Digital Acts of War: Evolving the Cybersecurity Conversation

Subcommittee on National Security
Subcommittee on National Security
Subcommittee on Information Technology
Subcommittee on Information Technology
Hearing Date: July 13, 2016 1:00 pm 2154 Rayburn HOB

PURPOSE:

  • To examine the strategies and policies of the administration’s response to cybersecurity incidents.
  • To review the growing market for threat intelligence, the pros/cons of making attribution after cybersecurity incidents, and the benefits of clarifying international norms of cyber operations.

BACKGROUND:

  • Data breaches at the Office of Personnel Management and at private sector companies have validated a 2013 National Intelligence Estimate that the U.S. is “the target of a massive, sustained cyberespionage campaign that is threatening the country’s economic competitiveness.”
  • Hostile actors remain undeterred from conducting cyberattacks because of the relatively low costs of entry, the perceived payoff, and the lack of significant consequences.
  • Russia and China continue to view offensive cyber capabilities as an important geostrategic tool and will almost certainly continue developing them.

 

Witnesses and testimonies

Name Title Organization Panel Document
Mr. Aaron Hughes Deputy Assistant Secretary for Cyber Policy U.S. Department of Defense Document
Mr. Chris Painter Coordinator for Cyber Issues U.S. Department of State Document
Gen. (Ret.) Keith Alexander CEO and President IronNet Cybersecurity Document
Mr. Sean Kanuck Counsel Legal and Strategic Consulting Services Document
Mr. Peter Warren Singer Strategist and Senior Fellow New America Document