Testimony Before The House Energy and Commerce Subcommittee On Commerce, Manufacturing, and Trade
Testimony Before The House Energy and Commerce Subcommittee On Commerce, Manufacturing, and Trade
• Our nation needs to invest in cyber forensic technologies to combat cyber crime,
criminals to trial.
• Entities holding PII data should be required to meet minimum standards of good
technology use (e.g., encryption) should be held out as a “safe harbor”; some
• There should be considerably more support for both fundamental and applied
private sector.
Communication. At Purdue, I am also the Executive Director of the Center for Education and
computing and information resources. We conduct advanced research in several major thrust
areas, we educate students at every level, and we have an active community outreach
program. CERIAS is the largest such center in the United States, and we have been ranked as
the #1 such program in the country. CERIAS also has close working relationships with many
several Federal agencies, including the FBI, the Air Force, the GAO, and the NSA. I have been
I am also the chair of USACM, the U.S. public policy council of the ACM. With over
100,000 members, ACM is the world’s largest educational and scientific computing society,
uniting educators, researchers and professionals to inspire dialogue, share resources and
address the field’s challenges. USACM acts as the focal point for ACM’s interaction with the
U.S. Congress and government organizations. It seeks to educate and assist policy-makers on
legislative and regulatory matters of concern to the computing community. USACM tracks
U.S. public policy initiatives that may affect the membership of ACM and the public at large,
scientific data, educational materials, and technical analyses that enable policy-makers to
My testimony is as an expert in the field. My testimony does not reflect any official
General Problem
computer databases is not surprising given the significant — and growing — number of
reported breaches each year. Organizations are increasingly collecting data about various
groups of people and storing that data in computing systems for their use in various business
processes — or simply to warehouse for possible future use. However, those systems are
often not adequately protected, and portions of the data are exposed by accident or stolen
result of carelessness or flaws in the operation of underlying software (or rarely, hardware).
Usually, the disclosures are a result of malicious behavior coupled with inadequate
protections and policies. Malicious disclosure may come about from authorized employees
(insiders) or customers who are taking or disclosing information, usually for financial gain.
These disclosures may occur over a long time. These disclosures are often to confederates
who commit the crimes using the information, thus making it more difficult to identify the
misconfiguration in the system, and uses this to gain access to the desired information. One
common current method is via spear phishing, which occurs when a targeted piece of attack
software is sent in email to a victim inside the target company, masquerading as some
harmless document or application from a friend or coworker. When the attack code is run, it
acts similar to a virus, installing itself on the local machine, and provides remote access for the
criminal to access the system.1 Similar types of attack code also exist that run from web pages
Attacks can also occur by exploitation of flaws in installed software. For instance, the
software that drives a web commerce transaction using the SQL database language may
improperly check user input given in response to a question about shipping address. A
malicious user may be able to take advantage of this by inserting a semicolon followed by
SQL instructions to send the entire customer database over the network to a remote site.
Theft of information is not limited to online copying of data — data exists in physical
form as well as online. Thus, the fixed, physical copy can be lost or stolen as well as the online
version. There are many documented cases of theft or loss of backup media (disks, tapes,
1 There have been some very high-profile cases of spear phishing in the news recently. Oak Ridge
National Labs had to shut down their Internet connection in April when over 500 employees were attacked
like this, RSA had some of their security software compromised this spring via spear phishing, and the
highly publicized breakins of Google and over 30 other large companies were accomplished with spear
phishing from China.
machines and disks. The theft or loss of paper records may also lead to some of the same
forms of disclosure mentioned here — high speed scanners can quickly convert paper
documents into database files again; my university has been forced to limit what is printed in
our campus phone directory, for instance, because some commercial firms were obtaining
One of the more notable incidents occurred in 2005, when the data broker
ChoicePoint revealed that fraudulent access to over 140,000 customer records had occurred
over the previous two year period, leading to multiple instances of identity theft and fraud.2
That incident led to investigations by the FTC and SEC, as well as multiple lawsuits.
Despite the publicity of the ChoicePoint case, and the potential for lessons-learned,
the instances of disclosure and loss of PII data have only increased in the years since, with
hundreds of cases per year in the United States reported — and undoubtedly many more
unreported. This year, before this hearing, two very large and troubling exposures of such
data were reported by Sony and Epsilon, with potentially over 100 million consumers affected
These two cases are particularly illustrative of the complexities of such incidents. The
individuals affected by the Epsilon case had no idea they had records stored with Epsilon, and
2See “The ChoicePoint Dilemma”, by Paul N. Otto, Annie I. Antón, and David L. Baumer, IEEE Security &
Privacy, Sep/Oct 2007, pp. 15-23.
Sony case, the majority of the victims are likely young people whose sense of risk, privacy and
consequence are not yet fully developed, and thus they may also not understand the full
ramifications of what has happened. Presumably, both companies are large enough that they
could have afforded to spend an appropriate amount on security and privacy protections of
their data; I have no information about what protections they had in place, although some
news reports indicate that Sony was running software that was badly out of date, and had
keeps a database4 of exposed5 breaches from 2005 that includes both accidental disclosures
and fraudulent accesses. As of the 1st of May 2011, they documented almost 600 million
records have been disclosed in 2,459 separate incidents in the United States. That is an
average of approximately 100 million records per year. The Sony breaches disclosed in April
and May of 2011 alone equal approximately 100 million records. Other firms listed in their
database for those months included Blockbuster, several hospitals, the IEEE (Institute of
Electrical and Electronics Engineers) and , a restaurant in southwest Indiana, Albright College
3 This is similar to the ChoicePoint breach in that the individuals affected in that incident also did not
realize the relationship they had with the company.
4 Available at http://www.privacyrights.org/data-breach#CP
5I emphasize exposed because there are undoubtedly many more that are undisclosed, and many that
are also simply not discovered. There may be more that are undiscovered than disclosed and
undisclosed combined.
Apple iTunes.
Sometimes, a company is involved even though their computers are not the ones
breached. Among the more than 50 companies whose customer lists were stolen in the
Epsilon data breach were Chase Bank, Hilton, Best Buy, and Target. Customers of those
companies should expect to receive emails suggesting that as loyal customers, they can click
to receive a valuable coupon. Ironically, some possible fraud may even be in the form of
warnings about fraud —customers will receive messages telling them that their email address
was stolen and to protect themselves they should click on a link to enter their credit card
information, or apologizing for the inconvenience and offering a discount by clicking on a link
It is important to note that data breaches occur in all forms of organizations: retail
establishments, financial services, nonprofit entities, health care providers, public utilities, and
even computer security firms themselves. Federal and state government agencies are also
affected, and are sometimes responsible for disclosure of particularly sensitive material
because of their privileged access status under law. A review of the aforementioned list for
the last few months reveals disclosures by the IRS, a U.S. District Court, the Social Security
Administration, Veterans Affairs, the Oklahoma Department of Health, the Texas Comptroller’s
Office, the Maine State Prison, and the town of Barton, Vermont (to name a few). Clearly, the
problem of properly safeguarding personal information is not limited to the private sector.
2005 first prompted Congressional scrutiny. More data is being collected and stored, often
for less well-defined purposes. More firms have access to large-scale storage and computing,
and thus are now able to store and aggregate data online. Additionally, there are more
entities interested in committing fraud online, and their sophistication and reach has grown
considerably faster than has that of law enforcement and security personnel in the same time.
Their ability to distribute what they take has also increased with the speed and reach of
networks.
Nonetheless, the increase in sophistication of attackers, and the growth in data do not
totally explain all the incidents. My personal conclusion from reviews of reports in the press
government and the private sector — continue to run outmoded, flawed software, fail to
follow some basic good practices of security and privacy, and often have insufficient training
or support. The most commonly cited reason for these failings is cost. The cost of providing
better security and privacy protection is viewed as overhead that is not recovered in increased
revenue, and it is usually one of the first things trimmed in budget cuts. Running outdated
software and unpatched operating systems exposes citizens to risks and consequences whose
cost a company does not bear. Therefore a company does not have an immediate economic
incentive to make the investment needed to prevent breaches. There is a risk of real loss if a
As a cautionary note for the future: many companies are eager to move their
operations “into the cloud.” This will mean that the PII databases may be stored on servers
located outside the United States. If those servers are compromised or the media is stolen, it
is unclear what legal rights and protections the victims may have.
Types of Abuse
It may not be immediately obvious why disclosure of some of this information might
be of concern. In some cases, the disclosure might only be of an account name and some
password hint, or directory information that might be otherwise easily found in a public
several different sources may allow someone to infer much more than from any single source
alone (and given the availability of information on social media sites and from other breaches,
It is then how these bits of information are used that are of concern. Certainly, any
disclosure poses a privacy concern to some users, but there are additional concerns related
to perform identity theft, thus gaining false identification for employment, obtaining credit,
Harassment and stalking. Information about individuals may be used to harass public
officials or celebrities, or stalk victims. Obtaining address information may be used to stalk
Spear phishing. Phishing, the attempt to get someone to click through to a false web
site through email or divulge their account information, can be made more effective if the
email is tailored somewhat to the victim. This is known as spear phishing. Details from large
data bases, such as account names, length of service, addresses, and account options can be
used to tailor a phishing message to make it appear legitimate and thus trick someone into
Tracking for physical crime. It is possible to use data from a database to identify victims
for physical crime, although I am unaware of any cases of this yet occurring. This would be
instances where the database would indicate something about income level or perhaps that
indicated people were away on vacation, and this would be useful to criminals seeking to
Extortion. The presence of information in a database could be used for extortion. This
has occurred in cases of medical information, particularly regarding HIV status. There are
many other items of information that might be used, including past criminal violations, past
marriages, or even items as simple as what videos and on-line books someone likes to
Inference. People tend to use the same passwords, and use the same hints for
passwords when visiting multiple sites. The trend at sites to use prompts for password
recovery such as “Name your first pet” elicit the same (honest) response from most people or
they would otherwise not be able to remember all the answers. Thus, gaining the passwords
or hint answers for users from one site might be combined with the same user name at other,
more valuable sites such as a bank, to provide access for direct fraud.7
Direct fraud. Clearly, information containing credit card numbers, ACH numbers, or
USACM Recommendations
breach (possibly) involving their PII, along with information about steps to take to safeguard
their identity appears to have some positive value. A study8 by Romanosky, et al. suggests
that state mandatory notification laws provide a small decrease (about 6 percent) in identity
recommendations for use with databases. Those are enclosed as Appendix A to this
testimony. We strongly recommend that they be followed for all data sets containing PII,
whether government or private, commercial or nonprofit. All of them are important to limit
requirements, as well as protection of data. We encourage the committee to ensure that any
legislation or regulation apply equally to all government data collections as well as private
sector data. The dangers and risks apply no matter who collects and holds collections of PII.
4. Our nation needs to invest in cyber forensic technologies to combat cyber crime,
to support law enforcement investigation of data breaches, and to bring criminals to trial.
Law enforcement also appears to be insufficiently supported with resources for forensic
investigation of computing incidents. This is another area where resources for research into
better tools and technologies would be helpful. So long as the criminals do not fear
apprehension, they will continue to attack our systems. There also appear to be too few
5. Entities holding PII data should be required to meet minimum standards of good
security, including staying current with software patches. No particular technology use
6. There should be considerably more support for both fundamental and applied
research in privacy and security technologies by both government and the private sector.
technologies for large data sets. This is a nascent area of research, as is much of security, and
the area is under-resourced. Many of the problems being faced might be solved with better
science and computing education will help address security challenges in the long-run,
ensuring that students have adequate knowledge of the field. The education pipeline feeding
our current workforce too often focuses on training rather than education and is frequently
absent in K-12 education. Expanding this workforce via education is critical and should start at
Acknowledgements
testimony from David Bruggeman, Cameron Wilson, Annie Antón, Sarah Granger, Emil
Volcheck, Travis Breaux, Andy Grosso, Ollie Smoot, Jim Horning, Jeremy Epstein, Aaron
those individuals necessarily agrees with, nor endorses any of my comments or opinions.
Background
Current computing technologies enable the collection, exchange, analysis, and use of
technologies, which are widely used by many types of organizations, allow for massive
surveillance and data matching/mining are being applied to everything from product
Despite the intended benefits of using these technologies, there are also significant
concerns about their potential for negative impact on personal privacy. Well-publicized
instances of personal data exposures and misuse have demonstrated some of the challenges
in the adequate protection of privacy. Personal data — including copies of video, audio, and
every stage of its use by all involved parties. Protecting privacy, however, requires more than
The U.S. Public Policy Council of the Association for Computing Machinery (USACM)
advocates a proactive approach to privacy policy by both government and private sector
organizations. We urge public and private policy makers to embrace the following
recommendations when developing systems that make use of personal information. These
international agreements, and internal policies that govern how personal information is
stored and managed. Striking a balance between individual privacy rights and valid
government and commercial needs is a complex task for technologists and policy makers, but
one of vital importance. For this reason, USACM has developed the following
Recommendations
Minimization
1. Collect and use only the personal information that is strictly required for the purposes
2. Store information for only as long as it is needed for the stated purposes.
3. If the information is collected for statistical purposes, delete the personal information
5. Before deployment of new activities and technologies that might impact personal
privacy, carefully evaluate them for their necessity, effectiveness, and proportionality:
Consent
6. Unless legally exempt, require each individual's explicit, informed consent to collect or
mechanism for individuals to cause prompt cessation of the sharing of their personal
(NB: The advantages and disadvantages of these two approaches will depend on the
7. Whether opt-in or opt-out, require informed consent by the individual before using
personal information for any purposes not stated in the privacy policy that was in force
Openness
8. Whenever any personal information is collected, explicitly state the precise purpose for
the collection and all the ways that the information might be used, including any plans
9. Be explicit about the default usage of information: whether it will only be used by
explicit request (opt-in), or if it will be used until a request is made to discontinue that
use (opt-out).
10. Explicitly state how long this information will be stored and used, consistent with the
"Minimization" principle.
11. Make these privacy policy statements clear, concise, and conspicuous to those
13. Communicate these policies to individuals whose data is being collected, unless
Access
14. Establish and support an individual's right to inspect and make corrections to her or
his stored personal information, unless legally exempted from doing so.
information has been shared, and for what purposes, unless legally exempted from
doing so.
16. Provide clear, accessible details about how to contact someone appropriate to obtain
Accuracy
17. Ensure that personal information is sufficiently accurate and up-to-date for the
intended purposes.
18. Ensure that all corrections are propagated in a timely manner to all parties that have
Security
19. Use appropriate physical, administrative, and technical measures to maintain all
access or modification.
20. Apply security measures to all potential storage and transmission of the data,
including all electronic (portable storage, laptops, backup media), and physical
Accountability
21. Promote accountability for how personal information is collected, maintained, and
shared.
logs, internal reviews, independent audits, and sanctions for policy violations.
24. Ensure that the parties most able to mitigate potential privacy risks and
do so.
USACM does not accept the view that individual privacy must typically be sacrificed to
achieve effective implementation of systems, nor do we accept that cost reduction is always a
sufficient reason to reduce privacy protections. Computing options are available today for
meeting many private sector and government needs while fully embracing the
recommendations described above. These include the use of de-identified data, aggregated
data, limited datasets, and narrowly defined and fully audited queries and searches. New
technologies are being investigated and developed that can further protect privacy. USACM
(June 2006)