Cybersecurity: 
Authoritative Reports and Resources 
Rita Tehan 
Information Research Specialist 
May 24, 2013 
Congressional Research Service 
7-5700 
www.crs.gov 
R42507 
CRS Report for Congress
Pr
  epared for Members and Committees of Congress        
Cybersecurity: Authoritative Reports and Resources 
 
Summary 
Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. 
Attacks have been initiated by individuals, as well as countries. Targets have included 
government networks, military defenses, companies, or political organizations, depending upon 
whether the attacker was seeking military intelligence, conducting diplomatic or industrial 
espionage, or intimidating political activists. In addition, national borders mean little or nothing to 
cyberattackers, and attributing an attack to a specific location can be difficult, which also makes a 
response problematic. 
Congress has been actively involved in cybersecurity issues, holding hearings every year since 
2001. There is no shortage of data on this topic: government agencies, academic institutions, 
think tanks, security consultants, and trade associations have issued hundreds of reports, studies, 
analyses, and statistics. 
This report provides links to selected authoritative resources related to cybersecurity issues. This 
report includes information on  
•  “Legislation” 
•  “Executive Orders and Presidential Directives” 
•  “Data and Statistics” 
•  “Cybersecurity Glossaries” 
•  “Reports by Topic” 
•  Government Accountability Office (GAO) reports 
•  White House/Office of Management and Budget reports 
•  Military/DOD 
•  Cloud Computing 
•  Critical Infrastructure 
•  National Strategy for Trusted Identities in Cyberspace (NSTIC) 
•  Cybercrime/Cyberwar 
•  International 
•  Education/Training/Workforce 
•  Research and Development (R&D) 
•  “Related Resources: Other Websites” 
The report will be updated as needed. 
 
Congressional Research Service 
Cybersecurity: Authoritative Reports and Resources 
 
Contents 
Introduction ...................................................................................................................................... 1 
Legislation ....................................................................................................................................... 1 
CRS Reports and Other CRS Products:  Legislation ................................................................. 1 
Hearings in the 113th Congress ........................................................................................................ 4 
Hearings in the 112th Congress ........................................................................................................ 9 
Executive Orders and Presidential Directives ................................................................................ 19 
Data and Statistics .......................................................................................................................... 23 
Cybersecurity Glossaries ............................................................................................................... 30 
Reports by Topic ............................................................................................................................ 32 
CRS Reports and Other CRS Products.   Overview: Cybersecurity Policy Framework ......... 32 
CRS Reports: Critical Infrastructure ....................................................................................... 59 
CRS Reports and Other CRS Products:  Cybercrime and National Security .......................... 67 
Related Resources: Other Websites ............................................................................................... 90 
 
Tables 
Table 1. Major Legislation: Senate (113th Congress) ....................................................................... 2 
Table 2. Major Legislation: House (113th Congress) ....................................................................... 2 
Table 3. Major Legislation: Senate (112th Congress) ....................................................................... 2 
Table 4. Senate Floor Debate: S. 3414 (112th Congress) ................................................................. 3 
Table 5. Major Legislation: House (112th Congress) ....................................................................... 4 
Table 6. House Hearings (113th Congress), by Date ........................................................................ 5 
Table 7. House Hearings (113th Congress), by Committee .............................................................. 6 
Table 8. Senate Hearings (113th Congress), by Date ........................................................................ 7 
Table 9. Senate Hearings (113th Congress), by Committee.............................................................. 8 
Table 10. House Hearings (112th Congress), by Date .................................................................... 10 
Table 11. House Hearings (112th Congress), by Committee .......................................................... 12 
Table 12. House Markups (112th Congress), by Date .................................................................... 15 
Table 13. Senate Hearings (112th Congress), by Date .................................................................... 15 
Table 14. Senate Hearings (112th Congress), by Committee.......................................................... 16 
Table 15. Congressional Committee Investigative Reports ........................................................... 18 
Table 16. Executive Orders and Presidential Directives ................................................................ 20 
Table 17. Data and Statistics: Cyber Incidents, Data Breaches, Cyber Crime ............................... 24 
Table 18. Glossaries of Cybersecurity Terms ................................................................................ 31 
Table 19. Selected Reports: Cybersecurity Overview ................................................................... 33 
Table 20. Selected Government Reports: Government Accountability Office (GAO) .................. 37 
Congressional Research Service 
Cybersecurity: Authoritative Reports and Resources 
 
Table 21. Selected Government Reports: White House/Office of Management and Budget ........ 44 
Table 22. Selected Government Reports: Department of Defense (DOD) .................................... 47 
Table 23. Selected Government Reports: National Strategy for Trusted Identities in 
Cyberspace (NSTIC) .................................................................................................................. 51 
Table 24. . Selected Government Reports: Other Federal Agencies .............................................. 52 
Table 25. Selected Reports: Cloud Computing .............................................................................. 55 
Table 26. Selected Reports: Critical Infrastructure ........................................................................ 60 
Table 27. Selected Reports: Cybercrime/Cyberwar ....................................................................... 68 
Table 28. Selected Reports: International Efforts .......................................................................... 75 
Table 29. Selected Reports: Education/Training/Workforce ..........................................................  83 
Table 30. Selected Reports: Research & Development (R&D) ..................................................... 87 
Table 31. Related Resources: Congressional/Government ............................................................ 90 
Table 32. Related Resources: International Organizations ............................................................ 92 
Table 33. Related Resources: News ............................................................................................... 93 
Table 34. Related Resources: Other Associations and Institutions ................................................ 94 
 
Contacts 
Author Contact Information........................................................................................................... 95 
Key Policy Staff ............................................................................................................................. 95 
 
Congressional Research Service 
Cybersecurity: Authoritative Reports and Resources 
 
Introduction 
Cybersecurity is a sprawling topic that includes national, international, government, and private 
industry dimensions. In the 113th Congress, three bills have been introduced in the Senate and 14 
in the House. More than 40 bills and resolutions with provisions related to cybersecurity were 
introduced in the first session of the 112th Congress, including several proposing revisions to 
current laws. In the 111th Congress, the total was more than 60. Several of those bills received 
committee or floor action, but none have become law. In fact, no comprehensive cybersecurity 
legislation has been enacted since 2002. 
This report provides links to cybersecurity hearings and legislation under consideration in the 
113th and 112th Congresses, as well as executive orders and presidential directives, data and 
statistics, glossaries, and authoritative reports. 
For CRS analysis, please see the collection of CRS reports found on the Issues in Focus: 
Cybersecurity site. 
Legislation 
No major legislative provisions relating to cybersecurity have been enacted since 2002, despite 
many recommendations made over the past decade. The Obama Administration sent Congress a 
package of legislative proposals in May 20111 to give the federal government new authority to 
ensure that corporations that own the assets most critical to the nation’s security and economic 
prosperity are adequately addressing the risks posed by cybersecurity threats. 
Cybersecurity legislation advanced in both chambers in the 112th Congress. The House passed a 
series of bills that address a variety of issues—from toughening law enforcement of cybercrimes 
to giving the Department of Homeland Security oversight of federal information technology and 
critical infrastructure security to lessening liability for private companies that adopt cybersecurity 
best practices. The Senate pursued a comprehensive cybersecurity bill with several committees 
working to create a single vehicle for passage, backed by the White House—to no avail. The 
Senate bill also got mired in a procedural dispute over amendments. 
Table 1 and Table 2 provide lists of Senate and House legislation under consideration in the 113th 
Congress, in order by date introduced. When viewed in HTML, the bill numbers are active links 
to the Bill Summary and Status page in the Legislative Information Service (LIS). 
CRS Reports and Other CRS Products:  Legislation 
•  CRS Legal Sidebar, House Intelligence Committee Marks Up Cybersecurity Bill 
CISPA, Richard M. Thompson II 
•  CRS Legal Sidebar, Privacy and Civil Liberties Issues Raised by CISPA, Andrew 
Nolan 
                                                 
1 White House, International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World, May 
2011, at http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf. 
Congressional Research Service 
1 
Cybersecurity: Authoritative Reports and Resources 
 
•  CRS Legal Sidebar, CISPA, Private Actors, and the Fourth Amendment, Richard 
M. Thompson 
Table 1. Major Legislation: Senate (113th Congress) 
Bill No. 
Title 
Committee(s) 
Date Introduced 
S. 884 
Deter Cyber Theft Act 
Finance 
May 7, 2013 
S. 658 
Cyber Warrior Act of 2013 
Armed Services 
March 22, 2013 
S. 21 
Cybersecurity and American 
Homeland Security and 
January 22, 2013 
Cyber Competitiveness Act 
Government Affairs 
of 2013 
Source: Legislative Information System (LIS). 
Table 2. Major Legislation: House (113th Congress) 
Bill No. 
Title 
Committee(s) 
Date Introduced 
H.R. 1163 
Federal Information Security 
Oversight and Government 
March 14, 2013 
Amendments Act of 2013 
Reform 
H.R. 1121  
Cyber Privacy Fortification 
Judiciary 
March 13, 2013 
Act of 2013 
H.R. 967 
Advancing America's 
Science, Space, and 
March 14, 2013 
Networking and Information 
Technology 
Technology Research and 
Development Act of 2013 
H.R. 756 
Cybersecurity R&D 
Science, Space, and 
February 15, 2013 
Technology  
H.R. 624 
Cyber Intelligence Sharing and  Permanent Select Committee 
February 13, 2013 
Protection Act (CISPA) 
on Intelligence 
H.R. 86 
Cybersecurity Education 
Education and the Workforce;  January 3, 2013 
Enhancement Act of 2013 
Homeland Security; Science, 
Space and Technology 
Source: LIS. 
Table 3 and Table 5 list major Senate and House legislation considered by the 112th Congress, in 
order by date introduced. When viewed in HTML, the bill numbers are active links to the Bill 
Summary and Status page in the Legislative Information Service (LIS). The tables include bills 
with committee action, floor action, or significant legislative interest. Table 4 provides 
Congressional Record links to Senate floor debate of S. 3414, the Cybersecurity Act of 2012. 
Table 3. Major Legislation: Senate (112th Congress) 
Bill No. 
Title 
Committee(s) 
Date Introduced 
S. 413 
Cybersecurity and Internet Freedom Act  Homeland Security and 
February 17, 2011 
of 2011 
Governmental Affairs 
S. 1151 
Personal Data Privacy and Security Act 
Judiciary June 
7, 
2011 
of 2011 
S. 1342 
Grid Cyber Security Act 
Energy and Natural Resources 
July 11, 2011 
Congressional Research Service 
2 
Cybersecurity: Authoritative Reports and Resources 
 
Bill No. 
Title 
Committee(s) 
Date Introduced 
S. 1535 
Personal Data Protection and Breach 
Judiciary 
September 22, 2011 
Accountability Act of 2011 
S. 2102 
Cybersecurity Information Sharing Act 
Homeland Security and 
February 13, 2012 
of 2012  
Governmental Affairs 
S. 2105 
Cybersecurity Act of 2012 
Homeland Security and 
February 14, 2012 
Governmental Affairs 
S. 2151 
SECURE IT Act 
Commerce, Science, and 
March 1, 2012 
Transportation 
S. 3333 
Data Security and Breach Notification 
Commerce, Science, and 
June 21. 2012 
Act of 2012 
Transportation 
S. 3342 
SECURE IT 
N/A (Placed on Senate Legislative 
June 28, 2012 
Calendar under General Orders. 
Calendar No. 438) 
S. 3414 
Cybersecurity Act of 2012 
N/A (Placed on Senate Legislative 
July 19, 2012 
Calendar under Read the First 
Time) 
Source: LIS. 
Table 4. Senate Floor Debate: S. 3414 (112th Congress) 
Title Date 
Congressional Record Pages 
Cybersecurity Act of 2012: Motion to 
July 26, 2012 
S5419-S5449 
Proceed 
http://www.gpo.gov/fdsys/pkg/CREC-2012-07-26/
pdf/CREC-2012-07-26-pt1-PgS5419-6.pdf#page=1 
Cybersecurity Act of 2012: Motion to 
July 26, 2012 
S5450-S5467 
Proceed – Continued and Cloture Vote 
http://www.gpo.gov/fdsys/pkg/CREC-2012-07-26/
pdf/CREC-2012-07-26-pt1-PgS5450-2.pdf#page=1 
Cybersecurity Act of 2012 
July 31, 2012 
S5694-S5705 
http://www.gpo.gov/fdsys/pkg/CREC-2012-07-31/
pdf/CREC-2012-07-31-pt1-PgS5694.pdf#page=1 
Cybersecurity Act of 2012: Continued 
July 31, 2012 
S5705-S5724 
http://www.gpo.gov/fdsys/pkg/CREC-2012-07-31/
pdf/CREC-2012-07-31-pt1-PgS5705-2.pdf#page=1 
Cybersecurity Act of 2012: Debate and 
August 2, 2012 
S5907-S5919 
Cloture Vote 
http://www.gpo.gov/fdsys/pkg/CREC-2012-08-02/
pdf/CREC-2012-08-02-pt1-PgS5904-2.pdf#page=4 
Cybersecurity Act of 2012: Motion to 
November 14, 
S6774-S6784 
Proceed 
2012 
http://www.gpo.gov/fdsys/pkg/CREC-2012-11-14/
pdf/CREC-2012-11-14-pt1-PgS6774.pdf#page=1 
Source: Congressional Record (GPO). 
Congressional Research Service 
3 
Cybersecurity: Authoritative Reports and Resources 
 
Table 5. Major Legislation: House (112th Congress) 
Bill No. 
Title 
Committee(s) 
Date Introduced 
H.R. 76 
Cybersecurity Education Enhancement 
Homeland Security; House 
January 5, 2011 
Act of 2011 
Oversight and Government Reform 
H.R. 174 
Homeland Security Cyber and Physical 
Technology; Education and the 
January 5, 2011 
Infrastructure Protection Act of 2011 
Workforce; Homeland Security 
H.R. 2096 
Cybersecurity Enhancement Act of 2011 
Science, Space, and Technology 
June 2, 2011 
H.R. 3523 
Cyber Intelligence Sharing and 
Committee on Intelligence 
November 30, 2011 
Protection Act 
(Permanent Select) 
H.R. 3674 
PRECISE Act of 2011 
Homeland Security; Oversight and 
December 15, 2011 
Government Reform; Science, 
Space, and Technology; Judiciary; 
Intelligence (Permanent Select) 
H.R. 4263 
SECURE IT Act of 2012 Strengthening 
Oversight and Government 
March 27, 2012 
and Enhancing Cybersecurity by Using 
Reform, the Judiciary, Armed 
Research, Education, Information, and 
Services, and Intelligence 
Technology 
(Permanent Select) 
H.R. 3834 
Advancing America’s Networking and 
Science, Space, and Technology 
January 27, 2012 
Information Technology Research and 
Development Act of 2012 
H.R. 4257 
Federal Information Security 
Oversight and Government Reform 
April 18, 2012 
Amendments Act of 2012 
Source: LIS. 
Hearings in the 113th Congress 
The following tables list cybersecurity hearings in the 113th Congress. Table 6 and Table 7 
contain identical content but are organized differently. Table 6 lists House hearings arranged by 
date (most recent first), and Table 7 lists House hearings arranged by committee. 
 
Congressional Research Service 
4 
 
Table 6. House Hearings (113th Congress), by Date 
Title Date 
Committee 
Subcommittee 
Cyber Threats and Security Solutions 
May 21, 2013 
Energy and Commerce 
 
Cybersecurity: An Examination of the Communications  May 21, 2013 
Energy and Commerce 
Communications and Technology 
Supply Chain 
Facilitating Cyber Threat Information Sharing and 
May 16, 2013 
Homeland Security 
Cybersecurity, Infrastructure Protection and 
Partnering with the Private Sector to Protect Critical 
Security Technologies 
Infrastructure: An Assessment of DHS Capabilities 
Striking the Right Balance: Protecting Our Nation's 
April 25, 2013 
Homeland Security 
Cybersecurity, Infrastructure Protection and 
Critical Infrastructure from Cyber Attack and Ensuring 
Security Technologies 
Privacy and Civil Liberties 
Cyber Attacks: An Unprecedented Threat to U.S. 
March 21, 2013 
Foreign Affairs 
Europe, Eurasia, and Emerging Threats 
National Security 
Protecting Smal  Business from Cyber-Attacks 
March 21, 2013 
Smal  Business 
Healthcare and Technology 
Cybersecurity and Critical Infrastructure [CLOSED 
March 20, 2013 
Appropriations 
 
hearing] 
Cyber Threats from China, Russia and Iran: Protecting 
March 20, 2013 
Homeland Security 
Cybersecurity, Infrastructure Protection and 
American Critical Infrastructure 
Security Technologies 
DHS Cybersecurity: Roles and Responsibilities to 
March 13, 2013 
Homeland Security 
 
Protect the Nation’s Critical Infrastructure 
Investigating and Prosecuting 21st Century Cyber 
March 13, 2013 
Judiciary 
Crime, Terrorism, Homeland Security and 
Threats 
Investigations 
Information Technology and Cyber Operations: 
March 13, 2013 
Armed Services 
Intelligence, Emerging Threats and 
Modernization and Policy Issues to Support the Future 
Capabilities 
Force 
Cyber R&D [Research and Development] Challenges 
February 26, 2013 
Science, Space, and Technology 
Technology 
and Solutions 
Advanced Cyber Threats Facing Our Nation  
February 14, 2013 
Select Committee on Intelligence 
 
Source: Compiled by the Congressional Research Service (CRS). 
CRS-5 
 
Table 7. House Hearings (113th Congress), by Committee 
Committee Subcommittee 
Title 
 
Date 
Appropriations 
 
Cybersecurity and Critical Infrastructure 
March 20, 2013 
[CLOSED hearing] 
Armed Services 
Intelligence, Emerging Threats and 
Information Technology and Cyber 
March 13, 2013 
Capabilities 
Operations: Modernization and Policy 
Issues to Support the Future Force 
Energy and Commerce 
 
Cyber Threats and Security Solutions 
May 21, 2013 
Energy and Commerce 
Communications and Technology 
Cybersecurity: An Examination of the 
May 21, 2013 
Communications Supply Chain 
Foreign Affairs 
Europe, Eurasia, and Emerging Threats 
Cyber Attacks: An Unprecedented 
March 21, 2013 
Threat to U.S. National Security 
Homeland Security 
Cybersecurity, Infrastructure Protection 
Facilitating Cyber Threat Information 
May 16, 2013 
and Security Technologies 
Sharing and Partnering with the Private 
Sector to Protect Critical Infrastructure: 
An Assessment of DHS Capabilities 
Homeland Security 
Cybersecurity, Infrastructure Protection 
Striking the Right Balance: Protecting 
April 25, 2013 
and Security Technologies 
Our Nation's Critical Infrastructure from 
Cyber Attack and Ensuring Privacy and 
Civil Liberties 
Homeland Security 
Cybersecurity, Infrastructure Protection 
Cyber Threats from China, Russia and 
March 20, 2013 
and Security Technologies 
Iran: Protecting American Critical 
Infrastructure 
Homeland Security 
Cybersecurity, Infrastructure Protection 
DHS Cybersecurity: Roles and 
March 13, 2013 
and Security Technologies 
Responsibilities to Protect the Nation’s 
Critical Infrastructure 
Judiciary 
Crime, Terrorism, Homeland Security 
Investigating and Prosecuting 21st 
March 13, 2013 
and Investigations 
Century Cyber Threats 
Science, Space, and Technology 
Technology 
Cyber R&D [Research and 
February 26, 2013 
Development] Challenges and Solutions 
Select Committee on Intelligence 
 
Advanced Cyber Threats Facing Our 
February 14, 2013 
Nation 
CRS-6 
 
Committee Subcommittee 
Title 
 
Date 
Small Business 
Healthcare and Technology 
Protecting Small Business from Cyber-
March 21, 2013 
Attacks 
Source: Compiled by CRS. 
 
Table 8. Senate Hearings (113th Congress), by Date 
Title Date 
Committee 
Subcommittee 
Cyber Threats: Law Enforcement and 
May 8, 2013 
Judiciary 
Crime and Terrorism 
Private Sector Responses 
Defense Authorization: Cybersecurity 
March 19, 2013 
Armed Services 
Emerging Threats and Capabilities 
Threats: To receive a briefing on 
cybersecurity threats in review of the 
Defense Authorization Request for Fiscal 
Year 2014 and the Future Years Defense 
Program. 
Fiscal 2014 Defense Authorization, 
March 12, 2013 
Armed Services 
 
Strategic Command: U.S. Cyber 
Command 
The Cybersecurity Partnership Between 
March 7, 2013 
(Joint) Homeland Security and 
 
the Private Sector and Our Government: 
Governmental Affairs and Commerce, 
Protecting Our National and Economic 
Science and Transportation  
Security 
Source: Compiled by CRS. 
CRS-7 
 
Table 9. Senate Hearings (113th Congress), by Committee 
Committee Subcommittee 
Title 
Date 
Armed Services 
Emerging Threats and Capabilities 
Defense Authorization: Cybersecurity 
March 19, 2013 
Threats 
Armed Services 
 
Fiscal 2014 Defense Authorization, 
March 12, 2013 
Strategic Command: U.S. Cyber 
Command 
(Joint) Homeland Security and 
 
The Cybersecurity Partnership Between 
March 7, 2013 
Governmental Affairs and Commerce, 
the Private Sector and Our Government: 
Science and Transportation  
Protecting Our National and Economic 
Security 
Judiciary 
Crime and Terrorism 
Cyber Threats: Law Enforcement and 
May 8, 2013 
Private Sector Responses 
Source: Compiled by CRS. 
CRS-8 
Cybersecurity: Authoritative Reports and Resources 
 
Hearings in the 112th Congress 
The following tables list cybersecurity hearings in the 112th Congress. Table 10 and Table 11 
contain identical content but are organized differently. Table 10 lists House hearings arranged by 
date (most recent first) and Table 11 lists House hearings arranged by committee. Table 12 lists 
House markups by date; Table 13 and Table 14 contain identical content. Table 13 lists Senate 
hearings arranged by date and Table 14 lists Senate hearings arranged by committee. When 
viewed in HTML, the document titles are active links. 
Congressional Research Service 
9 
 
Table 10. House Hearings (112th Congress), by Date 
Title Date 
Committee 
Subcommittee 
Investigation of the Security Threat Posed by Chinese 
September 13, 2012 
Permanent Select Committee on 
 
Telecommunications Companies Huawei and ZTE 
Intelligence 
Resilient Communications: Current Challenges and 
September 12, 2012 
Homeland Security 
Emergency Preparedness, Response and 
Future Advancements 
Communications  
Cloud Computing: An Overview of the Technology 
July 25, 2012 
Judiciary 
Intellectual Property, Competition, and the 
and the Issues facing American Innovators  
Internet   
Digital Warriors: Improving Military Capabilities for 
July 25, 2012 
Armed Services 
Emerging Threats and Capabilities 
Cyber Operations 
Cyber Threats to Capital Markets and Corporate 
June 1, 2012 
Financial Services 
Capital Markets and Government 
Accounts 
Sponsored Enterprises 
Iranian Cyber Threat to U.S. Homeland 
April 26, 2012 
Homeland Security  
Cybersecurity, Infrastructure Protection 
and Security Technologies and 
Counterterrorism and Intelligence  
America is Under Cyber Attack: Why Urgent Action 
April 24, 2012 
Homeland Security  
Oversight, Investigations and Management 
is Needed 
The DHS and DOE National Labs: Finding Efficiencies 
April 19, 2012 
Homeland Security  
Cybersecurity, Infrastructure Protection 
and Optimizing Outputs in Homeland Security 
and Security Technologies 
Research and Development 
Cybersecurity: Threats to Communications Networks 
March 28, 2012 
Energy and Commerce 
Communications and Technology 
and Public-Sector Responses 
IT Supply Chain Security: Review of Government and 
March 27, 2012 
Energy and Commerce 
Oversight and Investigations 
Industry Efforts 
Fiscal 2013 Defense Authorization: IT and Cyber 
March 20, 2012 
Armed Services 
Emerging Threats and Capabilities 
Operations 
Cybersecurity: The Pivotal Role of Communications 
March 7, 2012 
Energy and Commerce 
Communications and Technology 
Networks 
NASA Cybersecurity: An Examination of the Agency’s 
February 29, 2012 
Science, Space, and Technology 
Investigations and Oversight 
Information Security 
Critical Infrastructure Cybersecurity: Assessments of 
February 28, 2012 
Energy and Commerce 
Oversight and Investigations 
Smart Grid Security 
CRS-10 
 
Title Date 
Committee 
Subcommittee 
Hearing on Draft Legislative Proposal on 
December 6, 2011 
Homeland Security and 
Cybersecurity, Infrastructure Protection 
Cybersecurity 
Governmental Affairs 
and Security Technologies 
Cyber Security: Protecting Your Smal  Business 
December 1, 2011 
Smal  Business 
Healthcare and Technology 
Cyber Security: Protecting Your Smal  Business  
November 30, 2011 
Smal  Business 
Healthcare and Technology  
Combating Online Piracy (H.R. 3261, Stop the Online 
November 16, 2011 
Judiciary 
 
Piracy Act) 
Cybersecurity: Protecting America’s New Frontier 
November 15, 2011 
Judiciary 
Crime, Terrorism and Homeland Security 
Institutionalizing Irregular Warfare Capabilities 
November 3, 2011 
Armed Services 
Emerging Threats and Capabilities 
Cloud Computing: What are the Security Implications? 
October6, 2011 
Homeland Security 
Cybersecurity, Infrastructure Protection 
and Security Technologies 
Cyber Threats and Ongoing Efforts to Protect the 
October 4, 2011 
Permanent Select Intelligence 
 
Nation 
The Cloud Computing Outlook 
September 21, 2011 
Science, Space, and Technology 
Technology and Innovation 
Combating Cybercriminals 
September 14, 2011 
Financial Services 
Financial Institutions and Consumer Credit 
Cybersecurity: An Overview of Risks to Critical 
July 26, 2011 
Energy and Commerce 
Oversight and Investigations 
Infrastructure 
Cybersecurity: Assessing the Nation’s Ability to 
July 7, 2011 
Oversight and Government Reform   
Address the Growing Cyber Threat 
Field Hearing: Hacked Off: Helping Law Enforcement 
June 29, 2011 
Financial Services (field hearing in 
 
Protect Private Financial Information” 
Hoover, AL) 
Examining the Homeland Security Impact of the 
June 24, 2011 
Homeland Security 
Cybersecurity, Infrastructure Protection 
Obama Administration’s Cybersecurity Proposal 
and Security Technologies 
Sony and Epsilon: Lessons for Data Security Legislation  June 2, 2011 
Energy and Commerce 
Commerce, Manufacturing, and Trade 
Protecting the Electric Grid: the Grid Reliability and 
May 31, 2011 
Energy and Commerce 
 
Infrastructure Defense Act 
Unlocking the SAFETY Act’s [Support Anti-terrorism 
May 26, 2011 
Homeland Security 
Cybersecurity, Infrastructure Protection, 
by Fostering Effective Technologies - P.L. 107-296] 
and Security Technologies 
Potential to Promote Technology and Combat 
Terrorism 
Protecting Information in the Digital Age: Federal 
May 25, 2011 
Science, Space and Technology 
Research and Science Education  
Cybersecurity Research and Development Efforts 
CRS-11 
 
Title Date 
Committee 
Subcommittee 
Cybersecurity: Innovative Solutions to Challenging 
May 25, 2011 
Judiciary  
Intellectual Property, Competition and the 
Problems 
Internet 
Cybersecurity: Assessing the Immediate Threat to the 
May 25, 2011 
Oversight and Government Reform  National Security, Homeland Defense and 
United States 
Foreign Operations 
DHS Cybersecurity Mission: Promoting Innovation and  April 15, 2011 
Homeland Security 
Cybersecurity, Infrastructure Protection 
Securing Critical Infrastructure 
and Security Technologies 
Communist Chinese Cyber-Attacks, Cyber-Espionage 
April 15, 2011 
Foreign Affairs 
Oversight and Investigations 
and Theft of American Technology 
Budget Hearing - National Protection and Programs 
March 31, 2011 
Appropriations (closed/classified) 
Energy and Power 
Directorate, Cybersecurity and Infrastructure 
Protection Programs  
Examining the Cyber Threat to Critical Infrastructure 
March 16, 2011 
Homeland Security  
Cybersecurity, Infrastructure Protection 
and the American Economy 
and Security Technologies 
2012 Budget Request from U.S. Cyber Command 
March 16, 2011 
Armed Services 
Emerging Threats and Capabilities 
What Should the Department of Defense’s Role in 
February 11, 2011 
Armed Services 
Emerging Threats and Capabilities 
Cyber Be? 
Preventing Chemical Terrorism: Building a Foundation 
February 11, 2011 
Homeland Security 
Cybersecurity, Infrastructure Protection 
of Security at Our Nation’s Chemical Facilities 
and Security Technologies 
World Wide Threats 
February 10, 2011 
Permanent Select Intelligence 
 
Source: Compiled by CRS. 
Table 11. House Hearings (112th Congress), by Committee 
Committee Subcommittee 
Title 
Date 
Appropriations 
 
Budget Hearing - National Protection and Programs Directorate, 
March 31, 2011 
(closed/classified) 
Cybersecurity and Infrastructure Protection Programs  
Armed Services 
Emerging Threats and Capabilities 
Digital Warriors: Improving Military Capabilities for Cyber Operations 
July 25, 2012 
Armed Services 
Emerging Threats and Capabilities 
Fiscal 2013 Defense Authorization: IT and Cyber Operations 
March 20, 2012 
Armed Services 
Emerging Threats and Capabilities 
Institutionalizing Irregular Warfare Capabilities 
November 3, 2011 
Armed Services 
Emerging Threats and Capabilities 
2012 Budget Request for U.S. Cyber Command 
March 16, 2011 
Armed Services 
Emerging Threats and Capabilities 
What Should the Department of Defense’s Role in Cyber Be? 
February 11, 2011 
CRS-12 
 
Committee Subcommittee 
Title 
Date 
Energy and Commerce  Communications and Technology 
Cybersecurity: Threats to Communications Networks and Public-Sector 
March 28, 2012 
Responses 
Energy and Commerce  Oversight and Investigations 
IT Supply Chain Security: Review of Government and Industry Efforts 
March 27, 2012 
Energy and Commerce  Communications and Technology 
Cybersecurity: The Pivotal Role of Communications Networks 
March 7, 2012 
Energy and Commerce  Oversight and Investigations 
Critical Infrastructure Cybersecurity: Assessments of Smart Grid Security 
February 28, 2012 
Energy and Commerce  Oversight and Investigations 
Cybersecurity: An Overview of Risks to Critical Infrastructure 
July 26, 2011 
Energy and Commerce  Commerce, Manufacturing, and Trade 
Sony and Epsilon: Lessons for Data Security Legislation 
June 2, 2011 
Energy and Commerce  Energy and Power 
Protecting the Electric Grid: the Grid Reliability and Infrastructure Defense 
May 31, 2011 
Act 
Financial Services 
Capital Markets and Government Sponsored 
Cyber Threats to Capital Markets and Corporate Account 
June 1, 2012 
Enterprises 
Financial Services 
Financial Institutions and Consumer Credit 
Combating Cybercriminals 
September 14, 2011 
Financial Services 
Field hearing in Hoover, AL 
Field Hearing: “Hacked Off: Helping Law Enforcement Protect Private 
June 29, 2011 
Financial Information” 
Foreign Affairs 
Oversight and Investigations 
Communist Chinese Cyber-Attacks, Cyber-Espionage and Theft of 
April 15, 2011 
American Technology 
Homeland Security 
Emergency Preparedness, Response and 
Resilient Communications: Current Challenges and Future Advancement 
September 12, 2012 
Communications   
Homeland Security 
Cybersecurity, Infrastructure Protection and 
Iranian Cyber Threat to U.S. Homeland 
April 26, 2012 
Security Technologies and Counterterrorism 
and Intelligence 
Homeland Security 
Oversight, Investigations and Management 
America is Under Cyber Attack: Why Urgent Action is Needed 
April 24, 2012 
Homeland Security 
Cybersecurity, Infrastructure Protection and 
The DHS and DOE National Labs: Finding Efficiencies and Optimizing 
April 19, 2012 
Security Technologies 
Outputs in Homeland Security Research and Development 
Homeland Security 
Cybersecurity, Infrastructure Protection and 
Hearing on Draft Legislative Proposal on Cybersecurity 
December 6, 2011 
Security Technologies 
Homeland Security 
Cybersecurity, Infrastructure Protection and 
Cloud Computing: What are the Security Implications? 
October 6, 2011 
Security Technologies 
Homeland Security 
Cybersecurity, Infrastructure Protection and 
Examining the Homeland Security Impact of the Obama Administration’s 
June 24, 2011 
Security Technologies 
Cybersecurity Proposal 
CRS-13 
 
Committee Subcommittee 
Title 
Date 
Homeland Security 
 
Unlocking the SAFETY Act’s [Support Anti-terrorism by Fostering Effective  May 26, 2011 
Technologies - P.L. 107-296] Potential to Promote Technology and 
Combat Terrorism 
Homeland Security 
Cybersecurity, Infrastructure Protection and 
DHS Cybersecurity Mission: Promoting Innovation and Securing Critical 
April 15, 2011 
Security Technologies 
Infrastructure 
Homeland Security 
Cybersecurity, Infrastructure Protection and 
Examining the Cyber Threat to Critical Infrastructure and the American 
March 16, 2011 
Security Technologies 
Economy 
Homeland Security 
Cybersecurity, Infrastructure Protection and 
Preventing Chemical Terrorism: Building a Foundation of Security at Our 
February 11, 2011 
Security Technologies 
Nation’s Chemical Facilities 
Judiciary 
Intellectual Property, Competition and the 
Cloud Computing: An Overview of the Technology and the Issues facing 
July 25, 2012 
Internet 
American Innovators 
Judiciary 
 
Combating Online Piracy (H.R. 3261, Stop the Online Piracy Act) 
November 16, 2011 
Judiciary 
Crime, Terrorism and Homeland Security 
Cybersecurity: Protecting America’s New Frontier 
November 15, 2011 
Judiciary 
Intellectual Property, Competition and the 
Cybersecurity: Innovative Solutions to Challenging Problems 
May 25, 2011 
Internet 
Oversight and 
 
Cybersecurity: Assessing the Nation’s Ability to Address the Growing 
July 7, 2011 
Government Reform 
Cyber Threat 
Oversight and 
Subcommittee on National Security, 
Cybersecurity: Assessing the Immediate Threat to the United States 
May 25, 2011 
Government Reform 
Homeland Defense and Foreign Operations 
Permanent Select 
 
Investigation of the Security Threat Posed by Chinese Telecommunications 
September 13, 2012 
Intelligence 
Companies Huawei and ZTE 
Permanent Select 
 
Cyber Threats and Ongoing Efforts to Protect the Nation 
October 4, 2011 
Intelligence 
Permanent Select 
 
World Wide Threats 
February 10, 2011 
Intelligence 
Science, Space and 
Investigations and Oversight 
NASA Cybersecurity: An Examination of the Agency’s Information Security 
February 29, 2012 
Technology 
Science, Space and 
Technology and Innovation 
The Cloud Computing Outlook 
September 21, 2011 
Technology 
Science, Space and 
Research and Science Education 
Protecting Information in the Digital Age: Federal Cybersecurity Research 
May 25, 2011 
Technology 
and Development Efforts
Smal  Business 
Healthcare and Technology 
Cyber Security: Protecting Your Smal  Business 
November 30, 2011 
Source: Compiled by CRS. 
CRS-14 
 
Table 12. House Markups (112th Congress), by Date 
Title Date 
Committee 
Subcommittee 
Consideration and Markup of H.R. 3674 
February 1, 2012 
Homeland Security  
Cybersecurity, Infrastructure 
Protection and Security 
Technologies 
Markup: Draft Bill: Cyber Intelligence Sharing and Protection Act of 2011 
December 1, 2011 
Permanent Select Intelligence  
 
Markup on H.R. 2096, Cybersecurity Enhancement Act of 2011 
July 21, 2011 
Science, Space and Technology   
Discussion Draft of H.R. 2577, a bill to require greater protection for 
June 15, 2011 
Energy and Commerce 
Commerce, Manufacturing, and 
sensitive consumer data and timely notification in case of breach 
Trade 
Source: Compiled by CRS. 
Table 13. Senate Hearings (112th Congress), by Date 
Title  
Date
Committee
Subcommittee
State of Federal Privacy and Data Security Law: Lagging Behind the Times? 
July 31, 2012 
Homeland Security and 
Oversight of Government 
Governmental Affairs 
Management, the Federal Workforce 
and the District of Columbia 
Protecting Electric Grid From Cyber Attacks  
July 17, 2012 
Energy and Natural Resources 
 
Committee  
To receive testimony on U.S. Strategic Command and U.S. Cyber Command in 
March 27, 2012 
Armed Services 
 
review of the Defense Authorization Request for Fiscal Year 2013 and the 
Future Years Defense Program. 
To receive testimony on cybersecurity research and development in review of 
March 20, 2012 
Armed Services 
Emerging Threats and Capabilities 
the Defense Authorization Request for Fiscal Year 2013 and the Future Years 
Defense Program 
The Freedom of Information Act: Safeguarding Critical Infrastructure 
March 13, 2012 
Judiciary 
 
Information and the Public’s Right to Know 
Securing America’s Future: The Cybersecurity Act of 2012 
February 16, 2012 
Homeland Security and 
 
Governmental Affairs 
Cybercrime: Updating the Computer Fraud and Abuse Act to Protect 
September 7, 2011 
Judiciary 
 
Cyberspace and Combat Emerging Threats 
Role of Small Business in Strengthening Cybersecurity Efforts in the United 
July 25, 2011 
Small Business and 
 
States 
Entrepreneurship 
CRS-15 
 
Title  
Date
Committee
Subcommittee
Privacy and Data Security: Protecting Consumers in the Modern World 
June 29, 2011 
Commerce, Science and 
 
Transportation 
Cybersecurity: Evaluating the Administration’s Proposals 
June 21, 2011 
Judiciary 
Crime and Terrorism 
Cybersecurity and Data Protection in the Financial Sector 
June 21, 2011 
Banking, Housing and Urban 
 
Affairs 
Protecting Cyberspace: Assessing the White House Proposal 
May 23, 2011 
Homeland Security and 
 
Governmental Affairs 
Cybersecurity of the Bulk-Power System and Electric Infrastructure 
May 5, 2011 
Energy and Natural Resources 
 
To receive testimony on the health and status of the defense industrial base 
May 3, 2011 
Armed Services 
Emerging Threats and Capabilities 
and its science and technology-related elements 
Cyber Security: Responding to the Threat of Cyber Crime and Terrorism 
April 12, 2011 
Judiciary 
Crime and Terrorism 
Oversight of the Federal Bureau of Investigation 
March 30, 2011 
Judiciary 
 
Cybersecurity and Critical Electric Infrastructurea  
March 15, 2011 
Energy and Natural Resources 
 
Information Sharing in the Era of WikiLeaks: Balancing Security and 
March 10, 2011 
Homeland Security and 
 
Collaboration 
Governmental Affairs  
Homeland Security Department’s Budget Submission for Fiscal Year 2012 
February 17, 2011 
Homeland Security and 
 
Governmental Affairs  
Source: Compiled by CRS. 
a.  The March 15, 2011, hearing before the Committee on Energy and Natural Resources was closed. The hearing notice was removed from the committee’s website.  
Table 14. Senate Hearings (112th Congress), by Committee 
Committee Subcommittee 
Title 
Date 
Armed Services 
Emerging Threats and 
To receive testimony on cybersecurity research and development in 
March 20, 2012 
Capabilities 
review of the Defense Authorization Request for Fiscal Year 2013 and the 
Future Years Defense Program 
Armed Services 
Emerging Threats and 
To receive testimony on the health and status of the defense industrial 
May 3, 2011 
Capabilities 
base and its science and technology-related elements 
Banking, Housing and Urban Affairs 
 
Cybersecurity and Data Protection in the Financial Sector 
June 21, 2011 
Commerce, Science and Transportation 
 
Privacy and Data Security: Protecting Consumers in the Modern World 
June 29, 2011 
CRS-16 
 
Committee Subcommittee 
Title 
Date 
Energy and Natural Resources 
 
Protecting the Electric Grid from Cyber Attacks 
July 17, 2012 
Energy and Natural Resources 
 
Cybersecurity of the Bulk-Power System and Electric Infrastructure 
May 5, 2011 
Energy and Natural Resources (closed) 
 
Cybersecurity and Critical Electric Infrastructurea 
March 15, 2011 
Homeland Security & Governmental Affairs 
Oversight of Government  State of Federal Privacy and Data Security Law: Lagging Behind the Times?  July 31, 2012 
Management, the Federal 
Workforce and the 
District of Columbia 
Homeland Security & Governmental Affairs 
 
Securing America’s Future: The Cybersecurity Act of 2012 
February 16, 2012 
Homeland Security and Governmental 
 
Protecting Cyberspace: Assessing the White House Proposal 
May 23, 2011 
Affairs 
Homeland Security and Governmental 
 
Information Sharing in the Era of WikiLeaks: Balancing Security and 
March 10, 2011 
Affairs  
Collaboration 
Homeland Security and Governmental 
 
Homeland Security Department’s Budget Submission for Fiscal Year 2012 
February 17, 2011 
Affairs  
Judiciary 
 
The Freedom of Information Act: Safeguarding Critical Infrastructure 
March 13, 2012 
Information and the Public’s Right to Know 
Judiciary 
 
Cybercrime: Updating the Computer Fraud and Abuse Act to Protect 
September 7, 2011 
Cyberspace and Combat Emerging Threats 
Judiciary 
Crime and Terrorism 
Cybersecurity: Evaluating the Administration’s Proposals 
June 21, 2011 
Judiciary 
Crime and Terrorism 
Cyber Security: Responding to the Threat of Cyber Crime and Terrorism 
April 12, 2011 
Judiciary 
 
Oversight of the Federal Bureau of Investigation 
March 30, 2011 
Smal  Business and Entrepreneurship 
 
Role of Smal  Business in Strengthening Cybersecurity Efforts in the 
July 25, 2011 
United States 
Source: Compiled by CRS. 
a.  The March 15, 2011, hearing before the Committee on Energy and Natural Resources was closed. The hearing notice was removed from the committee’s website.  
CRS-17 
 
Table 15. Congressional Committee Investigative Reports 
Title Committee 
Date 
Pages 
Notes 
Investigative Report on the U.S. 
House Permanent 
October 
60 
The committee initiated this investigation in November 2011 to inquire into the 
National Security Issues Posed by 
Select Committee on  8, 2012 
counterintelligence and security threat posed by Chinese telecommunications 
Chinese Telecommunications 
Intelligence 
companies doing business in the United States. 
Companies Huawei and ZTE 
 
Federal Support for and Involvement 
U. S. Senate 
October 
141 
A two-year bipartisan investigation found that U.S. Department of Homeland 
in State and Local Fusion Centers 
Permanent 
3, 2012 
Security efforts to engage state and local intelligence “fusion centers” has not 
Subcommittee on 
yielded significant useful information to support federal counterterrorism 
 
Investigations 
intelligence efforts. In Section VI, “Fusion Centers Have Been Unable to 
Meaningfully Contribute to Federal Counterterrorism Efforts,” Part G, “Fusion 
Centers May Have Hindered, Not Aided, Federal Counterterrorism Efforts,” the 
report discusses the Russian “Cyberattack” in Illinois. 
Source: Compiled by CRS. 
 
CRS-18 
Cybersecurity: Authoritative Reports and Resources 
 
Executive Orders and Presidential Directives 
Executive orders are official documents through which the President of the United States 
manages the operations of the federal government. Presidential directives pertain to all aspects of 
U.S. national security policy and are signed or authorized by the President. 
The following reports provide additional information on executive orders and presidential 
directives: 
•  CRS Report RS20846, Executive Orders: Issuance, Modification, and 
Revocation, by Todd Garvey and Vivian S. Chu, and 
•  CRS Report 98-611, Presidential Directives: Background and Overview, by L. 
Elaine Halchin. 
Table 16 provides a list of executive orders and presidential directives pertaining to information 
and computer security. 
 
Congressional Research Service 
19 
 
Table 16. Executive Orders and Presidential Directives 
(by date of issuance) 
Title Date 
Source 
Notes 
E.O. 13636, Improving Critical Infrastructure Cyberesecurity 
February 12, 2013 
White House 
The order directs agencies to take steps to expand 
cyberthreat information sharing with companies. It also tells 
http://www.gpo.gov/fdsys/pkg/FR-2013-02-19/pdf/2013-
them to come up with incentives for owners of the most 
03915.pdf 
vital and vulnerable digital infrastructure—like those tied to 
the electricity grid or banking system—to voluntarily comply 
with a set of security standards. And it orders them to 
review their regulatory authority on cybersecurity and 
propose new regulations in some cases. 
Presidential Policy Directive (PPD) 21 - Critical Infrastructure 
February 12, 2013 
White House 
This directive establishes national policy on critical 
Security and Resilience  
infrastructure security and resilience. This endeavor is a 
shared responsibility among the federal, state, local, tribal, 
http://www.whitehouse.gov/the-press-office/2013/02/12/
and territorial (SLTT) entities, and public and private owners 
presidential-policy-directive-critical-infrastructure-security-and-
and operators of critical infrastructure (hereinafter referred 
resil 
to as “critical infrastructure owners and operators”). This 
directive also refines and clarifies the critical infrastructure-
related functions, roles, and responsibilities across the 
federal government, as well as enhances overall coordination 
and collaboration. The federal government also has a 
responsibility to strengthen the security and resilience of its 
own critical infrastructure, for the continuity of national 
essential functions, and to organize itself to partner 
effectively with and add value to the security and resilience 
efforts of critical infrastructure owners and operators. 
Fact Sheet: Presidential Policy Directive on Critical 
February 12, 2013 
White House 
Lists three strategic imperatives that drive the federal 
Infrastructure Security and Resilience 
approach to strengthen critical infrastructure security and 
resilience, and the six deliverables that will accomplish those 
http://www.whitehouse.gov/the-press-office/2013/02/12/fact-
goals. 
sheet-presidential-policy-directive-critical-infrastructure-securit  
CRS-20 
 
Title Date 
Source 
Notes 
E.O. 13587, Structural Reforms to Improve the Security of 
October 7, 2011 
White House 
This order directs structural reforms to ensure responsible 
Classified Networks and the Responsible 
sharing and safeguarding of classified information on 
computer networks that shal  be consistent with appropriate 
http://www.gpo.gov/fdsys/pkg/FR-2011-10-13/pdf/2011-
protections for privacy and civil liberties. Agencies bear the 
26729.pdf 
primary responsibility for meeting these twin goals. These 
policies and minimum standards will address all agencies that 
operate or access classified computer networks, all users of 
classified computer networks (including contractors and 
others who operate or access classified computer networks 
controlled by the federal government), and all classified 
information on those networks. 
E.O. 13407, Public Alert and Warning System  
June 26, 2006 
White House 
Assigns the Secretary of Homeland Security the 
responsibility to establish or adopt, as appropriate, common 
http://www.gpo.gov/fdsys/pkg/WCPD-2006-07-03/pdf/WCPD-
alerting and warning protocols, standards, terminology, and 
2006-07-03-Pg1226.pdf 
operating procedures for the public alert and warning system 
to enable interoperability and the secure delivery of 
coordinated messages to the American people through as 
many communication pathways as practicable, taking account 
of Federal Communications Commission rules as provided 
by law.  
HSPD-7, Homeland Security Presidential Directive No. 7: 
December 17, 2003 
White House 
Assigns the Secretary of Homeland Security the 
Critical Infrastructure Identification, Prioritization, and 
responsibility of coordinating the nation’s overall efforts in 
Protection 
critical infrastructure protection across all sectors. HSPD-7 
also designates the Department of Homeland Security (DHS) 
http://www.dhs.gov/xabout/laws/gc_1214597989952.shtm 
as lead agency for the nation’s information and 
telecommunications sectors. 
E.O. 13286, Amendment of Executive Orders, and Other 
 February 28, 2003 
White House 
Designates the Secretary of Homeland Security the Executive 
Actions, in Connection With the Transfer of Certain Functions 
Agent of the National Communication System Committee of 
to the Secretary of Homeland Security 
Principals, which are the agencies, designated by the 
President, that own or lease telecommunication assets 
http://edocket.access.gpo.gov/2003/pdf/03-5343.pdf 
identified as part of the National Communication System, or 
which bear policy, regulatory, or enforcement responsibilities 
of importance to national security and emergency 
preparedness telecommunications.  
CRS-21 
 
Title Date 
Source 
Notes 
Presidential Decision Directive/NSC-63 
May 22, 1998 
White House 
Sets as a national goal the ability to protect the nation’s 
critical infrastructure from intentional attacks (both physical 
http://www.fas.org/irp/offdocs/pdd/pdd-63.htm 
and cyber) by the year 2003. According to the PDD, any 
interruptions in the ability of these infrastructures to provide 
their goods and services must be “brief, infrequent, 
manageable, geographically isolated, and minimally 
detrimental to the welfare of the United States." 
NSD-42, National Security Directive 42 - National Policy for 
July 5, 1990 
White House 
Establishes the National Security Telecommunications and 
the Security of National Security Telecommunications and 
Information Systems Security Committee, now called the 
Information Systems 
Committee on National Security Systems (CNSS). CNSS is 
an interagency committee, chaired by the Department of 
http://bushlibrary.tamu.edu/research/pdfs/nsd/nsd42.pdf 
Defense. Among other assignments, NSD-42 directs the 
CNSS to provide system security guidance for national 
security systems to executive departments and agencies; and 
submit annually to the Executive Agent an evaluation of the 
security status of national security systems. NSD-42 also 
directs the Committee to interact, as necessary, with the 
National Communications System Committee of Principals. 
E.O. 12472, Assignment of National Security and Emergency 
April 3, 1984 
National 
Established a national communication system as those 
Preparedness Telecommunications Functions (amended by E.O. 
Communications 
telecommunication assets owned or leased by the federal 
13286 of February 28, 2003, and changes made by E.O. 13407, 
System (NCS) 
government that can meet the national security and 
June 26, 2006) 
emergency preparedness needs of the federal government, 
together with an administrative structure that could ensure 
http://www.ncs.gov/library/policy_docs/eo_12472.html 
that a national telecommunications infrastructure is 
developed that is responsive to national security and 
emergency preparedness needs. 
Note: Descriptions compiled by CRS from government websites. 
 
CRS-22 
Cybersecurity: Authoritative Reports and Resources 
 
Data and Statistics 
This section identifies data and statistics from government, industry, and IT security firms 
regarding the current state of cybersecurity threats in the United States and internationally. These 
include incident estimates, costs, and annual reports on data security breaches, identity theft, 
cyber crime, malware, and network security. 
 
Congressional Research Service 
23 
 
Table 17. Data and Statistics: Cyber Incidents, Data Breaches, Cyber Crime 
Title Date 
Source 
Pages 
Notes 
2013 Data Breach Investigations Report 
April 23, 2013 
Verizon 
63 
The annual report counted 621 confirmed data 
breaches last year, and more than 47,000 reported 
http://www.verizonenterprise.com/DBIR/2013/ 
“security incidents.” The victims spanned a wide 
range of industries. Thirty-seven percent of 
breached companies were financial firms; 24% were 
retailers and restaurants; 20% involved 
manufacturing, transportation and utility industries; 
and 20% of the breaches affected organizations that 
Verizon qualified as “information and professional 
services firms.” (The totals exceed 100% because 
of rounding.) 
2013 Internet Security Threat Report, Vol. 18 
April 2013 
Symantec 
58 
Threats to online security have grown and evolved 
considerably in 2012. From the threats of 
https://www.symantec.com/security_response/publications/threatrep
cyberespionage and industrial espionage to the 
ort.jsp?om_ext_cid=biz_socmed_twitter_facebook_marketwire_link
widespread, chronic problems of malware and 
edin_2013Apr_worldwide_ISTR18  
phishing, malware authors have constantly 
improved innovation. There has also been an 
expansion of traditional threats into new forums. In 
particular, social media and mobile devices have 
come under increasing attack in 2012, even as 
spam and phishing attacks via traditional routes 
have fallen. Online criminals are following users 
onto these new platforms. 
Overview of Current Cyber Attacks (logged by 97 Sensors)  
March 6, 2013 
Deutsche Telekom 
N/A 
Provides a real-time visualization and map of 
cyberattacks detected by a network of 97 sensors 
http://www.sicherheitstacho.eu/ 
placed around the world.  
Real-Time Web Monitor 
March 5, 2013 
Akamai 
N/A 
Akamai monitors global Internet conditions around 
the clock. The map identifies the global regions 
http://www.akamai.com/html/technology/dataviz1.html 
with the greatest attack traffic. 
CRS-24 
 
Title Date 
Source 
Pages 
Notes 
Linking Cybersecurity Policy and Performance 
February 6, 2013 
Microsoft 
27 
Introduces a new methodology for examining how 
Trustworthy 
socio-economic factors in a country or region 
http://blogs.technet.com/b/trustworthycomputing/archive/2013/02/
Computing 
impact cybersecurity performance, examining 
06/linking-cybersecurity-policy-and-performance-microsoft-releases-
measures such as use of modern technology, 
special-edition-security-intelligence-report.aspx 
mature processes, user education, law 
enforcement and public policies related to 
cyberspace. This methodology can build a model 
that will help predict the expected cybersecurity 
performance of a given country or region.  
SCADA and Process Control Security Survey 
February 1, 2013 
SANS Institute  
19 
SANS Institute surveyed professionals who work 
with SCADA and process control systems. Seventy 
https://www.sans.org/reading_room/analysts_program/
percent of the nearly 700 respondents said they 
sans_survey_scada_2013.pdf 
consider their SCADA systems to be at high or 
severe risk. One-third of them suspect that they 
have been already been infiltrated 
Blurring the Lines: 2013 TMT Global Security Study  
January 8, 2013 
Deloitte 
24 
Report states that 88% of companies do not 
believe that they are vulnerable to an external 
http://www.deloitte.com/assets/Dcom-UnitedKingdom/
cyber threat, while more than half of those 
Local%20Assets/Documents/Services/Audit/uk-ers-blurring-line-
surveyed have experienced a security incident in 
2013-tmt-studyv2.pdf.pdf 
the last year. Companies rated mistakes by their 
employees as a top threat, with 70% highlighting a 
lack of security awareness as a vulnerability. 
Despite this, less than half of companies (48%) 
offer even general security-related training, with 
49% saying that a lack of budget was making it hard 
to improve security. 
Improving the Evidence Base for Information Security and Privacy 
December 20, 2012 
Organisation for 
94 
This report provides an overview of existing data 
Policies: Understanding the Opportunities and Challenges related to 
Economic 
and statistics in fields of information security, 
Measuring Information Security, Privacy and the Protection of 
Cooperation and 
privacy, and the protection of children online. It 
Children Online 
Development 
highlights the potential for the development of 
better indicators in these respective fields showing 
http://www.oecd-ilibrary.org/science-and-technology/improving-the-
in particular that there is an underexploited wealth 
evidence-base-for-information-security-and-privacy-
of empirical data that, if mined and made 
policies_5k4dq3rkb19n-en 
comparable, will enrich the current evidence base 
for policy making. 
CRS-25 
 
Title Date 
Source 
Pages 
Notes 
Emerging Cyber Threats Report 2013 
November 14, 2012 
Georgia Institute of 
9 
The year ahead will feature new and increasingly 
Technology 
sophisticated means to capture and exploit user 
http://www.gtsecuritysummit.com/pdf/2013ThreatsReport.pdf 
data, escalating battles over the control of online 
information and continuous threats to the U.S. 
supply chain from global sources. (From the annual 
Georgia Tech Cyber Security Summit 2012). 
State Governments at Risk: a Call for Collaboration and Compliance 
October 23, 2012 
National Association 
40 
Assesses the state of cybersecurity across the 
of State Chief 
nation found that only 24% of chief information 
http://www.nascio.org/publications/documents/Deloitte-
Information Officers 
security officers (CISOs) are very confident in their 
NASCIOCybersecurityStudy2012.pdf  
and Deloitte 
states’ ability to guard data against external threats. 
Cybercrime Costs Rise Nearly 40 Percent, Attack Frequency 
October 8, 2012 
HP and the Ponemon 
N/A 
The 2012 Cost of Cyber Crime Study found that 
Doubles 
Institute 
the average annualized cost of cybercrime incurred 
by a benchmark sample of U.S. organizations was 
http://www.hp.com/hpinfo/newsroom/press/2012/121008a.html 
$8.9 million. This represents a 6% increase over 
the average cost reported in 2011, and a 38% 
increase over 2010. The 2012 study also revealed a 
42% increase in the number of cyberattacks, with 
organizations experiencing an average of 102 
successful attacks per week, compared with 72 
attacks per week in 2011 and 50 attacks per week 
in 2010. 
2012 NCSA/Symantec National Smal  Business Study   
October 2012 
National Cyber 
18 
The NCSA surveyed more than 1,000 small and 
Security Alliance  
midsize businesses. The survey found that 83% of 
http://www.staysafeonline.org/download/datasets/4389/
respondents said they don’t have a written plan for 
2012_ncsa_symantec_smal _business_study.pdf. 
protecting their companies against cyberattacks, 
while 76% think they are safe from hackers, 
viruses, malware, and cybersecurity breaches. 
McAfee Explains The Dubious Math Behind Its ‘Unscientific' $1 
August 3, 2012 
Forbes.com 
N/A 
No, the statistic was not simply made up. Yes, it’s 
Trillion Data Loss Claim 
just a “ballpark figure” and an “unscientific” one, 
the company admits. But despite Pro Publica’s 
http://www.forbes.com/sites/andygreenberg/2012/08/03/mcafee-
criticisms and its own rather fuzzy math, the 
explains-the-dubious-math-behind-its-unscientific-1-tril ion-data-loss-
company stands by its trillion-dollar conclusion as a 
claim/ 
(very) rough estimate. 
CRS-26 
 
Title Date 
Source 
Pages 
Notes 
Does Cybercrime Really Cost $1 Trillion? 
August 1, 2012 
ProPublica 
N/A 
In a news release from computer security firm 
McAfee announcing its 2009 report, “Unsecured 
http://www.propublica.org/article/does-cybercrime-really-cost-1-
Economies: Protecting Vital Information,” the 
trillion 
company estimated a trillion dollar global cost for 
cybercrime. That number does not appear in the 
report itself. McAfee’s trillion-dol ar estimate is 
questioned by the three independent researchers 
from Purdue University whom McAfee credits with 
analyzing the raw data from which the estimate 
was derived. An examination of their origins by 
ProPublica has found new grounds to question the 
data and methods used to generate these numbers, 
which McAfee and Symantec say they stand behind. 
ICS-CERT Incident Response Summary Report 
June 28, 2012 
U.S. Industrial 
17 
The number of reported cyberattacks on U.S. 
Control System 
critical infrastructure increased sharply—from 9 
http://www.us-cert.gov/control_systems/pdf/ICS-
Cyber Emergency 
incidents in 2009 to 198 in 2011; water sector-
CERT_Incident_Response_Summary_Report_09_11.pdf 
Response Team (ICS-
specific incidents, when added to the incidents that 
CERT) 
affected several sectors, accounted for more than 
half of the incidents; in more than half of the most 
serious cases, implementing best practices, such as 
login limitation or properly configured firewall, 
would have deterred the attack, reduced the time 
it would have taken to detect an attack, and 
minimized its impact. 
Measuring the Cost of Cybercrime  
June 25, 2012 
11th Annual 
N/A 
“For each of the main categories of cybercrime we 
Workshop on the 
set out what is and is not known of the direct 
http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdf 
Economics of 
costs, indirect costs and defence costs - both to 
Information Security 
the UK and to the world as a whole.” 
Worldwide Threat Assessment: Infection Rates and Threat Trends 
ongoing Microsoft 
Security 
N/A 
Data on infection rates, malicious websites, and 
by Location 
Intelligence Report 
threat trends by regional location, worldwide.  
(SIR) 
http://www.microsoft.com/security/sir/threat/
default.aspx#!introduction 
McAfee Research & Reports (multiple) 
2009-2012 
McAfee 
N/A 
Links to reports on cybersecurity threats, malware, 
cybercrime, and spam. 
http://www.mcafee.com/us/about/newsroom/research-reports.aspx 
CRS-27 
 
Title Date 
Source 
Pages 
Notes 
Significant Cyber Incidents Since 2006 
January 19, 2012 
Center for Strategic 
9 
A list of significant cyber events since 2006. From 
and International 
the report, “Significance is in the eye of the 
http://csis.org/publication/cyber-events-2006 
Studies (CSIS) 
beholder, but we focus on successful attacks on 
government agencies, defense and high tech 
companies, or economic crimes with losses of 
more than a million dollars.” 
2011 ITRC Breach Report Key Findings 
December 10, 2011 
Identity Theft 
N/A 
According to the report, hacking attacks were 
Resource Center 
responsible for more than one-quarter (25.8%) of 
http://www.idtheftcenter.org/artman2/publish/headlines/
(ITRC) 
the data breaches recorded in the Identity Theft 
Breaches_2011.shtml 
Resource Center’s 2011 Breach Report, hitting a 
five-year all time high. This was followed by “Data 
on the Move” (when an electronic storage device, 
laptop, or paper folders leave the office where they 
are normally stored) and “Insider Theft,” at 18.1% 
and 13.4% respectively. 
The Risk of Social Engineering on Information Security: A Survey of 
September 2011 
Check Point 
7 
[The] report reveals 48% of large companies and 
IT Professionals 
32% of companies of all sizes surveyed have been 
victims of social engineering, experiencing 25 or 
http://www.checkpoint.com/press/downloads/social-engineering-
more attacks in the past two years, costing 
survey.pdf 
businesses anywhere from $25,000 to over 
$100,000 per security incident. [P]hishing and 
social networking tools are the most common 
sources of socially engineered threats. 
Second Annual Cost of Cyber Crime Study 
August 2011 
Ponemon Institute 
30 
[T]he median annualized cost for 50 benchmarked 
organizations is $5.9 million per year, with a range 
http://www.arcsight.com/col ateral/whitepapers/
from $1.5 million to $36.5 million each year per 
2011_Cost_of_Cyber_Crime_Study_August.pdf 
company. This represents an increase in median 
cost of 56% from [Ponemon’s] first cyber cost 
study published last year. 
Revealed: Operation Shady RAT: an Investigation of Targeted 
August 2, 2011 
McAfee Research 
14 
A comprehensive analysis of victim profiles from a 
Intrusions into 70+ Global Companies, Governments, and Non-
Labs 
five-year targeted operation which penetrated 72 
Profit Organizations During the Last 5 Years 
government and other organizations, most of them 
in the United States, and copied everything from 
http://www.mcafee.com/us/resources/white-papers/wp-operation-
military secrets to industrial designs. See page 4 for 
shady-rat.pdf 
types of compromised parties, page 5 for 
geographic distribution of victim’s country of 
origin, pages 7-9 for types of victims, and pages 10-
13 for the number of intrusions for 2007-2010. 
CRS-28 
 
Title Date 
Source 
Pages 
Notes 
2010 Annual Study: U.S. Cost of a Data Breach 
March 2011 
Ponemon 
39 
The average organizational cost of a data breach 
Institute/Symantec 
increased to $7.2 million and cost companies an 
http://www.symantec.com/content/en/us/about/media/pdfs/
average of $214 per compromised record. 
symantec_ponemon_data_breach_costs_report.pdf?om_ext_cid=
biz_socmed_twitter_facebook_marketwire_linkedin_2011Mar_worl
dwide_costofdatabreach 
FY2010 Report to Congress on the Implementation of the Federal 
March 2011 
White House/ Office 
48 
The number of attacks against federal networks 
Information Security Management Act of 2002 
of Management and 
increased nearly 40% last year, while the number of 
Budget 
incidents targeting U.S. computers overall was 
http://www.whitehouse.gov/sites/default/files/omb/assets/egov_docs/
down roughly 1% for the same period. (See pp. 12-
FY10_FISMA.pdf 
13). 
A Good Decade for Cybercrime: McAfee’s Look Back at Ten Years 
December 29, 2010 
McAfee 
11 
A review of the most publicized, pervasive, and 
of Cybercrime 
costly cybercrime exploits from 2000-2010. 
http://www.mcafee.com/us/resources/reports/rp-good-decade-for-
cybercrime.pdf 
Note: Statistics are from the source publication and have not been independently verified by CRS. 
 
CRS-29 
Cybersecurity: Authoritative Reports and Resources 
 
Cybersecurity Glossaries 
Table 18 includes links to glossaries of useful cybersecurity terms, including those related to 
cloud computing and cyberwarfare. 
 
Congressional Research Service 
30 
 
Table 18. Glossaries of Cybersecurity Terms 
Title Source 
Date 
Pages 
Notes 
Cloud Computing Reference Architecture 
National Institute of 
September 2011 
35 
Provides guidance to specific communities of practitioners 
Standards and 
and researchers. 
http://collaborate.nist.gov/twiki-cloud-computing/pub/
Technology (NIST) 
CloudComputing/ReferenceArchitectureTaxonomy/
NIST_SP_500-292_-_090611.pdf 
Glossary of Key Information Security Terms 
NIST 
February 2011 
211 
The glossary provides a central resource of terms and 
definitions most commonly used in NIST information 
http://csrc.nist.gov/publications/nistir/ir7298-rev1/nistir-
security publications and in Committee for National Security 
7298-revision1.pdf 
Systems (CNSS) information assurance publications.  
CIS Consensus Information Security Metrics 
Center for Internet 
November 2010 
175 
Provides definitions for security professionals to measure 
Security 
some of the most important aspects of the information 
http://benchmarks.cisecurity.org/en-us/?route=
security status. The goal is to give an organization the ability 
downloads.show.single.metrics.110 
to repeatedly evaluate security in a standardized way, 
allowing it to identify trends, understand the impact of 
activities and make responses to improve the security 
status. (Free registration required.) 
Joint Terminology for Cyberspace Operations 
Chairman of the 
November 1, 
16 
This lexicon is the starting point for normalizing terms in all 
Joint Chiefs of Staff 
2010 
cyber-related documents, instructions, CONOPS, and 
http://www.projectcyw-d.org/resources/items/show/51 
publications as they come up for review. 
Department of Defense Dictionary of Military and 
Chairman of the 
November 8, 
547 
Provides joint policy and guidance for Information 
Associated Terms 
Joint Chiefs of Staff 
2010 (as 
Assurance (IA) and Computer Network Operations (CNO) 
amended 
activities. 
http://www.dtic.mil/doctrine/new_pubs/jp1_02.pdf  
through January 
15, 2012) 
DHS Risk Lexicon 
Department of 
September 2010 
72 
The lexicon promulgates a common language, facilitates the 
Homeland Security 
clear exchange of structured and unstructured data, and 
http://www.dhs.gov/xlibrary/assets/dhs-risk-lexicon-
(DHS) Risk Steering 
provides consistency and clear understanding with regard to 
2010.pdf 
Committee 
the usage of terms by the risk community across the DHS. 
Note: Highlights compiled by CRS from the reports.  
 
CRS-31 
Cybersecurity: Authoritative Reports and Resources 
 
Reports by Topic 
This section gives references to analytical reports on cybersecurity from CRS, other 
governmental agencies, and trade organizations. The reports are grouped under the following 
cybersecurity topics: policy framework overview, critical infrastructure, and cybercrime and 
national security.  
For each topic, CRS reports are listed first and then followed by tables with reports from other 
organizations. The overview reports provide an analysis of a broad range of cybersecurity issues 
(Table 19 to Table 25). The critical infrastructure reports (Table 26) analyze cybersecurity issues 
related to telecom infrastructure, the electricity grid, and industrial control systems. The 
cybercrime and national security reports (Table 27) analyze a wide range of cybersecurity issues, 
including identify theft and government policies for dealing with cyberwar scenarios. In addition, 
tables with selected reports on international efforts to address cybersecurity problems, training for 
cybersecurity professionals, and research and development efforts in other areas are also provided 
(Table 28 to Table 30). 
CRS Reports and Other CRS Products.   Overview: Cybersecurity 
Policy Framework 
•  CRS Report R42114, Federal Laws Relating to Cybersecurity: Overview and 
Discussion of Proposed Revisions, by Eric A. Fischer 
•  CRS Report R41941, The Obama Administration’s Cybersecurity Proposal: 
Criminal Provisions, by Gina Stevens 
•  CRS Report R42984, The 2013 Cybersecurity Executive Order: Overview and 
Considerations for Congress, by Eric A. Fischer, Edward C. Liu, John Rollins, 
Catherine A. Theohary 
•  CRS Report R40150, A Federal Chief Technology Officer in the Obama 
Administration: Options and Issues for Consideration, by John F. Sargent Jr.  
•  CRS Report R42409, Cybersecurity: Selected Legal Issues, by Edward C. Liu et 
al. 
•  CRS Report R43015, Cloud Computing: Constitutional and Statutory Privacy 
Protections, by Richard M. Thompson II. 
•  CRS Legal Sidebar, House Intelligence Committee Marks Up Cybersecurity Bill 
CISPA, Richard M. Thompson II 
•  CRS Legal Sidebar, Can the President Deal with Cybersecurity Issues via 
Executive Order?, Vivian S. Chu 
Congressional Research Service 
32 
 
Table 19. Selected Reports: Cybersecurity Overview 
Title Source 
Date 
Pages 
Notes 
Measuring What Matters: Reducing Risk by Rethinking How We Evaluate 
Safegov.org, in 
March 
39 
Rather than periodical y auditing whether an 
Cybersecurity 
coordination with 
2013 
agency's systems meet the standards 
the National 
enumerated in FISMA at a static moment in 
http://www.safegov.org/media/46155/measuring_what_matters_final.pdf 
Academy of Public 
time, agencies and their inspectors general 
Administration 
should keep running scorecards of "cyber risk 
indicators" based on continual IG assessments 
of a federal organization's cyber vulnerabilities., 
Developing a Framework To Improve Critical Infrastructure Cybersecurity 
National Institute of  February 
5 
NIST announced the first step in the 
(Federal Register Notice; Request for Information) 
Standards and 
12, 2013 
development of a Cybersecurity Framework, 
Technology (NIST) 
which will be a set of voluntary standards and 
http://www.gpo.gov/fdsys/pkg/FR-2013-02-26/pdf/2013-04413.pdf 
best practices to guide industry in reducing 
cyber risks to the networks and computers 
that are vital to the nation’s economy, security, 
and daily life. 
The National Cyber Security Framework Manual 
NATO Cooperative  December  253 
Provides detailed background information and 
Cyber Defense 
11, 2012 
in-depth theoretical frameworks to help the 
http://www.ccdcoe.org/publications/books/
Center of 
reader understand the various facets of 
NationalCyberSecurityFrameworkManual.pdf 
Excel ence 
National Cyber Security, according to different 
levels of public policy formulation. The four 
levels of government—political, strategic, 
operational and tactical/technical—each have 
their own perspectives on National Cyber 
Security, and each is addressed in individual 
sections within the Manual. 
Cyber Security Task Force: Public-Private Information Sharing   
Bipartisan Policy 
July 2012 
24 
Outlines a series of proposals that would 
Center   
enhance information sharing. The 
http://bipartisanpolicy.org/sites/default/files/Public-
recommendations have two major 
Private%20Information%20Sharing.pdf 
components: (1) mitigation of perceived legal 
impediments to information sharing, and (2) 
incentivizing private sector information sharing 
by alleviating statutory and regulatory 
obstacles. 
CRS-33 
 
Title Source 
Date 
Pages 
Notes 
Cyber-security: The Vexed Question of Global Rules: An Independent Report 
McAfee and the 
February 
108 
The report examines the current state of 
on Cyber-Preparedness Around the World 
Security Defense 
2012 
cyber-preparedness around the world, and is 
Agenda 
based on survey results from 80 policy-makers 
http://www.dhs.gov/xlibrary/assets/dhs-risk-lexicon-2010.pdf 
and cybersecurity experts in the government, 
 
business, and academic sectors from 27 
countries. The countries were ranked on their 
state of cyber-preparedness. 
Mission Critical: A Public-Private Strategy for Effective Cybersecurity 
Business 
October 
28 
According to the report, “[p]ublic policy 
Roundtable 
11, 2011 
solutions must recognize the absolute 
http://businessroundtable.org/uploads/studies-reports/downloads/
importance of leveraging policy foundations 
2011_10_Mission_Critical_A_Public-
that support effective global risk management, 
Private_Strategy_for_Effective_Cybersecurity_4_20_12.pdf 
in contrast to “check-the-box” compliance 
approaches that can undermine security and 
cooperation.” The document concludes with 
specific policy proposals and activity 
commitments. 
Twenty Critical Security Controls for Effective Cyber Defense: Consensus 
SANS October 
77 
The 20 critical security control measures are 
Audit Guidelines (CAG) 
3, 2011 
intended to focus agencies and large 
enterprises’ limited resources by plugging the 
http://www.sans.org/critical-security-controls/ 
most common attack vectors. 
 
World Cybersecurity Technology Research Summit (Belfast 2011) 
Centre for Secure 
September  14 
The Belfast 2011 event attracted international 
Information 
12, 2011 
cyber security experts from leading research 
http://www.csit.qub.ac.uk/InnovationatCSIT/Reports/Filetoupload,295594,en.pdf  Technologies (CSIT) 
institutes, government bodies, and industry 
who gathered to discuss current cyber security 
threats, predict future threats and the 
necessary mitigation techniques, and to 
develop a collective strategy for next research. 
CRS-34 
 
Title Source 
Date 
Pages 
Notes 
A Review of Frequently Used Cyber Analogies 
National Security 
July 22, 
7 
The current cybersecurity crisis can be 
Cyberspace 
2011 
described several ways with numerous 
http://www.nsci-va.org/WhitePapers/2011-07-22-Cyber-Analogies-Whitepaper-
Institute 
metaphors. Many compare the current crisis 
K-McKee.pdf 
with the lawlessness to that of the Wild West 
and the out-dated tactics and race to security 
with the Cold War. When treated as a 
distressed ecosystem, the work of both 
national and international agencies to eradicate 
many infectious diseases serves as a model as 
how poor health can be corrected with proper 
resources and execution. Before these issues 
are discussed, what cyberspace actually is must 
be identified. 
America’s Cyber Future: Security and Prosperity in the Information Age 
Center for a New 
June 1, 
296 
To help U.S. policymakers address the growing 
American Security 
2011 
danger of cyber insecurity, this two-volume 
http://www.cnas.org/node/6405 
report features chapters on cyber security 
strategy, policy, and technology by some of the 
world’s leading experts on international 
relations, national security, and information 
technology. 
Resilience of the Internet Interconnection Ecosystem 
European Network 
April 11, 
238 
Part I: Summary and Recommendations; Part II: 
http://www.enisa.europa.eu/act/res/other-areas/inter-x/report/interx-report 
and Information 
2011 
State of the Art Review (a detailed description 
Security Agency 
of the Internet’s routing mechanisms and 
(ENISA) 
analysis of their robustness at the technical, 
economic and policy levels.); Part III: Report 
on the Consultation (a broad range of 
stakeholders were consulted. This part reports 
on the consultation and summarizes the 
results). Part IV: Bibliography and Appendices. 
Improving our Nation’s Cybersecurity through the Public-Private Partnership: 
Business Software 
March 8, 
26 
This paper proposes expanding the existing 
A White Paper 
Alliance, Center for 
2011 
partnership within the framework of the 
Democracy & 
National Infrastructure Protection Plan. 
http://www.cdt.org/files/pdfs/20110308_cbyersec_paper.pdf 
Technology, U.S. 
Specifically, it makes a series of 
Chamber of 
recommendations that build upon the 
Commerce, 
conclusions of President Obama’s Cyberspace 
Internet Security 
Policy Review. 
Alliance, Tech 
America 
CRS-35 
 
Title Source 
Date 
Pages 
Notes 
Cybersecurity Two Years Later 
CSIS Commission 
January 
22 
From the report: “We thought then [in 2008] 
on Cybersecurity 
2011 
that securing cyberspace had become a critical 
http://csis.org/files/publication/
for the 44th 
challenge for national security, which our 
110128_Lewis_CybersecurityTwoYearsLater_Web.pdf 
Presidency, Center 
nation was not prepared to meet. .  In our 
for Strategic and 
view, we are still not prepared.” 
International Studies 
Toward Better Usability, Security, and Privacy of Information Technology: 
National Research 
September  70 
Discusses computer system security and 
Report of a Workshop 
Council 
21, 2010 
privacy, their relationship to usability, and 
research at their intersection. This is drawn 
http://www.nap.edu/catalog.php?record_id=12998 
from remarks made at the National Research 
Council’s July 2009 Workshop on Usability, 
Security and Privacy of Computer Systems as well 
as recent reports from the NRC's Computer 
Science and Telecommunications Board on 
security and privacy. 
National Security Threats in Cyberspace 
Joint Workshop of 
September  37 
The two-day workshop brought together 
the National 
15, 2009 
more than two dozen experts with diverse 
http://nationalstrategy.com/Portals/0/documents/
Security Threats in 
backgrounds: physicists; telecommunications 
National%20Security%20Threats%20in%20Cyberspace.pdf 
Cyberspace and the 
executives; Silicon Valley entrepreneurs; 
National Strategy 
federal law enforcement, military, homeland 
Forum 
security, and intelligence officials; congressional 
staffers; and civil liberties advocates. For two 
days they engaged in an open-ended discussion 
of cyber policy as it relates to national security, 
under Chatham House Rules: their comments 
were for the public record, but they were not 
for attribution. 
Note: Highlights compiled by CRS from the reports. 
CRS-36 
 
Table 20. Selected Government Reports: Government Accountability Office (GAO) 
Title Date 
Pages  Notes 
Telecommunications Networks: Addressing Potential 
May 21. 2013 
52 
The federal government has begun efforts to address the security of the 
Security Risks of Foreign-Manufactured Equipment 
supply chain for commercial networks... There are a variety of other 
approaches for addressing the potential risks posed by foreign-manufactured 
http://www.gao.gov/products/GAO-13-652T 
equipment in commercial communications networks, including those 
approaches taken by foreign governments... Although these approaches are 
intended to improve supply chain security of communications networks, they 
may also create the potential for trade barriers, additional costs, and 
constraints on competition, which the federal government would have to take 
into account if it chose to pursue such approaches. 
Outcome-Based Measures Would Assist DHS in Assessing 
April 11, 2013 
45 
Until the Department of Homeland Security and its sector partners develop 
Effectiveness of Cybersecurity Efforts 
appropriate outcome-oriented metrics, it wil  be difficult to gauge the 
effectiveness of efforts to protect the nation’s core and access 
http://www.gao.gov/products/GAO-13-275?source=ra 
communications networks and critical support components of the Internet 
from cyber incidents. While no cyber incidents have been reported affecting 
the nation’s core and access networks, communications networks operators 
can use reporting mechanisms established by FCC and DHS to share 
information on outages and incidents. 
Cybersecurity: A Better Defined and Implemented 
March 7, 2013 
36 
“[A]lthough federal law assigns the Office of Management and Budget (OMB) 
National Strategy Is Needed to Address Persistent 
responsibility for oversight of federal government information security, OMB 
Challenges 
recently transferred several of these responsibilities to DHS.... [I]t remains 
unclear how OMB and DHS are to share oversight of individual departments 
http://www.gao.gov/products/GAO-13-462T 
and agencies. Additional legislation could clarify these responsibilities.” 
2013 High Risk List 
February 14, 2013 
275 
Every two years at the start of a new Congress, GAO cal s attention to 
agencies and program areas that are high risk due to their vulnerabilities to 
http://www.gao.gov/highrisk#t=0 
fraud, waste, abuse, and mismanagement, or are most in need of 
transformation. Cybersecurity programs on the list include: Protecting the 
Federal Government's Information Systems and the Nation's Cyber Critical 
Infrastructures and Ensuring the Effective Protection of Technologies Critical to U.S. 
National Security Interests. 
Cybersecurity: National Strategy, Roles, and 
February 14, 2013 
112 
GAO recommends that the White House Cybersecurity Coordinator develop 
Responsibilities Need to Be Better Defined and More 
an overarching federal cybersecurity strategy that includes all key elements of 
Effectively Implemented 
the desirable characteristics of a national strategy. Such a strategy would 
provide a more effective framework for implementing cybersecurity activities 
http://www.gao.gov/products/GAO-13-187 
and better ensure that such activities will lead to progress in cybersecurity. 
CRS-37 
 
Title Date 
Pages  Notes 
Information Security: Federal Communications 
January 25, 2013 
35 
“The FCC did not effectively implement appropriate information security 
Commission Needs to Strengthen Controls over Enhanced 
controls in the initial components of the Enhanced Secured Network (ESN) 
Secured Network Project 
project.... Weaknesses identified in the commission’s deployment of 
components of the ESN project as of August 2012 resulted in unnecessary risk 
http://www.gao.gov/products/GAO-13-155 
that sensitive information could be disclosed, modified, or obtained without 
authorization. GAO is making seven recommendations to the FCC to 
implement management controls to help ensure that ESN meets its objective 
of securing FCC's systems and information.”  
Cybersecurity: Challenges in Securing the Electricity Grid  
July 17, 2012 
25 
In a prior report, GAO has made recommendations related to electricity grid 
modernization efforts, including developing an approach to monitor 
http://www.gao.gov/products/GAO-12-926T  
compliance with voluntary standards. These recommendations have not yet 
been implemented. 
Information Technology Reform: Progress Made but 
July 11, 2012 
43 
To help ensure the success of agencies’ implementation of cloud-based 
Future Cloud Computing Efforts Should be Better Planned 
solutions, the Secretaries of Agriculture, Health and Human Services, 
Homeland Security, State, and the Treasury, and the Administrators of the 
http://www.gao.gov/products/GAO-12-756 
General Services Administration and Small Business Administration should 
direct their respective chief information officer (CIO) to establish estimated 
costs, performance goals, and plans to retire associated legacy systems for 
each cloud-based service discussed in this report, as applicable. 
DOD Actions Needed to Strengthen Management and 
July 9, 2012 
46 
DOD’s oversight of electronic warfare capabilities may be further complicated 
Oversight   
by its evolving relationship with computer network operations, which is also 
an information operations-related capability. Without clearly defined roles and 
http://www.gao.gov/products/GAO-12-479?source=ra 
responsibilities and updated guidance regarding oversight responsibilities, 
DOD does not have reasonable assurance that its management structures will 
provide effective department-wide leadership for electronic warfare activities 
and capabilities development and ensure effective and efficient use of its 
resources. 
Information Security: Cyber Threats Facilitate Ability to 
June 28, 2012 
20 
This statement discusses (1) cyber threats facing the nation’s systems, (2) 
Commit Economic Espionage 
reported cyber incidents and their impacts, (3) security controls and other 
techniques available for reducing risk, and (4) the responsibilities of key federal 
http://www.gao.gov/products/GAO-12-876T 
entities in support of protecting IP. 
Cybersecurity: Chal enges to Securing the Modernized 
February 28, 2012 
19 
As GAO reported in January 2011, securing smart grid systems and networks 
Electricity Grid 
presented a number of key challenges that required attention by government 
and industry. GAO made several recommendations to the Federal Energy 
http://www.gao.gov/products/GAO-12-507T 
Regulatory Commission (FERC) aimed at addressing these challenges. The 
commission agreed with these recommendations and described steps it is 
taking to implement them. 
CRS-38 
 
Title Date 
Pages  Notes 
Critical Infrastructure Protection: Cybersecurity Guidance 
December 9, 2011 
77 
Given the plethora of guidance available, individual entities within the sectors 
Is Available, but More Can Be Done to Promote Its Use 
may be challenged in identifying the guidance that is most applicable and 
effective in improving their security posture. Improved knowledge of the 
http://www.gao.gov/products/GAO-12-92 
guidance that is available could help both federal and private sector decision 
makers better coordinate their efforts to protect critical cyber-reliant assets. 
Cybersecurity Human Capital: Initiatives Need Better 
November 29, 2011 
86 
All the agencies GAO reviewed faced challenges determining the size of their 
Planning and Coordination 
cybersecurity workforce because of variations in how work is defined and the 
lack of an occupational series specific to cybersecurity. With respect to other 
http://www.gao.gov/products/GAO-12-8 
workforce planning practices, all agencies had defined roles and responsibilities 
for their cybersecurity workforce, but these roles did not always align with 
guidelines issued by the federal Chief Information Officers Council (CIOC) 
and National Institute of Standards and Technology (NIST). 
Federal Chief Information Officers: Opportunities Exist to 
October 17, 2011 
72 
GAO is recommending that OMB update its guidance to establish measures of 
Improve Role in Information Technology Management 
accountability for ensuring that CIOs’ responsibilities are fully implemented 
and require agencies to establish internal processes for documenting lessons 
http://www.gao.gov/products/GAO-11-634 
learned. 
Information Security: Additional Guidance Needed to 
October 5, 2011 
17 
Twenty-two of 24 major federal agencies reported that they were either 
Address Cloud Computing Concerns 
concerned or very concerned about the potential information security risks 
associated with cloud computing. GAO recommended that the NIST issue 
http://www.gao.gov/products/GAO-12-130T 
guidance specific to cloud computing security.  
Information Security: Weaknesses Continue Amid New 
October 3, 2011 
49 
Weaknesses in information security policies and practices at 24 major federal 
Federal Efforts to Implement Requirements 
agencies continue to place the confidentiality, integrity, and availability of 
sensitive information and information systems at risk. Consistent with this 
http://www.gao.gov/products/GAO-12-137 
risk, reports of security incidents from federal agencies are on the rise, 
increasing over 650% over the past 5 years. Each of the 24 agencies reviewed 
had weaknesses in information security controls. 
Federal Chief Information Officers: Opportunities Exist to 
October 17, 2011 
72 
GAO is recommending that the Office of Management and Budget (OMB) 
Improve Role in Information Technology Management 
update its guidance to establish measures of accountability for ensuring that 
CIOs’ responsibilities are fully implemented and require agencies to establish 
http://www.gao.gov/products/GAO-11-634 
internal processes for documenting lessons learned. 
Defense Department Cyber Efforts: Definitions, Focal 
July 29, 2011 
33 
This letter discusses the Department of Defense’s cyber and information 
Point, and Methodology Needed for DOD to Develop 
assurance budget for FY2012 and future years defense spending. The 
Ful -Spectrum Cyberspace Budget Estimates 
objectives of this review were to (1) assess the extent to which DOD has 
prepared an overarching budget estimate for ful -spectrum cyberspace 
http://www.gao.gov/products/GAO-11-695R 
operations across the department and (2) identify the challenges DOD has 
faced in providing such estimates. 
CRS-39 
 
Title Date 
Pages  Notes 
Continued Attention Needed to Protect Our Nation’s 
July 26, 2011 
20 
A number of significant challenges remain to enhancing the security of cyber-
Critical Infrastructure 
reliant critical infrastructures, such as (1) implementing actions recommended 
by the President's cybersecurity policy review; (2) updating the national 
http://www.gao.gov/products/GAO-11-463T 
strategy for securing the information and communications infrastructure; 
(3) reassessing DHS's planning approach to critical infrastructure protection; 
(4) strengthening public-private partnerships, particularly for information 
sharing; (5) enhancing the national capability for cyber warning and analysis; 
(6) addressing global aspects of cybersecurity and governance; and (7) securing 
the modernized electricity grid. 
Defense Department Cyber Efforts: DOD Faces 
July 25, 2011 
79 
GAO recommends that DOD evaluate how it is organized to address 
Challenges in Its Cyber Activities 
cybersecurity threats; assess the extent to which it has developed joint 
doctrine that addresses cyberspace operations; examine how it assigned 
http://www.gao.gov/products/GAO-11-75 
command and control responsibilities; and determine how it identifies and acts 
to mitigate key capability gaps involving cyberspace operations. 
Information Security: State Has Taken Steps to Implement 
July 8, 2011 
63 
The Department of State implemented a custom application called iPost and a 
a Continuous Monitoring Application, but Key Chal enges 
risk scoring program that is intended to provide continuous monitoring 
Remain 
capabilities of information security risk to elements of its information 
technology (IT) infrastructure. To improve implementation of iPost at State, 
http://www.gao.gov/products/GAO-11-149 
the Secretary of State should direct the Chief Information Officer to develop, 
document, and maintain an iPost configuration management and test process. 
Cybersecurity: Continued Attention Needed to Protect 
March 16, 2011 
16 
Executive branch agencies have made progress instituting several government-
Our Nation’s Critical Infrastructure and Federal 
wide initiatives aimed at bolstering aspects of federal cybersecurity, such as 
Information Systems 
reducing the number of federal access points to the Internet, establishing 
security configurations for desktop computers, and enhancing situational 
http://www.gao.gov/products/GAO-11-463T 
awareness of cyber events. Despite these efforts, the federal government 
continues to face significant challenges in protecting the nation's cyber-reliant 
critical infrastructure and federal information systems. 
Electricity Grid Modernization: Progress Being Made on 
January 12, 2011 
50 
GAO identified six key challenges: (1) Aspects of the regulatory environment 
Cybersecurity Guidelines, but Key Challenges Remain to 
may make it difficult to ensure smart grid systems’ cybersecurity. (2) Utilities 
be Addressed 
are focusing on regulatory compliance instead of comprehensive security. (3) 
The electric industry does not have an effective mechanism for sharing 
http://www.gao.gov/products/GAO-11-117 
information on cybersecurity. (4) Consumers are not adequately informed 
about the benefits, costs, and risks associated with smart grid systems. (5) 
There is a lack of security features being built into certain smart grid systems. 
(6) The electricity industry does not have metrics for evaluating cybersecurity. 
CRS-40 
 
Title Date 
Pages  Notes 
Information Security: Federal Agencies Have Taken Steps 
November 30, 2010 
50 
Existing government-wide guidelines and oversight efforts do not fully address 
to Secure Wireless Networks, but Further Actions Can 
agency implementation of leading wireless security practices. Until agencies 
Mitigate Risk 
take steps to better implement these leading practices, and OMB takes steps 
to improve government-wide oversight, wireless networks will remain at an 
http://www.gao.gov/products/GAO-11-43 
increased vulnerability to attack. 
Cyberspace Policy: Executive Branch Is Making Progress 
October 6, 2010 
66 
Of the 24 recommendations in the President’s May 2009 cyber policy review 
Implementing 2009 Policy Review Recommendations, but 
report, 2 have been fully implemented, and 22 have been partial y 
Sustained Leadership Is Needed 
implemented. While these efforts appear to be steps forward, agencies were 
largely not able to provide milestones and plans that showed when and how 
http://www.gao.gov/products/GAO-11-24 
implementation of the recommendations was to occur. 
DHS Efforts to Assess and Promote Resiliency Are 
September 23, 2010 
46 
The Department of Homeland Security (DHS) has not developed an effective 
Evolving but Program Management Could Be Strengthened 
way to ensure that critical national infrastructure, such as electrical grids and 
telecommunications networks, can bounce back from a disaster. DHS has 
http://www.gao.gov/products/GAO-10-772 
conducted surveys and vulnerability assessments of critical infrastructure to 
identify gaps, but has not developed a way to measure whether owners and 
operators of that infrastructure adopt measures to reduce risks. 
Information Security: Progress Made on Harmonizing 
September 15, 2010 
38 
OMB and NIST established policies and guidance for civilian non-national 
Policies and Guidance for National Security and Non-
security systems, while other organizations, including the Committee on 
National Security Systems 
National Security Systems (CNSS), DOD, and the U.S. intelligence community, 
have developed policies and guidance for national security systems. GAO was 
http://www.gao.gov/products/GAO-10-916 
asked to assess the progress of federal efforts to harmonize policies and 
guidance for these two types of systems. 
United States Faces Challenges in Addressing Global 
August 2, 2010 
53 
GAO recommends that the Special Assistant to the President and 
Cybersecurity and Governance 
Cybersecurity Coordinator should make recommendations to appropriate 
agencies and interagency coordination committees regarding any necessary 
http://www.gao.gov/products/GAO-10-606 
changes to more effectively coordinate and forge a coherent national 
approach to cyberspace policy. 
Critical Infrastructure Protection: Key Private and Public 
July 15, 2010 
38 
The Special Assistant to the President and Cybersecurity Coordinator and the 
Cyber Expectations Need to Be Consistently Addressed 
Secretary of Homeland Security should take two actions: (1) use the results of 
this report to focus their information-sharing efforts, including their relevant 
http://www.gao.gov/products/GAO-10-628 
pilot projects, on the most desired services, including providing timely and 
actionable threat and alert information, access to sensitive or classified 
information, a secure mechanism for sharing information, and security 
clearance and (2) bolster the efforts to build out the National Cybersecurity 
and Communications Integration Center as the central focal point for 
leveraging and integrating the capabilities of the private sector, civilian 
government, law enforcement, the military, and the intelligence community. 
CRS-41 
 
Title Date 
Pages  Notes 
Federal Guidance Needed to Address Control Issues With 
July 1, 2010 
53 
To assist federal agencies in identifying uses for cloud computing and 
Implementing Cloud Computing 
information security measures to use in implementing cloud computing, the 
Director of OMB should establish milestones for completing a strategy for 
http://www.gao.gov/products/GAO-10-513 
implementing the federal cloud computing initiative. 
Continued Attention Is Needed to Protect Federal 
June 16, 2010 
15 
Multiple opportunities exist to improve federal cybersecurity. To address 
Information Systems from Evolving Threats 
identified deficiencies in agencies’ security controls and shortfalls in their 
information security programs, GAO and agency inspectors general have 
http://www.gao.gov/products/GAO-10-834t 
made hundreds of recommendations over the past several years, many of 
which agencies are implementing. In addition, the White House, OMB, and 
certain federal agencies have undertaken several government-wide initiatives 
intended to enhance information security at federal agencies. While progress 
has been made on these initiatives, they all face challenges that require 
sustained attention, and GAO has made several recommendations for 
improving the implementation and effectiveness of these initiatives. 
Information Security: Concerted Response Needed to 
March 24, 2010 
21 
Without proper safeguards, federal computer systems are vulnerable to 
Resolve Persistent Weaknesses 
intrusions by individuals who have malicious intentions and can obtain 
sensitive information. The need for a vigilant approach to information security 
http://www.gao.gov/products/GAO-10-536t 
has been demonstrated by the pervasive and sustained cyber attacks against 
the United States; these attacks continue to pose a potential y devastating 
impact to systems and the operations and critical infrastructures they support. 
Cybersecurity: Continued Attention Is Needed to Protect 
March 16, 2010 
15 
The White House, the Office of Management and Budget, and certain federal 
Federal Information Systems from Evolving Threats 
agencies have undertaken several government-wide initiatives intended to 
enhance information security at federal agencies. While progress has been 
http://www.gao.gov/products/GAO-11-463T 
made on these initiatives, they all face challenges that require sustained 
attention, and GAO has made several recommendations for improving the 
implementation and effectiveness of these initiatives. 
Concerted Effort Needed to Consolidate and Secure 
April 12, 2010 
40 
To reduce the threat to federal systems and operations posed by cyber 
Internet Connections at Federal Agencies 
attacks on the United States, OMB launched, in November 2007, the Trusted 
Internet Connections (TIC) initiative, and later, in 2008, DHS’s National 
http://www.gao.gov/products/GAO-10-237 
Cybersecurity Protection System (NCPS), operational y known as Einstein, 
which became mandatory for federal agencies as part of TIC. To further 
ensure that federal agencies have adequate, sufficient, and timely information 
to successfully meet the goals and objectives of the TIC and Einstein 
programs, DHS’s Secretary should, to better understand whether Einstein 
alerts are valid, develop additional performance measures that indicate how 
agencies respond to alerts. 
CRS-42 
 
Title Date 
Pages  Notes 
Cybersecurity: Progress Made But Challenges Remain in 
March 5, 2010 
64 
To address strategic challenges in areas that are not the subject of existing 
Defining and Coordinating the Comprehensive National 
projects within CNCI but remain key to achieving the initiative’s overall goal 
Initiative 
of securing federal information systems, OMB’s Director should continue 
developing a strategic approach to identity management and authentication, 
http://www.gao.gov/products/GAO-10-338 
linked to HSPD-12 implementation, as initial y described in the CIOC's plan 
for implementing federal identity, credential, and access management, so as to 
provide greater assurance that only authorized individuals and entities can gain 
access to federal information systems. 
Continued Efforts Are Needed to Protect Information 
November 17, 2009 
24 
GAO has identified weaknesses in all major categories of information security 
Systems from Evolving Threats 
controls at federal agencies. For example, in FY2008, weaknesses were 
reported in such controls at 23 of 24 major agencies. Specifically, agencies did 
http://www.gao.gov/products/GAO-10-230t 
not consistently authenticate users to prevent unauthorized access to systems; 
apply encryption to protect sensitive data; and log, audit, and monitor 
security-relevant events, among other actions. 
Efforts to Improve Information sharing Need to Be 
August 27, 2003 
59 
Information on threats, methods, and techniques of terrorists is not routinely 
Strengthened 
shared; and the information that is shared is not perceived as timely, accurate, 
or relevant. 
http://www.gao.gov/products/GAO-03-760 
Source: Highlights compiled by CRS from the GAO reports. 
 
CRS-43 
 
Table 21. Selected Government Reports: White House/Office of Management and Budget 
Title Date 
Pages Notes 
Improving Cybersecurity 
March 2013 
N/A 
The Administration updated all 14 cross-agency priority goals on the 
Performance.gov portal, giving all new targets for agencies to hit over the 
http://technology.performance.gov/initiative/ensure-
next two years. The Office of Management and Budget also is using the 
cybersecurity/home 
opportunity to better connect agency performance improvement officers 
to the Trusted Internet Connections and Homeland Security. 
FY 2012 Report to Congress on the Implementation of the 
March 2013 
68 
More government programs violated data security law standards in 2012 
Federal Information Security Management Act of 2002 
than in the previous year, and at the same time, computer security costs 
have increased by more than $1 billion. Inadequate training was a large 
http://www.whitehouse.gov/sites/default/files/omb/assets/
part of the reason all-around FISMA adherence scores slipped from 75% 
egov_docs/fy12_fisma.pdf 
in 2011 to 74% in 2012. Agencies reported that about 88% of personnel 
with system access privileges received annual security awareness 
instruction, down from 99% in 2011. Meanwhile, personnel expenses 
accounted for the vast majority—90%—of the $14.6 billion departments 
spent on information technology security in 2012. 
Administration Strategy for Mitigating the Theft of U.S. Trade 
February 20, 
141 
“First, we will increase our diplomatic engagement.... Second, we will 
Secrets   
2013 
support industry-led efforts to develop best practices to protect trade 
secrets and encourage companies to share with each other best practices 
http://www.whitehouse.gov//sites/default/files/omb/IPEC/
that can mitigate the risk of trade secret theft.... Third, DOJ will continue 
admin_strategy_on_mitigating_the_theft_of_u.s._trade_secrets.p
to make the investigation and prosecution of trade secret theft by foreign 
df 
competitors and foreign governments a top priority.... Fourth, President 
Obama recently signed two pieces of legislation that will improve 
enforcement against trade secret theft.... Lastly, we will increase public 
awareness of the threats and risks to the U.S. economy posed by trade 
secret theft.” 
National Strategy for Information Sharing and Safeguarding 
December 2012 
24 
Provides guidance for effective development, integration, and 
implementation of policies, processes, standards, and technologies to 
http://www.whitehouse.gov/sites/default/files/docs/
promote secure and responsible information sharing. 
2012sharingstrategy_1.pdf 
Collaborative and Cross-Cutting Approaches to Cybersecurity 
August 1, 2012 
N/A 
Michael Daniel, White House Cybersecurity Coordinator, highlights a 
few recent initiatives where voluntary, cooperative actions are helping to 
http://www.whitehouse.gov/blog/2012/08/01/col aborative-and-
improve the nation’s overall cybersecurity. 
cross-cutting-approaches-cybersecurity 
Trustworthy Cyberspace: Strategic Plan for the Federal 
December 6, 
36 
As a research and development strategy, this plan defines four strategic 
Cybersecurity Research and Development Program 
2011 
thrusts: Inducing Change; Developing Scientific Foundations; Maximizing 
Research Impact; and Accelerating Transition to Practice. 
http://www.whitehouse.gov/sites/default/files/microsites/ostp/
fed_cybersecurity_rd_strategic_plan_2011.pdf 
CRS-44 
 
Title Date 
Pages Notes 
Structural Reforms to Improve the Security of Classified 
October 7, 2011 
N/A 
President Obama signed an executive order outlining data security 
Networks and the Responsible Sharing and Safeguarding of 
measures and rules for government agencies to fol ow to prevent further 
Classified Information 
data leaks by insiders. The order included the creation of a senior 
steering committee that will oversee the safeguarding and sharing of 
http://www.whitehouse.gov/the-press-office/2011/10/07/
information. 
executive-order-structural-reforms-improve-security-classified-
networks- 
FY 2012 Reporting Instructions for the Federal Information 
September 14, 
29 
Rather than enforcing a static, three-year reauthorization process, 
Security Management Act and Agency Privacy Managementa 
2011 
agencies are expected to conduct ongoing authorizations of information 
systems through the implementation of continuous monitoring programs. 
http://www.whitehouse.gov/sites/default/files/omb/memoranda/
Continuous monitoring programs thus fulfill the three year security 
2011/m11-33.pdf 
reauthorization requirement, so a separate re-authorization process is 
not necessary. 
International Strategy for Cyberspace 
May 16, 2011 
30 
The strategy marks the first time any administration has attempted to set 
forth in one document the U.S. government’s vision for cyberspace, 
http://www.whitehouse.gov/sites/default/files/rss_viewer/
including goals for defense, diplomacy, and international development.  
international_strategy_for_cyberspace.pdf 
Cybersecurity Legislative Proposal (Fact Sheet) 
May 12, 2011 
N/A 
The Administration’s proposal ensures the protection of individuals' 
privacy and civil liberties through a framework designed expressly to 
http://www.whitehouse.gov/the-press-office/2011/05/12/fact-
address the challenges of cybersecurity. The Administration's legislative 
sheet-cybersecurity-legislative-proposal 
proposal includes: Management, Personnel, Intrusion Prevention Systems, 
and Data Centers. 
Federal Cloud Computing Strategy 
February 13, 
43 
The strategy outlines how the federal government can accelerate the 
2011 
safe, secure adoption of cloud computing, and provides agencies with a 
http://www.cio.gov/documents/Federal-Cloud-Computing-
framework for migrating to the cloud. It also examines how agencies can 
Strategy.pdf 
address challenges related to the adoption of cloud computing, such as 
privacy, procurement, standards, and governance. 
25 Point Implementation Plan to Reform Federal Information 
December 9, 
40 
The plan’s goals are to reduce the number of federally run data centers 
Technology Management 
2010 
from 2,100 to approximately 1,300, rectify or cancel one-third of 
troubled IT projects, and require federal agencies to adopt a “cloud first” 
http://www.cio.gov/documents/25-Point-Implementation-Plan-to-
strategy in which they will move at least one system to a hosted 
Reform-Federal%20IT.pdf 
environment within a year. 
Clarifying Cybersecurity Responsibilities 
July 6, 2010 
39 
This memorandum outlines and clarifies the respective responsibilities 
and activities of the Office of Management and Budget (OMB), the 
http://www.whitehouse.gov/sites/default/files/omb/assets/
Cybersecurity Coordinator, and DHS, in particular with respect to the 
memoranda_2010/m10-28.pdf 
Federal Government’s implementation of the Federal Information 
Security Management Act of 2002 (FISMA). 
CRS-45 
 
Title Date 
Pages Notes 
The National Strategy for Trusted Identities in Cyberspace: 
June 25, 2010 
39 
The NSTIC, which is in response to one of the near term action items in 
Creating Options for Enhanced Online Security and Privacy 
the President’s Cyberspace Policy Review, calls for the creation of an 
online environment, or an Identity Ecosystem, where individuals and 
http://www.dhs.gov/xlibrary/assets/ns_tic.pdf 
organizations can complete online transactions with confidence, trusting 
the identities of each other and the identities of the infrastructure where 
transaction occur. 
Comprehensive National Cybersecurity Initiative (CNCI) 
March 2, 2010 
5 
The CNCI establishes a multi-pronged approach the federal government 
is to take in identifying current and emerging cyber threats, shoring up 
http://www.whitehouse.gov/cybersecurity/comprehensive-
current and future telecommunications and cyber vulnerabilities, and 
national-cybersecurity-initiative 
responding to or proactively addressing entities that wish to steal or 
manipulate protected data on secure federal systems. 
Cyberspace Policy Review: Assuring a Trusted and Resilient 
May 29, 2009 
76 
The President directed a 60-day, comprehensive, “clean-slate” review to 
Communications Infrastructure 
assess U.S. policies and structures for cybersecurity. The review team of 
government cybersecurity experts engaged and received input from a 
http://www.whitehouse.gov/assets/documents/
broad cross-section of industry, academia, the civil liberties and privacy 
Cyberspace_Policy_Review_final.pdf 
communities, state governments, international partners, and the 
legislative and executive branches. This paper summarizes the review 
team’s conclusions and outlines the beginning of the way forward toward 
a reliable, resilient, trustworthy digital infrastructure for the future. 
Source: Highlights compiled by CRS from the White House reports. 
a.  White House and Office of Management and Budget.  
CRS-46 
 
Table 22. Selected Government Reports: Department of Defense (DOD) 
Title Source 
Date 
Pages 
Notes 
Military and Security Developments Involving the People’s 
Department of 
May 6, 2013 
92 
China is using its computer network exploitation 
Republic of China 2013 (Annual Report to Congress) 
Defense 
capability to support intelligence collection against the 
U.S. diplomatic, economic and defense industrial base 
http://www.defense.gov/pubs/2013_China_Report_FINAL.pdf 
sectors that support U.S. national defense programs. The 
information targeted could potentially be used to benefit 
China’s defense industry, high-technology industries, 
policymaker interest in U.S. leadership thinking on key 
China issues, and military planners building a picture of 
U.S. network defense networks, logistics, and related 
military capabilities that could be exploited during a 
crisis. 
Resilient Military Systems and the Advanced Cyber Threat 
Department of 
January 2013 
146 
The report states that, despite numerous Pentagon 
Defense Science 
actions to parry sophisticated attacks by other countries, 
http://www.defense.gov/pubs/2013_China_Report_FINAL.pdf 
Board 
efforts are “fragmented” and the Defense Department 
“is not prepared to defend against this threat.” The 
report lays out a scenario in which cyberattacks in 
conjunction with conventional warfare damaged the 
ability of U.S. forces to respond, creating confusion on 
the battlefield and weakening traditional defenses. 
FY 2012 Annual Report 
Department of 
January 2013 
372 
Annual report to Congress by J. Michael Gilmore, 
Defense 
director of Operational Test and Evaluation. Assesses 
http://www.dote.osd.mil/pub/reports/FY2012/pdf/other/
the operational effectiveness of systems being developed 
2012DOTEAnnualReport.pdf 
for combat. See “Information Assurance (I/A) and 
Interoperability (IOP)” chapter, pages 305-312, for 
information on network exploitation and compromise 
exercises. 
Basic Safeguarding of Contractor Information Systems 
Federal Register 
August 24, 
4 
This regulation authored by the DOD, General Services 
(Proposed Rule) 
2012 
Administration (GSA), and National Aeronautics and 
Space Administration (NASA) “would add a contract 
http://www.gpo.gov/fdsys/pkg/FR-2012-08-24/pdf/2012-
clause to address requirements for the basic safeguarding 
20881.pdf 
of contractor information systems that contain or 
process information provided by or generated for the 
government (other than public information).” 
CRS-47 
 
Title Source 
Date 
Pages 
Notes 
DOD Actions Needed to Strengthen Management and 
GAO 
July 9, 2012 
46 
DOD’s oversight of electronic warfare capabilities may 
Oversight   
be further complicated by its evolving relationship with 
computer network operations, which is also an 
http://www.gao.gov/products/GAO-12-479?source=ra 
information operations-related capability. Without 
clearly defined roles and responsibilities and updated 
guidance regarding oversight responsibilities, DOD does 
not have reasonable assurance that its management 
structures will provide effective department-wide 
leadership for electronic warfare activities and 
capabilities development and ensure effective and 
efficient use of its resources. 
Cloud Computing Strategy 
DOD, Chief 
July 2012 
44 
The DOD Cloud Computing Strategy introduces an 
Information Officer 
approach to move the department from the current 
http://www.defense.gov/news/DoDCloudComputingStrategy.pdf 
state of a duplicative, cumbersome, and costly set of 
application silos to an end state, which is an agile, secure, 
and cost effective service environment that can rapidly 
respond to changing mission needs. 
DOD Defense Industrial Base (DIB) Voluntary Cyber Security 
Federal Register 
May 11, 2012 
 
DOD interim final rule to establish a voluntary cyber 
and Information Assurance Activities  
security information sharing program between DOD and 
eligible DIB companies. The program enhances and 
http://www.gpo.gov/fdsys/pkg/FR-2012-05-11/pdf/2012-
supplements DIB participants’ capabilities to safeguard 
10651.pdf 
DOD information that resides on, or transits, DIB 
unclassified information. 
DOD Information Security Program: Overview, Classification, 
DOD February 
16, 
84 
Describes the DOD Information Security Program, and 
and Declassification 
2012 
provides guidance for classification and declassification of 
DOD information that requires protection in the 
http://www.fas.org/sgp/othergov/dod/5200_01v1.pdf 
interest of the national security. 
Cyber Sentries: Preparing Defenders to Win in a Contested 
Air War Col ege 
February 7, 
38 
This paper examines the current impediments to 
Domain    
2012 
effective cybersecurity workforce preparation and offers 
new concepts to create Cyber Sentries through realistic 
http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA561779&
training, network authorities tied to certification, and 
Location=U2&doc=GetTRDoc.pdf 
ethical training. These actions present an opportunity to 
significantly enhance workforce quality and allow the 
Department to operate effectively in the contested cyber 
domain in accordance with the vision established in its 
Strategy for Cyberspace Operations 
CRS-48 
 
Title Source 
Date 
Pages 
Notes 
Defense Department Cyber Efforts: Definitions, Focal Point, 
Government 
July 29, 2011 
33 
This letter discusses DOD’s cyber and information 
and Methodology Needed for DOD to Develop Ful -Spectrum 
Accountability 
assurance budget for fiscal year 2012 and future years 
Cyberspace Budget Estimates 
Office (GAO) 
defense spending. The objectives of this review were to 
(1) assess the extent to which DOD has prepared an 
http://www.gao.gov/products/GAO-11-695R 
overarching budget estimate for ful -spectrum cyberspace 
operations across the department; and (2) identify the 
challenges DOD has faced in providing such estimates. 
Legal Reviews of Weapons and Cyber Capabilities 
Secretary of the Air  July 27, 2011 
7 
States the Air Force must subject cyber capabilities to 
Force 
legal review for compliance with the Law of Armed 
http://www.e-publishing.af.mil/shared/media/epubs/AFI51-
Conflict and other international and domestic laws. The 
402.pdf 
Air Force judge advocate general must ensure that all 
cyber capabilities “being developed, bought, built, 
modified or otherwise acquired by the Air Force" must 
undergo legal review—except for cyber capabilities 
within a Special Access Program, which must undergo 
review by the Air Force general counsel. 
Department of Defense Strategy for Operating in Cyberspace 
DOD 
July 14, 2011 
19 
This is an unclassified summary of DOD’s cyber-security 
strategy. 
http://www.defense.gov/news/d20110714cyber.pdf 
Cyber Operations Personnel Report (DOD) 
DOD 
April, 2011 
84 
This report focuses on FY2009 Department of Defense 
Cyber Operations personnel, with duties and 
http://www.hsdl.org/?view&did=488076  
responsibilities as defined in Section 934 of the Fiscal 
Year 2010 National Defense Authorization Act (NDAA).
Appendix A—Cyber Operations-related Military 
Occupations 
Appendix B—Commercial Certifications Supporting the 
DOD Information Assurance Workforce Improvement 
Program 
Appendix C—Military Services Training and 
Development 
Appendix D—Geographic Location of National Centers 
of Academic Excellence in Information Assurance 
Anomaly Detection at Multiple Scales (ADAMS) 
Defense Advanced 
November 9, 
74 
The design document was produced by Al ure Security 
Research Projects 
2011 
and sponsored by the Defense Advanced Research 
http://info.publicintelligence.net/DARPA-ADAMS.pdf 
Agency (DARPA) 
Projects Agency (DARPA). It describes a system for 
preventing leaks by seeding believable disinformation in 
military information systems to help identify individuals 
attempting to access and disseminate classified 
information. 
CRS-49 
 
Title Source 
Date 
Pages 
Notes 
Critical Code: Software Producibility for Defense 
National Research 
October 20, 
161 
Assesses the nature of the national investment in 
Council, 
2010 
software research and, in particular, considers ways to 
http://www.nap.edu/catalog.php?record_id=12979  
Committee for 
revitalize the knowledge base needed to design, produce, 
Advancing 
and employ software-intensive systems for tomorrow’s 
Software-Intensive 
defense needs. 
Systems 
Producibility 
Defending a New Domain 
U.S. Deputy 
September 
N/A 
In 2008, the U.S. Department of Defense suffered a 
Secretary of 
2010 
significant compromise of its classified military computer 
http://www.foreignaffairs.com/articles/66552/william-j-lynn-iii/
Defense, William J. 
networks. It began when an infected flash drive was 
defending-a-new-domain 
Lynn (Foreign 
inserted into a U.S. military laptop at a base in the Middle 
Affairs) 
East. This previously classified incident was the most 
significant breach of U.S. military computers ever, and 
served as an important wake-up call. 
The QDR in Perspective: Meeting America’s National Security 
Quadrennial 
July 30, 2010 
159 
From the report: “The expanding cyber mission also 
Needs In the 21st Century (QDR Final Report) 
Defense Review 
needs to be examined. The Department of Defense 
should be prepared to assist civil authorities in defending 
http://www.usip.org/quadrennial-defense-review-independent-
cyberspace – beyond the Department’s current role." 
panel-/view-the-report  
Cyberspace Operations: Air Force Doctrine Document 3-12 
U.S. Air Force 
July 15, 2010 
62 
This Air Force Doctrine Document (AFDD) establishes 
doctrinal guidance for the employment of U.S. Air Force 
http://www.e-publishing.af.mil/shared/media/epubs/afdd3-12.pdf  
operations in, through, and from cyberspace. It is the 
keystone of Air Force operational-level doctrine for 
cyberspace operations. 
DON (Department of the Navy) Cybersecurity/Information 
U.S. Navy 
June 17, 2010 
14 
To establish policy and assign responsibilities for the 
Assurance Workforce Management, Oversight and Compliance 
administration of the Department of the Navy (DON) 
Cybersecurity (CS)/Information Assurance Workforce 
http://www.doncio.navy.mil/PolicyView.aspx?ID=1804 
(IAWF) Management Oversight and Compliance 
Program. 
Note: Highlights compiled by CRS from the reports. 
CRS-50 
 
Table 23. Selected Government Reports: National Strategy for Trusted Identities in Cyberspace (NSTIC) 
Title Source 
Date 
Pages 
Notes 
Five Pilot Projects Receive Grants to Promote Online Security 
NIST September 
20, 
N/A 
NIST announced more than $9 million in grant 
and Privacy 
2012 
awards to support the National Strategy for Trusted 
Identities in Cyberspace (NSTIC). Five U.S. 
http://www.nist.gov/itl/nstic-092012.cfm 
organizations wil  pilot identity solutions that increase 
confidence in online transactions, prevent identity 
theft, and provide individuals with more control over 
how they share their personal information. 
Recommendations for Establishing an Identity Ecosystem 
NIST February 
17, 
51 
NIST responds to comments received in response to 
Governance Structure for the National Strategy for Trusted 
2012 
the related Notice of Inquiry published in the Federal 
Identities in Cyberspace 
Register on June 14, 2011. 
http://www.nist.gov/nstic/2012-nstic-governance-recs.pdf  
Models for a Governance Structure for the National Strategy for 
Department of 
June 14, 2011 
4 
The department seeks public comment from all 
Trusted Identities in Cyberspace 
Commerce 
stakeholders, including the commercial, academic and 
civil society sectors, and consumer and privacy 
http://www.nist.gov/nstic/nstic-frn-noi.pdf 
advocates on potential models, in the form of 
recommendations and key assumptions in the 
formation and structure of the steering group. 
Administration Releases Strategy to Protect Online Consumers 
White House 
April 15, 2011 
52 
Press release on a proposal to administer the 
and Support Innovation and Fact Sheet on National Strategy for 
processes for policy and standards adoption for the 
Trusted Identities in Cyberspace 
Identity Ecosystem Framework in accordance with 
the National Strategy for Trusted Identities in 
http://www.whitehouse.gov/the-press-office/2011/04/15/
Cyberspace (NSTIC). 
administration-releases-strategy-protect-online-consumers-and-
support-in 
National Strategy for Trusted Identities in Cyberspace 
White House 
April 15, 2011 
52 
The NSTIC aims to make online transactions more 
trustworthy, thereby giving businesses and consumers 
http://www.whitehouse.gov/blog/2010/06/25/national-strategy-trust
more confidence in conducting business online. 
cyberspace 
Note: Highlights compiled by CRS from the reports. 
CRS-51 
 
Table 24. . Selected Government Reports: Other Federal Agencies 
Title Source 
Date 
Pages 
Notes 
Mobile Security Reference Architecture 
Federal CIO 
May 23, 2013 
104 
Gives agencies guidance in the secure implementation of 
Council and 
mobile solutions through their enterprise architectures.  The 
https://cio.gov/wp-
the 
document provides an in-depth reference architecture for 
content/uploads/downloads/2013/05/Mobile-Security-
Department of 
mobile computing. 
Reference-Architecture.pdf 
Homeland 
Security (DHS) 
Proposed Establishment of a Federal y Funded Research and  National 
April 22, 2013 
2 
To help the National Cybersecurity Center of Excellence 
Development Center-First Notice 
Institute of 
(NCCoE) address industry's needs most efficiently, NIST will 
Standards and 
sponsor its first Federally Funded Research and Development 
http://www.gpo.gov/fdsys/pkg/FR-2013-04-22/pdf/2013-
Technology 
Center (FFRDC) to facilitate public-private col aboration for 
09376.pdf 
(NIST) 
accelerating the widespread adoption of integrated 
cybersecurity tools and technologies. 
Privacy Impact Assessment for EINSTEIN 3 - Accelerated 
Department of 
April 19, 2013 
27 
DHS will deploy EINSTEIN 3 Accelerated (E3A) to enhance 
(E3A) 
Homeland 
cybersecurity analysis, situational awareness, and security 
Security 
response. Under the direction of DHS, ISPs will administer 
http://www.dhs.gov/sites/default/files/publications/privacy/PI
intrusion prevention and threat-based decision-making on 
As/PIA%20NPPD%20E3A%2020130419%20FINAL%20signe
network traffic entering and leaving participating federal 
d.pdf 
civilian Executive Branch agency networks. This Privacy 
Impact Assessment (PIA) is being conducted because E3A will 
include analysis of federal network traffic, which may contain 
personally identifiable information (PII). 
Cyber Student Initiative 
Department of 
April 18, 2013 
2 
The Cyber Student Initiative program will begin at 
Homeland 
Immigration and Customs Enforcement computer forensic 
http://www.dhs.gov/sites/default/files/publications/SHP_Cyb
Security 
labs in 36 cities nationwide, where students will be trained 
er_Student_Initiative_Bul etin.pdf 
and gain hands-on experience within the department's 
cybersecurity community. The unpaid volunteer program is 
only available to community college students and veterans 
pursuing a degree in the cybersecurity field. 
CRS-52 
 
Title Source 
Date 
Pages 
Notes 
Security and Privacy Controls for Federal Information 
National 
April 2013 
3 
Special Publication 800-53, Revision 4, provides a more 
Systems (SP 800-53) 
Institute of 
holistic approach to information security and risk 
Standards and 
management by providing organizations with the breadth and 
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.
Technology 
depth of security controls necessary to fundamental y 
800-53r4.pdf  
(NIST) 
strengthen their information systems and the environments in 
which those systems operate—contributing to systems that 
are more resilient in the face of cyber attacks and other 
threats. This "Build It Right" strategy is coupled with a variety 
of security controls for "Continuous Monitoring" to give 
organizations near real-time information that is essential for 
senior leaders making ongoing risk-based decisions affecting 
their critical missions and business functions.  
Guide to Attribute Based Access Control Definition and 
National 
April 2013 
54 
Improving information sharing while maintaining control over 
Consideration (SP 800-162) 
Institute of 
access to that information is a primary goal of guidance 
Standards and 
coming from the NIST. 
Technology 
(NIST) 
Measuring What Matters: Reducing Risks by Rethinking 
National 
March 2013 
39 
Rather than periodical y auditing whether an agency's systems 
How We Evaluate Cybersecurity 
Academy of 
meet the standards enumerated in Federal Information 
Public 
Security Management Act (FISMA) at a static moment in time, 
http://www.safegov.org/media/46155/measuring_what_matt
Administration 
agencies and their inspectors general should keep running 
ers_final.pdf 
and 
scorecards of "cyber risk indicators" based on continual IG 
Safegov.org 
assessments of a federal organization's cyber vulnerabilities. 
Developing a Framework To Improve Critical 
National 
February 26, 
5 
NIST announced the first step in the development of a 
Infrastructure Cybersecurity 
Institute of 
2013 
Cybersecurity Framework, which will be a set of voluntary 
Standards and 
standards and best practices to guide industry in reducing 
http://www.gpo.gov/fdsys/pkg/FR-2013-02-26/pdf/2013-
Technology 
cyber risks to the networks and computers that are vital to 
04413.pdf 
(NIST) 
the nation’s economy, security and daily life.  
CRS-53 
 
Title Source 
Date 
Pages 
Notes 
Fol ow-up Audit of the Department's Cyber Security 
Department of 
December 2012 
25 
“In 2008, we reported in The Department's Cyber Security 
Incident Management Program 
Energy 
Incident Management Program (DOE/IG-0787, January 2008) 
Inspector 
that the Department and NNSA established and maintained a 
https://www.hsdl.org/?view&did=728459 
General 
number of independent, at least partially duplicative, cyber 
security incident management capabilities. Although certain 
actions had been taken in response to our prior report, we 
identified several issues that limited the efficiency and 
effectiveness of the Department's cyber security incident 
management program and adversely impacted the ability of 
law enforcement to investigate incidents. For instance, we 
noted that the Department and NNSA continued to operate 
independent, partially duplicative cyber security incident 
management capabilities at an annual cost of more than $30 
million. The issues identified were due, in part, to the lack of a 
unified, Department-wide cyber security incident management 
strategy. In response to our finding, management concurred 
with the recommendations and indicated that it had initiated 
actions to address the issues identified.” 
Secure and Trustworthy Cyberspace (SaTC) Program 
National 
October 4, 
N/A 
This grant program seeks proposals that address 
Solicitation 
Science 
2012 
Cybersecurity from a Trustworthy Computing Systems 
Foundation and 
perspective (TWC); a Social, Behavioral and Economic 
http://www.nsf.gov/funding/pgm_summ.jsp?pims_id=504709 
the National 
Sciences perspective (SBE); and a Transition to Practice 
Science and 
perspective (TPP). 
Technology 
Council (NSTC) 
Cybersecurity: CF Disclosure Guidance: Topic No. 2  
Securities and 
October 13, 
N/A 
The statements in this CF Disclosure Guidance represent the 
Exchange 
2011 
views of the Division of Corporation Finance. This guidance is 
http://www.sec.gov/divisions/corpfin/guidance/cfguidance-
Commission 
not a rule, regulation, or statement of the Securities and 
topic2.htm 
Exchange Commission. Further, the Commission has neither 
approved nor disapproved its content. 
Notes: Highlights compiled by CRS from the reports. 
 
CRS-54 
 
Table 25. Selected Reports: Cloud Computing 
Title Source 
Date 
Pages 
Notes 
Delivering on the Promise of Big Data and the Cloud  
Booz, Allen, 
January 9, 
7 
Reference architecture does away with 
Hamilton 
2013 
conventional data and analytics silos, 
http://www.boozallen.com/media/file/BigDataInTheCloud.pdf 
consolidating all information into a single medium 
designed to foster connections cal ed a “data 
lake," which reduces complexity and creates 
efficiencies that improve data visualization to 
allow for easier insights by analysts. 
Cloud Computing: An Overview of the Technology and the Issues facing 
House Judiciary 
July 25, 
156 
Overview and discussion of cloud computing 
American Innovators 
Comm., 
2012 
issues. 
Subcom. on 
http://judiciary.house.gov/hearings/Hearings%202012/hear_07252012_2.html  
Intellectual 
Property, 
Competition, 
and the Internet 
Information Technology Reform: Progress Made but Future Cloud 
GAO July 
11, 
43 
To help ensure the success of agencies’ 
Computing Efforts Should be Better Planned 
2012 
implementation of cloud-based solutions, the 
Secretaries of Agriculture, Health and Human 
http://www.gao.gov/products/GAO-12-756 
Services, Homeland Security, State, and the 
 
Treasury, and the Administrators of the General 
Services Administration and Small Business 
Administration should direct their respective 
CIO to establish estimated costs, performance 
goals, and plans to retire associated legacy 
systems for each cloud-based service discussed in 
this report, as applicable. 
Cloud Computing Strategy 
DOD, Chief 
July 2012 
44 
The DOD Cloud Computing Strategy introduces 
Information 
an approach to move the department from the 
http://www.defense.gov/news/DoDCloudComputingStrategy.pdf 
Officer 
current state of a duplicative, cumbersome, and 
costly set of application silos to an end state, 
which is an agile, secure, and cost effective 
service environment that can rapidly respond to 
changing mission needs. 
CRS-55 
 
Title Source 
Date 
Pages 
Notes 
A Global Reality: Governmental Access to Data in the Cloud - A 
Hogan Lovells 
May 23, 
13 
This White Paper compares the nature and 
Comparative Analysis of Ten International Jurisdictions 
2012 
extent of governmental access to data in the 
cloud in many jurisdictions around the world. 
http://www.hldataprotection.com/uploads/file/
Hogan%20Lovel s%20White%20Paper%20Government%20Access%20to%20
Cloud%20Data%20Paper%20%281%29.pdf 
Policy Challenges of Cross-Border Cloud Computing   
U.S. 
May 1, 2012 
38 
Examine the main policy challenges associated 
International 
with cross-border cloud computing—data 
http://www.usitc.gov/journals/Policy_Challenges_of_Cross-
Trade 
privacy, security, and ensuring the free flow of 
border_Cloud_Computing_rev.pdf  
Commission   
information—and the ways that countries are 
 
addressing them through domestic policymaking, 
international agreements, and other cooperative 
arrangements. 
Cloud Computing Synopsis and Recommendations  
NIST 
May 2012 
81 
The National Institute of Standards and 
Technology has unveiled a guide that explains 
http://csrc.nist.gov/publications/nistpubs/800-146/sp800-146.pdf 
cloud technologies in “plain terms” to federal 
agencies and provides recommendations for IT 
decision makers. 
Global Cloud Computing Scorecard a Blueprint for Economic Opportunity 
Business 
February 2, 
24 
This report notes that while many developed 
Software 
2012 
countries have adjusted their laws and regulations 
http://portal.bsa.org/cloudscorecard2012/ 
Alliance 
to address cloud computing, the wide differences 
in those rules make it difficult for companies to 
invest in the technology. 
Concept of Operations: FedRAMP 
General Services  February 7, 
47 
Implementation of FedRAMP will be in phases. 
Administration 
2012 
This document describes all the services that will 
http://www.gsa.gov/graphics/staffoffices/FedRAMP_CONOPS.pdf 
(GSA) 
be available at initial operating capability—
targeted for June 2012. The Concept of 
Operations will be updated as the program 
evolves toward sustained operations. 
Federal Risk and Authorization Management Program (FedRAMP) 
Federal CIO 
January 4, 
N/A 
The Federal Risk and Authorization Management 
Council 
2012 
Program or FedRAMP has been established to 
http://www.gsa.gov/portal/category/102371 
provide a standard approach to Assessing and 
Authorizing (A&A) cloud computing services and 
products. 
CRS-56 
 
Title Source 
Date 
Pages 
Notes 
Security Authorization of Information Systems in Cloud Computing 
White 
December 
7 
The Federal Risk and Authorization Management 
Environments (FedRAMP) 
House/Office of 
8, 2011 
Program (FedRAMP) will now be required for all 
Management and 
agencies purchasing storage, applications and 
http://www.cio.gov/fedrampmemo.pdf 
Budget (OMB) 
other remote services from vendors. The Obama 
Administration has championed cloud computing 
as a means to save money and accelerate the 
government’s adoption of new technologies. 
U.S. Government Cloud Computing Technology Roadmap, Volume I, 
NIST December 
32 
Volume I is aimed at interested parties who wish 
Release 1.0 (Draft). High-Priority Requirements to Further USG Agency 
1, 2011 
to gain a general understanding and overview of 
Cloud Computing Adoption 
the background, purpose, context, work, results, 
and next steps of the U.S. Government Cloud 
http://www.nist.gov/itl/cloud/upload/SP_500_293_volumeI-2.pdf 
Computing Technology Roadmap initiative.  
U.S. Government Cloud Computing Technology Roadmap, Release 1.0 
NIST December 
85 
Volume II is designed to be a technical reference 
(Draft), Volume II Useful Information for Cloud Adopters 
1, 2011 
for those actively working on strategic and 
tactical cloud computing initiatives, including, but 
http://www.nist.gov/itl/cloud/upload/SP_500_293_volumeII.pdf 
not limited to, U.S. government cloud adopters. 
Volume II integrates and summarizes the work 
completed to date, and explains how these 
findings support the roadmap introduced in 
Volume I. 
Information Security: Additional Guidance Needed to Address Cloud 
GAO October 
5, 
17 
Twenty-two of 24 major federal agencies 
Computing Concerns 
2011 
reported that they were either concerned or 
very concerned about the potential information 
http://www.gao.gov/products/GAO-12-130T 
security risks associated with cloud computing. 
GAO recommended that the NIST issue 
guidance specific to cloud computing security. 
NIST has issued multiple publications which 
address such guidance; however, one publication 
remains in draft, and is not to be finalized until 
the first quarter of fiscal year 2012. 
Cloud Computing Reference Architecture 
NIST September 
35 
This “Special Publication," which is not an official 
1, 2011 
U.S. government standard, is designed to provide 
http://www.nist.gov/customcf/get_pdf.cfm?pub_id=909505 
guidance to specific communities of practitioners 
and researchers.  
Guide to Cloud Computing for Policy Makers 
Software and 
July 26, 
27 
The SAII concludes “that there is no need for 
Information 
2011 
cloud-specific legislation or regulations to provide 
http://www.siia.net/index.php?option=com_docman&task=doc_download&
Industry 
for the safe and rapid growth of cloud computing, 
gid=3040&Itemid=318 
Association 
and in fact, such actions could impede the great 
(SAII) 
potential of cloud computing." 
CRS-57 
 
Title Source 
Date 
Pages 
Notes 
Federal Cloud Computing Strategy 
White House 
February 
43 
The strategy outlines how the federal 
13, 2011 
government can accelerate the safe, secure 
http://www.cio.gov/documents/Federal-Cloud-Computing-Strategy.pdf 
adoption of cloud computing, and provides 
agencies with a framework for migrating to the 
cloud. It also examines how agencies can address 
challenges related to the adoption of cloud 
computing, such as privacy, procurement, 
standards, and governance. 
Notes: These reports analyze cybersecurity issues related to the federal government’s adoption of cloud computing storage options. Highlights compiled by CRS from 
the reports. 
 
CRS-58 
Cybersecurity: Authoritative Reports and Resources 
 
CRS Reports: Critical Infrastructure 
•  CRS Report R42683, Critical Infrastructure Resilience: The Evolution of Policy 
and Programs and Issues for Congress, by John D. Moteff 
•  CRS Report RL30153, Critical Infrastructures: Background, Policy, and 
Implementation, by John D. Moteff 
•  CRS Report R42660, Pipeline Cybersecurity: Federal Policy, by Paul W. 
Parfomak 
•  CRS Report R41536, Keeping America’s Pipelines Safe and Secure: Key Issues 
for Congress, by Paul W. Parfomak 
•  CRS Report R41886, The Smart Grid and Cybersecurity—Regulatory Policy and 
Issues, by Richard J. Campbell 
•  CRS Report R42338, Smart Meter Data: Privacy and Cybersecurity, by Brandon 
J. Murrill, Edward C. Liu, and Richard M. Thompson II 
•  CRS Report RL33586, The Federal Networking and Information Technology 
Research and Development Program: Background, Funding, and Activities, by 
Patricia Moloney Figliola 
•  CRS Report 97-868, Internet Domain Names: Background and Policy Issues, by 
Lennard G. Kruger 
•  CRS Report R42351, Internet Governance and the Domain Name System: Issues 
for Congress, by Lennard G. Kruger 
 
Congressional Research Service 
59 
 
Table 26. Selected Reports: Critical Infrastructure 
Title Source 
Date 
Pages 
Notes 
Electric Grid Vulnerability: Industry Responses Reveal 
Rep. Edward 
May 21, 2013 
35 
The report found that less than a quarter of investor-owned 
Security Gaps 
Markey and Rep. 
utilities and less than half of municipal and cooperation-owned 
Henry Waxman  
utilities fol owed through with voluntary standards issued by the 
http://markey.house.gov/sites/markey.house.gov/files/docu
Federal Energy Regulatory Commission after the Stuxnet worm 
ments/Markey%20Grid%20Report_05.21.13.pdf 
struck in 2010. 
Joint Working Group on Improving Cybersecurity and 
General Services 
May 13, 2013 
3 
Among other things, PPD–21 requires the General Services 
Resilience Through Acquisition, Notice of Request for 
Administration 
Administration, in consultation with DoD and DHS, to jointly 
Information 
provide and support government-wide contracts for critical 
infrastructure systems and ensure that such contracts include 
http://www.gpo.gov/fdsys/pkg/FR-2013-05-13/pdf/2013-
audit rights for the security and resilience of critical 
11239.pdf  
infrastructure. 
Version 5 Critical Infrastructure Protection Reliability 
Federal Energy 
April 24, 2013 
18 
FERC proposes to approve the Version 5 Critical Infrastructure 
Standards (Notice of Proposed Rulemaking)  
Regulatory 
Protection Reliability Standards, CIP-002-5 through CIP-011-1, 
Commission 
submitted by the North American Electric Reliability 
http://www.gpo.gov/fdsys/pkg/FR-2013-04-24/pdf/2013-
Corporation, the Commission-certified Electric Reliability 
09643.pdf 
Organization. The proposed Reliability Standards, which pertain 
to the cyber security of the bulk electric system, represent an 
improvement over the current Commission-approved CIP 
Reliability Standards as they adopt new cyber security controls 
and extend the scope of the systems that are protected by the 
CIP Reliability Standards. 
Incentives To Adopt Improved Cybersecurity Practices 
National Institute 
March 28, 2013 
N/A 
The Commerce Department is preparing a report on ways to 
of Standards and 
incentivize companies and organizations to improve their 
http://www.ntia.doc.gov/federal-register-
Technology and 
cybersecurity. To better understand what stakeholders – such as 
notice/2013/notice-inquiry-incentives-adopt-improved-
the National 
companies, trade associations, academics and others – believe 
cybersecurity-practices-html 
Telecommunicati
would best serve as incentives, the Department has released a 
 
ons and 
series of questions to gather public comments in a Notice of 
Information 
Inquiry. 
Administration 
SCADA and Process Control Security Survey 
SANS Institute 
February 1, 
19 
SANS Institute surveyed professionals who work with SCADA 
2013 
and process control systems. Of the nearly 700 respondents, 
https://www.sans.org/reading_room/analysts_program/
70% said they consider their SCADA systems to be at high or 
sans_survey_scada_2013.pdf 
severe risk; one-third of them suspect that they have been 
already been infiltrated. 
CRS-60 
 
Title Source 
Date 
Pages 
Notes 
Fol ow-up Audit of the Department’s Cyber Security 
U.S. Department 
December 1, 
25 
In 2008, it was reported in the Department's Cyber Security 
Incident Management Program  
of Energy 
2012 
Incident Management Program (DOE/IG-0787, January 2008) 
Inspector 
that the department and NNSA established and maintained a 
https://www.hsdl.org/?view&did=728459 
General’s Office 
number of independent, at least partially duplicative, cyber 
security incident management capabilities. Although certain 
actions had been taken in response to the prior report, 
identified were several issues that limited the efficiency and 
effectiveness of the department's cyber security incident 
management program and adversely affected the ability of law 
enforcement to investigate incidents. In response to the finding, 
management concurred with the recommendations and 
indicated that it had initiated actions to address the issues 
identified. 
Terrorism and the Electric Power Delivery System 
National 
November 2012 
146 
Focuses on measures that could make the power delivery 
Academies of 
system less vulnerable to attacks, restore power faster after an 
http://www.nap.edu/catalog.php?record_id=12050 
Science 
attack, and make critical services less vulnerable while the 
delivery of conventional electric power has been disrupted. 
New FERC Office to Focus on Cyber Security   
U.S. Department 
September 20, 
N/A 
The Federal Energy Regulatory Commission announced the 
of Energy 
2012 
creation of the agency’s new Office of Energy Infrastructure 
http://www.ferc.gov/media/news-releases/2012/2012-3/09-
Security, which will work to reduce threats to the electric grid 
20-12.asp 
and other energy facilities. The goal is for the office to help 
FERC, as well as other agencies and private companies, better 
identify potential dangers and solutions. 
Canvassing the Targeting of Energy Infrastructure: The 
Journal of Energy 
August 7, 2012 
8 
The Energy Infrastructure Attack Database (EIAD) is a non-
Energy Infrastructure Attack Database  
Security  
commercial dataset that structures information on reported 
(criminal and political) attacks to EI (worldwide) since 1980, by 
http://www.ensec.org/index.php?option=com_content&
non-state actors. In building this resource, the objective was to 
view=article&id=379:canvassing-the-targeting-of-energy-
develop a product that could be broadly accessible and also 
infrastructure-the-energy-infrastructure-attack-database&
connect to existing available resources 
catid=128:issue-content&Itemid=402  
Smart-Grid Security 
Center for 
August 1, 2012 
26 
Highlights the significance of and the chal enges with securing the 
Infrastructure 
smart grid. 
http://cip.gmu.edu/archive/
Protection and 
CIPHS_TheCIPReport_August2012_SmartGridSecurity.p
Homeland 
df#page=2 
Security, George 
Mason School of 
Law   
CRS-61 
 
Title Source 
Date 
Pages 
Notes 
Cybersecurity: Challenges in Securing the Electricity Grid   GAO 
July 17, 2012 
25 
In a prior report, GAO has made recommendations related to 
electricity grid modernization efforts, including developing an 
http://www.gao.gov/products/GAO-12-926T  
approach to monitor compliance with voluntary standards. 
These recommendations have not yet been implemented. 
ICS-CERT Incident Response Summary Report 
U.S. Industrial 
June 28, 2012 
17 
The number of reported cyberattacks on U.S. critical 
Control System 
infrastructure increased sharply—from 9 incidents in 2009 to 
http://www.us-cert.gov/control_systems/pdf/ICS-
Cyber Emergency 
198 in 2011; water sector-specific incidents, when added to the 
CERT_Incident_Response_Summary_Report_09_11.pdf 
Response Team 
incidents that affected several sectors, accounted for more than 
(ICS-CERT) 
half of the incidents; in more than half of the most serious cases, 
implementing best practices such as login limitation or properly 
configured firewall, would have deterred the attack, reduced the 
time it would have taken to detect an attack, and minimize its 
impact. 
Energy Department Develops Tool with Industry to Help 
U.S. Department 
June 28, 2012 
N/A 
The Cybersecurity Self-Evaluation Tool utilizes best practices 
Utilities Strengthen Their Cybersecurity Capabilities 
of Energy 
that were developed for the Electricity Subsector Cybersecurity 
Capability Maturity Model Initiative, which involved a series of 
http://energy.gov/articles/energy-department-develops-
workshops with the private sector to draft a maturity model 
tool-industry-help-utilities-strengthen-their-cybersecurity 
that can be used throughout the electric sector to better 
protect the grid. 
Electricity Subsector Cybersecurity Risk Management 
Department of 
May 2012 
96 
The guideline describes a risk management process that is 
Process  
Energy, Office of 
targeted to the specific needs of electricity sector organizations. 
Electricity 
The objective of the guideline is to build upon existing guidance 
http://energy.gov/oe/downloads/cybersecurity-risk-
Delivery & 
and requirements to develop a flexible risk management process 
management-process-rmp-guideline-final-may-2012 
Energy Reliability 
tuned to the diverse missions, equipment, and business needs of 
the electric power industry. 
Cybersecurity for Energy Delivery Systems Program 
Department of 
ongoing 
N/A 
The program assists the energy sector asset owners (electric, 
Energy, Office of 
oil, and gas) by developing cybersecurity solutions for energy 
http://energy.gov/oe/technology-development/energy-
Electricity 
delivery systems through integrated planning and a focused 
delivery-systems-cybersecurity 
Delivery & 
research and development effort. CEDS co-funds projects with 
Energy Reliability 
industry partners to make advances in cybersecurity capabilities 
for energy delivery systems. 
ICT Applications for the Smart Grid: Opportunities and 
Organization for 
January 10, 2012 
44 
This report discusses “smart” applications of information and 
Policy Implications 
Economic Co-
communication technologies (ICTs) for more sustainable energy 
operation and 
production, management and consumption. The report outlines 
http://www.oecd-ilibrary.org/content/workingpaper/
Development 
policy implications for government ministries dealing with 
5k9h2q8v9bln-en 
(OECD) 
telecommunications regulation, ICT sector and innovation 
promotion, and consumer and competition issues. 
CRS-62 
 
Title Source 
Date 
Pages 
Notes 
The Department’s Management of the Smart Grid 
Department of 
January 1, 2012 
21 
According to the Inspector General, DOE's rush to award 
Investment Grant Program 
Energy (DOE) 
stimulus grants for projects under the next generation of the 
Inspector 
power grid, known as the Smart grid, resulted in some firms 
http://energy.gov/ig/downloads/departments-management-
General 
receiving funds without submitting complete plans for how to 
smart-grid-investment-grant-program-oas-ra-12-04 
safeguard the grid from cyber attacks. 
Critical Infrastructure Protection: Cybersecurity 
Government 
December 9, 
77 
Given the plethora of guidance available, individual entities 
Guidance Is Available, but More Can Be Done to 
Accountability 
2011 
within the sectors may be challenged in identifying the guidance 
Promote Its Use 
Office (GAO) 
that is most applicable and effective in improving their security 
posture. Improved knowledge of the available guidance could 
http://www.gao.gov/products/GAO-12-92 
help both federal and private-sector decision makers better 
coordinate their efforts to protect critical cyber-reliant assets. 
The Future of the Electric Grid 
Massachusetts 
December 5, 
39 
Chapter 1 provides an overview of the status of the grid, the 
Institute of 
2011 
challenges and opportunities it will face, and major 
http://web.mit.edu/mitei/research/studies/the-electric-grid-
Technology (MIT) 
recommendations. To facilitate selective reading, detailed 
2011.shtml 
descriptions of the contents of each section in Chapters 2–9 are 
provided in each chapter’s introduction, and recommendations 
are collected and briefly discussed in each chapter's final section. 
(See Chapter 9, Data Communications, Cybersecurity, and 
Information Privacy, pages 208-234). 
FCC‘s Plan for Ensuring the Security of 
Federal 
June 3, 2011 
1 
FCC Chairman Genachowski's response to letter from Rep. 
Telecommunications Networks 
Communications 
Anna Eshoo dated November 2, 2010, re: concerns about the 
Commission 
implications of foreign-controlled telecommunications 
ftp://ftp.fcc.gov/pub/Daily_Releases/Daily_Business/2011/
(FCC) 
infrastructure companies providing equipment to the U.S. 
db0610/DOC-307454A1.txt 
market. 
Cyber Infrastructure Protection 
U.S. Army War 
May 9, 2011 
324 
Part 1 deals with strategy and policy issues related to cyber 
College 
security and provides discussions covering the theory of 
http://www.strategicstudiesinstitute.army.mil/pubs/
cyberpower, Internet survivability, large scale data breaches, and 
display.cfm?pubid=1067 
the role of cyberpower in humanitarian assistance. Part 2 covers 
social and legal aspects of cyber infrastructure protection and 
discusses the attack dynamics of political and religiously 
motivated hackers. Part 3 discusses the technical aspects of 
cyber infrastructure protection including the resilience of data 
centers, intrusion detection, and a strong emphasis on Internet 
protocol (IP) networks.  
In the Dark: Crucial Industries Confront Cyberattacks 
McAfee and 
April 21, 2011 
28 
The study reveals an increase in cyber attacks on critical 
Center for 
infrastructure such as power grids, oil, gas, and water; the study 
http://www.mcafee.com/us/resources/reports/rp-critical-
Strategic and 
also shows that that many of the world’s critical infrastructures 
infrastructure-protection.pdf 
International 
lacked protection of their computer networks, and reveals the 
Studies (CSIS) 
cost and impact of cyberattacks 
CRS-63 
 
Title Source 
Date 
Pages 
Notes 
Cybersecurity: Continued Attention Needed to Protect 
Government 
March 16, 2011 
16 
According to GAO, executive branch agencies have also made 
Our Nation’s Critical Infrastructure and Federal 
Accountability 
progress instituting several government-wide initiatives that are 
Information Systems 
Office (GAO) 
aimed at bolstering aspects of federal cybersecurity, such as 
reducing the number of federal access points to the Internet, 
http://www.gao.gov/products/GAO-11-463T 
establishing security configurations for desktop computers, and 
enhancing situational awareness of cyber events. Despite these 
efforts, the federal government continues to face significant 
challenges in protecting the nation's cyber-reliant critical 
infrastructure and federal information systems. 
Federal Energy Regulatory Commission’s Monitoring of 
North American 
January 26, 2011 
30 
NERC developed Critical Infrastructure Protection (CIP) cyber 
Power Grid Cyber Security 
Electric Reliability 
security reliability standards which were approved by the FERC 
Corp. (NERC) 
in January 2008. Although the Commission had taken steps to 
http://www.wired.com/images_blogs/threatlevel/2011/02/
ensure CIP cyber security standards were developed and 
DoE-IG-Report-on-Grid-Security.pdf 
approved, NERC’s testing revealed that such standards did not 
always include controls commonly recommended for protecting 
critical information systems. In addition, the CIP standards 
implementation approach and schedule approved by the 
Commission were not adequate to ensure that systems-related 
risks to the nation's power grid were mitigated or addressed in 
a timely manner. 
Electricity Grid Modernization: Progress Being Made on 
Government 
January 12, 2011 
50 
To reduce the risk that NIST’s smart grid cybersecurity 
Cybersecurity Guidelines, but Key Challenges Remain to 
Accountability 
guidelines will not be as effective as intended, the Secretary of 
be Addressed 
Office (GAO) 
Commerce should direct the Director of NIST to finalize the 
agency's plan for updating and maintaining the cybersecurity 
http://www.gao.gov/products/GAO-11-117 
guidelines, including ensuring it incorporates (1) missing key 
elements identified in this report, and (2) specific milestones for 
when efforts are to be completed. Also, as a part of finalizing the 
plan, the Secretary of Commerce should direct the Director of 
NIST should assess whether any cybersecurity challenges 
identified in this report should be addressed in the guidelines. 
Partnership for Cybersecurity Innovation 
White House 
December 6, 
4 
The Obama Administration released a Memorandum of 
(Office of Science 
2010 
Understanding signed by the National Institute of Standards and 
http://www.whitehouse.gov/blog/2010/12/06/partnership-
& Technology 
Technology (NIST) of the Department of Commerce, the 
cybersecurity-innovation 
Policy) 
Science and Technology Directorate of the Department of 
Homeland Security (DHS/S&T), and the Financial Services Sector 
Coordinating Council (FSSCC). The goal of the agreement is to 
speed the commercialization of cybersecurity research 
innovations that support the nation’s critical infrastructures. 
CRS-64 
 
Title Source 
Date 
Pages 
Notes 
WIB Security Standard Released 
International 
November 10, 
 
The Netherlands-based International Instrument Users 
Instrument Users 
2010 
Association (WIB), an international organization that represents 
http://www.isssource.com/wib/ 
Association 
global manufacturers in the industrial automation industry, 
(WIB) 
announced the second version of the Process Control Domain 
Security Requirements For Vendors document—the first 
international standard that outlines a set of specific 
requirements focusing on cyber security best practices for 
suppliers of industrial automation and control systems. 
Information Security Management System for Microsoft 
Microsoft 
November 2010 
15 
This study describes the standards Microsoft fol ows to address 
Cloud Infrastructure 
current and evolving cloud security threats. It also depicts the 
internal structures within Microsoft that handle cloud security 
http://cdn.globalfoundationservices.com/documents/
and risk management issues.  
InformationSecurityMangSysforMSCloudInfrastructure.pdf 
NIST Finalizes Initial Set of Smart Grid Cyber Security 
National Institute 
September 2, 
N/A 
NIST released a three-volume set of recommendations on all 
Guidelines 
of Standards and 
2010 
things relevant to securing the Smart Grid. The guidelines 
Technology 
address a variety of topics, including high-level security 
http://www.nist.gov/public_affairs/releases/nist-finalizes-
(NIST) 
requirements, a risk assessment framework, an evaluation of 
initial-set-of-smart-grid-cyber-security-guidelines.cfm 
privacy issues in residences and recommendations for protecting 
the evolving grid from attacks, malicious code, cascading errors, 
and other threats. 
Critical Infrastructure Protection: Key Private and Public 
Government 
July 15, 2010 
38 
Private-sector stakeholders reported that they expect their 
Cyber Expectations Need to Be Consistently Addressed 
Accountability 
federal partners to provide usable, timely, and actionable cyber 
Office (GAO) 
threat information and alerts; access to sensitive or classified 
http://www.gao.gov/products/GAO-10-628 
information; a secure mechanism for sharing information; 
security clearances; and a single centralized government 
cybersecurity organization to coordinate government efforts. 
However, according to private sector stakeholders, federal 
partners are not consistently meeting these expectations. 
The future of cloud computing 
Pew Research 
June 11, 2010 
26 
Technology experts and stakeholders say they expect they will 
Center’s Internet 
“live mostly in the cloud” in 2020 and not on the desktop, 
http://pewinternet.org/Reports/2010/The-future-of-cloud-
& American Life 
working mostly through cyberspace-based applications accessed 
computing.aspx 
Project 
through networked devices.  
The Reliability of Global Undersea Communications Cable  IEEE/EastWest 
May 26, 2010 
186 
This study submits 12 major recommendations to the private 
Infrastructure (The ROGUCCI Report) 
Institute 
sector, governments and other stakeholders—especial y the 
financial sector—for the purpose of improving the reliability, 
http://www.ieee-rogucci.org/files/
robustness, resilience, and security of the world’s undersea 
The%20ROGUCCI%20Report.pdf  
communications cable infrastructure. 
CRS-65 
 
Title Source 
Date 
Pages 
Notes 
NSTB Assessments Summary Report: Common Industrial 
Department of 
May 1, 2010 
123 
Computer networks controlling the electric grid are plagued 
Control System Cyber Security Weaknesses 
Energy, Idaho 
with security holes that could allow intruders to redirect power 
National 
delivery and steal data. Many of the security vulnerabilities are 
http://www.fas.org/sgp/eprint/nstb.pdf 
Laboratory 
strikingly basic and fixable problems. 
Explore the reliability and resiliency of commercial 
Federal 
April 21, 2010 
N/A 
The Federal Communications Commission launched an inquiry 
broadband communications networks 
Communications 
on the ability of existing broadband networks to withstand 
Commission 
significant damage or severe overloads as a result of natural 
http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-
(FCC) 
disasters, terrorist attacks, pandemics or other major public 
305618A1.doc  
emergencies, as recommended in the National Broadband Plan. 
Security Guidance for Critical Areas of Focus in Cloud 
Cloud Security 
December 2009 
76 
“Through our focus on the central issues of cloud computing 
Computing V2.1 
Alliance 
security, we have attempted to bring greater clarity to an 
otherwise complicated landscape, which is often filled with 
http://www.cloudsecurityalliance.org/csaguide.pdf 
incomplete and oversimplified information. Our focus ... serves 
to bring context and specificity to the cloud computing security 
discussion: enabling us to go beyond gross generalizations to 
deliver more insightful and targeted recommendations.” 
21 Steps to Improve Cyber Security of SCADA Networks  U.S. Department 
January 1, 2007 
10 
The President’s Critical Infrastructure Protection Board and the 
of Energy, 
Department of Energy have developed steps to help any 
http://www.oe.netl.doe.gov/docs/prepare/
Infrastructure 
organization improve the security of its SCADA networks. The 
21stepsbooklet.pdf  
Security and 
steps are divided into two categories: specific actions to improve 
Energy 
implementation, and actions to establish essential underlying 
Restoration 
management processes and policies. 
Note: Highlights compiled by CRS from the reports. 
 
CRS-66 
Cybersecurity: Authoritative Reports and Resources 
 
CRS Reports and Other CRS Products:  Cybercrime and National 
Security 
•  CRS Report 97-1025, Cybercrime: An Overview of the Federal Computer Fraud 
and Abuse Statute and Related Federal Criminal Laws, by Charles Doyle 
•  CRS Report 94-166, Extraterritorial Application of American Criminal Law, by 
Charles Doyle 
•  CRS Report R42403, Cybersecurity: Cyber Crime Protection Security Act (S. 
2111, 112th Congress)—A Legal Analysis, by Charles Doyle 
•  CRS Report 98-326, Privacy: An Overview of Federal Statutes Governing 
Wiretapping and Electronic Eavesdropping, by Gina Stevens and Charles Doyle 
•  CRS Report RL32706, Spyware: Background and Policy Issues for Congress, by 
Patricia Moloney Figliola 
•  CRS Report CRS Report R41975, Illegal Internet Streaming of Copyrighted 
Content: Legislation in the 112th Congress, by Brian T. Yeh 
•  CRS Report R42112, Online Copyright Infringement and Counterfeiting: 
Legislation in the 112th Congress, by Brian T. Yeh 
•  CRS Report R40599, Identity Theft: Trends and Issues, by Kristin M. Finklea 
•  CRS Report R41927, The Interplay of Borders, Turf, Cyberspace, and 
Jurisdiction: Issues Confronting U.S. Law Enforcement, by Kristin M. Finklea 
•  CRS Report RL34651, Protection of Children Online: Federal and State Laws 
Addressing Cyberstalking, Cyberharassment, and Cyberbullying, by Alison M. 
Smith 
•  CRS Report R42547, Cybercrime: Conceptual Issues for Congress and U.S. Law 
Enforcement, by Kristin M. Finklea and Catherine A. Theohary 
•  CRS Legal Sidebar, Legal Barriers to an Expanded Role of the Military in 
Defending Against Domestic Cyberattacks,  Andrew Nolan 
•  CRS Legal Sidebar, Obstacles to Private Sector Cyber Threat Information Sharing, 
Edward C. Liu 
 
 
Congressional Research Service 
67 
 
Table 27. Selected Reports: Cybercrime/Cyberwar 
Title Source 
Date 
Pages Notes 
Electric Grid Vulnerability: Industry Responses Reveal 
Rep. Edward 
May 21, 2013 
35 
The report found that less than a quarter of investor-owned 
Security Gaps 
Markey and Rep. 
utilities and less than half of municipal and cooperation-owned 
Henry Waxman  
utilities fol owed through with voluntary standards issued by the 
http://markey.house.gov/sites/markey.house.gov/files/docu
Federal Energy Regulatory Commission after the Stuxnet worm 
ments/Markey%20Grid%20Report_05.21.13.pdf 
struck in 2010. 
Towards Trustworthy Social Media and Crowdsourcing 
Wilson Center 
May 2013 
12 
Individuals and organizations interested in using social media and 
crowdsourcing currently lack two key sets of information: a 
http://www.scribd.com/doc/138508756/Towards-
systematic assessment of the vulnerabilities in these technologies 
Trustworthy-Social-Media-and-Crowdsourcing#download 
and a comprehensive set of best practices describing how to 
address those vulnerabilities. Identifying those vulnerabilities and 
developing those best practices are necessary to address a 
growing number of cybersecurity incidents ranging from innocent 
mistakes to targeted attacks that have claimed lives and cost 
millions of dollars. 
Role of Counterterrorism Law in Shaping 'ad Bellum' 
International Law  April 1, 2013 
42 
The prospect of cyber war has evolved from science fiction and 
Norms for Cyber Warfare 
Studies (U.S. 
over-the-top doomsday depictions on television, films, and in 
Naval War 
novels to reality and front-page news… To date there has been 
https://www.hsdl.org/?view&did=734375 
College) 
little attention given to the possibility that international law 
generally and counterterrorism law in particular could and should 
develop a subset of cyber-counterterrorism law to respond to the 
inevitability of cyber attacks by terrorists and the use of cyber 
weapons by governments against terrorists, and to supplement 
existing international law governing cyber war where the 
intrusions do not meet the traditional kinetic thresholds. 
The Tallinn Manual on the International Law Applicable to 
Cambridge 
March 5, 
282 
The Tallinn Manual identifies the international law applicable to 
Cyber Warfare 
University Press/ 
2013 
cyber warfare and sets out 95 ‘black-letter rules’ governing such 
NATO 
conflicts. An extensive commentary accompanies each rule, which 
http://ccdcoe.org/249.html 
Cooperative 
sets forth each rules’ basis in treaty and customary law, explains 
Cyber Defence 
how the group of experts interpreted applicable norms in the 
Center of 
cyber context, and outlines any disagreements within the group as 
Excel ence 
to each rules’ application. (Note: The manual is not an official 
NATO publication, but an expression of opinions of a group of 
independent experts acting solely in their personal capacity.) 
APT1: Exposing One of China’s Cyber Espionage Units 
Mandiant February 
19, 
76 
The details analyzed during hundreds of investigations signal that 
2013 
the groups conducting these activities (computer security 
http://intelreport.mandiant.com/
breaches around the world) are based primarily in China and that 
Mandiant_APT1_Report.pdf 
the Chinese government is aware of them. 
CRS-68 
 
Title Source 
Date 
Pages Notes 
Video demo of Chinese hacker activity 
Mandiant February 
19, 
N/A 
Video of APT1 attacker sessions and intrusion activities (5-minute 
2013 
video).  
http://intelreport.mandiant.com/ 
Cyberattacks Among Rivals: 2001-2011 (from the article, 
Foreign Affairs 
November 
N/A 
A chart showing cyberattacks by initiator and victim, 2001-2011. 
“The Fog of Cyberwar” by Brandon Variano and Ryan 
21, 2012 
Maness (subscription required) 
http://www.foreignaffairs.com/cyberattacks-by-initiator-
and-victim 
Emerging Cyber Threats Report 2013 
Georgia Institute 
November 
9 
The year ahead will feature new and increasingly sophisticated 
of Technology 
14, 2012 
means to capture and exploit user data, escalating battles over the 
http://www.gtsecuritysummit.com/pdf/
control of online information and continuous threats to the U.S. 
2013ThreatsReport.pdf 
supply chain from global sources. (From the annual Georgia Tech 
Cyber Security Summit 2012). 
Proactive Defense for Evolving Cyber Threats 
Sandia National 
November 1, 
98 
The project applied rigorous predictability-based analytics to two 
Labs 
2012 
central and complementary aspects of the network defense 
http://prod.sandia.gov/techlib/access-control.cgi/2012/
problem—attack strategies of the adversaries and vulnerabilities of 
1210177.pdf 
the defenders’ systems—and used the results to develop a 
scientifically-grounded, practically-implementable methodology for 
designing proactive cyber defense systems. 
Safeguarding Cyber-Security, Fighting in Cyberspace 
International 
October 22, 
N/A 
Looks at the Militarisation of Cyber Security as a Source of Global 
Relations and 
2012 
Tension, and makes the case that cyber-warfare is already an 
http://www.isn.ethz.ch/isn/Editorial-Plan/Dossiers/Detail/?
Security 
essential feature of many leading states’ strategic calculations, 
lng=en&id=154059&contextid782=154059 
Network (ISN) 
followed by its opposite—i.e., one that believes the threat posed 
by cyber-warfare capabilities is woefully overstated.  
Before We Knew It: An Empirical Study of Zero-Day 
Symantec 
October 16, 
12 
The paper describes a method for automatical y identifying zero-
Attacks In The Real World   
Research Labs 
2012 
day attacks from field-gathered data that records when benign and 
malicious binaries are downloaded on 11 million real hosts around 
http://users.ece.cmu.edu/~tdumitra/public_documents/
the world. Searching this data set for malicious files that exploit 
bilge12_zero_day.pdf 
known vulnerabilities indicates which files appeared on the 
Internet before the corresponding vulnerabilities were disclosed. 
ZeroAccess: We’re Gonna Need a Bigger Planet 
F-Secure and 
October 15, 
N/A 
The idea of a network of malware-infected zombie computers 
Google Maps 
2012 
rigged to do the bidding of criminals conjures up a frightening 
http://www.f-secure.com/weblog/archives/00002428.html 
image on its own. A new visualization of the so-called ZeroAcess 
botnet shows how widespread such schemes can become. 
CRS-69 
 
Title Source 
Date 
Pages Notes 
Investigative Report on the U.S. National Security Issues 
House 
October 8, 
60 
The committee initiated this investigation in November 2011 to 
Posed by Chinese Telecommunications Companies 
Permanent 
2012 
inquire into the counterintelligence and security threat posed by 
Huawei and ZTE 
Select 
Chinese telecommunications companies doing business in the 
Committee on 
United States. 
http://intelligence.house.gov/press-release/investigative-
Intelligence 
report-us-national-security-issues-posed-chinese-
telecommunications  
Federal Support for and Involvement in State and Local 
U. S. Senate 
October 3, 
141 
A two-year bipartisan investigation found that U.S. Department of 
Fusion Centers 
Permanent 
2012 
Homeland Security efforts to engage state and local intelligence 
Subcommittee 
“fusion centers” has not yielded significant useful information to 
http://www.hsgac.senate.gov/download/?id=49139e81-
on Investigations 
support federal counterterrorism intelligence efforts. In Section 
1dd7-4788-a3bb-d6e7d97dde04  
VI, “Fusion Centers Have Been Unable to Meaningfully Contribute 
to Federal Counterterrorism Efforts,” Part G, “Fusion Centers 
May Have Hindered, Not Aided, Federal Counterterrorism 
Efforts,” the report discusses the Russian “Cyberattack” in Illinois. 
HoneyMap - Visualizing Worldwide Attacks in Real-Time 
The Honeynet 
October 1, 
N/A 
The HoneyMap shows a real-time visualization of attacks against 
Project 
2012 
the Honeynet Project’s sensors deployed around the world. 
http://www.honeynet.org/node/960 
Manual on International Law Applicable to Cyber Warfare 
NATO 
August 2012 
N/A 
The Tallinn Manual is a nonbinding yet authoritative restatement 
(“The Tal inn Manual”)   
Cooperative 
of the law of armed conflict as it relates to cyberwar. It offers 
Cyber Defence 
guidance to attackers, defenders, and legal experts on how 
http://www.ccdcoe.org/249.html 
Centre of 
cyberattacks can be classified as actions covered under the law, 
Excel ence, 
such as armed attacks. 
Tal inn, Estonia 
Does Cybercrime Really Cost $1 Trillion? 
ProPublica August 
1, N/A 
In a news release from computer security firm McAfee to 
2012 
announce its 2009 report, “Unsecured Economies: Protecting Vital 
http://www.propublica.org/article/does-cybercrime-really-
Information,” the company estimated a trillion dollar global cost 
cost-1-trillion 
for cybercrime. The number does not appear in the report itself. 
McAfee’s trillion-dollar estimate is questioned even by the three 
independent researchers from Purdue University whom McAfee 
credits with analyzing the raw data from which the estimate was 
derived. An examination of their origins by ProPublica has found 
new grounds to question the data and methods used to generate 
these numbers, which McAfee and Symantec say they stand 
behind. 
CRS-70 
 
Title Source 
Date 
Pages Notes 
Putting the “war” in cyberwar: Metaphor, analogy, and 
First Monday 
July 2, 2012 
N/A 
This essay argues that current contradictory tendencies are 
cybersecurity discourse in the United States 
unproductive and even potential y dangerous. It argues that the 
war metaphor and nuclear deterrence analogy are neither natural 
http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/
nor inevitable and that abandoning them would open up new 
article/view/3848/3270 
possibilities for thinking more productively about the full spectrum 
of cyber security challenges, including the as-yet unrealized 
possibility of cyber war. 
Information Security: Cyber Threats Facilitate Ability to 
GAO June 
28, 
20 
This statement discusses (1) cyber threats facing the nation’s 
Commit Economic Espionage  
2012 
systems, (2) reported cyber incidents and their impacts, (3) 
security controls and other techniques available for reducing risk, 
http://www.gao.gov/products/GAO-12-876T 
and (4) the responsibilities of key federal entities in support of 
protecting IP. 
Measuring the Cost of Cybercrime     
11th Annual 
June 25, 
N/A 
“For each of the main categories of cybercrime we set out what is 
Workshop on 
2012 
and is not known of the direct costs, indirect costs and defence 
http://weis2012.econinfosec.org/papers/
the Economics of 
costs - both to the UK and to the world as a whole.” 
Anderson_WEIS2012.pdf 
Information 
Security 
Nodes and Codes: The Reality of Cyber Warfare  
U.S. Army 
May 17, 2012 
62 
Explores the reality of cyber warfare through the story of Stuxnet. 
School of 
Three case studies evaluate cyber policy, discourse, and 
http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA567190&
Advanced 
procurement in the United States, Russia, and China before and 
Location=U2&doc=GetTRDoc.pdf 
Military Studies, 
after Stuxnet to illustrate their similar, yet unique, realities of 
Command and 
cyber warfare. 
General Staff 
The Impact of Cybercrime on Businesses 
Ponemon 
May 2012 
21 
The study found that targeted attacks on businesses cost 
Institute 
enterprises an average of $214,000. The expenses are associated 
http://www.checkpoint.com/products/downloads/
with forensic investigations, investments in technology, and brand 
whitepapers/ponemon-cybercrime-2012.pdf 
recovery costs. 
Proactive Policy Measures by Internet Service Providers 
Organisation for 
May 7, 2012 
25 
This report analyzes initiatives in a number of countries through 
against Botnets  
Economic Co-
which end-users are notified by ISPs when their computer is 
operation and 
identified as being compromised by malicious software and 
http://www.oecd-ilibrary.org/science-and-technology/
Development 
encouraged to take action to mitigate the problem. 
proactive-policy-measures-by-internet-service-providers-
against-botnets_5k98tq42t18w-en 
Developing State Solutions to Business Identity Theft: 
National 
January 2012 
23 
This white paper is the result of efforts by the 19-member NASS 
Assistance, Prevention and Detection Efforts by Secretary 
Association of 
Business Identity Theft Task Force to develop policy guidelines 
of State Offices 
Secretaries of 
and recommendations for state leaders dealing with identity fraud 
State 
cases involving public business records. 
http://www.nass.org/index.php?option=com_docman&
task=doc_download&gid=1257  
CRS-71 
 
Title Source 
Date 
Pages Notes 
A Cyberworm that Knows No Boundaries 
RAND December 
55 
Stuxnet-like worms pose a serious threat even to infrastructure 
21, 2011 
and computer systems that are not connected to the Internet. 
http://www.rand.org/content/dam/rand/pubs/
However, defending against such attacks is an increasingly 
occasional_papers/2011/RAND_OP342.pdf  
complex prospect. 
Department of Defense Cyberspace Policy Report: A 
DOD November 
14 
From the report: “When warranted, we will respond to hostile 
Report to Congress Pursuant to the National Defense 
15, 2011 
attacks in cyberspace as we would to any other threat to our 
Authorization Act for Fiscal Year 2011, Section 934 
country. We reserve the right to use all necessary means - 
diplomatic, informational, military and economic - to defend our 
http://www.defense.gov/home/features/2011/
nation, our allies, our partners and our interests.” 
0411_cyberstrategy/docs/
NDAA%20Section%20934%20Report_For%20webpage.pdf 
W32.Duqu: The Precursor to the Next Stuxnet 
Symantec October 
24, 
N/A 
On October 14, 2011, a research lab with strong international 
2011 
connections alerted Symantec to a sample that appeared to be 
http://www.symantec.com/connect/
very similar to Stuxnet, the malware which wreaked havoc in 
w32_duqu_precursor_next_stuxnet 
Iran’s nuclear centrifuge farms last summer. The lab named the 
threat “Duqu” because it creates files with the file name prefix 
“DQ”. The research lab provided Symantec with samples 
recovered from computer systems located in Europe, as well as a 
detailed report with their initial findings, including analysis 
comparing the threat to Stuxnet. 
Cyber War Will Not Take Place 
Journal of 
October 5, 
29 
The paper argues that cyber warfare has never taken place, is not 
Strategic Studies 
2011 
currently taking place, and is unlikely to take place in the future. 
http://www.tandfonline.com/doi/abs/10.1080/
01402390.2011.608939 
Twenty Critical Security Controls for Effective Cyber 
SANS October 
3, 
77 
The 20 measures are intended to focus agencies’ limited resources 
Defense: Consensus Audit Guidelines (CAG) 
2011 
on plugging the most common attack vectors. 
http://www.sans.org/critical-security-controls/ 
Revealed: Operation Shady RAT: an Investigation Of 
McAfee August 
2, 
14 
A cyber-espionage operation lasting many years penetrated 72 
Targeted Intrusions Into 70+ Global Companies, 
2011 
government and other organizations, most of them in the United 
Governments, and Non-Profit Organizations During the 
States, and has copied everything from military secrets to 
Last 5 Years 
industrial designs, according to technology security company 
McAfee. See page 4 for the types of compromised parties), page 5 
http://www.mcafee.com/us/resources/white-papers/wp-
for the geographic distribution of victim’s country of origin, pages 
operation-shady-rat.pdf 
7-9 for the types of victims, and pages 10-13 for the number of 
intrusions for 2007-2010.  
CRS-72 
 
Title Source 
Date 
Pages Notes 
USCYBERCOM and Cyber Security: Is a Comprehensive 
Army War 
May 12, 
32 
Examine five aspects of USCYBERCOM: organization, command 
Strategy Possible?  
College 
20122 
and control, computer network operations (CNO), 
synchronization, and resourcing. Identify areas that currently 
present significant risk to USCYBERCOM’s ability to create a 
strategy that can achieve success in its cyberspace operations. 
Recommend potential solutions that can increase the effectiveness 
of the USCYBERCOM strategy. 
A Four-Day Dive Into Stuxnet’s Heart 
Threat Level 
December 
N/A 
From the article, “It is a mark of the extreme oddity of the 
Blog (Wired) 
27, 2010 
Stuxnet computer worm that Microsoft’s Windows vulnerability 
http://www.wired.com/threatlevel/2010/12/a-four-day-
team learned of it first from an obscure Belarusian security 
dive-into-stuxnets-heart/ 
company that even they had never heard of.” 
Did Stuxnet Take Out 1,000 Centrifuges at the Natanz 
Institute for 
December 
10 
This report indicates that commands in the Stuxnet code intended 
Enrichment Plant? Preliminary Assessment 
Science and 
22, 2010 
to increase the frequency of devices targeted by the malware 
International 
exactly match several frequencies at which rotors in centrifuges at 
http://isis-online.org/isis-reports/detail/did-stuxnet-take-
Security 
Iran’s Natanz enrichment plant are designed to operate optimally 
out-1000-centrifuges-at-the-natanz-enrichment-plant/  
or are at risk of breaking down and flying apart. 
The Role of Internet Service Providers in Botnet 
Organisation for 
November 
68 
This working paper considers whether ISPs can be critical control 
Mitigation: an Empirical Analysis Bases on Spam Data 
Economic Co-
12, 2010 
points for botnet mitigation, how the number of infected machines 
operation and 
varies across ISPs, and why. 
http://citeseerx.ist.psu.edu/viewdoc/download?doi=
Development  
10.1.1.165.2211&rep=rep1&type=pdf  
Stuxnet Analysis 
European 
October 7, 
N/A 
EU cybersecurity agency warns that the Stuxnet malware is a 
Network and 
2010 
game changer for critical information infrastructure protection; 
http://www.enisa.europa.eu/media/press-releases/stuxnet-
Information 
PLC control ers of SCADA systems infected with the worm might 
analysis 
Security Agency  
be programmed to establish destructive over/under pressure 
conditions by running pumps at different frequencies. 
Proceedings of a Workshop on Deterring Cyberattacks: 
National 
October 5, 
400 
Per request of the Office of the Director of National Intelligence, 
Informing Strategies and Developing Options for U.S. 
Research 
2010 
the National Research Council undertook a two-phase project 
Policy 
Council  
aimed to foster a broad, multidisciplinary examination of strategies 
for deterring cyberattacks on the United States and of the 
http://www.nap.edu/catalog.php?record_id=
possible utility of these strategies for the U.S. government. 
12997#description 
Untangling Attribution: Moving to Accountability in 
Council on 
July 15, 2010 
14 
Robert K. Knake’s testimony before the House Committee on 
Cyberspace [Testimony] 
Foreign Relations 
Science and Technology on the role of attack attribution in 
preventing cyber attacks and how attribution technologies can 
http://i.cfr.org/content/publications/attachments/
affect the anonymity and the privacy of Internet users. 
Knake%20-Testimony%20071510.pdf 
CRS-73 
 
Title Source 
Date 
Pages Notes 
Technology, Policy, Law, and Ethics Regarding U.S. 
National 
January 1, 
368 
This report explores important characteristics of cyberattack. It 
Acquisition and Use of Cyberattack Capabilities 
Research 
2009 
describes the current international and domestic legal structure as 
Council 
it might apply to cyberattack, and considers analogies to other 
http://www.nap.edu/catalog.php?record_id=12651&
domains of conflict to develop relevant insights. 
utm_medium=etmail&utm_source=
National%20Academies%20Press&utm_campaign=
NAP+mail+eblast+10.27.09+-
+Cyberattack+Preorder+sp&utm_content=Downloader&
utm_term=#description 
Note: Highlights compiled by CRS from the reports. 
CRS-74 
 
Table 28. Selected Reports: International Efforts 
Title Source 
Date 
Pages 
Notes 
Telecommunications Networks: Addressing Potential Security 
General Accountability 
May 21, 2013 
52 
The federal government has begun efforts to 
Risks of Foreign-Manufactured Equipment 
Office 
address the security of the supply chain for 
commercial networks... There are a variety of 
http://www.gao.gov/products/GAO-13-652T 
other approaches for addressing the potential 
risks posed by foreign-manufactured 
equipment in commercial communications 
networks, including those approaches taken 
by foreign governments... While these 
approaches are intended to improve supply 
chain security of communications networks, 
they may also create the potential for trade 
barriers, additional costs, and constraints on 
competition, which the federal government 
would have to take into account if it chose to 
pursue such approaches. 
The Global Cyber Game: Achieving Strategic Resilience in the 
Defence Academy of the 
May 8, 2013 
127 
Provides a systematic way of thinking about 
Global Knowledge Society 
United Kingdom 
cyberpower and its use by a range of global 
players. The global cyberpower contest is 
http://www.da.mod.uk/publications/library/technology/20130508-
framed as a Global Cyber Game, played out 
Cyber_report_final_U.pdf/view 
on a 'Cyber Gameboard'—a framework that 
can be used for strategic and tactical thinking 
about cyber strategy. 
Defence White Paper 2013 
Australia Department of 
May 3, 2013 
148 
The Australian Cyber Security Centre will 
Defence 
bring together security capabilities from the 
http://www.defence.gov.au/whitepaper2013/docs/WP_2013_web.
Defence Signals Directorate, Defence 
pdf 
 
Intelligence Organisation, Australian Security 
 
Intelligence Organisation (ASIO), the 
Attorney-General’s Department’s Computer 
Emergency Response Team (CERT) Australia, 
Australian Federal Police (AFP) and the 
Australian Crime Commission (ACC). 
CRS-75 
 
Title Source 
Date 
Pages 
Notes 
Cyber Security Information Partnership (CISP) 
Cabinet Office, United 
March 27, 2013 
N/A 
CISP introduces a secure virtual ‘collaboration 
Kingdom 
environment’ where government and industry 
https://www.gov.uk/government/news/government-launches-
partners can exchange information on threats 
information-sharing-partnership-on-cyber-security 
and vulnerabilities in real time. The Cyber 
Security Information Sharing Partnership will 
be complemented by a ‘Fusion Cell,’ which 
will be supported on the government side by 
the Security Service, GCHQ and the National 
Crime Agency, and by industry analysts from 
a variety of sectors. 
The Tallinn Manual on the International Law Applicable to Cyber 
Cambridge University 
March 5, 2013 
282 
The Tallinn Manual identifies the international 
Warfare 
Press/ NATO 
law applicable to cyber warfare and sets out 
Cooperative Cyber 
ninety-five ‘black-letter rules’ governing such 
http://ccdcoe.org/249.html 
Defence Center of 
conflicts. An extensive commentary 
Excel ence 
accompanies each rule, which sets forth each 
rules’ basis in treaty and customary law, 
explains how the group of experts 
interpreted applicable norms in the cyber 
context, and outlines any disagreements 
within the group as to each rules’ application. 
(Note: The manual is not an official NATO 
publication, but an expression of opinions of a 
group of independent experts acting solely in 
their personal capacity.) 
Administration Strategy for Mitigating the Theft of U.S. Trade 
White House 
February 20, 
141 
“First, we will increase our diplomatic 
Secrets  
2013 
engagement.... Second, we will support 
industry-led efforts to develop best practices 
http://www.whitehouse.gov//sites/default/files/omb/IPEC/
to protect trade secrets and encourage 
admin_strategy_on_mitigating_the_theft_of_u.s._trade_secrets.p
companies to share with each other best 
df 
practices that can mitigate the risk of trade 
secret theft.... Third, DOJ will continue to 
make the investigation and prosecution of 
trade secret theft by foreign competitors and 
foreign governments a top priority.... Fourth, 
President Obama recently signed two pieces 
of legislation that will improve enforcement 
against trade secret theft.... Lastly, we will 
increase public awareness of the threats and 
risks to the U.S. economy posed by trade 
secret theft.” 
CRS-76 
 
Title Source 
Date 
Pages 
Notes 
APT1: Exposing One of China’s Cyber Espionage Units 
Mandiant February 
19, 
76 
The details analyzed during hundreds of 
2013 
investigations signal that the groups 
http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf 
conducting these activities (computer security 
breaches around the world) are based 
primarily in China and that the Chinese 
government is aware of them. 
Video demo of Chinese hacker activity 
Mandiant February 
19, 
N/A 
Video of APT1 attacker sessions and intrusion 
2013 
activities (5-minute video).  
http://intelreport.mandiant.com/ 
An Open, Safe and Secure Cyberspace 
European Union 
February 7, 
20 
The strategy articulates the EU’s vision of 
2013 
cyber-security in terms of five priorities: 
http://ec.europa.eu/digital-agenda/en/news/eu-cybersecurity-plan-
achieving cyber resilience; drastically reducing 
protect-open-internet-and-online-freedom-and-opportunity-
cybercrime; developing cyber defence policy 
cyber-security 
and capabilities related to the Common 
 
Security and Defence Policy (CSDP); 
developing the industrial and technological 
resources for cyber-security; establishing a 
coherent international cyberspace policy for 
the European Union and promoting core EU 
values. 
Linking Cybersecurity Policy and Performance 
Microsoft Trustworthy 
February 6, 
27 
Introduces a new methodology for examining 
Computing 
2013 
how socio-economic factors in a country or 
http://blogs.technet.com/b/trustworthycomputing/archive/2013/02/
region impact cybersecurity performance. 
06/linking-cybersecurity-policy-and-performance-microsoft-
Examine measures such as use of modern 
releases-special-edition-security-intelligence-report.aspx  
technology, mature processes, user education, 
law enforcement and public policies related to 
cyberspace. This methodology can build a 
model that will help predict the expected 
cybersecurity performance of a given country 
or region.  
The Chinese Defense Economy Takes Off: Sector-by-Sector 
UC Institute on Global 
January 25, 
87 
This collection of 15 policy briefs explores 
Assessments and the Role of Military End-Users 
Conflict and Cooperation  2013 
how China has made such impressive military 
technological progress over the past few 
http://igcc.ucsd.edu/assets/001/504355.pdf 
years, what is in store, and what are the 
international security implications. The briefs 
are summaries of a series of longer research 
papers presented at the third annual Chinese 
defense economy conference held by the 
Study of Innovation and Technology in China 
in July 2012.  
CRS-77 
 
Title Source 
Date 
Pages 
Notes 
Defence and Cyber-Security, vol. 1 - Report, together with formal 
House of Commons 
December 18, 
51  
Given the inevitable inadequacy of the 
minutes, oral and written evidence 
Defence Committee 
2012 
(vol. 1) 
measures available to protect against a 
(UK) 
constantly changing and evolving threat, and 
http://www.publications.parliament.uk/pa/cm201213/cmselect/
37 
given the Minister for the Cabinet Office’s 
cmdfence/106/106.pdf 
 (vol. 2) 
comment, it is not enough for the Armed 
Defence and Cyber-Security, vol. 2 - Additional Written Evidence 
Forces to do their best to prevent an effective 
attack. In its response to this report the 
http://www.publications.parliament.uk/pa/cm201213/cmselect/
Government should set out details of the 
cmdfence/106/106vw.pdf 
contingency plans it has in place should such 
an attack occur. If it has none, it should say 
so—and urgently create some. 
Cybersecurity: Managing risks for greater opportunities 
Organization for 
November 29, 
N/A 
The OECD launched a broad consultation of 
Economic Co-operation 
2012 
all stakeholders from member and non-
http://oecdinsights.org/2012/11/29/cybersecurity-managing-risks-
and Development 
member countries to review its Security 
for-greater-opportunities/  
Guidelines. The review will take into account 
newly emerging risks, technologies and policy 
trends around such areas as cloud computing, 
digital mobility, the Internet of things, social 
networking, etc.  
Cybersecurity Policy Making at a Turning Point: Analysing a New 
Organization for 
November 16, 
57 
This report analyses the latest generation of 
Generation of National Cybersecurity Strategies for the Internet 
Economic Co-operation 
2012 
national cybersecurity strategies in ten OECD 
Economy 
and Development 
countries and identifies commonalities and 
differences.  
http://www.oecd-ilibrary.org/cybersecurity-policy-making-at-a-
turning-point_5k8zq92vdgtl.pdf?contentType=/ns/WorkingPaper&
itemId=/content/workingpaper/5k8zq92vdgtl-en&containerItemId=
/content/workingpaperseries/20716826&accessItemIds=&
mimeType=application/pdfhttp://www.oecd-ilibrary.org/
cybersecurity-policy-making-at-a-turning-point_5k8zq92vdgtl.pdf?
contentType=/ns/WorkingPaper&itemId=/content/workingpaper/
5k8zq92vdgtl-en&containerItemId=/content/workingpaperseries/
20716826&accessItemIds=&mimeType=application/pdf  
2012 Report to Congress of the U.S.-China Economic and 
U.S.-China Economic and 
November 2012 
509 
This report responds to the mandate for the 
Security Review Commission, One Hundred Twelfth Congress, 
Security Review 
Commission ‘to monitor, investigate, and 
Second Session, November 2012 
Commission 
report to Congress on the national security 
implications of the bilateral trade and 
https://www.hsdl.org/?view&did=725530 
economic relationship between the United 
States and the People’s Republic of China. See 
“China's Cyber Activities," Chapter 2, Section 
2, pp. 147-169. 
CRS-78 
 
Title Source 
Date 
Pages 
Notes 
Australia: Telecommunications data retention—an overview  
Parliamentary Library of 
October 24, 
32 
In July 2012, the Commonwealth Attorney-
Australia  
2012 
General’s Department released a Discussion 
http://parlinfo.aph.gov.au/parlInfo/download/library/prspub/
Paper, Equipping Australia against emerging 
1998792/upload_binary/1998792.pdf 
and evolving threats, on the proposed 
national security reforms.... Of the 18 primary 
proposals and the 41 individual reforms that 
they comprise, the suggestion that carriage 
service providers (CSPs) be required to 
routinely retain certain information associated 
with every Australian’s use of the Internet and 
phone services for a period of up to two 
years (‘data retention’) is the issue that seems 
to have attracted the most attention. 
More Than Meets the Eye: Clandestine Funding, Cutting-Edge 
Lawrence Livermore 
October 23, 
17 
Analyzes how the Chinese leadership views 
Technology and China’s Cyber Research & Development Program  National Laboratory 
2012 
information technology research and 
development (R&D), as well as the role cyber 
http://www.osti.gov/bridge/servlets/purl/1055833/ 
R&D plays in China’s various strategic 
development plans. Explores the 
organizational structure of China’s cyber R&D 
base. Concludes with a projection of how 
China might field new cyber capabilities for 
intelligence platforms, advanced weapons 
systems, and systems designed to support 
asymmetric warfare operations. 
Investigative Report on the U.S. National Security Issues Posed by 
House Permanent Select 
October 8, 
60 
The committee initiated this investigation in 
Chinese Telecommunications Companies Huawei and ZTE 
Committee on 
2012 
November 2011 to inquire into the 
Intelligence 
counterintelligence and security threat posed 
http://intelligence.house.gov/press-release/investigative-report-us-
by Chinese telecommunications companies 
national-security-issues-posed-chinese-telecommunications  
doing business in the United States. 
Manual on International Law Applicable to Cyber Warfare (“The 
NATO Cooperative 
August 2012 
N/A 
The Tallinn Manual is a nonbinding yet 
Tallinn Manual”)   
Cyber Defence Centre of 
authoritative restatement of the law of armed 
Excellence, Tallinn, 
conflict as it relates to cyberwar. It offers 
http://www.ccdcoe.org/249.html 
Estonia 
attackers, defenders, and legal experts 
guidance on how cyberattacks can be 
classified as actions covered under the law, 
such as armed attacks. 
CRS-79 
 
Title Source 
Date 
Pages 
Notes 
Bilateral Discussions on Cooperation in Cybersecurity  
China Institute of 
June 2012 
N/A 
(Scrol  down for English). Since 2009, CSIS 
Contemporary 
and CICIR have held six formal meetings on 
http://www.cicir.ac.cn/chinese/newsView.aspx?nid=3878 
International 
cybersecurity (accompanied by several 
Relations and the Center 
informal discussions), called “Sino-U.S. 
for Strategic and 
Cybersecurity Dialogue.” The meetings have 
International Studies 
been attended by a broad range of U.S. and 
(CSIS) 
Chinese officials and scholars responsible for 
cybersecurity issues. The goals of the 
 
discussions have been to reduce 
misperceptions and to increase transparency 
of both countries’ authorities and 
understanding on how each country 
approaches cybersecurity, and to identify 
areas of potential cooperation. 
Five Years after Estonia’s Cyber Attacks: Lessons Learned for 
NATO 
May 2012 
8 
In April 2007 a series of cyber attacks 
NATO? 
targeted Estonian information systems and 
telecommunication networks. Lasting 22 days, 
http://www.ndc.nato.int/download/downloads.php?icode=334 
the attacks were directed at a range of 
servers (web, e-mail, DNS) and routers. The 
2007 attacks did not damage much of the 
Estonian information technology 
infrastructure. However, the attacks were a 
true wake-up call for NATO, offering a 
practical demonstration that cyber attacks 
could now cripple an entire nation dependent 
on IT networks. 
Cyber-security: The Vexed Question of Global Rules: An 
McAfee 
February 1, 2012 
108 
Forty-five percent of legislators and 
Independent Report on Cyber-Preparedness Around the World 
cybersecurity experts representing 27 
countries think cybersecurity is just as 
http://www.mcafee.com/us/resources/reports/rp-sda-cyber-
important as border security. The authors 
security.pdf?cid=WBB048 
surveyed 80 professionals from business, 
academia and government to gauge 
worldwide opinions of cybersecurity. 
Cyber Power Index 
Booz Allen Hamilton and 
January 15, 
N/A 
The index of developing countries’ ability to 
the Economist 
2012 
withstand cyber attacks and build strong 
http://www.cyberhub.com/CyberPowerIndex 
Intelligence Unit 
digital economies, rates the countries on their 
legal and regulatory frameworks; economic 
and social issues; technology infrastructure; 
and industry. The index puts the United 
States in the No. 2 spot, and the UK in No. 1. 
CRS-80 
 
Title Source 
Date 
Pages 
Notes 
Foreign Spies Stealing US Economic Secrets in Cyberspace 
Office of the National 
November 3, 
31 
According to the report, espionage and theft 
Counterintelligence 
2011 
through cyberspace are growing threats to 
http://www.ncix.gov/publications/reports/fecie_al /
Executive 
the United States’ security and economic 
Foreign_Economic_Collection_2011.pdf 
prosperity, and the world’s most persistent 
perpetrators happen to also be U.S. allies. 
The UK Cyber Security Strategy: Protecting and promoting the 
Cabinet Office (United 
November 2011 
43 
Chapter 1 describes the background to the 
UK in a digital world 
Kingdom) 
growth of the networked world and the 
immense social and economic benefits it is 
http://www.cabinetoffice.gov.uk/sites/default/files/resources/uk-
unlocking. Chapter 2 describes these threats. 
cyber-security-strategy-final.pdf 
The impacts are already being felt and will 
grow as our reliance on cyberspace grows. 
Chapter 3 sets out where we want to end 
up—with the government’s vision for UK 
cyber security in 2015. 
Cyber Dawn: Libya 
Cyber Security Forum 
May 9, 2011 
70 
Project Cyber Dawn: Libya uses open source 
Initiative 
material to provide an in-depth view of Libyan 
http://www.unveillance.com/wp-content/uploads/2011/05/
cyberwarfare capabilities and defenses. 
Project_Cyber_Dawn_Public.pdf 
China’s Cyber Power and America’s National Security 
U.S. Army War College, 
March 24, 2011 
86 
This report examines the growth of Chinese 
Strategy Research Project 
cyber power; their known and demonstrated 
http://www.dtic.mil/dtic/tr/ful text/u2/a552990.pdf 
capabilities for offensive, defensive and 
exploitive computer network operations; 
China‘s national security objectives; and the 
possible application of Chinese cyber power 
in support of those objectives. 
Worldwide Threat Assessment of the U.S. Intelligence 
James Clapper, Director 
February 10, 
34 
Provides an assessment of global threats: 
Community (Testimony) 
of National Intelligence 
2011 
convergence, malware, the “Chinese" 
connection, foreign military capabilities in 
http://www.dni.gov/testimonies/20110210_testimony_clapper.pdf 
cyberspace, counterfeit computer hardware 
and intellectual property theft, and identity 
theft/finding vulnerable government 
operatives. 
CRS-81 
 
Title Source 
Date 
Pages 
Notes 
Working Towards Rules for Governing Cyber Conflict: Rendering  EastWest Institute 
February 3, 
60 
[The authors] led the cyber and traditional 
the Geneva and Hague Conventions in Cyberspace 
2011 
security experts through a point-by-point 
analysis of the Geneva and Hague 
http://vialardi.org/nastrazzuro/pdf/US-Russia.pdf 
Conventions. Ultimately, the group made five 
immediate recommendations for Russian and 
U.S.-led joint assessments, each exploring 
how to apply a key convention principle to 
cyberspace. 
The Reliability of Global Undersea Communications Cable 
IEEE/EastWest Institute 
May 26, 2010 
186 
This study submits 12 major 
Infrastructure (The Rogucci Report) 
recommendations to the private sector, 
governments and other stakeholders—
http://www.ieee-rogucci.org/files/
especially the financial sector—for the 
The%20ROGUCCI%20Report.pdf 
purpose of improving the reliability, 
robustness, resilience, and security of the 
world’s undersea communications cable 
infrastructure. 
ITU Toolkit for Cybercrime Legislation 
International 
February 2010 
N/A 
This document aims to provide countries with 
Telecommunications 
sample legislative language and reference 
http://www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-toolkit-
Union 
material that can assist in the establishment of 
cybercrime-legislation.pdf 
harmonized cybercrime laws and procedural 
rules. 
Note: Highlights compiled by CRS from the reports. 
CRS-82 
 
Table 29. Selected Reports: Education/Training/Workforce 
Title Source 
Date 
Pages 
Notes 
Global Information Security Workforce Study  
(ISC)2 and Frost & 
May 7, 2013 
28 
Federal cyber workers earn an average salary of 
Sullivan 
$106,430, quite a bit less than the average private sector 
https://www.isc2.org/workforcestudy/default.aspx 
salary of $111,376. The lag in federal salaries is likely due 
 
to federal budget restraints and nearly three years of a 
continuing resolution. 
NCCoE Celebrates National Cybersecurity Excel ence 
NIST National 
April 15, 2013 
N/A 
Eleven private organizations agreed to partner with the 
Partnerships 
Cybersecurity 
National Institute of Standards and Technology to share 
Center of 
cybersecurity staff and best practices to help better 
http://csrc.nist.gov/nccoe/The-Center/News/News.html 
Excellence 
combat cyber threats. 
2012 Information Technology Workforce Assessment for 
U.S. Department of  April 3, 2013 
131 
The report, which is based on an anonymous survey of 
Cybersecurity 
Homeland Security  
nearly 23,000 cyber workers across 52 departments and 
agencies, also found that while the majority (49%) of 
https://cio.gov/wp-
cyber feds have more than 10 years of service until they 
content/uploads/downloads/2013/04/ITWAC-Summary-
reach retirement eligibility, nearly 33% will be eligible to 
Report_04-01-2013.pdf 
retire in the next three years. 
National Initiative for Cybersecurity Careers and Studies 
U.S. Department of  February 21, 2013 
N/A 
NICCS is an online resource for cybersecurity career, 
(NICCS) 
Homeland Security  
education, and training information. It is a partnership 
between DHS, the National Institute of Standards and 
http://niccs.us-cert.gov/ 
Technology, the Office of the Director of National 
Intelligence, the Department of Defense, the Department 
of Education, the National Science Foundation, and the 
Office of Personnel Management. 
Michigan Cyber Range 
Partnership 
November 12, 2012 
N/A 
Enables individuals and organizations to develop 
between the state 
detection and reaction skills through simulations and 
http://www.merit.edu/cyberrange/ 
of Michigan, Merit 
exercises. 
Network, federal 
and local 
governments, 
colleges and 
universities, and 
the private sector 
CyberSkills Task Force Report   
U.S. Department of  October 1, 2012 
41 
DHS’s Task Force on CyberSkills proposes far-reaching 
Homeland Security  
improvements to enable DHS to recruit and retain the 
https://www.hsdl.org/hslog/?q=node/7934 
cybersecurity talent it needs. 
CRS-83 
 
Title Source 
Date 
Pages 
Notes 
Cyber Security Test Bed: Summary and Evaluation Results 
Institute for 
October 2012 
89 
The Cyber Test Bed project was a case study analysis of 
Homeland Security 
how a set of interventions, including threat analysis, best 
http://sites.duke.edu/ihss/files/2011/12/Cyber-Security-
Solutions 
practices sharing, and executive and staff training events, 
Test-Bed_Final-Report_Rowe.pdf 
over the course of one year, would impact a group of 
nine small and mid-size businesses in North Carolina. 
Pre- and post-Test Bed interviews were conducted with 
company officials to establish a baseline and evaluate the 
impact of the Test Bed experience. After the Cyber Test 
Bed experience, decision makers at these companies 
indicated an increase in their perceptions of the risk of 
cyber attacks and an increase in their knowledge of 
possible solution. 
Information Assurance Scholarship Program   
U.S Navy 
August 28, 2012 
N/A 
The Information Assurance Scholarship Program is 
designed to increase the number of qualified personnel 
http://www.doncio.navy.mil/ContentView.aspx?id=535 
entering the information assurance and information 
technology fields within the department, Defense officials 
said last week. The scholarships also are an attempt to 
effectively retain military and civilian cybersecurity and IT 
personnel. 
Smart Grid Cybersecurity: Job Performance Model Report 
Pacific Northwest 
August 1, 2012 
178 
This report outlines the work done to develop a smart 
National 
grid cybersecurity certification. The primary purpose is to 
http://www.pnl.gov/main/publications/external/
Laboratory 
develop a measurement model that may be used to guide 
technical_reports/PNNL-21639.pdf 
curriculum, assessments, and other development of 
technical and operational smart grid cybersecurity 
knowledge, skills, and abilities. 
National Centers of Academic Excellence (CAE) in Cyber 
National Security 
May 29, 2012 
N/A 
The NSA has launched National Centers of Academic 
Operations Program  
Agency (NSA) 
Excellence (CAE) in Cyber Operations Program; the 
program is intended to be a deeply technical, inter-
http://www.nsa.gov/academia/nat_cae_cyber_ops/
disciplinary, higher education program grounded in the 
index.shtml 
computer science (CS), computer engineering (CE), or 
electrical engineering (EE) disciplines, with extensive 
opportunities for hands-on applications via labs and 
exercises. 
CRS-84 
 
Title Source 
Date 
Pages 
Notes 
Cybersecurity Human Capital: Initiatives Need Better 
Government 
November 29, 2011 
86 
To ensure that government-wide cybersecurity 
Planning and Coordination 
Accountability 
workforce initiatives are better coordinated and planned, 
Office (GAO) 
and to better assist federal agencies in defining roles, 
http://www.gao.gov/products/GAO-12-8 
responsibilities, skills, and competencies for their 
workforce, the Secretary of Commerce, Director of the 
Office of Management and Budget, Director of the Office 
of Personnel Management, and Secretary of Homeland 
Security should col aborate through the NICE initiative to 
develop and finalize detailed plans allowing agency 
accountability, measurement of progress, and 
determination of resources to accomplish agreed-upon 
activities. 
NICE Cybersecurity Workforce Framework 
National Initiative 
November 21, 2011 
35 
The adoption of cloud computing into the federal 
for Cybersecurity 
government and its implementation depend upon a 
http://www.nist.gov/manuscript-publication-search.cfm?
Education (NICE) 
variety of technical and non-technical factors. A 
pub_id=909505 
fundamental reference point, based on the NIST 
definition of cloud computing, is needed to describe an 
overall framework that can be used government-wide. 
This document presents the NIST Cloud Computing 
Reference Architecture (RA) and Taxonomy (Tax) that 
will accurately communicate the components and 
offerings of cloud computing. 
2011 State of Cyberethics, Cybersafety and Cybersecurity 
National Cyber 
May 13, 2011 
16 
This year’s survey further explores the perceptions and 
Curriculum in the U.S. Survey 
Security Alliance 
practices of U.S. teachers, school administrators and 
and Microsoft 
technology coordinators in regards to cyberethics, 
http://www.staysafeonline.org/sites/default/files/
cybersafety, and cybersecurity education. This year's 
resource_documents/2011%20National%20K-
survey finds that young people still are not receiving 
12%20Study%20Final_0.pdf 
adequate training and that teachers are ill-prepared to 
teach the subjects due, in large part, to lack of 
professional development. 
CRS-85 
 
Title Source 
Date 
Pages 
Notes 
Cyber Operations Personnel Report (DOD) 
Department of 
April 2011 
84 
This report is focused on FY09 Department of Defense 
Defense 
Cyber Operations personnel, with duties and 
http://www.nsci-va.org/CyberReferenceLib/2011-04-
responsibilities as defined in Section 934 of the Fiscal 
Cyber%20Ops%20Personnel.pdf  
Year (FY) 2010 National Defense Authorization Act 
(NDAA). 
 Appendix A—Cyber Operations-related Military 
Occupations  
Appendix B—Commercial Certifications Supporting the 
DoD Information Assurance Workforce Improvement 
Program  
Appendix C—Military Services Training and 
Development  
Appendix D—Geographic Location of National Centers 
of Academic Excellence in Information Assurance 
Design of the DETER Security Testbed 
University of 
January 13, 2011 
N/A 
The Department of Homeland Security (DHS) will invest 
Southern California 
$16 million over the next five years to expand a 
http://www.isi.edu/deter/news/news.php?story=20 
(USC) Information 
cybersecurity testbed at the University of Southern 
Sciences Institute, 
California (USC). The Deterlab testbed provides an 
University of 
isolated 400-node mini-Internet, in which researchers can 
California Berkeley 
investigate malware and other security threats without 
(UCB), McAfee 
danger of infecting the real Internet. It also supports 
Research 
classroom exercises in computer security for nearly 400 
students at 10 universities and col eges. 
The Power of People: Building an Integrated National 
Project on National  November 2010 
326 
This study was conducted in fulfillment of Section 1054 of 
Security Professional System for the 21st Century 
Security Reform 
the National Defense Authorization Act for Fiscal Year 2010, 
(PNSR) 
which required the commissioning of a study by “an 
http://www.pnsr.org/data/images/
appropriate independent, nonprofit organization, of a 
pnsr_the_power_of_people_report.pdf 
system for career development and management of 
interagency national security professionals.” 
Note: Highlights compiled by CRS from the reports. 
CRS-86 
 
Table 30. Selected Reports: Research & Development (R&D) 
Title Source 
Date 
Pages 
Notes 
Open Trusted Technology Provider Standard (O-TTPS)™, 
The Open 
April 18, 2013 
44 
Specifically intended to prevent maliciously tainted and 
Version 1.0: Mitigating Maliciously Tainted and Counterfeit 
Group 
counterfeit products from entering the supply chain, 
Products 
this first release of the O-TTPS codifies best practices 
across the entire COTS ICT product lifecycle, including 
https://www2.opengroup.org/ogsys/catalog/C139 
the design, sourcing, build, fulfillment, distribution, 
sustainment, and disposal phases. The O-TTPS wil  
enable organizations to implement best practice 
requirements and allow all providers, component 
suppliers, and integrators to obtain Trusted 
Technology Provider status. (Registration required). 
Governor McDonnel  Announces Creation of MACH37, 
Virginia 
April 11, 2013 
N/A 
Virginia Governor Bob McDonnell announced the 
America's Premier Market-Centric Cyber Security Accelerator 
Secretary of 
creation of MACH37, America's premier market-
Commerce 
centric cyber security accelerator to be located at the 
http://www.commerce.virginia.gov/News/viewRelease.cfm?id=1761  and Trade 
Center for Innovative Technology. Initially funded by 
the Commonwealth of Virginia, the accelerator will 
leverage private investments to launch new, high 
growth cyber technology companies in Virginia. 
The International Cyber-Security Ecosystem (video lecture) 
Anthony M. 
November 6, 2012 
N/A 
Overview of the various forums/communities and 
Rutkowski, 
methodologies that comprise the security assurance 
http://smartech.gatech.edu/handle/1853/45450 
Distinguished 
ecosystem—often also referred to as the Information 
Senior 
Assurance. 
Research 
Fellow at the 
Georgia 
Institute of 
Technology, 
Nunn School 
Center for 
International 
Strategy 
Technology 
and Policy 
(CISTP) 
CRS-87 
 
Title Source 
Date 
Pages 
Notes 
20 Critical Security Controls for Effective Cyber Defense: 
Center for 
November 2012 
89 
The Top 20 security controls were agreed upon by a 
Consensus Audit Guidelines - version 4.0 
Strategic & 
consortium. Members of the Consortium include NSA, 
International 
US CERT, DoD JTF-GNO, the Department of Energy 
http://www.sans.org/critical-security-controls/ 
Studies 
Nuclear Laboratories, Department of State, DoD 
Cyber Crime Center plus commercial forensics 
experts in the banking and critical infrastructure 
communities. 
National Cybersecurity Center of Excel ence  
National 
June 29, 2012 
N/A 
The National Cybersecurity Center of Excel ence 
Institute of 
(NCCoE) is a new public-private collaboration to bring 
http://csrc.nist.gov/nccoe/ 
Standards and 
together experts from industry, government and 
Technology 
academia to design, implement, test, and demonstrate 
(NIST) 
integrated cybersecurity solutions and promote their 
widespread adoption. 
Information Security Risk Taking 
National 
January 17, 2012 
N/A 
The NSF is funding research on giving organizations 
Science 
information-security risk ratings, similar to credit 
http://www.nsf.gov/awardsearch/showAward.do?AwardNumber=
Foundation 
ratings for individuals. 
1127185 
(NSF) 
Anomaly Detection at Multiple Scales (ADAMS) 
Defense 
November 9, 2011 
74 
The design document was produced by Allure Security 
Advanced 
and sponsored by the Defense Advanced Research 
http://info.publicintelligence.net/DARPA-ADAMS.pdf 
Research 
Projects Agency (DARPA). It describes a system for 
Projects 
preventing leaks by seeding believable disinformation in 
Agency 
military information systems to help identify individuals 
(DARPA) 
attempting to access and disseminate classified 
information. 
At the Forefront of Cyber Security Research 
NSF 
August 11, 2011 
N/A 
TRUST is a university and industry consortium that 
examines cyber security issues related to health care, 
http://www.livescience.com/15423-forefront-cyber-security-
national infrastructures, law and other issues facing the 
research-nsf-bts.html 
general public. 
Designing A Digital Future: Federally Funded Research And 
White House 
December 16, 
148 
The President’s Council of Advisors on Science and 
Development In Networking And Information Technology 
2010 
Technology (PCAST) has made several 
recommendations in a report about the state of the 
http://www.whitehouse.gov/sites/default/files/microsites/ostp/
government’s Networking and Information Technology 
pcast-nitrd-report-2010.pdf 
Research and Development (NITRD) Program. 
CRS-88 
 
Title Source 
Date 
Pages 
Notes 
Partnership for Cybersecurity Innovation 
White House 
December 6, 2010 
10 
The Obama Administration released a Memorandum of 
Office of 
Understanding signed by the National Institute of 
http://www.whitehouse.gov/blog/2010/12/06/partnership-
Science and 
Standards and Technology (NIST) of the Department 
cybersecurity-innovation 
Technology 
of Commerce, the Science and Technology Directorate 
Policy 
of the Department of Homeland Security (DHS/S&T), 
and the Financial Services Sector Coordinating Council 
(FSSCC). The goal of the agreement is to speed the 
commercialization of cybersecurity research 
innovations that support our nation’s critical 
infrastructures. 
Science of Cyber-Security 
Mitre Corp 
November 2010 
86 
JASON was requested by DOD to examine the theory 
(JASON 
and practice of cyber-security, and evaluate whether 
http://www.fas.org/irp/agency/dod/jason/cyber.pdf 
Program 
there are underlying fundamental principles that would 
Office) 
make it possible to adopt a more scientific approach, 
identify what is needed in creating a science of cyber-
security, and recommend specific ways in which 
scientific methods can be applied. 
American Security Challenge 
National 
October 18, 2010 
N/A 
The objective of the Challenge is to increase the 
Security 
visibility of innovative technology and help the 
http://www.americansecuritychallenge.com/ 
Initiative 
commercialization process so that such technology can 
reach either the public or commercial marketplace 
faster to protect our citizens and critical assets. 
Note: Highlights compiled by CRS from the reports. 
CRS-89 
 
Related Resources: Other Websites 
This section contains other cybersecurity resources, including U.S. government, international, news sources, and other associations and 
institutions. 
Table 31. Related Resources: Congressional/Government  
Name Source 
Notes 
Integrated Intelligence Center 
Center for Internet Security 
A new unit at the Center for Internet Security is focused on 
merging cyber and physical security to aid governments in 
http://www.cisecurity.org/# 
dealing with emerging threats. 
Computer Security Resource Center 
National Institute of Standards and 
Links to NIST resources, publications, and computer security 
Technology (NIST) 
groups. 
http://csrc.nist.gov/ 
Congressional Cybersecurity Caucus 
Led by Representatives Jim Langevin 
Provides statistics, news on congressional cyberspace actions, 
and Mike McCaul. 
and links to other informational websites. 
 http://cybercaucus.langevin.house.gov/  
Cybersecurity and Trustworthiness Projects and Reports 
Computer Science and 
A list of independent and informed reports on cybersecurity 
Telecommunications Board, National 
and public policy. 
http://sites.nationalacademies.org/CSTB/CSTB_059144 
Academy of Sciences 
Cybersecurity 
White House National Security 
Links to White House policy statements, key documents, 
Council  
videos, and blog posts. 
http://www.whitehouse.gov/cybersecurity 
Cybersecurity 
National Telecommunications & 
The Department of Commerce's Internet Policy Task Force 
Information Administration (U.S. 
is conducting a comprehensive review of the nexus between 
http://www.ntia.doc.gov/category/cybersecurity 
Department of Commerce) 
cybersecurity challenges in the commercial sector and 
innovation in the Internet economy. 
Cybersecurity and Information System Trustworthiness 
National Academy of Sciences, 
A list of independent and informed reports on cybersecurity 
Computer Science and 
and public policy. 
http://sites.nationalacademies.org/CSTB/CSTB_045327#Cybersecurity  Telecommunications Board 
CRS-90 
 
Name Source 
Notes 
Office of Cybersecurity and Communications (CS&C) 
U.S. Department of Homeland 
As the sector-specific agency for the communications and IT 
Security 
sectors, CS&C coordinates national level reporting that is 
http://www.dhs.gov/xabout/structure/gc_1185202475883.shtm 
consistent with the National Response Framework (NRF). 
U.S. Cyber Command 
U.S. Department of Defense 
Links to press releases, fact sheets, speeches, 
announcements, and videos. 
http://www.defense.gov/home/features/2010/0410_cybersec/ 
U.S. Cyber-Consequences Unit 
U.S. Cyber-Consequences Unit (U.S.-
U.S.-CCU, a nonprofit 501c(3) research institute, provides 
CCU) 
assessments of the strategic and economic consequences of 
http://www.usccu.us/ 
possible cyber-attacks and cyber-assisted physical attacks. It 
also investigates the likelihood of such attacks and examines 
the cost-effectiveness of possible counter-measures. 
Note: Highlights compiled by CRS from the reports. 
CRS-91 
 
Table 32. Related Resources: International Organizations 
Name Source  Notes 
Australian Internet Security Initiative 
Australian Communications and Media 
The Australian Internet Security Initiative (AISI) is an antibotnet 
Authority 
initiative that collects data on botnets in collaboration with Internet 
http://www.acma.gov.au/WEB/STANDARD/pc=PC_310317 
Service Providers (ISPs), and two industry codes of practice. 
Cybercrime 
Council of Europe 
Links to the Convention on Cybercrime treaty, standards, news, 
and related information. 
http://www.coe.int/t/DGHL/cooperation/economiccrime/
cybercrime/default_en.asp 
Cybersecurity Gateway 
International Telecommunications 
ITU’s Global Cybersecurity Agenda (GCA) is the framework for 
Union (ITU) 
international cooperation with the objective of building synergies 
http://groups.itu.int/Default.aspx?alias=groups.itu.int/
and engaging all relevant stakeholders in our collective efforts to 
cybersecurity-gateway 
build a more secure and safer information society for all. 
Cybercrime Legislation - Country Profiles 
Council of Europe 
These profiles have been prepared within the framework of the 
Council of Europe’s Project on Cybercrime in view of sharing 
http://www.coe.int/t/dg1/legalcooperation/economiccrime/
information on cybercrime legislation and assessing the current 
cybercrime/Documents/CountryProfiles/default_en.asp 
state of implementation of the Convention on Cybercrime under 
national legislation. 
ENISA: Securing Europe’s Information Society 
European Network and Information 
ENISA inform businesses and citizens in the European Union on 
Security Agency (ENISA) 
cybersecurity threats, vulnerabilities, and attacks. (Requires free 
http://www.enisa.europa.eu/ 
registration to access.) 
German Anti-Botnet Initiative 
Organisation for Economic Co-
This is a private industry initiative which aims to ensure that 
operation and Development (OECD) 
customers whose personal computers have become part of a 
http://www.oecd.org/dataoecd/42/50/45509383.pdf 
(English-language summary) 
botnet without them being aware of it are informed by their 
Internet Service Providers about this situation and at the same time 
are given competent support in removing the malware. 
International Cyber Security Protection Alliance (ICSPA) 
International Cyber Security 
A global not-for-profit organization that aims to channel funding, 
Protection Alliance (ICSPA) 
expertise, and help directly to law enforcement cyber crime units 
https://www.icspa.org/about-us/ 
around the world. 
NATO Cooperative Cyber Defence Centre of Excel ence 
North Atlantic Treaty Organization 
The Center is an international effort that currently includes Estonia, 
(CCD COE) 
(NATO) 
Latvia, Lithuania, Germany, Hungary, Italy, the Slovak Republic, and 
Spain as sponsoring nations, to enhance NATO’s cyber defence 
http://www.ccdcoe.org/ 
capability. 
Note: Highlights compiled by CRS from the reports. 
 
CRS-92 
Cybersecurity: Authoritative Reports and Resources 
 
Table 33. Related Resources: News  
Name Source 
Computer Security (Cybersecurity) 
New York Times 
http://topics.nytimes.com/top/reference/timestopics/subjects/c/
computer_security/index.html 
Cybersecurity 
NextGov.com 
http://www.nextgov.com/cybersecurity/?oref=ng-nav 
Cyberwarfare and Cybersecurity 
Benton Foundation 
http://benton.org/taxonomy/term/1193 
Homeland Security 
Congressional Quarterly (CQ) 
http://homeland.cq.com/hs/news.do 
Cybersecurity 
Homeland Security News Wire 
http://www.homelandsecuritynewswire.com/topics/cybersecurity 
Congressional Research Service 
93 
Cybersecurity: Authoritative Reports and Resources 
 
Table 34. Related Resources: Other Associations and Institutions 
Name Notes 
Cyber Aces Foundation 
Offers challenging and realistic cybersecurity competitions, 
training camps, and educational initiatives through which 
http://www.cyberaces.org/ 
high school, col ege students, and young professionals 
develop the practical skills needed to excel as cybersecurity 
practitioners 
Cybersecurity from the Center for Strategic & 
Links to experts, programs, publications, and multimedia. 
International Studies (CSIS) 
CSIS is a bipartisan, nonprofit organization whose affiliated 
scholars conduct research and analysis and develop policy 
http://csis.org/category/topics/technology/
initiatives that look to the future and anticipate change. 
cybersecurity 
Cyberconflict and Cybersecurity Initiative from the 
Focuses on the relationship between cyberwar and the 
Council on Foreign Relations 
existing laws of war and conflict; how the United States 
should engage other states and international actors in 
http://www.cfr.org/projects/world/cyberconflict-and-
pursuit of its interests in cyberspace; how the promotion of 
cybersecurity-initiative/pr1497 
the free flow of information interacts with the pursuit of 
cybersecurity; and the private sector’s role in defense, 
deterrence, and resilience. 
Federal Cyber Service from the Scholarship For 
Scholarship For Service (SFS) is designed to increase and 
Service (SFS) 
strengthen the cadre of federal information assurance 
professionals that protect the government’s critical 
https://www.sfs.opm.gov/ 
information infrastructure. This program provides 
scholarships that ful y fund the typical costs that students 
pay for books, tuition, and room and board while attending 
an approved institution of higher learning. 
Institute for Information Infrastructure Protection 
I3P is a consortium of leading universities, national 
(I3P) 
laboratories and nonprofit institutions dedicated to 
strengthening the cyber infrastructure of the United States. 
http://www.thei3p.org/ 
Internet Security Alliance (ISA) 
ISAalliance is a nonprofit collaboration between the 
Electronic Industries Alliance (EIA), a federation of trade 
http://www.isalliance.org/ 
associations, and Carnegie Mellon University’s CyLab. 
National Association of State Chief Information 
NASCIO’s cybersecurity awareness website. The Resource 
Offices (NASCIO) 
Guide provides examples of state awareness programs and 
initiatives. 
http://www.nascio.org/advocacy/cybersecurity 
National Board of Information Security Examiners 
The National Board of Information Security Examiners 
(NBISE) 
(NBISE) mission is to increase the security of information 
networks, computing systems, and industrial and military 
http://www.nbise.org/certifications.php 
technology by improving the potential and performance of 
the cyber security workforce. 
National Initiative for Cybersecurity Education (NICE)  NICE Attempts to forge a common set of definitions for the 
cybersecurity workforce. 
http://csrc.nist.gov/nice/ 
National Security Cyberspace Institute (NSCI) 
NSCI provides education, research and analysis services to 
government, industry, and academic clients aiming to 
http://www.nsci-va.org/whitepapers.htm 
increase cyberspace awareness, interest, knowledge, and/or 
capabilities. 
U.S. Cyber Challenge (USCC) 
USCC’s goal is to find 10,000 of America's best and 
brightest to fill the ranks of cybersecurity professionals 
http://www.uscyberchal enge.org/ 
where their skills can be of the greatest value to the nation.  
Source: Highlights compiled by CRS from the reports of related associations and institutions. 
Congressional Research Service 
94 
Cybersecurity: Authoritative Reports and Resources 
 
 
Author Contact Information 
 
Rita Tehan 
   
Information Research Specialist 
rtehan@crs.loc.gov, 7-6739 
 
 
Key Policy Staff 
The following table provides names and contact information for CRS experts on policy issues related to 
cybersecurity bills currently being debated in the 112th Congress.  
 
Legislative Issues 
Name/Title 
Phone 
E-mail 
Legislation in the 112th Congress 
Eric A. Fischer 
7-7071 
efischer@crs.loc.gov 
Critical infrastructure protection  
John D. Moteff 
7-1435 
jmoteff@crs.loc.gov 
Chemical industry 
Dana Shea 
7-6844 
dshea@crs.loc.gov 
Defense industrial base 
Catherine A. Theohary 
7-0844 
ctheohary@crs.loc.gov 
Electricity grid  
Richard J. Campbell 
7-7905 
rcampbell@crs.loc.gov 
Financial institutions 
N. Eric Weiss 
7-6209 
eweiss@crs.loc.gov 
Industrial control systems 
Dana Shea 
7-6844 
dshea@crs.loc.gov 
Cybercrime 
 
 
 
Federal laws 
Charles Doyle 
7-6968 
cdoyle@crs.loc.gov 
Law enforcement 
Kristin M. Finklea 
7-6259 
kfinklea@crs.loc.gov 
Cybersecurity workforce 
Wendy Ginsberg 
7-3933 
wginsberg@crs.loc.gov, 
Cyberterrorism 
Catherine A. Theohary 
7-0844 
ctheohary@crs.loc.gov 
Cyberwar 
Catherine A. Theohary 
7-0844 
ctheohary@crs.loc.gov 
Data breach notification 
Gina Stevens 
7-2581 
gstevens@crs.loc.gov 
Economic issues 
N. Eric Weiss 
7-6209 
eweiss@crs.loc.gov 
Espionage 
 
 
 
Advanced persistent threat 
Catherine A. Theohary 
7-0844 
ctheohary@crs.loc.gov 
Economic and industrial 
Kristin M. Finklea 
7-6259 
kfinklea@crs.loc.gov 
Legal issues 
Brian T. Yeh 
7-5182 
byeh@crs.loc.gov 
State-sponsored 
Catherine A. Theohary 
7-0844 
ctheohary@crs.loc.gov 
Federal agency roles 
Eric A. Fischer 
7-7071 
efischer@crs.loc.gov 
Chief Information Officers (CIOs) 
Patricia Maloney Figliola 
7-2508 
pfigliola@crs.loc.gov 
Commerce 
John F. Sargent, Jr. 
7-9147 
jsargent@crs.loc.gov 
Defense (DOD) 
Catherine A. Theohary 
7-0844 
ctheohary@crs.loc.gov 
Congressional Research Service 
95 
Cybersecurity: Authoritative Reports and Resources 
 
Legislative Issues 
Name/Title 
Phone 
E-mail 
Executive Office of the President (EOP) 
John D. Moteff 
7-1435 
jmoteff@crs.loc.gov 
Homeland Security (DHS) 
John D. Moteff 
7-1435 
jmoteff@crs.loc.gov 
Intelligence Community (IC) 
John Rollins 
7-5529 
jrollins@crs.loc.gov 
Justice (DOJ) 
Kristin M. Finklea 
7-6259 
kfinklea@crs.loc.gov 
National Security Agency (NSA) 
Catherine A. Theohary 
7-0844 
ctheohary@crs.loc.gov 
Science agencies (NIST, NSF, OSTP) 
Eric A. Fischer 
7-7071 
efischer@crs.loc.gov 
Treasury and financial agencies 
Rena S. Miller 
7-0826 
rsmiller@crs.loc.gov 
Federal Information Security 
John D. Moteff 
7-1435 
jmoteff@crs.loc.gov 
Management Act (FISMA) 
Federal Internet monitoring 
Richard M. Thompson II  
7-8449 
rthompson@crs.loc.gov 
Hacktivism 
Kristin M. Finklea 
7-6259 
kfinklea@crs.loc.gov 
Information sharing 
Eric A. Fischer 
7-7071 
efischer@crs.loc.gov 
Antitrust laws 
Kathleen Ann Ruane  
7-9135 
kruane@crs.loc.gov 
Civil liability 
Edward C. Liu  
7-9166 
eliu@crs.loc.gov 
Classified information 
John Rollins 
7-5529 
jrollins@crs.loc.gov 
Freedom of Information Act (FOIA) 
Gina Stevens 
7-2581 
gstevens@crs.loc.gov 
Privacy and civil liberties  
Gina Stevens 
7-2581 
gstevens@crs.loc.gov 
International cooperation 
 
 
 
Defense and diplomatic 
Catherine A. Theohary 
7-0844 
ctheohary@crs.loc.gov 
Law enforcement 
Kristin M. Finklea 
7-6259 
kfinklea@crs.loc.gov 
National strategy and policy 
Eric A. Fischer 
7-7071 
efischer@crs.loc.gov 
National security 
John Rollins 
7-5529 
jrollins@crs.loc.gov 
Public/private partnerships 
Eric A. Fischer 
7-7071 
efischer@crs.loc.gov 
Supply chain 
Eric A. Fischer 
7-7071 
efischer@crs.loc.gov 
Technological issues 
Eric A. Fischer 
7-7071 
efischer@crs.loc.gov 
Botnets 
Eric A. Fischer 
7-7071 
efischer@crs.loc.gov 
Cloud computing 
Patricia Maloney Figliola 
7-2508 
pfigliola@crs.loc.gov 
Mobile devices 
Patricia Maloney Figliola 
7-2508 
pfigliola@crs.loc.gov 
Research and development (R&D)  
Patricia Maloney Figliola 
7-2508 
pfigliola@crs.loc.gov 
 
 
Congressional Research Service 
96