Abstract
From the early 1990s onwards, U.S. civilians and law enforcement officials have faced the threats from terrorists and other forms of violent extremists, with efforts focused on protecting these individuals from experiencing death or injury from these adversaries. However, even after the 9/11 tragedy, policy-makers have paid insufficient attention to the danger of attacks being launched with the intent of deliberately disrupting or destroying major elements of the nation’s critical infrastructure – including our transportation, communications, financial, and public health capabilities and facilities. In addition to physical threats, the potential threat of cyber-strikes against the “nervous systems” that control operations of critical infrastructures such as our electric power grid has come to the fore. Presidents Clinton, Bush, and Obama have issued scores of directives, executive orders, and strategies designed to protect our critical infrastructure and key resources from attacks by terrorists, only to discover that these intelligent adversaries can adapt to and even negate these measures. With a staggering number of systems defined as “critical,” efforts to prioritize resources aimed at reducing the risks to these critical infrastructure assets have not proved effective. Other lingering problems include how to conduct cross-sector assessments and finding ways for private owners and operators – who are responsible for most of the nation’s infrastructure – to work with the government in forging sustained partnerships for defending these critical targets from all attackers. Given these considerations, after discussing the meaning of critical infrastructure and the threats these systems face, this article summarizes the policies promulgated by Presidents Bush, Clinton, and Obama in their attempts to safeguard the nation’s critical infrastructure. It will also address such issues as the sector construct, the use of risk methods in decision making, and the importance of public-private partnership. It then offers a series of conclusions followed by a set of recommendations for President Trump to consider on how the U.S. can more effectively meet and defeat the growing threats to our critical infrastructure from terrorists as well as violent extremists.
Suggested Citation
Kahan, Jerome. “Critical Infrastructure Protection: Can We Defend Against Terrorism?” Homeland Security Affairs 13, Article 1 (March 2017). https://www.hsaj.org/articles/13765
The U.S. needs an integrated and collaborative approach designed “to achieve a vision of a Nation in which physical and cyber critical infrastructure remain secure and resilient, with vulnerabilities reduced, consequences minimized, threats identified and disrupted, and response and recovery hastened.”1
Introduction
On February 26, 1990, Patrick Leahy took the floor of the Senate to remind his fellow legislators that the U.S. is a “target-rich society… totally dependent on interlocking networks and nodes for communications, transportation, energy transmission, financial transactions, and essential government and public services […vulnerable to terrorist attacks that] could cause havoc, untold expense, and perhaps even mass deaths….”2 These remarks were unexpected, since U.S. leaders in Congress and the White House had only recently recognized the dangers posed by terrorists and other violent extremist to our citizens and other residents, but had not yet fully appreciated the emerging threat of these adversaries mounting physical and/or cyber-attacks against our valuable and vulnerable infrastructure assets.
Later in the 1990s, the U.S. did in fact experience attacks by domestic extremists that destroyed major infrastructure targets while killing or injuring many Americans, notably the basement bombing of the North Tower of the World Trade Center in New York on February 26, 1993 and the truck-bomb explosion outside the Federal Building in Oklahoma City on April 19, 1995. These incidents should have been wake-up calls for the nation to prepare itself for more attacks against such targets. However, this realization was late in coming, occurring over six years later when on September 11, 2001 two aircraft hijacked by members of the al-Qaeda terrorist organization were deliberately flown into New York City’s Twin Towers turning these structures into rubble, while another aircraft damaged a side of the Pentagon, and a fourth crashed into a field in rural Pennsylvania – with all these events killing a total of almost 3000 people.3
As the years passed, in addition to concerns over physical attacks against our infrastructure, government officials warned the nation that many of our adversaries have also been developing the capacity to launch cyber-strikes against the computer-based elements of our critical assets and systems, with the potential of adversely affecting or even halting their operations.4 Commenting on these trends, the Director of National Intelligence (DNI) in his briefing to the Senate Armed Services Committee on the latest version of the Intelligence Community’s Worldwide Threat Assessment, cautioned that “terrorism will remain one of several primary national security challenges … in 2016.” 5 DNI Clapper went on to reinforce a point he made in previous briefings regarding weaknesses and vulnerabilities in key infrastructure sectors across the nation that terrorists and violent extremist groups can attack and disrupt, with potential adverse consequences for our security, society, and economic welfare.
After discussing what is meant by critical infrastructures and explaining the threats these systems face, this article lays out the strategies, directives, and executive orders issued by Presidents Clinton, Bush, and Obama in their attempts to protect critical infrastructure targets from attacks launched by terrorists or violent extremists. It then assesses such issues as the sector construct, the National Infrastructure Protection Plan, the use of risk methods in decision making, the importance of resilience, and the need for public-private partnerships. On the basis of these analyses, the article offers a series of conclusions followed by a set of recommendations on how to enhance the ability of the U.S. to meet and defeat the threats posed to our critical infrastructure for President Trump to consider.
Meaning of “Critical” Infrastructure
In the 1980s, policy makers in the Executive Branch and Congress were primarily concerned over the deterioration, technological obsolescence, and insufficient growth capacity of the nation’s public infrastructure, not the threat from terrorists or violent extremists. These issues had been in the public domain for decades, as exemplified in a 1963 study by the Congressional Budget Office (CBO) that pointed out the appalling condition of major segments of the nation’s infrastructure judged to be “directly critical” to the country’s economy.6 Without using the word “critical,” a second CBO report in 1988 assessed the adequacy and condition of those infrastructure facilities “important for the vitality of the economy and for public health and safety.”7 It was not until the nation began to worry about terrorist threats in the 1990s, however, that the term “critical” in reference to our infrastructure came into serious use.8 Indeed, as the third millennium began, many of the familiar infrastructures known for their deterioration or obsolescence began to be treated as potentially significant terrorist targets.9
Definitions and Examples
An official definition of critical infrastructure is found in the USA PATRIOT Act, which states that these are “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.”10 Put more tersely, critical infrastructures are comprised of assets and systems proclaimed by presidential order or legislated by Congress to be essential to the overall safety and security of the U.S. The specific infrastructures deemed to be critical can vary as a function of their relative importance and their vulnerability, which puts certain sectors at greater risk to terrorist attack than others.11 Currently, there are 16 officially designated critical infrastructure sectors providing “the essential services that underpin American society and serve as the backbone of our nation’s economy, security, and health….”12 These sectors encompass chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, public health, information technology, nuclear reactors, transportation systems, and water systems.13 Each of these sectors are in turn composed of systems, subsystems, and individual key assets likely to be the actual targets attacked. In addition, the nation has key resources, which the Patriot Act defined as those “publicly or privately controlled resources essential to the minimal operations of the economy and government,” a generalized meaning, always referred to but never explained, which later came to include national monuments and icons representing the nation’s traditions, heritage, and values or recognized for their historical, cultural, political, or religious significance.14
Database Difficulties
Given the numerous elements within each major sector, a National Asset Database (NADB) was established in 1963 to serve as a “comprehensive catalog that includes an inventory and descriptive information regarding the assets and systems” that comprise the country’s Critical Infrastructure and Key Resources (CI/KR).”15 The NADB was designed to provide a database that would support a process for allocating resources to defend those targets whose vulnerabilities and consequences posed the greatest risk when facing terrorist attacks. But problems arose with the credibility and comprehensiveness of the methods used to populate this database, methods that included: visiting certain locations; seeking inputs from federal agencies, state and local governments, and private entities; extracting information from open sources and commercial databases; and relying on individual facilities to provide data voluntarily – a host of non-analytic and piecemeal activities that did not lead to useable results.16 Starting in 2006, the government took a new tack which sought to annually identify “nationally significant critical infrastructures” by parsing the elements of each infrastructure sector into assets that have fixed locations or that functioned as a single targetable entity as well as clusters composed of two or more associated assets or nodes that a single attack could damage.17 This also proved difficult to implement, since it is relatively easy to identify single assets such as buildings, bridges, or ports, but as put by an acknowledged expert, “most CIKR are part of a complex system… composed of numerous assets connected together as a network of nodes and links.”18
One year later, the Implementing Recommendations of the 9/11 Commission Act of 2007 called for establishment of a single prioritized list that would serve as a national database of systems and assets determined to be so vital to the nation’s functioning and well-being that their destruction or disruption would “cause national or regional catastrophic effects.”19 In response, while keeping the NADB alive, DHS created a new process for prioritizing the nation’s most critical assets and systems by maintaining two lists as a function of the level of consequences caused by a terrorist attack or other hazard– a top priority Type 1 list containing assets that would have the highest consequences to the nation if they were destroyed or damaged, and a Type 2 list including all entries on the Type 1 list plus additional assets that would have less serious but still significant national consequences.20
Where We Are
Believe it or not, DHS is still seeking to produce an accurate and comprehensive picture of the nation’s critical infrastructures, trying to respond to the 2013 GAO Report which asked for greater assurance that the two-tier list indeed captures the highest-priority systems and assets, whether owned and operated by government or industry.21 A major stumbling block yet to be overcome is the lack of agreement on what constitutes a “unit of critical infrastructure” – that is, how each of the various systems, subsystems, assets, and nodes within each sector should be counted.22 Moreover, the number of units within each sector has continued to expand over time, making it even more difficult to track this growth and produce an accurate inventory of vital assets and systems. These factors have increased the difficulty of determining how many critical infrastructure units are actually so indispensable that their loss or inability to function would have high consequence national effects.
The Threats
For our purposes, we define terrorism and other forms of violent extremist actions as “any activity dangerous to human life or potentially destructive of critical infrastructure or key resources, intended to intimidate or coerce a civilian population or influence the policy of a government.”23 Unlike natural disasters, these adversaries are motivated by “a complex mix of political, economic, and psychological objectives,” which can explain their interest in destroying or disabling the nation’s critical infrastructures and key assets.24 Such intelligent adversaries are also capable of striking “anything, anywhere, anytime,” [… while we cannot] protect “everything, everywhere, all the time.” 25 Additionally, they have the ability to exploit system vulnerabilities, negate protective measures, and shift from well defended to lesser defended but still significant targets. To accomplish their objectives, these antagonists can use physical means or, if suitably sophisticated, can employ cyber strikes or mixed attacks against our CI/KR, as discussed below.
Physical Threats
Depending on the nature of the target and the purpose of the strike, terrorists or violent extremists can use a variety of physical weapons to halt or disrupt the functioning of a critical asset. Attack methods that might be employed include coordinated strikes with homemade bombs ranging from sophisticated explosive devices to simpler pipe bombs or pressure cooker explosives carried to targets by passenger cars, pickup trucks, buses, motorbikes, or even maritime vessels; the use of suicide bomber detonations in crowded areas such as transportation stations; or the placement of explosive devices at targets that are then left for remotely controlled subsequent detonation.26 Another approach, which evokes grim thoughts of 9/11, is for terrorists or other violent extremist to use a purchased, rented, or stolen private aircraft loaded with explosives as a weapon by crashing it into a critical infrastructure target, such as a major financial or government facility.
Chemical and biological weapons (CBW) consist of “a toxic agent and some form of delivery device,” both elements of which can be acquired by determined adversaries using materials and equipment readily available in the economy and assembled into weapons, perhaps with assistance from domestic or international experts.27 These weapons could be aimed at critical targets with the capacity to release agents upon impact or else deployed inside a building with its agents released remotely, thereby contaminating these targets and putting them out of use for varying periods of time – in either case causing injuries if not deaths to exposed individuals.
It is also possible that adversaries might gain access to low level but still dangerous radioactive substances used for medical or research purposes, such as cesium, in order to build a radiological dispersal device (RDD) and explode this weapon in or near major commercial or government facilities with the intent of causing panic and economic damage. Less likely but far more terrifying would be terrorist groups detonating an illicitly acquired nuclear weapon or an improvised nuclear device (IND) constructed in the midst of a major metropolitan center. This would likely cause “mass fatalities and infrastructure damage from the heat and blast of the explosion and significant consequences from both the initial nuclear radiation and the subsequent radioactive fallout.”28
When it comes to tactics, smart, technologically advanced attackers might be able to exploit the complex interdependencies among infrastructure sectors to create cascading consequences by launching a well-placed attack that causes a system failure within a centralized sector, which in turn induces failure in another linked sector, and so on.29 Attackers might also be able to exploit a system’s “single point of failure,” which if destroyed or disabled by a highly accurate strike could not only stop that system from operating, but also induce cascading consequences as other system elements “take up the slack for the failed component, overloading these nodes, and prompting additional nodes to fail one after another in what is known as a vicious circle.”30
Reinforcing growing concerns over the threat to the nation’s critical infrastructure systems, FBI attendees at a 2015 conference on the electric power grid reportedly expressed concern that terrorist groups such as ISIS or its supporters are about to gain capabilities needed to disrupt the county’s electric system, but experts sought to calm things down by arguing that creation of cascading effects that could lead to a power blackout over a wide region would require these adversaries to employ an entirely different, more sophisticated approach which they do not now possess.31 A year later, the views of these experts were validated by an analysis suggesting we may not yet have experienced catastrophic cascading attacks because terrorists or extremists “most likely lack the intelligence, organizational coordination, manpower, and resources to conduct a strategic … campaign against nationally significant infrastructure targets… and at least for the moment remain content to attack most visible and easily accessible individual locations.”32 In the meantime, rather than sitting still, increasing our knowledge of the complex interdependencies among the nation’s infrastructure systems will help private and public owners install a variety of protective measures which can at least reduce the risk of future terrorist attacks causing high impact cascading effects.33
Cyber attacks
For over a decade, before cyber space was seen as a hostile environment, Islamic terrorist groups “expressed interest in capabilities that could exploit […. America’s] cyber vulnerabilities [in order] to disrupt provision of services, exact economic costs, and undermine public confidence.”34 Despite this stated goal, a renowned national security expert opined in June 2011, that “cyber-attacks have not been the most attractive route for terrorists, […but predicted that] as groups develop their cyber capacity to wreak great damage against infrastructure over the coming years, the temptation will grow” to launch such attacks against the U.S.35 In fact, one year later the Secretary of Defense warned that a cyber attack on the nation’s critical infrastructure could be catastrophic, amounting to a “cyber Pearl Harbor” ….that would not only cause physical destruction and loss of life, but also “paralyze and shock the nation and create a new, profound sense of vulnerability.”36
There is little question that terrorists may have been behind some of the computer intrusions or so-called “hacks” which in recent years have caused personal and proprietary data and other sensitive information to be made public.37 Of far greater concern to security officials, however, is the fear that certain terrorist organizations may soon acquire the skills and technologies to conduct sophisticated cyber attacks that could “disrupt, deny, destroy, or… exploit systems and networks essential to the functioning of critical U.S. infrastructure, with potentially devastating effects on economic security, the environment, national security, and public health and safety.”38 In 2014, an expert claimed that many of our critical sectors are protected by a “Cyber Maginot Line” that unfortunately enables attackers to bypass this barrier and attack exposed critical infrastructure targets.39
Particularly worrisome is the prospect of terrorists seeking to attack the Supervisory Control and Data Acquisition (SCADA) systems associated with the functioning of critical infrastructures in order to disrupt or degrade whatever service they provide to their customers.40 These cyber attacks alone are not likely to cause significant consequences if they target complex and redundant networks, but might have the effect of amplifying the damage caused by a physical strike.41 Such so-called blended attacks, where the physical and virtual worlds converge, offer our adversaries the capability to leverage cyber space in ways that cause severe damage to critical infrastructures.42 A particular threat that industry needs to guard against is the case of “insiders” with specialized knowledge of and access to complex information technology systems helping their external terrorist counterparts to launch a successful blended attack even against well secured infrastructure targets.43
Presidential Policies
Presidents Clinton, Bush, and Obama produced a plethora of directives, executive orders, and strategies for dealing with both physical and cyber threats to our critical infrastructure, some truly groundbreaking, particularly those of Clinton, but many Bush and Obama initiatives were warmed- over variations of previous policies.
Early Initiatives
In June 1995, two months after the Oklahoma City bombing, President Clinton issued Presidential Decision Directive –39, asserting that national policy was not only to deter and defeat terrorism, but also to vigorously respond to all terrorist attacks on our territory, citizens, or facilities.44 Seeking to turn policy into practice the following year, Clinton signed an Executive Order which explained that the nation faced cyber as well as physical threats to its CI/KR.45
The Order also called for establishing a Presidential Commission on Critical Infrastructure Protection (PCCIP) with the mandate of developing a comprehensive national strategy for protecting our infrastructure.46 After a wide-ranging effort that included inputs from dozens of experts, the PCCIP produced a report in October 1997 that offered a set of recommended actions the nation should take in dealing with both cyber and physical threats to our critical infrastructure.47 These results were captured in a White Paper on May 22, 1998 for dissemination to interested public and private parties and translated into Presidential Decision Directive-63 on the same date.48
After affirming the nation’s commitment to reduce physical and cyber vulnerabilities in our critical infrastructures which might be exploited by terrorists, PPD-63 assigned lead agency responsibilities for protecting each of the eight sectors identified as critical by the PCCIP.49 The Directive formed an interagency Critical Infrastructure Coordination Group (CICG) housed in the Department of Commerce (DOC) which analyzed critical infrastructure issues and developed policy recommendations for senior White House officials, including plans to coordinate with private counterparts in defending high value critical sectors against terrorist attacks and formulating plans for reconstitution of services in the event of successful strikes.50 PPD-63 also established in DOC the Critical Infrastructure Assurance Office (CIAO) to coordinate the federal government’s initiatives on critical infrastructure safety.51 Additionally, the Directive formed the National Infrastructure Protection Center (NIPC) within the FBI as the principal government body for facilitating threat assessments, warnings, law enforcement investigations, and responses as well as serving as a conduit for sharing this information with the private sector.52 Finally, the Directive set in motion the establishment of Information Sharing and Analysis Centers (ISACs) to better enable private owners and operators to share threat information about infrastructure sectors with each other and also with the government.53 As it turned out, many of the organizations formed by PPD-63 exist to this day and the essence of its policies influenced subsequent administrations in their efforts to protect the nation’s CI/KR from terrorist attacks and other hazards.54
Concerned over the growing unconventional terrorist threat facing the nation, President Clinton signed Presidential Decision Directive-62 – a classified measure reportedly elaborating upon the nation’s counterterrorism policy and the various threats posed by terrorists, including the risk that these adversaries “will be tempted to exploit vulnerabilities in our critical infrastructure.”55 Accordingly, Clinton ordered that we increase our effectiveness in countering these threats and prepare to manage the consequences of any successful terrorist attacks against our critical physical and cyber systems infrastructure.56
Reacting to his increased alarm that terrorists will use cyberspace to attack the nation, President Clinton, in early 2000, unveiled Defending America’s Cyberspace, Version 1.0 of his National Plan for Information Systems Protection, with the objectives of detecting, preventing, and responding to major cyberattacks against our critical infrastructure, while building institutions and laws to support cybersecurity programs. 57 Seeking to lay the groundwork for a more comprehensive strategy, the Plan proposed ten programs for federal agencies to undertake with assistance from industry, including improved warning of unauthorized intrusions and enhanced safeguarding of proprietary data.58 Although a GAO Report praised Clinton’s National Plan as an excellent first step for countering cyberspace dangers, it cautioned against establishing mandatory guidelines for federal agencies in managing their computer security programs, rather than granting these agencies greater latitude in dealing with this new threat, preferably on a voluntary basis.59
The Wakeup Call
The devastating terrorist attacks of September 11, 2001 had the effect of leading the nation’s highest officials to finally take seriously the need to secure our CI/KR from the dangers posed by such adversaries.60 In an immediate response to the 9/11 tragedy, President Bush signed into law the USA PATRIOT Act, which, among other provisions, called for a “continuous national effort… to ensure the reliable provision of cyber and physical infrastructure services critical to maintaining the national defense, continuity of government, economic prosperity, and quality of life in the United States.”61 In early 2002, Bush’s new White House Office of Homeland Security issued the first ever National Strategy for Homeland Security (NSHS), which incorporated “Protecting Critical Infrastructures and Key Assets” as one of its critical mission areas.62 Later that year, after intense negotiations with the White House, Congress approved the Homeland Security Act forming the Department of Homeland Security (DHS), a new Cabinet Agency with a polyglot of homeland security responsibilities, including protection of our critical infrastructure from terrorist threats.63 Partly in response to congressional hearings held in early October 2002 over “who’s in charge” of critical infrastructure protection, DHS was assigned the job of ensuring that all policies and programs designed to safeguard the nation’s CI/KR would be implemented in an effective, coordinated, and comprehensive manner – a challenging task to say the least, as we will discuss.64
Further emphasizing the importance of securing our critical infrastructure, President Bush, in early 2003, issued the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets which set forth goals, objectives, and guiding principles …to secure “the infrastructures and assets vital to our public health and safety, national security, governance, economy, and public confidence,[ defined] roles and responsibilities, [… and identified] major initiatives that will drive our near-term protection priorities.”65 In late 2003, Bush issued Homeland Security Presidential Directive -7 entirely devoted to establishing a national policy that would identify, prioritize, and protect our CI/KR from attacks.66 In an unexpected burst of candor, the President sought to manage expectations by acknowledging in HSPD – 7 that it would not be possible to protect all of our critical infrastructure assets against all attacks, but that “improvements in security can make it more difficult for attacks to succeed and can lessen the impact of attacks that may occur.”67
The growing danger of cyber attacks was not lost on President Bush, who before the 9/11 tragedy had issued an Executive Order on Critical Information Protection in the Information Age, a document built on work done by President Clinton aimed at further underscoring the importance of defending the nation’s critical infrastructure against cyber attacks. This also established the goal of ensuring that any disruptions that do occur “are infrequent, of minimal duration, manageable, and cause the least damage possible.”68 More operationally, in early 2003 Bush issued the National Strategy to Secure Cyberspace, which proposed a series of practical actions to defend the nation’s critical infrastructure from cyber attacks – an initiative that was immediately criticized as “just another policy document with plenty of good ideas […about cybersecurity] but few teeth.”69 In an attempt to put bite into this allegedly toothless strategy, which had come under continued criticism for almost five years, President Bush in January 2008 signed a pair of classified orders which provided a comprehensive approach to cybersecurity – anticipating future cyber threats, directing the gathering, assessment, and distribution of cyber threat information, and describing the missions and operations of various cyber organizations across the federal government. 70 These twin Directives led to issuance in January 2008 of the Comprehensive National Cybersecurity Initiative (CNCI), a classified joint directive consisting of a dozen steps aimed at coordinating the government’s effort in responding to the increasing number of cyberattacks on federal computer systems, including the formulation of strategies to deter cyber intruders.71 While praising the thrust of the joint directive, many cyber-security experts criticized this initiative because it excluded privately-owned systems where most cyber threats have occurred and which will likely remain key targets for future strikes.
Inheriting the challenge of dealing with the threat of cyber terrorism, five months after assuming office, President Obama called for a 60-day review by governmental and non-governmental experts of the cybersecurity “plans, programs, and activities underway throughout government” 72 After a two month effort, this review came up with the rather stark conclusion that “the Nation’s approach to cybersecurity over the past 15 years has failed to keep pace with the threat.”73 To begin fixing this problem, the review recommended that the President clarify the cybersecurity-related roles, responsibilities, and authorities of the various federal agencies, as well as appoint a “Cyber Czar” to facilitate government and private cooperation in countering and responding to cyber incidents. Among the other two dozen recommendations was the need to improve cyber threat information sharing, intelligence gathering, and analysis. Over a year later, however, the GAO concluded that only two “of the 24 recommendations in the President’s cyber policy review have been fully implemented,” blaming this unresponsiveness on the lack of timely and proper guidance to different agencies, and the delay in appointing the proposed Cyber Czar, which did not turn out to be a valid reason for the slowness in executing the cyber review’s recommendations, as we will discuss.74
If at First You Don’t Succeed
Having already put priority on efforts to safeguard our critical infrastructure from cyber attacks, President Obama, in his first National Security Strategy (NSS) issued in 2010, reminded the nation of the broader need to “protect and reduce vulnerabilities in critical infrastructure” from physical as well as cyber threats.75 Obama spent much time and effort the following years persuading Congress to pass legislation on cybersecurity, such as the House-sponsored Cybersecurity Act of 2012, giving the federal government and the private sector tools necessary to protect our most critical infrastructures from growing cyber threats, which the Senate failed to pass.76 At this point, the President signed a classified Policy Directive which reportedly offered “updated principles and processes as part of an overarching national cyber policy framework” to guide federal agencies in defensive and offensive cyber-operations to block, thwart, preempt against, or respond to cyber threats, but which did not include guidance for the host of private owners and operators responsible for the preponderance of the nation’s critical infrastructure. 77
Turning his attention to gaining the confidence of private industry in the fight against cyber threats, Obama signed an Executive Order in early 2013, calling for the development of a “set of […voluntary] standards, guidelines and practices to help non-governmental organizations manage cyber risks to their critical infrastructures.” 78 In response, the National Institute of Standards and Technology (NIST) developed a Cybersecurity Framework that contained a set of “standards, guidelines, and practices to …help owners and operators of critical infrastructure better manage cyber risks while furthering their business interests, with incentives to help induce participation.”79 Still available, the Framework is not a one-size-fits-all approach, but can be tailored to suit the needs of different infrastructure sectors and organizations and will be updated through inputs as conditions change.80
Despite all these attempts by President Obama, a GAO Report to Congress in February 2013 observed that interagency battles for policy control, coupled with private sector concerns over too much government intrusion, have made it difficult for the Administration to develop and implement essential cybersecurity programs to contain the danger of cyber attacks against the nation’s CI/KR.81 Only a year later, another GAO Report told Congress in no uncertain terms that much more needs to be done to “accelerate the progress made in bolstering the cybersecurity posture of … the nation’s most critical…infrastructure systems.”82
In a reaction to the unending series of criticisms on how his Administration was handling the issue of cyber threats, the President produced a Cybersecurity National Action Plan (CNAP) in February of 2015, advertised as “the capstone of more than seven years of determined effort by this Administration, building upon lessons learned from cybersecurity trends, threats, and intrusions.”83 This ambitious initiative proposed near-term actions to help “deter, discourage, and disrupt malicious activity in cyberspace,” while offering longer-term actions aimed at fostering cybersecurity improvements by federal agencies and the private sector.84 In response to one of the CNAP’s recommendations, Obama established a Commission on Enhancing National Cybersecurity charged with proposing a series of actions to be taken over the next decade to improve the nation’s awareness of cyber threats as well as steps government agencies and private companies could take to protect our critical infrastructure “in light of current and projected trends in cybersecurity threats…”85
The Commission’s efforts, captured in their Report on Securing and Growing the Digital Economy, were provided to President Obama on the first of December this year, as scheduled, but were also directed at President-elect Trump to assist him in dealing with this challenging issue when he became Commander-in-Chief.86 Threats to our nation’s cybersecurity considered by the Commission were not limited to terrorists, but ran the gamut from other nations to criminal groups and online bandits. In their Report, the Commissioners examined a wide range of issues to determine “what is working well, where the challenges exist, and what needs to be done to incentivize and cultivate a culture of cybersecurity in the public and private sectors.” 87 The Commission’s findings are organized into 16 recommendations and 53 associated action items, all of which are said to flow from six so-called “major imperatives” and consistent with 10 so-called “foundational principles” – a rather overbroad and highly complex structure that masks many of the more significant outputs. In commenting on the Report, President Obama claimed that much progress has been made in cybersecurity during his two terms in office, but acknowledged that “now it is time for the next Administration to take up this charge and ensure that cyberspace can continue to be the driver for prosperity, innovation, and change – both in the United States and around the world.”88 Examples of steps the new Administration ought to consider in coming to grips with the risks from cyberspace include incentivizing government agencies as well as private entities to make cybersecurity a top priority for national security and economic reasons; employing the most cost-effective cybersecurity measures to protect our CI/KR against all forms of cyber threats; strengthening cooperation between the public and private sectors during all phases of a cyber-attack; and developing meaningful metrics for judging the efficacy of cybersecurity strategies. Noting the urgency of enhancing the nation’s cybersecurity, the Commission suggested that many of its recommendations be started during the all-important first 100 days of the Trump Administration.
In the meantime, DHS informed Congress that it is considering a variety of organizational changes that would enable the Department to better address “the realities of today’s cyber environment and its impacts on critical infrastructure.”89 As put by one expert, however, there are no “utopian” organizational solutions for solving the problem of dealing with threats from cyberspace, so Congress should not expect too much from any “reorganization of the deck chairs on the Titanic,” if this somewhat overworked metaphor can be used.90
The Sector Construct
Earlier we defined the concept of a critical infrastructure sector, but it is useful to trace the evolution of how many sectors have over the years been judged to be critical. In 1997, Clinton’s Presidential Commission on Critical Infrastructure Protection (PCCIP) highlighted eight broad sectors deemed vital to the security and economic well-being of the nation. Not to be outdone, President Bush’s 2002 National Strategy for Homeland Security (NSHS) identified 11 critical infrastructure sectors terrorists might be expected to target, subsuming and expanding the eight sectors identified during Clintons’ reign, but within a year Bush’s HSPD-7 had inflated the list to include 17 critical sectors while maintaining the essence of the 11 found in the NSHS.91 Five years later, President Bush approved adding an additional sector on critical manufacturing, bringing the total number to 18.92 Finally, in February 2013, Obama’s Presidential Policy Directive- 21 solidified the number of critical infrastructure sectors to the current set of 16 as summarized earlier, after making a few substantive and nomenclature changes.93
Whatever their numbers and types, an alphabet soup of organizations came into being as a means of ensuring that the nation’s critical sectors would be properly protected. More specifically, with the creation of the Department of Homeland Security (DHS), since early 2003 each of the critical sectors was assigned a Sector-Specific Agency (SSA) with the primary role of developing a Sector-Specific Plan (SSP) for use by all infrastructure stakeholders which would tailor national strategic guidance to the unique operating conditions of the sector in question.94 In addition, Sector Coordinating Councils (SCCs) were established as “self-organized and self-governed councils that enable critical infrastructure owners and operators, their trade associations, and other industry representatives to interact on a wide range of sector-specific strategies, policies, and activities…,” while Government Coordinating Council (GCCs) were formed as counterparts for each privately run SCC to ensure an appropriate balance between public and private interests. 95 Finally, Cross-Sector Councils (CSCs) were developed by The Partnership for Critical Infrastructure Security (PCIS) to enable leaders of each of the SCCs to consult among themselves on matters pertaining to critical infrastructure security and also to facilitate the engagement of private owners and operators with government officials at all levels “for the purpose of achieving consensus on joint priorities and actions to advance critical infrastructure security, protection and resilience.” 96
In addition to its involvement in the various critical sector organizations, DHS conducts visits and surveys of the nation’s high-priority infrastructures as a means of gathering information that can help SSA and SCC representatives decide how best to invest in strengthening the security and resilience of their respective facilities and systems.97 GAO recently concluded that the Department has made progress in employing these surveys and visits to evaluate how well critical infrastructures across the nation are protected against adversarial physical and cyber strikes and also to have the necessary resiliency in case such an incident happens, but nonetheless recommended that DHS needs to make additional improvements in producing timely and accurate assessments, including elimination of redundancy or gaps in methods used and improved coordination of vulnerability assessments.98
National Infrastructure Protection Plan (NIPP)
Homeland Security Presidential Directive (HSPD-7) called for the Secretary of Homeland Security “to produce a comprehensive, integrated National Plan for […CI/KR] Protection that would outline national goals, objectives, milestones, and key initiatives” for defense against terrorism, with the due date set for the end of 2004.99 Though the required deadline was not met, an interim product that came to be known as the National Infrastructure Protection Plan (NIPP) was published in early 2005, followed by a “for comment draft” so relevant agencies at all governmental levels and interested private entities would have more time to respond.
The first official NIPP was finally published by DHS in 2006, with the goal to “prevent, deter, neutralize, or mitigate the effects of deliberate efforts by terrorists to destroy, incapacitate, or exploit” the nation’s critical infrastructure vulnerabilities, ensuring that targeted entities have the ability to respond and recover rapidly from attacks.100 NIPP 2009 updated the first edition, with attention to developing a structure that would integrate the full range of efforts for defending the nation’s CI/KR into a unified effort.101 It also reminded the nation that terrorist attacks against our critical infrastructure “could significantly disrupt the functioning of government and business alike and produce cascading effects far beyond the affected [… target] and physical location of the incident, [… which] could result in large-scale human casualties, property destruction, […and] economic disruption.”102
NIPP 2013, still active pending a further edition, provides the foundation for an integrated and collaborative approach to achieve the vision of a nation “in which physical and cyber critical infrastructure remains secure and resilient, with vulnerabilities reduced, consequences minimized, threats identified and disrupted, and response and recovery hastened.”103 It also focuses more on ensuring greater alignment by the NIPP to the national preparedness efforts instituted by Presidential Directive PPD-8, which sought to prepare the nation at all public and private levels to deal with “threats that pose the greatest risk to the security of the nation, including acts of terrorism, cyber-attacks, pandemics, and catastrophic natural disasters.”104
Finally, while these issues appeared to various degrees in previous editions, the 2013 NIPP highlights seven basic tenets and a dozen calls for action designed “to guide the national effort over the next four years,” such as recognizing the unique diversity of the critical infrastructure community, relying upon joint public and private planning and actions for protecting CI/KR, developing greater understanding of cross-sector interdependencies, identifying and being able to respond to the potential cascading effects of attacks, and using an outcomes approach for evaluating progress toward achieving goals.105 This represented quite an agenda for Obama to follow, much of which was not accomplished, so these initiatives will fall into the hands of the next Administration.
Managing Risk
From its inception, DHS has sought risk methods that can result in cost-effective programs capable of providing assurance to all critical sectors that these assets are relatively safe and secure, especially when faced with the uncertain and unpredictable dangers of attacks by terrorists or violent extremists. Indeed, the Secretary for Homeland Security noted in 2005 that “tough choices must be made” […in allocating our limited resources] using “objective measures of risk.”106 This makes sense, since not all assets require the same level of protection, given variations in the criticality, vulnerability, and exposure of individual systems within a critical sector – so a risk-informed process is brought in to identify targets that would result in the highest consequences if attacked and which therefore require higher levels of protection.107 In other words, risk assessment is “the process of qualitatively or quantitatively determining the probability of an adverse event and the severity of its impact on an asset […providing] the basis for the rank ordering of risks and for establishing priorities for countermeasures.”108
Risk Management Framework
In an attempt to deal in an organized manner with risk as related to critical infrastructure protection, NIPP 2006 presented a comprehensive Risk Management Framework (RMF) that enabled decision makers to prioritize protection initiatives and investments across sectors in an effort to ensure that government and private resources are applied where they offer the most cost-effective benefits for mitigating risk when facing both physical and cyber threats from terrorists.109 The RMF comprised a generalized “ five-step process for identifying, prioritizing, applying, and evaluating infrastructure protection improvement measures.”110 In addition, recognizing the veritable menu of different risk methods available for use by federal representatives and private owners, DHS developed a set of standardized criteria – credibility, reproducibility, transparency, comparability, and accuracy – which could be adapted for use in assessing risk for each of the systems in each sector.111 The next edition, NIPP 2009, reinforced the need for a common RMF which would establish goals, assess risks, prioritize programs, allocate protective resources in ways that offer the greatest return on investment, and be adaptable and flexible enough to support risk assessments for all infrastructure stakeholders. 112
To actually calculate risks in connection with the hazards facing our CI/KR, the 2006 NIPP put forward the formula of risk as a function of the likelihood of an attack being attempted by an adversary (i.e., threat), the probability that an attack is successful (i.e., vulnerability), and the expected damage incurred in terms of such measures as fatalities, injuries, economic impacts, and psychological effects expressed in terms of dollars lost (i.e., consequences).113 This complicated risk formulation, where the three variables are interdependent, can be represented by the equation Risk = L (Attack) x P (Success | P (Attack) x C (dollars lost)).114 A simpler approach, with each of these variables individually estimated and then multiplied together as if they were independent, cannot be used for terrorist attacks where the adversary can adjust tactics in seeking to counter protective measures. Risk assessments become even more demanding if applied to complex adaptive systems (CAS), such as a variegated transportation network or an intertwined power grid, where nonlinear effects, feedback loops, and other complicating issues arise.115
In September 2006, DHS entered into contract with the American Society of Mechanical Engineers (ASME) to develop and apply a prototype version of a Risk Assessment Methodology for Critical Asset Protection or RAMCAP that would be consistent with the NIPP’s standardized risk criteria.116 As promoted, the purpose of this methodology is “to identify and prioritize investments in preparedness of the nation’s critical infrastructure, including protection….against hazards due to terrorism, naturally occurring events, and other potential threats.”117 The comprehensive and complicated RAMCAP process called for infrastructure assets to be characterized, threats to be established, consequence and vulnerability analyses to be conducted, and risks to be assessed and managed. RAMCAP was designated as the “centerpiece” of risk assessments in the 2006 NIPP, but did not appear in subsequent versions issued under the Obama Administration with DHS offering no explanation for this parting of the ways, leaving it to ASME to say farewell.118
National Research Council Report
Unhappy with how the Obama Administration was handling the overall issue of risk, Congress asked the National Research Council (NRC) to review and assess DHS’s overall risk analysis activities in 2008.119 Among the risk methods and models reviewed were those associated with terrorist attacks against the nation’s critical infrastructure, including the Strategic Homeland Infrastructure Risk Assessment (SHIRA) which annually helps decision makers understand the nature of the risks of terrorist attacks to each sector as well as a risk-based method for identifying chemical facilities to be regulated (CFATS) and a computer-assisted tool to assess and manage risks in the transportation sector (TRAM).120
In its 2010 Final Report, the NRC did not question DHS’s use of the formula risk as a function of threat, vulnerability, and consequences when seeking to prioritize and allocate resources for protecting critical sectors against natural disasters. However, when facing threats from terrorists or violent extremists whose targets and tactics can change rapidly and unexpectedly, the Council indicted DHS for employing inadequate risk methods, recommending this problem be taken care of rapidly.121 In this connection, the NRC examined the processes used by DHS’s Federal Emergency and Management Administration (FEMA) in allocating grant funds to States and local communities for the purpose of protecting their infrastructures from threats by terrorists. The Council noted that in recent years FEMA has used the formula of risk as the likelihood of an attack occurring multiplied by its consequences – while setting vulnerability at unity.122 Despite FEMA’s explanation that conducting infrastructure vulnerability assessments for all grant applicants would be too hard, the Council questioned the need to neglect infrastructure vulnerability and concluded that FEMA’s whole approach to risk is arbitrary and misleading – creating confusion and controversy on the part of applicants due to the lack of transparency of how the agency allocates federal resources to competing grantees in order to “buy down “risks. For all these reasons, NRC recommended that FEMA “undertake an external peer review of its risk-informed formulas for grant allocation … and improve the transparency of these crude risk models.” 123
Although the NRC Report questioned the utility of terrorist threat models, a year after it was published, a group of risk modeling experts announced that they were developing a model which simulated behaviors of interacting players, with terrorists as attackers and critical infrastructure owners as defenders using a three step game theory “defender-attacker- defender” approach.124 However, while creative, such mathematically-based attempts to model reality are not only complicated to employ, but produce outputs that are difficult for policy makers to interpret based on results that cannot be substantiated. This is why decision makers in many cases turn to qualitative methods instead to estimate risks, as the NRC explained, often relying upon expert opinion, an approach that has value but which brings its own challenges.125
In support of President Obama’s Preparedness Directive, a classified Strategic National Risk Assessment (SNRA) was undertaken in December 2011 by a group of experts from DHS, other Federal agencies, the intelligence community, and academic consultants “to help identify the types of incidents that pose the greatest threat to the nation’s homeland security,” positing a range of scenarios including a situation where a terrorist fires a man-portable improvised explosive device (IED) against “a concentration of people, and/or structures such as critical commercial or government facilities, transportation targets, or critical infrastructure sites.”126 Notwithstanding the expertise and information brought to bear, it was difficult to estimate accurately the frequency of terrorist attacks and equally challenging to gauge the severity of these impacts and put the diverse types of consequences into common units of measurement. The SNRA Report candidly acknowledged the many uncertainties, limitations, and caveats associated with the effort, though its results were used to help establish national preparedness levels.127
The SNRA Report also recognized the need to develop a separate risk method for stakeholders below the national level. This led FEMA to issue the Threat and Hazard Identification and Risk Assessment (THIRA) Guide in April 2012 for local owners of infrastructures that were potentially exposed to terrorist attacks or other hazards. FEMA worked hard to help these stakeholders compute risk using the THIRA process – estimating threats, developing scenarios, accounting for vulnerabilities, and calculating consequences – but the various steps were too complicated for typical users to execute without specialized expert support not always available.128
Taking Stock
In both governmental and private domains, risk methods for individual sector assessments are presently far more developed than approaches that compute and compare risks across the spectrum of critical infrastructure sectors, taking account of the complexities created by our nationwide network of assets and systems.129 This gap led to a flurry of activities by research institutions to investigate a variety of approaches for computing cross-sector risks, none of which has yet borne fruit.130
While DHS continues to seek ways to find the illusive common risk method, the Department’s Risk Steering Committee in 2010 published the second edition of the Risk Lexicon in another attempt to persuade all components to at least agree on risk fundamentals, and the Office of Risk Management and Analysis (RMA) soon issued a primer called Homeland Security Risk Management Fundamentals.131 However, neither calls for cooperation nor pedagogic publications have helped DHS find a well-supported risk-informed process for prioritizing and allocating resources to shield the nation’s CI/KR against terrorist threats. But this challenge is not new. Over a decade ago, a band of experts observed that in calculating the risk of potential terrorist attacks, private executives and government policymakers must grapple with far greater uncertainties than ever before…, “increasing the difficulty of developing policies and strategies for efficiently and effectively protecting the nation’s CI/KR.”132 Sadly, this observation rings true today, whether due to the intrinsic difficulty of finding a solution, or as some believe, the failure of DHS to find the best and the brightest risk experts from government, industry, and academia to attack this problem and bring together a synergy of expertise needed to do the job.
Integrating Resilience
A decade ago, making critical infrastructures resilient to physical attacks from terrorists or other hazards suddenly became a significant goal for stakeholders concerned with the defense of these vital assets. Since this concept seemed to have dozens of meanings cutting across many different fields of endeavor, the National Infrastructure Advisory Council (NIAC) stepped in to offer a definition of infrastructure resilience as “the ability to reduce the magnitude and/or duration of disruptive events […through the ability to] to anticipate, absorb, adapt to, and/or rapidly recover from […. such an] event.”133 As the NIAC sought to clarify, a resilient infrastructure has the ability to bend but not break, in contrast to protective measures which tend to be brittle and might fail when experiencing a powerful assault. Examples of enhancing the resilience of critical facilities include increasing redundancies, making buildings more robust, and developing systems that can “self-heal” after being damaged.134 These types of solutions, if incorporated into an infrastructure system, would enable its performance to degrade gracefully after absorbing a major blow, while sustaining minimum but critical services until it can restore its services as soon as possible to a satisfactory post-incident level.135
The CITF Report
In a 2006 Report to the DHS Secretary, the Critical Infrastructure Task Force (CITF) of the Homeland Security Advisory Council (HSAC) strongly advocated that resilience serve as the overarching framework for reducing risks associated with all threats to critical infrastructure, making critical infrastructure resilience (CIR) “the top level strategic objective—the desired outcome—to drive national policy and planning,” replacing the goal of critical infrastructure protection (CIP) that had been driving the national effort.136 Despite the sudden pressure from public and private organizations to emphasize CIR at the expense of CIP, however, DHS argued that protecting critical infrastructure assets and making them more resilient should serve as complementary not competitive approaches when seeking to reduce risks associated with terrorist attacks.137
From another perspective, the CITF members observed that “resilience is an important strategy to help mitigate the multitude of risks facing owners … of critical infrastructure.”138 This important comment went relatively unnoticed by the infrastructure community until four years after their Report was issued, DHS’s Homeland Security Studies and Analysis Institute undertook a comprehensive study of the relationship between risk and resilience, analytically validating the proposition that risk and resilience are inversely related – that is, the greater the resilience of a system, the lower the risk to that system from all hazards including terrorist attacks, while the lower the resilience of a system, the more it is at risk.139 The study demonstrated that this relationship can be translated into practical planning techniques that show how much the level of risk can be lowered when facing a given threat as a function of how much resilience is incorporated into a critical asset.140
Continuing to fly the flag of resiliency, President Obama proclaimed September 2009 National Preparedness Month, explaining that a resilient nation is “one in which individuals, communities, and our economy can adapt to changing conditions as well as withstand and rapidly recover from disruptions due to emergencies.”141 And a year later the President made the argument in his first NSS that when incidents occur we must be resilient by being able to adapt to changing conditions, prepare for and withstand a disruption, maintain critical functions and rapidly recover from this incident, and then return to normalcy.142 Obama reaffirmed in his 2015 NSS that the federal government is “working with the owners and operators of our Nation’s critical cyber and physical infrastructure across every sector… to decrease vulnerabilities and increase resilience.”143
The Business Case
The CITF Report argued that the business case for investments in CIR “are both compelling and well aligned with private sector interests, a necessary condition for progress given the private sector ownership of the vast majority of our infrastructures.”144 A decade later, a Report by the Congressional Research Service (CRS) concluded there was relatively little direct government support or incentives for private sector owners or operators to implement resilience-oriented measures for their critical infrastructures…recommending that Congress might investigate whether market forces are sufficient to drive such investments and if not whether government assistance measures might be needed.145 Meanwhile, the PS-PrepTM program had already started to operate under FEMA’s auspices with the goal of improving the preparedness of private sector and not-for-profit organizations through […voluntary] conformance to consensus-based…standards and best practices, “while DHS had earlier put in place a Ready Business mentorship program where smaller businesses are paired with larger companies to learn about resilience measures.”146
While it took time for this message to take hold, in recent years investments in resilience have come to be seen as good business practices for many private entities across all sectors, with an increasing number of corporations “embracing resilience as a framework to maintain core operations, fulfil corporate responsibilities, and develop new business opportunities as global economic, social and environmental conditions shift ever more rapidly.”147 Firms began to understand that investments in resiliency can improve customer confidence in their processes and products by giving them a greater capacity to keep functioning in the event of a major hazard.148 To help “make buildings and tunnels terror-resistant and terror-resilient,” DHS even initiated the Building and Infrastructure Protection publication Series (BIPS) for use by city planners, architects, engineers, and builders.149 In addition, with an eye on the private sector, plans were announced in April 2016 for DHS and the University of Illinois to jointly launch a Critical Infrastructure Resilience Institute (CIRI) that will seek to develop new technologies and business approaches for improving the security and resiliency of critical infrastructures.150
Public and Private Partnerships
The fact that most of the nation’s critical infrastructures are privately owned and operated means that “the government must work closely with the private sector in developing a […coordinated] strategy for defending these facilities from terrorist attacks and ensuring their resiliency in the event of such incidents.”151 DHS assumed the responsibility for making this happen, reaffirming late last year that “this endeavor is a shared responsibility among Federal, state, local, tribal, and territorial entities, and public and private owners and operators of critical infrastructure.”152 In principle, partnerships should work in mutually supportive ways where private actors “are best positioned to determine and implement risk-mitigation strategies to reducing the vulnerability of the CIKRs they own and operate to various disruptions, […while] government agencies can contribute essential resources to CIKR protection and are also well positioned to address threats.”153 In practice, however, over the years it has proved difficult to forge and sustain this relationship, given the differing views of public and private entities in why and how they safeguard critical sectors.
The Role of NIPPs
Private partners were involved in the production and execution of the three NIPPs issued thus far, given that these owners and operators control the bulk of our critical infrastructure systems. From the outset, private industry assisted in developing and implementing these plans via their representatives on the sector coordinating and cross sector councils – helping them obtain sensitive information from the federal government on evolving threats and, in turn, enabling them to offer assistance to government representatives on methods for protecting the various sectors.
Stressing the need for partnership, in the preface to NIPP 2006, the Secretary of Homeland Security argued that continued collaboration and cooperation among government agencies and private businesses is essential in securing the nation’s critical infrastructure.154 Consistent with its subtitle, Partnering to Enhance Protection and Resiliency, NIPP 2009 stressed the importance of “public and private partners working together to secure our national-level CI/KR, promoting an environment in which owners and operators, responsible for the bulk of the nation’s infrastructure, can better carry out their sector protection responsibilities.”155 NIPP 2013, Partnering for Critical Infrastructure Security and Resilience, stressed even more the need for federal departments and agencies to work with State, local, regional, and private sector partners in promoting continuous improvement of security and resilience efforts. 156 NIPP 2013 also made the point that industry needs to be encouraged “to go beyond what is in their commercial interest and invest in the national interest through active engagement in partnership efforts with federal agencies in safeguarding critical infrastructure.” 157 Tensions rose, however, as federal agencies bound by government regulations on the protective initiatives clashed with industry owners who relied upon voluntary security measures, often employing best practices, to defend their vast infrastructure network.
Involvement in the NIPP process should have made company executives aware of the need to cooperate fully with the federal government in safeguarding the nation’s CI/KR, since their assets constitute “primary strategic targets of contemporary terrorism […and attacks by these adversaries] can cause severe and cascading economic damages not only to the targeted businesses but […to] other sectors in a country’s overall critical infrastructure ….” 158 Yet many executives continue to put top priority on the bottom line – that is, to manage profitable businesses with little “commercial incentive to fund vulnerability reductions, […largely] because these costs in their view outweigh the benefits of reducing the risk from terrorist attacks.159
Stimulating Partnerships
Early in his second term Obama issued Presidential Policy Directive-21, which highlighted the need for streamlining how the current public-private partnership operates in estimating physical or cyber-attacks threats to our CI/KR and in cooperating with each other if such attacks occurred.160 To these ends, the Directive established a National Infrastructure Coordinating Center (NICC) within DHS with the mission of exchanging key information in the event of physical threats, as well as a National Cybersecurity and Communications Integration Center (NCCIC) with the responsibility of serving as “a 24×7 cyber situational awareness, incident response, and management center [… that] shares information among public and private sector partners to build awareness of vulnerabilities, incidents, and mitigations.”161 While the NICC has operated as planned, the NCCIC had no regulatory authority to impose cyber security measures, which led to federal agencies seeking to meet their individual policy goals facing off with private companies striving to meet their financial needs, thus stalling forward progress in the fight against cyber terror threats to our critical infrastructure. 162
In an effort to gain the needed support from industry, President Obama proclaimed November of 2013 Critical Infrastructure Security and Resilience Month, telling the American people that the country was seeking new ways to strengthen public-private partnerships so we can better manage risks to our critical infrastructure and mitigate the adverse effects of terrorist attacks if they occur.163 This public proclamation did not seem to have the desired effect on industry, as most private infrastructure owners seemed to be more concerned about natural or accidental hazards than terrorism, although many safeguards against these dangers can also help protect against terrorist strikes, especially for electric power, oil and gas, and water and wastewater, systems.164 Among those who have tried to persuade captains of industry to change their perspectives is an expert on the U.S. power grid who proclaimed that protecting our infrastructure from both cyber and physical threats requires “a holistic approach to security” with shared responsibilities between industry and government.165 Yet private owners and operators, wearing their business hats, continue to stand their ground as DHS and other federal officials keep up their efforts to find common ground on the issue of critical infrastructure protection.
As it turns out, private owners alone should not be blamed for a lack of progress in cooperative endeavors. After all, as discussed earlier, it was a group of businessmen who formed The Partnership for Critical Infrastructure Security (PCIS) and established the Critical Infrastructure Partnership Advisory Council (CIPAC) – a private organization that continues to convene meetings between industry and government on issues affecting a variety of critical sectors, including nuclear, financial services, energy, emergency services, dams, and transportation systems with a focus on aviation.166 Perhaps more such initiatives by CIPAC will pay off in moving both sides closer together if both businessmen and bureaucrats dedicate themselves to ensuring the safety of the nation’s CI/KR. 167
Efforts to coordinate cybersecurity policies have entailed their own challenges and need to be discussed separately largely because “[m]ost of the work that needs to be done to secure cyberspace is in the private sector, but private enterprise and government agencies have not been on the same page […and it will] take time for all the stars to align.”168 These were the words of one of the Cyber Czars appointed by President Obama with the responsibility of harmonizing public-private cybersecurity programs, but who encountered difficulties in doing so and stepped down from this post after serving for two and a half years to be replaced by another Czar, in an unproductive and somewhat laughable “musical chairs” process spanning most of the Bush and Obama years. 169 This constant failure of Cyber Czars to coordinate public and private efforts to defend our critical infrastructures from cyber threats demonstrates the difficulty of bringing both of these sides together in what ought to be a common battle, not only in cyberspace but also on the ground where we still need greater coordination to safeguard our CI/KR from physical attacks.
Conclusions
While progress has been made in reducing the risk of attacks against the nation’s CI/KR from terrorists and violent extremists, more can be done to lower the level of risk still further in the face of evolving and increasingly aggressive threats, especially more sophisticated cyber-attacks. However, despite concerns over potentially cascading nationwide consequences, we have not yet experienced major attacks on our critical infrastructure systems that caused such a serious adverse impact. On the one hand, this might mean that we have been successful in meeting the condition put forward in 1993 by President Clinton that the nation’s protective programs must ensure that any deliberate “interruption or manipulation of [… our] critical functions … be brief, infrequent, manageable, geographically isolated, and minimally detrimental to the welfare of the United States.”170 On the other hand, this good news might mean that our adversaries do not yet have the means to strike at our infrastructure targets in ways that would lead to adverse consequences that ripple throughout the nation – falling short of Al Qaeda’s imputed objectives “to attack rich and visible components of the nation’s critical infrastructure to disrupt the U.S. economy, undermine confidence in the monetary system and inflict fresh wounds in the American psyche.”171 In either case, it is time to review the following five conclusions drawn from the previous analyses. 172
[1]Defending against Terrorism
Studies upon studies have tried to understand, anticipate, and interpret the when, where, and how of terrorist attacks against CI/KR targets, but with limited results.173 Improved intelligence on the plans and capabilities of dangerous individuals and groups who might attack our infrastructure is indispensable, but difficult to acquire, process, and distribute in a timely manner. Moreover, “unlike natural disasters that are controlled by … Mother Nature,” clever adversaries can adjust their tactics and/or target selection to overcome or work around our defensive strategies.174 Additionally, the sheer complexity of the sector system, with its shifting array of critical sectors supported by a multifaceted management system, has become a hindrance to decision-makers seeking to deploy specific protection programs to reduce the risk of terrorist attacks against potential targets in each sector. DHS attempts to simplify this complicated sector structure have run into an entangling web of legal and regulatory matters, particularly related to cyber security.175
[2]Ensuring sectors are “critical”
In a recent article, an expert observed that the nation has for decades “been expending resources on misaligned efforts to protect thousands of facilities, the destruction or disruption of which would not cause widespread damage or cascading effects and should not be designated as critical.”176 Whether the number is eight, 11, 16, 17, or 18, this comment leads to the conclusion that it has indeed been a mistake to have continued for decades to designate a set of critical infrastructure sectors as virtually indispensable to the economic health and social functioning of the nation when the disruption or even the loss of many of the systems in so-called “critical” sectors would not have nationwide consequences but at worst would cause unwanted implications for various localities or areas. What we have not seen is a “shared effort between the private sector and the federal government…to disaggregate what is ‘critical’ …from what is ‘dangerous’ … but not necessarily critical.”177 Applying such a process would make it easier to establish priorities and allocate limited resources to protect those systems or sectors of true national significance by removing assets of significance only to regions or localities.178
[3] Developing Appropriate Risk Methods
Despite the National Research Council’s urgent plea that DHS improve its risk management processes against physical and cyber threats to our CI/KR, the Department has shown no serious signs of pulling together the divergent risk methods employed by its components to develop a common platform that can be adapted to account for specific threats to be faced as well as the particular characteristics of each system in each sector that might be a target. Meanwhile, the private sector has continued to employ a conglomerate of fundamentally different risk methodologies, moving away rather than towards a common platform.179 In addition, critical systems are becoming so complex that many of the traditional methods of risk analyses no longer apply, requiring a common platform to provide more sophisticated tools. Finally, a common risk platform would support “cross-sector risk comparisons for investment, planning, and resource prioritization decisions,” benefitting the entire community of critical sector proprietors.180
[4] Countering Cyber-threats
There are no foolproof solutions for securing critical infrastructure targets against anticipated cyber-attacks from terrorists. The cyber security technologies we currently rely upon to control many of our most critical infrastructures were not designed to withstand deliberate cyber-attacks employing advanced technologies in an attempt to subvert, disable, or destroy the functioning of these targets.181 The best defensive technological solutions we now have available can only try to disrupt a multistage cyberattack while it is in progress, which generally offers only one opportunity to discover and intercept the intrusion before serious damage is done.182 Moreover, as we improve our capabilities, our opponents are sure to apply innovative tactics to try and overcome our cybersecurity measures in what one expert said might resemble an arms race in cyberspace.183 To make matters worse, hampering our defensive efforts is the unwillingness and/or inability of DHS and other federal agencies to share fully sensitive cybersecurity information with private owners and operators, while private security experts have little faith in government regulations. These impediments have prevented the development of an effective cybersecurity strategy, without which we will not have the capabilities needed to deal with the growing threat of cyber attacks on our critical infrastructures.
[5] Measuring Progress
Like all federal agencies, since inception DHS has been required by law to produce an Annual Performance Report that presents performance measures for each of its offices and components based on realistic metrics.184 In addition, Presidential Directive HSPD-7 required each Sector Specific Agency (SSA) to produce an Annual Report for DHS that provided sector-level performance feedback for major activities, highlighting programs that reduced risks to CI/KR from adversary attacks while identifying and potentially eliminating protective activities that did not meet this objective.185 However, these requirements were not satisfactorily met. The Office of Management and Budget (OMB) concluded in 2006 that neither DHS nor its SSAs had developed acceptable performance goals or established specific annual and longer-term cross sector performance measures and metrics.186 One major shortcoming is that these assessments relied upon “bean-counting” – the number of activities or percentage of desired actions – not outcome measures that gauge how well specified activities contributed to the overall infrastructure security strategy.187 NIPP 2013 sought to correct this problem by calling for critical infrastructure partners “to identify high-level outputs or outcomes to facilitate evaluation of progress” toward the National Plan’s goals and priorities. 188 However, a 2015 GAO Report concluded that SSAs needed to “better measure cybersecurity progress,” which is more demanding than measuring progress in physical protection of CI/KR.189 In July of this year, DHS instituted a new process of identifying assessment tools, the same time that a GAO expert testified that DHS had made progress in improving their processes for conducting critical infrastructure assessments, but told members of a House subcommittee that further enhancements are needed. 190
Recommendations
With President Obama no longer in office, it is up to the next Administration to deal with the dangers of safeguarding our network of critical infrastructure sectors against physical and cyber-attacks. Accordingly, President Trump should ask his Homeland Security Secretary to undertake the following steps.191
- Improve the safety of our critical infrastructure against terrorism…Pull together a panel of federal, industry, and academic experts to examine how the nation can improve its defenses against physical and/or cyber-attacks by intelligent adversaries, develop mutually reinforcing strategies for physical and cybersecurity protection and resilience, and take steps to enhance these strategies by applying currently available methods as well as harnessing new technologies, with funds available for government initiatives and federal financial support for private stakeholders.
- Ensure that critical sectors are actually “critical”… Apply strict criteria to only identifying targets with national implications if disrupted or destroyed as “critical,” ensure that these assets are given federal attention and resources to safeguard them from terrorist attacks, thus narrowing the number of currently categorized critical infrastructures, reducing the number of sectors and/or systems within sectors, and reorienting the sector construct as appropriate.
- Develop a risk method for informed infrastructure decisions … With assistance from a panel of experts; formulate a common risk concept acceptable to government and industry that can be adapted as necessary for each of the systems in each sector, and also provide a credible, transparent, reproducible, and accurate cross-sector risk methodology for discovering weaknesses, ensuring that priorities are established, and allocating resources in a balanced manner.
- Develop policies for measuring progress… Assign high priority to development of a set of outcome-based measures and metrics that can enable the Department to rate how well each of the truly critical sectors have been protected against a spectrum of physical and cyber terrorist threats, including their resiliency if attacked in terms of degradation speed and recovery rate.
- Getting Congress on Board… Work diligently with Congressional leaders on both sides of the aisle to pass legislation that supports policies and programs to make our critical infrastructure more secure against physical as well as cyber-attacks from terrorists and violent extremists, avoiding overregulation that can tie the President’s hands and alienate the private sector.
If the above recommendations are heeded, we may be able to properly if not perfectly prepare the nation to defend its truly critical infrastructure from deliberate attacks, even as our adversaries develop new offensive tactics and technologies to counter our defenses and attack these targets. If this is not done, the incoming administration will continue to try and protect too many non-critical systems at the expense of defending those targets that have national significance, will fail to forge a cohesive national effort in securing our infrastructure by not gaining needed cooperation between government and industry, and will establish more commissions that keep going over the same old issues – with decision-makers staying in the same place no matter how hard they try to move ahead, as if they were running on a “human treadmill.”192
What is needed to break this cycle is clear and convincing support from the next President, DHS, and other federal agencies with responsibilities for protecting critical infrastructure systems attacks, private owners and operators who cooperate with the federal government in reducing the risks to our infrastructure and a bipartisan Congress that will pass legislation necessary for protecting critical sectors without encumbering private owners with mandates that limit their capability and creativity. In sum, by implementing cost effective, risk-informed protective and resilience measures, we should be able to prevent, mitigate the effects of, and respond to future attacks by terrorists and violent extremists that could adversely impact the functioning of our government, businesses, transportation and communication systems, energy supplies and distribution, and essential public services.
About The Author
Jerome H. Kahan is an independent analyst with over 40 years of experience in national and homeland security, having held senior positions in government and the private sector. At the State Department, he was a member of the Policy Planning Staff, Deputy Assistant Secretary for Intelligence and Research, and Counselor with the U.S. Embassy in Turkey. Mr. Kahan has also worked as a Senior Fellow with various research organizations, including the Brookings Institution, where he wrote or contributed to books and articles, and the Homeland Security Studies and Analysis Institute, where he managed projects on risk, resilience, and terrorism. Mr. Kahan taught as an Adjunct Professor at Georgetown University, and been a member of the Council on Foreign Relations and the International Institute of Strategic Studies. He has a master’s degree from Columbia University in Electrical Engineering and a Bachelor of Science Degree from Queens College. He may be reached at jhkahan@cox.net
Notes
1 Fact Sheet, NIPP 2013: Partnering for Critical Infrastructure Security and Resilience, https://www.dhs.gov/sites/default/files/publications/NIPP_FactSheet_0.pdf .
2 Senator Patrick Leahy, “International Terrorism: The Threat to the United States,” Remarks to the Senate, Congressional Record, S1642, February 26, 1990, http://fas.org/irp/congress/1990_cr/s900226-terror.htm .
3 Kathy Ann Brown, Critical Path: A Brief History of Critical Infrastructure Protection in the United States, Spectrum Publishing Group, Inc. (Fairfax, Virginia, June 2006), 71-72. The last plane was prevented from doing further damage to a target assumed to be somewhere in the nation’s capital, possibly the White House, through heroic actions by passengers who took control, forcing the aircraft to crash into a desolate site taking the lives of all aboard.
4 Judith Miller, “Departing Security Official Issues Warning on Cyber Threats,” Computer Crime Research Center (CDRC), February 2003, http://www.crime-research.org/news/2003/02/Mess0601.htm.
5 James R. Clapper, Director National Intelligence, Worldwide Threat Assessment of the US Intelligence Community, Statement Before Senate Armed Services Committee, (Washington, DC, February 9, 2016), https://www.armed-services.senate.gov/imo/media/doc/Clapper_02-09-16.pdf .
6 Congressional Budget Office, Public Works Infrastructure: Policy Considerations for the 1980s, (Washington, DC, April 26, 1983), https://www.cbo.gov/sites/default/files/98th-congress-1983-1984/reports/doc20-entire.pdf .
7 Congressional Budget Office, Issues and Options in Infrastructure Investment, CBO Paper, (Washington, DC, May 2008), https://www.cbo.gov/sites/default/files/110th-congress-2007-2008/reports/05-16-infrastructure.pdf .
8 John Moteff, et al., Critical Infrastructures: What Makes an Infrastructure Critical? Report for Congress, Congressional Research Service, (Washington. DC, January 29, 2003), http://fas.org/irp/crs/RL31556.pdf .
9 Federal Emergency Management Agency, Surveillance Targets, (Department of Homeland Security, Washington, DC, n.d.), https://emilms.fema.gov/is914/SD0101100text.htm . Terrorists historically have focused their attention on such critical infrastructure target as government and financial centers, political and economic targets, national icons , and other places where large numbers of people gather, often conducting surveillance of possible targets prior to conducting attacks.
10 US Department of Justice, The USA PATRIOT Act: Preserving Life and Liberty, (Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism), (Washington, DC, October 26, 2001), https://www.justice.gov/archive/ll/what_is_the_patriot_act.pdf) .
11 Joshua Sinai, “New Trends in Terrorism’s Targeting of the Business Sector,” Mackenzie Institute, (Syracuse, NY, May 5, 2016), http://mackenzieinstitute.com/new-trends-in-terrorisms-targeting-of-the-business-sector/ .
12 Department of Homeland Security, “What Is Critical Infrastructure?” (Washington, DC, January 8, 2016), https://www.dhs.gov/what-critical-infrastructure .
13 Department of Homeland Security, “Critical Infrastructure Sectors,” (Washington, DC, October 27, 2015), https://www.dhs.gov/critical-infrastructure-sectors .
14 The USA PATRIOT ACT. http://www.olcu.org/PDFs/USPatriotAct_Summary.pdf This Act, an acronym for Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism, has the purpose of deterring and punishing terrorist acts, enhancing law enforcement investigatory capabilities, and ensuring that financial institutions establish effective programs to fight money laundering. SEC. 1016 includes reference to the Critical Infrastructure Protection Act of 2001, whereby Congress made findings that inter alia “A continuous national effort is required to ensure the reliable provision of cyber and physical infrastructure services critical to maintaining the national defense, continuity of government, economic prosperity, and quality of life in the United States…[and recommended] that any physical or virtual disruption of the operation of the critical infrastructures of the United States be rare, brief, geographically limited in effect, manageable, and minimally detrimental to the economy, human and government services, and national security of the United States […to] be carried out in a public-private partnership involving corporate and non-governmental organization….” This Act defined critical infrastructure as ”systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.” Page 115 STAT. 401. The term “key assets” was initially used in the phrase “Critical Infrastructure and Key Assets” (CI/KA) but then “key resources” appeared as in “Critical Infrastructure and Key Resources” (CI/KR) with key assets considered to be subsumed within appropriate critical infrastructure sectors. See Critical Infrastructure and Key Resources Support Annex, (Department of Homeland Security, January 2008), 31, https://www.fema.gov/pdf/emergency/nrf/nrf-support-cikr.pdf; In addition, see John D. Moteff, Critical Infrastructures: Background, Policy, and Implementation, Congressional Research Service (Washington, DC, June 10, 2015), 7, ttps://www.fas.org/sgp/crs/homesec/RL30153.pdf .
15 John Moteff, Critical Infrastructure: The National Asset Database, (Congressional Research Service, Washington, DC, Updated July 16, 2007), 7 https://www.fas.org/sgp/crs/homesec/RL33648.pdf .
16 Office of Inspector General, Department of Homeland Security, Progress in Developing The National Asset Database, (Washington, DC, June 20, 2006), https://www.nytimes.com/packages/pdf/politics/20060711_DHS.pdf .
17 National Critical Infrastructure Prioritization Program, IT Law Wiki, http://itlaw.wikia.com/wiki/National_Critical_Infrastructure_Prioritization_Program .
18 Ted G. Lewis, Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation, 2nd Edition: (Hoboken, New Jersey: John Wiley & Sons, November 2014) chs 1, 3.
19 PUBLIC LAW 110–53, Improving Critical Infrastructure Security, National Asset Database, An Act To Provide for the Implementation of the Recommendations of the National Commission on Terrorist Attacks Upon the United States,110th Congress, 121 STAT. 266, TITLE X, August 3,2007, https://www.nctc.gov/docs/ir-of-the-9-11-comm-act-of-2007.pdf .
20 Office of the Inspector General, Efforts to Identify Critical Infrastructure Assets and Systems, (Department of Homeland Security, June 30, 2009), https://www.oig.dhs.gov/ .
21 Government Accountability Office, Critical Infrastructure Protection: DHS List of Priority Assets Needs to Be Validated and Reported to Congress, (Washington, DC, March 25, 2013), http://www.gao.gov/products/GAO-13-296 .
22 Department of Homeland Security, “What is Critical Infrastructure?”(Washington, DC, August 26, 2015), http://www.dhs.gov/what-critical-infrastructure .
23 John Hayward, “Defining Terrorism,” Red State, April 16, 2013, http://www.redstate.com/jhayward13/2013/04/16/defining-terrorism/ .The official list of violent extremist entities includes sovereign citizen and anti-government fanatics as well as racists, bigots, anarchists, white supremacists, right and left-wing radicalists, neo-Nazi fascists, domestic militias, anti-religious zealots, anti-abortion extremists, civil liberties advocates, and even environmental activists. U.S. Code: Title 6 – Domestic Security, https://www.law.cornell.edu/uscode/text/6 .
24 The White House, The National Strategy for the Physical Protection of Critical Infrastructure and Key Assets, (Washington, DC, February 2003),7, https://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf .
25 Brian Jenkins, “The Implications of the Paris Terrorist Attack for American Strategy in Syria and Homeland Security,” Testimony presented before the Senate Homeland Security and Governmental Affairs Committee, RAND Office of External Affairs,(Washington, DC, November 19, 2015), http://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT445/RAND_CT445.pdf. See also Philip Auerswald et al., The Challenge of Protecting Critical Infrastructure, Issues in Science and Technology, Vol XXI, (1), Fall 2005, http://issues.org/22-1/auerswald/ .
26 Potential Terrorist Attack Methods, Joint Special Assessment, DHS/Homeland Infrastructure Threat and Risk Analysis Center and FBI/Threat Analysis Unit, (Washington, DC, April 23, 2008), http://nsarchive.gwu.edu/nukevault/ebb388/docs/EBB015.pdf .
27 Lord Lyell, Chemical and Biological Weapons: The Poor Man’s Bomb, General Rapporteur, Draft General Report, Section II, North Atlantic Assembly International Secretariat, October 4, 1996, http://fas.org/irp/threat/an253stc.htm. The simplest forms of chemical agents are elements or compounds such as chlorine, hydrogen cyanide, and mustard gas, while more powerful agents much more difficult to produce, handle, and deliver include sarin and VX. Some biological agents are even more toxic than chemical agents, and include viruses and bacteria, some of which are more effective and hard to produce and deliver and handle such as anthrax, bubonic plague, and typhus. Delivery devices can include bombs that release agents when exploded, aerosol sprayers, and punctured plastic containers as used in the Tokyo subway system attack in 1995. See Tomohiro Osaki, “Deadly Sarin Attack on Tokyo Subway System 20 years Earlier Recalled,” Japanese Times, March 20, 2015, http://www.japantimes.co.jp/news/2015/03/20/national/tokyo-marks-20th-anniversary-of-aums-deadly-sarin-attack-on-subway-system/#.vp5bfof2zv5 .
28 Ibid., 30.
29 To understand how the nation’s infrastructure can be considered a complex system that is difficult to analyze, see Yaneer Bar-Yam , Dynamics of Complex Systems, Studies in Nonlinearity, First Edition, (Boulder CO: Westview Press: 1997), http://necsi.edu/publications/dcs/ See also, John Robles, et al., “Common Threats and Vulnerabilities of Critical Infrastructures,” International Journal of Control and Automation, Vol 1(1), 17-22, https://www.researchgate.net/publication/46212902_Vulnerability_reduction_of_infrastructure_reconstruction_projects .
30 Luca Montanari & Leonardo Querzoni (Eds.), Critical Infrastructure Protection: Threats, Attacks and Countermeasures, TENACE Project (protect national critical infrastructures from cyber threats), March 2014. This concern was reflected in the conclusion reached in a 2012 study by the Federal Energy Regulatory Commission (FERC) that if coordinated attacks against the U.S. power grid managed to disable only a small number of the nation’s 55,000 electric substations, this could result in “coast-to-coast blackouts lasting 18 months or more.” Rebecca Smith, U.S. Risks National Blackout From Small-Scale Attack Federal Analysis Says Sabotage of Nine Key Substations Is Sufficient for Broad Outage,” The Wall Street Journal, March 12, 2014, http://www.wsj.com/news/articles/SB10001424052702304020104579433670284061220.The FERC Study, in turn, confirms the work of modeling experts who found that an adversary looking to disrupt our electric power grid would only need to target certain substations to initiate a cascading failure. See Paulo Shakarian, et al., “Power Grid Defense Against Malicious Cascading Failure,” EECS and Network Science Center, U.S. Military Academy, West Point, NY, January 6, 2014, http://www.usma.edu/nsc/siteassets/sitepages/publications/power_grid_def.pdf .
31 Jose Paglier, “ISIS is Attacking the U.S. Energy Grid (and Failing),” CNN Money, October 16, 2015, http://money.cnn.com/2015/10/15/technology/isis-energy-grid/. A best-selling book by Ted Koppel, Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath, published in 2015, argues there is a high likelihood of a cyber-attack on the nation’s power grid that would result in catastrophic consequences, an incident for which he believes we are totally unprepared. However, this frightening conclusion was not based on much evidence or expert opinion, and as one reviewer put it, what little substance the book has “is misleading and ill-informed.” See William Pentland, “A Review Of Ted Koppel’s ‘Lights Out!,” “Forbes Magazine, April 24, 2016, http://www.forbes.com/sites/williampentland/2016/04/24/a-review-of-ted-koppels-lights-out/#2a2beda0e686.
32 David Riedman, “Questioning the Criticality of Critical Infrastructure: A Case Study Analysis,” Homeland Security Affairs 12, Essay 3, May 2016, https://www.hsaj.org/articles/10578 .
33 Laurence W. Zensinger, “Protecting Infrastructure Against Attack,” BE Magazine, Vol 2,(1), http://www.dewberry.com/docs/defaultsource/documents/protecting_infrastructure_against_attack_1.pdf . Among steps that can prevent cascading effects include hardening enclosures for critical transformers and more sophisticated solutions as developing “self- healing” grid systems or deploying a nationwide system with the feature that failure in one sector would cause the overall system to break into a series of isolated “islands” that can preclude further cascading leading to a nationwide blackout. Massoud Amin & Phillip F. Schewe, “ Preventing Blackouts: Building a Smarter Power Grid,” Scientific American, August 13, 2008, http://www.scientificamerican.com/article/preventing-blackouts-power-grid .
34 Department of Homeland Security, Potential Terrorist Threat to the U.S. Information Infrastructure, Homeland Security Assessment, Critical Infrastructure Threat Analysis Division, June 5, 2007, https://cryptome.org/ii-threat.pdf .
35 Joseph Nye, “Power and National Security,” in Cyberspace Security and Prosperity in the Information Age, Vol II, CNAS America’s Cyber Future, June 2011,181, https://www.cnas.org/files/documents/publications/CNAS_Cyber_Volume%20II_2.pdf .
36 Taylor Armerding, “U.S. Rattles Preemptive Cyberattack Saber,” CSO, October 18, 2012, http://www.csoonline.com/article/2132403/malware-cybercrime/u-s–rattles-preemptive-cyberattack-saber.html (CSO provides news, analysis and research on security and risk management).
37 Sandor Vegh, “Hacktivists or Cyberterrorists? The Changing Media Discourse on Hacking,” First Monday, Vol. 7, (10), October 2012, http://firstmonday.org/article/view/998/919#author . “Recently, terrorists have indeed been using cyberspace as a means for intruding into many of our infrastructure assets to create confusion and gather sensitive information, whether launched from afar by trained terrorists or from home computers close to targets possibly instigated by insiders.” Remarks by FBI Director James B. Comey, International Conference on Cyber Security, Fordham University, New York, January 7, 2015, https://www.fbi.gov/news/speeches/addressing-the-cyber-security-threat h .
38 Gregory C. Wilshusen, “Cybersecurity: Threats Impacting the Nation,” Testimony Before the Subcommittee on Oversight, Investigations, and Management, Committee on Homeland Security, House of Representatives,(Washington, DC, Government Accountability Office, April 24, 2012), https://homeland.house.gov/files/Testimony-Wilshusen.pdf .
39 James Andrew Lewis, “Cyber Threat and Response:Combating Advanced Attacks and Cyber Espionage,” (Washington, DC, Center for Strategic and International Studies, March 2014), https://www.ciaonet.org/attachments/24819/uploads .
40 Andrew Hildick-Smith, “Security for Critical Infrastructure SCADA Systems,” GSEC Practical Assignment, Version 1.4c, Option 1, SANS Institute InfoSec Reading Room, February 23, 2005, https://www.sans.org/reading-room/whitepapers/warfare/security-critical-infrastructure-scada-systems-1644 .
41 National Academies Press, Terrorism and the Electric Power Delivery System, Board on Energy and Environmental Systems, Division on Engineering and Physical Sciences, (Washington DC, November 14, 2012), http://sites.nationalacademies.org/cs/groups/depssite/documents/webpage/deps_073368.pdf .
42 National Risk Estimate: Risks to U.S. Critical Infrastructure from Insider Threat, Homeland Infrastructure Threat and Risk Analysis Center (HITRAC), Executive Summary, (Washington, DC, December 2013), 11, %20Risks%20to%20US%20Critical%20Infrastructure%20from%20Insider%20Threat%20-%2023%20Dec%2013.pdf.
43 Tom Williams, “Countering the Terrorism Cyber-Threat,” Infosecurity Magazine, November 13, 2015, http://www.infosecurity-magazine.com/blogs/countering-the-terrorism/ .
44 The White House, Memorandum for the Vice President, etc., Subject: U.S. Policy on Counterterrorism, From William J. Clinton, (Washington, D C, June 21, 1995), http://fas.org/irp/offdocs/pdd39.htm .
45 Executive Order 13010, Critical Infrastructure Protection, (Washington, DC, July 15, 1996), http://fas.org/irp/offdocs/eo13010.htm.
46 This Executive Order created an interim Infrastructure Protection Task Force (IPTF) within the Department of Justice and chaired by the FBI in order to “increase coordination of existing infrastructure protection efforts in order to better address, and prevent, crises that would have a debilitating regional or national impact.” Note that IPTF’s functions were later encompassed into the FBI’s National Infrastructure Protection Center (NIPC).
47 Critical Foundations: Protecting America’s Infrastructures, The Report of the President’s Commission on Critical Infrastructure Protection (PCCIP), (Washington, DC, October 1997), https://www.fas.org/sgp/library/pccip.pdf.
48 The White House, Presidential Decision Directive- 63: Critical Infrastructure Protection, May 22, 1998, http://fas.org/irp/offdocs/pdd/pdd-63.htm . The associated White Paper can be found at http://fas.org/irp/offdocs/paper598.htm .
49 The eight categories in PPD-63, recommended by the Presidential Commission, were telecommunications, electrical power, gas and oil storage and transportation, banking and finance, transportation, water supply, emergency services, and government services. Interestingly, these same sectors had already been identified on November 18, 1988 by a Critical Infrastructures Working Group (CIWG) established to help implement President Reagan’s Executive Order 12656 on National Emergencies. http://www.lawandfreedom.com/site/constitutional/execorders/EO12656Syn.pdf .
50 Critical Infrastructures Coordinating Group, ITLaw, http://itlaw.wikia.com/wiki/Critical_Infrastructure_Coordination_Group. See also U.S. Department of Commerce, Critical Infrastructure Protection: Early Strides Were Made, but Planning and Implementation Have Slowed, Office of Inspector General, (Washington, DC, August 2000), 3, https://www.oig.doc.gov/OIGPublications/OS-OSE-12680-08-2000.pdf .
51 Encyclopedia of Espionage, Intelligence, and Security, Critical Infrastructure Assurance Office (CIAO), 2004, http://www.encyclopedia.com/doc/1G2-3403300196.html. After the terrorist attacks of September 11, 2001, CIAO’s mission became even more critical to national security, and in early 2003 its functions were incorporated into the newly created Department of Homeland Security (DHS).
52 Larry Mefford, Assistant Director, Statement Before the Subcommittee on National Security, Veterans Affairs, and International Relations, House of Representatives Committee on Government Reform, (Cyber Division, Federal Bureau of Investigation, Washington, DC, June 11, 2002), https://archives.fbi.gov/archives/news/testimony/nipcs-role-in-the-new-department-of-homeland-security .The “NIPC Watch” is staffed by representatives from a dozen federal government agencies, and partners with the General Services Administration’s Federal Computer Incident Response Capability (FedCIRC) to further secure our government technology systems and services. NIPC was transferred to DHS in 2003 and eventually disbanded as other federal government organizations took on its responsibilities. See National Infrastructure Protection Center. www.nipc.gov .
53 ISACs are “trusted entities established by… CI/KR… owners and operators to provide comprehensive sector analysis, which is shared within the sector, with other sectors, and with government. …The National Council of ISACs ….has the goal of developing trusted relationships among the sectors, and addressing common issues and concerns. …Existing ISACs cover fields including include Communications, Electricity, Financial Services, Information Technology, National Health, Oil and Natural Gas, Surface Transportation, and Public Transit. The National Council provides opportunities for valuable sector and cross-sector interactions, sharing of intelligence information, and countermeasure solutions.” National Council of ISACs, 2013, http://www.isaccouncil.net/home.html.
54 Marcia L. McGowan, “15 Years after Presidential Decision Directive (PDD) 63,” Booz-Allen Company News, May 22, 2013, http://www.boozallen.com/media-center/company-news/2013/05/15-years-after-pdd63-blog-post.
55 The White House, Presidential Decision Directive-62, Critical Infrastructure Protection,(Washington, DC, May 22, 1998), http://fas.org/irp/offdocs/pdd/pdd-63.htm .
56 PDD-62 also established the position of “National Coordinator for Security Infrastructure Protection and Counter-terrorism to oversee such relevant policies and programs as counter-terrorism, protection of critical infrastructure, preparedness […and also to] chair the Critical Infrastructure Coordination Group (CICG).”
57 President W. J. Clinton, Defending America’s Cyberspace: National Plan for Information Systems Protection, Version 1.0, An Invitation to a Dialogue, (The White House, Washington, DC, 2000), http://fas.org/irp/offdocs/pdd/CIP-plan.pdf . As called for in PPD-63, the first version was supposed to achieve initial operating capability (IOC) by December 2000 and full operating capability (FOC) by May 2003, but this never came to pass nor were additional versions promised ever published.
58 The full set of proposals included “Identify Critical Infrastructure Assets and Shared Interdependencies…; Detect Attacks and Unauthorized Intrusions; Develop Robust Intelligence and Law Enforcement Capabilities; Share Attack Warnings and Information…; Create Capabilities for Response, Reconstitution, and Recovery;…Make Americans Aware of the Need for Improved Cyber-Security; Adopt Legislation and Appropriations; and Ensure the Full Protection of American Citizens’ Civil Liberties…; “National Plan for Information Systems Protection, Executive Summary, xii.
59 Government Accountability Office, Critical Infrastructure Protection, Comments on the National Plan for Information Systems Protection, (Washington, DC, 2000), http://www.gao.gov/new.items/d011158t.pdf .
60 Brown, Critical Path, xiv.
61 US Department of Justice, The USA PATRIOT Act.
62 Office of Homeland Security, National Strategy for Homeland Security, (Washington, DC, July 200), 29-36, https://www.dhs.gov/sites/default/files/publications/nat-strat-hls-2002.pdf. In October 2007, President Bush issued an updated version that included a renewed commitment to protect our CI/KR from natural disasters as well as terrorist attacks. No more versions of this document were produced by Bush or later by Obama
63 Public Law 107–296, An Act to Establish the Department of Homeland Security, (107th Congress, Washington, DC, November, 25, 2002), https://www.dhs.gov/sites/default/files/publications/hr_5005_enr.pdf. See Janet Napolitano, “The Department’s Five Responsibilities,” (Department of Homeland Security, Washington, D.C., June 8, 2009), https://www.dhs.gov/blog/2009/06/08/department%E2%80%99s-five-responsibilities .
64 Senator Susan Collins, Hearings on “Critical Infrastructure Protection: Who’s in Charge,”(Senate Committee on Governmental Affairs, Washington, DC, October 1, 2002), 5, http://www.gpo.gov/fdsys/pkg/CHRG-107shrg77434/pdf/CHRG-107shrg77434.pdf .
65 George W. Bush, National Strategy for Physical Protection of Critical Infrastructure and Key Assets, (The White House, Washington, DC February 2003),2, https://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf .
66 President G.W. Bush, Homeland Security Presidential Directive-7: Critical Infrastructure Identification, Prioritization, and Protection, (Washington, DC, December 17, 2003), <http://www.dhs.gov/homeland-security-presidential-directive-7> .
67 Ibid.
68 The White House, Executive Order 13231, Critical Infrastructure Protection in the Information Age, (Washington, DC ,October 16,2001) https://www.dhs.gov/xlibrary/assets/executive-order-13231-dated-2001-10-16-initial.pdf1 . These objectives served as strict criteria similar to those set by Clinton in PDD-63. As one of its many elements, this Executive Order also created the Critical Infrastructure Protection Board (CIPB) with the purpose of initiating and coordinating “policies and programs for protecting critical infrastructures and their information systems against cyber strikes by terrorists.” Federal Register, President’s Critical Infrastructure Protection Board, October 16, 2001, https://www.federalregister.gov/agencies/president-s-critical-infrastructure-protection-board .
69 Dennis Fisher, Cyber Plans Future Bleak,” EWeek, February 24,2003, http://www.eweek.com/c/a/Security/Cyber-Plans-Future-Bleak .
70 Presidential Directive 54/Homeland Security Presidential Directive 23 (declassified) (The White House, Washington, DC, 2008), http://fas.org/irp/offdocs/nspd/nspd-54.pdf .
71 Ellen Nakashima, “Bush Expands Network Monitoring,” Washington Post, January 8, 2008, http://www.washingtonpost.com/wpdyn/content/article/2008/01/25/AR2008012503261.html . A month later, towards the end of his Presidency, Bush created the National Cybersecurity Center (NCSC), a DHS unit tasked with coordinating cybersecurity activities throughout the government. Ben Bain, “DHS Plans Wiki for Agencies, Cybersecurity Centers to Coordinate Efforts,” GCN Magazine, August 17, 2009, https://gcn.com/articles/2009/08/17/web-cyber-ops-wiki.aspx . A year later, GAO reported that progress had been made in implementing the CNCI, but concluded that challenges remained in defining the roles of various agencies and entities, noting that the NCSC that had not yet become fully operational and whose “unique responsibilities” were unclear. “Progress Made but Challenges Remain in Defining and Coordinating the Comprehensive National Initiative,” (Government Accountability Office, Washington, DC, March 2010), http://www.gao.gov/new.items/d10338.pdf… .
72 The White House, Remarks by the President on Securing Our Nation’s Cyber Infrastructure, Office of the Press Secretary, May 29, 2009, https://www.whitehouse.gov/the-press-office/remarks-president-securing-our-nations-cyber-infrastructure .
73 The White House, Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure, Executive Summary, V, (Washington, DC, 2009), https://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf. Note that “President Obama had absorbed the classified Comprehensive National Cybersecurity Initiative (CNCI) launched by President Bush into his more comprehensive national cybersecurity strategy, and soon declassified most of this earlier initiative.” See Jaikumar Vijayan, “Obama Administration Partially Lifts Secrecy on Classified Cybersecurity Project,” Computerworld, March 2, 2010, http://www.computerworld.com/article/2520273/cybercrime-hacking/obama-administration-partially-lifts-secrecy-on-classified-cybersecurity-project.html .
74 Government Accountability Office, Report to Congressional Requesters, “Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed,” (Washington, DC, October 2010), http://www.gao.gov/new.items/d1124.pdf.
75 The White House, National Security Strategy, (Washington, DC, May 2001), 18, https://www.whitehouse.gov/sites/default/files/rss_viewer/national_security_strategy.pdf.
76 Summary of the Cybersecurity Act of 2012, S.2105, (112th Congress, Washington, DC, 2011-2012), https://www.congress.gov/bill/112th-congress/senate-bill/2105.
77 See Ellen Nakashima,”Obama Signs Secret Directive ….to Help Thwart Cyberattacks,” Washington Post, November 14, 2012, https://www.washingtonpost.com/world/national-security/obama-signs-secret-cybersecurity-directive-allowing-more-aggressive-military-role/2012/11/14/7bf51512-2cde-11e2-9ac2-1c61452669c3_story.html.
78 Barack Obama, EO 13636 – Improving Critical Infrastructure Cybersecurity, (The White House, Washington, DC, February 13, 2013), https://www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity.
79 Jennifer Huergo, “NIST Releases Cybersecurity Framework: Version 1.0,” (U.S. Department of Commerce, Washington, DC, February 12, 2014), http://www.nist.gov/itl/csd/launch-cybersecurity-framework-021214.cfm.
80 NIST, Cybersecurity Framework Frequently Asked Questions, Framework Basics, https://www.nist.gov/cyberframework/cybersecurity-framework-faqs-framework-basics#framework. Numerous issues need to be addressed in terms of the future of cybersecurity standards, including issues of information sharing and whether NIST should remain in charge. See Mark Francis, “The Future of the NIST Cybersecurity Framework,” The Privacy Advisor, April 25, 2016, https://iapp.org/news/a/the-future-of-the-nist-cybersecurity-framework/.
81 Government Accountability Office, Cybersecurity National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented, Report to Congressional Addressees, (Washington, DC, February 14, 2013), http://www.gao.gov/products/GAO-13-187.
82 Stephen L. Caldwell and Gregory C. Wilshusen, “Observations on Key Factors in DHS’s Implementation of Its Partnership Approach,” Testimony Before the Committee on Homeland Security and Governmental Affairs, U.S. Senate, (Washington, DC, March 26, 2014), https://searchworks.stanford.edu/view/10703024.
83 Fact Sheet: Cybersecurity National Action Plan, 2016, Associated Press, February 9, 2016, https://www.whitehouse.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national-action-plan .
84 Ibid. CNAP also established a National Center for Cybersecurity Resilience, where companies can test their security system “in a controlled environment before deploying to the real-world.” Evan D. Wolff, “Highlights Of Obama’s Ambitious New Cybersecurity Plan,” Law 360, February 10, 2016, http://www.law360.com/articles/757763/highlights-of-obama-s-ambitious-new-cybersecurity-plan.
85 The White House, Executive Order — Commission on Enhancing National Cybersecurity, (Washington, DC, February 9, 2016), https://www.whitehouse.gov/the-press-office/2016/02/09/executive-order-commission-enhancing-national-cybersecurity . As part of its research plan, various commissioners are holding a series of meetings around the country with business leaders and cyber experts “to discuss the opportunities for and challenges to innovation and collaboration to strengthen cybersecurity in the digital economy. See “Meeting of the Commission on Enhancing National Cybersecurity,” UC Berkeley Center, June 21, 2016, https://www.youtube.com/watch?v=9wGxZEEqAxc.
86 Thomas E. Donilon and Samuel J. Palmisano, Report on Securing and Growing the Digital Economy: Commission on Enhancing National Cybersecurity, (Washington, DC, December 1, 2016) https://www.nist.gov/sites/default/files/documents/2016/12/02/cybersecurity-commission-report-final-post.pdf.
87 Ibid.
88 The White House, Statement by the President on the Report of the Commission on Enhancing National Cybersecurity, December 2, 2016, https://www.whitehouse.gov/the-press-office/2016/12/02/statement-president-report-commission-enhancing-national-cybersecurity.
89 Andy Ozment, “Federal Cybersecurity Detection, Response, and Mitigation,” Written Testimony of Assistant Secretary NPPD, Office of Cybersecurity and Communications, for the House Committee on Oversight and Government Reform, Subcommittee on Information Technology,(Washington, DC, April 20, 2016), https://www.dhs.gov/news/2016/04/20/written-testimony-nppd-house-oversight-and-government-reform-subcommittee.
90 W. Warner Burke (Ed) et al., Organization Change: A Comprehensive Reader, (New York: John Wiley & Sons, December 10, 2008), 4. Remember that “rearranging deckchairs on the Titanic” means dealing with relatively unimportant organizational changes, while ignoring more serious, substantive problems – or in the case of the Titanic, avoiding the iceberg or saving lives after the accident. It is used for saying that someone is wasting time dealing with things that are not important, and is ignoring a much more serious problem.
91 The 11 sectors found in the 2002 National Plan for Homeland Security – based upon the eight sectors highlighted in Clinton’s PPD-63 with additional entries, some name changes, and adjusted groupings – included Agriculture and Food; Water; Emergency Services; Public Health; Energy; Transportation; Banking and Finance; Telecommunications; Postal and Shipping; Governmental Institutions; Defense Industrial Base; and Chemicals and Hazardous Materials. The full list of the 17 sectors found in HSPD-7 covers Agriculture and Food, Drinking Water and Water Treatment Systems; Public Health; Energy; Banking and Finance; Chemical; Defense Industrial Base; Emergency Services; Commercial Nuclear Reactors, Materials and Waste ; Information Technology; Telecommunications; Postal and Shipping; Government Facilities; Commercial Facilities; Transportation Systems; Dams; and Monuments and Icons. See CI/KR Support Annex, January 2008, https://www.fema.gov/pdf/emergency/nrf/nrf-support-cikr.pdf.
92 David J. Teumim mentioned the addition of Critical Manufacturing in his book, Industrial Network Security, second edition, (Research Triangle Park, NC: ISA Books, 2010), 5.
93 Barack Obama, Presidential Policy Directive PPD-21– Critical Infrastructure Security and Resilience, (Washington, DC, February 12, 2013), https://www.whitehouse.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-infrastructure-security-and-resil. PPD-21 “made some adjustments to sector designations: adjustments made included treating National Monuments and Icons as a subsector of Government Facilities; designating Postal and Shipping as a subsector of Transportation; renaming Banking and Finance as Financial Services; and referring to Drinking Water and Water Treatment as Water and Waste Water Systems.” See John D. Moteff, Critical Infrastructures, 18-19.
94 Department of Homeland Security, Sector-Specific Agencies, https://www.dhs.gov/sector-specific-agencies, and Department of Homeland Security, National Infrastructure Protection Plan, Sector-Specific Plans https://www.dhs.gov/xlibrary/assets/nipp_sctrplans.pdf . Although DHS proposed that small-scale owners and operators participate in sector protection planning and coordination, this group remained insufficiently represented in the various councils,” due to opposition from the larger companies. Jena Baker McNeill and Richard Weitz, “How to Fix Homeland Security Critical-Infrastructure Protection Plans: A Guide for Congress,” Heritage Foundation (2010), http://www.heritage.org/research/reports/2010/04/how-to-fix-homeland-security-critical-infrastructure-protection-plans-a-guide-for-congress.
95 Department of Homeland Security, Sector Coordinating Councils, https://www.dhs.gov/scc and Government Coordinating Councils, https://www.dhs.gov/gcc.
96 Formed in 1999, The Partnership for Critical Infrastructure Security is a private, non-profit organization “to address cross-sector and interdependency issues of critical infrastructure owners and operators.” http://www.sheriffs.org/sites/default/files/uploads/documents/pcis_fact_sheet_02_12.pdf. The Critical Infrastructure Partnership Advisory Council (CIPAC) was established in March 2010, with responsibilities as found in the Critical Infrastructure Cross Sector Council Charter, which included overseeing the Cross Sector Council. https://www.dhs.gov/sites/default/files/publications/cipac-cross-sector-council-charter-2015-508.pdf.
97 Considering specific threats to the asset, trained experts from DHS’s Protective Security Coordination Division (PSCD) conduct site visits “to identify security gaps and provide options for consideration to mitigate these identified gaps, […identifying] vulnerabilities that may be associated with physical (e.g., no barriers or alarm systems), cyber (e.g., lack of a firewall), or human factors (e.g., untrained guards). In addition, Protective Security Advisors (PSAs) and Cybersecurity Advisors (CSAs) based in the field provide advice to private owners and operators across the nation in how to lower vulnerabilities and beef up the security and resilience of their infrastructure.” Department of Homeland Security, Protective Security Coordination Division, https://www.dhs.gov/about-protective-security-coordination-division.
98 Chris Currie, DHS Has Made Progress in Enhancing Critical Infrastructure Assessments, but Additional Improvements are Needed, Statement Before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies, Committee on Homeland Security, House of Representatives, (Government Accountability Office, Washington, DC, July 12, 2016), http://www.gao.gov/products/GAO-16-791T. DHS inherited the National Infrastructure Simulation and Analysis Center (NISAC), which, with assistance from national laboratories, has continued to conduct modeling, simulation, and analysis of critical infrastructure systems to help understand their complexity and facilitate modifications that can mitigate threats to such systems. About the National Infrastructure Simulation and Analysis Center, (Department of Homeland Security, Washington, DC, June 27, 2016), https://www.dhs.gov/about-national-infrastructure-simulation-and-analysis-center. “NISAC’s Fast Analysis and Simulation Team (FAST) provides practical information within severe time constraints in response to issues of immediate national importance […, such as] the consequences of infrastructure interdependencies, and potential economic impacts.” One such challenge NISAC has investigated, with strong support from Congress, is “how to protect the nation’s diverse and complex transportation sector – aviation, freight rail, highway, maritime, mass transit, passenger rail, and pipelines – that moves, distributes, and delivers billions of passengers and millions of tons of goods each year, making it a highly attractive target for terrorists.” Department of Homeland Security, Transportation Systems Sector-Specific Plan: An Annex to the National Infrastructure Protection Plan, 2010, https://www.dhs.gov/xlibrary/assets/nipp-ssp-transportation-systems-2010.pdf.
99 Presidential Decision Directive- 63. As early as 1995, PDD-63 mandated formation of a National Infrastructure Assurance Plan, but this was not produced under Clinton’s Administration. However, the idea found its way into the 2002 Homeland Security Act, the Bush Administration’s 2002 National Strategy for Homeland Security, and then into HSPD-7 leading to the initial NIPP.
100 National Infrastructure Protection Plan, 2006, Executive Summary, 1 (Department of Homeland Security, Washington, DC, 2006), https://www.dhs.gov/xlibrary/assets/NIPP_Plan_noApps.pdf.
101 National Infrastructure Protection Plan: Partnering to Enhance Protection and Resiliency, 2009, (Department of Homeland Security, Washington, DC,2009), https://www.dhs.gov/xlibrary/assets/NIPP_Plan.pdf.
102 Ibid., 7. NIPP 2009 also placed greater importance on cyber security-specific vulnerability assessments and development of methodologies capable of identifying nationally significant cyber systems or networks.
103 National Infrastructure Protection Plan: Partnering for Critical Infrastructure Security and Resilience, (Department of Homeland Security, December 2013), https://www.dhs.gov/sites/default/files/publications/NIPP-Fact-Sheet-508.pdf.
104 Presidential Policy Directive -8: National Preparedness, (Department of Homeland Security, Washington, DC, March 30, 2011), https://www.dhs.gov/presidential-policy-directive-8-national-preparedness.
105 National Infrastructure Protection Plan, 2006, 23.
106 Michael Chertoff, “Second Stage Review Remarks,” (Washington DC, July 13, 2005), http://www.au.af.mil/au/awc/awcgate/dhs/chertoff_stage2.htm.
107 Department of Homeland Security, A Guide to Critical Infrastructure and Key Resources Protection at the State, Regional, Local, Tribal, and Territorial Level, (Washington, DC, September 2008), 31, https://www.dhs.gov/xlibrary/assets/nipp_srtltt_guide.pdf.
108 Government Accountability Office, Risk Management: Further Refinements Needed to Assess Risks and Prioritize Protective Measures at Ports and Other Critical Infrastructure, (Washington, DC, December, 2005), 111, http://www.gao.gov/products/GAO-06-91.
109 See summary of Risk Management Framework, National Infrastructure Protection Plan, 2006, https://www.dhs.gov/xlibrary/assets/NIPP_RiskMgmt.pdf.
110 Richard White, “Towards a Unified Homeland Security Strategy: An Asset Vulnerability Model,” Homeland Security Affairs 10, 1 (February 2014):1, https://www.hsaj.org/articles/254.
111 Thomas L. Norman, Risk Analysis and Security Countermeasure Selection, Second Edition, CRC Press, Boca Raton, Florida, July 1, 2015. This new edition covers risk analysis methodologies approved by the U.S. Department of Homeland Security and …how to apply them to other organizations, public and private.
112 These 18 sectors are agriculture and food; defense industrial base; energy; health care and public health; banking and finance; water; commercial facilities; critical manufacturing; emergency services; nuclear reactors, materials, and waste; dams; chemical; information technology; communications; transportation systems; government facilities, postal and shipping; and national monuments and icons. See Chris Currie, DHS Has Made Progress in Enhancing Critical Infrastructure Assessments, 33.
113 The DHS Lexicon, issued by the Office of Risk Management and Analysis (RMA), defines risk as the potential for an unwanted outcome resulting from an incident, event, or occurrence, as determined by its likelihood and the associated consequences, but does not present a formula for calculating risk. See Risk Steering Committee, DHS Risk Lexicon: 2010, September 2010, 27, https://www.dhs.gov/xlibrary/assets/dhs-risk-lexicon-2010.pdf.
114 Barry Charles Ezell, et al., “Probabilistic Risk Analysis and Terrorism Risks,” Risk Analysis, 30, no. 4, 2010, https://www.dhs.gov/xlibrary/assets/rma-risk-assessment-technical-publicationThed .pdf\.
115 Ted G. Lewis, Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation, 2nd Edition, (Hoboken, NJ: John Wiley & Sons, November 2014), 14. Lewis’s thesis is that “centralized, monopolistic decision-making organizations are giving way to heterogeneous, decentralized decision structures” acting as complex adaptive systems (CAS). See earlier reference to Yaneer Bar-Yam, Dynamics of Complex Systems. See also Peter Fryer, “What are Complex Adaptive Systems? A brief description of Complex Adaptive Systems and Complexity Theory,” Trojan Mice, http://www.trojanmice.com/articles/complexadaptivesystems.htm.
116 See “ASME-ITI Wins Contract to Develop RAMCAP™ Guidelines,” September 14, 2006, http://www.govcon.com/doc/asme-iti-wins-contract-to-develop-ramcap-guid-0001.
117 RAMCAP™ Executive Summary, ASME Innovated Technologies Institute (ITI), 2005, http://files.asme.org/ASMEITI/RAMCAP/12604.pdf. As explained, the method’s “objective, quantitative, standardized approach permits direct comparisons of risk, resilience and the benefits of security, and resilience investments—essential for rational resource allocation—… ranging from assets to sectors, across sectors to regions or national economies, and across time, which is essential for accountability and management of the resulting programs… especially when tailored for specific sectors.”
118 In 2010, ASME reported that the feasibility and scalability of RAMCAP had been demonstrated to DHS, that “the program has fulfilled its objectives, and […that ASME had] terminated its work […for the Department] in this area.” However, an updated version called RAMCAP PlusSM has continued to sell private owners “an all-hazard risk and resilience management process for critical infrastructure [… that has] been applied to eight sectors ranging from nuclear power plants to water or wastewater systems to university campuses…” See J.P.Brashear, and J.W. Jones, Risk Analysis and Management for Critical Asset Protection (RAMCAP Plus), Wiley Handbook of Science and Technology for Homeland Security, 2010, 2:1:1–15, http://onlinelibrary.wiley.com/doi/10.1002/9780470087923.hhs003/abstract.
119 Public Law 110-161, Consolidated Appropriations Act of 2008. Subsequently, a contract between the National Academies and DHS was agreed upon so the NRC review could be done. http://portal.hud.gov/hudportal/documents/huddoc?id=DOC_10191.pdf.
120 National Research Council, Review of the Department of Homeland Security’s Approach to Risk Analysis, National Academies Press, 2010, Chapter 4,http://dels.nas.edu/Report/Review-Department-Homeland/12972. Surprisingly, the NRC did not review the RAMCAP effort that DHS had supported for five years, but merely referred to this method and noted that the reader can consult an explanatory handbook for details.
121 Ibid., Summary, 6.
122 Todd Masse, The Department of Homeland Security’s Risk Assessment Methodology: Evolution, Issues, and Options for Congress, (Congressional Research Service, Washington, DC, February 2, 2007), 7, https://www.fas.org/sgp/crs/homesec/RL33858.pdf.
123 Risk Analysis and Management for Critical Asset Protection (RAMCAP Plus), 60.
124 David L. Alderson, et al., “Solving Defender-Attacker-Defender Models for Infrastructure Defense,”12th INFORMS Computing Society Conference Computing Society (ICS), 2011, http://faculty.nps.edu/dlalders/docs/ics-2011-p0028-0049.pdf. Game theory is “the study of mathematical models of conflict and cooperation between intelligent rational decision-makers.”
125 Gregg Claycamp, “Expert Judgements in Quality Risk Management: Where Quality Risk Management Can Go Wrong,” Institute of Validation Technology, December 21, 2015, http://www.ivtnetwork.com/article/expert-judgements-quality-risk-management-where-quality-risk-management-can-go-wrong. In this connection,the NRC assessment of DHS’s risk methods notes that “narrative descriptions of non-quantitative information about risk are often as important to decision makers as is the more fully quantitative information.” Review of the Department of Homeland Security’s Approach to Risk Analysis, 10.
126 The Strategic National Risk Assessment in Support of PPD 8: A Comprehensive Risk-Based Approach toward a Secure and Resilient Nation, (Department of Homeland Security, Washington DC, December 2011),1-3, https://www.dhs.gov/xlibrary/assets/rma-strategic-national-risk-assessment-ppd8.pdf. Frequency was used rather than likelihood since some events could occur more than once a year. Vulnerability was not shown as a separate variable but considered when estimating the uncertainty band for consequences assuming this variable runs from low to high.
127 Jerome H. Kahan, Preparedness Revisited: W(h)ither PPD-8?, Homeland Security Affairs, 10, no. 2, (February 2014), p.24: https://www.hsaj.org/articles/252.
128 Rising to the occasion, the Secretary of Homeland Security in May 2010 announced the Integrated Risk Management (IRM) initiative – “a structured approach that enables homeland security organizations […at the local level] to form a common understanding of risk, share information and analysis, and conduct assessments that guide policy and operations to reduce risk and the impact of hazards.” Janet Napolitano,”Integrated Risk Management (IRM) and Homeland Security Benefits for State, Local, and Regional Jurisdictions,” (Department of Homeland Security, Washington DC, November 2010), http://fcemhs.com/Portals/0/Planning/Documents/irm_benefits.pdf. The IRM construct has been accepted by a number of counties and jurisdictions across the country when facing a wide range of hazards to significant infrastructure targets, including potential physical and cyber attacks by terrorists or violent extremists.
129 Georgios Giannopoulos, et al., Risk Assessment Methodologies for Critical Infrastructure Protection, Part I: State of the Art, European Commission, Joint Research Centre, Institute for the Protection and Security of the Citizen, 2012, 4, http://ec.europa.eu/home-affairs/doc_centre/terrorism/docs/RA-ver2.pdf.
130 Ibid., p. 17.
131 Department of Homeland Security, Risk Management Fundamentals, Office of Risk Management and Analysis, Second Edition, April 2011, https://www.dhs.gov/xlibrary/assets/rma-risk-management-fundamentals.pdf. See also DHS Risk Steering Committee, Risk Lexicon, September 2008, https://www.dhs.gov/xlibrary/assets/dhs_risk_lexicon.pdf.
132 Philip Auerswald et al., “The Challenge of Protecting Critical Infrastructure,” Warton School Risk Management and Decision Process Center, Working Paper # 05-11, October 2005, http://opim.wharton.upenn.edu/risk/downloads/05-11-EMK.pdf.
133 National Infrastructure Advisory Council (NIAC), Critical Infrastructure Resilience, Final Report and Recommendations, September 8, 2009, https://www.dhs.gov/xlibrary/assets/niac/niac_critical_infrastructure_resilience.pdf. Composed of members from government, academia, and industry, NIAC is charged with providing the President, the Secretary of Homeland Security, and heads of other relevant agencies with analyses and recommendations on the physical and cyber security and resilience of critical infrastructures.
134 Chris Woodford, Self-Healing Material, Explain that Stuff, March 15, 2016, http://www.explainthatstuff.com/self-healing-materials.html.
135 Jerome H, Kahan, “Resilience Redux: Buzzword or Basis for Homeland Security,” Homeland Security Affairs 11, 2 (2015), https://www.hsaj.org/articles/1308.
136 Report of the Critical Infrastructure Task Force (CITF), Homeland Security Advisory Council, Forwarding letter to Secretary Chertoff, January 2006, https://www.dhs.gov/xlibrary/assets/HSAC_CITF_Report_v2.pdf.
137 For example, the Center for Resilience Studies at Northeastern University, http://www.northeastern.edu/resilience/.
138 CITF Report, 8.
139 Jerome H. Kahan, et al., Risk and Resilience: Exploring the Relationship, Report prepared for DHS/S&T by the Homeland Security Studies and Analysis Institute, October 29, 2010, 47.
140 Jennifer Scholtes,”DHS Looking to Integrate Resilience Into Everyday Operations,” Congressional Quarterly Staff, (Washington, DC, January 13, 2011), http://securitydebrief.com/2011/01/13/dhs-looking-to-integrate-resilience-into-everyday-operations/#axzz3u1SZtkTC;.
141 President Barak Obama, A Proclamation: National Preparedness Month, 2009,(White House Office of the Press Secretary, Washington, DC, September 4, 2009), https://www.google.com/?gws_rd=ssl#q=A+Proclamation:+National+Preparedness+Month%2C+2009.
142 National Security Strategy, (The White House, Washington DC, May 2010), 18, https://www.whitehouse.gov/sites/default/files/rss_viewer/national_security_strategy.pdf.
143 National Security Strategy, (The White House, Washington DC, February 2015), 9, https://www.whitehouse.gov/sites/default/files/docs/2015_national_security_strategy_2.pdf.
144 CITF Report, 5.
145 John D. Moteff, Critical Infrastructure Resilience: The Evolution of Policy and Programs and Issues for Congress, (Congressional Research Service, Washington DC, August 23, 2012), Summary, https://www.fas.org/sgp/crs/homesec/R42683.pdf.
146 Federal Emergency Management Agency, About PS-Prep™ ,https://www.fema.gov/about-ps-preptm. In August 2007, Congress passed Public Law 110-53, which calls for DHS to establish and implement a voluntary private sector preparedness accreditation and certification program. FEMA was designated initiate to this program. The DHS Ready Business Program was formed in 2004. See Department of Homeland Security, Ready Business Mentoring Guide: Working With Small Businesses to Prepare for Emergencies, https://www.ready.gov/sites/default/files/documents/files/mentor_guide.pdf. See also Federal Emergency Management Agency, Small Business Toolkit: Tools and Resources to Plan, Prepare, and Protect, https://www.fema.gov/small-business-toolkit-tools-and-resources-plan-prepare-and-protect.
147 Margot Hill Clarvis and Michael Schoon, “Investments in Resilience Are Increasingly Seen by Private Companies as Good Business Practice…Business & Resilience: Convergence or Critical Mismatch?” Resilience Science, December 9, 2014, Garry Peterson, http://rs.resalliance.org/2014/12/09/business-resilience-convergence-or-critical-mismatch.
148 As an analysis by experts at the Heritage Foundation suggests, “The federal government could offer additional incentives to promote private-sector protection and resiliency efforts, such as establishing a public recognition program for firms that achieve noteworthy success, or granting CIKR-supportive companies preference in federal contracting or … promoting the SAFETY Act—which provides liability protection from terrorist acts for companies that develop anti-terrorism technologies.” McNeill and Weitz, “How to Fix Homeland Security Critical-Infrastructure Protection Plans.”
149 Department of Homeland Security, “Building and Infrastructure Protection Series: Designing Buildings to Withstand Almost Anything,” https://www.dhs.gov/science-and-technology/building-and-infrastructure-protection-series-designing-buildings-withstand.
150 “DHS S&T to Launch New Center of Excellence to Study Critical Infrastructure Resilience,” (Science & Technology Press Office, Department of Homeland Security, Washington DC, April 7, 2016), https://www.dhs.gov/science-and-technology/news/2016/04/07/dhs-st-launch-new-center-excellence-study-critical.
151 Some readers would be surprised to know that these words were found in President Clinton’s Executive Order 13010, Critical Infrastructure Protection, July 15, 1996, http://fas.org/irp/offdocs/eo13010.htm.
152 Department of Homeland Security, Critical Infrastructure Security. November 4, 2015, https://www.dhs.gov/topic/critical-infrastructure-security.
153 McNeill and Weitz, “How to Fix Homeland Security Critical-Infrastructure Protection Plans.”
154 National Infrastructure Protection Plan, 2006, Preface.
155 National Infrastructure Protection Plan, Partnering to Enhance Protection and Resiliency 2009, 24.
156 National Infrastructure Protection Plan, Partnering for Critical Infrastructure Security and Resilience, 2013.
157 Ibid., Executive Summary.
158 Joshua Sinai, “New Trends in Terrorism’s Targeting of the Business Sector,” Mackenzie Institute, 05/09/2016, http://mackenzieinstitute.com/new-trends-in-terrorisms-targeting-of-the-business-sector/.
159 Philip Auerswald, et al., “The Challenge of Protecting Critical Infrastructure,” Issues in Science and Technology, XXII, no. 1, Fall 2005, http://issues.org/22-1/auerswald/.
160 Organization Change: A Comprehensive Reader. PPD -21 also required government and private partners to develop integrated protection and resilience plans for each of the critical sectors, including enhanced security for our electrical grid and transportation systems as well as securing our nuclear and chemical sectors, but the response to this request is unclear.
161 See Department of Homeland Security, National Infrastructure Coordinating Center (NICC) https://www.dhs.gov/national-infrastructure-coordinating-center, and National Cybersecurity and Communications Integration Center (NCCIC) https://www.dhs.gov/national-cybersecurity-and-communications-integration-center . The NCCIC subsumed responsibilities of the NCSC, created by President Bush in connection with his two classified Cybersecurity Directives.
162 Howard Schmidt, “There Is No Cyberwar,” Interview with White House Cyber Czar, RSA Security Conference, (San Francisco, CA, 2010), http://www.wired.com/2010/03/schmidt-cyberwar/; White House Profile, Michael Daniel, Special Assistant to the President and Cybersecurity Coordinator, The White House Blog, April 1, 2014, https://www.whitehouse.gov/blog/author/Michael%20Daniel.
163 The White House, Office of the Press Secretary, Presidential Proclamation — Critical Infrastructure Security and Resilience Month, October 31, 2013, https://www.whitehouse.gov/the-press-office/2013/10/31/presidential-proclamation-critical-infrastructure-security-and-resilienc.
164 The American Lifelines Alliance (ALA) has worked with FEMA and the National Institute of Building Sciences on guidelines to assess the vulnerability of these systems to all hazards and what can be done to protect them.
165 Alice Clamp, “Cyber and Physical Security: Evolving Threats and Defense Mechanisms,” Public Power 72, No. 5, (August 30, 2014), http://www.publicpower.org/Media/magazine/ArticleDetail.cfm?ItemNumber=42132.
166 Department of Homeland Security, Infrastructure Information Partnerships, January 8, 2016, https://www.dhs.gov/infrastructure-information-partnerships.
167 Another organization that furthers public–private cooperation in securing our infrastructure is The Homeland Infrastructure Foundation Level Data Working Group (HIFLD) – a collaborative effort between DHS and the National Geospatial Intelligence Agency (NGA) for sharing information obtained by stationary orbiting satellites (GEOINT). This data is analyzed and distributed across multiple levels of government and the private sector to facilitate the protection and post-attack recovery of the nation’s CI/KR. HIFLD also works with the National Geospatial-Intelligence Agency to manage the Homeland Security Infrastructure Program (HSIP) that “compiles geospatial data from federal agencies, commercial vendors, State, and local partners” for use in protecting CI/KR. See Robert F. Austin, et al., GIS for Critical Infrastructure Protection, CRC Press, September 1, 2015, https://www.amazon.com/Critical-Infrastructure-Protection-Robert-Austin/dp/1466599340. Though not affiliated with the government, the Geospatial Information and Technology Association (GITA), a nonprofit professional association, advocates application of geospatial technology “to help operate, maintain, and protect the infrastructure […by such users as] utilities and telecommunication companies.” Geospatial Information and Technology Association (GITA), http://www.gita.org/.
168 Bill Brenner, “Howard Schmidt: Cybersecurity Battle ‘Different’ This Time,” CSO, March 24, 2010, http://www.csoonline.com/article/2124983/critical-infrastructure/howard-schmidt–cybersecurity-battle–different–this-time.html.
169 Schmidt served as a cyber-adviser in President George W. Bush’s White House, replacing Melisa Hathaway, a holdover from the Clinton Administration, who stepped in after Richard Clarke retired, and then served as temporary Czar for Obama with the job of overseeing the 6o day cyber policy review. Michael Daniel was chosen as Schmidt’s successor.
170 Presidential Decision Directive 63.
171 Stephen Barlas, et al., “U.S. Critical Infrastructure Security: Highlighting Critical Infrastructure Threats,” TechTarget, September 2004, http://searchsecurity.techtarget.com/US-critical-infrastructure-security-Highlighting-critcal-infrastructure-threats.
172 John Jay in 1813 supposedly wrote “To hope for the best and prepare for the worst, is a trite but a good maxim.” This tip is an English proverb from prior to the 18th Century. The phrase means one should have a good plan that includes contingencies for the bad things that might happen, but one should often expect the best case to happen and believe that one’s overall plan will be successful. http://planningskills.com/tips/40.php.
173 Bruce Hoffman, “Does our Counterterrorism Strategy Match the Threat,” Testimony before House International Affairs Sub-Committee, RAND Corporation, (September, 2005), http://www.rand.org/content/dam/rand/pubs/testimonies/2005/RAND_CT250-1.pdf.
174 DCSINT Handbook No. 1.02, Critical Infrastructure Threats and Terrorism, US Army Training and Doctrine Command, II-10, Fort Leavenworth, Kansas (2006), https://fas.org/irp/threat/terrorism/sup2.pdf.
175 James A. Lewis, “Innovation and Cybersecurity Regulation,” Commentary, (Center for Strategic and International Studies, Washington DC, 2009), http://csis.org/files/media/csis/pubs/090327_lewis_innovation_cybersecurity.pdf.
176 Ibid, “Cyber Threat and Response: Combating Advanced Attacks and Cyber Espionage,” CSIS, March 2014, https://csis-prod.s3.amazonaws.com/s3fs-public/legacy_files/files/publication/140313_FireEye_WhitePaper_Final.pdf.
177 Government Accountability Office, Risk Management.
178 Ibid.
179 Richard White, “Towards a Unified Homeland Security Strategy: An Asset Vulnerability Model,” Homeland Security Affairs 10, no. 1 (February 2014), https://www.hsaj.org/articles/25.
180 Government Accountability Office, Critical Infrastructure Protection: DHS Action Needed to Enhance Integration and Coordination of Vulnerability Assessment Efforts, Report to Congressional Requesters, (Washington, DC, 2014),25, http://www.gao.gov/assets/670/665788.pdf.
181 Some might cite James Burke who pointed out in 1983 that we have become overly dependent on technology.” See Connections — The Trigger Effect, James Burke, February 15, 2015, http://www.dominoprinciple.com/2015/02/15/connections-trigger-effect-james-burke.
182 A successful cyber-attack goes through seven steps. Reconnaissance (identify target), Scanning (discover weak spot), Gain access (and take over), Exfiltration (extract sensitive data), Sustainment (come and go but quietly), assault (distort or disable target’s functionality), and obfuscation (hide attacker’s tracks). See “The Seven Steps of a Successful Cyber Attack,” Identity Week, May 7, 2015, (documents from Lieberman Software Corporation), https://www.identityweek.com/seven-steps-of-successful-cyber-attack/.
183 Barak Perelman, “And Now, A Cyber Arms Race Towards Critical Infrastructure Attacks,” Dark Reading, November 11, 2015, http://www.darkreading.com/attacks-breaches/and-now-a-cyber-arms-race-towards-critical-infrastructure-attacks/a/d-id/1323225.
184 Department of Homeland Security, Annual Performance Report for Fiscal Years 2012 – 2014, https://www.dhs.gov/sites/default/files/publications/DHS-%20Annual%20Performance%20Report%20and%20Congressional-Budget-Justification-FY2014.pdf.This Report is required by the Government Performance and Results Act (GPRA) of 1993 and the GPRA Modernization Act of 2010. For the record, rate of speed (a measure) can be expressed in km/hour or miles/hour (different metrics), the temperature (a measure) expressed in ºC or Fahrenheit (different metrics).
185 HSPD-7, Homeland Security Presidential Directive-7: Critical Infrastructure Identification, Prioritization, and Protection.
186 Office of Management and Budget, Program Assessment, National Protection & Programs Division: Infrastructure Protection, (The White House. Washington, DC, 2006), (https://www.whitehouse.gov/sites/default/files/omb/assets/omb/expectmore/summary/10003623.2006.html.
187 Office of Financial Management, Performance Measure Guide, Budget Division, State of Washington, August 2009, http://www.ofm.wa.gov/budget/instructions/other/2009performancemeasureguide.pdf. For example, the effectiveness of efforts to reduce risk in a given sector should be measured as the difference in risk before and after protective programs are instituted, with this result fed back into subsequent assessments.
188 NIPP 2006, National Infrastructure Protection Plan, 26.
189 Government Accountability Office, Critical Infrastructure Protection: Sector-Specific Agencies Need to Better Measure Cybersecurity Progress, (Washington DC, November 19, 2015), http://www.gao.gov/assets/680/678499.pdf.
190 Chris Currie, “DHS Has Made Progress in Enhancing Critical Infrastructure Assessments, but Additional Improvements are Needed,” Testimony Before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies, Committee on Homeland Security, House of Representatives, (Washington, DC, July 12, 2016), Government Accountability Office, http://www.gao.gov/assets/680/678499.pdf.
191 President Obama issued an Executive Order on May 6, 2016 to facilitate the upcoming Presidential Transition, including establishing a White House Transition Coordinating Council to assist and support “the transition efforts of the transition teams of eligible candidates.” Executive Order — Facilitation of a Presidential Transition, https://www.whitehouse.gov/the-press-office/2016/05/06/executive-order-facilitation-presidential-transition. The Center for Presidential Transition offers assistance to presidential candidates and their transition teams…to ensure our next president will be ready to govern on day one, including production of updated Presidential Transition Guides, the latest edition issued in April 2016, Partnership for Public Service, Center for Presidential Transition http://presidentialtransition.org/.
192 Amanda Kooser, “Hamster-Wheel Standing Desk: Embrace the Rodent Race, Why Should Hamsters Have All the Fun?” CNET Tech Culture, September 18, 2014, http://www.cnet.com/news/hamster-wheel-standing-desk-embrace-the-rodent-race/ .
Copyright © 2017 by the author(s). Homeland Security Affairs is an academic journal available free of charge to individuals and institutions. Because the purpose of this publication is the widest possible dissemination of knowledge, copies of this journal and the articles contained herein may be printed or downloaded and redistributed for personal, research or educational purposes free of charge and without permission. Any commercial use of Homeland Security Affairs or the articles published herein is expressly prohibited without the written consent of the copyright holder. The copyright of all articles published in Homeland Security Affairs rests with the author(s) of the article. Homeland Security Affairs is the online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS).





