Planning for the Future of Cyber Attack Attribution: Hearing Before the U.S. House of Representatives Committee on Science and Technology, Subcommittee on Technology and Innovation, One Hundred Eleventh Congress, Second Session, July 15, 2010   [open pdf - 3MB]

From the opening statement of David Wu: "This cybersecurity hearing is one in a series that this subcommittee had held on ways that we can protect our nation's critical cyber infrastructure. Over the last two years, we've held hearings on cyber security activities at the National Institute of Standards and Technology and the Department of Homeland Security, as well as on the administration's Cyberspace Policy Review. Just two weeks ago, we had an important hearing on the smart grid, and spent a great deal of time talking about the necessity of developing strong cyber security standards for our national energy infrastructure. We are well aware of the critical role that IT networks play in managing much of our day-to-day activity--from online banking to systems that make sure there is food on grocery store shelves. This growing reliance on networks has made us more vulnerable to cyber attacks and has increased the potential for such attacks to have far-reaching and crippling effects. Now more than ever, we need to be focused on the development of tools and technologies to prevent, detect, and respond to cyber attacks. History shows that one of the best deterrents to an attack is the ability to identify your attacker." Statements, letters, and materials submitted for the record include those of the following: David Wu, Representative from Oregon; David A. Wheeler, Institute for Defense Analyses; Robert Knake, Council on Foreign Relations; Ed Giorgio, Ponte Technologies; and Marc Rotenberg, Electronic Privacy Information Center.

Report Number:
Serial No. 111-105
Public Domain
Retrieved From:
United States House of Representatives Committee on Science and Technology: http://science.house.gov/
Media Type:
Help with citations