what parts of the United States government are going to have the lead or-- yeah, I guess the lead in addressing these problems and some of the proposals in the Administration's recommendation try to address that. They try to give an enhanced role for DHS to do this. Not because DHS is perfect. I think they would not say that they are perfect. But we need to make a decision and move forward. We need to get going on this legislation and start down this road and then fix the problems as we go. As Secretary Chertoff said, this is just the beginning. We have got a long way to go. Mr. Deutch. And Mr. Baker, you and Secretary Chertoff both spend a lot of time thinking about what these--what these concerns might be. As you--as you play these out, all of the various risks, in terms of critical infrastructure and the risks that we face because of the technology, what is it that worries you most? What do you think--where do you think we are most vulnerable? Mr. Baker. Well, I think any of these--any of these systems are vulnerable, any of them, and the electrical one is one of the primary ones. I think if that was shut down or degraded in a significant part of the United States that is a significant problem. And it is not only a problem of somebody intentionally doing that. I mean, there might be reasons that a nation state is not going to do that in an otherwise--in a situation that is otherwise a time of peace. They may do it in a time of crisis. But you might have a terrorist group that gets its hands on some kind of a tool that would enable them to do this or somebody is experimenting with something and it leaks out and it gets out into the wilderness, if you will, out into the wild and then it just starts shutting down systems and we don't know what is going on--I mean, that kind of a virus, if you will, in terms of something leaking out. So I think any one of these systems is vulnerable. The financial system is vulnerable. I mean, any of them. Take your pick. Mr. Deutch. Thank you. Thank you, Mr. Chairman. Mr. Gohmert. Okay. Thank you, Mr. Deutch. At this time, we will hear from Mr. Gowdy from South Carolina. Mr. Gowdy. Thank you, Mr. Chairman. I want to thank all the witnesses for lending us your expertise. Mr. Downing, I think I understood you correctly. One of the Administration's proposals is to raise the statutory maximum. Mr. Downing. That is correct, in certain ways. Different parts of the statute, yes. Mr. Gowdy. I know that sounds good. I get the politics behind raising the statutory maximum. How many of these cases ever approach the statutory maximum? If you want to do something about it, do something about the guidelines, not the statutory maximums. Mr. Downing. Well, we certainly agree that a lot of the sentencing is driven by the guidelines and there actually was an effort to try to improve the guidelines, by raising the penalties. That occurred the year before last. But, unfortunately, the Sentencing Commission largely did not do much to raise them. I would say though---- Mr. Gowdy. Would you be gracious enough to send to me your recommendations for the Sentencing Commission? They were kind enough to come visit with us a few weeks ago too and I was shocked at how infrequently even judges who were on the Sentencing Commission bother to follow the sentencing guidelines. So if you would send me those recommendations. Also, if you know how many motions for upward departure Department of Justice may have filed in cyber security cases that would be helpful to me as well. The---- Mr. Downing. I would be happy to take that back. Mr. Gowdy. The ratio of motions for downward departure versus motions for upward departure is 17 to 1 for downward. So some evidence of the Administration's seriousness about cyber security to me would be requests for upward departures in the cases where there has been a prosecution. RICO, practically, for the line AUSAs in the districts how is RICO going to help them? Mr. Downing. RICO is particularly useful in those situations where you want to try to take down an entire enterprise and, in particular, where you have leadership of the enterprise that may not be actually committing the offenses or may not be in conspiracy with others who are. So the usual tools of the direct crime and the conspiracy are not available. We have seen this in terms of cyber security in the area where you have an organized group that will have different pieces of the organization doing different parts of the job. Some of them are actually hacking. Some of them are using it to commit fraud. Some of them are doing other tasks. And so we think that it is a useful tool to be able to take down the entire organization including the senior leadership, and so that is one important way that it would help. Mr. Gowdy. What leads you to think the Department of Homeland Security is the best agency to handle this? Mr. Downing. Well, to handle this, I am not quite sure which piece of it you mean. You mean why should they get clarified authorities to be a leader in the area of cyber security? Mr. Gowdy. Right, as opposed to the Bureau. Mr. Downing. Well, we think the Bureau is an important piece of the puzzle but they have a very different role then that we would proscribe for the Department of Homeland Security. The Bureau does a terrific job on investigating cases and they are a critical piece of creating deterrence. However, DHS has an important role too. DHS, as the proposal would suggest, would strengthen or clarify the rules that would allow it to be better at outreach with private industry, making clear its role in helping to protect the civilian infrastructure and the government infrastructure. So it is really a different role that we see for DHS, and that is why we are seeking to have its authorities clearly laid out in legislation. Mr. Gowdy. Can you tell me the difference between computer trespassing/theft and treason? Mr. Downing. I am sorry. And treason? Mr. Gowdy. Treason. When does it become treason? Mr. Downing. Well---- Mr. Gowdy. Because the penalty for treason is already pretty high, I think. Mr. Downing. I believe it is, yes. Treason, I would have to probably get back to you on that. I am not sure I know the elements of the offense of treason. But my understanding would be that it would require that it be done in terms of wartime or where it would be a direct---- Mr. Gowdy. So it has to be during a time of war to be treasonous? Mr. Downing. I am sorry. I don't want to guess. Mr. Gowdy. What about one of our law professors? Mr. Kerr. My understanding is that treason is defined by the Constitution and requires somebody who is loyal to the United States who does an act intentionally against the interests of the United States as an act, intentional act of disloyalty to the United States. So I don't see how that is implicated in an act of computer trespass, which can be conducted for many different reasons. It might be. You could have an act of computer trespass that is part of an act. Mr. Gowdy. So if a soldier were to download information and give it to an enemy, would that be treasonous or not? Mr. Kerr. I don't know. Mr. Gowdy. What do you think? Mr. Kerr. Well, prosecutions for treason, my recollection is that the Constitution has requirements as to the witnesses that have to be available for acts of treason. So it is actually a very rarely prosecuted crime. I don't know if there have been prosecutions for treason in my lifetime. But it certainly would be a criminal act with severe penalties. Whether it is an act of treason or not, I don't know. Mr. Gowdy. I yield back, Mr. Chairman, or yield to the gentleman--no, I am out of time. Mr. Gohmert. I thank the gentleman. The Chair now recognizes the distinguished gentleman from Virginia, Congressman Scott. Mr. Scott. Thank you, Mr. Chairman. Mr. Chairman, one of the issues we have been working on is ID theft and the statutory maximum is not usually the problem. The problem is that these cases don't even get investigated much less prosecuted. And so let me ask in that line, Mr. Downing, is unauthorized possession of credit card numbers, passwords, ID information--is unauthorized possession only a crime? Mr. Downing. Under criminal law, it generally has to be with an intent to commit a fraud. So mere possession may not be but in almost all cases we can show that there is a intent to commit a fraud. Mr. Scott. Well, you have--but just--if you just looked in my computer and found all kinds of credit card information you would have to either show that I intended to do something with it or that I obtained it illegally. Mr. Downing. That is right. Mr. Scott. That mere possession is not a crime. Mr. Downing. I believe that is the case. Mr. Scott. Now, child pornography, if you found something on somebody's computer you wouldn't care how they got it, would you? Mr. Downing. We would definitely care how they got it. It would also be a crime for mere possession. Mr. Scott. Well, I mean, in terms--in terms of a crime being committed you could prosecute without being concerned about how they got it. Mr. Downing. That is true. Mere possession of child pornography is a crime. Mr. Scott. Is--do you know if in the Federal Government whether or not there is any requirement that banks try to limit ID theft by doing things like sending a real-time email every time a charge is made? I mean, there is no technological problem with the bank if somebody uses a credit card instantaneously text messaging that to the user. Is there anything--does anybody have any authority in the Federal Government to require banks to do stuff like that? Mr. Downing. As a technological matter, I assume that it is possible to do that. As far as the regulations---- Mr. Scott. But it is technologically possible to do it. Is there anybody in Federal Government that can order the banks to do that? Mr. Downing. I don't know the answer to that question, I am afraid. Mr. Scott. Under RICO, we--Mr. Downing, you want to use RICO for computer crimes. Why is not the underlying crime that you are investigating enough to access RICO rather than the fact that they used a computer? I mean, if they--if they are doing some operation that is some big organized crime effort that ought to be enough to get RICO. Why do you have to show that they are using a computer? Why is that important? Mr. Downing. There are, certainly, some cases where there is another predicate offense that could be used to prove the RICO. But there are some situations where it might not be. I am going to give you an example. If an organized crime group were to use a denial of service attack against a gambling website, let's say, to prevent the site from operating right before a critical event, it would be an extortion under Section 1030(a)(7). It is not clear that that sort of extortion falls into traditional extortion statutes since there is no physical property at risk and no risk of harm to human life. So it is true that there are some areas that could be done through a RICO prosecution, but we feel that this would close some gaps and allow us to make sure that it covers it in all situations. Mr. Scott. You have in your testimony the statement that the Administration has proposed a mandatory minimum sentence of 3 years imprisonment as one appropriate way to achieve the needed deterrence. Do you have any research that shows that mandatory minimums rather than longer maximum sentences subject to guidelines serves as a deterrence? Mr. Downing. I am not an expert on the research on mandatory minimums, but I can say that this particular one is very narrowly focused. Mr. Scott. Can you point to any--can you point to any research--you can't point to any research that shows that it serves as a deterrence. Mr. Downing. I would be happy to research that issue and get back to you. Mr. Scott. Are you aware of research that shows that mandatory minimums do not reduce crime and serve only to waste the taxpayers' money? Are you familiar with that research? Mr. Downing. I am not aware of that research either. That is not my field of expertise. Mr. Scott. Mr. Chairman, my time is just about up. But before I yield back, I would just like to ask for the record for the witnesses, I guess Mr. Downing and anybody else, on these reports, exactly what--how these reports work, who can ask for it, do you need a subpoena and then what happens to it because in earlier versions of Homeland Security, information sharing was very important. So if Homeland Security got something the FBI and Department of Defense and everybody else could look at it, how this information is shared and what exactly--what information there can be, and also we talked a little bit about the international aspects of the Internet and trying to prove who did it is a problem. But another problem is if you find out who did it does the Department of Justice have jurisdictional problems--if things are going on in France that affect things in the United States how we deal with the jurisdictional problems, if anybody would want to respond to those for the record. Thank you, Mr. Chairman. Mr. Forbes [presiding]. Thank you, Congressman Scott. And do each of you have a comfortable understanding of what Congressman Scott needs to supply? Good. If you have any questions I am sure he will be glad to clarify that for you and if you would respond to the record for him on that we would appreciate it. Chair recognizes the former Attorney General of California, Mr. Lungren. Mr. Lungren. Thank you very much, Mr. Chairman. Secretary Chertoff, in the Cyber Security Task Force we had on the Republican side early this year information that we got both public and private was that the best estimate was that perhaps 85 percent of intrusions in the cyber world could be taken care of if we just had good cyber hygiene and that because of that, because we don't have that, the 85 percent clutter that is out there makes it more difficult for to identify the 15 percent of the more serious nature. When we are asked to perhaps pass new laws with respect to criminal sanctions and so forth, I guess one of the questions our constituents would ask is are we as a government as well as the private sector doing what we need to do to identify and encourage good cyber hygiene, and if not, why not? Mr. Chertoff. Well, Congressman, I think you are dead right about this. I think that, and I can't tell you if 85 percent is exactly the right number, but I think you could take a lot of hay off the haystack with good cyber hygiene. What do I mean by that? I mean appropriate use of passwords and changing of passwords, appropriate implementation of access controls, appropriate rules about who and what can download off a network and who and what can insert various kind of media into a network. And you are quite right. A lot of this is in private hands and that is why when I look at the Administration's proposal, in many ways, to me, the more significant element has to do with the requirements as it relates to critical infrastructure and requiring that a nationally significant critical infrastructure have plans and programs in place to make sure they have cyber security and much of that involves internal processes and internal programs. Now, there are a lot of different ways to skin the cat and I am not prescribing one particular way to do it. But a big challenge is to architect your internal security system so that it is not so cumbersome that people just avoid it altogether but that it is robust enough so that it is not obvious or easy for people to penetrate it. You know, take a very simple thing like the ability to take a thumb drive and put it into a network and download, as was reported to be the case with Bradley Manning. If you are dealing with sensitive systems you ought to have restrictions on who has the capability to do that. So, to me, rolling out a set of processes and having the private sector have to meet certain standards would take a lot of hay off that haystack. Mr. Lungren. I guess it would be my observation that as we are looking at these proposals, and I certainly support us moving forward in the area of cyber security, enhanced awareness of it within our various laws, I would hope that we would have at least as much effort in the public and private sector on raising the awareness of the need for computer hygiene. I mean, we need a equivalent of a Smokey the Bear campaign to somehow help us. That is not to say we ought not to do these things now. One thing I would like to address to Professor Kerr and Mr. Chertoff and Mr. Downing is this. There has been a Memorandum of Understanding entered into by the--by DHS and by the Defense Department in terms of proper exchange of information, et cetera. I happen to think that is a good start. However, if we do not from the beginning ensure that civil liberties are protected here and that we are not in any way acting in a position that does not recognize the traditional and constitutional priority of civilian control of the military, we are buying a real problem. I guess my question--I will start with you, Professor Kerr, if you have some knowledge of that Memorandum of Understanding. Are you satisfied that that--it has reached an appropriate position of balance such that as we designate DHS as the primary repository of this information and the coordinator of information and--or overview of cyber security throughout the Federal Government that the concern--the legitimate concerns of civil libertarians or anybody, any American concerned about that, have been met? Mr. Kerr. I share, certainly, all of your concerns with the need to protect privacy and civil liberties in this situation and also to balance that with the appropriate exchange of information within the government, which can be tremendously important. As an outsider, I really can't tell how things are working. So I would love to know the answer just as you would like to know the answer but, unfortunately, I don't have it. Mr. Lungren. Mr. Chertoff or Mr. Downing? Mr. Chertoff. I think I can probably offer some insight into this because I think this in the main reflects an agreement that we had in the prior Administration between DHS and the Department of Defense concerning the proper allocation of responsibility. With respect to government networks and the commercial domain, I think it was understood that the authorities should be DHS authorities to maintain the principle of civilian control. On the other hand, there are unique capabilities in the Department of Defense both in terms of access to information and tools and techniques which are important to have available to deploy to protect the United States, and as long as that is undertaken under the authorities of DHS I think you manage to balance between using all of the elements of national power but having a civilian-controlled and civil-liberty respecting way of actually operationalizing. You know, I would leave you with this thought. I don't think security and privacy here are in conflict. I think they actually are mutually reinforcing. You cannot have privacy on the computer if you don't have the security to be able to control who gets into your computer, and I think that it is important not to lose sight of the fact that it would not be a triumph of civil liberties to keep the U.S. government from protecting computers so the Chinese government could get on our computers. [Laughter.] Mr. Downing. If I may, I would add, certainly, the Administration is very concerned about the sharing of information and that there are appropriate civil liberties and privacy protections in place. One example of that is what I referred to earlier in the legislative proposal where sharing is going to occur under a set of rules that allows the private sector to share with the government. We have really been very careful to think through how that sharing is going to happen once it occurs inside the government, and there would be appropriate limitations to make sure that there isn't going to be any abuse. Mr. Gohmert [presiding]. Thank you, Mr. Lungren. At this time we will hear questions from Ms. Jackson Lee of Texas. Ms. Jackson Lee. Let me thank the Chairman and the Ranking Member for this hearing. It is interesting to see our former Secretary of Homeland Security, thanking him for his service and as well the numbers of individuals. Mr. Baker, I was looking for my friend from Texas but you have a good name and certainly I know that testimony has been productive. Mr. Secretary Chertoff would know that I was in Homeland Security and going back to Homeland Security, still serve on Homeland Security and cyber security has been a enormous issue. I am going to go right to you, Mr. Secretary, and I think we do have a dilemma between the First Amendment rights, as we have always had a tension, the whole question of the--when we had the discussion on the PATRIOT Act was during your tenure and some of the ramifications of that. But I am going to go directly to an entity, that preceding 9/11 there were challenges and that is China, and cyber security is not any longer a fly that we swat at. It is annoying. They have just gotten my formula for the--or the formula for how to do a Gucci purse or they have just found out how to make Colgate toothpaste or at least label it and say it is Colgate toothpaste. How dangerous is it to have a friend that is engaging in the intrusion of one's cyber system and does that friend's accessibility then open it up to individual--to entities that would wish to do us harm? Mr. Chertoff. Well, I think, you know, the National Counterintelligence Executive recently publicized the extent to which our networks and our systems are being penetrated by foreign powers, and I would--I would have to say I think it is now a general consensus that in terms of both our economic well being and potentially our national security and military posture the ability of foreign governments to penetrate into our networks is probably at the very top of the list of threats that we face. You know, I have heard people debate whether the theft of intellectual property has national significance. If you consider the amount of money and time we spend developing our technological advances, to have somebody come in and steal it and short circuit it is nothing less than giving away our economic competitiveness. Beyond that, again, just relying on open source public documents like the U.S.-China Security Commission, we know that in China, for example, there is a military doctrine that looks to cyber warfare as one of the domains of warfare. So, again, we have to be concerned about the possibilities, as Mr. Baker said, either in a tense situation or even in a peacetime situation a foreign adversary taking advantage of their ability to distract us by degrading or disrupting our networks. So, you know, there are multiple dimensions to this. There are some diplomatic issues that need to be pursued. But most important, I think, we need to have the internal capability to manage our risk in a way that does not leave us hostage to foreign actors. Ms. Jackson Lee. I thank you. And Mr. Baker, I don't know if this--thank you very much, Secretary--whether this would fit you but on the Homeland Security side we are completely frightened of this process or prospect of cyber security as it relates to, and I know that the government witness is from Intellectual Property but the extent that cyber security can intrude on water distribution, electrical grids and how much government oversight, intrusion and emergency action should be engaged in as it relates to cyber security or the protection of our cyberspace. There are a lot of bells going off but how much government activity should we have? How precious is this cyberspace that it could literally shut us down as a Nation? Mr. Baker. The cyberspace is precious. It is absolutely precious. We have to be worried about it being degraded and destroyed, disruptive and having a shut down, having significant parts of our economy shut down. As others have said, I think we are in, you know, based on everything that I have seen, sort of a pre-9/11 mode right now where we see we have got some significant problems. We see we have got significant vulnerability. We have got adversaries out there that are serious about doing us harm and we need to get going and we need to get organized. Ms. Jackson Lee. What would you want us to do and---- Mr. Baker. So we need--we need to figure out one thing, just for example, and was talked about here. One thing we need to figure out is as a society how much government involvement, meaning how much government monitoring of private communications, do we want and are we willing to tolerate. And if we are going to have government monitoring of private communications in order to obtain information to protect us from cyber security threats, how are we going to monitor that, how do we monitor the monitoring. In other words, what privacy protections do we have in place, what oversight. We have to pay for that oversight. Everybody talks about oversight. Oversight is expensive so we need to make a commitment that we are going to pay to have the right people in place to do that kind of oversight. So I think it is inevitable that you are going to have government monitoring of private communications to some degree. The question is how much and then who watches to make sure that we are all comfortable with what is going on. So I think it is--I think you are going to have--you have to have--I think no entity standing alone, private sector or government, anybody else, military, civilian, has all the tools necessary to address this threat. We need to bring all of our resources together in a way that we are all comfortable with and then move forward. Ms. Jackson Lee. Mr. Chairman, would you allow Mr. Kerr to answer that question? Mr. Gohmert. Yes, without objection. Mr. Kerr, you may answer. Ms. Jackson Lee. And you might put your influence on the question. Thank you. Mr. Kerr. Yeah. Ms. Jackson Lee. And I thank Mr. Baker. Thank you, Professor. Mr. Kerr. Thank you. I think striking the right balance is quite difficult then and Mr. Baker's answer raises, I think, what is the missing half of the puzzle that we are looking at in this hearing, which is the procedural rights, the rights of government investigation. The problem in cyber security from the standpoint of criminal law is not that the punishments aren't high enough. The punishments are not only as high as they are in non-cyber crime laws. In many ways, they are higher. The difficulty is it is very difficult to catch people. So what tends to happen is the government wants more investigatory power. That becomes quite controversial. So instead, the government gets broader and broader substantive criminal laws and greater and greater punishments for crimes. We should not use substantive criminal law and the Computer Fraud and Abuse Act as a substitute for the difficulty of catching the bad guys. We should focus on making sure the government has the power necessary to catch people that are engaging in wrongdoing online. Ms. Jackson Lee. I thank the Chairman. Mr. Chairman, if I could just say to you or say for the record I know that we are in the Crime Subcommittee and the Committee dealing with terrorism but I truly believe I think Secretary Chertoff and I think Professor Baker might answer Mr. Kerr's point. I think we need to ramp up and get coordination between military, civilian and government resources. We need to get in front of this. If we are pre-9/11 on cyber security we have got some work to do, and I hope this Committee can be part of the solution, Mr. Chairman. I thank you very much for yielding. Mr. Gohmert. Thank you, Ms. Jackson Lee, and you do make a very good point. We do need to get ahead of it and I appreciate you all addressing that. Hopefully, we will get into that a little further. At this time, I have the Honorable Mr. Goodlatte from Virginia with questions. Mr. Goodlatte. Thank you, Mr. Chairman. Welcome, all of you. I want to direct this first question to Mr. Downing and Mr. Baker. The Administration proposal includes a so-called ``name and shame'' provision to coerce industry to beef up cyber security. We certainly understand what that objective is but I wonder if that doesn't paint a target on the backs of vulnerable systems for cyber criminals to exploit or to encourage others to keep their problems as hidden as possible so that they won't be discovered to have been put in that situation. I wonder if you might comment on that, starting with you, Mr. Downing? Mr. Downing. Certainly. The--it is important to understand that this publicizing the vulnerability of a particular company is done at an extremely high level. It wouldn't reveal any particular threats that would be successful against a network. It would simply provide some information to the public and to the government about how well the company is doing overall. I think it is also important to think about what sort of incentives we think are appropriate to encourage the kind of better cyber security behavior that we would like to see. One option that the Administration has not proposed is to create a huge regulatory framework that would require lots of fines and auditors and all that sort of thing. Instead, it is a light-touch regulatory idea that would require but there still has to be some incentive made to cause companies to change their behavior. And so in this way, we think that by publicizing those that need to improve, that will provide a significant but not overreaching type of incentive to get them to change. Mr. Goodlatte. Mr. Baker? Mr. Baker. Yes, just real quick. I think you are right to be concerned about that. I think the Administration understood that and tried to come up with a solution where there was a sufficient amount of enhanced incentives for people to--companies to improve their cyber security posture without making them a target, as you suggest. I think you are right, we need to make sure we get the legislation right on that point. I would say, however, I mean, I think to a certain degree even today companies face risks in this area by not exposing to some extent what their vulnerabilities are because they have obligations to their shareholders and reporting requirements to the SEC to make known a set of risks that may be material in some fashion. The SEC recently put out some guidance on this. I think that is very significant. I mean, I think there is an incentive already and I just think it is unrecognized. Mr. Goodlatte. Thank you. Mr. Chertoff, how can Congress encourage the kind of innovative solutions we need from the private sector for cyber security and at the same time avoid a one-size-fits-all regulatory scheme? Mr. Chertoff. Well, first, let me say that, as I said in my opening statement regarding the legislation, I think it is a good start but I think there are some pieces that need to be strengthened. The good start piece is the concept of having the government lay out general standards and requirements but allowing the private sector to meet those standards using a variety of different methods. That is actually pretty similar to what we did in the chemical security area back when I was at DHS. So the good news is I think that gives you flexibility and allows people to tailor an approach, including one which the private sector can help to develop. I think on the--on the disappointing side, I would actually like to see some tougher responses to the issue of those elements of critical infrastructure that don't meet those standards or requirements because I think if you have a serious vulnerability in our electric grid or our water or any other important element of national security we are not going to have a lot of time to coax those entities into coming into compliance. We need to have the ability at some point to compel them to come into compliance. So that is an area where I would, frankly, like to see a little bit of strengthening. Mr. Goodlatte. Thank you. And back to you, Mr. Baker, how would including the CFAA within RICO help protect Americans from cyber criminals? Mr. Baker. It is a further tool that prosecutors can use to go after these very aggressive robust organized crime groups, mainly located overseas, and I take Professor Kerr's point. It is difficult. You have to have two things. You have to have the legal tools in place so that you can investigate and prosecute these crimes if and when you get your hands on somebody. But then we need to work with our international partners as the FBI does regularly to actually go out and get them and bring them to justice either in the United States or in a separate jurisdiction. But I think RICO is another tool that strikes me as appropriate here because that is what is going on. Organized crime groups are using the Internet to steal a vast amount of funds. Mr. Goodlatte. Thank you very much. Thank you, Mr. Chairman. Mr. Gohmert. Thank you, Mr. Goodlatte. And having been a judge for a decade and at times sat on the bench and thought does this lawyer not know that he's wasting his time asking those silly questions, it is a real honor to listen to such insightful questions that I think we have heard on both sides of the aisle here, and it points to the understanding people here have of the risks and problems inherent in what we are talking about. One of the things that--I don't know, it may be the only thing that the Heritage Foundation, the ACLU, Mr. Scott and I have agreed on and that is that we have over criminalized so many things, 5,000 or so crimes. We don't even know how many because they are not required to come through the Judiciary Committee in order to slap a prison sentence on, and there are so many things that have been made a crime. And people say oh, well gee, the Justice Department would never pursue anything like that. But it turns out it is not just up to the Justice Department. You know, we had a hearing previously where a guy just didn't stick the little sticker on his package that had an airplane with a line through it and he went to prison. You know, a guy received an orchid from a South American company without properly filling out their material. He went to prison for 18 months. So some things do get prosecuted. The poor guy that sent the package without the sticker with the airplane with the line through it was run off the road with what sounds like what amounted to an EPA SWAT team, ran him off the road, threw him to the ground, handcuffed him and hauled him in. So we are rather sensitive to over criminalizing and if I understand correctly we are talking about the potential for the Federal Government to run somebody off the road like they did the gentleman from Washington State and put him in handcuffs because he checked that he had scrolled down and read and agreed to the end user agreement and he didn't actually do that, and then as a result now he has committed a Federal crime. Is that a possibility, Mr. Kerr? Mr. Kerr. It is certainly my understanding of the Justice Department's interpretation of the law but I don't know if the Justice Department here would agree. Mr. Gohmert. Well, and then a good question was asked, Mr. Baker. How much government monitoring of private communications are we going to allow, and that has been a concern of a lot of us on both sides of the aisle. Have any of you read the President's American Jobs Act? Not my American Jobs Act. It was two pages. But the President's that was 155 pages. Were you aware that he set up a--the Public Safety Broadband Corporation in that that will help take care of our use of broadband? I mean, had you all heard that? Well, it won't do anything to create jobs but it will give more government control of our broadband, and you couple that with a potential push for more control of the Internet here it causes me some concerns. But on the same--at the same time, I know the question was asked who would have ever dreamed that planes would be flown into a building and some of us said well, that was Tom Clancy back several years ago had a hijacker fly one into the Capitol. Well, Clancy, if you--he has also written about this Net problem and Net security. So I mean, it is clearly an issue that we have got to deal with. Let me ask what--Mr. Chertoff, I will start with you. You said the value of damage for our intrusion may exceed the value of the asset. How do you think it would be damaged, if you could be more specific? Mr. Chertoff. I mean, here is the challenge you have, I think, in the case of some of the critical infrastructure. You might own a power plant and it might be worth a certain amount of money, and no rational person is going to invest more in securing the power plant than it is worth. Mr. Gohmert. Right. Mr. Chertoff. I mean, that is common sense. The problem is, and we have seen this both in terms of cyber and in the physical world, that power plant may be critical in terms of the whole surrounding community, even a state, involving public health, involving public safety, involving public communication. If that power plant goes down, there could be an enormous loss of life and economic damage that exceeds the value of the asset. So the challenge is how do you make the people who operate the asset and own the asset invest enough to protect against a cyber attack, and I think that is where it is appropriate to have the government play a role in laying out a set of general metrics and a set of general standards and then allowing the private sector to figure out the precise way in order to meet those standards and metrics. Mr. Gohmert. Anybody else care to comment on that aspect? If not---- Mr. Scott. Can I make another comment, a quick comment? Mr. Gohmert. Well, sure. It is your turn. Mr. Scott. No. I have already asked questions. Mr. Gohmert. Oh, okay. All right. Yes. Then we will go to Mr. Scott. Mr. Scott. Mr. Chairman, Mr. Baker and Professor Kerr have talked about the problems in defining ``exceeds unauthorized access.'' You kind of know it when you see it but, obviously, that term can cover a lot more than we want covered and, for the record, they can--if they have any suggestions as how we can define ``exceeds unauthorized access'' in a way that covers what we want covered without being over expansive that would be helpful. Thank you, Mr. Chairman. Mr. Gohmert. Well, thank you, Mr. Scott. Do you have any further questions? I mean, we could mount to a second round if you wish. Pardon? Mr. Scott. If you want a second round. Mr. Gohmert. Okay. Go ahead. I will allow Mr. Scott to complete--you can see the two of us are here and this is such an important issue. If you don't mind, let's--go ahead, Mr. Scott, if you would. Mr. Scott. Well, if--do you want to--do you want to--do you have any recommendations on ``exceeds unauthorized access?" Mr. Kerr. I do. I think there are two basic strategies that could be used to limit ``exceeds authorized access.'' One would be to just amend the current definition. Unfortunately, the current definition of ``exceeds authorized access'' is entirely circular. It says that you exceed authorized access when you do that to which you are not entitled, which doesn't really answer the question. It just makes the issue entitlement rather than authorization, just substitute a word. So one method of limiting the statute would be to clarify that that definition does not apply to mere terms of service violations and computer use policies, essentially just defining by exclusion that which the definition does not apply. And another approach would be to limit the substantive statute rather than limiting ``exceeds authorized access'' by saying that Section 1030, the Computer Fraud and Abuse Act, only applies to obtaining personal information or valuable information rather than any information. So under that approach, violating a terms of service or violating a terms of use could in fact lead to criminality but only in the kind of cases that the Justice Department focuses on, namely those cases where there's access to a sensitive database by a government employee or particularly valuable information that is taken in violation of an employer's computer use policy. Both of those strategies, I think, are two different ways of getting to the same conclusion and either is acceptable. Mr. Baker. I think the main thing that I am concerned about is making sure that we have the tools necessary to prosecute insiders who have access to vast amounts of data whether they are at a government employer or whether they are with a private-sector employer. I mean, if you think about how much data employees at Facebook or Google have access to, it is amazing, about--access to information about Americans and what Americans are doing. And so I think that is the kind of thing that I want to make sure that we don't change the statute to somehow inhibit or cripple, in some ways, the ability of the government to prosecute those kinds of cases. So if you were to somehow take--I mean, I have seen some of the suggestions with respect to amending the definition of ``exceeds authorized access.'' As long as they still allow for prosecution of in the employment context I think that would be the key thing and it would avoid some of the things that Professor Kerr was talking about in terms of what--you know, misrepresentations that people make on Facebook or website and so on. The other--I think his suggestion with respect to amending the specific provision of 1030(a)(2)(C) I think shows--I think there is more promise there. It is a more narrowly-focused provision. It doesn't deal with this definition. It applies to the whole statute, and I think it does get at the kinds of cases where somebody does something, accesses information in order to steal something or do something fraudulent or cause some harm. I think that shows much more promise, at least in my mind. Mr. Scott. Mr. Downing, this is limited to--this entire code section is limited to computers--government computers, financial institutions and protected computers. What about my computer? Is that--is that a Federal jurisdictional problem? Mr. Downing. The computer in your office? Yes, it would certainly be covered. A protected computer---- Mr. Scott. What about my personal computer? Mr. Downing. Protected computer is actually a fairly broad term. So it would include---- Mr. Scott. What is--what is not included? Mr. Downing. Not included would be certain stand-alone computers that aren't connected to the Internet, for example. Relatively rare these days. Most computers are covered by the term ``protected computer.'' Mr. Kerr. If I could add--if I could add a brief comment, actually computers--stand-alone computers are also protected computers. Every computer in the United States is a protected computer because the definition of protected computer includes any computer that affects interstate commerce, a term of art which included anything that the Commerce Clause can include, and under the court's--Supreme Court's--Commerce Clause jurisprudence that would include every computer. So basically everything with a microchip except for a handheld calculator--there's an old 1980's era exclusion in there--is included. Mr. Scott. Thank you. Mr. Downing, under civil forfeiture, who gets the proceeds of the forfeiture? Mr. Downing. Generally, the proceeds are kept by the government. In part, they are used to further enforce the laws and part of it is put back to the general Treasury. Mr. Scott. Does the local--one of the problems I have with some of these civil forfeitures are is there is an incentive to do law enforcement based on how you can make money and fund your local operation, which kind of distorts the criminal justice system. When you say the law, does the FBI get to keep the money generally or does the local FBI office get to keep the money and avoid cutbacks in employment that may be coming with this budget deal? Mr. Downing. I am afraid I don't know all the ins and outs of the forfeiture rules. But my understanding is that it doesn't go to the local office at all, no. This is an important tool for getting at certain kinds of actors where criminal law is not sufficient. Mr. Scott. Well, yeah. And I know why we have civil forfeiture. My question is whether it is distorting. You have got Eighth Amendment problems of proportionality. Two people commit the same crime and one loses a house and a car. Another one doesn't lose anything. Who gets the money and whether or not you want civil forfeiture rather than criminal forfeiture means that you don't have to prove that somebody is guilty. They got to prove their innocence to get their money back, and so even if they are innocent they are out of attorneys' fees and a lot. So civil forfeiture, if not done properly, can be problematic. Thank you, Mr. Chairman. Mr. Gohmert. Okay. Thank you, Mr. Scott, and I just want to follow up. Now, of course, we have had a Federal court say you can't prosecute, as has been done before, a cheerleader mom that violates an end user agreement. But it brings to question in my mind is there anybody that polices the end user agreements, just what people are required to agree to before they utilize a service. Mr. Downing. Well, I am not sure what you mean by polices but, certainly, there are a couple of forces that would control what gets put into an end user agreement by a big website. Certainly, these things are made public because, obviously, people are signing them, and when Facebook recently or perhaps it was last year changed their user agreement in a way that was really egregious in the eyes of many of the customers, they protested and moved away from that--using that service. So there's a real vote-with-your-feet kind of possibility here. The importance of end user agreements is also important in the context of the Federal Trade Commission. So companies have to live up to their--what they say in their agreements, and if they fail to do that then they can be sanctioned for unfair trade practices. Mr. Gohmert. And we know here on the Hill--it hadn't been disclosed publicly--we have had government, our congressional computers hacked from foreign countries, at least one, and it is a threat and it is--can be international terrorism of a sort when you, as you all have discussed, realize what could be done by destroying our Internet usage. But by the same token, you don't want to create a problem for the greatest freedoms any country has ever experienced, as we do here. I know there are some that say well, gee, the Justice Department would never pursue that because that would just be too much. But we have heard example after example of when prosecutions have occurred that people can't believe. It just sounds like a Kafka novel or something. But I would hope that on both sides we are ready to be as tough as possible on espionage, whether it is domestic or foreign, so that the Homeland Security, our Justice Department intelligence has the ability to pursue those that want to hurt us but at the same time not pursue somebody just because they made some minor mistake or even negligently made a mistake. And one of the things we pushed is, and we haven't done it yet, defining what things are really just clerical administrative mistakes individually where maybe you should have somebody subject to a fine and what requires prison sentences, forfeiture, all of those kind of things so that we don't keep--just so that we can show how tough we are for the next election criminalize some conduct where it is more appropriate to just make it a fine or decide does it justify somebody being thrown down in front of their wife and kids and handcuffed and hauled in. So I think that is the issue and a lot of us on both sides of the aisle want to make sure that we don't do that. Before we conclude the hearing, you have given your opening statements. You have answered questions and been very gracious in doing so. But I would just like any final comments based on the questions that have been asked, things that may have been triggered in your mind, things that we ought to consider because this is all be part of the congressional record here. So if you would, starting with Mr. Downing. Mr. Downing. Thank you for that opportunity. There have been a lot of characterizations of what the Department of Justice position is on the 1030(a)(2) question of ``exceeds authorized access.'' Let me be very clear that DOJ is in no way interested in bringing cases against people who lie about their age on a dating site or anything of the sort. We don't have time or resources to do that. And, in fact, no court has in fact ruled that that is an appropriate use of the statute and, quite to the contrary, the one case that has addressed it ruled that it is not an appropriate use, and the government has not brought any further cases. So we are a little bit concerned whether this is truly a problem. Given all that, however, we recognize that this is an issue, and we are very much interested in working with the Committee to resolve this question in a way that is proper for all. What we do need to be careful about is to make sure that as we do that, we don't harm the ability to bring cases that everyone in the room would agree are proper and appropriate ones. And so, as we think about what sort of solution might be available here, that we do it in a way that isn't going to cause other harm and actually harm our ability to create deterrence in this area, which is so important. Mr. Gohmert. Mr. Chertoff? Mr. Chertoff. Well, I guess I would just conclude by saying I do think it is worth giving serious consideration to Professor Kerr's point about maybe some narrowing of the--of the statute. I agree with Mr. Baker that I think we are probably more concerned about insiders and employees who exploit their privileged position than we are people getting on Facebook. But the other point I would make, which I think is important, is there is a little bit of a tendency over-- observed over the years to deal with the issue of criminalizing by simply piling on additional penalties and jail time rather than recognizing the real challenges and being more efficient and more effective in enforcing the law against a broader number of law breakers. And here the problem is a lot of the activity is overseas, and we are not going to find the people who do this stuff because they are never coming over to the United States. And, frankly, in some countries there is not a lot of interest in cooperating with us. So an area which I think is worth exploring is what we can do to leverage, again, all of our economic and other powers to really induce countries in the world that have tolerated open and notorious criminal activity on the Internet into coming into compliance with what ought to be any reasonable international norm about preventing this kind of cyber criminality. Mr. Gohmert. Do you have any last suggestions about how we do that, how we deal with foreign individuals? Mr. Chertoff. Well, you know, I mean, one of the, of course, is a topic for a whole separate hearing probably. You know, we have entered into conventions with other countries and, certainly, the Europeans have been--have been cooperative. But there are countries in the world where, although there is lip service to wanting to play by the rules, they will tolerate the existence of these servers which are nothing more than marketplaces for criminal activity. Now, we do have a lot of economic power. We have trade power and the ability to use that, to say to some of these countries you not only have to sign up to doing the right thing but you have got to then walk the walk, I think is worth taking a serious look at. Mr. Gohmert. Yeah. Those sanctions work so well. I mean, basically we brought Iran to their knees. Oh, wait. No, that hasn't worked. Never mind. Mr. Baker? Mr. Baker. Yes, Mr. Chairman, just two quick points. One, I agree with Mr. Downing. I don't foresee the Justice Department prosecuting the kinds of cases that folks are concerned about. I understand the concern. It is a legitimate-- -- Mr. Gohmert. But you understand, we just want to get the law right so it is not even an option. We give them the power to go after the bad guys as completely as necessary without even risking some runaway prosecutor. Mr. Baker. I agree, but, you know, my experience is with any statute that you write there is this huge amount of ambiguity in any of these statutes. I mean, if you look at the mail fraud and wire fraud statutes, they don't even define fraud and so the government and courts have figured out how to--how to prosecute cases and how to adjudicate those kinds of cases over the years. But I-- it is difficult to write a statute that is so tightly focused to only get at the problem you are trying to get at without having some kind of collateral effect as well. I just--I would just be cautious about that and I would say then that it is a matter then of oversight for this Subcommittee to make sure that you stay on top of the Justice Department, to make sure you know what they are doing in terms of these prosecutions and bring them up here and have them explain why they did X, Y or Z in a particular case. That would be my suggestion on that. To go back just to close a loop, I think on a question that Mr. Forbes had raised earlier, just briefly, I think in terms of the legal problems that we are facing versus other kinds of questions, again, I think it is a policy problem more than a legal problem. But I think folks should be comfortable, I think, that the President has the authority, in the event of an imminent or actual attack on the United States, he has the authority under the Constitution and laws of the United States to take whatever actions are necessary to protect the country today. He has that authority today. The difficult question is figuring out how he would implement that authority, how that would be done and exactly what would the military do and under what circumstances or what other elements the United States government would do. That is what we need to figure out, as opposed to worrying about whether we have, you know, enough legal authority and whether he is going to be hamstrung in the event of a crisis. I think--I think he does have that authority. We need to figure out technically, strategically, doctrinally what we want to do to protect us. Mr. Gohmert. Thank you, and---- Mr. Scott. Mr. Chairman? Mr. Gohmert. Yeah. Mr. Scott. I would hope if the President concludes that we are in a imminent threat that he wouldn't have to fool around and try to figure out how this fits under a computer law where he can take---- Mr. Baker. I don't think he would have to do that. That is what I am saying. I think he has the authority to take whatever steps he deems appropriate in a crisis of that nature. Mr. Scott. Without having to worry about whether it technically fits under some computer--whether they are using computers as they do it or a protected computer or something like that. If he makes that---- Mr. Baker. That would not be top on his list. Mr. Scott. If he makes that conclusion then we would expect action to be taken. Mr. Baker. I think--well, I am suggesting this would be the situation in a cyber event and he could take whatever action are necessary whether it is a cyber action or some kind of physical kinetic action. Mr. Gohmert. Okay. Thank you, Mr. Scott. And you had said we need to figure that out and so I would ask you have recommendations in that regard if you would submit them to the Committee that would be extremely helpful. It is helpful to point out we need to figure this out and what we should do but it is even more helpful when you have a suggestion as to the best way to proceed in figuring it out. Mr. Baker. Yes, sir. Mr. Gohmert. But Mr. Kerr, final comment? Mr. Kerr. Thank you, Judge Gohmert. Just two quick points. First, I think the concern of the Justice Department's overbroad reading of the Computer Fraud and Abuse Act is a real one. Just a few weeks ago, the Ninth Circuit granted rehearing in a case in which the earlier panel of the Ninth Circuit Court of Appeals had held that private-sector employee computer use policies do in fact--are in fact--criminally enforceable. The employer had a policy that said you can't use the computer for non-business reasons. The Justice Department prosecuted the employee for using the computer for a non-business reason. The Ninth Circuit granted rehearing. We don't know what the court's interpretation will be but this is a very real current question. And then, second, on the question of civil RICO and mandatory minimums under the Computer Fraud and Abuse Act, I think it is really important to be specific as to where are the cases where this is necessary. In my experience, the actual penalties in Computer Fraud and Abuse Act cases tend to be relatively low because the damage tends to be low in the kinds of cases where the Justice Department actually catches the bad guy. So I don't think there is a lot of--there aren't any demonstrated cases of which I am aware of where, for example, there is the need for a mandatory minimum where under current law there wouldn't be and there is an actual case where the law would have applied. So some of the Justice Department's concerns strike me as very abstract, kind of, ``well, if we ever catch someone like this it would be nice to be able to give them a higher sentence.'' I think we should be responding to real problems, not abstract hypothetical ones. Mr. Gohmert. Okay. Thank you. We appreciate the witnesses being here. We know you are not here because of the money witnesses get paid since you don't get paid at all but--and Mr. Chertoff, nice to see you again. I was a little bit surprised you were willing to come in voluntarily after some of the hearings you have had here but-- -- Mr. Chertoff. Yeah, I was a little surprised too, actually. [Laughter.] Mr. Gohmert. Well, we do appreciate all of you being here on such a serious topic that has to do with our national security. Thank you all very much. This hearing now is adjourned. [Whereupon, at 11:45 a.m., the Subcommittee was adjourned.] A P P E N D I X ---------- Material Submitted for the Hearing Record Response to Post-Hearing Questions from Richard W. Downing, Deputy Chief, Computer Crime and Intellectual Property Section, Criminal Division, United States Department of Justice
![]()