13.07.2015 Views

Opening Statement - Committee on Homeland Security

Opening Statement - Committee on Homeland Security

Opening Statement - Committee on Homeland Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

So what would motivate a cyber attack?Would Iran’s ec<strong>on</strong>omic disc<strong>on</strong>nect from the financial world be an attracti<strong>on</strong> to gauge a cyber attack againstfinancial instituti<strong>on</strong>s?We know Iran’s history of carrying out attacks via proxies. Does the ease of finding proxies to c<strong>on</strong>duct cyberattacks make Iran more susceptible to carrying out a cyber attack than a kinetic <strong>on</strong>e?How can we know if the United States is prepared to handle a cyber threat from Iran?Are our efforts str<strong>on</strong>g enough? Do we need to require a government agency to give us updates <strong>on</strong> thetechnological advances that Iran is making with regard to cyber intrusi<strong>on</strong>s?I, al<strong>on</strong>g with C<strong>on</strong>gressman Duncan, who sits <strong>on</strong> this panel, have co sp<strong>on</strong>sored a bipartisan bill that wouldrequire the State Department to provide updates <strong>on</strong> Iran’s technological capabilities. Would that be helpful?Although these are questi<strong>on</strong>s to which our witnesses can lend their thoughts, I would like to ask that theSubcommittee hold a classified Member Briefing to receive an update from the Intelligence Community <strong>on</strong> theIranian cyberthreat so we can gain more understanding of what we face.While the IC is not here to give us the specifics <strong>on</strong> the Iranian cyber threats, which would be inappropriate forthis open setting. I would like to c<strong>on</strong>centrate <strong>on</strong> what we know.We know that Iran poses a threat to our cybersecurity. We also know that our informati<strong>on</strong> technologies havemassive vulnerabilities. We know that our dependence <strong>on</strong> technology is growing exp<strong>on</strong>entially by the day.We know that our moving forward as a nati<strong>on</strong> depends <strong>on</strong> our having a robust, comprehensive cybersecuritypolicy in place.Therefore, we must have legislati<strong>on</strong> and policies that not <strong>on</strong>ly examine the threat, but also protect criticalinfrastructure and promote research and development that will ensure that we have the proper protocols in placeto prevent a cyber attack.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!