[House Hearing, 113 Congress]
[From the U.S. Government Publishing Office]



 
    CYBER ESPIONAGE AND THE THEFT OF U.S. INTELLECTUAL PROPERTY AND 

                               TECHNOLOGY
=======================================================================



                                HEARING

                               BEFORE THE

              SUBCOMMITTEE ON OVERSIGHT AND INVESTIGATIONS

                                 OF THE

                    COMMITTEE ON ENERGY AND COMMERCE

                        HOUSE OF REPRESENTATIVES

                    ONE HUNDRED THIRTEENTH CONGRESS

                             FIRST SESSION

                               __________

                              JULY 9, 2013

                               __________

                           Serial No. 113-67


      Printed for the use of the Committee on Energy and Commerce

                        energycommerce.house.gov




                  U.S. GOVERNMENT PRINTING OFFICE
86-391                    WASHINGTON : 2014
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing 
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC 
area (202) 512-1800 Fax: (202) 512-2104  Mail: Stop IDCC, Washington, DC 
20402-0001


                    COMMITTEE ON ENERGY AND COMMERCE

                          FRED UPTON, Michigan
                                 Chairman
RALPH M. HALL, Texas                 HENRY A. WAXMAN, California
JOE BARTON, Texas                      Ranking Member
  Chairman Emeritus                  JOHN D. DINGELL, Michigan
ED WHITFIELD, Kentucky                 Chairman Emeritus
JOHN SHIMKUS, Illinois               EDWARD J. MARKEY, Massachusetts
JOSEPH R. PITTS, Pennsylvania        FRANK PALLONE, Jr., New Jersey
GREG WALDEN, Oregon                  BOBBY L. RUSH, Illinois
LEE TERRY, Nebraska                  ANNA G. ESHOO, California
MIKE ROGERS, Michigan                ELIOT L. ENGEL, New York
TIM MURPHY, Pennsylvania             GENE GREEN, Texas
MICHAEL C. BURGESS, Texas            DIANA DeGETTE, Colorado
MARSHA BLACKBURN, Tennessee          LOIS CAPPS, California
  Vice Chairman                      MICHAEL F. DOYLE, Pennsylvania
PHIL GINGREY, Georgia                JANICE D. SCHAKOWSKY, Illinois
STEVE SCALISE, Louisiana             JIM MATHESON, Utah
ROBERT E. LATTA, Ohio                G.K. BUTTERFIELD, North Carolina
CATHY McMORRIS RODGERS, Washington   JOHN BARROW, Georgia
GREGG HARPER, Mississippi            DORIS O. MATSUI, California
LEONARD LANCE, New Jersey            DONNA M. CHRISTENSEN, Virgin 
BILL CASSIDY, Louisiana                  Islands
BRETT GUTHRIE, Kentucky              KATHY CASTOR, Florida
PETE OLSON, Texas                    JOHN P. SARBANES, Maryland
DAVID B. McKINLEY, West Virginia     JERRY McNERNEY, California
CORY GARDNER, Colorado               BRUCE L. BRALEY, Iowa
MIKE POMPEO, Kansas                  PETER WELCH, Vermont
ADAM KINZINGER, Illinois             BEN RAY LUJAN, New Mexico
H. MORGAN GRIFFITH, Virginia         PAUL TONKO, New York
GUS M. BILIRAKIS, Florida
BILL JOHNSON, Missouri
BILLY LONG, Missouri
RENEE L. ELLMERS, North Carolina
              Subcommittee on Oversight and Investigations

                        TIM MURPHY, Pennsylvania
                                 Chairman
MICHAEL C. BURGESS, Texas            DIANA DeGETTE, Colorado
  Vice Chairman                        Ranking Member
MARSHA BLACKBURN, Tennessee          BRUCE L. BRALEY, Iowa
PHIL GINGREY, Georgia                BEN RAY LUJAN, New Mexico
STEVE SCALISE, Louisiana             EDWARD J. MARKEY, Massachusetts
GREGG HARPER, Mississippi            JANICE D. SCHAKOWSKY, Illinois
PETE OLSON, Texas                    G.K. BUTTERFIELD, North Carolina
CORY GARDNER, Colorado               KATHY CASTOR, Florida
H. MORGAN GRIFFITH, Virginia         PETER WELCH, Vermont
BILL JOHNSON, Ohio                   PAUL TONKO, New York
BILLY LONG, Missouri                 GENE GREEN, Texas
RENEE L. ELLMERS, North Carolina     JOHN D. DINGELL, Michigan
JOE BARTON, Texas                    HENRY A. WAXMAN, California (ex 
FRED UPTON, Michigan (ex officio)        officio)


                             C O N T E N T S

                              ----------                              
                                                                   Page
Hon. Tim Murphy, a Representative in Congress from the 
  Commonwealth of Pennsylvania, opening statement................     1
    Prepared statement...........................................     3
Hon. Janice D. Schakowsky, a Representative in Congress from the 
  State of Illinois, opening statement...........................     4
Hon. Fred Upton, a Representative in Congress from the state of 
  Michigan, opening statement....................................     6
    Prepared statement...........................................     6
Hon. Michael C. Burgess, a Representative in Congress from the 
  State of Texas, prepared statement.............................     8
Hon. Henry A. Waxman, a Representative in Congress from the state 
  of California, opening statement...............................     8

                               Witnesses

Slade Gorton, Former U.S. Senator from Washington State, 
  Commission Member, Commission on the Theft of American 
  Intellectual Property..........................................    10
    Prepared statement...........................................    12
    Answers to submitted questions...............................    82
Larry M. Wortzel, Ph.D., Commissioner, U.S.-China Economic and 
  Security Review Commission.....................................    15
    Prepared statement...........................................    17
    Answers to submitted questions...............................    90
James A. Lewis, Director and Senior Fellow, Technology and Public 
  Policy Program, Center for Strategic and International Studies.    33
    Prepared statement...........................................    35
    Answers to submitted questions...............................    98
Susan Offutt, Chief Economist, Applied Research and Methods, 
  Government Accountability Office...............................    44
    Prepared statement...........................................    46
    Answers to submitted questions...............................   106

                           Submitted Material

Letter of July 9, 2013, from Cyber Secure America Coalition to 
  the subcommittee, submitted by Mr. Murphy......................    76
Letter of July 9, 2013, from Cyber Secure America Coalition to 
  the subcommittee, submitted by Ms. DeGette.....................    79


    CYBER ESPIONAGE AND THE THEFT OF U.S. INTELLECTUAL PROPERTY AND 
                               TECHNOLOGY

                              ----------                              


                         TUESDAY, JULY 9, 2013

                  House of Representatives,
      Subcommittee on Oversight and Investigations,
                          Committee on Energy and Commerce,
                                                    Washington, DC.
    The subcommittee met, pursuant to call, at 10:15 a.m., in 
room 2123, Rayburn House Office Building, Hon. Tim Murphy 
(chairman of the subcommittee) presiding.
    Present: Representatives Murphy, Burgess, Blackburn, 
Scalise, Olson, Gardner, Johnson, Long, Ellmers, Upton (ex 
officio), Braley, Schakowsky, Tonko, Green, and Waxman (ex 
officio).
    Staff Present: Carl Anderson, Counsel, Oversight; Sean 
Bonyun, Communications Director; Matt Bravo, Professional Staff 
Member; Megan Capiak, Staff Assistant; Karen Christian, Chief 
Counsel, Oversight; Patrick Currier, Counsel, Energy & Power; 
Andy Duberstein, Deputy Press Secretary; Brad Grantz, Policy 
Coordinator, O&I; Sydne Harwick, Staff Assistant; Brittany 
Havens, Staff Assistant; Sean Hayes, Counsel, O&I; Andrew 
Powaleny, Deputy Press Secretary; Peter Spencer, Professional 
Staff Member, Oversight; Brian Cohen, Minority Staff Director, 
Oversight & Investigations, Senior Policy Advisor; Kiren Gopal, 
Minority Counsel; and Hannah Green, Minority Staff Assistant.

   OPENING STATEMENT OF HON. TIM MURPHY, A REPRESENTATIVE IN 
         CONGRESS FROM THE COMMONWEALTH OF PENNSYLVANIA

    Mr. Murphy. Good morning. I convene this hearing of the 
Subcommittee on Oversight and Investigations entitled ``Cyber 
Espionage and the Theft of U.S. Intellectual Property and 
Technology. In the last several months, there have been 
increasing reports of cyber espionage and its toll on U.S. 
businesses and the economy. In March, Thomas Donilon, the 
National Security Advisor to the President, addressed the issue 
of cyber espionage and the theft of U.S. Intellectual property, 
or IP, and technology, particularly in China. Mr. Donilon 
stated that IP and trade secrets ``have moved to the forefront 
of our agenda. Targeted theft of confidential business 
information and proprietary technologies through cyber 
intrusions emanating from China occurs on an unprecedented 
scale. The international community cannot afford to tolerate 
such activity from any country.''
    In June, President Obama raised this issue with the Chinese 
president during a summit in California, and I thank him for 
pushing this issue so critically important to U.S. jobs. Just 2 
weeks ago, the Council on Foreign Relations released a report 
finding that U.S. oil and natural gas operations are 
increasingly vulnerable to cyber attacks and that these attacks 
damage the competitiveness of these companies. The victims go 
beyond the energy industry, though. A recent report by a cyber 
security consulting firm documented the Chinese People 
Liberation Army's direct involvement with cyber attacks and 
espionage into 141 companies, including 115 in the U.S. across 
20 industries.
    Three years ago, Chinese military hackers infiltrated the 
Pittsburgh location of QinetiQ, a manufacturer of high tech 
robotic systems, like the remotely-controlled devices used to 
diffuse IEDs. Experts believe the Chinese hackers may have 
stolen from QinetiQ's proprietary chip architecture, allowing 
the PLA to take over or defeat U.S. military robots and aerial 
drones. From defense contractors to manufacturers, no American 
company has been immune from the scourge of Chinese 
intellectual property theft.
    In January, two Chinese citizens were convicted for 
attempting to steal trade secrets from a Pittsburgh Corning 
plant in order to build a rival factory in China. Cyber 
espionage has obvious implications for national security, 
foreign relations, and the American economy.
    The IP Commission, which Senator Slade Gorton represents 
today, recently published a report on the theft of intellectual 
property and estimated that it costs the U.S. economy over $300 
billion a year, which translates roughly to 2.1 million lost 
jobs. To put this in perspective, the IP Commission found that 
the total cost of cyber theft was comparable to the amount of 
U.S. exports to Asia. General Keith Alexander, the director of 
the National Security Agency called cyber crime and the 
resulting loss of our intellectual property and technology to 
our competitors ``the greatest transfer of wealth in U.S. 
history.''
    The purpose of this hearing is to understand how this loss 
is happening, the cost to our country, and how companies and 
the U.S. government are responding to this threat. The 
testimony of the IP Commission and the U.S.-China Commission 
make clear that the People's Republic of China is the most 
predominant and active source of cyber espionage and attacks. 
China, while the main source, is not the only one. The Office 
of the National Counter Intelligence Executive states Russia, 
too, is aggressively pursuing U.S. IP and technology.
    The witnesses today will explain the methods and tactics 
used to penetrate U.S. cyber systems and what China and other 
perpetrators do with the information they obtain through these 
attacks. Counterfeiting of U.S. products and technologies is 
often an unfortunate result of cyber espionage attacks. In an 
op-ed submitted to the Washington Post, Admiral Dennis Blair, 
former Director of National Intelligence, and Jon Huntsman, 
Jr., the former Ambassador to China, explain how the 
counterfeiting of a U.S. product by a foreign company resulted 
in the foreign company's becoming the largest competitor to 
that U.S. company.
    Ultimately, the U.S. company's share price fell 90 percent 
in just 6 months. Just last month, Federal prosecutors secured 
an indictment against Sinovel, a Chinese wind turbine company, 
for stealing source code for small industrial computers used in 
wind turbines for a U.S. business, American Semiconductor 
Company. The CEO of American Semiconductor remarked on the 
reported $1 billion loss in market value his company suffered 
as a result of this theft, stating ``If your ideas can be 
stolen without recourse, there is no reason to invest in 
innovation. There is no purpose to the American economy.''
    So I'd like to thank the witnesses today. First, we have 
the Honorable Slade Gorton, the former Senator from the State 
of Washington, and currently a Commission member of the 
Commission on the Theft of American Intelligence Property. 
Joining him is an expert on cyber security and Chinese foreign 
policy, the Honorable Larry Wortzel, Ph.D., who is a 
Commissioner on the U.S.-China Economic and Security Review 
Commission; Dr. James Lewis, Ph.D., a Senior Fellow and 
Director of the Technology and Public Policy Program at the 
Center for Strategic International Studies; and Susan Offutt, 
Chief Economist for the Applied Research and Methods with the 
General Accountability Office.
    We invited a spokesman from the White House and the 
administration to join us today, but they informed the 
committee that they would respectfully decline its invitation. 
It is unfortunate that the administration wasn't able to take 
this opportunity to join us and testify, given the importance 
of this issue and the priority the administration has given it 
during recent talks with the Chinese president. That invitation 
remains open for them to meet with us.
    So with that, I recognize the ranking member, Ms. 
Schakowsky, who is now sitting in for--by designation for Ms. 
DeGette. You are recognized for 5 minutes.
    [The prepared statement of Mr. Murphy follows:]

                 Prepared statement of Hon. Tim Murphy

    In the last several months, there have been increasing 
reports of cyber espionage and its toll on U.S. businesses and 
the economy. In March, Thomas Donilon, the National Security 
Advisor to the President, addressed the issue of cyber 
espionage and the theft of U.S. intellectual property, or 
``IP,'' and technology, particularly by China. Mr. Donilon 
stated that IP and trade secrets ``have moved to the forefront 
of our agenda...targeted theft of confidential business 
information and proprietary technologies through cyber 
intrusions emanating from China [occurs] on an unprecedented 
scale. The international community cannot afford to tolerate 
such activity from any country.'' In June, President Obama 
raised this issue with the Chinese President during a summit in 
California.
    Just 2 weeks ago, the Council on Foreign Relations released 
a report finding that U.S. oil and natural gas operations are 
increasingly vulnerable to cyber attacks, and that these 
attacks damage the competitiveness of these companies. The 
victims go beyond the energy industry, though. A recent report 
by a cybersecurity consulting firm documented the Chinese 
People Liberation Army's direct involvement through cyber 
attacks and espionage into 141 companies, including 115 in the 
U.S., across 20 industries.
    Three years ago, Chinese military hackers infiltrated the 
Pittsburgh location of QinetiQ, a manufacturer of high-tech 
robotic systems like the remotely-controlled devices used to 
diffuse IEDs. Experts believe the Chinese hackers may have 
stolen from QinetiQ's proprietary chip architecture, allowing 
the PLA to take over or defeat U.S. military robots and aerial 
drones.
    From defense contractors to manufacturers, no American 
company has been immune from the scourge of Chinese 
intellectual property theft. In January, two Chinese citizens 
were convicted for attempting to steal trade secrets from a 
Pittsburgh Corning plant in order to build a rival factory in 
China.
    Cyber espionage has obvious implications for national 
security, foreign relations, and the American economy. The 
Commission, which Senator Slade Gorton represents today, 
recently published a report on the theft of intellectual 
property and estimated that it costs the U.S. economy over $300 
billion a year, which translates into roughly 2.1 million lost 
jobs. To put this in perspective, the IP Commission found that 
the total cost of cyber theft was comparable to the amount of 
U.S. exports to Asia. General Keith Alexander, the director of 
the National Security Agency, called cyber crime, and the 
resulting loss of our intellectual property and technology to 
our competitors, ``the greatest transfer of wealth in 
history.''
    The purpose of this hearing is to understand how this loss 
is happening, the cost to our country, and how companies and 
the U.S. government are responding to this threat. The 
testimony of the IP Commission and the U.S.-China Commission 
make clear that the People's Republic of China is the most 
predominant and active source of cyber espionage and attacks. 
China, while the main source, is not the only one. The Office 
of the National Counterintelligence Executive (ONCIX) states 
Russia, too, is aggressively pursuing U.S. IP and technology.
    The witnesses today will explain the methods and tactics 
used to penetrate U.S. cyber systems, and what China and other 
perpetrators do with the information they obtain through these 
attacks. Counterfeiting of U.S. products and technologies is 
often an unfortunate result of cyber espionage attacks. In an 
op-ed submitted to the Washington Post, Admiral Dennis Blair, 
former director of national intelligence, and Jon Huntsman, 
Jr., the former ambassador to China, explained how the 
counterfeiting of a U.S. product by a foreign company resulted 
in the foreign company becoming the largest competitor to that 
U.S. company. Ultimately, the U.S. company's share price fell 
90 percent in just 6 months.
    Just last month, federal prosecutors secured an indictment 
against Sinovel, a Chinese windturbine company, for stealing 
source code for small industrial computers used in wind-
turbines for a U.S. business, American Semiconductor Company. 
The CEO of American Semiconductor remarked on the reported $1 
billion loss in market value his company suffered as a result 
of this theft, stating, ``...If your ideas can be stolen 
without recourse, there is no reason to invest in innovation, 
there is no purpose to the American economy.''
    I would like to thank the witnesses. First, we have the 
Honorable Slade Gorton the former Senator from the State of 
Washington and currently a Commission Member on the Commission 
on the Theft of American Intellectual Property. Joining him is 
an expert on cyber security and Chinese foreign policy, the 
Honorable Larry M. Wortzel, Ph.D., who is a Commissioner on the 
U.S.-China Economic and Security Review Commission; Dr. James 
Lewis, Ph.D. a senior fellow and director of the Technology and 
Public Policy Program at the Center for Strategic and 
International Studies (CSIS); and Susan Offutt, Chief Economist 
for Applied Research and Methods with the General 
Accountability Office.
    We invited a spokesperson from the White House and the 
administration to join us today, but they informed the 
committee that they would respectfully decline its invitation. 
It is unfortunate that the administration did not take this 
opportunity to join us and testify given the importance of this 
issue and the priority the administration has given it during 
its recent talks with the Chinese President.

                                #  #  #

       OPENING STATEMENT OF HON. JANICE D. SCHAKOWSKY, A 
     REPRESENTATIVE IN CONGRESS FROM THE STATE OF ILLINOIS

    Ms. Schakowsky. Thank you, Mr. Chairman. Before I begin, 
let me give a special welcome to Senator Gorton, who I 
understand grew up in my hometown of Evanston, Illinois, which 
I now have the pleasure of representing, and to welcome you and 
all the other witnesses here today.
    The President, in his State of the Union address this year, 
said ``Our enemies are seeking the ability to sabotage our 
power grid, our financial institutions, and our air traffic 
control systems.'' And the President's right. And that is why I 
am so glad that we're having today's hearing to learn about the 
impact of cyber espionage, the theft of intellectual property, 
and the threat that they pose to our economy and national 
security.
    The GAO has indicated that ``The theft of U.S. intellectual 
property is growing and is heightened by the rise of digital 
technologies.'' The Obama Administration has taken a leading 
role in the effort to root out cyber threats. The President's 
cyberspace policy review identified and completed 10 near-term 
actions supporting our Nation's cyber security strategy. The 
Department of Homeland Security has created a cyber security 
incident response plan; the National Institute of Standards and 
Technology in 7 months is expected to publish voluntary 
standards for operators of our Nation's critical infrastructure 
that will help mitigate the risks of cyber attacks.
    The private sector has also taken steps independently to 
root out cyber threats and increased communication about best 
practices for combating malicious attacks. Those public and 
private sector efforts have strengthened Americans' defenses 
and protected our critical infrastructure and intellectual 
property. We know that foreign actors are seeking access to 
American military intelligence and corporate trade secrets. 
China, Russia, and other countries continue to deploy 
significant resources to gain sensitive proprietary information 
via cyber attacks.
    While I strongly believe we need to address cyber security 
concerns, I did vote against the Cyber Intelligence Sharing and 
Protection Act. I believe the bill, though improved from the 
last Congress, does an inadequate job of defending the privacy 
rights of ordinary Americans. We can't compromise our civil 
liberties in exchange for a strong defense against cyber 
attacks. We need a better balance, and I'm committed to working 
toward that end. We will hear today from Larry Wortzel----
    Am I saying that right?
    Mr. Wortzel. Yes.
    Ms. Schakowsky. A member of the U.S.-China Economic and 
Security Review Commission, that China is. And I quote, ``Using 
its advanced cyber capabilities to conduct large-scale cyber 
espionage, and China has compromised a range of U.S. networks, 
including those at the Department of Defense, defense 
contractors, and private enterprises.''
    Mr. Wortzel's testimony provides examples of those 
intrusions, thousands of targeted attacks on DOD network, a 
case where hackers gained full functional control--that's a 
quote--over the NASA Jet Propulsion Lab network, and Chinese 
cyber attacks on the major contractors for the F-35 joint 
strike fighters. It describes a U.S. super computer company 
that was devastated when its high-tech secrets were stolen by a 
Chinese--a Chinese company, and it highlights the Night Dragon 
operation, where multiple oil, energy, and petrochemical 
companies were targeted for cyber attacks, that gave outside 
hackers access to executive accounts and highly sensitive 
documents for several years.
    Mr. Chairman, we cannot take these problems lightly. I know 
you don't. They cost our economy billions of dollars and places 
our national security at risk. And as the number of Internet-
connected devices and the use of cloud computing increases, the 
number of entry points for malicious actors to exploit will 
also rise. With more information and more sensitive information 
now stored on the Web, we must sharpen our focus on cyber 
security. I hope to hear more from our witnesses today about 
this immense challenge and how the private sector and 
government entities can become more cyber resilient. And with 
that, I yield back, Mr. Chairman.
    Mr. Murphy. Gentlelady yields back. Now to the chairman of 
the full committee, Mr. Upton, for 5 minutes.

   OPENING STATEMENT OF HON. FRED UPTON, A REPRESENTATIVE IN 
              CONGRESS FROM THE STATE OF MICHIGAN

    Mr. Upton. Well, thank you, Mr. Chairman. Today's hearing 
continues the Energy and Commerce Committee's oversight of 
cyber threats and cybersecurity. This committee has 
jurisdiction over a number of industries and sectors that have 
long been the target of cyber attacks and espionage, including 
the oil and gas industry, the electric utility industries, the 
food services and pharmaceuticals industries, information 
technology, telecommunications, and high-tech manufacturing. 
Just last May, Vice Chair Blackburn convened a full committee 
hearing to examine the mounting cyber threats to critical 
infrastructure and efforts to protect against them.
    Today we're going to focus on the damaging cost to U.S. 
industry when the efforts of foreign nations and hackers to 
steal U.S. technology and intellectual property are successful. 
American innovation and intellectual property are the 
foundations of our economy. Based on government estimates from 
2010, intellectual property accounted for $5 trillion in value, 
added to the U.S. economy are 34 percent of U.S. GDP. When 
foreign nations are able to infiltrate networks and take our 
technology and proprietary business information to benefit 
their own companies, U.S. firms certainly lose their 
competitive advantage. The IP Commission, on whose behalf we 
welcome former Senator Slade Gorton's testimony this morning, 
has translated the cost of these attacks into hard numbers.
    As Chairman Murphy mentioned, this theft costs the U.S. 
over 300 billion a year, over 2 million jobs that are lost. And 
if our IP is being targeted, U.S. Jobs are being targeted, and 
this has got to stop. I'm especially interested in learning 
more from today's witnesses about the growing threat, how the 
U.S. Government is combating it, and what American job creators 
themselves can do to protect against the theft of their 
intellectual property. We're going to continue our efforts to 
protect our nation from the ever-growing cyber threat. It is an 
issue that commands and demands our immediate attention. And I 
yield the balance of my time to Ms. Blackburn.
    [The prepared statement of Mr. Upton follows:]

                 Prepared statement of Hon. Fred Upton

    Today's hearing continues the Energy & Commerce Committee's 
oversight of cyber threats and cyber security. This committee 
has jurisdiction over a number of industries and sectors that 
have long been the target of cyber attacks and espionage, 
including the oil and gas industry, the electric utility 
industries, the food services and pharmaceuticals industries, 
information technology and telecommunications, and hightech 
manufacturing. Just last May, Vice Chairman Blackburn convened 
a full committee hearing to examine the mounting cyber threats 
to critical infrastructure and efforts to protect against them.
    Today, we focus on the damage and costs to U.S. industry 
when the efforts of foreign nations and hackers to steal U.S. 
technology and intellectual property are successful. American 
innovation and intellectual property are the foundations of our 
economy. Based on government estimates from 2010, intellectual 
property accounted for $5.06 trillion in value added to the 
U.S. economy or 34.8 percent of U.S. GDP. When foreign nations 
are able to infiltrate networks and take our technology and 
proprietary business information to benefit their own 
companies, U.S. firms lose their competitive advantage. The IP 
Commission, on whose behalf we welcome former Senator Slade 
Gorton's testimony this morning, has translated the costs of 
these attacks into hard numbers: as Chairman Murphy mentioned, 
this theft costs the United States over $300 billion a year, 
and 2.1 million lost jobs. If our IP is being targeted, U.S. 
jobs are being targeted, and this must stop.
    I am especially interested in learning more from today's 
witnesses about this growing threat; how the U.S. government is 
combatting it; and what American job creators themselves can do 
to protect against the theft of their intellectual property.
    We will continue our efforts to protect our nation from the 
ever-growing cyber threat. It is an issue that commands and 
demands our immediate attention.

                                #  #  #

    Mrs. Blackburn. I thank the chairman. I welcome each of 
you. And as you can hear from the opening statements, we all 
agree that every single employer in this country has the 
potential of being harmed by cyber attacks. We realize that and 
we know it is a problem that has to be addressed. And I thank 
Chairman Murphy for calling the hearing today. Cyber espionage, 
hacking, stealing trade secrets is an escalating activity, and 
we need to put an end to this. I also believe that in 
addressing our cyber security challenges, we need to expand the 
scope of our efforts to address the related issue of IP theft. 
As both Chairman Murphy and Upton have said, it is over $300 
billion a year in what it costs our economy. And this is a cost 
that becomes more expensive for us every year as the problem 
grows.
    Countries like China and Russia are engaging in wholesale 
commercial espionage. They are intentionally taking advantage 
of U.S. technology and creativity for their own competitive 
advantages. It is an economic growth strategy for them, but 
it's a jobs killer, a national security threat, and a privacy 
nightmare for Americans. I've offered a discussion framework, 
the Secure IT Act, that provides our Government, business 
community, and citizens with the tools and resources needed to 
protect us from those who wish us harm. It would help us 
respond to those who want to steal our private information, it 
better protects us from threats to both our Government systems 
and to the private sector without imposing heavy-handed 
regulations that would fail to solve these persistent, dynamic, 
and constantly evolving changes that we are facing. With that, 
I yield the balance of my time to Dr. Burgess.
    Mr. Burgess. I thank the gentlewoman for yielding. I'll 
submit my full statement to the record. I do want to address an 
issue that may be a little bit outside the purview of the 
panelists today. But, Mr. Chairman, I do hope we'll devote some 
time to this at some point. Individuals, of course, have 
limited liability; if our credit card numbers are stolen by a 
bad actor or a criminal, there is a limit to the amount that 
that fraudulent transfer can be. But that's not true for our 
small businesses in this country. And I'm thinking particularly 
of the doctor's office, the dentist's office, the CPA, the 
small law firm who may have their--in fact, in health care, 
we're required now to do electronic transfers for Medicare and 
for other activities. There is no limit of liability to those 
small practices. If their information is hacked and stolen, no, 
it's not going to be by on sovereign nation, it's going to be 
by a criminal. But, nevertheless, they are hacked and the 
information is stolen. Sensitive patient data or customer data 
then is retrieved by the bad actor.
    I hope we will address at some point the ability to limit 
the liability of those small practices when, in fact, they are 
only doing what they have been required to do by the Federal 
Government and the Medicare system.
    Thank you, Mr. Chairman. I'll yield back the balance of the 
time.
    [The prepared statement of Mr. Burgess follows:]

             Prepared statement of Hon. Michael C. Burgess

    Thank you, Mr. Chairman.
    One of the largest threats facing our nation today is that 
of cyber-security and espionage from a variety of sources. 
Indeed, top national security advisors have recently stated 
that cyber-security was the number one danger to the United 
States - even going so far as to supplant terrorism as a 
greater threat.
    The constant threat of cyber-security and espionage target 
not just our nation's defenses, but also sensitive personal and 
proprietary information. All kinds of American businesses are 
targeted for their trade secrets, business plans and sensitive 
data. And, unfortunately, many times, the bad actors are 
successful.
    This is a stark contrast from before where our state 
secrets were only being targeted. Experts' estimate that the 
annual private sector loss from cyber-attacks to be in the tens 
of billions of dollars. In fact, NSA Director Gen. Keith 
Alexander has stated that the stealing of U.S. private company 
information and technology has resulted in the "greatest 
transfer of wealth in history." To make matters worse, these 
cyber-attacks seem to be only growing in number and many 
predict that the intensity and number of attacks will increase 
significantly throughout the coming years.
    The importance of intellectual property in the U.S. economy 
cannot be overstated. In 2010, IP accounted for $5 trillion in 
value or 34% of U.S. GDP. IP also has accounted for over 60% of 
all US exports and independently created tens of millions of 
jobs. Needless to say, the interconnectivity between IP 
protection and workforce security is paramount.
    This hearing could not come at a more appropriate time. 
Yesterday marked the first meeting of a U.S.-China cyber-
security working group. This is an important first step to 
enable each side to share perspectives on pertinent laws and 
norms in cyberspace. I hope that the outcome of this hearing, 
as well as those discussions, will be to shed light on a 
growing threat because the unwarranted and unprovoked theft of 
U.S. private and public intellectual property has to stop.
    Thank you, Mr. Chairman and I yield back.

    Mr. Murphy. Gentleman yields back. Mr. Waxman recognized 
for 5 minutes.

OPENING STATEMENT OF HON. HENRY A. WAXMAN, A REPRESENTATIVE IN 
             CONGRESS FROM THE STATE OF CALIFORNIA

    Mr. Waxman. Thank you very much, Mr. Chairman. I am pleased 
that we're here today to discuss the problem of cyber espionage 
and theft of U.S. intellectual property. Cyber espionage 
damages our economy and places national security at risk. The 
threats posed by cyber espionage are growing, particularly from 
foreign actors. Numerous reports have noted that the Chinese 
government is the chief sponsor of hacking activity directed at 
sensitive military information and lucrative corporate trade 
secrets. The Department of Defense reported that in 2012, 
computer systems including those owned by the U.S. Government 
were targeted directly thousands of times by the Chinese 
government and military. The New York Times reported that more 
than 50 sensitive U.S. technologies and advanced weapons 
systems, including the Patriot Missile System, had been 
compromised by Chinese hackers.
    The computer security consultant Mandiant reported over a 
hundred instances of network intrusions affecting key 
industries and industry leaders located in the United States 
originating from one building in Shanghai. Even an iconic 
American company, Coca-Cola, had key corporate documents 
exposed by Chinese hackers, compromising a multi-billion dollar 
acquisition. Thankfully, they did not get the formula. My ad 
lib.
    The White House recognizes the seriousness of the threat 
and has been leading the response. Over the past 3 years, law 
enforcement has significantly increased against infringement 
that threatens our economy. Trade secret cases are up, DHS 
seizures of infringing imports have increased, and FBI health-
and-safety-focused investigations are up over 300 percent. And 
in February, President Obama signed an executive order to 
strengthen the cyber security of our critical infrastructure 
and direct DHS to share threat information with U.S. 
businesses. And just last month, the administration released a 
new strategic plan for intellectual property enforcement. But 
the administration needs Congress's help, and we are not 
delivering. Earlier this year, the House passed a Cyber 
Intelligence and Sharing Protection Act. This is a flawed bill 
that relies on a purely voluntary approach. It sets no 
mandatory standards for industry, yet it would give companies 
that share information with the government sweeping liability 
protection. The legislation also fails to safeguard the 
personal information of Internet users.
    The bill is now pending in the Senate. I hope the Senate 
comes up with an acceptable compromise. I want to pass a law 
that improves our ability to prevent cyber attacks while 
adequately protecting the privacy of individuals' data. Cyber 
attacks jeopardize our economic and national security, they 
threaten key defense technologies, they can impact basic 
infrastructure like our power grid and traffic control systems, 
and they can endanger innovation by America's leading 
corporations. That's why we must have a comprehensive and 
nimble strategy to mitigate against risks of cyber attacks. The 
White House, the private sector, and Congress must each do its 
part.
    I look forward to hearing from our witnesses today about 
what more we can do to address the serious threats posed by 
cyber espionage. Thank you, Mr. Chairman. Yield back the 
balance of my time.
    Mr. Murphy. Gentleman yields back. Thank you.
    And I already introduced the witnesses, so I don't need to 
go through those again, but we thank them all for being here. 
To the witnesses, you are aware that the committee is holding 
an investigative hearing. When doing so, has a practice of 
taking testimony under oath. Do you--any of you have any 
concerns or objections to testifying under oath?
    No. None, OK. Thank you.
    The chair, then, advises you that under the rules of House 
and the rules of committee, you are entitled to be advised by 
counsel. Do any of you desire to be advised by counsel during 
the testimony today?
    All the witnesses indicate no.
    In that case, if you'd all please rise, raise your right 
hand, I'll swear you in.
    [Witnesses sworn.]
    Mr. Murphy. Thank you. All the witnesses indicated that 
they do.
    So you are now under oath and subject to the penalties set 
forth in Title 18, Section 1001 of the United States Code.
    You may now each give a 5-minute summary of your written 
statement. We'll start with you, Senator Gorton. Welcome here. 
You are recognized for 5 minutes.

   STATEMENTS OF HON. SLADE GORTON, FORMER U.S. SENATOR FROM 
WASHINGTON STATE, COMMISSION MEMBER, COMMISSION ON THE THEFT OF 
   AMERICAN INTELLECTUAL PROPERTY; LARRY M. WORTZEL, PH.D., 
    COMMISSIONER, U.S.- CHINA ECONOMIC AND SECURITY REVIEW 
    COMMISSION; JAMES A. LEWIS, DIRECTOR AND SENIOR FELLOW, 
TECHNOLOGY AND PUBLIC POLICY PROGRAM, CENTER FOR STRATEGIC AND 
   INTERNATIONAL STUDIES; AND SUSAN OFFUTT, CHIEF ECONOMIST, 
 APPLIED RESEARCH AND METHODS, GOVERNMENT ACCOUNTABILITY OFFICE

                 STATEMENT OF HON. SLADE GORTON

    Mr. Gorton. Mr. Chairman, Madam----
    Mr. Murphy. Pull it close to you. These microphones in the 
House are not as good as Senate ones.
    Mr. Gorton [continuing]. Representative of the city in 
which I grew up, I thank you for your greetings. I was a member 
of the Intellectual Property Theft Commission, headed by former 
Governor Jon Huntsman and former Admiral Dennis--Dennis Blair, 
President Obama's first Director of National Intelligence. It 
had three goals. The first was to chart the dimensions of the 
intellectual property theft and their impact on the United 
States.
    Second, to separate the rather large part of that that 
comes from the People's Republic of China. And, third, to make 
recommendations to the administration and to the Congress about 
what--what to do about it. Two of you have already pointed out 
that we found a minimum of $300 million a year of losses to the 
American economy through intellectual property theft, 
representing a couple of million jobs. Just imagine what that 
would do for us all by itself, without any of the debates which 
have rocked--rocked this Congress.
    I would say at the beginning that it isn't just cyber 
enterprise, cyber theft. Cyber theft is a major part of 
stealing trade secrets, but there's also a violation of 
copyright and trademark protections and patent infringement. 
For example, one software developer in the United States 
reported to us that a few years ago, it sold one software 
program in China for approximately $100. A year later, when 
there was an automatic update available, it had 30 million 
calls from China. 30 million to 1. That wasn't cyber 
enterprise, that was just reverse engineering a piece of 
software.
    Now, China accounts for 50 to 80 percent of this 
intellectual property loss. Much of which, maybe even most of 
which is from private sector Chinese firms. But they are able 
to do that because the sanctions in China for violations, even 
when they are caught, are extremely small and rarely enforced.
    Now, what that leads me to say is that while we--that every 
one of the recommendations that we have made in this commission 
report will help, they are primarily defensive in nature. And 
it is clear that we need better defensive measures to deal with 
cyber theft and other forms of intellectual property theft. But 
I am convinced that that will never solve the problem on its 
own. What we need to do is to come up with policy responses 
that create interest groups in China and in the other violators 
that value intellectual property protection. When there is a 
major interest group in China that says this is hurting us 
rather than helping us, we will have begun to solve the 
problem. That's a very difficult challenge. A few of the 
recommendations we make would make steps, appropriate steps in 
that direction and we recommend them to you. But think from the 
very beginning, how do we create an interest group that is on 
our side in the countries that are engaged in this kind of 
theft.
    Our recommendations, including targeting for financial 
factions, quick response measures for seizing intellectual 
property-infringing goods at the border when they arrive, and 
increasing support for the FBI, among others. Finally,I would 
say that at the very end, in the last 2 pages of our report, we 
list three other methods of dealing with this matter that 
aren't our formal recommendations. They are all relatively 
nuclear in nature. But we commend them to your very, very 
careful study, each--because each of those carries with it the 
ability to create that internal group in China itself that will 
be on--will be on our side.
    And with that, I'm at your disposal. The National Bureau of 
Asian Research, which conducted this, is at your disposal. We 
want to help you as much as we possibly can. We are convinced 
that this is not a partisan issue by any stretch of the 
imagination. And that this committee should be able to come up 
with unanimous responses that will be of real impact.
    Mr. Murphy. Thank you, Senator.
    [The prepared statement of Mr. Gorton follows:]


    [GRAPHIC] [TIFF OMITTED] 86391.001
    
    [GRAPHIC] [TIFF OMITTED] 86391.002
    
    [GRAPHIC] [TIFF OMITTED] 86391.003
    
    Mr. Murphy. Dr. Wortzel, you are recognized for 5 minutes. 
Please bring the microphone real close to your mouth so we can 
hear. Thank you.


                 STATEMENT OF LARRY M. WORTZEL

    Mr. Wortzel. Chairman Murphy, Ranking Member Schakowsky, 
members of the subcommittee. I'll discuss the role of China's 
government, its military and intelligence services, and its 
industries and cyber espionage and the theft of U.S. 
intellectual property. My testimony presents some of the U.S.-
China Economic and Security Review Commission's findings on 
China's cyber espionage efforts, but the views I present today 
are my own. In 2005, Time Magazine documented the penetration 
of Department of Energy facilities by China in the Titan Rain 
intrusion set. So this cyber espionage has been going on for 
quite some time. China's using its advanced cyber capabilities 
to conduct large-scale cyber espionage, and has, to date, 
compromised a range of U.S. networks, including those of the 
Department of Defense--Departments of Defense, State, Commerce, 
and Energy, defense contractors, and private enterprises.
    China's cyber espionage against the U.S. Government and our 
defense industrial base poses a major threat to U.S. military 
operations, the security of U.S. military personnel, our 
critical infrastructure, and U.S. industries. China uses these 
intrusions to fill gaps in its own research programs, to map 
future targets, to gather intelligence on U.S. Strategies and 
plans, to enable future military operations, to shorten 
research and development timelines for new technologies, and to 
identify vulnerabilities in U.S. systems.
    In my view, it's helpful when government and industry 
expose the intrusions and make the public aware of them. 
Businesses unfortunately are reluctant to do so. China's cyber 
espionage against U.S. commercial firms poses a significant 
threat to U.S. business interests and competitiveness.
    General Keith Alexander, Director of the National Security 
Agency, assessed that the value of these losses is about $338 
billion a year, although not all the losses are from China. 
That's the equivalent of the cost of 27 Gerald R. Ford class 
aircraft carriers. The Chinese government, military, and 
intelligence agencies support these activities by providing 
state-owned enterprises information extracted through cyber 
espionage to improve their competitiveness, cut R&D timetables, 
and reduces costs. The strong correlation between compromised 
U.S. companies and those industries designated by Beijing as 
strategic further indicate state sponsorship, direction, and 
execution of China's cyber espionage.
    Such governmental support for Chinese companies enables 
them to out-compete U.S. companies, which do not have the 
advantage of levering government intelligence data for 
commercial gain. It also undermines confidence in the 
reliability of U.S. brands. There's an urgent need for 
Washington to compel Beijing to change its approach to 
cyberspace and deter future Chinese cyber theft. My personal 
view is that the President already has an effective tool in the 
International Emergency Economic Power Enhancement Act. He 
could declare that this massive cyber theft of intellectual 
property represents an extraordinary threat to the national 
security, foreign policy, and economy of the United States.
    Under that declaration, the President, in consultation with 
Congress, may investigate, regulate, and freeze transactions 
and access as well as block imports and exports in order to 
address the threat of cyber theft and espionage. The authority 
has traditionally been used to combat terrorist organizations 
and weapons proliferation, but there's no statutory prohibition 
or limitation that prevents the President from applying it to 
cyber espionage issues. If some version of Senate Bill 884 
becomes law, it should be expanded to direct the State 
Department to work with and encourage allied countries to 
develop similar laws. I want to thank you for the opportunity 
to appear today, and I'm happy to respond to any questions you 
may have.
    Mr. Murphy. Thank the gentleman.
    [The prepared statement of Mr. Wortzel follows:]
    [GRAPHIC] [TIFF OMITTED] 86391.004
    
    [GRAPHIC] [TIFF OMITTED] 86391.005
    
    [GRAPHIC] [TIFF OMITTED] 86391.006
    
    [GRAPHIC] [TIFF OMITTED] 86391.007
    
    [GRAPHIC] [TIFF OMITTED] 86391.008
    
    [GRAPHIC] [TIFF OMITTED] 86391.009
    
    [GRAPHIC] [TIFF OMITTED] 86391.010
    
    [GRAPHIC] [TIFF OMITTED] 86391.011
    
    [GRAPHIC] [TIFF OMITTED] 86391.012
    
    [GRAPHIC] [TIFF OMITTED] 86391.013
    
    [GRAPHIC] [TIFF OMITTED] 86391.014
    
    [GRAPHIC] [TIFF OMITTED] 86391.015
    
    [GRAPHIC] [TIFF OMITTED] 86391.016
    
    [GRAPHIC] [TIFF OMITTED] 86391.017
    
    [GRAPHIC] [TIFF OMITTED] 86391.018
    
    [GRAPHIC] [TIFF OMITTED] 86391.019
    
    Mr. Murphy. Mr. Lewis, you are recognized for 5 minutes.


                  STATEMENT OF JAMES A. LEWIS

    Mr. Lewis. Thank you, chairman. And thank you for the 
committee's opportunity to testify. I feel right at home, since 
I was born in Pittsburgh and lived in Evanston. So it's good to 
be back.
    I should note that one of the things I do is lead track 2 
discussions with government agencies in China. We've had eight 
meetings that have included the PLA, the Ministry of State 
Security, and others. Some of my testimony is based on this 
not-public information. I'm going to discuss three issues: Why 
China steals intellectual property, what the effects of this 
are in the U.S. and China, and steps we can take to remedy the 
problem.
    Cyber espionage is so pervasive that it challenges 
Beijing's ability to control it. Every Fortune 500 company in 
the U.S. has been a target of Chinese hackers, in part because 
American defenses are so feeble. Right? China has four motives 
for cyber espionage: First, they have an overwhelming desire to 
catch up and perhaps surpass the West. Second, they believe 
that rapid economic growth is crucial for the party to maintain 
its control. Third, they have no tradition of protecting 
intellectual property. And, finally, some Chinese leaders fear 
that their society has lost the ability to innovate and the 
only way to compensate is to steal technology. China supports 
its strategic industries and state-owned enterprises through 
cyber espionage. For example, China's economic plans made clean 
energy technology a priority, and the next thing that happened 
was the clean energy companies in the U.S. and Germany became 
targets.
    China's economic espionage activities against the U.S. are 
greater than the economic espionage activities of all other 
countries combined. The effects, however, are not clear-cut 
benefits for China. China often lacks the know-how and 
marketing skills to turn stolen technology into competing 
products. A dollar stolen does not mean a dollar gained for 
China. This is not true for confidential business information, 
which a director of an allied intelligence service once 
described as normal business practice in China. So if you're 
going to negotiate, if you're going for business, they will 
steal your playbook; they will know your bottom line. This is 
immense, immediate advantage. But cyber espionage also hurts 
China. One of their goals is to become an innovative economy. 
And they are unable to do this while they are dependent on 
espionage. They also create immense hostility and suspicion in 
their relations with many countries. The U.S. is not the only 
victim.
    Espionage is a routine practice among great powers. And no 
one can object to espionage for military and political 
purposes. What is unacceptable is espionage for purely 
commercial purposes. Frustration with the lack of progress in 
discussions with China have led to suggestions for sanctions or 
retaliation. These are not in our interest. We don't want to 
start a war with China, nor do we want to crash the Chinese 
economy. Hacking back has little real effect and runs contrary 
to U.S. law and international commitments.
    Instead, we need a strategy with four elements. Sustained 
high-level attention. This is going to take years. This is not 
something we're going to fix in a couple of months. We need to 
create public disincentives for the Chinese hacking, using 
Treasury, visa laws, and perhaps FBI activities, Department of 
Justice activities. We need closer coordination with our 
allies, most of whom are not on the same page as us in this 
matter. And, finally, we need improved cyber defenses to make 
our companies stronger.
    Last month, a U.N. Group that included the U.S. and China 
said that international law and the principles of state 
responsibility apply to cyberspace. This agreement provides a 
foundation for rules on hacking. The best strategy, the one 
that has the best chance of success, is to create with our 
allies global standards for responsible behavior and then press 
China to observe them. To use a favorite Chinese expression, we 
want a win-win outcome rather than a zero-sum gain where only 
one side can win.
    Cyber espionage lies at the heart--the heart of the larger 
issue of China's integration into the international system, and 
at the heart of the efforts of the Chinese to modernize their 
economy. This is a problem that has become one of the leading 
issues in international relations. China's economic growth has 
been of immense benefit to the world. But what was tolerable 
when China was an emerging economy is no longer tolerable when 
it is the world's second largest economy. I think we are on the 
path to resolving this issue, but it is a path that will take 
many years to complete. And I thank the committee for its 
attention to this issue. I look forward to your questions.
    Mr. Murphy. Thank you, Mr. Lewis.
    [The prepared statement of Mr. Lewis follows:]
    [GRAPHIC] [TIFF OMITTED] 86391.020
    
    [GRAPHIC] [TIFF OMITTED] 86391.021
    
    [GRAPHIC] [TIFF OMITTED] 86391.022
    
    [GRAPHIC] [TIFF OMITTED] 86391.023
    
    [GRAPHIC] [TIFF OMITTED] 86391.024
    
    [GRAPHIC] [TIFF OMITTED] 86391.025
    
    [GRAPHIC] [TIFF OMITTED] 86391.026
    
    [GRAPHIC] [TIFF OMITTED] 86391.027
    
    [GRAPHIC] [TIFF OMITTED] 86391.028
    
    Mr. Murphy. And now Ms. Offutt. Am I pronouncing that 
correctly? Thank you. You're recognized for 5 minutes.


                   STATEMENT OF SUSAN OFFUTT

    Ms. Offutt. Thank you. Mr. Chairman, Ranking Member 
Schakowsky, members of the subcommittee, thank you for the 
opportunity to share our observations on the economic effects 
of intellectual property theft and efforts to quantify the 
impact of counterfeiting and piracy on the U.S. economy. 
Intellectual property plays a significant role in the U.S. 
economy, and the U.S. Is an acknowledged leader in its 
creation. Intellectual property is any innovation, commercial 
or artistic, or any unique name, symbol, logo, or design used 
commercially. Cyberspace, where much business activity and the 
development of new activities often take place, amplifies 
potential threats by making it possible for malicious actors to 
quickly steal and transfer massive quantities of data, 
including intellectual property, while remaining anonymous and 
difficult to detect. According to the FBI, intellectual 
property theft is a growing threat, which is heightened by the 
rise of the use of digital technologies. Digital products can 
be reproduced at very low costs, and have the potential for 
immediate delivery through the Internet across virtually 
unlimited geographic markets. Cyber attacks are one way that 
threat actors, whether they are nations, companies, or 
criminals, can target intellectual property and other sensitive 
information of Federal agencies and American businesses. While 
we have not conducted an assessment of the economic impact of 
cyber espionage, our work examining efforts to quantify the 
economic impact of counterfeited and pirated goods on the U.S. 
economy can provide insights on estimating economic losses.
    Specifically, my testimony today addresses two topics: 
First, the economic significance of intellectual property 
protection and theft on the U.S. economy, and insights from 
efforts to quantify the economic impacts of counterfeiting and 
piracy on the U.S. economy. My remarks are based on two 
products that GAO issued over the past 3 years, a 2010 report 
on intellectual property, and 2012 testimony on cyber threats 
and economic espionage.
    As reported in 2010, intellectual property is an important 
component of the U.S. economy. The U.S. economy and 
intellectual-property-related industries contribute a 
significant percentage to U.S. Gross domestic product. IP-
related industries also pay higher wages than other industries 
and contribute to a higher standard of living in the United 
States.
    Ensuring the protection of intellectual property rights 
encourages the introduction of innovative products and creative 
works to the public. According to the experts we interviewed 
and the literature we reviewed, counterfeiting and piracy have 
produced a wide range of effects on consumers, industry, 
government, and the aggregate national economy. For example, 
the U.S. economy may grow more slowly because of reduced 
innovation and loss of trade revenue. To the extent that 
counterfeiting and piracy reduce investments in research and 
development, companies may higher fewer workers and may 
contribute less to U.S. economic growth overall.
    Furthermore, as we reported in 2012, private sector 
organizations have experienced data loss or theft, economic 
loss, computer intrusions, and privacy breaches. For example, 
in 2011, the media reported that computer hackers had broken 
into and stolen proprietary information worth millions of 
dollars from the networks of six U.S. And European energy 
companies.
    Generally, as we reported in 2010, the illicit nature of 
counterfeiting and piracy makes estimating the economic impact 
of intellectual property infringement extremely difficult. 
Nonetheless, research in specific industries suggests the 
problem is sizable, which is a particular concern, as many U.S. 
industries are leaders in the creation of IP. Because of 
difficulty in estimating the economic impacts of these 
infringements, assumptions must be used to offset the lack of 
data. Efforts to estimate losses involve assumptions, such as 
the rate at which consumers would substitute counterfeit for 
legitimate goods, and these assumptions can have enormous 
impacts on the resulting estimates. Because of the significant 
differences in types of counterfeit and pirated goods and 
industries involved, no single method can be used to develop 
estimates. Each method has limitations. And most experts 
observe that it is difficult, if not impossible, to quantify 
the economy-wide impacts. Mr. Chairman, Ranking Member 
Schakowsky, other members of the committee, this is the end of 
my statement. I'd be happy to answer questions.
    Mr. Murphy. Thank you. I appreciate that.
    [The prepared statement of Ms. Offutt follows:]
    [GRAPHIC] [TIFF OMITTED] 86391.029
    
    [GRAPHIC] [TIFF OMITTED] 86391.030
    
    [GRAPHIC] [TIFF OMITTED] 86391.031
    
    [GRAPHIC] [TIFF OMITTED] 86391.032
    
    [GRAPHIC] [TIFF OMITTED] 86391.033
    
    [GRAPHIC] [TIFF OMITTED] 86391.034
    
    [GRAPHIC] [TIFF OMITTED] 86391.035
    
    [GRAPHIC] [TIFF OMITTED] 86391.036
    
    [GRAPHIC] [TIFF OMITTED] 86391.037
    
    [GRAPHIC] [TIFF OMITTED] 86391.038
    
    [GRAPHIC] [TIFF OMITTED] 86391.039
    
    [GRAPHIC] [TIFF OMITTED] 86391.040
    
    [GRAPHIC] [TIFF OMITTED] 86391.041
    
    [GRAPHIC] [TIFF OMITTED] 86391.042
    
    Mr. Murphy. Let me start off by asking Mr. Lewis, if a U.S. 
company were to do these things to another U.S. company, hack 
into their computers, replicate projects, steal blueprints, et 
cetera, and basically make the same product, whatever it is, 
what kind of penalties would that U.S. company incur when they 
were caught, prosecuted?
    Mr. Lewis. There are several sets of penalties. The first 
is, of course, it could be liable to a lawsuit. We see lawsuits 
over IP violations frequently. Right? And if it can be proven 
in court, the damages can be substantial. Second, in some 
cases, the Economic Espionage Act can be applied to any 
company, U.S. or foreign, if they engage in this kind of 
activity. Third, there are computer security laws that if 
hacking occurs the company would be liable for that if it can 
be proven. One of the differences between the U.S. and 
countries like China and Russia is we have laws and we enforce 
them. They either don't have laws and they certainly don't 
enforce them. So in the U.S., you don't see as much of this if 
anything comparable at all.
    Mr. Gorton. In other words, there are both criminal and 
civil penalties available in the United States.
    Mr. Murphy. But not ones that we can impose upon foreign 
nations when they do the same thing.
    Let me follow up. Senator Gorton, and all of you, estimates 
show that the IP assets alone represent 75 to 80 percent of the 
S&P 500 market value, and the U.S. IP worth is at least $5 
trillion, and licensing revenues for IP is estimated as 150 
billion annually. So if cyber espionage is the biggest cyber 
threat America faces today, what really is at stake if we fail 
to act on it?
    Mr. Gorton. I'm sorry. I missed the last part.
    Mr. Murphy. So if cyber espionage is the biggest cyber 
threat America faces today, what really is at stake if we fail 
to act on it?
    Mr. Gorton. What's at stake is, first, others have 
testified to this, when it relates the our national defense, 
our very national security is at stake. When it can be measured 
by dollars, because that deals with civil, it is the $300 
billion-plus losses that we found. And I must say, when we 
began this work, we found ourselves really sailing on uncharted 
seas. We didn't have a whole lot of earlier commissions that 
had worked on this. And our research was, to a certain extent, 
original.
    Some people in the private sector didn't want to cooperate 
with us and were afraid of what would happen to them, sanctions 
that would be taken against them by China and the like. So I 
think that $300 billion-plus is a conservative estimate. The 2 
million job loss comes from other sources. But between those 
two figures, that's what it's costing us.
    Mr. Murphy. And Dr. Wortzel, on that issue, too, and let me 
address this as well. What kind of protections are we missing 
here? And, of course, this also relates to the discussions 
taking place while Chinese delegation is in Washington today. 
But let's say, first of all, what kind of protections should we 
be dealing with in Congress? I know I read some things in your 
report. What would you add to that?
    Mr. Wortzel. China's goal in the dialogues right now is to 
limit all access to the Internet for domestic security. So I 
think we can sort of leave them out of the equation. But I 
think the ability to link attribution and detection to criminal 
penalties, including arrest warrants, including limitations on 
travel, will really affect Chinese companies, Chinese leaders, 
and even individual actors. The Mandiant report identified, I 
think, four people by name showed who they are dating, showed 
what kind of car they drive. If that type of information was 
taken to a FISA court or some other court, an open court, and 
arrest warrants were issued, those people couldn't travel to 
the United States. And that would deter this.
    Mr. Murphy. Ms. Offutt, I have a question for you. So if 
you were advising the President and his staff this week as they 
are talking with the Chinese delegation in town what to push 
for, what would you say?
    Ms. Offutt. The work that GAO has done on intellectual 
property also involves the evaluation of cyber threats and 
measures that can be taken in order to combat them. This is not 
an area as chief economist that I'm competent to talk about at 
length. But we have made recommendations about the adoption of 
measures at the firm level, for example, that involve people, 
processes, and software measures that can be taken to defend 
against any intrusions.
    Mr. Murphy. Thank you. I see my time is up, so I now go Ms. 
Schakowsky for 5 minutes.
    Ms. Schakowsky. Thank you, Mr. Chairman. I just wanted to 
respond to comments that you made that the White House or the 
administration didn't decline--that declined to have any 
witness. Apparently, they suggested other administration 
witnesses than those who were unable because of scheduling 
reasons to come. And I just wanted to make that point.
    Mr. Lewis, you wrote in your written testimony, ``we need 
to recognize that many companies have not paid serious 
attention to securing their networks. There is no obvious 
incentive for them to do so.''
    How could that be?
    Mr. Lewis. There's not a lot of work on this. And what we 
know is probably about 80 to 90 percent of the successful cyber 
attacks against U.S. Companies only involve the most basic 
techniques. I used to look for Chinese super cyber warriors. 
They don't need super cyber warriors, they need a guy in a tee 
shirt who is going to overcome the truly feeble defenses. And 
some of it is companies don't want to spend the money. Some of 
it is----
    Ms. Schakowsky. Aren't all the super cyber warriors just 
wearing tee shirts anyway?
    Mr. Lewis. We have pictures of some of them, which is aid 
in attribution issue. Sometimes companies spend money on the 
wrong stuff. And sometimes they don't want to know; it can 
affect their stock price, it may incur stockholder liability. 
So there's a whole set of incentives. It varies from sector to 
sector.
    The banks do a tremendous job. And it's interesting to note 
that despite the fact that the banks do a tremendous job, they 
were largely overcome by Iranian cyber attacks over the last 6 
months. Power companies, very uneven. There's three power 
companies in the Washington area. One does a great job, one 
does a terrible job. You know, it varies widely. We don't have 
a common standard. And there isn't a business model.
    Now, this is beginning to change as CEOs realize the risk. 
But we are very far behind when it comes to corporate 
protection.
    Ms. Schakowsky. Thank you. Dr. Wortzel, we--our government 
as a whole relies on--heavily on contractors. And that's 
especially true in the national security realm. Large projects 
rely on dozens of private sector contractors, layer upon layer 
of subcontractors, technology supply chains for military 
hardware are enormous. So how do we address the unique cyber 
security risks posed by long contracting and supply chains?
    Mr. Wortzel. Well, I think our supply chain has really big 
vulnerabilities. And the Commission has tried to look into this 
on major systems like the Osprey, the F-22, and a class of 
destroyers. And the Department of Defense could not go beyond 
the second tier in the supply chain. They don't know where this 
stuff is sourced from. So that's a huge problem.
    The companies, in my opinion, that are in the defense 
industrial security program are getting good support from the 
Defense Security Service. They get regular visits. They get 
support from the Defense Security Service and the FBI on their 
cyber protections and their defenses. And it's not a perfect 
program, obviously, or we wouldn't have lost all that F-35 
data. I think it's gotten a lot better. I think the FBI and the 
Department of Defense are--and the National Security Agency are 
doing a better job on intrusion monitoring for clear defense 
contractors.
    Ms. Schakowsky. Let me ask you about the pipeline sector 
which has been considered vulnerable to cyber attacks. And 
anyone can answer that. Dr. Wortzel or Dr. Lewis.
    Mr. Wortzel. Well, our critical infrastructure, pipelines, 
are targeted by the Chinese military in case of a conflict. And 
those are private companies, run by private companies for the 
most part. And there simply is no legislation that would 
require those companies to maintain a set standard of security. 
And I think that's a huge vulnerability that has to be 
addressed.
    Mr. Lewis. You want to think about two sets of actors. The 
Chinese and the Russians have done their recognizance; they 
could launch attacks if we got in a war with them. But they're 
grown-up great powers. They are not going to just start a war 
for fun. On critical infrastructure, the greatest risk comes 
from Iran. Iran has significantly increased its capabilities, 
and they also are doing recognizance and targeting critical 
infrastructure, including pipelines. And so the Iranian 
Revolutionary Guard worries me more in this aspect than the 
PLA.
    Ms. Schakowsky. Thank you. I yield back.
    Mr. Murphy. Thank you. Now recognize the vice chair of the 
full committee, Ms. Blackburn, for 5 minutes.
    Mrs. Blackburn. Thank you all. And your testimony is 
absolutely fascinating. And I appreciate your time being here. 
I've got a couple of questions. Hope I can get through all of 
them.
    Senator Gorton, I want to start with you. I appreciate so 
much what you said about having a major interest group in China 
that wants to join us in these efforts for IP protection and 
fighting the theft. I think that indigenous industry that feels 
as if they are worth being protected would be important. I 
appreciate that you have brought forward some recommendations. 
And I want to know if you think there is anything that ought to 
be the first--the first salvo, if you will. What would be the 
very first step? Because we're in the tank on this. They've got 
a head start. This has become, as I said in my opening remarks, 
their economic development plan to reverse engineer and distill 
this IP theft. And we've got to put a stop to that. So item 
number 1, if you were to prioritize these recommendations, what 
should be first out of the gate for us?
    Mr. Gorton. Thank you very much for that question. I was 
trying figure out how to answer it before you asked it. I think 
from the point of view of this committee, what might be the 
easiest and most appropriate first step would be to put one 
person, one office in charge. Our recommendation is that that 
be the Secretary of Commerce. That everything related to cyber 
security other than defense go through the Secretary of 
Commerce. That's where you'll begin to get control of those 
$300 billion and those 2 million jobs.
    Even the response that you've received here today is there 
are all kinds of people in the administration, who is going to 
come and speak for them? There isn't one focal point. But if 
you make that focal point to the Secretary of Commerce, who 
does respond to you, I think it would be a major step forward.
    Mrs. Blackburn. And I would imagine that you would 
recommend having that one person but with appropriate 
Congressional oversight and appropriate sunsets and all of 
that.
    Mr. Gorton. Absolutely. And you are that oversight.
    Ms. Blackburn. I appreciate that affirmation. So I thank 
you for that.
    Mr. Wortzel, did you see The Washington Post this morning? 
The cover story, ``Regimes Web Tools Made in the USA''?
    Mr. Wortzel. I did not.
    Ms. Blackburn. I would just commend it to each of you to 
review. You're generous to give us your time this morning.
    But let me ask you this, come to you with this question, 
since you're doing so much work in that U.S.-China 
relationship. And the problem there is significant. And we know 
that it bleeds over into Russia and then as you mentioned some 
of the other countries that are even less friendly to us.
    So China has significant restrictions on the Internet and 
on Internet usage by the citizens and the population there. So 
if we were to establish rules of the road, if you will, for how 
we were going to respect the transfer of property, et cetera, 
over the Internet, how are we going to do this so that--with a 
country where our understanding of freedoms and our 
understanding of usage are so inherently and basically 
different.
    Mr. Wortzel. I don't think you can. My experience with 
China is they will steal and reverse engineer anything they can 
get their hands on. And I've been dealing with them full-time 
since about 1970. In the middle of their industries and 
delivering defense products to them. I think you really have to 
understand that the goal, and Jim outlined it nicely, the goal 
of Chinese Communist Party is to grow the economy, stay in 
power, and advance itself technologically. And most of the 
industries are state-owned or municipally-owned and directed by 
the government and aided by the intelligence services.
    Mrs. Blackburn. Mr. Lewis, do you want to add anything to 
that?
    Mr. Lewis. Sure. I'm a little more positive. And I don't 
have Larry's long experience; I've only been negotiating with 
the Chinese since 1992. And we began negotiating with them on 
the issue of proliferation. And the Chinese used to be among 
the major proliferators in the world. And you can put together 
a package of measures that include sanctions, support from 
allies, direct negotiations with them. That can get them to 
change their behavior. So I'm confident that we can, if we keep 
a sustained effort in place, get them to act differently. And 
in part, it's because they know they're caught. They want to be 
a dynamic modern economy. You can't do that when you're 
dependent on stealing technology. They have a big 
contradiction. And we can sort of help them make the right 
decision.
    Mrs. Blackburn. My time has expired. I have other 
questions, but I will submit those for the record.
    Mr. Murphy. I thank the gentlelady. I now recognize Dr. 
Burgess for 5 minutes.
    Mr. Burgess. Thank you, Mr. Chairman. And, yes, it is 
fascinating topic. I do have a number of questions, and I will 
have to submit, obviously, some of those for the record to be 
answered in writing.
    But Dr. Wortzel and Mr. Lewis, when you heard my comments 
at the opening--yes, we're all concerned about sovereign spying 
and cyber security from a sovereign standpoint. Big businesses 
are concerned. Coca-Cola is smart not to put their formula on a 
network; that way, it's not available for theft. But what about 
the legions of small businesses out there? You had heard my 
comments in my opening statement. I'm concerned about the 
protection that they have or that they don't have from a 
liability perspective. So I guess, Mr. Lewis, my first question 
is to you. What--what can the small businesses do to improve 
their ability to prevent, identify, and mitigate the 
consequences of a successful compromise?
    Mr. Lewis. This is a major problem, because the small 
businesses are very often the most creative and the most 
innovative, and so we have to find ways to protect them. 
There's a couple of approaches that might be successful. NIST, 
as I think some of you said, is developing a cybersecurity 
framework. They are not allowed to use the word ``standard,'' 
so they said framework, but if the framework comes out in a 
good place, it will lay out measures that any company can take 
to make their defenses better. We know how to do cybersecurity. 
We just don't have anybody really pushing that measure, and you 
can tell companies what to do. Hopefully NIST will do that.
    The second one, and this relates to something that----
    Mr. Burgess. Let me stop you there and just ask you a 
question. Maybe you can tell companies what to do, so you are 
referring to Congress could legislate or mandate an activity 
that a company would have to do?
    Mr. Lewis. Let me give you an example which is, the people 
who are actually in the lead on this, in part because they 
enjoy so much attention from China, might be the Australians. 
So the Australian Department of Justice Attorney General, came 
up with a set of 35 strategies developed by their signals 
intelligence agency, and said, if you put these strategies in 
place, we will see a significant reduction in successful 
attacks. The Australians told me it was 85 percent reduction, 
and I said I don't believe it. So they let me go and talk to 
some of the ministries that tried it. They told me 85 is wrong; 
it is actually higher. That is now mandatory for government 
agencies in Australia. You can do this if you are a company. It 
is pretty basic stuff.
    Mr. Burgess. Now, are you at liberty to share that 
information with the committee so you could make that----
    Mr. Lewis. Oh, sure. I will definitely pass that along.
    Mr. Burgess. Thank you.
    Mr. Lewis. The second one, and this relates to I think 
something Larry said, is you can make the ISPs do a better job 
of protecting their customers. And they might want to do that 
for business reasons. Some of them already do, like AT&T or 
Verizon. But the ISP will see all of the traffic coming into 
the little company. They can take action before it reaches its 
target. So there's two things you could do that would make the 
world a better place.
    Mr. Burgess. And again, my comments during the opening 
statement, I'm concerned particularly for the small physician's 
office, the dentist's office, where there may be significant 
personal data put on a network as required now for electronic 
billing, and electronic prescribing that is now required of 
those offices. And yet, we provide no liability protection if 
one of those offices is hit with an attack.
    It hasn't been a big story yet, but it is going to happen. 
We all know that it is going to happen. We had a dentist in 
Plano, Texas not too far away from the district that I 
represent, who lost a significant amount of personal data to 
some type of criminal attack in the cyberspace. I think we all 
know not to open the email from the Nigerian king who died and 
left you money in his will. But a lot of these attacks are 
sophisticated. Yes, it is small-potato stuff, but it's a lot of 
our businesses that can be affected.
    Dr. Wortzel, do you have some thoughts about that?
    Mr. Wortzel. Mr. Burgess, I live in the first district of 
Virginia, Williamsburg, Mr. Whitman's district. Today in my 
district, the FBI is running a big seminar for all businesses 
and interested people on exactly this question. So the 
government is doing some things. I have to say that one of the 
positive areas of our dealings with China, is in bilateral 
cooperation on credit card and bank crime. So when it comes to 
the type of theft you are talking about, I think that between 
the Department of Treasury, and the FBI's legal attaches, you 
would see some progress.
    Mr. Burgess. Can I just ask you a question on that? Because 
that----
    Mr. Wortzel. Pardon me?
    Mr. Burgess. Can I ask you a question on that, because that 
does come up with some of our community banks. And they are 
sort of like the end user. They are the target organ, but 
really, it is the larger bank that deals with the offshore 
transaction that likely should have caught that activity, but 
it is always the smaller community bank that is then punished 
for having lost those funds for their--for their customer. So 
is there a way to actually involve the larger offshore banks 
that are doing these offshore transactions?
    Mr. Wortzel. I'm afraid, I do not know the answer to that.
    Mr. Burgess. OK. If you can look into that and get back 
with us with some more information because that comes up all 
the time.
    Mr. Wortzel. I will do that. And I think the final thing I 
would say is, some of the equipment and programs that would 
protect small business are pretty expensive, $50,000 for a 
special monitoring router. But a group of businesses in an area 
could get together, share the cost of something like that, and 
mitigate these concerns.
    Mr. Burgess. Yes, if the Federal Trade Commission will let 
them. Thank you very much, Mr. Chairman.
    Mr. Murphy. The gentleman's time is expired. I now 
recognize the gentleman from Texas, Mr. Green, for 5 minutes.
    Mr. Green. Thank you, Mr. Chairman. China plays a key role 
in cyber attacks against the United States. Of course, we have 
heard it recently because of some of our citizens going to 
China. Credible reports have noted that China has a government-
sponsored strategy to steal American intellectual property in 
order to gain strategic advantage, and that Chinese military 
has been actively trying to steal military technology.
    Dr. Wortzel, can you explain why China is, far and away, 
the number one perpetrator of these attacks and what is the 
history here and how long has this been going on?
    Mr. Wortzel. Well, the first really open documentation of 
it, Mr. Green, was the report, three series of reports by TIME 
Magazine, the Titan Rain penetrations. Now, the poor guy that 
went to the government and said this is going on, and 
pinpointed it to China, got frustrated because there wasn't a 
government response. He leaked it to TIME Magazine, he lost his 
security clearance and his job. So the government has got to 
acknowledge that this is happening.
    Mr. Green. Yes.
    Mr. Wortzel. And it really owes it to the citizens to do 
this. But I think it is important to understand that the third 
department, the signals intelligence department of the People's 
Liberation Army and the fourth department, the electronic 
warfare and electronic countermeasures department work 
together. The third department alone has 12 operational bureaus 
looking at strategic cyber, and signals, three research 
institutes, four operational center, and 16 brigades with 
operational forces. And that about half that number that--are 
the people that do the door kicking and penetrate in the fourth 
department. That leaves out the Ministry of State Security. 
That leaves out 54 state-controlled science and technology 
parks, each of which are given specific strategic goals by the 
Chinese government, and Chinese Communist Party to develop 
different technologies. So we just face a huge threat. And 
that's why I'm a little more pessimistic than Jim in solving 
it.
    Mr. Green. Mr. Lewis, do you have anything to add to that?
    Mr. Lewis. The Chinese economic espionage began in the late 
1970s with opening to the west. It has been part of their 
economic planning since then. What happened at the end of the 
1990s, was that the Chinese discovered the Internet, discovered 
it is a lot easier to hack than to cart off a whole machine 
tool or something. And so this has been going on for over 30 
years. It is a normal policy for them. I'm a little more 
optimistic though. You can get them to change if you put the 
right set of pressure and pressure points on them.
    Mr. Wortzel. I will give you two examples, if I may. I 
delivered as the Assistant Army Attache, a U.S. Army artillery-
locating radar to the Chinese military. And I noticed that I 
began to get orders, or requests for resupply of certain parts. 
And the radars were supposed to be down on the Vietnam border. 
So I went to the Thai Army, the U.S. attache in Thailand and 
said, hey, are these parts failing in your equipment, same 
rough environmental problem? And they had a zero failure rate. 
So within 4 months, they had reverse engineered these radars, 
and what they couldn't build, they kept saying they had part 
failures so they would get parts and try and reverse engineer 
those.
    Another time after the Tiananmen massacre in '89, another 
attache and I were out in Shandong Province and we had a down 
day, and we asked to visit a PLA, People's Liberation Army 
radio factory. And sure, they said come in. Things were still 
in pretty good shape between the U.S. military and the Chinese, 
and they showed us their research and development shop for new 
radios and cell phones. And they were literally disassembling 
and copying Nokia cell phones, and Japanese radios. So it is a 
long tradition there. It goes back to 1858 and the self-
strengthening movement when they went out, bought and copied 
the best weapons and naval propulsion systems in the world. Of 
course, they got beaten by the Japanese in 1895, and that put 
an end to that.
    Mr. Green. Well, the Chinese government officially denies 
they conduct cyber espionage, and what evidence is there that 
the country is behind many of these attacks outside of your 
vigil there at the PLA?
    Mr. Wortzel. Well, I think the Mandiant Report did an 
excellent job. I think that the director of the National 
Security Agency, and the National Counterintelligence Executive 
have provided a great deal of evidence on attribution, as has 
the FBI.
    Mr. Lewis. There is a classified report put out by the 
Director of National Intelligence that probably has not been 
made available to the committee. You might want to ask for it.
    Mr. Green. OK.
    Mr. Lewis. I will give you an example from these talks we 
had with the Chinese. We spend an entire day talking about 
economic espionage. And at the end of it--including the 
Economic Espionage Act. At the end of it, a PLA senior colonel 
said to us, look, in the U.S. military espionage is heroic and 
economic espionage is a crime, but in China, the line is not so 
clear. So one of the things we can do is make the line a little 
clearer to them.
    Mr. Green. Thank you, Mr. Chairman.
    Mr. Murphy. The gentleman yields back. The chair will now 
recognize Mr. Johnson from Ohio for 5 minutes.
    Mr. Johnson. Thank you, Mr. Chairman, and I appreciate so 
much the opportunity to hear from the panel today. I spent 
nearly 30 years in information technology in the Air Force and 
in the private sector before coming to Congress. And I know 
that this is a tremendously complex and concerning issue 
because computing technology, at its very base, is not that 
complicated. It's ones and zeros. And for malicious nations 
like China and others who understand how to manipulate ones and 
zeros, this is not going to be an issue that we can solve today 
and then put it on the shelf and come back and look at it 5 
years from now, and upgrade it and that kind of thing. This is 
going to be a daily, daily obligation to protect not only our 
national security, but our industries, and our businesses 
across the country.
    So I'd like to ask just a--just a few questions. Dr. Lewis, 
in your testimony, you stated that it would be easier for China 
to give up commercial espionage if the cost of penetrating 
business networks is increased and the return from those 
penetrations are minimized. How, given the ease with which this 
can be done by computer practitioners, how can we increase the 
cost to China that will dissuade them?
    Mr. Lewis. We can make it a little harder for them, and 
since you are familiar with the information technology, and 
probably all of you have done this with consumer goods, when 
you buy something, the user name is ``admin,'' and the password 
is ``password.'' And what we found repeatedly through research 
at both government agencies and corporations, is that people 
forget to change, right, so they leave the password as 
``password.'' And you know what, it doesn't take a mastermind 
to hack into a system if the password is ``password.'' There 
are other things you can do.
    You can restrict the number of people who have 
administrator privileges. If you look at Snowden for example, 
he had administrator privileges and that let him tromp all 
around the networks he was responsible for and collect 
information. You shouldn't let that happen. You can make 
passwords a little more complex. If passwords are your dog's 
name, or any of your first cars, or something like that, the 
people who do this for a living can usually guess that in under 
2 minutes. Right, it is not----
    Mr. Johnson. There are algorithms out there that will 
figure out passwords, so I'm not sure password security is 
going to solve the problems of a nation state like China.
    Mr. Lewis. And that's why we need to move away from 
passwords, and I hope that the NIST standards recognize that 
passwords failed more than a decade ago; we need to do 
something else. There are a number of small steps that can make 
it harder. Right now it is so easy to get into most networks 
that there is really little cost for the hacker. He doesn't 
have to put a lot of effort in.
    Mr. Johnson. Sure, Senator Gorton, I was positively 
intrigued by your comment that there needs to be one agency, or 
one person in charge. And I really believe that that has merit. 
I'm not sure who it should be. I haven't given that a whole lot 
of thought, but I certainly agree that there needs to be 
someone at the cabinet level that is responsible and 
accountable for overseeing this effort.
    Your report outlines a number of policy solutions that aim 
to address the loss of our intellectual property and 
technology. So kind of continuing along the lines of what you 
said earlier, is the government properly equipped to enforce 
the IP rights against foreign companies and countries, or are 
we too fractionalized to properly deal with the issue? And I 
submit, and you know, I admit full up, you know, even--even 
CEOs of companies today, their eyes glaze over when you start 
talking about information technology in its core application, 
because it's a complex environment.
    Do we have the right people? Do we have the right skill 
sets? Do we have the right focus to try and address this?
    Mr. Gorton. Well, we are decentralized, and I think it is 
very important that we--that we do create responsibility at, 
you know, at one place to the maximum possible extent. I would 
add to Mr. Lewis's,one of the recommendations we make, is to 
make it easier to seize goods that violate--that have 
violations of intellectual property when they arrive in the 
United States. A few years ago, we made it somewhat easier to 
go to court and to get seizures. It's nowhere near easy enough. 
And one of our principal recommendations is to allow on any 
kind of probable cause the temporary seizure of those goods 
when they arrive, and then get to court, and deal with it 
afterwards. So to a certain extent, it is a lack of 
decentralization. To a certain extent it does require tougher 
laws.
    Mr. Johnson. Yes. Well, my time is expired. I had much more 
I wanted to talk about, but maybe we will get to that another 
time. Thank you, Mr. Chairman, I yield back.
    Mr. Murphy. The gentleman yields back. The chair will now 
recognize Mr. Tonko from New York for 5 minutes.
    Mr. Tonko. Thank you, Mr. Chair. Ms. Offutt, do you agree 
with the IP Commission's assessment of the value of the loss of 
intellectual property?
    Ms. Offutt. The work that we did suggests that an estimate 
like that, that's based on the application of a rule of thumb 
about the proportion of an industry's output that is vulnerable 
to or lost to intellectual property theft, is not reliable. 
There's certainly no way to look across all of the diverse 
sectors of the economy and suggest that the theft is 
characterized in any particular way that would be common to all 
of them.
    So the estimate that has gained currency, certainly in 
discussions, is, in our view, not credible. It's based on 
first, the notion that one-third of the economy's output comes 
from intellectual property-intensive industries. That means, 
essentially, companies that have a lot of patents, trademarks, 
copyrighting, that probably tells you what is at risk. But the 
application of the rule of thumb, which is 6 percent of that 
output being lost, we don't find any basis for believing that 
to be an accurate number.
    Mr. Tonko. Thank you, and while I understand the cost of IP 
theft is difficult to quantify, it has been suggested that the 
theft costs us over $300 billion annually in losses to the U.S. 
economy. I would like to try to further distinguish the types 
of IP theft. The Mandiant Report from February traced Chinese 
government support for cyberattacks. The Defense Department's 
2013 report to Congress on China explicitly mentions Russia's 
concerns about IP protection and how they will affect the types 
of advanced arms and technologies it is willing to transfer to 
China. So clearly, even Russia is concerned about Chinese 
state-sponsored IP theft. Can any of you as witnesses discuss 
the extent of state-sponsored IP theft?
    Mr. Lewis. In China, or globally?
    Mr. Tonko. Globally, or if you want to do both, that would 
be fine.
    Mr. Lewis. Both Russia and China have very tight control, 
very tight links to--between the government, and the hackers. I 
think that China is more decentralized, and one of the problems 
they will have in getting it under control is that, you know, 
regional PLA organizations, regional political organizations 
engage in independent action, right, not necessarily alerting 
Beijing to what they are doing. So it is a more decentralized 
system, and I think that the Chinese will have difficulty 
controlling it.
    In contrast, Russia is--appears to be very tightly 
centralized. All activities are controlled by the FSB. The 
Russians have a tremendous domestic surveillance capability, it 
is called SORM, SORM-2, in fact, that allows them to know what 
everyone is doing on the Internet. And so if you are a hacker 
and you are playing ball in Russia, you have to go along with 
what the FSB wants you to do.
    Mr. Tonko. Anyone else on that topic?
    Mr. Wortzel. Well, I think it's important to understand 
that in China, if they want to track down five religious people 
praying in a house church with unauthorized Bibles, they can do 
it. It's a pretty security-intrusive place. And if they wanted 
to track--if somebody gets on the Internet and is engaging in a 
form of political protest, they will get them and they will be 
in jail. So they can do what they want to do. They have that 
capacity. It's just that the state policy is, get this 
technology, so they don't bother with them.
    I would also like to suggest, if I may, that there are ways 
we can make things harder. I mean, you can--you can encode a 
digital signal in a file and attach that as you would a patent, 
copyright, or trademark, and a company that's developing a 
technology could do that, and then if you find that 
technology--if you find that code appearing elsewhere in 
China's, or Russia's control technologies, you could take legal 
action just as you would for a patent, copyright, or trademark. 
I am not quite sure that our intellectual property laws are up 
to that yet, but could you do that.
    Mr. Tonko. Just quickly when you look at the state-
supported effort for IP theft, and contrast that with 
individuals in criminal networks, what do you think the 
percentage breakdown would be if you had to guess at it?
    Mr. Lewis. In Russia, and China, I don't think there are 
any independent actors. I think that the degree of control that 
the government agencies exercise is--it is not like they are 
telling them this is what you have to do, but the criminals are 
appendages of the state, or they are tolerated by the state and 
in some cases they are directed by the state. So it is a 
different system over there, and I think that the degree of 
independent action is very, very limited.
    Mr. Gorton. In India you might find a good deal of 
independent action.
    Mr. Tonko. OK, thank you, Senator. With that I yield back, 
Mr. Chair.
    Mr. Murphy. The gentleman yield back. I will now recognize 
myself for 5 minutes of questions, and Senator Gorton, I would 
like to follow up on your idea of what would be best if you had 
one person who was responsible for overseeing all this. And I 
know that others have discussed that, and I would also like to 
ask you if you know that Victoria Espinel is the U.S. 
Intellectual Property Enforcement Coordinator approved by the 
U.S. Senate in 2009 in charge of the Obama administration's 
overall strategy for enforcement of intellectual property 
rights. Is that someone that you think would be helpful? She 
was invited and declined our invitation to attend today, but is 
that what you and Mr. Lewis, and others have in mind?
    Mr. Gorton. I would like to know what she would have said.
    Mr. Murphy. Same here. If I could ask you, Senator, as we 
look around the world and see what is going on, what we are 
having to combat here, do any other countries stand out as one 
that is perhaps doing it right, doing a significantly 
appropriate job on this?
    Mr. Gorton. I don't think so, but that wasn't something 
that was a central point of our investigation.
    Mr. Murphy. OK.
    Mr. Gorton. We were interested in what we did here. And Mr. 
Chairman, may I apologize? I didn't realize it would last so 
long. I have a noon date over on the Senate side that I'm going 
to have to leave now.
    Mr. Murphy. And we thank you for your time, and we 
certainly excuse you in light of that.
    Mr. Gorton. And I thank you. This is a vitally important 
mission on your part. And to take real action to protect our 
intellectual property will be a great service to the country.
    Mr. Murphy. And if anyone has any additional questions 
after your departure, we will see that they are submitted to 
you in writing. Thank you very much, Senator, for your time.
    All right, if I may ask you, Dr. Lewis. In your testimony, 
you said that it would be easier for China to give up 
commercial espionage as the cost of penetrating business 
networks is increased, and the returns from those penetrations 
are minimized. And I know we discussed that some, but would you 
give us some examples, or how you think we can increase the 
cost to China from commercial espionage?
    Mr. Lewis. Sure, and just to briefly respond to your 
question to Senator Gorton, the U.K., France, and Russia all 
have pretty effective programs in place. They are not 
watertight, but they are further along than we are. And some of 
it is different constitutional arrangements. The Australians 
have made some progress. If it's any consolation, people who 
are doing a worse job than us are the Chinese. They are in 
terrible shape when it comes to defense, and they remind me of 
that all the time. I think what we need to do, it is not enough 
of a consolation, but it is better than nothing, right? We need 
to find ways to get companies to harden their networks. And 
that involves identifying practices that would make the 
networks more difficult to penetrate and control. There are an 
identified set of practices. Hopefully NIST will encapsulate 
them. We need to think about better ways to share threat 
information. I know CISPA has attracted mixed review, the 
Cybersecurity Information Sharing Protection Act. We need some 
vehicle to let companies and government share information 
better on threats. That can be relatively effective.
    Finally, I'm a little surprised to hear commerce held up as 
the place you would want to coordinate. We do have a policy 
coordinator in the White House. She is doing a pretty good job. 
But the place where we have not done enough as a Nation is 
thinking about the role of the Department of Defense, and 
defending our network. And it is a bit of a sensitive topic at 
this time. You know, it's not the exact moment to come up and 
say we should give NSA a little more responsibility, but they 
do have capabilities that we are not taking full advantage of.
    Mr. Murphy. At this time, I will yield back and recognize 
the gentleman from Texas, Mr. Olson, for 5 minutes of 
questions.
    Mr. Olson. Thank you, Mr. Chairman, and I want to thank the 
witnesses for being here this morning. Senator Gorton left, so 
I can't talk about being through Evansville, Indiana. But, Mr. 
Lewis, I have been in Pittsburgh, and I have seen a great side 
of injustice and theft. As you know, I'm talking about the 1980 
AFC championship game in which Mike Renfro from the Houston 
Oilers scored a touchdown that the refs disallowed. But turning 
to other thefts, as we heard from all of you, state-sponsored 
terrorism, cyber espionage, is having a devastating effect on 
the American economy and the competitiveness of American 
companies. And the energy industry, important in my home state 
of Texas, is particularly vulnerable to cyberattacks. These 
attacks come in two forms, as you all know. One type is where a 
malicious actor could disrupt the physical operations by 
hacking into the industrial control systems which are used to 
control everything from the power grids to pipelines. The other 
cybersecurity threat to the energy industry, which is what this 
hearing is focused on, is the theft of intellectual property 
and proprietary information through cyber espionage. And the 
most malicious of these hackers are nation states, North Korea, 
Iran, Russia, and China.
    My question will focus on China this morning. Over the past 
couple of years, there have been several news reports of major 
American oil and gas companies being targeted by Chinese 
hackers. And yes, despite official denials we have been able to 
trace these attacks back to China. And some of these companies 
are headquartered in my hometown of Houston, Texas. The hackers 
are looking for, as you all know, sensitive information, such 
as long-term strategic plans, geological data showing locations 
of oil and gas reserves; even information on the bids for new 
drilling acreage.
    This type of information is worth billions of dollars, 
Senator Gorton's committee, $300 billion in lost revenue for 
Americans. This disclosure can severely hurt a company's 
competitiveness. My first question for you, Dr. Wortzel, would 
you say that energy is a strategic industry in the eyes of the 
Chinese government?
    Mr. Wortzel. It is absolutely a strategic industry, and 
they gather that business intelligence, the state does, for a 
couple of reasons. First of all, they are looking for 
technology because in some areas they are behind. Second, they 
are beginning to invest here. So they want to know where to 
invest. They want to know where they are going to get the most 
money for their investment, and where they can extract the most 
technology.
    Now, with respect--I think it is also important to remember 
that any time a critical, or a control system is penetrated, or 
a computer system is penetrated, it is also mapped. So it's 
only in terms--in time of conflict that that penetration may be 
used for a critical infrastructure attack because that would be 
an act of war. But the damage is done, and they know what to 
do.
    Mr. Olson. Yes, sir, and I know they have invested billions 
of dollars in the Eagle Ford shale play with American partners, 
and I suspect they are trying to get that technology, some of 
the drill bit technology, other things, hydraulic fracturing 
because they have shale plays in Western China. It's a very 
difficult terrain out there, different, you know, different 
geological structures, but it is pretty clear to me that they 
are involved with us trying to steal our technology as opposed 
to being good corporate partners.
    And my final question is for you, Mr. Lewis. We will put 
aside the 1980 AFC championship game, but how is the industry 
working together with government to combat cyber espionage?
    Mr. Lewis. This is one of the harder areas, and so people 
have been trying since 2000 to come up with a good model for 
what they call public-private partnership. And it looks like it 
has to vary from sector to sector. So for example, the banks, 
the telcos, they have a pretty good partnership with the 
government. Other sectors maybe the electrical sector, a little 
less strong partnership.
    So one of the things we need to do is maybe take a step 
back and say, what are the things that would let companies feel 
comfortable working with the government? What are the things 
that would let them feel comfortable sharing information or 
getting advice. And there has been some effort to do that, but 
we haven't done enough, and what we haven't done in particular 
is tailor it to each sector. What the concerns of an oil 
company are, are going to be different from the concerns of a 
software company. So maybe a new approach, focused a little bit 
more on sector-specific ideas.
    Mr. Olson. No one-size-fits-all, and I am out of time. I 
yield back. Thank you, sir.
    Mr. Murphy. The gentleman's time is expired. I now 
recognize the gentleman from Louisiana, Mr. Scalise, for 5 
minutes.
    Mr. Scalise. Thank you, Mr. Chairman. I appreciate you 
holding this hearing, and appreciate our panelists for 
participating. I know our committee has delved into this on a 
number of different fronts. There has been a lot of attempts 
over the last few years to try to move legislation through 
Congress to address this in different ways. And it's a serious 
problem. I know a few of you have pointed out the economic 
impact. There have been a lot of independent studies. Of 
course, the IP Commission report that Senator Gorton was part 
of, and really helped lead, estimates a $300 billion a year 
lost in our economy, and over 2 million jobs.
    And when you go out to places like Silicon Valley, which, 
you know, for the tough economic times we have right now, there 
are a lot of industries that are struggling, but one of the few 
areas that is a bright spot is the technology industry. And in 
large part, because so much of that intellectual property 
starts, is created, and has been innovated here in the United 
States, and it's being stolen. It is being stolen by countries 
like China. And we know about it. We sometimes can stop it, and 
often can't. And yet, it has a major impact on the economy, but 
it's kind of lost in the shadows because it is not always 
quantifiable.
    I want to ask you, Ms. Offutt. You talked a little bit 
about this. Is there a better way to gather data, a better way 
to know if that $300 billion number per year, is right? Is it 
way too low? You know, what are--is there a better way to find 
out just what is being stolen, and how it impacts our economy?
    Ms. Offutt. Well, I think the approach is necessarily at 
the sector or the firm level. That's the way we would aggregate 
to a number that told us something meaningful about the extent 
of what is at risk, what has been compromised, and then how it 
has been used to affect firm sales or consumer purchases. And 
that effort is quite data- and labor-intensive, but some of 
those data may become available as we intensify efforts to 
actually impose protection. Although it would probably always 
be the case that firms will be reluctant to divulge everything 
about compromise of their systems, for competitive reasons 
primarily.
    Mr. Scalise. Do you think the criminal enforcement is 
adequate? Do you think our Federal agencies that are tasked 
with enforcing these laws, are they doing enough? Does more 
need to be done? Is it that the law doesn't give them the kind 
of ability they need to go after the actors that are out there 
stealing all of this property? Anybody on the panel.
    Ms. Offutt. I defer to Mr. Lewis to answer that question.
    Mr. Scalise. Mr. Lewis, you can----
    Mr. Lewis. Let me give you an example that was startling, 
even to me. I was at a meeting recently with some FBI 
representatives from a major city, not in a State from any of 
you, I'm happy to say. They told me they won't take a case of 
cyber crime if the loss was less than $100 million.
    Mr. Scalise. What agency said this?
    Mr. Lewis. FBI.
    Mr. Scalise. Why is that?
    Mr. Lewis. Because there's just so many that they can't do 
them all, and so we have a real problem here. The issue is not 
in the United States. If you commit a crime through hacking in 
the United States, you will go to jail. The FBI is tremendously 
effective. If you commit a crime in Western Europe, or in 
Japan, or Australia, you will go to jail. The countries that 
observe the law do a good job. And so what we have seen is the 
hackers have moved, or the ones who have survived, live in 
countries that either support this, or don't have the good rule 
of law.
    So Brazil, Nigeria, you know about them, Russia, and China, 
they encourage them. That's our fundamental problem is if we 
could let the FBI off the leash, if they could get cooperation 
from these countries, this problem would be much more 
manageable. But you have places that don't find it interesting 
to cooperate.
    Mr. Scalise. And I will stick with you on this one, Dr. 
Lewis. We do hear from companies that say that there is a 
reluctance to share information with the Federal Government, 
you know, in some cases where that information can be helpful 
in at the deterring this theft, or kind of better protecting 
against it. What do you see as maybe an impediment, or what 
things can be done to better improve that ability to hopefully 
lead to a better process that stops some of the stuff from 
occurring in the first place?
    Mr. Lewis. That's one of the subjects of debate now, but 
you probably need better liability protection for the 
companies, and you probably need some guarantee that if you 
give information to the government, it won't go to every agency 
under the sun. You need some sort of limitation on it. Those 
are the two key areas there. Antitrust comes up as a problem as 
well if companies share information, they might run afoul of 
antitrust. So liability, antitrust, and data security are the 
three obstacles.
    Mr. Scalise. And I know those things--are things we are 
struggling with here, too. So I appreciate that. Thank you, Mr. 
Chairman. I yield back the balance of my time.
    Mr. Murphy. I thank the gentleman for yielding back. I also 
thank all of our panelists, and thank the members. What we have 
heard today is startling and enlightening on this issue that 
would have a huge impact upon our national security, but also 
our jobs, and at a time where we all want to see more Americans 
going to work, it is sad that this state of affairs exists, but 
we thank the information the panelists have given us today.
    I also want to ask for unanimous consent to enter into the 
record a letter from the Cybersecure America Coalition on 
today's hearing. I understand the minority has had a chance to 
review this letter and does not object, so hearing no 
objection, so ordered.
    [The information appears at the conclusion of the hearing.]
    Mr. Murphy. And I ask unanimous consent that the written 
opening statements of other members be introduced into the 
record. So without objection, the documents will be entered 
into the record. So in conclusion again, I thank the witnesses 
and members who participated at today's hearing. I remind 
Members that they have 10 business days to submit questions for 
the record, and I ask the witnesses all agree to respond to the 
questions. That concludes our hearing today, thank you.
    [Whereupon, at 11:52 a.m., the subcommittee was adjourned.]
    [Material submitted for inclusion in the record follows:]
    [GRAPHIC] [TIFF OMITTED] 86391.043
    
    [GRAPHIC] [TIFF OMITTED] 86391.044
    
    [GRAPHIC] [TIFF OMITTED] 86391.045
    
    [GRAPHIC] [TIFF OMITTED] 86391.076
    
    [GRAPHIC] [TIFF OMITTED] 86391.077
    
    [GRAPHIC] [TIFF OMITTED] 86391.078
    
    [GRAPHIC] [TIFF OMITTED] 86391.046
    
    [GRAPHIC] [TIFF OMITTED] 86391.047
    
    [GRAPHIC] [TIFF OMITTED] 86391.048
    
    [GRAPHIC] [TIFF OMITTED] 86391.049
    
    [GRAPHIC] [TIFF OMITTED] 86391.050
    
    [GRAPHIC] [TIFF OMITTED] 86391.051
    
    [GRAPHIC] [TIFF OMITTED] 86391.052
    
    [GRAPHIC] [TIFF OMITTED] 86391.053
    
    [GRAPHIC] [TIFF OMITTED] 86391.054
    
    [GRAPHIC] [TIFF OMITTED] 86391.055
    
    [GRAPHIC] [TIFF OMITTED] 86391.056
    
    [GRAPHIC] [TIFF OMITTED] 86391.057
    
    [GRAPHIC] [TIFF OMITTED] 86391.058
    
    [GRAPHIC] [TIFF OMITTED] 86391.059
    
    [GRAPHIC] [TIFF OMITTED] 86391.060
    
    [GRAPHIC] [TIFF OMITTED] 86391.061
    
    [GRAPHIC] [TIFF OMITTED] 86391.062
    
    [GRAPHIC] [TIFF OMITTED] 86391.063
    
    [GRAPHIC] [TIFF OMITTED] 86391.064
    
    [GRAPHIC] [TIFF OMITTED] 86391.065
    
    [GRAPHIC] [TIFF OMITTED] 86391.066
    
    [GRAPHIC] [TIFF OMITTED] 86391.067
    
    [GRAPHIC] [TIFF OMITTED] 86391.068
    
    [GRAPHIC] [TIFF OMITTED] 86391.069
    
    [GRAPHIC] [TIFF OMITTED] 86391.070
    
    [GRAPHIC] [TIFF OMITTED] 86391.071
    
    [GRAPHIC] [TIFF OMITTED] 86391.072
    
    [GRAPHIC] [TIFF OMITTED] 86391.073
    
    [GRAPHIC] [TIFF OMITTED] 86391.074
    
    [GRAPHIC] [TIFF OMITTED] 86391.075