This is the accessible text file for GAO report number GAO-08-212T 
entitled 'Internet Infrastructure: Challenges in Developing a 
Public/Private Recovery Plan' which was released on October 23, 2007. 

This text file was formatted by the U.S. Government Accountability 
Office (GAO) to be accessible to users with visual impairments, as part 
of a longer term project to improve GAO products' accessibility. Every 
attempt has been made to maintain the structural and data integrity of 
the original printed product. Accessibility features, such as text 
descriptions of tables, consecutively numbered footnotes placed at the 
end of the file, and the text of agency comment letters, are provided 
but may not exactly duplicate the presentation or format of the printed 
version. The portable document format (PDF) file is an exact electronic 
replica of the printed version. We welcome your feedback. Please E-mail 
your comments regarding the contents or accessibility features of this 
document to Webmaster@gao.gov. 

This is a work of the U.S. government and is not subject to copyright 
protection in the United States. It may be reproduced and distributed 
in its entirety without further permission from GAO. Because this work 
may contain copyrighted images or other material, permission from the 
copyright holder may be necessary if you wish to reproduce this 
material separately. 

Testimony: 

Before the Subcommittee on Information Policy, Census, and National 
Archives, House of Committee on Oversight and Government Reform: 

United States Government Accountability Office: 

GAO: 

For Release on Delivery Expected at 2:00 p.m. EDT: 

Tuesday, October 23, 2007: 

Internet Infrastructure: 

Challenges in Developing a Public/Private Recovery Plan: 

Statement of Gregory C. Wilshusen Director, Information Security 
Issues: 

GAO-08-212T: 

GAO Highlights: 

Highlights of GAO-08-212T, a testimony before the Subcommittee on 
Information Policy, Census, and National Archives, House Committee on 
Oversight and Government Reform. 

Why GAO Did This Study: 

Since the early 1990s, growth in the use of the Internet has 
revolutionized the way that our nation communicates and conducts 
business. While the Internet originated as a U.S. government-sponsored 
research project, the vast majority of its infrastructure is currently 
owned and operated by the private sector. Federal policy recognizes the 
need to prepare for debilitating Internet disruptions and tasks the 
Department of Homeland Security (DHS) with developing an integrated 
public/private plan for Internet recovery. 

GAO was asked to summarize its report on plans for recovering the 
Internet in case of a major disruption (GAO-06-672) and to provide an 
update on DHS’s efforts to implement that report’s recommendations. The 
report (1) identifies examples of major disruptions to the Internet, 
(2) identifies the primary laws and regulations governing recovery of 
the Internet in the event of a major disruption, (3) evaluates DHS 
plans for facilitating recovery from Internet disruptions, and (4) 
assesses challenges to such efforts. 

What GAO Found: 

A major disruption to the Internet could be caused by a physical 
incident (such as a natural disaster or an attack that affects key 
facilities), a cyber incident (such as a software malfunction or a 
malicious virus), or a combination of both physical and cyber 
incidents. Recent physical and cyber incidents, such as Hurricane 
Katrina, have caused localized or regional disruptions but have not 
caused a catastrophic Internet failure. 

Federal laws and regulations that address critical infrastructure 
protection, disaster recovery, and the telecommunications 
infrastructure provide broad guidance that applies to the Internet, but 
it is not clear how useful these authorities would be in helping to 
recover from a major Internet disruption. Specifically, key legislation 
on critical infrastructure protection does not address roles and 
responsibilities in the event of an Internet disruption. Other laws and 
regulations governing disaster response and emergency communications 
have never been used for Internet recovery. 

As of 2006, DHS had begun a variety of initiatives to fulfill its 
responsibility to develop an integrated public/private plan for 
Internet recovery, but these efforts were not yet comprehensive or 
complete. For example, the department had developed high-level plans 
for infrastructure protection and incident response, but the components 
of these plans that address the Internet infrastructure were not 
complete. As a result, the risk remained that the government was not 
adequately prepared to effectively coordinate public/private plans for 
recovering from a major Internet disruption. 

Key challenges to establishing a plan for recovering from Internet 
disruptions include (1) innate characteristics of the Internet that 
make planning for and responding to disruptions difficult, (2) lack of 
consensus on DHS’s role and when the department should get involved in 
responding to a disruption, (3) legal issues affecting DHS’s ability to 
provide assistance to restore Internet service, (4) reluctance of many 
in the private sector to share information on Internet disruptions with 
DHS, and (5) leadership and organizational uncertainties within DHS. 
Until these challenges are addressed, DHS will have difficulty 
achieving results in its role as a focal point for helping the Internet 
to recover from a major disruption. 

DHS has made progress in implementing GAO’s recommendations by revising 
key plans in coordination with private industry infrastructure 
stakeholders, coordinating various Internet recovery-related 
activities, and addressing key challenges to Internet recovery 
planning. However, further work remains to complete these activities, 
including finalizing recovery plans and defining the interdependencies 
among DHS’s various working groups and initiatives. Full implementation 
of these recommendations should enhance the nation’s ability to recover 
from a major Internet disruption. 

What GAO Recommends: 

In its report, GAO made recommendations to DHS to strengthen its 
ability to help recover from Internet disruptions. In written comments, 
DHS agreed with these recommendations. 

To view the full product, including the scope and methodology, click on 
[hyperlink, http://www/GAO-08-212T]. For more information, contact 
Gregory C. Wilshusen, 202-512-6244, wilshuseng@gao.gov. 

[End of section] 

Mr. Chairman and Members of the Subcommittee: 

Thank you for the opportunity to discuss public/private recovery plans 
for the Internet infrastructure. Since the early 1990s, the world 
community has come to rely on the Internet as a critical infrastructure 
supporting commerce, education, and communication. While the benefits 
of this technology have been enormous, this widespread 
interconnectivity poses significant risks to the computer systems of 
our government and our nation and, more importantly, to the critical 
operations and infrastructures they support. 

Federal regulation establishes the Department of Homeland Security 
(DHS) as the focal point for the security of cyber space--including 
recovery efforts for public and private critical infrastructure 
systems. Additionally, federal policy recognizes the need to be 
prepared for the possibility of debilitating Internet disruptions 
an[Footnote 1]d tasks DHS with developing an integrated public/private 
plan for Internet recovery.In June 2006, we issued a report's plans for 
facilitating recovery from Internet disruptions, and (4) assesses 
challenge[Footnote 2]s to such efforts. The report includes[Footnote 3] 
matters for congressional consideration and recommendations to DHS for 
improving Internet recovery efforts. 

As requested, this testimony summarizes our June 2006 report and 
provides an update of DHS's efforts to implement our recommendations. 
The report that this testimony was based on contains a detailed 
overview of our scope and methodology and was performed in accordance 
with generally accepted government auditing standards. 

Results in Brief: 

A major disruption to the Internet could be caused by a physical 
incident (such as a natural disaster or an attack that affects 
facilities and other assets), by a cyber incident (such as a software 
malfunction or a malicious virus), or by a combination of physical and 
cyber incidents. Recent physical and cyber incidents have caused 
localized or regional disruptions, highlighting the importance of 
recovery planning. For example, a 2002 root server attack highlighted 
the need to plan for increased server capacity at Internet exchange 
points in order to manage the high volumes of data traffic during an 
attack. However, recent incidents have also shown the Internet to be 
flexible and resilient. Even in severe circumstances, the Internet did 
not suffer a catastrophic failure. Nevertheless, it is possible that a 
complex attack or set of attacks could cause the Internet to fail. It 
is also possible that a series of attacks against the Internet could 
undermine users’ trust and thereby reduce the Internet’s utility. 

Several federal laws and regulations provide broad guidance that 
applies to the Internet, but it is not clear how useful these 
authorities would be in helping to recover from a major Internet 
disruption. Specifically, the Homeland Security Act of 2002 and 
Homeland Security Presidential Directive 7 provide guidance on 
protecting our nation's critical infrastructures. However, they do not 
specifically address roles and responsibilities in the event of an 
Internet disruption. The Defense Production Act and the Stafford Act 
provide authority to federal agencies to plan for and respond to 
incidents of national significance like disasters and terrorist 
attacks. However, the Defense Production Act has never been used for 
Internet recovery. In addition, the Stafford Act does not authorize the 
provision of resources to for- profit companies such as those that own 
and operate core Internet components. The Communications Act of 1934 
and National Communication System authorities govern the 
telecommunications infrastructure and help ensure communications during 
national emergencies, but they have never been used for Internet 
recovery, either. Thus, it is not clear how effective these laws and 
regulations would be in assisting Internet recovery. 

As of 2006, DHS had begun a variety of initiatives to fulfill its 
responsibility to develop an integrated public/private plan for 
Internet recovery, but these efforts were not yet comprehensive or 
complete. Specifically, the department had developed high-level plans 
for infrastructure protection and incident response, but the components 
of these plans that address the Internet infrastructure were not 
complete. In addition, DHS had started a variety of initiatives to 
improve the nations ability to recover from Internet disruptions, 
including working groups to facilitate coordination and exercises in 
which government and private industry practice responding to cyber 
events. However, progress on these initiatives was limited, and other 
initiatives lacked timeframes for completion. Also, the relationships 
among these initiatives were not evident. As a result, the risk 
remained that the government was not adequately prepared to effectively 
coordinate public/private plans for recovering from a major Internet 
disruption. 

Key challenges to establishing a plan for recovering from Internet 
disruption include (1) innate characteristics of the Internet (such as 
the diffuse control of the many networks that make up the Internet and 
the private-sector ownership of core components) that make planning for 
and responding to disruptions difficult, (2) lack of consensus on DHS’s 
role and when the department should get involved in responding to a 
disruption, (3) legal issues affecting DHS's ability to provide 
assistance to entities working to restore Internet service, (4) 
reluctance of many in the private sector to share information on 
Internet disruptions with DHS, and (5) leadership and organizational 
uncertainties within DHS. Until these challenges are addressed, DHS 
will have difficulty achieving results in its role as a focal point for 
helping to recover the Internet from a major disruption. 

Given the importance of the Internet infrastructure to our nation's 
communications and commerce, we suggested in our report that Congress 
consider clarifying the legal framework guiding Internet 
recovery.[Footnote 4] We also made recommendations to the Secretary of 
Homeland Security to strengthen the department’s ability to serve 
effectively as a focal point for helping to recover from Internet 
disruptions by establishing clear milestones for completing key plans, 
coordinating various Internet recovery-related activities, and 
addressing key challenges to Internet recovery planning. 

DHS agreed with our recommendations and has made progress in 
implementing them. Specifically, DHS has revised key plans in 
coordination with private industry infrastructure stakeholders, 
coordinated various Internet recovery-related activities, and worked to 
address key challenges in Internet recovery planning. However, further 
work remains to be done to complete these activities. For example, DHS 
has yet to complete recovery plans or to define the interdependencies 
among its various working groups and initiatives. Full implementation 
of these recommendations should enhance the nation’s ability to recover 
from a major Internet disruption. 

Background: 

The Internet is a vast network of interconnected networks that is used 
by governments, businesses, research institutions, and individuals 
around the world to communicate, engage in commerce, perform research, 
educate, and entertain. From its origins in the 1960s as a research 
project sponsored by the U.S. government, the Internet has grown 
increasingly important to both American and foreign businesses and 
consumers, serving as the medium for hundreds of billions of dollars of 
commerce each year. The Internet has also become an extended 
information and communications infrastructure, supporting vital 
services such as power distribution, health care, law enforcement, and 
national defense. Today, private industry—including telecommunications 
companies, cable companies, and Internet service providers—owns and 
operates the vast majority of the Internet's infrastructure. In recent 
years, cyber attacks involving malicious software or hacking have been 
increasing in frequency and complexity. Attacks against the Internet 
can come from a variety of sources, including criminal groups, hackers, 
and terrorists. 

Federal regulation recognizes the need to protect critical 
infrastructures such as the Internet. It directs federal departments 
and agencies to identify and prioritize critical infrastructure sectors 
and key resources and to protect them from terrorist attack. 
Furthermore, it recognizes that since a large portion of these critical 
infrastructures is owned and operated by the private sector, a public/ 
private partnership is crucial for the successful protection of these 
critical infrastructures. Federal policy also recognizes the need to be 
prepared for the possibility of debilitating disruptions in cyberspace 
and, because the vast majority of the Internet infrastructure is owned 
and operated by the private sector, tasks DHS with developing an 
integrated public/private plan for Internet recovery. In its plan for 
protecting critical infrastructures, DHS recognizes that the Internet 
is a key resource composed of assets within both the information 
technology and the telecommunications sectors.[Footnote 5] It notes 
that the Internet is used by all critical infrastructure sectors to 
varying degrees and provides information and communications to meet the 
needs of businesses and government. 

In the event of a major Internet disruption, multiple organizations 
could help recover Internet service. These organizations include 
private industry, collaborative groups, and government organizations. 
Private industry is central to Internet recovery because private 
companies own most of the Internet’s infrastructure and often have 
response plans. Collaborative groups—including working groups and 
industry councils--provide information-sharing mechanisms to allow 
private organizations to restore services. In addition, government 
initiatives could facilitate a response to major Internet disruptions. 

Federal policies and plans[Footnote 6] assign DHS with the lead 
responsibility for facilitating a public/private response to and 
recovery from major Internet disruptions. Within DHS, responsibilities 
reside in two divisions within the Office of the Under Secretary for 
National Protection and Program, Office of Cybersecurity and 
Communications: the National Cyber Security Division (NCSD) and the 
National Communications System (NCS). NCSD operates the U.S. Computer 
Emergency Readiness Team (US-CERT), which coordinates defense against 
and response to cyber attacks. The other division, NCS, provides 
programs and services that assure the resilience of the 
telecommunications infrastructure in times of crisis. Additionally, the 
Federal Communications Commission can support Internet recovery by 
coordinating resources for restoring the basic communications 
infrastructures over which Internet services run. For example, after 
Hurricane Katrina, the commission granted temporary authority for 
private companies to set up wireless Internet communications supporting 
various relief groups; federal, state, and local government agencies; 
businesses; and victims in the disaster areas. 

Prior evaluations of DHS's cyber security responsibilities have 
highlighted issues and challenges facing the department's efforts to 
fulfill its cyber security responsibilities.'s critical infrastructures 
and that much remained to be done.[Footnote 7] We noted that while DHS 
had initiated multiple efforts to fulfill its responsibilities, it had 
not fully addressed any of the 13 key cyber security responsibilities 
noted in federal law and policy. We also reported that DHS faced a 
number of challenges that have impeded its ability to fulfill its cyber 
responsibilities. These challenges included achieving organizational 
stability, gaining organizational authority, overcoming hiring and 
contracting issues, increasing awareness of cyber security roles and 
capabilities, establishing effective partnerships with stakeholders, 
achieving two-way information sharing with stakeholders, and 
demonstrating the value that DHS can provide. In that report, we also 
made recommendations to improve DHS’s ability to fulfill its mission as 
an effective focal point for cyber security, including recovery plans 
for key Internet functions. DHS agreed that strengthening cyber 
security is central to protecting the nation’s critical infrastructures 
and that much remained to be done. 

Although Cyber and Physical Incidents Have Caused Disruptions, the 
Internet Has Not Yet Suffered a Catastrophic Failure: 

The Internet’s infrastructure is vulnerable to disruptions in service 
due to terrorist and other malicious attacks, natural disasters, 
accidents, technological problems, or a combination of these things. 
Disruptions to Internet service can be caused by cyber and physical 
incidents--both intentional and unintentional. Over the last few years, 
physical and cyber incidents have caused localized or regional 
disruptions, highlighting the importance of recovery planning. However, 
these incidents have also shown the Internet as a whole to be flexible 
and resilient. Even in severe circumstances, the Internet has not yet 
suffered a catastrophic failure. 

To date, cyber attacks have caused various degrees of damage. For 
example, in 2001, the Code Red worm used a denial-of-service attack to 
affect millions of computer users by shutting down Web sites, slowing 
Internet service, and disrupting business and government operations. In 
2003, the Slammer worm caused network outages, canceled airline 
flights, and automated teller machine failures. Slammer resulted in 
temporary loss of Internet access to some users, and cost estimates on 
the impact of the worm range from $1.05 billion to $1.25 billion. The 
federal government coordinated with security companies and Internet 
service providers and released an advisory recommending that federal 
departments and agencies patch and block access to the affected 
channel. However, because the worm had propagated so quickly, most of 
these activities occurred after it had stopped spreading. 

In 2002 and again in 2007, coordinated denial-of-service attacks were 
launched against all of the root servers in the Domain Name System. In 
the 2002 attack, at least nine of the thirteen root servers experienced 
degradation of service, while in the 2007 attack, six of the thirteen 
root servers experienced degradation of service. However, average end 
users hardly noticed the attacks. The attacks were efficiently handled 
by the server operators and their service providers. The 2002 attack 
pointed to a need for increased capacity for servers at Internet 
exchange points to enable them to manage the high volumes of data 
traffic during an attack. The 2007 attack demonstrated that some of the 
improvements made since 2002 to improve the resilience of the Internet 
had worked. 

Like cyber incidents, physical incidents could affect various aspects 
of the Internet infrastructure, including underground or undersea 
cables and facilities that house telecommunications equipment, Internet 
exchange points, or Internet service providers. For example, on July 
18, 2001, a 60-car freight train derailed in a Baltimore tunnel, 
causing a fire that interrupted Internet and data services between 
Washington and New York. The tunnel housed fiber-optic cables serving 
seven of the biggest U.S. Internet service providers. The fire burned 
and severed fiber optic cables, causing backbone slowdowns for at least 
three major Internet service providers. Efforts to recover Internet 
service were handled by the affected Internet service providers; 
however, local and federal officials responded to the immediate 
physical issues of extinguishing the fire and maintaining safety in the 
surrounding area, and they worked with telecommunications companies to 
reroute affected cables. 

In another physical incident, Hurricane Katrina caused substantial 
destruction of the communications infrastructures in Louisiana, 
Mississippi, and Alabama, but it had minimal affect on the overall 
functioning of the Internet outside of the immediate area. According to 
an Internet monitoring service provider, while there was a loss of 
routing around the affected area, there was no significant impact on 
global Internet routing. According to the Federal Communications 
Commission, the storm caused outages for more than 3 million telephone 
customers, 38 emergency 9-1-1 call centers, hundreds of thousands of 
cable customers, and more than 1,000 cellular sites. However, a 
substantial number of the networks that experienced service disruptions 
recovered relatively quickly. 

Federal officials stated that the government took steps to respond to 
the hurricane, such as increasing analysis and watch services in the 
affected area, coordinating with communications companies to move 
personnel to safety, working with fuel and equipment providers, and 
rerouting communications traffic away from affected areas. However, 
private sector representatives stated that requests for assistance, 
such as food, water, fuel, and secure access to facilities were denied 
for legal reasons; the government made time-consuming and duplicative 
requests for information; and certain government actions impeded 
recovery efforts. 

Since its inception, the Internet has experienced disruptions of 
varying scale—including fast-spreading worms, denial-of-service 
attacks, and physical destruction of key infrastructure components—but 
the Internet has yet to experience a catastrophic failure. However, it 
is possible that a complex attack or set of attacks could cause the 
Internet to fail. It is also possible that a series of attacks against 
the Internet could undermine users’ trust and thereby reduce the 
Internet’s utility. 

Existing Laws and Regulations Apply to the Internet, but Numerous 
Uncertainties Exist in Using Them for Internet Recovery: 

Several federal laws and regulations provide broad guidance that 
applies to the Internet infrastructure, but it is not clear how useful 
these authorities would be in helping to recover from a major Internet 
disruption because some do not specifically address Internet recovery 
and others have seldom been used. Pertinent laws and regulations 
address critical infrastructure protection, federal disaster response, 
and the telecommunications infrastructure. 

Specifically, the Homeland Security Act of 2002[Footnote 8] and 
Homeland Security Presidential Directive 7[Footnote 9]establish 
critical infrastructure protection as a national goal and describe a 
strategy for cooperative efforts by the government and the private 
sector to protect the physical and cyber-based systems that are 
essential to the operations of the economy and the government. These 
authorities apply to the Internet because it is a core communications 
infrastructure supporting the information technology and 
telecommunications sectors; however, they do not specifically address 
roles and responsibilities in the event of an Internet disruption. 

Regarding federal disaster response, the Defense Production 
Act[Footnote 10]and the Stafford Act[Footnote 11]provide authority to 
federal agencies to plan for and respond to incidents of national 
significance like disasters and terrorist attacks. Specifically, the 
Defense Production Act authorizes the President to ensure the timely 
availability of products, materials, and services needed to meet the 
requirements of a national emergency. It is applicable to critical 
infrastructure protection and restoration but has never been used for 
Internet recovery. The Stafford Act authorizes federal assistance to 
states, local governments, nonprofit entities, and individuals in the 
event of a major disaster or emergency. However, the act does not 
authorize assistance to for-profit companies--such as those that own 
and operate core Internet components. 

Other legislation and regulations, including the Communications Act of 
1934[Footnote 12]and the NCS authorities,[Footnote 13] govern the 
telecommunications infrastructure and help to ensure communications 
during national emergencies. For example, the NCS authorities establish 
guidance for operationally coordinating with industry to protect and 
restore key national security and emergency preparedness communications 
services. These authorities grant the President certain emergency 
powers regarding telecommunications, including the authority to require 
any carrier subject to the Communications Act of 1934 to grant 
preference or priority to essential communications.[Footnote 14] and 
never for Internet recovery. Thus it is not clear how effective they 
would be if used for this purpose. 

In commenting on the statutory authority for Internet reconstitution 
following a disruption, DHS agreed that this authority is lacking and 
noted that the government’s roles and authorities related to assisting 
in Internet reconstitution following a disruption are not fully 
defined. 

DHS Initiatives Supporting Internet Recovery Planning Are Under Way, 
but Much Remains to Be Done and the Relationships Among the Initiatives 
Are Not Evident: 

As of our June 2006 report, DHS had begun a variety of initiatives to 
fulfill its responsibility to develop an integrated public/private plan 
for Internet recovery, but these efforts were not complete or 
comprehensive. Specifically, DHS had developed high-level plans, 
including the National Response Plan and the National Infrastructure 
Protection Plan, for infrastructure protection and national disaster 
response, but the components of these plans that address the Internet 
infrastructure were not complete. 

In addition, DHS had started a variety of initiatives to improve the 
nation's ability to recover from Internet disruptions, including 
establishing working groups to facilitate coordination, such as the 
National Cyber Response Coordination Group and Internet Disruption 
Working Group, and exercises in which government and private industry 
practice responding to cyber events. While these activities were 
promising, the responsibilities and plans for selected working groups 
had not yet been defined, and key exercises lacked effective mechanisms 
for incorporating lessons learned. In addition, the relationships among 
the initiatives were not evident. For example, the National Cyber 
Response Coordination Group, the Internet Disruption Working Group, and 
the North American Incident Response Group were all meeting to discuss 
ways to address Internet recovery, but the interdependencies among the 
groups had not been clearly established. As a result, the nation was 
not prepared to effectively coordinate public/private plans for 
recovering from a major Internet disruption. 

Multiple Challenges Exist to Planning for Recovery from Internet 
Disruptions: 

Although DHS has various initiatives to improve Internet recovery 
planning, there are key challenges in developing a public/private plan 
for Internet recovery, including (1) innate characteristics of the 
Internet that make planning for and responding to a disruption 
difficult, (2) lack of consensus on DHS’s role and on when the 
department should get involved in responding to a disruption, (3) legal 
issues affecting DHS's ability to provide assistance to restore 
Internet service, (4) reluctance of the private sector to share 
information on Internet disruptions with DHS, and (5) leadership and 
organizational uncertainties within DHS. Until these challenges are 
addressed, DHS will have difficulty achieving results in its role as a 
focal point for recovering the Internet from a major disruption. 

First, the Internet's diffuse structure, vulnerabilities in its basic 
protocols, and the lack of agreed-upon performance measures make 
planning for and responding to a disruption more difficult. The 
components of the Internet are not all governed by the same 
organization. In addition, the Internet is international. According to 
private-sector estimates, only about 20 percent of Internet users are 
in the United States's performance according to their own priorities. 

Second, there is no consensus about the role DHS should play in 
responding to a major Internet disruption or about the appropriate 
trigger for its involvement. The lack of clear legislative authority 
for Internet recovery efforts complicates the definition of this role. 
DHS officials acknowledged that their role in recovering from an 
Internet disruption needs further clarification because private 
industry owns and operates the vast majority of the Internet. 

Private sector officials representing telecommunication backbone 
providers and Internet service providers were also unclear about the 
types of assistance DHS could provide in responding to an incident and 
about the value of such assistance. There was no consensus on this 
issue. Many private-sector officials stated that the government does 
not have a direct recovery role, while others identified a variety of 
potential roles, including: 

* providing information on specific threats; 

* providing security and disaster relief support during a crisis; 

* funding backup communication infrastructures; 

* driving improved Internet security through requirements for the 
government's own procurement; 

* serving as a focal point with state and local governments to 
establish standard credentials to allow Internet and telecommunications 
companies access to areas that have been restricted or closed in a 
crisis; 

* providing logistical assistance, such as fuel, power, and security, 
to Internet infrastructure operators; 

* focusing on smaller-scale exercises targeted at specific Internet 
disruption issues; 

* limiting the initial focus for Internet recovery planning to key 
national security and emergency preparedness functions, such as public 
health and safety; and: 

* establishing a system for prioritizing the recovery of Internet 
service, similar to the existing Telecommunications Service Priority 
Program. 

A third challenge to planning for recovery is that there are key legal 
issues affecting DHS's ability to provide assistance to help restore 
Internet service. As noted earlier, key legislation and regulations 
guiding critical infrastructure protection, disaster recovery, and the 
telecommunications infrastructure do not provide specific authorities 
for Internet recovery. As a result, there is no clear legislative 
guidance on which organization would be responsible in the case of a 
major Internet disruption. In addition, the Stafford Act, which 
authorizes the government to provide federal assistance to states, 
local governments, nonprofit entities, and individuals in the event of 
a major disaster or emergency, does not authorize assistance to for- 
profit corporations. Several representatives of telecommunications 
companies reported that they had requested federal assistance from DHS 
during Hurricane Katrina. Specifically, they requested food, water, and 
security for the teams they were sending in to restore the 
communications infrastructure and fuel to power their generators. DHS 
responded that it could not fulfill these requests, noting that the 
Stafford Act did not extend to for-profit companies. 

A fourth challenge is that a large percentage of the nation’s critical 
infrastructure—including the Internet--is owned and operated by the 
private sector, meaning that public/ private partnerships are crucial 
for successful critical infrastructure protection. Although certain 
policies direct DHS to work with the private sector to ensure 
infrastructure protection, DHS does not have the authority to direct 
Internet owners and operators in their recovery efforts. Instead, it 
must rely on the private sector to share information on incidents, 
disruptions, and recovery efforts. Many private sector representatives 
questioned the value of providing information to DHS regarding planning 
for and recovery from Internet disruption. In addition, DHS has 
identified provisions of the Federal Advisory Committee Actas having a 
"chilling effect" on cooperation with the private sector. The 
uncertainties regarding the value [Footnote 15]and risks of cooperation 
with the government limit incentives for the private sector to 
cooperate in Internet recovery-planning efforts. 

Finally, DHS has lacked permanent leadership while developing its 
preliminary plans for Internet recovery and reconstitution. In May 
2005, we reported that multiple senior DHS cyber security officials had 
recently left the department.[Footnote 16]These officials included the 
NCSD Director, the Deputy Director responsible for Outreach and 
Awareness, the Director of the US-CERT Control Systems Security Center, 
the Under Secretary for the Information Analysis and Infrastructure 
Protection Directorate and the Assistant Secretary responsible for the 
Information Protection Office. DHS officials acknowledge that the 
current organizational structure has overlapping responsibilities for 
planning for and recovering from a major Internet disruption. 

DHS Has Taken Steps To Implement Recommendations, but More Work Remains 
To Be Done: 

Given the importance of the Internet infrastructure to our nation’s 
communication and commerce, our June 2006 report suggested a matter for 
congressional consideration and made recommendations to DHS regarding 
improving efforts in planning for Internet recovery.[Footnote 17]  
Specifically, we suggested that Congress consider clarifying the legal 
framework that guides roles and responsibilities for Internet recovery 
in the event of a major disruption. This effort could include providing 
specific authorities for Internet recovery as well as examining 
potential roles for the federal government, such as providing access to 
disaster areas, prioritizing selected entities for service recovery, 
and using federal contracting mechanisms to encourage more secure 
technologies. This effort also could include examining the Stafford Act 
to determine whether there would be benefits in establishing specific 
authority for the government to provide for-profit companies—such as 
those that own or operate critical communications infrastructures--with 
limited assistance during a crisis. 

Additionally, to improve DHS's ability to facilitate public/private 
efforts to recover the Internet in case of a major disruption, we 
recommended that the Secretary of the Department of Homeland Security 
implement nine actions (see table 1). The department agreed with our 
recommendations and has made progress in addressing many of them. 
Still, work remains to be done to ensure that our nation is prepared to 
effectively respond to a disruption of the Internet infrastructure. 

Table 1: DHS's Progress in Addressing GAO Recommended Actions: 

Recommended Actions: Establish dates for revising the National Response 
Plan--including efforts to update key components that are relevant to 
the Internet; 
Status: In process; 
DHS Progress: DHS revised its National Response Plan (the revised 
version is called the National Response Framework) and released it for 
public comment in September 2007. As part of this effort, the agency 
revised segments that are relevant to the Internet, including the Cyber 
Incident Annex. However, DHS did not provide a date for when it expects 
to complete the Framework. 

Recommended Actions: Use the planned revisions to the National Response 
Plan and the National Infrastructure Protection Plan as a basis to 
draft public/private plans for Internet recovery and obtain input from 
key Internet infrastructure companies; 
Status: In process; 
DHS Progress: As noted above, DHS's National Response Framework has 
been updated and released for public comment, but has not yet been 
completed. In addition, DHS released the National Infrastructure 
Protection Plan's base plan in June 2006 and the sector specific plans 
in May 2007. Because both documents have been made available for input 
from key infrastructure companies, DHS expects that they should serve 
as the basis for public/private plans for Internet recovery. 

Recommended Actions: Review the NCS and NCSD organizational structures 
and roles in light of the convergence of voice and data communications; 
Status: In process; 
DHS Progress: DHS officials stated that the creation of the Office of 
Cybersecurity and Communications acknowledges the increasing 
convergence of the IT and Communications Sectors. Further, DHS 
officials stated that NCS and NCSD are working closely together to 
ensure that activities are coordinated, issues are jointly addressed, 
and the resources and expertise of each organization are utilized. 
Moreover, the officials stated that the Office of Cybersecurity and 
Communications is working to co-locate the US-CERT and the NCC watch 
operations centers to ensure that IT and communications experts are 
working side-by-side to share situational awareness information and 
foster the early identification of attack trends, as well as the 
implications of these attacks, across all infrastructure sectors; We 
are currently evaluating DHS's efforts to restructure its organization 
in light of the convergence of voice and data communications. 

Recommended Actions: Identify the relationships and interdependencies 
among the various Internet recovery-related activities currently under 
way in NCS and NCSD, including initiatives by US-CERT, the National 
Cyber Response Coordination Group, the Internet Disruption Working 
Group, the North American Incident Response Group, and the groups 
responsible for developing and implementing cyber recovery exercises; 
Status: Not completed; 
DHS Progress: DHS has reported the roles and responsibilities of its 
multiple working groups and initiatives, but has not fully described 
the relationships and interdependencies among the various Internet 
recovery-related activities currently under way. 

Recommended Actions: Establish timelines and priorities for key efforts 
identified by the Internet Disruption Working Group (IDWG); Status: Not 
completed; 
DHS Progress: DHS disbanded the IDWG because its functions are to be 
addressed by the IT and Communications Sector Specific Plans and the 
Cross-Sector Cyber Security Working Group. DHS officials reported that 
they may reconstitute the IDWG in the future if needed to address 
Internet resilience objectives that are not covered by other existing 
organizations. 

Recommended Actions: Identify ways to incorporate lessons learned from 
actual incidents and during cyber exercises into recovery plans and 
procedures; Status: In process; 
DHS Progress: DHS officials stated that they developed a Cyber Storm 
After Action Report, which was used to revise the NCRCG's operating 
documents, and the lessons learned were taken into account in the 
development of Cyber Storm II; 
DHS officials stated that exercises such as Cyber Storm and Cyber 
Tempest, as well as data from the Katrina After Action Report have been 
used in updating the National Response Framework. However, DHS has not 
yet developed a formal process for incorporating the lessons learned. 

Recommended Actions: Work with private sector stakeholders representing 
the Internet infrastructure to address challenges to effective Internet 
recovery by: 
* further defining needed government functions in responding to a major 
Internet disruption (this effort should include a careful consideration 
of the potential government functions identified by the private sector 
earlier in this testimony); 
* defining a trigger for government involvement in responding to such a 
disruption, and: 
* documenting assumptions and developing approaches to deal with key 
challenges that are not within the government's control; 
Status: In process; 
DHS Progress: DHS officials stated that there are a number of ongoing 
initiatives within the department that seek to address the challenges 
to effective Internet recovery; 
* DHS reported that the strategic partnerships formed through the IDWG, 
the framework of the NIPP, implementation of the sector specific plans, 
the National Cyber Response Coordination Group, and operational 
activities conducted by US-CERT are helping to define the appropriate 
government functions in responding to a major Internet disruption; 
* An IDWG study examined the existence of incident triggers for 
responding to Internet disruptions and concluded that triggers or 
response thresholds vary from one private sector organization to 
another and that overall, the establishment of triggers would hold 
little value for infrastructure owners and operators. The study 
revealed that the development of triggers for the federal government 
could be useful if used across departments and agencies. Currently, US-
CERT's incident levels provide the response categories that should 
guide department and agency involvement in responding to incidents. 
Moreover, the study demonstrated the need for greater understanding as 
to what the federal response would be in the event of an Internet 
disruption; 
* Agency officials stated that DHS is collaborating with the private 
sector to better understand existing operational and corporate 
governance policies; DHS acknowledges that more needs to be done to 
fully address these challenges. 

Source: GAO analysis of DHS provided data. 

[End of table] 

In summary, as a critical information infrastructure supporting our 
nation’s commerce and communications, the Internet is subject to 
disruption—-from both intentional and unintentional incidents. While 
major incidents to date have had regional or local impacts, the 
Internet has not yet suffered a catastrophic failure. Should such a 
failure occur, however, existing legislation and regulations do not 
specifically address roles and responsibilities for Internet recovery. 
As the focal point for ensuring the security of cyberspace, DHS has 
initiated efforts to refine high-level disaster recovery plans; 
however, much remains to be done. 

DHS faces numerous challenges in developing integrated public/private 
recovery plans--not the least of which is that the government does not 
own or operate much of the Internet. In addition, there is no consensus 
among public and private stakeholders about the appropriate role of DHS 
and when it should get involved; legal issues limit the actions the 
government can take; the private sector is reluctant to share 
information on Internet performance with the government; and DHS is 
undergoing important organizational and leadership changes. As a 
result, the exact role of the government in helping to recover the 
Internet infrastructure following a major disruption remains unclear. 

To improve DHS’s ability to facilitate public/private efforts to 
recover the Internet in case of a major disruption, we suggested that 
Congress consider clarifying the legal framework guiding Internet 
recovery. We also made recommendations to DHS to establish clear 
milestones for completing key plans, coordinate various Internet 
recovery-related activities, and address key challenges to Internet 
recovery planning. While DHS has made progress in implementing these 
recommendations, full implementation could greatly enhance our nation’s 
ability to recover from a major Internet disruption. 

Mr. Chairman, this concludes my statement. I would be happy to answer 
any questions that you or members of the subcommittee may have at this 
time. 

If you have any questions on matters discussed in this testimony, 
please contact me at (202) 512-6244, or by e-mail at 
wilshuseng@gao.govSouza, Nancy Glover, Colleen Phillips, and Jeffrey 
Woodward. 

[End of section] 

Footnotes: 

[1] Homeland Security Presidential Directive 7: Critical Infrastructure 
Identification, Prioritization, and Protection (Washington, D.C.: Dec. 
17, 2003). 

[2] The White House, National Strategy to Secure Cyberspace (Washington 
D.C.: February 2003). 

[3] GAO, Internet Infrastructure: DHS Faces Challenges in Developing a 
Joint Public/Private Recovery Plan, GAO-06-672 (Washington, D.C.: June 
16, 2006). 

[4] GAO-06-672. 

[5] DHS, The National Infrastructure Protection Plan. 

[6] These include the National Strategy to Secure Cyberspace, the 
interim National Infrastructure Protection Plan, the Cyber Incident 
Annex to the National Response Plan, and Homeland Security Presidential 
Directive 7. 

[7] GAO-05-434. 

[8] The Homeland Security Act of 2002, Pub. L. No. 107-296 (Nov. 25, 
2002). 

[9] Homeland Security Presidential Directive 7 (Dec. 17, 2003). 

[10] Act of September 8, 1950, c. 932, 64 Stat. 798, as amended; 
codified at 50 U.S.C. App. Section 2061 et seq. 

[11] Pub. L. No. 93-288, 88 Stat. 143 (1974). 

[12] Communications Act of 1934 (June 19, 1934), ch. 652, 48 Stat. 
1064. 

[13] Executive Order 12472 (Apr. 3, 1984), as amended by Executive 
Order 13286 (Feb. 28, 2003). 

[14] Executive Order 12472 § 2; Communications Act of 1934, § 706, 47 
U.S.C § 606. 

[15] Pub. L. No. 92-463, 86 Stat. 770 (1972) codified at 5 U.S.C. app. 
2. 

[16] GAO-05-434. 

[17] GAO-06-672. 

[18] Homeland Security Presidential Directive 7: Critical 
Infrastructure Identification, Prioritization, and Protection 
(Washington, D.C.: Dec. 17, 2003). 

[19] The White House, National Strategy to Secure Cyberspace 
(Washington D.C.: February 2003). 

[20] GAO, Internet Infrastructure: DHS Faces Challenges in Developing a 
Joint Public/Private Recovery Plan, GAO-06-672 (Washington, D.C.: June 
16, 2006). 

[21] GAO-06-672. 

[22] DHS, The National Infrastructure Protection Plan. 

[23] These include the National Strategy to Secure Cyberspace, the 
interim National Infrastructure Protection Plan, the Cyber Incident 
Annex to the National Response Plan, and Homeland Security Presidential 
Directive 7. 

[24] GAO-05-434. 

[25] The Homeland Security Act of 2002, Pub. L. No. 107-296 (Nov. 25, 
2002). 

[26] Homeland Security Presidential Directive 7 (Dec. 17, 2003). 

[27] Act of September 8, 1950, c. 932, 64 Stat. 798, as amended; 
codified at 50 U.S.C. App. Section 2061 et seq. 

[28] Pub. L. No. 93-288, 88 Stat. 143 (1974). 

[29] Communications Act of 1934 (June 19, 1934), ch. 652, 48 Stat. 
1064. 

[30] Executive Order 12472 (Apr. 3, 1984), as amended by Executive 
Order 13286 (Feb. 28, 2003). 

[31] Executive Order 12472 § 2; Communications Act of 1934, § 706, 47 
U.S.C § 606. 

[32] Pub. L. No. 92-463, 86 Stat. 770 (1972) codified at 5 U.S.C. app. 
2. 

[33] GAO-05-434. 

[34] GAO-06-672. 

GAO's Mission: 

The Government Accountability Office, the audit, evaluation and 
investigative arm of Congress, exists to support Congress in meeting 
its constitutional responsibilities and to help improve the performance 
and accountability of the federal government for the American people. 
GAO examines the use of public funds; evaluates federal programs and 
policies; and provides analyses, recommendations, and other assistance 
to help Congress make informed oversight, policy, and funding 
decisions. GAO's commitment to good government is reflected in its core 
values of accountability, integrity, and reliability. 

Obtaining Copies of GAO Reports and Testimony: 

The fastest and easiest way to obtain copies of GAO documents at no 
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each 
weekday, GAO posts newly released reports, testimony, and 
correspondence on its Web site. To have GAO e-mail you a list of newly 
posted products every afternoon, go to [hyperlink, http://www.gao.gov] 
and select "Subscribe to Updates." 

Order by Mail or Phone: 

The first copy of each printed report is free. Additional copies are $2 
each. A check or money order should be made out to the Superintendent 
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or 
more copies mailed to a single address are discounted 25 percent. 
Orders should be sent to: 

U.S. Government Accountability Office: 
441 G Street NW, Room LM: 
Washington, D.C. 20548: 

To order by Phone: 
Voice: (202) 512-6000: 
TDD: (202) 512-2537: 
Fax: (202) 512-6061: 

To Report Fraud, Waste, and Abuse in Federal Programs: 

Contact: 

Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: 
E-mail: fraudnet@gao.gov: 
Automated answering system: (800) 424-5454 or (202) 512-7470: 

Congressional Relations: 

Gloria Jarmon, Managing Director, JarmonG@gao.gov: 
(202) 512-4400: 
U.S. Government Accountability Office: 
441 G Street NW, Room 7125: 
Washington, D.C. 20548: 

Public Affairs: 

Chuck Young, Managing Director, AndersonP1@gao.gov: 
(202) 512-4800: 
U.S. Government Accountability Office: 
441 G Street NW, Room 7149: 
Washington, D.C. 20548: