Senate Hearing, 111TH Congress - More Security, Less Waste: What Makes Sense For Our Federal Cyber Defense
Senate Hearing, 111TH Congress - More Security, Less Waste: What Makes Sense For Our Federal Cyber Defense
111662
HEARING
BEFORE THE
COMMITTEE ON
HOMELAND SECURITY AND
GOVERNMENTAL AFFAIRS
UNITED STATES SENATE
OF THE
(
U.S. GOVERNMENT PRINTING OFFICE
WASHINGTON
53852 PDF
2010
Jkt 053852
PO 00000
Frm 00001
Fmt 5011
Sfmt 5011
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
BRYAN
(II)
Jkt 053852
PO 00000
Frm 00002
Fmt 5904
Sfmt 5904
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
CONTENTS
Opening statement:
Senator Carper .................................................................................................
Prepared statements:
Senator Carper .................................................................................................
Senator McCain ................................................................................................
Page
1
31
34
WITNESSES
THURSDAY, OCTOBER 29, 2009
Hon. Tom Davis, former U.S. Representative from the State of Virginia ..........
Vivek Kundra, Federal Chief Information Officer, Administrator for Electronic
Government and Information Technology, U.S. Office of Management and
Budget ...................................................................................................................
Gregory C. Wilshusen, Director, Information Technology Security Issues, U.S.
Government Accountability Office ......................................................................
John Streufert, Chief Information Security Officer, and Deputy Chief Information Officer for Information Security, Bureau of Information Resource
Management, U.S. Department of State ............................................................
ALPHABETICAL LIST
OF
4
12
14
16
WITNESSES
4
36
12
39
16
51
14
45
APPENDIX
58
84
92
99
(III)
Jkt 053852
PO 00000
Frm 00003
Fmt 5904
Sfmt 5904
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
Jkt 053852
PO 00000
Frm 00004
Fmt 5904
Sfmt 5904
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
U.S. SENATE,
SUBCOMMITTEE ON FEDERAL FINANCIAL MANAGEMENT,
GOVERNMENT INFORMATION, FEDERAL SERVICES,
AND INTERNATIONAL SECURITY
OF THE COMMITTEE ON HOMELAND SECURITY
AND GOVERNMENTAL AFFAIRS,
Washington, DC.
The Subcommittee met, pursuant to notice, at 2:33 p.m., in room
SD342, Dirksen Senate Office Building, Hon. Thomas R. Carper,
Chairman of the Subcommittee, presiding.
Present: Senator Carper.
OPENING STATEMENT OF SENATOR CARPER
(1)
Jkt 053852
PO 00000
Frm 00005
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
2
Security Management Act (FISMA), to help prevent many of the
problems that we are going to be discussing today. That legislation
brought greater attention to the issue of cyber security and it
helped to establish greater accountability within agencies. Overall,
I think we would agree that it is a step in the right direction.
However, some 7 years after the passage of FISMA and approximately $40 billion later, I am troubled to learn that the Office of
Management and Budget (OMB) does not track how much agencies
spend on cyber security, nor does the agency measure those expenditures and whether those expenditures actually resulted in improved security. Even more troubling, agencies may be constrained
from implementing the most basic cyber security best practice because of inflexible requirements.
Now, allow me to put this into perspective. Federal agencies have
spent more on cyber security than the entire gross domestic product of North Korea, who some have speculated is maybe involved
with some of those cyber attacks. That is unacceptable.
Some of the problems with FISMA implementation are a direct
result of OMBs decisions over the years, while others are due to
agency neglect. Still other problems lay at the feet of those of us
here on Capitol Hill. In essence, there is blame enough to go
around for all.
However, at todays hearing, we have an opportunity to discuss
some concrete ways to correct some of those wrongs, and that is
what we are going to do.
For example, one wasteful and ineffective area that OMB and
agencies can target is what is known as the certification and accreditation process. The certification and accreditation process is
essentially a process whereby agencies evaluate every 3 years what
defense security protections are in place to prevent attacks on their
systems. The process costs taxpayers about $1.3 billionthat is billion with a bevery year, and it produces a good deal of paperwork that ends up stored in binders in some clutter-filled rooms.
In fact, those rooms look a lot like this one. In fact, that is one of
them. There are, I think, others that look like it.
But we can see 3 years worth of reports from the Department
of State, just one department, which cost them a total of $38 million. These reports would be worth the price tag if the tactics that
hackers used were as static as the words typed on a piece of paper.
But hackers change how they attack us daily and their numbers,
unfortunately, continue to grow.
And yet it seems like OMB thinks that a snapshot of agency preparedness every 3 years will somehow defend our critical networks.
But instead, billions of dollars are spent every year on ineffective
and useless reports, similar to the chart pictured here.1 Meanwhile,
we continue to get attacked.
However, testifying today will be a representative from the Department of State on our second panel who saw an opportunity to
spend his agencys cyber security budget more wisely. Instead of
spending money on ineffective paper-based reports, the State Department decided to focus on developing a system that monitored
their global networks on a continuing basis.
ph44585 on D330-44585-7600 with DISTILLER
1 The
Jkt 053852
PO 00000
Frm 00006
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
3
If you take a look at the second chart that has just been put up,1
we can see the results of the hard work at the Department of
State. According to that Department, they were able to reduce the
amount of risk to their agency by 90 percent in a single year. I am
told that this was achieved by developing a system that makes
sense, uses effective metrics, and holds people accountable. In essence, the Department of State can prove that they have better security at a fraction of the cost that they were previously paying.
So as we progress through this hearing, I would like our witnesses to keep in mind that moving to a model more like the one
at the Department of State requires no new legislation, costs less
than or the same as the current paperwork-laden method, and will
better protect our country. That is the kind of cyber security that
makes sense to me, and I suspect that is the kind of cyber security
that would make sense to most people in this country.
In fact, my colleagues and I introduced a bill last session, and
we have introduced it again this year, which would require all
agencies to move to a proactive approach like the one that the Department of State has taken.
In addition to requiring continuous monitoring of security controls and putting a strengthened Chief Information Security Officer
in each agency, our bill would enhance the role of the Department
of Homeland Security in cyber security. The Department would
share information with agencies on where cyber attacks have been
successful so that they can better prioritize their security enhancements.
Further, our bill would require agencies to use their enormous
purchasing power to persuade vendors to develop and sell more secure IT products and services in the first place.
Again, our thanks to each of our witnesses. We certainly look forward to what you have to say, share with us, and to responding
to our questions.
We will be joined as the afternoon goes on by others on our Subcommittee, but rather than sit here waiting for them for hours, we
are going to dive right in with our first panel. As I telegraphed earlier, we will receive our testimony from former Congressman Tom
Davis, who represented, I think, a Congressional district in the
Northern part of Virginia, a State where I grew up. His service in
the U.S. House of Representativeshow many terms did you serve
there?
Mr. DAVIS. Seven.
Senator CARPER. Seven terms. Did it seem like eight?
Mr. DAVIS. It seemed like 20 at the end. [Laughter.]
Senator CARPER. Congressman Davis was the principal author of
a number of pieces of legislation, but he was also the principal author of the Federal Information Security Management Act of 2002,
lovingly called FISMA, which is the subject that we are going to
be discussing here today.
He also held numerous oversight hearings on the implementation
of FISMA and is considered an expert on the issue. I would like
for the record to show that my name and the word expert have
almost never been used in the same sentence. [Laughter.]
ph44585 on D330-44585-7600 with DISTILLER
1 The
Jkt 053852
PO 00000
Frm 00007
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
4
We are pleased to have Mr. Davis with us, who is certainly an
expert on this issue and very knowledgeable about a bunch of other
things. It is a real pleasure to work with him. We are trying to
make some progress on, among other issues, figuring out a path
forward for the U.S. Postal Service.
But I understand that we will hear where you believe improvements can be made with the agency implementation and perhaps
with the language itself, so we thank you for your previous service
to our country and for your willingness to be of service again here
today.
You are recognized to proceed for the next half hourno, I will
ask you to keep it fairly close to 5 minutes, but if you run a little
over that, it is not going to trouble anybody too much. So thanks
so much for coming, and your entire statement will be made part
of the record.
TESTIMONY OF HON. TOM DAVIS,1 FORMER U.S.
REPRESENTATIVE FROM THE STATE OF VIRGINIA
1 The
Jkt 053852
PO 00000
Frm 00008
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
were based on best practices, and in addition to safeguarding information were intended to make security management an integral
part of an agencys operation.
At the time FISMA was enacted, no coordinated priority existed
to address the threat of cyber attacks. Technology was evolving
rapidly. Rather than taking a prescriptive approach, we believed
agencies needed to walk before they could run, and putting procedures and protocols in place was an important first step in protecting governments critical infrastructure.
Since its enactment, FISMA has undoubtedly served to elevate
the importance of information management and information security in government, and I am proud of the progress we have made.
That said, there is room for updates and improvement, and your
legislation, I think, is a very positive step in that direction. It is
time to really take FISMA to the next level.
While I believe the requirements listed in FISMA would be components of any sound information security plan, the need at
present is to operationalize its implementation. This would involve
tools such as Red Team penetration tests. It would also require appropriate performance measures and, as the time between a penetration and detection, the time to deploy a security patch once it
has been released, and the time to complete a root cause analysis
when a security breach does occur, I am pleased your language references both penetration tests and performance measures.
Three other key ingredients: Responsibility, Authority, and Accountability.
Chief Information Security Officers (CISOs), may be responsible
for overall information security planning, but they cant be just the
bad men when things go wrong. Responsibility for an information
security program permeates an organization, from the head of the
agency to every employee. Most of the security breaches that have
grabbed headlines in recent years arent the result of some evil
cyber genius but Federal employees failing to adhere to basic security protocolsa lost laptop, a stolen Blackberry, computers never
returned when an employee leaves an agency. These can result in
the personal information of untold thousands being put at risk.
CISOs might have to come up with the protocols, but the rank
and file have to adhere to them. As Congress looks at information
security issues, it might be wise to consider uniform procedures,
training, and penalties to reduce theft, loss, or other adverse
events. I might add, in the private sector, training is very critical
in these areas and it is drummed into employees at every level.
Your language gives CISOs authority to development, implement, and enforce security measures. That is important. There also
have to be consequences, good and bad, for failures and successes.
That is one aspect of the accountability component. The private
sector provides some models. For example, the payment card industry mandates compliance with standards set by the PCI Security
Standards Council. Failure to adhere to these standards results in
a business losing the ability to conduct transactions with payment
cards. Now, that exact example isnt going to fit the Federal system, but we need carrots and we need sticks that promote compliance and punish negligence.
Jkt 053852
PO 00000
Frm 00009
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
Another aspect of accountability deals with funding. Federal Government spending has risen sharply in recent years, but to what
end? We have to link performance in this specific instance, performance of information security products and services, with spending decisions. Simply asking for more or providing more isnt going
to fix the problem, nor is it going to serve the interest of the American people.
In closing, I would like to reiterate my appreciation for the work
you are doing on information security. The information age is indeed a strange new world in which a mischievous teenager could
be just as dangerous as a terrorist organization or malevolent government. I am committed to helping however I can to make sure
our Federal systems are up to the task and that our oversight
mechanisms are commensurate to the need, and I think your legislation is a good step forward. Thank you.
Senator CARPER. Thank you very much, Congressman.
I dont know if you have ever done this, but one of the things I
have done for a number of years as a new Senator here, whenever
it is one of my colleagues birthdays, I actually call them on the
phone if we are not in session and just wish them a happy birthday, track them down wherever they are, around the country or
really around the world. Those are calls that I enjoy, and I think
my colleagues do. I do the same thing with members of my staff,
former members of my staff and just family and friends.
I dont know if this is true, but it is in my briefing notes so it
must be truebut I am told that today happens to be the birthday
of the Internet, and I was thinking about maybe just sending an
e-mail out and seeing how well it can get around and cover as
much of the Internet as we could [Laughter.]
But I understand that 40 years ago, Im told, in 1969, the first
message was sent out on the Internet, and I understand that the
message also ended up crashing the Internet. [Laughter.]
So todays hearing is timely.
I would just ask, Congressman Davis, as one of the principal authors and Congressional overseers of the FISMA legislation, you
know all too well that there have been some successes and some
challenges since its adoption. For example, it seems that OMB has
historically focused on agency compliance rather than on agency
outcomes. And I must say, we are real good at focusing on process
and compliance rather than outcomes.
Arne Duncan was just in Delaware, the Secretary of Education,
and he spent a fair amount of time at the University of Delaware
2 days ago talking about the need for us in education to focus not
on process, but on outcomes. It turns out that is not just in education, but it is in this regard, as well.
Could you take a few minutes maybe and explain to us where
you think there are opportunities to improve agency cyber security?
It seems like the sophistication of the attacks dramatically evolves
every year. We just met with an agency head in the current Administration who shared with us just how many cyber attacks are occurring every day on his agency, on the agency that he leads. It
is alarming. But this training has led to a huge increase in the
number of reported breaches by agencies.
Jkt 053852
PO 00000
Frm 00010
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
Jkt 053852
PO 00000
Frm 00011
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
Jkt 053852
PO 00000
Frm 00012
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
Jkt 053852
PO 00000
Frm 00013
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
10
Jkt 053852
PO 00000
Frm 00014
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
11
a lot of systems that, at the end of the day, some are better than
others. They dont talk to each other. It has to get coordinated.
One of the things I like about this bill is you use our purchasing
power together to drive those products and I think that will bring
it together much better than we have today. We spend a lot of
money. We dont always get what we want in government contracting across the board. But in this particular case, I thinkI
like your concepts that you have in this bill, government using its
power. I think that will drive a congruity of products that is absolutely necessary in this case to get this solved.
Senator CARPER. Alright. Well, those are my questions. Some of
my colleagues who are waiting back in the anteroom until you
leaveno, they are not, but when some of my colleagues show up,
whether they show up or not, some of them are going to have some
questions that they would like to send along
Mr. DAVIS. You can always get them to me. We are happy to respond. You have a great second panel, as well, and thanks for allowing me to share my views.
Senator CARPER. It is great to see you. Thanks so much for your
previous service to our country, and not just for the folks in Virginia, but also in Delaware and the other 48 States.
Mr. DAVIS. Thank you.
Senator CARPER. Good luck. Take care.
The second panel is welcome to approach the table and take your
seats. Gentlemen, welcome. It is good to see you all, and thank you
for taking the time to be with us today.
I understand from Erik Hopkins, who has worked on this legislation for a couple of years now, that we have on a dolly up here
some of the paperwork that kind of flows fromis it just one agency? Not just from one agency, but from one system, is that right,
one system within one agency, their paperwork from their certification and accreditations. If that is just one system and one agency, I hate to think what would be the case for the whole government.
Be careful, Mr. Streufert. You are not going to have a place to
sit here very soon. Well, that gives us some idea. That is a fair
amount of paperwork. And again, that is one system and one agency. We wouldnt be able to see you guysyou probably wouldnt be
able to get in the roomif we had all of them gathered here today.
Let me make some introductions to kick off our second panel. We
are going to hear from Vivek Kundra, who was appointed Federal
Chief Information Officer of the United States by President Obama
in March of this year. We are glad to see you are still able to sit
up and take nourishment and to be here with us today. You look
none the worse for wear.
As Congressman Davis mentioned earlier, prior to his taking his
current position, Mr. Kundra served in Mayor Fentys cabinet as
the Chief Technology Officer for the District of Columbia and in
Governor Kaines cabinet as Assistant Secretary of Commerce and
Technology for the Commonwealth of Virginia. You are great to be
here and we appreciate your service and thank you for your presence.
Our next witness is no stranger before our Subcommittee. Mr.
Wilshusen. He is the Director of Information Security Issues at the
Jkt 053852
PO 00000
Frm 00015
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
12
Government Accountability Office. We are told today by our chaplain, Chaplain Barry Black, Chaplain for the U.S. Senate, he said
the words that people most enjoy hearing in their lives is the sound
of their own name. Among the words that they least like to hear
are their own name mispronounced, so we will try to get your
names right. But I will say, none of your parents made this easy
for a guy like me. [Laughter.]
So please bear with me. But I am told you have over 28 years
of auditing, financial management, information systems experience
starting at the age of 12, and you have been at it for quite a while.
Before joining GAO in 1997, Mr. Wilshusen held a variety of public
and private sector positions, so we thank you for coming back
today.
Our last witness is John Streufert. Your name doesnt look like
Stroy-fert, but it is, isnt it? I bet it has been mispronounced once
or twice, hasnt it?
Mr. STREUFERT. Yes. Every day.
Senator CARPER. You are the Chief Information Security Officer
at the Department of State. You are like our hero here today, and
we are here to celebrate what you have done and to try to find out
if it is something we can replicate in other agencies.
I am told that since starting your current job, you have been recognized for outstanding leadership and improving cyber security at
both the Department of State and the U.S. Agency for International Development (USAID). In fact, Mr. Streufert was a recipient of the Distinguished Presidential Rank Award in 2004 for his
work at USAID, and I understand that you will show us once again
how we can improve cyber security, so good for you.
With that having been said, we will turn to Mr. Kundra as our
first witness and ask you to proceed. Your statements will be made
part of the record, so feel free to summarize as you wish. But you
are recognized. Thank you.
TESTIMONY OF VIVEK KUNDRA,1 FEDERAL CHIEF INFORMATION OFFICER, ADMINISTRATOR FOR ELECTRONIC GOVERNMENT AND INFORMATION TECHNOLOGY, U.S. OFFICE
OF MANAGEMENT AND BUDGET
1 The
Jkt 053852
PO 00000
Frm 00016
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
13
Jkt 053852
PO 00000
Frm 00017
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
14
a culture of outcomes in the first quarter of 2010. What gets measured gets done.
The threats we face are numerous, evolving faster than our cyber
defenses, and they have the potential to do great harm to our cyber
infrastructure. From the launch of CyberScope to the hiring of up
to 1,000 new DHS cyber security experts, the Administration is
committed to strengthening our cyber defense. A secure, trusted
computing environment in the Federal Government is the responsibility of everyone involved, from agency heads to those charged
with oversight. It entails employees, contractors, and the American
people all working together.
This will not be easy, nor will it occur overnight. Our current actions represent important steps toward a strong cyber defense and
begin the shift from a culture of compliance to one focused on real
security to protect the digital infrastructure that is so vital to our
economic prosperity and national security.
Thank you for the opportunity to testify. I look forward to your
questions.
Senator CARPER. You bet. It is I who thank you.
Mr. Wilshusen, please proceed. Thank you, and welcome back.
TESTIMONY OF GREGORY C. WILSHUSEN,1 DIRECTOR, INFORMATION TECHNOLOGY SECURITY ISSUES, U.S. GOVERNMENT ACCOUNTABILITY OFFICE
1 The
Jkt 053852
PO 00000
Frm 00018
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
15
Jkt 053852
PO 00000
Frm 00019
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
16
TESTIMONY OF JOHN STREUFERT,1 CHIEF INFORMATION SECURITY OFFICER AND DEPUTY CHIEF INFORMATION OFFICER FOR INFORMATION SECURITY, BUREAU OF INFORMATION RESOURCE MANAGEMENT, U.S. DEPARTMENT OF
STATE
1 The
Jkt 053852
PO 00000
Frm 00020
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
17
cluding the related products, like the security plans, of roughly
$1,400 per page.
And indeed, if there is any particular problem with this, it is not
the content of the report, it is the fact that you could get a false
sense of security that these snapshots produce results on paper
that are extraordinarily accurate but out of date within days of
being published, in fact, perhaps out of date even in the time that
it took to print these 2,000 pages.
In contrast, this month, the Office of Management and Budget
launched CyberScope, a secure streamlined interactive data collection platform far more efficient in allowing and also allowing research and analysis across Federal agencies. The U.S. Chief Information Officer has similarly and in support of this formed an interagency task force charged with developing outcome-focused metrics
for information security performance by all Federal agencies and
departments, including the Department of State. Final metrics
based on this work are expected to be released later this fiscal
year.
For its part, the Department began supplementing its FISMA
compliance reports and studies with a risk scoring program that
scanned every computer and server connected to its network not
less than every 36 hours on eight factors and twice a month for
safe configurations with software. This risk scoring program utilizes best practices, such as the Consensus Audit Guidelines, which
was a collaborative effort between government and industry.
To assess the vulnerabilities, we use the Common Vulnerability
Scoring System of the National Institute of Standards and Technology and the Department of Homeland Security, where scanning
tools tag specific risks with point values between zero and 10, with
10 being the highest vulnerability. When the problem is resolved
in this method, risk points are deducted and a better score comes
to the technical team and organizations. This computation occurs
no matter where they are located across the world.
Since mid-July, overall risk on the Departments key unclassified
network, measured by the Risk Scoring Program, has been reduced
by 90 percent in overseas sites and 89 percent at domestic sites,
as the chart indicates.1 These methods have allowed one critical
piece of the Departments information security program to move
from snapshots in time to a program that scans for weaknesses
continually, identifies weak configurations each 15 days, recalculates the most important problems to fix in priority order on a
daily basis, and issues letter grades of A-plus through F monthly
to managers so that accountability for progress can be taken for
every organization as experience has indicated for them over the
past 30 days. The various score reports tabulate risk scores by region, compare progress overseas to our domestic sites, and creates
enterprise-wide summaries for senior management.
In short, these details empower administrators with targeted
daily attention to conduct remediation and offer summaries to empower experts to our executives to oversee the most serious problems.
ph44585 on D330-44585-7600 with DISTILLER
1 The
Jkt 053852
PO 00000
Frm 00021
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
18
Mr. Chairman, I want to conclude by emphasizing that the Departments policies, technologies, business processes, and partnerships in place continue to evolve and continue to meet the challenges as the threats change in the cyberspace environment. I
thank you and the Subcommittee for this opportunity to speak before you today and would be pleased to respond to any of your
questions.
Senator CARPER. Thanks, Mr. Streufert, for that testimony.
Thanks for being a good role model over at the State Department
and USAID for the rest of us.
I just want to start with this chart,1 and it looks like a reduced
risk of cyber vulnerabilities, about 89 percent at the State Department headquarters from July 2008 to July 2009, and 90 percent
abroad. Did you anticipate this kind of progress in a year when you
were getting into this? Did you anticipate this kind of a record of
achievement?
Mr. STREUFERT. At the Agency for International Development
(AID), we had a similar progress, a two-thirds reduction in a 6month period, so we had a feeling that it was possible but had not
yet tested this on the scale of an organization the size of the State
Department. We were certainly very pleased, and at that point, we
began discussing what had been found with our colleagues.
Senator CARPER. You mentioned this in your testimony. I want
you to go back. Kind of walk us through again why were you so
successful at the State Department and at AID before that? What
were the key elements again, please?
Mr. STREUFERT. This is an instance where support beneficially
comes from many parts of the organization. It begins, as Congressman Davis indicated, with strong support at the top, and I am
pleased to say that the senior leadership of the State Department
has been very supportive at each step on the way.
Senator CARPER. When you say senior, how senior? What are we
talking about?
Mr. STREUFERT. Under Secretary for Management Patrick Kennedy, and he has assembled an EGovernment Oversight Board for
the Department of State. I have been able to speak on progress before this group twice in the last year. So there has been strong involvement from the top of the organization.
The next beneficial thing that one needs is the coordination
and
Senator CARPER. Why do you suppose the folks at the top were
so supportive?
Mr. STREUFERT. Well, we understand that strong information security is essential for our mission. We are spread in 24 time zones.
The ability to send and receive information in support of American
citizens services, and in support of the passport and visa process
are vital to our mission. We understand that we depend on the information systems, and therefore the security related to them.
Senator CARPER. OK. Other than support at the top, what were
the other key elements in your success?
Mr. STREUFERT. We brought together a coalition of 11 different
organizations inside the State Department that worked on techph44585 on D330-44585-7600 with DISTILLER
1 The
Jkt 053852
PO 00000
Frm 00022
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
19
nology matters, and that set the template where we could begin
our regular scanning. And after that point, when we deployed the
system, the fact that the individuals at each of the embassies and
consulates and headquarters organizations could understand exactly what they needed to fix, it was of substantial benefit to them
to get some of the positive reductions in risk points that the chart
and our experience indicates.
Senator CARPER. Now, talk to us about other agencies being able
to replicate the success that you enjoyed at the State Department.
Other than cloning you, moving the agency heads from State over
tocloning them and moving them into the other agencies, how
transferrable is this to other agencies? What do you think might
transfer and what might not?
Mr. STREUFERT. One item that we always mention in discussion
with other cabinet departments is that we used information that
was already being collected in our organization for other purposes,
including producing the certification and accreditation reports.
Eighty percent of the information, as an example, was an outgrowth of what we needed to manage our servers and personal
computers already. So it was simply a question of lifting that data
up and out of where it was at the local level and then putting it
in the security warehouse. Once there, our dashboard calculates
grades and shows the most serious problems that need to be
worked on.
Since many of the other parts of the Federal Government have
this software, the primary things to work on are assuring that all
of the networks are connected and that they have the support
structures in place in order to put the security information out to
the managers who want to make the changes. And I should hasten
to add, the progress at the State Department came from thousands
of individuals that were working every day on their most serious
problems, and that is where the progress indeed came from.
Senator CARPER. Let me ask, first, Mr. Kundra, and then Mr.
Wilshusen about replicating this kind of success. How do we go
about doing that? In fact, it may be something you have already
begun. I dont know.
Mr. KUNDRA. Yes. We started talking about this back in April,
and within the Federal CIO Council, Susan Swart, who is the CIO
at the State Department, has been sharing this approach with our
colleagues. But if you look at what we are doing across the Federal
Government, CyberScope is the first step in that direction in terms
of if you looked at the previous approach, it was manual, it was
based on a lot of paperwork and didnt really produce meaningful
insight where we could slice and dice information across the Federal Government so we could compare what was happening at
Health and Human Services versus State versus DOD versus Department of Energy. The first step is to make sure that we are getting data and information so we could get meaningful insight.
The second part of that, which is the task force that we are
spending a lot of energy and we would love to share the metrics
with you and get feedback from the Congress at the end of November, and these metrics are essentially going to be focused on game
changing ways where we can address real security. So not necessarily asking the question, do you have a patch management pro-
Jkt 053852
PO 00000
Frm 00023
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
20
gram, but getting to the point which is how long does it take you
to actually patch those systems.
And thinking about the Red Teams, it is not enough to just say
we have this file room that you pointed to. I talk about how the
files you see in that room are actually far more secure than the
very systems they are supposed to protect. So how do we get Red
Teams to validate that the information that is out there, we are
testing it against what we know in terms of agencies and it makes
it really difficult right now across the Federal Government to spot
patterns. So if we see a threat vector that may start at the State
Department, how do we know we dont have the same threat vector
at Health and Human Services?
So we are in the early phases in terms of deploying a Federal
Government-wide approach. But the key here, as Congressman
Davis said, is to move away from this culture of compliance and
really move towards execution. How do we get these things done
and how do we apply some of these methodologies? And I know
that DHS and the National Institute of Standards and Technology
(NIST) are actually working with the State Department to think
through how this can be scaled across other Federal agencies.
Senator CARPER. Mr. Wilshusen, same question in terms of
replicability. What do you think we ought to be able to replicate
and why not?
Mr. WILSHUSEN. Well, I had the privilege of Mr. Streufert giving
me a presentation of his system last week, and so I cant really attest to the accuracy of the data that he presents, but a couple of
things
Senator CARPER. Would you say that the accuracy is probably
pretty skeptical?
Mr. WILSHUSEN. Well, I just dont have data or evidence to show
that it is accurate. I cant say one way or the other. We just havent
done the tests on that.
But what his system shows is a lot of promise. With regard to
replicability, one of the key aspects that it relies upon is the ability
to have automated tools in place that have the capability to reach,
touch, and then scan each of the devices that are covered under
this particular system. Now, the Department of State has, according to their system, about 30,000 devices that are covered by this
particular system.
It does at the present, as I understand it, cover Windows
workstations and servers. And so presumably, it might be able to
be replicated at other agencies to address those particular servers
if those other agencies allow a central point to be able to go out
and reach all those devices throughout the entire organization, and
that may or may not be the case. I just dont know.
Senator CARPER. Erik Hopkins, sitting right behind me, just
handed me a note that says, Agencies are making the decision
right now to spend another $1.3 billion to produce the paperwork
we see here. Is there anything we can do about that? It is a pretty
good question.
Mr. WILSHUSEN. It is, indeed. Certainly, as you know, FISMA requires that agencies implement cost-effective solutions to mitigate
their risks, and one has to make the assessment, is spending this
Jkt 053852
PO 00000
Frm 00024
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
21
amount of money on preparing presumably the certification and accreditation documents appropriate?
If it is just to prepare paperwork, that is not really cost-effectivethe agency would not be receiving the true value of the execution of the underlying processes that are represented by that paperwork. Primarily, are they assessing the risks? Are they developing and documenting controls that mitigate those risks? And
then are they providing the training to staff, to implement those
controls, testing and evaluating those controls to make sure that
they are operating as intended and are effective? And then remediating deficiencies as those become known?
Those are all activities that are required under FISMA with regard to agencies information security programs and some of the activities that are required in order to go through the certification
and accreditation process. So if the process is just to check off
boxes on paperwork, then that is not very useful. The important
part is that the agencies are effectively performing these processes
in order to implement controls that effectively protect their systems.
Senator CARPER. Mr. Kundra.
Mr. KUNDRA. If I can add to that, I want to make sure as we look
at the paperwork that we are seeing here in systems that the State
Department is talking about and other agencies, I agree in terms
of the fact that the pendulum has definitely swung too much towards a paperwork exercise. But I also want to caution that some
of these systems have very sensitive information regarding the personal information of the American people, Social Security numbers,
and the processes conducted on these systems are also very sensitive.
So although I recognize that there is a lot of paperwork here, it
is very important to make sure that this is also a process that ensures accountability for the business owners in terms of making
sure that before a system goes online, have they done a risk assessment? Have they thought about all the risks? Do they have the
right controls in place in terms of running the system? Have they
made sure that they have back-ups and thought through the processes required to connect this to other systems?
But what has happened, unfortunately, is a lot of agencies are
also treating this as a paperwork exercise rather than saying, look,
just like if an airplane were to take off, the first flight, you would
go through a number of checks, but after it takes off, you need to
make sure that you are monitoring all the dials and the gauges to
understand where you are in the air. What has happened is, unfortunately, a lot of agencies are substituting and are looking at these
processes as a 3-year exercise rather than saying, what do we do
on an ongoing basis after the system goes live? What do we do to
make sure that we are monitoring risk on a real-time basis?
Senator CARPER. Alright. Mr. Wilshusen, did you want to add
anything else?
Mr. WILSHUSEN. Yes, I did. I would just echo what Mr. Kundra
mentioned is the fact that it is critical that agencies provide a monitoring capability and test and evaluates the effectiveness of their
controls on a regular, current basis, because the threats change,
the vulnerabilities change daily. Waiting every 3 years at specific
Jkt 053852
PO 00000
Frm 00025
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
22
Jkt 053852
PO 00000
Frm 00026
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
23
Jkt 053852
PO 00000
Frm 00027
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
24
Jkt 053852
PO 00000
Frm 00028
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
25
Senator CARPER. In a day and age when we have seen in the first
8 years of this decade, we literally doubled our Nations debt, we
ran it up by another $1.4 trillion last year, and likely even more
this year, every time we can save some pennies on the dollar, that
is good. It sounds like in this case it is quarters on the dollar,
which is even better.
A couple more questions and then we will wrap it up. This would
be a question really for the entire panel. In the current FISMA legislation that we have drafted, Inspectors General must evaluate
whether agencies are securing their systems like they say that they
are securing them. That means that agencies are spending $1.3 billion to produce the paperwork that the IGs use to evaluate agency
effectiveness. IGs then must spend even more time and more
money, perhaps another $1 billion or so, to see whether the paperwork was accurate. So the government ends up spending maybe
over $2 billion, maybe it is $2.3 billion or so, on a process that is
basically flawed. It doesnt make a lot of sense to me, and I dont
think to others, as well.
Could each of you just take a couple of moments and tell us what
you think the role of the IG should be in cyber security? And
maybe better yet, how do we make the partnership between an
agency and that agencys IG more proactive, more collaborative, so
that we arent wasting or they arent wasting so much money? Do
you want to go first, Mr. Streufert?
Mr. STREUFERT. Yes, Senator Carper. This is a key question. The
first thing we might say is that these products in the three-ring
binders here, a systems security plan, a contingency plan, testing
plans, test results, these are all important things to do. What the
finding of the State Department is, that with the modern tools that
are increasingly available since FISMA was put into law, we can
do that 72 times more frequently than the 3-year standard of producing these binders.
So the first thing to say is that as we look at the possibility for
continuous monitoring, the discussions between the departments
and the OIGs could be on data that was as fresh as 15 days old,
as opposed to what I will have to do unless there is an adjustment.
It will take me a full 8 months to produce these 2,000 pages for
the third time when I know that many elements of that data I am
already collecting every 2 to 15 days.
I would say that our conversations with the OIG would be
stronger if we had common measuring sticks for security, not just
in the vulnerability area, which we have already done very well,
but many other parts of our security program. And if we had an
agreement between the parties that managed the security program
of what were the criteria for evaluation in advance, not just within
an individual cabinet department but across the entire government, we would be able to compare the relative security between
one cabinet department or agency and another.
I think the worst mistake of all we could make, even though the
dramatic nature of some of our expenditures of C&As, is to make
the mistake of doing less than we are currently doing. So notwithstanding, I would be the first person to say that we should try to
use automated means rather than paper. We want to make sure
before we set aside the paper methods that we would do our very
Jkt 053852
PO 00000
Frm 00029
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
26
best to make sure we have a stronger system than the one that we
just left behind.
Senator CARPER. Mr. Wilshusen.
Mr. WILSHUSEN. And I would also agree to a large extent with
what Mr. Streufert said, in that many of these documents that are
being prepared are not being prepared just for the benefit of the
auditor, but, in fact, are being prepared in order to adequately protect the systems that are being covered by those documents.
Now, having said that, certainly auditors have a responsibility to
review the effectiveness of security controls, and that includes testing a subset of systems. In our examinations, while we do look at
certain documents that are the products or byproducts and artifacts of agency processes, we are also looking at how systems are
actually configured and testing the effectiveness of those controls.
So it is more than just reviewing documents. It is actually doing
a more in-depth review, and that is what IGs are doing and should
be doing, as well, in addition to reviewing some of the artifacts that
are generated from agency security processes.
Senator CARPER. Alright. Mr. Kundra, you get the last word on
this question, and then I have one more separate question for you
and we will call it a day.
Mr. KUNDRA. I think it is impossible to confront a real-time
threat, such as cyber warfare or adversaries and State actors and
organized crime that are actively trying to hack into our systems,
with a process that is built around annual reporting, quarterly reporting, or whether you do it on a monthly basis. What needs to
happen in terms of the relationship between the IGs and the CIOs
is that they need to have greater transparency into the same data
and moving toward a real-time platform so they could both see
what is happening on a real-time basis and constructively move the
security posture of the U.S. Government rather than relying on reports that are created.
By the time that report is printed and handed over to the IG,
there is already a new threat factor that is created on a real-time
basis. The velocity at which these threats come and the frequency
cannot be addressed with a filing cabinet like this.
Senator CARPER. Good point. Thank you.
And the last question, I think I will direct it just to Mr. Kundra
unless other panelists think he mis-answers the question, then you
can correct him. In your current position, how do you like what you
are doing? Are you enjoying it? Is it challenging? Do you ever get
to go home at night?
Mr. KUNDRA. It is great. Very little sleep, but it is an enormous
opportunity to serve the country and to advance the Presidents
technology agenda.
Senator CARPER. Alright. Good. In your current position, I think
you are maybe the person responsible for overseeing the effectiveness of our Federal Governments cyber defense, and that is a government, as we know, that is composed of hundreds, maybe thousands of different systems. I am told that you have relatively few,
if any, cyber security experts that work for you and I find that of
concern, maybe even troubling.
But I find it even more troubling that OMB, which is known for
their budget prowess, has never asked for a detailed accounting of
Jkt 053852
PO 00000
Frm 00030
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
27
Jkt 053852
PO 00000
Frm 00031
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
28
Jkt 053852
PO 00000
Frm 00032
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
29
that are underway every day, every hour, every minute. It really
puts this in real time and with a real sense of urgency.
My next point is the fact that OMB is, I think, the only one who
really can make this happen absent Congress passing a bill. I
would again say, Mr. Kundra, actually take a hard look at what
you can do, and I sense that you are already doing that, to make
sure that we dont waste another year, another $1 billion, if not
more, to do something that doesnt work very well.
My last point is the fact that, obviously, that we all need to work
together. I am pleased to see with the three of you here before us,
it is a pretty good model of how we can cooperate and I hope that
we are part of that, as well. But technology changes so fast that
without a partnership betweennot just among agencies, but also
between the Legislative Branch and the Executive Branch, Americans, unfortunately, are going to end up on the losing end, and we
dont want that to happen.
I am going to ask, I think, for you all to come back to me, I will
put this in writing, but to come back to us in maybe 2 weeks with
opportunities that you believe will lead to efficiencies in defending
our networks. If you do that, I would be grateful. If you get any
other questions from my colleagues, then if you would respond to
those within 2 weeks, that would be terrific.
Thank you all very much for coming today, for your testimony,
and for the work that you are doing. I would encourage you to continue on and we will do our best to have you back. Thank you.
And with that having been said, this hearing is adjourned.
[Whereupon, at 4:07 p.m., the Subcommittee was adjourned.]
Jkt 053852
PO 00000
Frm 00033
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
Jkt 053852
PO 00000
Frm 00034
Fmt 6633
Sfmt 6633
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
APPENDIX
Jkt 053852
PO 00000
Frm 00035
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.001
(31)
Jkt 053852
PO 00000
Frm 00036
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.002
32
Jkt 053852
PO 00000
Frm 00037
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.003
33
Jkt 053852
PO 00000
Frm 00038
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.004
34
Jkt 053852
PO 00000
Frm 00039
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.005
35
Jkt 053852
PO 00000
Frm 00040
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.006
36
Jkt 053852
PO 00000
Frm 00041
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.007
37
Jkt 053852
PO 00000
Frm 00042
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.008
38
Jkt 053852
PO 00000
Frm 00043
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.009
39
Jkt 053852
PO 00000
Frm 00044
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.010
40
Jkt 053852
PO 00000
Frm 00045
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.011
41
Jkt 053852
PO 00000
Frm 00046
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.012
42
Jkt 053852
PO 00000
Frm 00047
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.013
43
Jkt 053852
PO 00000
Frm 00048
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.014
44
Jkt 053852
PO 00000
Frm 00049
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.015
45
Jkt 053852
PO 00000
Frm 00050
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.016
46
Jkt 053852
PO 00000
Frm 00051
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.017
47
Jkt 053852
PO 00000
Frm 00052
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.018
48
Jkt 053852
PO 00000
Frm 00053
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.019
49
Jkt 053852
PO 00000
Frm 00054
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.020
50
Jkt 053852
PO 00000
Frm 00055
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.021
51
Jkt 053852
PO 00000
Frm 00056
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.022
52
Jkt 053852
PO 00000
Frm 00057
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.023
53
Jkt 053852
PO 00000
Frm 00058
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.024
54
Jkt 053852
PO 00000
Frm 00059
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.025
55
Jkt 053852
PO 00000
Frm 00060
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.026
56
Jkt 053852
PO 00000
Frm 00061
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.027
57
Jkt 053852
PO 00000
Frm 00062
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.028
58
Jkt 053852
PO 00000
Frm 00063
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.029
59
Jkt 053852
PO 00000
Frm 00064
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.030
60
Jkt 053852
PO 00000
Frm 00065
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.031
61
Jkt 053852
PO 00000
Frm 00066
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.032
62
Jkt 053852
PO 00000
Frm 00067
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.033
63
Jkt 053852
PO 00000
Frm 00068
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.034
64
Jkt 053852
PO 00000
Frm 00069
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.035
65
Jkt 053852
PO 00000
Frm 00070
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.036
66
Jkt 053852
PO 00000
Frm 00071
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.037
67
Jkt 053852
PO 00000
Frm 00072
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.038
68
Jkt 053852
PO 00000
Frm 00073
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.039
69
Jkt 053852
PO 00000
Frm 00074
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.040
70
Jkt 053852
PO 00000
Frm 00075
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.041
71
Jkt 053852
PO 00000
Frm 00076
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.042
72
Jkt 053852
PO 00000
Frm 00077
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.043
73
Jkt 053852
PO 00000
Frm 00078
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.044
74
Jkt 053852
PO 00000
Frm 00079
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.045
75
Jkt 053852
PO 00000
Frm 00080
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.046
76
Jkt 053852
PO 00000
Frm 00081
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.047
77
Jkt 053852
PO 00000
Frm 00082
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.048
78
Jkt 053852
PO 00000
Frm 00083
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.049
79
Jkt 053852
PO 00000
Frm 00084
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.050
80
Jkt 053852
PO 00000
Frm 00085
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.051
81
Jkt 053852
PO 00000
Frm 00086
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.052
82
Jkt 053852
PO 00000
Frm 00087
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.053
83
Jkt 053852
PO 00000
Frm 00088
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.054
84
Jkt 053852
PO 00000
Frm 00089
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.055
85
Jkt 053852
PO 00000
Frm 00090
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.056
86
Jkt 053852
PO 00000
Frm 00091
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.057
87
Jkt 053852
PO 00000
Frm 00092
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.058
88
Jkt 053852
PO 00000
Frm 00093
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.059
89
Jkt 053852
PO 00000
Frm 00094
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.060
90
Jkt 053852
PO 00000
Frm 00095
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.061
91
Jkt 053852
PO 00000
Frm 00096
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.062
92
Jkt 053852
PO 00000
Frm 00097
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.063
93
Jkt 053852
PO 00000
Frm 00098
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.064
94
Jkt 053852
PO 00000
Frm 00099
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.065
95
Jkt 053852
PO 00000
Frm 00100
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.066
96
Jkt 053852
PO 00000
Frm 00101
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.067
97
Jkt 053852
PO 00000
Frm 00102
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.068
98
Jkt 053852
PO 00000
Frm 00103
Fmt 6601
Sfmt 6601
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.069
99
100
Jkt 053852
PO 00000
Frm 00104
Fmt 6601
Sfmt 6011
P:\DOCS\53852.TXT
SAFFAIRS
PsN: PAT
53852.070