[House Hearing, 111 Congress]
[From the U.S. Government Publishing Office]




     DO THE PAYMENT CARD INDUSTRY DATA STANDARDS REDUCE CYBERCRIME?

=======================================================================

                                HEARING

                               before the

                        SUBCOMMITTEE ON EMERGING
                        THREATS, CYBERSECURITY,
                       AND SCIENCE AND TECHNOLOGY

                                 of the

                     COMMITTEE ON HOMELAND SECURITY
                        HOUSE OF REPRESENTATIVES

                     ONE HUNDRED ELEVENTH CONGRESS

                             FIRST SESSION

                               __________

                             MARCH 31, 2009

                               __________

                           Serial No. 111-14

                               __________

       Printed for the use of the Committee on Homeland Security
                                     

[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]




  Available via the World Wide Web: http://www.gpoaccess.gov/congress/
                               index.html

                               __________


                  U.S. GOVERNMENT PRINTING OFFICE
52-239 PDF                WASHINGTON : 2010
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing 
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC 
area (202) 512-1800 Fax: (202) 512-2104  Mail: Stop IDCC, Washington, DC 
20402-0001







                     COMMITTEE ON HOMELAND SECURITY

               Bennie G. Thompson, Mississippi, Chairman
Loretta Sanchez, California          Peter T. King, New York
Jane Harman, California              Lamar Smith, Texas
Peter A. DeFazio, Oregon             Mark E. Souder, Indiana
Eleanor Holmes Norton, District of   Daniel E. Lungren, California
    Columbia                         Mike Rogers, Alabama
Zoe Lofgren, California              Michael T. McCaul, Texas
Sheila Jackson Lee, Texas            Charles W. Dent, Pennsylvania
Henry Cuellar, Texas                 Gus M. Bilirakis, Florida
Christopher P. Carney, Pennsylvania  Paul C. Broun, Georgia
Yvette D. Clarke, New York           Candice S. Miller, Michigan
Laura Richardson, California         Pete Olson, Texas
Ann Kirkpatrick, Arizona             Anh ``Joseph'' Cao, Louisiana
Ben Ray Lujan, New Mexico            Steve Austria, Ohio
Bill Pascrell, Jr., New Jersey
Emanuel Cleaver, Missouri
Al Green, Texas
James A. Himes, Connecticut
Mary Jo Kilroy, Ohio
Eric J.J. Massa, New York
Dina Titus, Nevada
Vacancy
                    I. Lanier Avant, Staff Director
                     Rosaline Cohen, Chief Counsel
                     Michael Twinchek, Chief Clerk
                Robert O'Connor, Minority Staff Director
                                 ------                                

   SUBCOMMITTEE ON EMERGING THREATS, CYBERSECURITY, AND SCIENCE AND 
                               TECHNOLOGY

                 Yvette D. Clarke, New York, Chairwoman
Loretta Sanchez, California          Daniel E. Lungren, California
Laura Richardson, California         Paul C. Broun, Georgia
Ben Ray Lujan, New Mexico            Steve Austria, Ohio
Mary Jo Kilroy, Ohio                 Peter T. King, New York (Ex 
Bennie G. Thompson, Mississippi (Ex      Officio)
    Officio)
                      Jacob Olcott, Staff Director
       Dr. Chris Beck, Senior Advisor for Science and Technology
                       Carla Zamudio-Dolan, Clerk
               Coley O'Brien, Minority Subcommittee Lead












                            C O N T E N T S

                              ----------                              
                                                                   Page

                               Statements

The Honorable Yvette D. Clark, a Representative in Congress From 
  the State of New York, and Chairwoman, Subcommittee on Emerging 
  Threats, Cybersecurity, and Science and Technology.............     1
The Honorable Daniel E. Lungren, a Representative in Congress 
  From the State of California, and Ranking Member, Subcommittee 
  on Emerging Threats, Cybersecurity, and Science and Technology.     4
The Honorable Bennie G. Thompson, a Representative in Congress 
  From the State of Mississippi, and Chairman, Committee on 
  Homeland Security..............................................     6

                               Witnesses

Ms. Rita M. Glavin, Acting Assistant Attorney General, Criminal 
  Division, Department of Justice:
  Oral Statement.................................................     7
  Prepared Statement.............................................     9
Mr. Robert Russo, Director, Payment Card Industry Data Security 
  Standards Council:
  Oral Statement.................................................    24
  Prepared Statement.............................................    26
Mr. W. Joseph Majka, Head of Fraud Control and Investigations, 
  Global Enterprise Risk, Visa, Inc.:
  Oral Statement.................................................    30
  Prepared Statement.............................................    32
Mr. Michael Jones, Senior Vice President and Chief Information 
  Officer, Michaels Stores, Inc.:
  Oral Statement.................................................    35
  Prepared Statement.............................................    37
Mr. David Hogan, Senior Vice President, Retail Operations, and 
  Chief Information Officer, National Retail Federation:
  Oral Statement.................................................    40
  Prepared Statement.............................................    42

                             For The Record

Submitted for the Record by Chairwoman Yvette D. Clarke:
  Statement of Andrew R. Cochran, Founder and Co-editor, The 
    Counterterrorism Blog........................................    18
  Statement of Kirsten Trusko, on Behalf of the Network Branded 
    Prepaid Card Association.....................................    20

                                Appendix

Questions Submitted by Chairwoman Yvette D. Clarke...............    51

 
     DO THE PAYMENT CARD INDUSTRY DATA STANDARDS REDUCE CYBERCRIME?

                              ----------                              


                        Tuesday, March 31, 2009

             U.S. House of Representatives,
                    Committee on Homeland Security,
      Subcommittee on Emerging Threats, Cybersecurity, and 
                                    Science and Technology,
                                                    Washington, DC.
    The subcommittee met, pursuant to call, at 2:11 p.m., in 
Room 311, Cannon House Office Building, Hon. Yvette D. Clarke 
[Chairwoman of the subcommittee], presiding.
    Present: Representatives Clarke, Richardson, Lujan, 
Thompson [ex officio], and Lungren.
    Ms. Clarke. The subcommittee will come to order. The 
subcommittee is meeting today to receive testimony on whether 
the payment card industry data standards reduce cybercrime.
    Good afternoon. In recent years, a number of well-known 
companies have experienced massive data breaches in their 
internal computer networks, resulting in the compromise of 
sensitive customer data. The criminals who perpetrated these 
intrusions targeted the credit and debit card account 
information held by merchants or third-party data processors as 
the result of retail transactions.
    With a thriving black market that rapidly packages and 
sells stolen cardholder data, the information compromised 
during these breaches may ultimately aid a number of criminal 
organizations. We know that some percentage of the fraudulent 
charges and illicit businesses from these activities is used to 
fund terrorist activity throughout the world.
    In his 2002 autobiography, the Bali nightclub bomber 
specifically referred to on-line credit card fraud and carding 
as a means to fund terrorist activities and encouraged his 
followers to use this method to obtain financing.
    More recently, a British case involving three jihadis, 
alleged that the men used stolen credit card numbers obtained 
through fishing scams and Trojan horses to make more than 3.5 
million in fraudulent charges. The jihadis reportedly used the 
numbers at hundreds of on-line stores to purchase equipment and 
other items, including prepaid cell phones and airline tickets, 
in order to aid jihadi groups in the field.
    The subcommittee is holding this hearing today to voice our 
concern about the growing number of data breaches and to 
understand what is being done to curb this activity and to 
suggest that both merchants and the pay card industry have 
significant work ahead to meet our expectations. The payment 
card industry--Visa, MasterCard, Discover, American Express, 
and JCB--requires every business that stores, processes, or 
transmits computer data to comply with specific data security 
standards. The intent of these standards is to reduce the 
likelihood of successful data security breaches. On an annual 
basis, these merchants must certify that they are compliant 
with the payment card industry data security standards known as 
PCI standards.
    The PCI standards contain a number of security controls 
that businesses must implement. The PCI standards allow smaller 
businesses to self-certify compliance, while larger merchants 
must be validated by a qualified security assessor. Enforcement 
comes through the card companies themselves who can levy fines 
and/or prohibit noncompliant merchants from using their 
services.
    To be clear, the PCI standards are not Government 
regulations and are not enforced by the Government. This 
committee supports industry-created and -managed security 
standards as long as they are strong and effective.
    In light of the rising number of publicly reported data 
breaches, Chairman Thompson launched an investigation to 
determine whether the PCI standards have been effective in 
reducing cybercrime. The results of this investigation suggest 
that the PCI standards are of questionable strength and 
effectiveness.
    The effort to become PCI-compliant is a daunting challenge 
for merchants whose core competency is the selling of 
merchandise rather than expertise in security. The cost for the 
largest merchants can be as high as $18 million a year. Many 
believe that if they complete this arduous task, they will be 
rewarded with a secure system. But the committee's 
investigation confirms what many analysts have known for years. 
In the words of one credit card company, full compliance with 
the PCI standard does not guarantee that the merchant or vendor 
will not be the victim of a data breach.
    Take last year's data breach of Hannaford Brothers Company, 
for example. Hackers installed malicious code on servers to 
every one of the grocery stores in the Hannaford chain. The 
malware intercepted the data stored on the magnetic stripe of 
payment cards as customers used them at the checkout counter. 
Hannaford received certification that they were PCI-compliant 
on February 28, 2008. But on February 27, 2008, according to 
the documents obtained by the committee, Hannaford was notified 
that a number of the credit card numbers from its network were 
stolen and being used on the black market. In other words, 
Hannaford was being certified as PCI-compliant while an illegal 
intrusion into its network was in progress.
    I do not believe that PCI standards are worthless. In the 
absence of other requirements they do serve some purpose, but I 
do want to dispel the myth, once and for all, that PCI 
compliance is enough to keep a company secure. It is not. The 
credit card companies acknowledge that.
    The bottom line is that if we care about keeping money out 
of the hands of terrorists and organized criminals, we have to 
do more, and we have to do it now. Specifically, we must 
improve our policies and our technology.
    First, the standards have to be better because they are 
inadequate to protect against the methods being used by modern 
hackers and attackers. Despite what the credit card companies 
say, for millions of small and large businesses out there, the 
PCI standards are the ceiling and not the floor. The bar must 
be raised. In this dynamic threat environment, attackers are 
constantly ahead of defenders, and yet the PCI standards are 
updated only by unanimous consent every 2 years.
    But part of the problem is that the standards do not 
require more frequent penetration testing. The only way to 
reduce breaches is by continuously testing and attacking a 
system through penetration testing and timely mitigation.
    Second, the payment card industry and issuing banks need to 
commit to investing in infrastructure upgrades here in the 
United States. In a response to the committee's investigation, 
one breached company noted that the effectiveness of data 
security standards is inherently limited by the technology base 
of U.S. credit and signature debit card processing networks. 
Credit and signature debit transactions are not protected by 
encrypted PINs. Implementation of encrypted PINs for all debit 
and credit transactions could be useful.
    Countries in Europe and Asia are deploying new technologies 
like Chip and PIN to fight fraud that could lead to organized 
crime and terrorism and it is working. According to the U.K. 
Payments Association, 3 years after beginning the migration to 
chip-card technology, losses on transactions had reduced by 67 
percent, from 219 million pounds in 2004 to 73 million pounds 
in 2007. However, despite card fraud dropping 32 percent 
domestically between 2006 and 2007, overall counterfeit card 
fraud affecting U.K. customers was up 46 percent.
    Why? The cards were being used by malicious actors in 
countries that had not yet implemented the technology. The 
United States is being blown away by security investments 
overseas and our 1950s-era system is making us a weak link in 
the security chain.
    Magnetic stripe-based technology is outmoded and inherently 
less secure when compared to smart cards or other developing 
technologies. While I am deeply concerned about our security, 
the payment card industry and issuing banks should be ashamed 
about the current state of play and doing everything possible 
to immediately institute improvements in infrastructure.
    I know that our witnesses care about keeping financial 
information out of the hands of terrorists and other organized 
crime elements and I know that the payment card industry cares. 
I know that the merchant community cares. But the time for 
waiting is over. The time for shifting risk is over. Today, the 
responsibility is yours to make this situation better.
    This is the first step in the committee's review of the 
payment card industry's efforts, a review that I believe the 
Chairman plans to continue. We look forward to hearing about 
your plans to improve America's cybersecurity posture and 
working with you in all the weeks and months ahead.
    The Chairwoman now recognizes the Ranking Member of the 
subcommittee, the gentleman from California, Mr. Lungren, for 
an opening statement.
    Mr. Lungren. Thank you very much, Madam Chairwoman. I want 
to compliment you for scheduling this important data security 
hearing. It is an issue that most people are aware of, but few 
seem to understand the full extent of this threat or the 
remedies required to eliminate it as much as possible.
    The new Information Age created by computers, the internet, 
and instant communication offers many benefits to the Nation, 
particularly our economy. Transacting business on the internet 
is one of the key benefits of the Information Age.
    Utilizing, obviously, credit cards today is the way people 
normally transact business. It is the new currency of our age. 
A lot of people don't even carry cash around anymore. In fact, 
sometimes you try to pay with cash and people look at you, 
trying figure out what scam you have going on.
    I was at one place where I actually had a 50-cent piece 
that I was trying to utilize and the woman would not recognize 
it as an American currency. I was trying to explain to her the 
image on the surface, and she just evidently missed that 
history lesson about that President.
    The internet has acted as a powerful economic engine for 
the U.S. economy. Unfortunately, these new business 
opportunities carried via the internet have also transformed 
the landscape for the criminal, making available a wider array 
of new methods that identity thieves can use to access and 
exploit the personal and financial information of others.
    Today's skilled computer hackers are capable of 
perpetrating large-scale data breaches that leave tens of 
millions of individuals at risk of identity theft. I recall my 
wife and I were at dinner one night, I gave the card to the 
waiter. After 5 minutes, the waiter came back kind of 
embarrassed and said, well, Mr. Lungren, this card doesn't seem 
to be working. So I turned to my wife and said, Why don't you 
give them the card? She gave them the card with the same 
account. They came back later and said it is not working. 
Luckily my wife had another card.
    If I had been in Chicago, changing planes, and needed to 
stay overnight there, I would have been up the creek without a 
paddle, as we say. I went home that night, called in to the 
credit card company and they informed us there had been a 
credit card compromise. Our account had been compromised. They 
would tell us nothing more than that. My wife went on-line to 
see what our account was at that point in time. There was no 
such account. It was as if it had vanished.
    The point I am making is we were never notified by the 
credit card company. We have a number of automatic payments 
that are made against the card and we tried to track every one 
of them, and missed one of them and got a notice that we had 
not paid that month for something.
    So we are putting a tremendous obligation on the entire 
industry in this case. One is to try and secure things. The 
other one is when there is a breach, what is your requirement 
to notify people? Under what circumstances do you notify 
people? If you are not giving that information to those of us 
who are the consumer, is that information being given to law 
enforcement to follow up in all circumstances? Those are just 
some of the questions.
    The key to this internet economic engine running smoothly 
is data security. There is no doubt about it. If we are unable 
to secure our on-line financial transactions from financial 
criminals, even those not involved in terrorism, then our 
economic growth will be jeopardized, and actually we have 
fulfilled the terrorist dreams of pulling down our country 
through an economic attack. Customers will reject on-line 
purchases if they can't be assured that their payment card 
transactions are protected. Without consumer or customer 
confidence in the safety of the payment card transaction, 
internet commerce would dry up and we could have problems with 
people just using the card when they are actually at brick-and-
mortar stores.
    We know it was a huge problem in the early days of the 
internet when it was an unknown frontier. Unchecked criminal 
activity will bring back those wild west days, undermine 
customer confidence, and cripple internet commerce. I applaud 
the payment card industry for investing their resources and 
personnel to develop and promote a universal data security 
standard. As was mentioned, it is voluntary. We understand 
that. A lot of work has gone into it. We understand that there 
is always the challenge. It is easy for those of us in 
Government to say we can do a better job. Thank God we haven't 
had any security breaches on the part--excuse me--I guess we 
have had a couple of them here and there. All that points out 
is it is a real challenge to stay ahead of the bad guys.
    I mean, you have got mischievous hackers, you have got 
individual criminal hackers, you have got criminal enterprise 
hackers, you have got transnational organization hackers, you 
have got nation-state hackers and, frankly, you have got to try 
to protect against all of that.
    The PCI Security Standards Council that includes all of the 
major card brands has at least understood that there is a need 
for a set of comprehensive requirements for enhancing payment 
account security. One of the questions I would ask: Is there 
any place for the retailers to be involved in discussion of 
those standards and part of that? Another question I would ask 
is: I know you have some flexibility within the standards as 
they exist now. But is it still too much of one size fits all? 
In other words, I know you have a demarcation between mom-and-
pop stores and the big retailer, but in between does it make 
sense? Are the standards flexible enough to be effective on the 
one hand and at the same time allow for different business 
models to operate in a reasonable fashion for them?
    So I realize that the first standard was developed in 2006 
to improve the standard security in the payment card industry. 
It has improved the situation. More needs to be done. We are 
trying to identify those areas that need to be done. We have 
trying to make sure all the parties are brought to bear on the 
question. We are looking to see if Government regulation is 
needed.
    The last thing I would say is this. The challenge for us in 
Government is to try to ensure that we don't interfere with the 
ingenuity of the private sector in being able to put the fixes 
into the security system that are necessary. If you can help us 
in that regard, not only will you benefit, we will benefit as 
well. Thank you very much, Madam Chairwoman.
    Ms. Clarke. The Chairwoman now recognizes the Chairman of 
the full committee on Homeland Security, the gentleman from 
Mississippi, Mr. Thompson, for an opening statement.
    Mr. Thompson. Good afternoon. Thank you, Madam Chair, for 
holding this very critical hearing on the effectiveness of the 
PCI standards.
    From our personal computers to Government networks to our 
critical infrastructure, the United States is under attack in 
cyberspace. This adversary ranges in skill from unsophisticated 
to highly capable, from loan hackers to organized crime and 
nation-states. Their intent ranges from nuisance and disruption 
to theft, espionage, and warfare. Their successes are varied.
    From every hacker that we have caught and prosecuted, 
thousands continue to work unabated. In December 2008, the 
Center for Strategic and International Studies concluded that 
the battle for cyberspace is one that we are not winning.
    Willy Sutton was rumored to have said he robbed banks 
because that is where the money is. In today's world of payment 
card transactions, the money is now located on computer 
networks. On any given day, billions of dollars float back and 
forth between merchants and payment card networks which process 
credit card numbers for transactions in an area that is ripe 
for hackers to exploit, and they are taking advantage of 
weaknesses in the system.
    We are here today to learn about the private sector's 
efforts to combat data breaches and cybercrime and to assess 
the quality of the payment card industry data security 
standards. The standards have been around for several years, 
but massive on-going data breaches at some of America's largest 
merchants suggest that the standards are inadequate to prevent 
breaches.
    The essential flaw with the PCI standards is that it allows 
companies to check boxes, but not necessarily be secure. 
Checking boxes makes it easier to assess compliance with the 
standard, but compliance does not equal security. We have to 
get beyond check-box security. It provides a false sense of 
security for everyone involved, and it is ineffective in 
reducing the real threats. Companies need to understand that 
even if 100 percent compliance with PCI standards is achieved, 
hackers will continue to develop techniques to exploit the 
computer systems of companies holding cardholder data. You are 
not safe unless you continually test your systems.
    Today we are calling for change. I call on the payment card 
industry, and the thousands of merchants and vendors who have 
to comply with the standards, to rededicate themselves to the 
goal of securing their networks. For the payment card industry 
and the issuing banks, this is going to mean significant 
investment in the infrastructure upgrades. As the Chairwoman 
has pointed out, these investments are already on-going 
overseas.
    I am puzzled and disappointed that we are not seeing 
similar upgrades here domestically, and I hope our witnesses 
can explain why the card industry appears not to be moving 
quickly to address these issues. I am also deeply troubled by 
the testimony that suggests credit card companies are less 
interested in substantially improving their product and 
procedures than they are in reallocating their fraud costs. The 
payment card industry's efforts to shift risk appears to have 
contributed to our current state of insecurity, and I am 
concerned that as long as the card industry is writing the 
standards, we will never see a more secure system.
    We in Congress must seriously consider whether we can 
continue to rely on industry-created and -enforced standards, 
particularly if they are inadequate to address the on-going 
threats.
    I look forward to working with my colleagues on both sides 
of the aisle and across committee lines to further explore 
whether Government action is necessary to protect against these 
threats. One thing is certain: The current system is not 
working.
    Madam Chairwoman, I thank you for your work in this area, 
and I look forward to the testimony of both panels.
    Ms. Clarke. Thank you very much, Mr. Chairman. Other 
Members of the subcommittee are reminded that under the 
committee rules, opening statements may be submitted for the 
record.
    We are going to take a break right now for votes. They have 
come up and we are scheduled for three votes, which puts us at 
about 25 minutes. Well, now it is less than 25 minutes, maybe 
about 15. So please excuse us as we go and recess for votes.
    [Recess.]
    Ms. Clarke. I welcome our only panelist on the Federal 
panel, Ms. Rita Glavin, Acting Assistant Attorney General, 
Criminal Division, Department of Justice. In June 2008, Ms. 
Glavin joined the Criminal Division as the Acting Principal 
Deputy Assistant Attorney General. Ms. Glavin began her service 
to the Department in 1998 through the Department's honors 
program as a trial attorney in the public integrity section 
where she worked until 2003. Since 2003, Ms. Glavin has been an 
assistant U.S. attorney with the United States Attorneys Office 
for the Southern District of New York.
    Without objection, this witness' full statement will be 
inserted into the record. I now ask you to introduce yourself 
and summarize your testimony for 5 minutes.

STATEMENT OF RITA M. GLAVIN, ACTING ASSISTANT ATTORNEY GENERAL, 
            CRIMINAL DIVISION, DEPARTMENT OF JUSTICE

    Ms. Glavin. Good afternoon, Chairwoman Clarke, and thank 
you for the invitation to address the subcommittee. As you 
know, identity theft is not a new problem. However, in recent 
years, identity thieves have begun to capitalize on a variety 
of new methods to access and exploit the personal information 
of others. Skilled hackers are now capable of perpetrating 
large-scale data breaches that leave hundreds of thousands of 
individuals and, in some cases, millions of individuals at risk 
of identity theft.
    The Department of Justice, along with our law enforcement 
partners, has been aggressively investigating and prosecuting 
these data breaches and other criminal activity associated with 
them. We are committed to continuing our efforts. We have 
historically had tremendous success in identifying, 
investigating, and prosecuting the perpetrators of these acts. 
But as always, we can and we will do more.
    To that end, the continued and improving coordination with 
our partners in the international community and in the private 
sector will be critical to ensuring our success. We are glad to 
have this opportunity to discuss these issues with your 
subcommittee.
    The Department has responsibility for the investigation and 
prosecution of a wide range of cybercrime cases. But large-
scale breaches are of significant concern to us because their 
effects can be amplified exponentially when criminals use the 
internet to quickly and widely distribute vast quantities of 
information stolen during these breaches.
    The threat we face is wide and it is varied, ranging from 
very sophisticated individual hackers to international criminal 
organizations. The resulting losses, as you know, can be 
devastating and the criminals perpetrating these acts may be 
motivated by any number of factors, including personal 
financial gain and the desire to use this illegal activity to 
fund and facilitate other dangerous crimes.
    The Department's benchmark prosecutions of large-scale data 
breaches and the criminal activity that results from such 
breaches highlight the range of our efforts that we have been 
using to address the growing problem. I want to give you a 
couple of examples. Most recently, the FBI announced the 
results of a 2-year undercover operation that targeted members 
of the on-line carding forum known as Dark Market. At its peak, 
the Dark Market Web site had over 2,500 registered members 
around the world. This operation has resulted in 60 arrests 
worldwide and it has prevented what we estimate to be 
approximately $70 million in economic loss.
    In another example, in August 2008, the Department 
announced the largest hacking and identity theft case ever 
prosecuted, in which charges were brought against 11 members of 
an international hacking ring. Now, these various defendants 
who were from the United States, Estonia, the Ukraine, Peoples 
Republic of China, Belarus, were charged with, among other 
things, the theft and sale of more than 40 million credit and 
debit card numbers obtained from various retailers.
    Another example, in 2004 the U.S. Secret Service and 
several components of the Justice Department coordinated the 
search and arrest of more than 28 members of the Shadow Crew, a 
criminal organization located in eight States in the United 
States and six foreign countries. Members of the group were 
later charged in a 62-count indictment with trafficking in at 
least 1.5 million stolen credit and bank card numbers that 
resulted in losses in excess of $4 million. The Shadow Crew Web 
site was disabled, which we believe prevented hundreds of 
millions of dollars in additional losses to the credit card 
industry. This was known as Operation Firewall, and this early 
effort paved the way for our more recent successes in this 
area.
    Now, while investigation and prosecution are important, 
prevention and detection are key elements in the fight against 
this criminal activity. Keeping credit, debit, and other 
financial account information out of the hands of criminals in 
the first place is an essential step in reducing the frequency 
and minimizing the impact of large-scale data compromises. We 
suggest that all entities that store, process, or transmit 
credit, debit, and other financial account information should 
take steps, including complying with the payment card industry 
data security standards, to improve the security of their 
computer systems and to decrease the vulnerability of the 
information they handle.
    Of course, even 100 percent compliance with the PCI DSS, if 
that were achieved, it is likely that hackers will continue to 
develop techniques to exploit the computer system of companies 
holding cardholder data. For instance, in those instances where 
the hackers have succeeded, efforts by the Department and 
efforts by investigative agencies to look into and prosecute 
and punish those hackers and carders have been critical to 
deterring future criminals.
    For us to have continued success on this front, it is 
imperative that, No. 1, victim companies embrace new measures 
to swiftly detect data breaches and system compromises. No. 2, 
that the victim companies immediately and consistently report 
detected data breaches to law enforcement. Finally, that the 
United States builds on its existing relationships with our 
international partners to strengthen law enforcement 
cooperation channels internationally. Thank you.
    Ms. Chairwoman, I am prepared to answer your questions.
    Ms. Clarke. I thank you for your testimony.
    [The statement of Ms. Glavin follows:]
                  Prepared Statement of Rita M. Glavin
                             March 31, 2009
    Good morning, Chairwoman Clarke and Ranking Member Lungren. Thank 
you for your invitation to address the committee. The Department of 
Justice welcomes this opportunity to testify about our commitment to 
combating large-scale data breaches and the payment card fraud that 
results from such breaches.
    As you know, identity theft is not a new problem. However, in 
recent years, the information age has transformed the landscape in 
which criminals operate, making available a wide array of new methods 
that identity thieves can use to access and exploit the personal 
information of others. Criminals have capitalized on these new and far-
ranging opportunities. Skilled hackers are now capable of perpetrating 
large-scale data breaches that leave hundreds of thousands--and in many 
cases, tens of millions--of individuals at risk of identity theft. 
Today's criminals now have the opportunity to remotely access the 
computer systems of Government agencies, universities, merchants, 
financial institutions, credit card companies, and data processors, to 
steal large volumes of personal information, including individuals' 
financial information, made available simply by virtue of everyday acts 
like making credit and debit card retail transactions. Reflecting this 
trend, there are currently over 2,000 active cases related to identity 
theft pending in the U.S. Attorney's Offices (USAOs), and there has 
been a 138.2% increase in identity theft convictions by USAOs between 
fiscal year 2004 and fiscal year 2008. The Department of Justice, 
through its Criminal Division, the Federal Bureau of Investigation 
(FBI), the USAOs, and other components, along with our partners at the 
U.S. Secret Service (USSS) and the U.S. Postal Inspection Service, has 
been aggressively investigating and prosecuting these data breaches and 
other criminal activity associated with them, and we are committed to 
continuing our efforts. Historically, the Department has had tremendous 
success in identifying, investigating, and prosecuting the perpetrators 
of these acts. But as always, we can and will do more. To that end, the 
continued and improved coordination with our partners in the 
international community and the private sector will be critical to 
ensuring our success, and we are glad to have this opportunity to 
discuss these issues in particular with you.
                         the ``carder'' threat
    The Department has responsibility for the investigation and 
prosecution of a wide range of cyber crime cases, but large-scale 
breaches are of significant concern to us because their fallout can be 
amplified exponentially when criminals harness the power of the 
internet to quickly and widely distribute for future fraudulent use the 
vast quantities of information stolen during these breaches. For 
example, international organized crime is currently one of the fastest-
growing threats in the computer intrusion arena, and these groups--who 
are continuing to expand and become more sophisticated--along with 
hosts of other cyber criminals, have made large-scale data breaches one 
powerful part of their profile.
    Through activity known as ``carding,'' large volumes of data are 
stolen, resold, and ultimately used by criminals to commit fraud. In 
recent years, the problem of ``carding'' has grown. ``Carding'' means 
not only the unauthorized use of credit and debit card account 
information to fraudulently purchase goods and services, but also a 
growing assortment of related activities including computer hacking, 
phishing, cashing out stolen account numbers, re-shipping schemes, and 
internet auction fraud. I will describe some of these schemes in more 
detail in a moment.
    The internet provides a unique venue in which ``carders'' can 
advertise and sell stolen data to the highest bidder and self-organize 
to facilitate their activities. For example, carders often become 
members of Web site forums designed to provide an active marketplace 
for the sale of, among other contraband, stolen credit and debit card 
numbers; compromised personally-identifiable information, including an 
individual's address, phone number, social security number, personal 
identification numbers (PINs), credit history report, and mother's 
maiden name; and false identification documents.
    Once stolen identity information is sold, the purchasers frequently 
engage in fraudulent activity including, among other things, the use of 
stolen credit card information to make purchases on-line and in person, 
and ``cashing,'' which refers to the act of obtaining money--rather 
than retail goods and services--with the unauthorized use of stolen 
financial information. In recent years, criminal carding organizations 
engaged in what is known as ``PIN cashing'' have developed 
sophisticated ``cash-out networks'' in which stolen financial 
information is immediately disseminated to designated groups of 
criminals who withdraw money from ATMs all over the world within a 
short time period. In one example, PIN cashers made 9,000 withdrawals 
worldwide totaling $5 million in less than 48 hours from four 
compromised prepaid debit card accounts.
               the link between carding and other crimes
    In addition to the financial fraud perpetrated by carders, the 
Department focuses on criminals who engage in carding activities with a 
motivation other than personal financial gain. We know, for example, 
that drug traffickers engage in identity theft for the purpose of 
financing their activities.
    Similarly, there is a well-documented connection between identity 
theft--in particular as it relates to obtaining fraudulent 
identification documents, but also as it may relate to credit card 
fraud--and terrorism. As one example, a convicted terrorist in 
Indonesia, Imam Samudra, wrote about the use of credit card fraud and 
carding as a means to fund terrorist activities in his 280-page 
autobiography. Samudra sought to fund the 2002 Bali nightclub bombings, 
of which he was convicted, in part through on-line credit card fraud.
    Also illustrative of the connection between terrorism and credit 
card fraud, three British men were convicted in 2007 of inciting 
terrorist murder via the internet under the United Kingdom's Terrorism 
Act of 2000. Younes Tsouli, Waseem Mughal, and Tariq Al-Daour were 
participants in a network of extremist Web sites and communication 
forums through which al Qaeda statements were issued and which 
disseminated videos of beheadings, suicide bombings in Iraq, and other 
jihadi propaganda. The three men also pleaded guilty to conspiracy to 
defraud banks and credit card companies. Tsouli was sentenced to 16 
years in prison, Mughal was sentenced to 12 years in prison, and Al 
Daour was sentenced to 10 years in prison. Al-Daour and his associates 
used stolen credit card numbers obtained through phishing scams to make 
more than $3.5 million in fraudulent charges in order to purchase 
equipment, prepaid cell phones, airline tickets, and other items, to 
support jihadi groups in the field. Tsouli and Mughal also used stolen 
credit card numbers to set up and host jihadi Web sites. Significantly, 
the investigation revealed that these individuals were members of 
carding organizations.
            the department's investigations and prosecutions
    The Department of Justice plays a critical role in combating 
payment card breaches and the fraud and other criminal activity that 
results. United States Attorney's offices throughout the country 
actively prosecute these cases. Within the Criminal Division, the 
Computer Crime and Intellectual Property Section (CCIPS) also 
investigates and prosecutes large-scale data breaches and coordinates 
prosecutions that involve multiple USAOs and foreign countries. In 
addition, the Fraud Section of the Criminal Division recently 
established the Payments Fraud Working Group (PFWG), which it co-chairs 
with the Board of Governors of the Federal Reserve System. The PFWG is 
an inter-agency cooperative effort between law enforcement and the bank 
regulatory agencies designed to examine issues related to various 
payments systems and establish initiatives to protect payments systems 
against fraud and other misuse. The Department also helped to lead the 
Identity Theft Task Force, which also addressed many of these issues. 
Finally, the Office of International Affairs in the Criminal Division 
supports international cooperation efforts by implementing mutual legal 
assistance treaties (MLATs) and international conventions that have 
yielded significant evidence for use in U.S. and foreign prosecutions 
and by marshaling efforts to extradite international fugitives.
    The combined force of all of these efforts, along with the efforts 
of the FBI and the Department's other law enforcement partners, has 
resulted in a number of benchmark prosecutions that highlight the range 
of the Department's efforts to address the growing problem of large-
scale data breaches and associated criminal activity.
Recent Successes
    The Department, in coordination with its various USAOs, has worked 
with investigative agencies including the USSS, the FBI, and the United 
States Postal Inspection Service to combat carding and associated 
crimes, with great success:
   Dark Market carding forum.--Most recently, on October 16, 
        2008, the FBI announced the results of a 2-year undercover 
        operation, conducted in conjunction with CCIPS, targeting 
        members of the on-line carding forum known as Dark Market. At 
        its peak, the Dark Market Web site had over 2,500 registered 
        members around the world. This operation has resulted in 60 
        arrests worldwide and prevented an estimated $70 million in 
        economic loss.
   International hacking ring.--In August 2008, the Department 
        announced the largest hacking and identity theft case ever 
        prosecuted, in which charges were brought by the USAOs in the 
        District of Massachusetts, the Southern District of California, 
        and the Eastern District of New York against 11 members of an 
        international hacking ring, including Maksik, discussed later. 
        The various defendants--who were from the United States, 
        Estonia, Ukraine, the People's Republic of China, and Belarus--
        were charged with, among other things, the theft and sale of 
        more than 40 million credit and debit card numbers obtained 
        from various retailers including TJX Companies, BJ's Wholesale 
        Club, OfficeMax, Boston Market, Barnes & Noble, Sports 
        Authority, Forever 21, Dave & Buster's, and DSW.
   Operation CardKeeper.--Operation CardKeeper, led by the FBI 
        and the USAO for the Eastern District of Virginia, resulted in 
        the arrests of 13 individuals in Poland and eight in the United 
        States. International cooperation was required to execute 
        search warrants in the United States and in Romania. 
        Significantly, Operation CardKeeper resulted in the U.S. 
        conviction of an individual known on-line as ``John 
        Dillinger.'' This defendant was sentenced in 2007 to 94 months 
        in Federal prison for his carding activity, including 
        aggravated identity theft, access device fraud, and conspiracy 
        to commit bank fraud. Computers seized from him revealed more 
        than 4,300 compromised account numbers and full identity 
        information for over 1,600 individual victims.
   ``Iceman''.--In late 2007, a major supplier of tens of 
        thousands of credit card accounts to carding forums was 
        indicted for wire fraud and identity fraud; he is currently 
        awaiting trial. Max Ray Butler, known on-line as ``Iceman,'' 
        was the co-founder and administrator of the carding forum 
        Cardersmarket. This case is being prosecuted by the United 
        States Attorney's Office for the Western District of 
        Pennsylvania.
   ``Maksik'' and ``Lord Kaisersose''.--Maksym Yastremskiy, 
        known on-line as ``Maksik,'' believed to be one of the top 
        traffickers in stolen account information, was arrested for his 
        carding activity in Turkey in 2007. He was also indicted in 
        several U.S. districts as the result of the Department's 
        prosecution of the international hacking ring I discussed 
        earlier. Maksik allegedly sold hundreds of thousands of credit 
        and debit card numbers. One of his customers, an infamous 
        carder known on-line as ``Lord Kaisersose,'' was previously 
        searched and arrested in France as the result of a joint 
        investigation conducted by the USSS and the French National 
        Police. He is currently awaiting sentencing.
``Operation Firewall''
    Much of this successful investigative work has its roots in some of 
the Department's early efforts to dismantle highly-organized carding 
enterprises. As just one example, in 2004, as part of an undercover 
investigation known as Operation Firewall, the U.S. Secret Service 
(USSS) and several components of the Department of Justice coordinated 
the search and arrest of more than 28 members of the ``Shadowcrew'' 
criminal organization, located in eight States in the United States and 
six foreign countries. Members of the group were later charged in a 62-
count indictment with trafficking in at least 1.5 million stolen credit 
and bank card numbers that resulted in losses in excess of $4 million. 
As part of this takedown, the USSS disabled the Shadowcrew Web site. We 
believe that had the organization not been interrupted, the credit card 
industry could have faced hundreds of millions of dollars in additional 
losses. Instead, the Shadowcrew criminal organization's activity 
stopped, and to date, with the exception of two fugitives, all of the 
domestic Shadowcrew defendants have pleaded guilty and received 
sentences of up to 90 months in prison. This prosecution was the first 
of its kind--by prosecuting top-tier members of the organization for 
conspiracy, it held individuals responsible for the criminal offenses 
facilitated through the carding forum by virtue of their leadership 
role in a criminal organization that operated solely on-line. Operation 
Firewall enabled many of our more recent successes. In addition, the 
investigation into the Shadowcrew organization also revealed that the 
defendants were conspiring internationally to commit specific carding-
related crimes, including bank fraud, and enabled us to successfully 
prosecute individuals for that conduct separately.
    Operation Firewall, like many of the examples I have mentioned 
today, also illustrates how we can effectively respond to the 
increasingly global nature of carding organizations. With the 
cooperation of law enforcement agencies in the United Kingdom, Canada, 
Bulgaria, Belarus, Poland, Sweden, the Netherlands, and Ukraine, 
foreign searches and arrests went smoothly, and foreign individuals 
were successfully indicted in the United States. In addition, the 
United Kingdom pursued a separate domestic prosecution of Shadowcrew 
members, which has led to a number of guilty pleas.
                  prevention, detection, and response
    Keeping credit, debit, and other financial account information out 
of the hands of criminals in the first place is an essential first step 
in reducing the frequency, and minimizing the impact, of large-scale 
data compromises. Merchants and processors who hold individuals' 
sensitive financial information are prime targets for hackers and 
carders. To address this vulnerability, the credit card associations 
developed a set of security standards, known as the Payment Card 
Industry Data Security Standards (PCI DSS), for merchants and third-
party processors. We suggest that all entities that store, process, or 
transmit credit, debit, and other financial account information should 
ensure that they comply with all requirements of the PCI DSS in order 
to improve the security of their computer systems.
    As is well understood throughout the security community, however, 
perfect security is impossible. Therefore, even if 100% compliance with 
PCI DSS were achieved, it is likely that hackers will continue to 
develop techniques to exploit the computer systems of companies holding 
cardholder data. For instances in which those hackers succeed, efforts 
by the Department and investigative agencies to investigate, prosecute, 
and punish hackers and carders are critical to deterring future 
carders, learning more about the nature of these crimes, and punishing 
offenders. For continued success on these fronts, it is imperative 
that: (1) Victim companies embrace measures to swiftly detect data 
breaches and system compromises; (2) victim companies report data 
breaches to law enforcement; and (3) the United States builds upon its 
existing relationships with international partners to strengthen law 
enforcement cooperation channels internationally.
Early Detection
    Early detection plays two important roles in efforts to combat 
carding activity. First, it can assist in mitigation of potential 
damage. When victim companies are notified by law enforcement, credit 
card companies, or other entities about a potential compromise to their 
system, they should take all reasonable measures to determine whether a 
compromise did indeed occur. Successful detection empowers victim 
companies to take steps to address the vulnerability, fortify their 
systems, and notify individual victims as necessary. But to date, it 
has been our experience that following notification, victim companies 
can not and do not always do enough to determine the scope and severity 
of data breaches of their computer networks.
    Moreover, law enforcement faces continued investigative challenges 
as a result of delayed detection and response. Often, victim companies 
detect compromises to their system weeks, months, or years after they 
occur, and as a result, meaningful investigative leads may have 
disappeared by the time the compromise is reported to law enforcement, 
if it is reported at all. Private entities must have the capabilities 
to identify compromises more quickly. To accomplish this, we recommend 
that all entities that store, process, or transmit credit, debit, and 
other financial account information implement security mechanisms 
designed to detect system breaches, such as tracking and monitoring all 
access to network resources and cardholder data.
Breach Reporting
    Immediate reporting of incidents to law enforcement is also vital 
to law enforcement's ability to investigate large-scale data breaches. 
Immediate reporting necessarily relies upon each potential victim 
company's capacity to promptly detect an incident, but we know from 
experience that prompt detection will not itself result in a report 
from the victim company. For a variety of reasons, data breaches are 
significantly underreported, and as a result, law enforcement efforts 
to bring criminals to justice are significantly hampered. If law 
enforcement never learns of the incident, we will not investigate it; 
if we hear about it too late, we may be unable to preserve critical 
evidence or identify the perpetrators. On the other hand, several 
recent successes in tracking down the perpetrators of high-profile data 
breaches are the direct result of immediate information from victim 
companies on how the hackers entered and exited their systems, 
including the specific IP addresses used in the attack. For example, in 
the Dave & Busters case, which was a part of the international hacking 
ring prosecuted in 2008, when Dave & Busters became aware of 
intrusions, they took measures to log access to their computers, block 
the intruder's further attempts to collect credit and debit card data, 
and identify for law enforcement the intruder's IP address.
    While companies like VISA require by policy that all entities that 
suspect or have confirmed that a security breach occurred must contact 
Federal law enforcement, few laws require the victim company to notify 
law enforcement. In its April 2007 Strategic Plan, the Identity Theft 
Task Force recommended the establishment of a national standard 
requiring entities that maintain sensitive data to provide timely 
notice to law enforcement in the event of a breach. Because only a 
handful of State laws currently require reporting to law enforcement 
and because private sector rules are neither universal nor consistently 
enforced across the various companies, we urge Congress to consider 
requiring security breach reports to Federal law enforcement using a 
mechanism that ensures that the USSS and FBI have access to the 
reports.
International Law Enforcement Cooperation
    As illustrated by the array of cases I have mentioned, carders 
operating in carding forums on the internet reside in different 
countries, collaborate freely across borders, and can immediately and 
widely distribute stolen identity information around the globe. In 
addition, on-line carding forums provide networking opportunities for 
criminals interested in joining together to perpetrate other financial 
fraud or criminal activity on a global scale. As a result, coordination 
and cooperation from foreign law enforcement is vital to the success of 
carding investigations and prosecutions. In this regard, the Identity 
Theft Task Force's Strategic Plan also recommended that the Department 
of Justice and other departments and agencies take specific steps to 
improve coordination and evidence sharing with foreign law enforcement 
agencies.
    We believe that on this front, the United States should continue to 
press other nations to accede to the Convention on Cybercrime (2001), 
which will improve cooperation between law enforcement agencies. The 
Convention, which the United States ratified in 2006, assures that 
other countries enact suitable domestic legislation criminalizing 
identity theft, in part to facilitate information-sharing under MLATs 
and the extradition of criminal defendants. In addition, the United 
States should continue to work closely with multilateral organizations 
to urge other countries to review their criminal codes and criminalize 
identity-related criminal activities where appropriate. This has 
historically proven effective. Last month, for example, the G-8 Roma/
Lyon Group approved for further dissemination a paper that examines the 
criminal misuse of identification information and identification 
documents within the G-8 States and proposes ``essential elements'' of 
criminal legislation to address identity-related crime. The Identity 
Theft Task Force's Strategic Plan also directs the U.S. Government to 
identify countries that are safe havens for identity thieves and to use 
appropriate diplomatic and enforcement mechanisms to encourage those 
countries to change their practices. The Department of Justice has 
begun this process, gathering information from a range of law 
enforcement authorities. Finally, only by assisting foreign authorities 
can we expect them to reciprocate with critical evidence for our own 
investigations. The United States can improve international 
cooperation, in certain cases, by ensuring that our legislation 
provides U.S. authorities with the tools to assist foreign 
investigations effectively.
                               conclusion
    As I have attempted to outline for the subcommittee, the Department 
has been at the forefront of groundbreaking and historic efforts to 
identify, prosecute, and punish the perpetrators of large-scale data 
breaches and the associated identity theft and fraud following from 
those breaches. In light of the growing sophistication and global scope 
of the threat, we are committed to continuing and improving our efforts 
to address this conduct. Thank you for the opportunity to provide the 
subcommittee with a brief overview of the Department's role in 
combating these crimes and the primary issues we must focus on as we 
press ahead.
    Madam Chairwoman, this concludes my remarks. I would be pleased to 
answer any questions that you or other Members of the subcommittee may 
have.

    Ms. Clarke. I will remind each Member that he or she will 
have 5 minutes to question the panel. I will now recognize 
myself for questions.
    Are we seeing more massive data breaches today, or is the 
media simply reporting more?
    Ms. Glavin. I think you have a little bit of both. The 
media is reporting on it, but what we have seen over the last 
several years and in some of the operations specifically I have 
referred to in our testimony, including the Shadow Crew 
organization, is hundreds of thousands, if not millions, of 
personal financial information and identity thefts occurring.
    The Operation Firewall, which was both the Shadow Crew 
organization and the Carder Market Forum, should demonstrate 
that for a number of years this type of data breach has been 
happening and that there are hackers all over the world that 
are looking to get into systems and slowly take the information 
out. It can be over a course of months, if not over a course of 
years.
    So, yes, the data breaches are occurring and we know that 
because of undercover operations we have done and because of 
the publicly reported takedowns that we have done that I 
mentioned in my testimony. Yes, the media is reporting on those 
breaches.
    Ms. Clarke. Ms. Glavin, to what extent does the fact that a 
company is PCI-compliant help to mitigate criminal activity? 
How effective are PCI standards in lowering the risk of being 
breached?
    Ms. Glavin. Having any security system and uniform 
standards are going to help, all right? It is a floor, and it 
is a way to begin the process of preventing breaches. That 
said, what we look at in terms of those PCI set standards is 
you have got to do continual monitoring and you have to do the 
testing, because you may have adopted those standards, but 
people may already be in your computer system by the time you 
have adopted those standards. It is the monitoring and the 
testing that is going to help companies see where they have 
been breached. We know that hackers are always coming up with 
new ways to get into your system. So it is going to be the 
monitoring and the testing.
    The second thing that the Department would suggest is that 
there should be notification through Federal law enforcement 
when breaches occur. I know is that something that has been 
under subject of much discussion. But that would be an 
effective way of dealing with the data breaches on a number of 
levels, because we have a sense from our investigations and 
prosecutions around the country as to the means that the 
hackers used to do this. If we get early reporting, it helps us 
get a sense of what is going on such that we can stop it. We 
can stamp out, you know, Web sites that are doing this and help 
get in front of the problem.
    Ms. Clarke. Ms. Glavin, how successful do you think that 
the Department of Justice's efforts to combat credit card fraud 
will be in the long run if neither improved standards nor 
technology and infrastructure changes are realized and there is 
no reduction in the amount of cardholder data being lost or 
stolen?
    Ms. Glavin. This is going to have to be an on-going 
partnership. Law enforcement has been there and we are always 
going to be there. It is not just within the prosecution of the 
Department of Justice. The FBI is always looking at this. The 
Secret Service is always looking at this. We are working with 
our international partners around the world to have an 
international presence such that we are sharing information. We 
can't do that alone, and having help from private industry when 
they know there have been breaches and reporting that to us, it 
is going to help everybody in the long run.
    So we can do what we do in terms of watching the 
technology, trying to stay on top of the hackers, continually 
looking out for these Web sites and carding forums. But we 
can't do everything alone. To the extent we get help from the 
private sector to stay on top of that, that is important. I 
think that the industry that has adopted the PCI DDS, that is a 
laudable effort. The question is: Can they continue to evolve 
from there?
    Ms. Clarke. Just finally, can you please explain the roles 
of the Secret Service, FBI, and ICE in investigating 
cybercrime, and what are the distinctions between those 
investigative units?
    Ms. Glavin. Sure. The Secret Service has always been 
involved in looking at financial crimes and hackers. What the 
FBI brings to the table in addition to the Secret Service is 
that they have your counter-intelligence databases, which the 
Secret Service may not have. So they can be also checking, on a 
much more international level, what is going on around the 
world. They also have a presence through their legal attaches 
in other countries. So the Secret Service and the FBI both play 
critical roles and they both bring different tools to the law 
enforcement effort.
    Ms. Clarke. Well, thank you very much. I now recognize one 
of our new Members on the committee, new Member to the 
Congress, the gentleman from New Mexico, Mr. Lujan, for his 
questions at this time.
    Mr. Lujan. Thank you very much, Madam Chairwoman. Ms. 
Glavin, thank you very much for being with us today.
    Ms. Glavin. Thank you.
    Mr. Lujan. In your testimony you highlight many instances 
where there are projects or programs, recent success, 
investigations that the Department of Justice has engaged in, 
Dark Market carding forum, international hacking ring, 
Operation Card Keeper, Iceman, Operation Firewall.
    With that being said and with the level of concern that the 
Department of Justice has with the level of crime that is 
taking place, in this case cybercrime, what standards exist 
today for keeping this data secure?
    Ms. Glavin. In terms of private industry, the standards 
that are out there are the PCI DSS, plus whatever State laws 
there are. I mean, a number of States have consumer 
notification laws that require financial entities to report 
data breaches. Some have law enforcement notification laws.
    In terms of Federal regulation, there is not a lot, other 
than you are speaking to someone from the Criminal Division, 
and I know we have the Title 18 criminal statutes that we use 
to prosecute. But in terms of standards across the industry 
Federally, such that people are required by law to comply with 
a certain set of standards, that is not out there.
    Mr. Lujan. So it sounds like what States have done, they 
have a reporting mechanism that when there is a breach in 
security and data is compromised, that they are required to 
notify the consumer that may have been impacted. But with that 
being said, in your opinion, are these standards working the 
way they are being put together today?
    Ms. Glavin. Which industries?
    Mr. Lujan. The industry standards.
    Ms. Glavin. In terms of whether or not they are working, we 
know what reports we get when there has been data breaches and 
when industry chooses to tell us; or sometimes we learn about 
it from our own investigations and we choose to tell them. 
Whether or not they are working, I think the industry 
representatives are in the best position to tell you that.
    What I can say from the Department's perspective is that if 
we are going to do criminal investigations, there is going to 
have to be some cooperation between us and private industry so 
we can do those investigations, get a sense of the data 
breaches and to have cooperation such that they let us know 
what is going on.
    We have a sense of how it happened, what is out there, and 
who may be responsible. As for whether or not they are working, 
I think they are a great bottom line to start with. But you 
have to be constantly watching, testing them, checking them to 
make sure they work, because the hackers are sophisticated 
people and they try to stay one step ahead of the industry. The 
industry tries to get one step ahead of them, and it is in 
everyone's interest that you keep moving ahead.
    Mr. Lujan. Ms. Glavin, did I hear you correctly? Did you 
say that sometimes the Department of Justice will notify the 
companies that there has been a breach, as opposed to the other 
way?
    Ms. Glavin. Yes. But sometimes that can happen--you know, 
if we get information that they may not have, that we may have 
access to through the course of our criminal investigations. It 
could be a company that may be PCI-compliant, but there was 
always something in the system before they got brought up to 
compliance.
    But, yes, there have been instances that I know of, 
investigations where we have learned about information and that 
we have informed the company about, that you may want to check 
X, Y, and Z.
    Mr. Lujan. Thank you very much, Ms. Glavin.
    Madam Chairwoman, I know we had a lot of briefings and 
discussions with the committee as a whole and the various 
subcommittees on the importance and attention that is needed 
when it comes to data breaches, especially with the attacks 
that we know that are occurring on a regular basis, national 
security, as well as financial institutions.
    I think that in the same regard, when we are talking about 
what the expectations are of the American public with feeling 
secure about the data that could exploit them and expose them 
to these types of crime, often times without them ever knowing, 
is something that we have to take seriously.
    So I thank you very much, Madam Chairwoman and Chairman 
Thompson, for bringing this to the attention and allowing us to 
have a hearing on this today.
    Ms. Clarke. Thank you very much, my colleague. I just want 
to correct the record, at least vocally, that my colleague's 
name is Mr. Lujan.
    Mr. Lujan. Thank you very much.
    Ms. Clarke. Very well. Some of your responses to my 
colleague's questions were a bit troubling to me. The fact that 
it could take some time before there is communication around a 
vulnerability that is existing within the system, and in that 
amount of time transactions can take place that can lead to 
financial support for criminal endeavors is something we should 
always be concerned about. Time is of the essence, right? If 
you are not getting the level of transparency, for whatever 
reasons, from the private side--in other words, maybe someone 
is ashamed that they met these PCI standards and now they have 
found a vulnerability. As you said, it couldn't have been one 
that existed there prior to them coming up to code. It is still 
important for that information to be shared, notwithstanding 
whatever reasons may inhibit someone from doing so. Because, 
again, these transactions take place so quickly.
    What would you say could expedite the transfers of 
information? What do you think would open up private enterprise 
to really working with law enforcement on a much more timely 
basis, once something is detected, to address it? Do you think 
that perhaps some introspection about the PCI standards would 
help put them on a higher platform for detection?
    Ms. Glavin. The PCI DSS standards--again, as I said before, 
I think one of the key components of those standards is going 
to be the regularly monitoring and testing. Sometimes these 
breaches aren't readily apparent and are hard to detect.
    As I have had it described to me, the breaches can 
sometimes occur such that the best analogy could be that the 
front door of your house gets open and you don't know it. 
Slowly over a period of time, someone may take, piece by piece, 
all of your house. It could happen over a course of months, and 
an entity may not be aware of it.
    So immediate notification could be hard in that type of 
instance. But regularly monitoring and testing, we hope, would 
be a way that they detect it sooner.
    In terms of the information sharing, we support an effort 
such that there be some type of notification to Federal law 
enforcement. How that is done and what particular entity that 
is reported to is something that we are happy to work with this 
committee on, such that it can happen faster and it gets to the 
law enforcement entities that have been in the forefront of 
this, such as the FBI and the Secret Service. But it is 
immediate notification when you see the data breach. Yes, that 
is something that we would like. But sometimes it is not always 
easy that you are going to find that data breach right away.
    Ms. Clarke. Ms. Glavin, I want to thank you for sharing 
with us your perspective on the PCI standards and the payment 
card industry and its relationship to cybercrime. I want to 
thank you for sharing your expertise with us. We look forward 
to working with you further as we look for ways to strengthen 
this part of our concern with regards to the threats that 
exist, the vulnerabilities that may exist within the payment 
card industry. Thank you very much.
    Ms. Glavin. Chairwoman Clarke, thank you very much. We look 
forward to working with you.
    Ms. Clarke. Thank you. I would like to acknowledge the 
work, Ms. Glavin, of your senior counsel, Kim----
    Ms. Glavin. Kim Paretti.
    Ms. Clarke [continuing]. Kim Paretti in this field, and I 
would like to thank her and her colleagues for their service.
    Ms. Glavin. They have done excellent work.
    Ms. Clarke. We appreciate it.
    The Members of the subcommittee may have additional 
questions for the witness and we will ask you all to respond in 
writing to those questions.
    At this time, the first panel is dismissed and the 
Chairwoman calls out the next panel.
    I welcome the second panel of witnesses. Our first witness 
is Robert Russo, Director of the Payment Card Industry Data 
Security Standards Council. Welcome.
    Our second witness is Joseph Majka, Head of Fraud Control 
and Investigation, Global Enterprise Risk for Visa.
    Our third witness is Michael Jones, Chief Information 
Officer for Michaels Stores.
    Our fourth witness is Dave Hogan, Senior Vice President and 
Chief Information Officer for the National Retail Federation. I 
thank you all for being here today.
    Without objection, the witnesses' full statements of Andrew 
Cochran, an expert on terrorism financing, and Kirsten Trusko 
on behalf of the Network Branded Prepaid Card Association will 
be inserted into the record. Hearing no objection, so ordered.
    [The information follows:]
 Statement for the Record Submitted by Andrew R. Cochran, Founder and 
                  Co-editor, The Counterterrorism Blog
                             March 31, 2009
    Chairwoman Clarke, Ranking Member Lungren, and Members of the 
committee, I appreciate the opportunity to submit a written statement 
on the subject of terrorists' use of credit cards for this important 
hearing. I am the founder and co-editor of The Counterterrorism Blog, 
the first multi-expert internet-based center dedicated solely to 
reporting and analyzing terrorist attacks and counter-terrorism 
policies. Now in its fifth year of operation, The Counterterrorism Blog 
is a highly respected source of objective information and analysis in 
the counter-terrorism community. Our Contributing Experts work in non-
governmental organizations and private businesses worldwide, and 
include over 20 noted experts, including Evan Kohlmann, Douglas Farah, 
Dennis Lornel, Walid Phares, Animesh Roul, Farhana Ali, and Matthew 
Levitt. In addition to earning the plaudits of law enforcement, 
intelligence officials, Members of Congress, and the news media, our 
credibility is evidenced by the fact that al Qaeda attacked us by name 
on Al-Ekhlaas, one of its central messaging forums, last April.\1\ You 
can find us on the internet at http://counterterrorismblog.org/, and 
you can e-mail me.
---------------------------------------------------------------------------
    \1\ ``Al Qaeda Officially Hates The Counterterrorism Blog,'' April 
16, 2008, at http://counterterrorismblog.org/2008/04/
al_qaeda_officially_hates_the.php.
---------------------------------------------------------------------------
    Our Contributing Experts have reported often on terrorists' use of 
stolen credit card information, and they speak often about the subject. 
On February 29, 2008, I chaired a special panel, ``Meta-Terror: 
Terrorism and the Virtual World,'' with two Contributing Experts (Evan 
Kohlmann and Roderick Jones) and the senior vice president and chief 
technology officer of VeriSign.\2\ During that event, our discussion 
included how a senior al Qaeda operative financed operations through 
the use of stolen credit card information. Dennis Lormel, who founded 
and ran the Terrorist Financing Operations Section at the FBI and 
investigated the financing of the 
9/11 attacks, has several posts on terrorists' use of credit cards.\3\ 
Matthew Levitt and Contributing Expert Michael Jacobson cited the use 
of credit card fraud to finance two deadly attacks in a New Republic 
article this year.\4\ I invite the committee to review the cited works 
in detail, and I will quote from and/or summarize their main points for 
the committee's consideration as follows:
---------------------------------------------------------------------------
    \2\ Complete transcript at http://counterterrorismblog.org/2008/03/
event_transcript_and_related_l.php.
    \3\ ``Terrorists and Credit Card Fraud . . . a Quiet Epidemic,'' 
February 29, 2009, at http://counterterrorismblog.org/2008/02/
terrorists_and_credit_card_fra.php, and ``Credit Cards and 
Terrorists,'' January 16, 2008, at http://counterterrorismblog.org/
2008/01/credit_cards_and_terrorists.php.
    \4\ Summarized in ``Drug Wars,'' Michael Jacobson, January 27, 
2009, at http://counterterrorismblog.org/2009/01/drug_wars.php.
---------------------------------------------------------------------------
    1. Credit cards are extremely vulnerable to fraud and are used 
        extensively by terrorists. The internet not only serves as a 
        learning tool for terrorists but also functions as a mechanism 
        to steal credit card information through hacking, phishing, and 
        other means. In many instances, when terrorist operatives are 
        apprehended, they have multiple identifications and credit 
        cards in a variety of names in their possession.
    2. The terrorists who executed the devastating 2004 Madrid train 
        bombings, which killed almost 200 people, and who carried out 
        the deadly July 7, 2005, attacks on the transportation system 
        in London were self-financed, in part through credit card 
        fraud.
    3. Imam Samudra was a key operative of the al Qaeda-linked 
        terrorist group Jamaah Islamiah in Indonesia, and was the 
        mastermind behind the Bali nightclub bombings in 2002 which 
        killed over 200 people. While in prison in 2004, he wrote a 
        jailhouse manifesto, with a chapter, entitled ``Hacking, Why 
        Not.'' In it, he urged fellow Muslim radicals to take holy war 
        into cyberspace by attacking U.S. computers. Samudra described 
        America's computer network as being vulnerable to hacking, 
        credit card fraud, and money laundering. Samudra discussed the 
        process of scanning for Web sites vulnerable to hacking and 
        then discussed the basics of on-line credit card fraud and 
        money laundering. Interestingly, in 2004, Indonesian police 
        asserted that Indonesia had more on-line credit card fraud than 
        any country in the world.
    4. Younes Tsouli, aka ``Terrorist 007,'' and his two associates, 
        Waseem Mughal and Tariq al-Daour, used computer viruses and 
        stolen credit card accounts to set up a network of 
        communication forums and Web sites that hosted everything from 
        tutorials on computer hacking and bomb making to videos of 
        beheadings and suicide bombing attacks in Iraq. They raised 
        funds through credit card information theft and fraud, which 
        were used to support the communications, propaganda, and 
        recruitment for terrorists worldwide, as well as to purchase 
        equipment for Jihadists in the field. One expert described 
        their activities as ``operating an on-line dating service for 
        al Qaeda.'' The three men pled guilty to inciting terrorist 
        murder via the internet.
    Set forth below is a snapshot of the extent of credit card 
information theft and fraud they were responsible for:
   Stolen credit card numbers and identities were used to buy 
        Web hosting services. At least 72 stolen credit card accounts 
        were used to register more than 180 Web site domains at 95 
        different Web hosting companies in the United States and 
        Europe.
   On one computer seized from al-Daour's apartment, some 
        37,000 stolen credit card numbers were found. Alongside each 
        credit card record was other information on the identity theft 
        victims, such as the account holder's address, date of birth, 
        credit balances, and limits.
   More than $3.5 million in fraudulent charges were made using 
        credit card accounts stolen via on-line phishing scams and the 
        distribution of ``Trojan horses.''
   The men purchased sophisticated equipment needed by 
        jihadists in the field and other operational resources, 
        including hundreds of prepaid cell phones, and more than 250 
        airline tickets using 110 different credit cards at 46 airlines 
        and travel agencies.
   They laundered money through on-line gambling sites, using 
        accounts set up with stolen credit card numbers and victims' 
        identities. The trio conducted 350 transactions at 43 different 
        on-line wagering sites, using more than 130 compromised credit 
        card accounts.
    The terrorists apparently obtained some stolen data through 
contacts with Russian-based criminal gangs, and they traded this 
information with criminal syndicates. In the 1990's, al Qaeda would 
steal a handbag to get one credit card to raise funds. Now they will 
just buy this data on-line and get thousands of credit card details. 
Once credit card information winds up in the hands of criminal 
syndicates, it can be easily transmitted to terrorists.
    5. The Liberation Tigers of Tamil Eelam (LTTE), a.k.a. the ``Tamil 
        Tigers,'' use credit card fraud as an international means of 
        financing terrorist activities. Four men, believed to be 
        associated with the Tigers, were arrested this year in Toronto 
        on charges of debit and credit card fraud for possessing 
        numerous gift cards containing bank account and debit 
        information from individuals in the United Kingdom. Further 
        investigation found laptop computers and memory sticks 
        containing bank information for thousands of U.K. bank 
        customers. A massive credit and debit card fraud case in the 
        United Kingdom, involving up to 200 British gasoline stations, 
        is apparently another Tamil Tigers operation. The alleged 
        subjects obtained credit and debit card information at gasoline 
        pumps through the use of skimming machines, with the loss was 
        estimated to be as much as $72,000,000.
    I look forward to reviewing the committee's review into the 
effectiveness of the PCI standards to reduce data breaches, identity 
theft, and the potential funding of terrorism, and I stand ready to 
assist the committee in that mission.
                                 ______
                                 
Statement for the Record Submitted by Kirsten Trusko, on Behalf of the 
                Network Branded Prepaid Card Association
                             March 31, 2009
    Chairwoman Clarke and Members of the subcommittee, I am Kirsten 
Trusko, President and Executive Director of the Network Branded Prepaid 
Card Association (``NBPCA'' or Association''). We are a non-profit 
trade organization, which seeks to serve consumers, businesses, and 
Government through unique applications of network branded prepaid 
cards, and in doing so supports the growth and success of network 
branded prepaid cards. We represent the common interests of the many 
players in this new and rapidly growing payment category. The NBPCA's 
members include banks and financial institutions, the major card 
networks, processors, program managers, marketing and incentive 
companies, card distributors and law firms. For additional information 
about our organization, may we suggest you visit our Web site, 
www.NBPCA.com. I am delighted to submit factual information that we 
hope will help to address your questions on a topic that is of utmost 
importance to our members: accurately understanding and mitigating the 
potential risks posed by network branded prepaid cards.
    This document is designed to outline the following topics, at a 
high level. Should you have follow-up questions, please let us know.
    1. What is a network branded prepaid card and how does it differ 
        from other cards?
    2. Why is this card type growing and popular (including quotes from 
        the Federal Reserve and Office of the Comptroller)?
    3. What are the facts to correct misperceptions about network 
        branded prepaid cards?
    4. How are NBPCA's members working with legislators, regulators, 
        and law enforcement to mitigate the potential for misuse of the 
        cards?
             i. what are ``network branded prepaid cards''?
    We hope to clarify some misconceptions by being clear about the 
facts.
   First, there are many types of plastic, magnetic-striped 
        cards that are all called ``prepaid.'' That is, before one uses 
        the card to make a purchase, one must pre-pay the funds, which 
        are held by a bank. The cardholder uses the cards to gain 
        access to the funds. You cannot spend a $50 gift card, for 
        example, until the $50 has been paid in advance.
   However, not all prepaid cards are ``network branded.'' 
        Network branded cards (sometimes referred to as ``open loop'' 
        or ``open system'' cards) are issued by regulated financial 
        institutions, carry the brand of a major card network (such as 
        American Express, Discover, MasterCard or Visa) on the front of 
        the card, and are generally \1\ usable anywhere that brand is 
        accepted. Some network branded prepaid cards are also usable at 
        ATMs to obtain cash for limited daily amounts.
---------------------------------------------------------------------------
    \1\ We say ``generally'' because some network branded prepaid cards 
have specialized usage which creates some limitations. For example, 
``teen cards'' are designed so that they cannot be used in liquor 
stores, and health cards may have restrictions to health-only merchants 
and/or purchases.
---------------------------------------------------------------------------
   Although many network branded prepaid cards display the word 
        ``DEBIT'' on the front of the card, they are not ``debit 
        cards'' in the classic sense of the word. That is, network 
        branded prepaid cards are not linked to an individual's 
        personal checking, savings, or other bank account. Instead, the 
        funds are held in pooled bank accounts with data that links 
        each card to the cardholder's funds. This distinction enables 
        the under-banked population to use these cards to receive child 
        support, unemployment, and other funds that are essential to 
        daily life, transaction that are very difficult to administer 
        on a cash-only basis.
   Network branded prepaid cards are also separate and distinct 
        from ``retailer gift cards'' (sometimes referred to as ``closed 
        loop'' cards). Retailer gift cards are not issued by a 
        financial institution and can only be used at one location (or 
        at one chain of affiliated locations). Retailer gift cards are 
        issued by a restaurant, store, hotel, or other retail service 
        provider solely for use to purchase goods or services at the 
        issuing retailer's establishment.
   Attached to this testimony are pictures of some popular 
        network branded prepaid cards issued by our members.*
---------------------------------------------------------------------------
    * The information referred to has been retained in committee files.
---------------------------------------------------------------------------
     ii. why have network branded prepaid cards become so popular?
    Network branded prepaid cards are a relatively new and growing 
product, largely developed in response to market needs not being met by 
other card types. They enable electronification of payments and the 
supporting data trail, to capture what was previously transacted with 
check or cash. They support specific applications by customer need 
(e.g. the under-banked consumer as mentioned earlier) and help to 
reduce costs and provide a better accounting/data trail for businesses 
and Government than when using cash or checks.
    The popularity of network branded prepaid cards is attributable to 
their unique ability to address cardholder needs in a variety of 
situations including health care, disaster relief operations, payroll, 
Government benefit payments, and gifting.
    The benefits that network branded prepaid cards provide was noted 
in an article published by the Philadelphia Federal Reserve Bank's 
Payment Card Center:

``The benefits that open-system prepaid cards offer for consumers, 
providers, and issuing banks contribute to the increased adoption of 
these payment applications. Consumers use these cards to pay bills, 
make purchases, and access cash from ATM networks. Prepaid cards can 
also be used to secure car rentals and to make hotel and air travel 
reservations. At the same time, holders of prepaid cards need not 
secure a traditional banking relationship nor gain approval for a 
deposit account or revolving credit. Prepaid card providers may be 
nonbank third parties, such as employers and payroll processing 
companies, that can use prepaid cards as a means to convert paper 
disbursements, such as payroll checks, benefit claims forms, travel 
checks, gift certificates, and government checks, to less costly 
electronic payments. Finally, bank card issuers have an opportunity to 
serve a broader set of consumers. By offering prepaid cards, issuing 
banks may meet the financial needs of consumers who may not otherwise 
qualify for more traditional banking products, and these banks may do 
so with a card-based electronic payment application that essentially 
eliminates credit risk for the bank. (Cheney and Rhine, Prepaid Cards: 
An Important Innovation in Financial Services, Philadelphia Federal 
Reserve Bank Payment Center (Originally published in conjunction with 
the American Council on Consumer Interests (ACCI) (July 2006)).''

    Additionally, the Office of the Comptroller of the Currency, in a 
July 2005 report, (http://www.occ.treas.gov/cdd/payrollcards.pdf) 
compared the cost of network branded prepaid payroll cards versus the 
alternatives available to the under-banked, noting the following 
benefits:
Benefits to Employers
   Reduced bank processing fees and check handling fees;
   Reduced check printing costs;
   Reduced likelihood of check fraud;
   Reduced check reconciliation costs;
   Increased employee productivity (e.g., not needing time off 
        during work to cash or deposit paycheck);
   Reduced lost/stolen check replacement costs.
Benefits to Employees
   Reduces or eliminates check cashing fees;
   Offers ability to make purchases using credit card networks;
   Offers 24-hour access to funds via ATMs; no need to wait in 
        lines;
   Reduces the need to carry a lot of cash;
   Makes money transfers more easily available to families;
   Provides a pseudo-bank account--funds do not need to be 
        withdrawn entirely as with using a check casher;
   Please refer to Table 5 in the OCC report as it documents 
        their comparison of consumer costs across Payroll card, Check 
        Casher, and Basic Bank account, reflecting Payroll card as the 
        option least costly to the consumer.
   iii. misunderstandings/myths about network branded prepaid cards.
    Despite the many benefits of network branded prepaid cards, aspects 
of these products are misunderstood. This may be because organizations 
not typically associated with financial products are sometimes involved 
in the creation and distribution of network branded prepaid cards. For 
example, some network branded prepaid cards are available through non-
traditional distribution channels such as supermarkets and drug stores. 
Misconceptions about network branded prepaid cards, which have gained 
currency through repetition, have the potential to affect the industry 
negatively--particularly with respect to issues relating to money 
laundering risks. My testimony today addresses several major 
misconceptions by providing factual information that supports a fair 
and accurate assessment of money laundering risks associated with 
network branded prepaid cards. Here are some misunderstandings about 
network branded prepaid cards:
    Myth No. 1: Prepaid cards are unregulated or loosely regulated.--
Every network branded prepaid card (i.e., those carrying the logo of 
American Express, Discover, MasterCard, or Visa) is issued by a highly 
regulated financial institution or other regulated organization. As 
such, network branded prepaid cards are subject to exam, review, and 
oversight. For example, the FFIEC BSA/AML Bank Examination Manual (July 
2006) sets forth specific requirements for examining banks regarding 
their ``electronic cash'' products (which encompasses ``stored value'') 
including OFAC screening, transaction testing, and monitoring for 
suspicious activity. In addition, many prepaid card program managers, 
distributors, and organizations that perform specific functions 
relating to processing or distributing network branded prepaid cards, 
are regulated by State banking departments as money transmitters or 
check sellers. As such, they also are subject to exam, review, and 
oversight. State regulators are increasingly requiring money 
transmitters to:
    (1) Register as Mobs with FinCEN,
    (2) Have AML policies that address customer due diligence, OFAC 
        screenings, and suspicious activity monitoring, and
    (3) Have independent reviews of their AML policies.
    Altogether, there are over 50 laws/regulations that apply to 
network branded prepaid cards. The applicability of these laws/
regulations depends on a number of factors including the charter of the 
financial institution issuer.
    Myth No. 2: Prepaid cards are ``ideal'' for money laundering.--
Network branded prepaid cards are actually less useful for money 
laundering than many other payment products for the following reasons:
   The value associated with network branded prepaid cards 
        issued in the United States consists of funds held in a bank 
        account in the United States. These funds can--at any time--be 
        frozen by the card issuer and/or forfeited entirely. Unlike 
        ``bearer instruments'' or chip-based cards, where whoever holds 
        the product also holds the value, network branded prepaid cards 
        keep the value separate, making the products less attractive to 
        criminals.
   All network branded prepaid cards are processed through an 
        on-line system that requires electronic authorization from the 
        payment network prior to completing a purchase transaction at 
        the point of sale or obtaining cash from an ATM.
   The system enables card issuers to decline an authorization 
        and/or to cancel the ability to use a prepaid card. The ability 
        of the card issuer to terminate a card's usefulness, without 
        requiring possession of the card, is critical--and is a feature 
        not shared by most traditional payment products. The on-line 
        system tracks and records every use of every network branded 
        prepaid card. Unlike paper payment products (such as checks, 
        travelers checks, money orders, and cash), network branded 
        prepaid cards leave a traceable trail of use including place, 
        time, date, amount, and often the nature of the transaction. 
        This trail has already assisted law enforcement in tracking 
        illicit activity through use of prepaid cards.
   If a network branded prepaid card issuer identifies unusual 
        or suspicious activity, the card can be blocked from further 
        use. Card programs routinely monitor card activity and, as 
        appropriate, file suspicious activity reports (SARs) or notify 
        law enforcement.
    Myth No. 3: Network branded prepaid cards can be both anonymous and 
permit ATM access, with liberal load limits or no limits on the amount 
of cash that can be accessed.--Today, ``anonymous'' (meaning that no 
identifying information is obtained from the purchaser and verified) 
network branded prepaid cards are limited to the gift or reward card 
category (although many network branded gift/reward cardholders are 
identified and verified as well). Such anonymous gift/reward cards have 
significant restrictions that minimize risk of misuse such as a 
relatively low maximum dollar value, no ability to access cash through 
ATMs, and no ability to load additional funds after the initial funds 
are depleted. In addition, some issuers restrict usage of anonymous 
cards to the United States.
    Myth No. 4: Prepaid card issuers do not require Customer 
Identification Programs (CIP) nor OFAC screening for individual prepaid 
cardholders.--Reloadable, cash-accessible network branded prepaid cards 
are not available anonymously. Issuers routinely subject individuals 
purchasing such cards to CIP and OFAC screening, to the same extent as 
is required for financial institutions opening ``accounts'' under the 
Bank Secrecy Act. These verification and screening procedures are 
identical to those conducted when any on-line bank account is opened.
    Myth No. 5: A consumer can use cash to purchase a high-value, 
reloadable network branded prepaid card from a j-hook and use it 
anonymously.--When a consumer purchases a reloadable network branded 
prepaid card from a j-hook in a retail location, a process called 
``activation'' is typically required before the cardholder may use the 
card for a purchase or to access cash. In other words, although the 
consumer may purchase the card without identity verification, he/she 
may not use the card until the identity verification process is 
complete. The activation process typically involves the cardholder 
telephoning the card issuing financial institution (or a specialized 
organization with which the issuer has contracted) and providing 
personal identification information. The financial institution then 
verifies various elements of customer information including name, 
address, Social Security Number, and/or date of birth using a third-
party authentication system such as Experian, Lexis-Nexis, or Equifax--
just as they would a bank account. The issuer also screens customers 
against the OFAC Specially Designated Nationals list. If the cardholder 
does not ``pass'' this process, the card is either not usable or not 
reloadable.
      iv. the nbpca's anti-money laundering recommended practices
    In February 2008, the NBPCA released its ``Recommended Practices 
for Anti-Money Laundering Compliance for U.S.-based Prepaid Card 
Programs.'' The document provides recommendations for all network 
branded prepaid card industry participants to support compliance with 
the U.S. Bank Secrecy Act (BSA) anti-money laundering (AML) program 
requirements. It recommends how to implement internal controls, monitor 
and manage third parties involved with prepaid card processes and 
mitigate risks associated with money laundering.
    To ensure the document addresses the questions and concerns of law 
enforcement and Government agencies, the NBPCA has and will continue to 
maintain an open dialogue with Federal, State, and local regulatory 
agencies as well as law enforcement officials. The document address 
risks identified through information sharing between the industry and 
critical agencies that monitor financial crime. ``Recommended Practices 
for Anti-Money Laundering Compliance for U.S.-based Prepaid Card 
Programs'' is a practical guide to setting up, implementing, and 
auditing a compliance program. It covers the following areas:
    1. How to conduct a risk assessment.
    2. How to establish a set of internal controls to achieve 
        compliance with AML program requirements of the BSA.
    3. Federal reporting requirements and red flags to look for with 
        respect to suspicious activity.
    4. Adopting and implementing programs to comply with know your 
        customer requirements.
    5. Reducing risk when working with non-financial institutions, 
        third-party agents, and processors.
    6. How to implement independent compliance testing.
    7. Training program guidelines for key personnel.
    The NBPCA has made ``Recommended Practices for Anti-Money 
Laundering Compliance for U.S.-based Prepaid Card Programs'' available 
to anyone in the prepaid card industry. The report, which can be 
downloaded from the NBPCA Web site at www.nbpca.com, has been widely 
praised and was well-received both by Government and private entities.
   v. the nbpca's role on the bank secrecy act advisory group (bsaag)
    In 2008 the NBPCA was selected for membership in the Bank Secrecy 
Act Advisory Group (BSAAG), a group made up of industry 
representatives, regulators, and law enforcement, implemented by an act 
of Congress. BSAAG's role is to advise the Department of Treasury's 
Financial Crimes Enforcement Network (FinCEN) on matters related to 
anti-money laundering risks and Bank Secrecy Act compliance. In 
addition to its role on BSAAG, the NBPCA co-chairs the Stored Value 
Subcommittee, a subcommittee focused on the potential risks presented 
by prepaid cards and the ways to mitigate those risks.
             vi. risks presented by data security breaches
    Data security breaches and the misuse of consumer account 
information by criminals and money launderers is an increasing problem 
for the U.S. payment system. Because network branded prepaid cards use 
the same card payment infrastructure as credit cards, prepaid 
cardholders can be victims of such data security breaches. However, 
because prepaid cards are not connected to an individual's bank account 
or credit card accounts, the risks posed by such data breaches tend to 
be far less for prepaid card issuers than they are for credit and debit 
card holders. This is one of the reasons consumers who also use credit 
and debit cards, are attracted to prepaid card use as any breach of the 
card limits access to only the balance available on the card. And of 
course, like credit and debit cardholders, most network branded prepaid 
card holders are protected against losses from unauthorized use, thanks 
to the card brands' ``zero liability'' policies which are incorporated 
into the payment network operating regulations governing issuers.
                            vii. conclusion
    Network branded prepaid cards are a new and valuable payment 
product for consumers, businesses, and Government. As with any payment 
product, network branded prepaid cards can be misused by the criminal 
element. Nevertheless, the NBPCA has long encouraged practices that 
reduce the opportunities for prepaid cards to be used in illicit 
activities. Prepaid cards are vital and important products which serve 
a substantial number of people, including those that are under-banked 
and would have no other connection to the banking infrastructure so 
critical to daily life in the United States. The NBPCA continues to 
support national and international efforts to combat money laundering, 
terrorist financing, and financial crime. We are also committed to 
ensuring that our products are available to help consumers and 
businesses maintain access to the payment system, have secure and 
protected payment products, and reduce costs and inefficiencies for 
consumers, businesses, and government.

    Ms. Clarke. I now ask each witness to introduce yourself 
and summarize your statement for 5 minutes beginning with Mr. 
Russo.

STATEMENT OF ROBERT RUSSO, DIRECTOR, PAYMENT CARD INDUSTRY DATA 
                   SECURITY STANDARDS COUNCIL

    Mr. Russo. Thank you, Chairwoman Clarke. Thank you for the 
opportunity to testify on the critical issue of payment card 
data security. Payment card fraud concerns every American and, 
in a global economy, every consumer worldwide. The payment card 
system is one that manages billions of transactions 
representing trillions of dollars moving across a global 
network. Reducing payment card fraud and constantly innovating 
to stay ahead of it is a critical challenge.
    The PCI Security Standards Council was formed in 2006 just 
for that purpose. Our mission is to protect cardholder data 
from criminal elements who constantly manufacture new and 
inventive ways to compromise security systems.
    At the center of our efforts to do this are three 
standards. Let me tell you about each.
    First, the PCI Data Security Standard, or the DSS, is a set 
of 12 security practices based on six core principles. The DSS 
covers everything from securing applications, to networks, to 
their perimeters, to maintaining an incident response plan.
    Second, our payment application data security systems is 
designed to ensure that payment applications, which are found 
in many retailers, are not storing sensitive payment card data.
    Third, the PIN security requirements ensure that the PIN 
entry devices, devices that you may see at a checkout line to 
enter your PIN number, have been designed to properly encrypt 
the customer's PIN and are tamper-proof.
    But new threats continue to emerge. That is why development 
and review of the PCI standards is a critical process and why 
the PCI Security Standards Council takes it seriously. We 
engage our community of participating organizations, more than 
500 merchants, processors, financial institutions, technology 
companies, Government, academia, and trade associations 
worldwide to ensure our standards meet the latest threats, and 
when new threats emerge we have mechanisms to take swift 
action.
    These include regular updates to our testing procedures, 
monthly Webinars with both assessors and merchants; flash 
bulletins on emerging threats; as well as on-going updates to 
the standards themselves.
    Our goal is simple: To have every organization that stores, 
processes or transmits cardholder data do so in accordance with 
the PCI standards. I have no doubt that compliance with the PCI 
standards is an entity's best line of defense against payment 
card data compromise. In fact, we have never found a breached 
entity to have been in full compliance with the PCI standards 
at the time of a breach.
    But we also recognize that the dynamic nature of any 
organization can render a validated system noncompliant almost 
immediately after a satisfactory compliance report has been 
issued. Effective security is not a one-time snapshot, but 
really a full-length feature film where the organization is 
compliant at each and every frame.
    No standard is perfect. But the PCI security standards have 
proven to be the most effective means of preventing data 
breaches and protecting consumers.
    One final point. In order to assist organizations with 
maintaining and achieving compliance with our standards, the 
Council provides a wide range of resources. For example, the 
on-going training, approval and quality assurance of qualified 
security assessors; a worldwide network of professionals that 
conduct on-site compliance assessment; the validation of a 
worldwide network of approved scanning vendors who do remote 
scanning of networks, secure them against network threats; and 
finally, an education program that includes printed materials, 
on-line resources, Webinars and face-to-face training sessions.
    Payment card fraud is a serious concern demanding a 
serious, continuous and vigorous response. The PCI Security 
Standards Council has made its sole mission the securing of 
cardholder data.
    Thank you and I look forward to answering your questions.
    Ms. Clarke. Thank you for your testimony.
    [The statement of Mr. Russo follows:]
                   Prepared Statement of Robert Russo
                             March 31, 2009
                              introduction
    Chairwoman Clarke, Ranking Member Lungren, Members of the 
subcommittee, thank you for the opportunity to testify on the important 
issue of payment card data security.
    My name is Bob Russo and I am the general manager of the PCI 
(Payment Card Industry) Security Standards Council. The Council is an 
industry standards body responsible for developing security standards 
that merchants (such as retailers, transportation companies, hotels, 
etc.) and payment card transaction processors use to protect customers' 
payment card data as it is stored, processed, or transmitted from the 
point of sale to the card issuer for authorization and subsequent 
processing.
    Payment card fraud is something that concerns all of us, both 
businesses and consumers alike--from the pizza shop down my street to 
the country's largest retailers; from a single parent who manages the 
household finances to the businesswoman who conducts trade globally. 
For the consumer, having one's card data stolen can be an inconvenient 
and stressful experience, even though here in the United States the 
consumer normally bears no liability for any ensuing fraudulent 
transactions. It is also very costly for financial institutions that 
have to mitigate the damage associated with a payment card compromise, 
and for businesses that can lose customer confidence and suffer damage 
to their reputations. Data theft impacts everyone in the payment 
stream.
    The PCI Security Standards Council was formed with the intent of 
providing tools and resources to protect payment card data from all 
threats, regardless of motivation. In the less than 3 years since our 
formation, we have made tremendous strides toward this goal--and our 
efforts continue. We welcome the subcommittee's interest in the topic 
of payment card data protection, and appreciate the Government's on-
going commitment to understanding and exploring the initiatives 
underway to contain and reduce fraud for consumers and businesses 
globally. We look forward to working with the subcommittee to continue 
to reduce payment card data compromise and invite the subcommittee to 
use the Council as a resource as it develops policies to combat 
cybercrime.
    My testimony today will cover the background and history of the 
Council, how we came about, what we seek to do and with whom we work to 
develop and maintain the standards in a dynamic security environment. I 
will also detail some of the tools and resources we have made available 
to the market to enable businesses to secure payment card data wherever 
it is processed, stored, or transmitted.
                about the pci security standards council
    The PCI Security Standards Council, LLC is a global forum for the 
on-going development, enhancement, dissemination, and implementation of 
security standards for payment card data protection.
    The Council was founded in September 2006 by the five major payment 
card brands: American Express, Discover, JCB, MasterCard, and Visa. 
Together, these five brands represent the vast majority of payment card 
transactions both Nation-wide and globally. In coming together, these 
organizations agreed to work together to develop and recognize one set 
of data security standards to protect payment card data that is stored, 
processed, or transmitted.
    Prior to the formation of the Council, each of the payment card 
brands developed their own set of requirements to ensure that the data 
of those carrying their respective cards was maintained in a secure 
fashion. Consequently, retailers and other merchants expressed 
frustration at the challenges of securing payment card data in a way 
that was not universally recognized by all the payment card brands with 
which they did business. Organizations involved in the payment process 
also highlighted their desire for a mechanism to contribute to the 
payment card data security agenda and to provide input and gain insight 
into the security standards they would be using. It is for this reason 
that broad participation and transparency are core tenets of the 
Council's operating principles.
    The Council is but one example of the hundreds of private sector-
based entities that have been formed to develop voluntary consensus 
standards across virtually all branches of industry to serve new needs 
as they arise, thereby helping to ensure that businesses can conduct 
their operations responsibly at home, and competitively around the 
globe. This private sector role in standards development was mandated 
by Congress in 1995 by its enactment of the National Technology 
Transfer and Advancement Act (Pub. L. 104-113) (``the Act''). The Act 
requires Government agencies to dramatically decrease the creation and 
use of ``Government-unique'' specifications in their procurement 
activities, and instead rely on voluntary consensus and private sector 
standards whenever possible, as well as to report, via the National 
Institute of Standards and Technology, their compliance with this 
directive. In 1998, the Office of Management and Budget (OMB) updated 
Circular A-119 to provide additional guidance to the Federal agencies 
on implementing the Act. Under the Act, Government agencies are 
requested to participate in developing voluntary consensus private 
sector standards to the extent that their resources allow. Consistent 
with this mandate, several governmental entities participate in the PCI 
Security Standards development process.
                         the council's mission
    The mission of the PCI Security Standards Council is to enhance 
payment card data security by developing and maintaining appropriate 
security standards and related tools, and driving education and 
awareness of the critical importance of data security. Even though the 
Council is a business-focused organization, this mission has at its 
heart the protection of consumers. The Council works to provide the 
necessary tools and resources that organizations should use to protect 
their customers' payment card data successfully.
    As discussed below, the Council achieves this end by enabling a 
sophisticated, global security infrastructure based upon five highly 
specialized and important mechanisms:
    1. Standards for implementation by both those that store, process, 
        and transmit payment card data, as well as those that sell the 
        devices and other equipment that access and transmit such data.
    2. Approval, training, and on-going quality assurance of a 
        worldwide network of ``Qualified Security Assessors'' (QSAs) 
        that conduct on-site assessments to determine whether those 
        with access to payment card data are in compliance with 
        applicable Council standards.
    3. Approval, training, and on-going quality assurance of a 
        worldwide network of ``Approved Scanning Vendors'' (ASVs) that 
        conduct remote scanning of networks to determine whether those 
        networks are secure against most network-based attacks.
    4. Training and approval of laboratories that can in turn approve 
        certain products to be in adherence with applicable Council 
        standards.
    5. Training and education of payment process participants through 
        classroom sessions, collateral material and webinars, so they 
        are aware of the importance of protecting payment card data 
        from emerging threats and can actively participate in 
        protecting themselves and their customers from attacks.
    how the council differs from other parties in the payment chain
    As a standards body, the Council is responsible for developing and 
maintaining the security standards and other tools necessary to protect 
payment card data within the payment process. The Council publishes 
these standards for anyone to access but specifically for the payment 
card industry's use in security and compliance programs. It is 
important to distinguish between this role as standards custodian and 
industry body from those organizations that may validate compliance or 
enforce compliance through rules, rewards, or actions against parties 
not yet compliant with applicable security standards.
    The Council does not validate the compliance of any entity or 
vendor with its core standard, the PCI Data Security Standard (``PCI 
DSS''). Indeed, like any other organization that develops voluntary 
consensus standards, it does not have the authority or mechanisms to 
enforce compliance to its standards. Consequently, the Council does not 
run standards compliance programs. Instead, each payment card brand 
maintains its own compliance programs based upon the Council's 
standards, adding their own stipulations and requirements for 
demonstrating compliance for those businesses that must comply. 
Therefore, the Council has no direct business relationships with those 
entities that store, process, or transmit payment card data, and does 
not have the responsibility or contractual right to validate 
compliance, enforce, or levy fines for non-compliance with the security 
standards that it publishes. Each of these roles is performed by the 
payment card brands.
                       the council's stakeholders
    In order to be certain that the Council's standards are as clear 
and comprehensive as possible, we seek input from a wide range of 
stakeholders as part of the standards development process. For 
instance, the Council's Participating Organization program is open to 
any organization involved in the payment chain--merchants, banks, 
processors, Government, and academia. To date, more than 500 leading 
national, regional, and global players are part of this effort.
    Participating Organizations provide the Council with real world 
insight and experience in deploying security standards in the field, 
and have deep understanding of the challenges and threat vectors that 
security standards must address. Together, these Participating 
Organizations represent the people who are responsible for securely 
handling and defending consumers' payment card data against attack on a 
daily basis, and therefore provide a valuable resource in feeding 
front-line threat information into the Council.
    From among the Participating Organizations, a smaller group of 21 
representatives are seated as the Council's Board of Advisors every 2 
years through an open election and appointment process. Two-thirds of 
the Board of Advisors are elected, with the remainder appointed to 
ensure adequate geographical and industry representation. These 
organizations act as spokespersons for their respective industries and 
regions and ensure that the Council is able to partner with industry at 
a very detailed and actionable level in the standards-setting process. 
The Board of Advisors is a critical enabler in our mission to secure 
businesses' payment processes and consumers' payment card data 
globally.
    Our current Board of Advisors is composed of leaders in their 
respective industries such as Wal-Mart Stores, Inc., Microsoft, PayPal, 
First Data Corporation, and British Airways. The Board has worked 
tirelessly with the Council over the past 2 years to highlight areas of 
need in the market, and to devise educational resources that are of 
immediate benefit to organizations looking to improve their security.
    I want to recognize here for the record the hard work of our 
Participating Organizations and Board of Advisors, all of whom 
contribute to the Council's security standards in an entirely voluntary 
capacity.
    In addition to our Participating Organizations, the Council's QSA 
and ASV communities, together numbering more than 250 companies 
worldwide, provide valuable insight from the front lines of examining 
merchants and processors systems. QSAs and ASVs are able to provide 
feedback on where the implementation challenges lay and when common 
security vulnerabilities appear. The Council is in constant two-way 
communication with this group through webinars, newsletters, and, of 
course, the Council's annual QSA and ASV retraining and examination 
processes.
                       the pci security standards
    The Council's security standards--the tools it makes available for 
use by public and private sector entities to secure payment card data--
are designed to protect specific parts of the payments process. The 
Council is constantly looking for new ways to secure the payment 
process and maintains a dialogue with its Board of Advisors and other 
industry stakeholders to bring new resources to the market to further 
protect consumer's payment card data. As a result, since its inception 
in 2006, the Council has assumed management responsibility for several 
payment security standards in addition to the more-well known PCI DSS, 
with the mission of increasing payment card data security. I'd like to 
give a brief overview of the standards the Council currently manages 
and updates:
PCI Data Security Standard
    The PCI Data Security Standard is a set of 12 detailed requirements 
designed around six principles fundamental to securing payment card 
data. At the heart of this standard is the requirement that 
organizations do not store sensitive payment cardholder information 
typically contained in the magnetic stripe on the back of the payment 
card. This is the information that criminals want to steal to create 
counterfeit cards. The fundamental principle of the PCI DSS is that 
organizations must not store sensitive data. Where information such as 
the Primary Account Number (PAN) or expiration date is stored, it must 
be rendered unreadable. This generally means that it must be truncated, 
hashed, or encrypted, so that unauthorized access to such data will be 
of limited use to a criminal.
    Along with these fundamentals, the very detailed requirements of 
the PCI DSS cover areas ranging from securing applications, networks, 
and perimeters to maintaining up-to-date security patches and anti-
virus software, to things like developing and maintaining an incident 
response plan and processes for an organization to follow in the event 
of a breach.
The Payment Application Data Security Standard (PA-DSS)
    The Council developed this standard after feedback from our 
Participating Organizations and member brands indicated that software 
applications represented a point of weakness in the payment chain. 
These payment applications range from touchscreen applications you 
might see used in a restaurant, to point-of-sale software used in 
ticketing kiosks in museums and theme parks. Unless otherwise required 
by the customer demanding PA-DSS compliance, some of these payment 
applications may be designed to store sensitive payment card data 
thereby undermining an organization's efforts to comply with the PCI 
DSS. The Council introduced a process that enables payment applications 
to be tested in laboratories to determine whether they are secure, not 
storing payment card data, and whether they are capable of helping, 
rather than hindering, an organization's efforts to comply with the PCI 
DSS. The Council maintains a list on our Web site of validated payment 
applications that have been tested in and approved by laboratories for 
merchants to use in assessing their own applications and making 
informed purchasing decisions.
The PIN Entry Device Security Requirements
    The PIN Entry Device security requirements have the same underlying 
principle as the PA-DSS. They are designed to enable organizations to 
protect consumer's payment card data and ensure that PIN Entry Devices 
have been designed not to store payment card information, thus 
jeopardizing organizations' PCI DSS compliance efforts. As a PIN Entry 
Device is a physical object, these requirements cover not just ensuring 
that a device does not store sensitive data, but also that it is 
tamperproof, and that, should the device be compromised, its contents 
will self-destruct.
    The Council maintains a list at its Web site of approved devices 
that have been successfully tested in Council-approved laboratories for 
merchants to cross-reference against their own devices and to assist 
them in making informed purchasing decisions. The Council is currently 
working to expand the scope of this program to include a broader array 
of device types, including unattended payment terminals such as ticket 
kiosks and self-service machines.

    Development and review of the PCI standards is a continuous 
process. In the case of the PCI DSS, the Council follows a defined 24-
month life-cycle process that incorporates a feedback period from 
stakeholders and allows for periods of review by the Council's Board of 
Advisors, Participating Organizations, QSAs, and ASVs.
    While a planned life-cycle process is important, it is equally 
important that the Council be responsive to emerging threats. As a 
result, we have several mechanisms for on-going communications with 
assessors (QSAs and ASVs), merchants and other stakeholders to provide 
guidance as new threats emerge. These include:
   Errata to the DSS itself;
   Flash bulletins on emerging threats;
   A monthly newsletter to the Assessor community with the 
        latest threat information & corresponding changes required to 
        the assessment process;
   Regular updates to the ASV test scanning environment to 
        reflect new threats emerging ``in the wild'';
   Monthly Webinars with both assessors and merchants;
   Updates to the Council's on-line searchable FAQ and training 
        materials to ensure they include the latest information on the 
        threat landscape.
           the nature of the compliance challenge and process
    Validation of compliance with the PCI Data Security Standard can 
only represent a snapshot in time that coincides with information 
shared with and interpreted by a QSA during the assessment period. 
Unfortunately, the dynamic nature of any organization's systems and 
network environments can result in a wide variety of actions or 
inactions that can render a validated system noncompliant almost 
immediately after a satisfactory compliance report has been issued. As 
a result, effective compliance is a full-length feature film where the 
organization is ``compliant'' at each and every frame of that film. For 
that reason, the Council believes achieving and maintaining compliance 
with PCI DSS and continuous vigilance regarding other security 
practices is an on-going process that must systematically be integrated 
into every organization's development and operational practices and 
policies in order to serve as the best line of defense against a data 
breach.
    The evidence of data breaches demonstrates that criminal elements 
continue to manufacture new and inventive ways to compromise security 
systems, and we can assume that this will continue to be true. The 
Council, its members and others are working diligently to secure 
payment card data against increasingly experienced and organized 
criminals. In spite of the severity of this continually dynamic threat 
landscape, the Council believes achieving and maintaining compliance 
with the PCI DSS is the best line of defense against data breaches.
    It is important to note that the members of the Council report that 
they have never found an entity that has been subject to a data breach 
that was also in full compliance with the PCI DSS at the time of the 
breach. Nonetheless, there is no such thing as perfect security. An 
organization could very well be compliant on the day its QSA wrote its 
assessment report, but noncompliant thereafter, at the time of a data 
breach. Many things can cause the protection to break down--logging 
rules not being followed, delaying installation of software patches, 
installing untested software, etc. Any of these examples (and many 
more) may cause a previously validated company to no longer be 
compliant, and therefore vulnerable to attack. Organizations must not 
take solely a checklist approach to security, or rely on periodic 
validation on a specific day as their security goal, but must instead 
exercise continuous vigilance and maintain a strict security program 
that ensures constant and ongoing PCI DSS compliance.
        the future of the council's efforts and payment security
    To succeed in the fight against cybercriminals who target our 
payment systems will require the continued vigilance and work of all 
parties involved in the payment chain. No system is perfect, and while 
breaches can be expected to continue to occur, through our efforts and 
the pervasive adoption of the Council's standards and the best 
practices it advocates, the work of these thieves will remain as 
difficult as possible.
    When breaches do occur, the Council works with its member brands, 
forensics investigators and, at times, through direct outreach to seek 
information from breached entities, to determine the root causes of the 
breach. If a need to strengthen the Standards or the Council's 
Assessment programs is identified, we have mechanisms in place for 
taking swift action.
                               conclusion
    Once again, I want to thank Chairwoman Clarke, Ranking Member 
Lungren and the subcommittee Members for their oversight of this issue 
and for providing me the opportunity to testify on the important issue 
of payment card data security. We hope that those entities that handle 
payment card data take from this hearing the understanding of their 
responsibilities to consumers, shareholders, and society at large to 
increase focus on their payment security efforts. Using the PCI 
Security Standards should act as a baseline for their doing so. We also 
hope that many more of them will join us as Participating 
Organizations, willing to help shape the future of payment security 
standards based on their own experience of defending payment data 
against attack on a daily basis.

    Ms. Clarke. I now recognize Mr. Majka to summarize his 
statement for 5 minutes.

    STATEMENT OF W. JOSEPH MAJKA, HEAD OF FRAUD CONTROL AND 
       INVESTIGATIONS, GLOBAL ENTERPRISE RISK, VISA, INC.

    Mr. Majka. Chairwoman Clarke and Members of the committee, 
my name is Joe Majka. I am head of Fraud Control and 
Investigations for Visa, Inc. I have been with Visa for over 12 
years, and I have over 28 years of experience in corporate 
security investigations and law enforcement, specializing in 
the area of financial crimes.
    I want to thank the committee for this opportunity to 
appear at today's hearing and to explain who Visa is in our 
role as a leader in global data security. It is important to 
note that Visa's fundamental role is to facilitate transactions 
between millions of consumers and businesses. Visa is not a 
bank and we do not issue payment cards. Visa is a network that 
connects 1.6 billion global payment cards, 29 million worldwide 
merchants, and over 16,000 financial institutions in 170 
countries.
    Through electronic payment networks like Visa, the entire 
economy benefits from a more transparent, cost effective, and 
secure commercial activity.
    I am pleased to be here to talk with you about data 
security and about the payment card industry data security 
standard in particular. In our view, the best way to secure 
payments is by applying two core principles.
    First, security must be a shared responsibility among all 
relative parties--law enforcement, payment companies, 
regulatory agencies, retailers, and others. Only together can 
we protect all parts of our shared system.
    Second, we must collectively apply multiple layers of 
security to protect the system. That includes measures applied 
at the card level such as card verification values or 
transaction alerts, and includes measures applied at the point 
of sale, such as standards for secure devices and best 
practices for data storage, and it includes measures applied at 
the network level, including neural networks and fraud 
monitoring.
    One of the most effective layers we have collectively 
applied to date is the PCI Data Security Standard. Visa 
acquires all entities that store transmitter Visa card data to 
comply with the standards. To our knowledge, no organization 
that is fully implemented and maintained compliance with the 
standard has been a victim of a data compromise event. We 
believe full compliance with the standard is a valuable 
component of a comprehensive security program and greatly 
reduces the risk of data compromise.
    While there have been a few instances where an entity that 
previously validated compliance was a victim of a compromise, 
in all cases our review concluded gaps in the compromised 
entity's PCI DSS controls were major contributors to the 
breach.
    Approximately 90 percent of the U.S. merchants and 80 
percent of third-party processors have validated PCI 
compliance. These organizations, like Michaels, deserve credit 
to enhancing their security practices to meet the minimum 
industry standard and for validating their compliance on at 
least an annual basis.
    This month in Washington, DC, Visa held our third Global 
Security Symposium, a symposium on payment security where Visa 
called on system participants for continued industry 
investment, collaboration, and innovation to keep the 
electronic payment system secure for the future. At this summit 
we heard from numerous individuals and organizations who 
reaffirmed the importance of on-going compliance with the PCI 
standards.
    Visa has maintained a long-standing relationship with law 
enforcement agencies over the years, supporting efforts to 
investigate and prosecute criminals committing payment card 
fraud. This relationship continues and is stronger than ever 
today as Visa and law enforcement agencies work together to 
combat cybercriminals in today's high-tech world.
    Visa was a founding member of the U.S. Secret Service 
Electronic Crimes Task Force in San Francisco and continues to 
actively participate in U.S. Secret Service task force groups. 
Visa also works closely with the FBI Cyber Division, U.S. 
Postal Inspection Service, State attorneys general, and the 
Department of Justice Computer Crime and Intellectual Property 
Section.
    In 2004, Visa provided investigative support to law 
enforcement which resulted in the indictment and extradition of 
Roman Vega, one of the most significant high-level 
cybercriminals at the time. Visa continues to support high-
profile investigations, including the arrests of criminals 
responsible for hacking into Dave and Busters and T.J. Maxx. 
Visa values our partnership with law enforcement and is 
committed to continuing to work closely with law enforcement to 
bring cybercriminals to justice.
    Protecting card holders is always a primary goal in 
responding to data compromise incidents. After learning of a 
data compromise, Visa immediately begins to work with the 
compromised entity, law enforcement, and the affected client 
financial institutions to prevent card-related fraud.
    In closing, securing consumer data within the U.S. economy 
is a shared responsibility, and every industry should deploy 
focused resources to protect consumer information within its 
care. We look forward to working with all participants to 
continue to develop tools to minimize the risk and the impact 
of data-compromise events.
    Thank you for the opportunity to be here today. I would be 
happy to answer any questions.
    Ms. Clarke. Thank you for your testimony.
    [The statement of Mr. Majka follows:]
                 Prepared Statement of W. Joseph Majka
                             March 31, 2009
                              introduction
    My name is Joe Majka. I am the head of Fraud Control and 
Investigations for Visa Inc. I have been with Visa for over 12 years 
and have over 28 years of experience in corporate security, 
investigations, and law enforcement, specializing in the area of 
financial crimes. I want to thank the committee for this opportunity to 
appear at today's hearing and explain who Visa is and our role as a 
leader in global data security. Visa plays a unique role in the 
financial system, facilitating commerce among millions of consumers and 
businesses here and around the globe. It is important to note that 
Visa's fundamental role is to facilitate transactions between consumers 
and businesses. Visa is not a bank. We do not issue payment cards 
(credit, debit, or prepaid), make loans to consumers, or set the 
interest rates or fees associated with card usage or acceptance. Visa 
is a network that serves as the connection point between 1.6 billion 
global payments cards, 29 million worldwide merchants, and 16,600 
financial institutions in 170 countries. In making these connections, 
Visa helps create significant value for each of the participants in our 
system. Consumers receive a more convenient, secure, and widely 
accepted way to make payments. Retailers benefit from the speed, 
efficiency, security, and reliability that only electronic payments can 
provide. They also receive guaranteed payment and can avoid the need to 
extend credit directly to their own customers. In fact, the entire 
economy benefits from electronic payments through more transparent, 
secure, and cost-effective commercial activity. The Visa Payment System 
plays a pivotal role in advancing new payment products and 
technologies, including initiatives for protecting cardholder 
information and preventing fraud.
    We're pleased to be here to talk with you about data security in 
the payment card industry and about the Payment Card Industry Data 
Security Standard in particular. But, I want to put this discussion in 
the context of a multi-layered approach to security that includes fraud 
control measures from the card, to the terminal, through to the Visa 
network. Visa understands that we must protect each link within our 
control and work with others to preserve the trust in every Visa 
payment. Visa is keenly focused on ensuring that payment products are 
not used to perpetrate identity theft or other criminal activity. Our 
goal is to protect consumers, merchants, and our client financial 
institutions from fraud by preventing fraud from occurring in the first 
place. To that end, Visa employs multiple layers of security, of which 
the PCI standard is an important one, but only one of many. We have 
taken a leading role in promoting cardholder information security 
within the payments industry. Visa and our participating financial 
institutions also provide solutions to prevent fraud and protect 
cardholders in the event of a data compromise. These include real-time 
fraud monitoring, identity theft assistance, consumer alerts, and zero 
liability for cardholders on fraudulent transactions. Visa provides 
sophisticated neural networks that enable our client financial 
institutions to block authorization transactions where fraud is 
suspected. Thanks to massive investments and innovative solutions, 
compromise events rarely result in actual fraud and fraud rates in the 
payments industry remain near all-time lows.
    The payment card industry, regulatory agencies, and law enforcement 
have individually and collectively taken extensive measures to prevent 
and mitigate the effects of consumer information compromises. In this 
regard, Visa has required all entities that store, transmit, or process 
Visa card data to comply with PCI DSS standards, has implemented 
incentives to encourage payment participants to make the significant 
investments needed to attain compliance, and has taken numerous steps 
to minimize the amount of cardholder data stored by system 
participants.
              payment card industry data security standard
    PCI DSS was the first security standard adopted by the PCI SSC, but 
it has not been a static standard. The PCI Security Standards Council 
is charged with reviewing and updating the standard to ensure that it 
remains effective to protect card data, by incorporating input from 
stakeholders as well as technological developments in the evolution of 
the standard over time. Visa recognizes that no set of standards can 
provide an absolute guarantee of security in a changing world, and PCI 
DSS is not an exhaustive list of all the security practices that may be 
effective to safeguard card data. To our knowledge, however, no 
organization that has fully implemented and maintained compliance with 
the PCI DSS has been the victim of a data compromise event. Therefore, 
we believe that full compliance with the standard is a valuable 
component of a comprehensive security program and greatly reduces the 
risk of data compromise. We also believe that PCI DSS controls are 
highly effective in mitigating the impact of data compromise events.
    Validating PCI DSS is a major milestone, but achieving and 
maintaining compliance requires companies to make an on-going 
commitment to keeping consumers' data safe--24 hours a day, 7 days a 
week, 365 days a year. While there have been a few instances where an 
entity that previously validated compliance was the victim of a 
compromise, in all compromise cases our review concluded that gaps in 
the compromised entity's PCI DSS controls were major contributors to 
the breach. As such, Visa continues to believe that standards 
validation is a valuable process that drives organizations to undertake 
the minimum steps necessary to protect cardholder data. While it is 
easy to focus on the failures that some entities have had with on-going 
compliance, we believe it is likely that many compromises have been 
prevented as a result of the strenuous efforts of merchants and 
processors to maintain compliance with PCI DSS.
                       visa security initiatives
    Visa leads the payment industry in providing merchants and service 
providers with incentives to validate and comply with PCI DSS in order 
to ensure that they properly protect cardholder data. In particular, 
Visa launched a Compliance Acceleration Program offering $20 million in 
incentive payments to promote compliance among the largest U.S. 
merchants that account for more than two-thirds of Visa annual 
transactions. Visa's combination of incentive payments and potential 
fines ultimately drove the vast majority of large U.S. merchants to 
validate their initial compliance with PCI DSS and to revalidate 
annually thereafter. At this time, approximately 90 percent of large 
U.S. merchants have validated PCI DSS compliance. Visa also publishes a 
list of service providers that have validated compliance with the PCI 
DSS, which has been the principal incentive in driving 80 percent of 
U.S. service providers to validate their compliance on an annual basis. 
These organizations, like Michaels, deserve credit for enhancing their 
security practices to meet the minimum industry standard and for 
validating their compliance on at least an annual basis.
    Visa has also made considerable strides toward eliminating the 
storage by merchants and processors of authorization data, which 
criminals covet to perpetrate fraud. This ``prohibited'' data includes 
full magnetic stripe information, the CVV2 or ``Card Verification Value 
2'' and PIN. Visa has executed a ``drop the data'' campaign over the 
past 3 years to encourage merchants to discontinue storage of 
prohibited data and reduce overall cardholder data storage. 
Additionally, Visa developed security standards for payment application 
vendors to support merchants in their security efforts by driving 
vendors to reduce data storage and provide more secure payment 
application products.
    Visa has executed a robust data security educational campaign to 
engage payment system participants in the fight to protect cardholder 
information. This campaign includes training for financial 
institutions, merchants, and service providers. Most large merchants, 
including Michaels, have attended one of Visa's security training 
seminars. Visa is also committed to educating system participants on 
emerging security threats and publishes regular security alerts and 
bulletins, and holds seminars focused on data security and fraud 
mitigation. Visa has partnered with organizations like the National 
Retail Federation to promote data security among its members and 
commends the NRF and Michaels for their data security efforts. Visa 
outreach also extends to participation in industry forums on data 
security, media campaigns, and partnerships with other industry groups 
made up of merchants, such as the U.S. Chamber of Commerce. This month 
in Washington, DC, Visa held our third Global Security Summit, a 
symposium on payment security where Visa called on system participants 
for continued industry investment, collaboration, and innovation to 
keep the electronic payment system secure for the future. The Global 
Security Summit reaffirmed the importance of on-going compliance with 
security standards and highlighted opportunities to actively engage 
consumers in the process of fraud prevention through Visa's transaction 
alerts and notifications service which can not only help consumers 
track and manage their accounts, but also provide an early warning of 
potentially fraudulent activity.
                   collaboration with law enforcement
    Visa has maintained a long-standing relationship with law 
enforcement agencies over the years, supporting efforts to investigate 
and prosecute criminals committing payment card fraud. This 
relationship continues and is stronger than ever today, as Visa and law 
enforcement agencies work together to combat cyber criminals in today's 
high-tech world. In 2002, Visa was a founding member of the U.S. Secret 
Service San Francisco Electronic Crimes Task Force and continues to 
actively participate in U.S. Secret Service task force groups in San 
Francisco, New York, and Los Angeles. Visa also works closely with the 
Federal Bureau of Investigation's Cyber Division, United States Postal 
Inspection Service, State Attorneys General and the Department of 
Justice Computer Crime and Intellectual Property Section.
    In 2004, Visa provided investigative support to Federal law 
enforcement, which resulted in the indictment and subsequent 
extradition to the U.S. of Roman Vega, known on-line as ``Boa''. Roman 
Vega was allegedly one of the most significant high-level criminals 
specializing in the on-line sale of stolen payment card data at the 
time. Visa has continued with our investigative support on other high-
profile investigations, including the Federal prosecution of Max Ray 
Butler known on-line as the ``Iceman'', arrested by Federal agents in 
2007 and the 2008 arrest of Albert Gonzales, Maksym Yastremskiy, and 
Aleksandr Suvorov for their scheme in which they hacked into Dave & 
Busters, Inc. restaurants. Visa also works closely with local law 
enforcement agencies and local retailers in supporting their effort to 
investigate and prosecute street level criminals using payment cards to 
commit fraud. Visa values our partnership with law enforcement and is 
committed to continuing to work closely with law enforcement to bring 
cyber criminals to justice.
                        recent compromise events
    After learning of data compromise events, Visa immediately begins 
working with the compromised entity, law enforcement, and affected 
client financial institutions to prevent card-related fraud. Visa 
notifies all potentially affected card-issuing institutions and 
provides them with the necessary information so that they can monitor 
the accounts and, if necessary, advise customers to check closely all 
charges on their statements or cancel or reissue cards to their 
customers. Visa card-issuing institutions have the direct 
responsibility and relationship with cardholders, and because of Visa's 
zero liability policy for cardholders, bear most of the financial loss 
if fraud occurs. Visa financial institutions can best determine the 
appropriate action for each customer that might have been affected.
    Based on Visa's findings following recent compromise events at 
Heartland Payment Systems and RBS WorldPay, we have taken the necessary 
step of removing both companies from our on-line list of PCI DSS-
compliant service providers. In addition, we are activating our account 
data compromise recovery programs, which are in place to protect our 
system and help issuers recoup some of their losses from compromise 
events. Visa is committed to working with these processors so they can 
be reinstated to this list upon successfully revalidating their 
compliance and Visa is not penalizing merchants that continue to 
utilize these processors. Protecting our cardholders was, and remains, 
Visa's primary goal in responding to this incident.
                               conclusion
    In closing, securing consumer data within the U.S. economy is a 
shared responsibility, and every industry should deploy focused 
resources to protect consumer information within its care. In this 
regard, the payment card industry has done more than any other to 
provide stakeholders with the tools and guidance that they need to 
properly secure the data they are trusted to protect. Visa has led the 
industry in protecting cardholder data and stands ready to continue to 
support industry participants in our collective fight against the 
criminals that perpetrate card fraud. We look forward to working with 
all participants to continue to develop tools to minimize and 
eventually eliminate the risk of data compromise in our economy. Thank 
you for the opportunity to present this testimony today. I would be 
happy to answer any questions.

    Ms. Clarke. I now recognize Mr. Jones to summarize his 
statement for 5 minutes.

  STATEMENT OF MICHAEL JONES, SENIOR VICE PRESIDENT AND CHIEF 
           INFORMATION OFFICER, MICHAELS STORES, INC.

    Mr. Jones. Good afternoon, Madam Chairwoman, Members of the 
committee.
    I have been in retail for 30 years, 20 in retail IT, the 
last 4 with Michaels, a $4 billion merchant. I wish I could say 
that attempting to follow the PCI mandates made me confident 
that credit card data is completely safe, but unfortunately 
that is not the case. This is because the mandates have been 
developed from the perspective of the card companies rather 
than from those who are expected to follow them.
    The PCI data and security standards are an extraordinarily 
complex set of requirements; they are very expensive to 
implement, confusing to comply with, and ultimately subjective 
both in their interpretation and in their enforcement. The 
program is rife with ambiguity and complexity. As an example, 
must every company associate acknowledge the security policy of 
a company? All 40,000 of our associates, or just those involved 
with credit transactions? This one PCI mandate has been imposed 
by compliance vendors differently at retailers all across the 
country.
    We have been questioned by customers, legislators, and even 
the credit card companies themselves, why do you keep credit 
card information at all? One reason we keep the information is 
related to another credit card company procedure designed to 
protect their banks from loss. It is called a chargeback. It 
can be initiated by a bank on its own, or it can be initiated 
at the request of the bank's customer.
    For example, if a customer spots a charge on their credit 
statement that they don't recognize, they can initiate a 
chargeback by contacting the issuing bank. The retailer is then 
charged with retrieving sales media by card number. If the 
retailer is unable to produce that sales media, or something on 
that sales media does not match, the retail sale is reversed, 
and the cost of the transaction is charged back against the 
retailer. This is true even if the transaction may have 
actually been made. This could have been fairly easily solved 
using a unique approval ID for each transaction, thus 
eliminating the need for credit card number storage by the 
retailer.
    PCI states that all credit card data must be encrypted. 
There is an exception to this requirement, however; PCI states 
that data traveling over a private network need not be 
encrypted. While a private network is more secure, I still 
would not choose to send credit card numbers through this 
number unencrypted. Why? Because it adds unnecessary risk. 
However, the credit card companies' financial institutions do 
not accept encrypted transactions.
    We at Michaels have asked, for the past 3 years, for the 
ability to send encrypted information to the bank. To date, 
this has not happened. Why is this an issue? One might ask the 
consumers affected by the Heartland Payment Systems data 
breach, or TJX Corporation, for that matter. It has been 
suggested that methods used in those breaches capitalized on 
this flaw.
    What can be done to improve this situation? First, many of 
the PCI requirements are covered by the Sarbanes-Oxley audits. 
This causes a lot of duplicative work around proof of 
compliance and is, arguably, unnecessary.
    Second, the requirements are one-sided against the 
merchants. The very financial institutions that impose them are 
not subject to the mandates themselves.
    Third, the PCI Data Security Standards Council was 
allegedly spun off from the credit card companies and set up as 
an independent governing body of credit card company, bank, and 
merchant representatives. In fact, the council is set up so 
that credit card companies and banks retain all power over the 
ultimate mandates, fines, and anything else connected to PCI. 
It is not an industry standards body.
    When a breach occurs, and card data is stolen, clearly the 
consumer potentially suffers the most inconvenience. 
Fortunately, the law provides that promptly reporting consumers 
must be held financially harmless. However, the largest 
financial impact is on the retailer, especially if the credit 
card company's data--which, by and large, we do not want--is 
seized from a retail location. The retailer is in the press, 
the retailer is demonized, the retailer is threatened with 
damages and sanctions. The retailer pays the cost of the 
fraudulent transactions. All of this arises from rules that 
initially grew from a card monopolist that we have no choice 
but to do business with or risk the loss of a large portion of 
our business.
    We do not need more laws. The existing, sometimes 
misguided, enforcement and the proliferation of State 
regulations around these issues have created a difficult, if 
not impossible, environment for retailers.
    In conclusion, I am proud to report that Michaels has never 
had evidence of a breach of consumer data. Regardless of the 
outcome here, we will continue to do what is necessary to keep 
card data safe, but in the future we would be more secure, and 
the risks to us all far lower, were the card companies to take 
greater responsibility for the inadequate system of payment 
they have created and asked us to use.
    Thank you. I am happy to answer any questions.
    [The statement of Mr. Jones follows:]
                  Prepared Statement of Michael Jones
                             March 31, 2009
    Good afternoon, Madam Chairwoman, fellow committee Members, and 
distinguished panel members. I am Michael Jones; I serve as the senior 
vice president and chief information officer (CIO) for Michaels Stores, 
Inc. reporting to the chief executive officer. Thank you for inviting 
me to discuss the security aspects of credit cards as they impact 
consumers at retail locations and especially at Michaels.
    Michaels Stores, Inc. is the largest specialty retailer of arts and 
crafts. With more than 1,000 stores in the United States and Canada, 
the company carries a wide selection of arts and crafts merchandise. 
Michaels also operates specialty stores under different brand names, 
including Aaron Brothers and Artistree manufacturing facility. We have 
annual revenues approaching $4 billion.
    I have been with Michaels Stores in my current role for 4\1/2\ 
years. I held the CIO position at Hollywood Video prior to Michaels for 
over 3 years. Prior to that I spent over 12 years at Kmart, and Kmart-
related companies, in various leadership positions in retail 
technology. I have been in the retail and restaurant industry since 
graduate school, and indeed, since my sixteenth birthday.
    I appreciate the committee's invitation to provide a retailer's 
view of the state of credit card security. In addition to my own 
experience I often communicate about this issue with my peers at 
retailers, restaurants, and other establishments that take credit cards 
from consumers as a form of payment. My comments today are informed by 
those discussions as well.
    At Michaels the customer is at the center of everything we do. Her 
loyalty and patronage of our stores is something we can not afford to 
lose for any reason. We always want her to feel safe and secure when 
she is in our stores, with the products we sell, and with the payment 
mechanism she chooses: Whether that be cash, checks, debit cards, gift 
cards, travelers checks, or credit cards. For many years we have 
implemented security standards and processes to protect our customers 
and their important financial information, with our preference always 
being to keep the least amount necessary to satisfy the payment 
process. Losing the trust of our customers because we can not safeguard 
their information is a risk we would not take, regardless of what 
mandates are imposed on us by an outside organization.
    Michaels Stores, Inc. is a PCI-certified organization and has been 
almost since the initial imposition of the standard (i.e., prior to the 
date where fines were threatened for non-compliance).
    I wish I could say that attempting to follow the PCI mandates made 
me confident that one could say customers' credit card data is 
completely safe, but unfortunately that is not the case. That is 
because the mandates seem to have been developed from the perspective 
of the card companies, rather than from that of those who are expected 
to follow them.
    The PCI Data Security Standards are an extraordinarily complex set 
of requirements. They are very expensive to implement, confusing to 
comply with, and ultimately subjective, both in their interpretation 
and in their enforcement. It is often stated that there are only twelve 
``requirements'' for PCI compliance. In fact there are over 220 sub-
requirements; some of which can place an incredible burden on a 
retailer and many of which are subject to interpretation.
    For example, one of the requirements is that all company associates 
must annually acknowledge the company security policy. Michaels has an 
average of 40,000 associates at any given time. In any one week we 
could have more then 1,000 changes in associates. Well, as you might 
expect, many of our associates are getting trained on the range of our 
merchandise, the operation of the registers, fire safety protocols, and 
other important procedures to assist our customers and protect our 
operations. So do we also need to get every associate to learn and sign 
a written statement of our understanding of the credit card companies' 
security policy? Or do we just need to get associates that may deal 
with credit cards to sign? This one little PCI mandate has been imposed 
by compliance vendors differently at retailers across the country both 
because of its subjective interpretation, and the inability for any 
large merchant to meet the standard in its most literal form.
    We have often been questioned by customers, legislators, and even 
the credit card companies themselves: ``Why do you keep credit card 
information at all?'' It would seem with the risk of a breach from the 
outside or from within, we would be better served not to keep the data 
at all. We agree completely. As a retail CIO, I would like nothing 
better than to not store a single credit card number anywhere in our 
network of systems.
    The reason we must still keep credit card information is related to 
the results of another credit card company procedure designed to 
protect their banks from loss. It is called a chargeback. It can occur 
in a number of different ways. It can be initiated by a bank on its 
own, or it can be initiated at the request of a bank's customer. For 
example, if a customer spots a charge on his bill that he does not 
recognize he might initiate a chargeback by contacting his card issuing 
bank. The card-issuing bank asks the merchant's bank to retrieve 
documentation proving that the purchase took place. The merchant's bank 
then requires the retailer to produce the underlying documentation for 
the sale--typically sales media showing the customer's credit card 
number, signature, and date of purchase. The merchant's bank forwards 
the information back to the card-issuing bank. Often, once the customer 
sees the underlying documents he remembers the purchase and the matter 
is closed. (Confusion might occur, for example, if the formal name of 
the business on the customer's monthly statement--e.g. the XYZ Medical 
Complex--is different from the name of the business where the customer 
received services--The Offices of Dr. MDA.)
    However, if the retailer is unable to produce the sales media, the 
sale is reversed and the cost of the transaction is ``charged back'' 
against the retailer. This is true even if the transaction were 
actually made. As I mentioned, banks can also initiate retrieval 
requests for documentation on their own--it does not have to be 
triggered by a customer. If the retailer cannot produce the underlying 
data, the cost of the purchase is taken from the retailer and credited 
back to the card-issuing bank.
    We have a department in Michaels dedicated to handling chargebacks. 
Chargebacks may be for a single transaction or an entire block of 
transactions. Card-issuing banks file retrieval requests that come to 
us. We must first look up the charge on our systems to match the 
transaction and identify the store location where the transaction took 
place (this is what we need the credit card number for). We then 
initiate a request to the store to ``pull'' the receipt for that 
transaction. Since we do not have an electronic signature system we 
have to get the paper receipt. We then submit that back to the bank 
along with the original request. If the bank/credit card company 
determines that the charge was not made by the customer (this is pretty 
much at their discretion and we have little effective recourse), then 
we are charged back the amount of the transaction, plus a processing 
fee.
    Thankfully at Michaels, chargebacks are not a very large problem, 
but my brethren at big ticket companies are not so lucky, as I know 
from my previous work experience. We could choose to take the hit and 
just accept the chargebacks as a cost of doing business so we would not 
need the credit card number stored but, over time, as word of our 
vulnerability spreads among the unscrupulous, this would likely cause 
an increase in chargebacks to the point where we could no longer 
sustain the losses.
    This could have been fairly easily solved and saved retailers 
hundreds of millions of dollars by having the credit card companies 
send retailers a unique approval ID back for each approval transaction. 
We could store that ID and a signature, and if there were a question on 
the transaction the unique approval ID would indicate how we locate the 
transaction. This would eliminate the need for us to store the credit 
card number, but still enable us to respond to retrieval requests. This 
method would have required changes for retailers, credit card 
companies, and the banks, but the overall expenditure would have been 
much less and the consumer data would be much safer.
    PCI states that all credit card data must be encrypted. This is a 
very important component of any data security standard, and one we use 
for sensitive data all across our organization. There is an exception 
to this requirement, however. PCI says that data traveling over a 
``private network'' need not be encrypted. It does not state that it 
can't be, just that it need not be. I have been told that in theory a 
private network is ``more secure'' than one that is not private. Well, 
there is no question about that. A land-line data communication 
connection that is direct between two organizations is certainly more 
secure then one that traverses the internet or a wireless network. 
Michaels has a private network between our stores and corporate 
headquarters. This network is also isolated from our other networks in 
the headquarters and the internet. Access is extremely limited. It is 
private and secure, and we continually look for ways to make it more 
secure; after all this is the network millions of our customers' credit 
card numbers traverse every year. The security of this network is 
paramount and probably at least two-thirds of the PCI requirements deal 
with this very subject.
    Yet I would still not choose to send my customers' credit card 
numbers through this network unencrypted. Why? They are encrypted at 
the pin pad or register by mandate of the standard. It only makes sense 
that we would keep this information encrypted through our entire 
network.
    Unfortunately this is where the system breaks down. The credit card 
companies' financial institutions, the very organizations that have 
created and are mandating this rigorous and highly complex standard, do 
not accept encrypted transactions. We must decrypt the credit card 
number at our corporate headquarters prior to sending to the merchant 
bank for approval!
    The transaction is then returned to us un-encrypted and we then re-
encrypt it to send back to the store. We, at Michaels, have asked for 
the past 3 years for the ability to send encrypted information to the 
bank. To date, this has not happened. We have heard various ancillary 
responses to the request such as, ``It is too expensive to implement''; 
``If you (i.e. the retailer) are willing to pay the costs (i.e. the 
credit card banks' cost) to implement it we will consider it''; to ``It 
would be too difficult to implement a standard encryption routine in 
the industry.''
    Why is this the case? One might ask all the consumers affected by 
the Heartland Payment systems data breach, or TJX Corporation for that 
matter. It has been suggested that methods used in those breaches 
capitalized on that flaw. The criminals used a ``Trojan Horse'' that 
read the credit card data ``in flight.'' This is not the stored data I 
spoke of earlier, but rather the numbers that were flowing through the 
communication channel for approval. One reason thieves could capture 
this data is because it was not encrypted. Had it been encrypted they 
would most likely not have been able to read the data.
    Now there are several requirements in the PCI standards for 
``scanning'' systems that look for these types of Trojan Horses. But 
this is not an ordinary virus that is written and sent to millions of 
PCs via e-mail. These are incredible technical programs often designed 
by organized crime syndicates with technical resources that dwarf those 
of the average company. And with just one inside source in a company 
they can be made virtually invisible. So why take the chance?
    So, are the PCI standards bad? No, however there are some major 
issues with both the program and the way in which it is implemented.
    First, many of the requirements of PCI are already covered in many 
companies' Sarbanes-Oxley audits. This causes a lot of duplicative work 
around proof of compliance, and is arguably unnecessary.
    Second, the requirements are one-sided against the merchants. The 
very financial institutions that impose them are not subject to all the 
mandates themselves. The idea that these organizations don't ``need'' 
to be audited because they are already held to an audited examination 
standard is inconsistent with the arguments they make to us (i.e., 
Sarbanes-Oxley).
    Third, The PCI Data Security Standards Council was allegedly spun 
off from the credit card companies and set up as an independent 
governing body of credit card company, bank, and merchant 
representatives. In fact, the council is set up so that the credit card 
companies and banks retain all power over the ultimate mandates, fines, 
and anything else connected to PCI. Because of this, the mandates do 
not represent what is the ``best'' security, but rather what is best 
for the credit card companies and their financial institution partners.
    When a breach occurs and card data is stolen, clearly the consumer 
potentially suffers the most inconvenience. Fortunately, the law 
provides that promptly reporting consumers must be held financially 
harmless.
    However, the largest financial impact is on the retailer, 
especially if the credit card companies' data (which by and large we 
don't want) is seized from a retail location. We are the ones in the 
press; we are the ones who are demonized; we are the ones States' 
attorneys general and others threaten with damages and sanctions. 
Consumers may make decisions not to shop at a breached retailer not 
realizing that it was the card company processes that caused the data 
to be placed at risk.
    The retailers pay the costs of the fraudulent transactions, either 
through chargebacks or credit card company-imposed fees and penalties. 
All of this arises from rules that initially grew from a card 
monopolist that we have no choice but to do business with, or risk the 
loss of a large portion of our business. It would be impossible for a 
retailer like Michaels to survive without taking Visa. So we, like 
other retailers, swallow the tens of millions we have spent to become 
PCI-compliant, in many cases unnecessarily spent, which both reduces 
profitability and increases the costs of everything we, the merchant, 
sells.
    Is credit card data any safer now than it was before PCI was put in 
place? Yes. Would it be had PCI not been put in place? Probably. Could 
the consumers' data be safer then it is right now? Most definitely!
    But we do not need more laws. The existing (sometimes) misguided 
enforcement and the proliferation of State regulations around these 
issues have created a difficult, if not impossible, environment for 
retailers to effectively meet the legal requirements imposed on them 
should a breach of information occur.
    Madam Chairwoman, committee Members, and distinguished panel and 
guests, if I can leave you with but one message, it is that the 
precepts underlying the massive dissemination of credit card data need 
to be rethought. As a CIO, I was informed by one of the top security 
officers of a major credit card company that based on their analysis 
our company credit card data had been breached. Although I thought this 
unlikely, they told me that they had never been wrong. After an 
agonizing week of internal research, twice daily ``all hands on deck'' 
calls, many, many dollars and hours spent, the voice at the other end 
of the line went dead. The next day a breach of over 40 million credit 
card numbers was announced at a bank processor. Our ``incident'' 
apparently showed that the card company's analysis at that time had not 
counted on breaches of such magnitude, since we were later told that 
the data which had triggered all of our activity was more likely a 
subset of ``another issue'' they were dealing with.
    I am proud to report that Michaels has never had evidence of a 
breach of consumer data. Regardless of the outcome here we will 
continue to do whatever is necessary and prudent to keep the loyalty of 
our customers for, without that, we cease to exist. But the future 
would be more secure and the risks to us all far lower were the card 
companies to take greater responsibility for the inadequate system of 
payment they have created and asked us to use.
    Thank you. I am happy to answer any questions you may have.

    Ms. Clarke. Thank you for your testimony.
    I now recognize Mr. Hogan to summarize his statement for 5 
minutes.

    STATEMENT OF DAVID HOGAN, SENIOR VICE PRESIDENT, RETAIL 
  OPERATIONS, AND CHIEF INFORMATION OFFICER, NATIONAL RETAIL 
                           FEDERATION

    Mr. Hogan. Thank you, Chairwoman Clarke and Members of the 
committee, for this opportunity to appear on behalf of National 
Retail Federation, the world's largest retail association. I 
have been with the NRF for almost 7 years and have spent my 
entire 25-plus-year career in retail information technology.
    Whether it be by cash, check, or plastic, the payment 
mechanism is really just a means of accomplishing business. 
Retailers accept credit cards for payment, in part because they 
have been assured by the credit card companies that if they 
follow a limited number of steps, they will be given a 
guarantee of payment. Most retailers are not in the payment-
acceptance business any more than their customers are in the 
payment-delivery business.
    There have been two big developments in the last decade or 
so that have changed the playing field. The first has been the 
rapid proliferation of general purpose credit cards. With over 
80 percent of the market share, Visa and MasterCard are two 
primary examples, these cards issued broadly by banks in the 
hope that each card will generate income for them.
    The second change has been society's increased 
computerization. Globally there have been numerous instances of 
hackers from outside of our borders accessing computer systems, 
stealing credit card information, and then using this data to 
commit fraud. In several cases these have targeted companies 
that process or store credit card data.
    As with the growth of on-line shopping fraud, these 
developments presented the card industry with a challenge. In 
response, they introduced what they call the Payment Card 
Industry Data Security Standard, also called PCI.
    PCI is an attempt to prevent large stockpiles of credit 
card data from getting into the wrong hands. However, the PCI 
guidelines are onerous, confusing, and constantly changing. 
Indeed, PCI is little more than an elaborate patch.
    The premise behind PCI, that millions of retail 
establishments will systemically keep pace with ever-evolving 
sophistication of today's professional hacker, is just not 
realistic. Our industry has spent billions on compliance 
programs related to data security. PCI protocols have required 
many merchants to scrap good existing data security programs 
and replace them with different security programs that meet PCI 
rules that aren't necessarily any better. Even companies that 
have been certified as PCI-compliant have been compromised.
    Unfortunately, the economic incentives for the card 
companies to remedy these flaws in their system have been 
diminished. It appears to our industry that the credit card 
companies are somewhat less interested in improving their 
product and procedures than they are in reallocating their 
fraud costs. In our view, if you peel back the layers around 
PCI, you will see it for what it really is, a tool to shift 
risk off the banks and credit cards' balance sheets and place 
it on others. It is their payment card system, and retailers, 
like consumers, are just users of their system. What is really 
ironic here is that merchants are forced to store and protect 
credit card data that many don't want to keep anyway. The 
credit card companies' own rules around retrieval requests 
essentially require merchants to keep credit card data for 
extended periods of time.
    As I mentioned, all of us, merchants, banks, credit card 
companies and our customers, want to eliminate credit card 
fraud, but if the goal is to make credit card data less 
vulnerable, the ultimate solution is to stop requiring 
merchants to store credit card data in the first place. In 
fact, we proposed such changes to the PCI Security Standards 
Council back in 2007. The card industry dismissed our proposal 
without addressing its merits.
    There have been numerous suggestions made over the years 
that would significantly reduce the chances of major data 
breaches, but none of them have been adopted yet. Here are just 
a few.
    First, go on record and stop requiring merchants to store 
credit card data and eliminate any penalties they impose for 
not doing so.
    Another, change the system and allow consumers to enter in 
a pin or personal identification number for credit card 
transactions, just like you do with debit card transactions.
    Third, quickly develop and roll out the next generation of 
credit card and give merchants the hardware and software 
necessary to handle these new products.
    In conclusion, once the payment system itself becomes a 
burden, commerce inevitably suffers. We believe any one of 
these recommendations will significantly reduce credit card 
fraud.
    Thank you for the opportunity for appearing in front of 
this committee. I will be happy to answer any of your 
questions.
    [The statement of Mr. Hogan follows:]
                   Prepared Statement of David Hogan
                             March 31, 2009
    Thank you Chairwoman Clarke, Members of the committee. My name is 
Dave Hogan. I am senior vice president, chief information officer for 
the National Retail Federation.
    By way of background, the National Retail Federation (NRF) is the 
world's largest retail trade association, with membership that 
comprises all retail formats and channels of distribution including 
department, specialty, discount, catalog, internet, independent stores, 
chain restaurants, drug stores, and grocery stores as well as the 
industry's key trading partners of retail goods and services. NRF 
represents an industry with more than 1.6 million U.S. retail 
establishments, more than 24 million employees--about one in five 
American workers--and 2008 sales of $4.6 trillion. As the industry 
umbrella group, NRF also represents more than 100 State, national, and 
international retail associations.
    I have been with NRF for almost 7 years and have spent my entire 
career in retail information technology. Prior to joining NRF I was a 
business unit CIO for The Limited and most recently CIO for 
international retailer, Duty Free Americas. During that time I became 
familiar with the broad array of issues confronting retail CIOs, 
including matters related to data security. Both in my prior positions, 
as well as during my time at NRF I have helped design and upgrade the 
systems that protect my companies' core records.
    Currently, I also work with the NRF's CIO Council. The Council is 
made up of more than 50 well-known retailers who meet regularly to 
study, share, and discuss best practices and challenges inherent in 
ever more sophisticated retail technology programs. As a result of that 
work I have become familiar with many of the issues involved with the 
Payment Card Industry Data Security Standards.
    Credit card security is not, however, a new issue for retail. For 
years many retailers managed their own in-house credit programs. 
Companies such as Sears and JCPenney offered proprietary retail credit 
through cards issued in all 50 States. They were known as proprietary 
programs because for most of their history, the cards were owned by the 
retailer and used exclusively for the purchase of a retailer's 
merchandise. Beyond credit programs, many companies maintain 
information about their most valuable customers, often gleaned through 
loyalty programs. Those programs are used to encourage our customers to 
shop and to serve them better when they do. All of this information was 
valuable and proprietary.
    For this reason retailers developed programs to secure their data. 
Each retailer's program was commensurate with the sensitivity of the 
data it sought to keep. Certainly, as to their cards, for example, no 
retailer wanted its credit card programs to be appropriated by thieves. 
Therefore, we retailers developed systems designed to minimize losses 
to us and inconvenience to our customers.
    There have been two big developments in the last dozen or so years 
that have scrambled the playing field. The first has been the rapid 
proliferation of what are known in the industry as third-party, general 
purpose credit cards. Visa and MasterCard are two examples. These cards 
are not issued by retailers, but rather are issued by independent banks 
under a particular card brand's name. Thus you might have a Citibank 
MasterCard or a Chase Visa or a Citibank Visa. Consistent with their 
internal standards, the banks issue the cards as broadly as possible, 
in hopes that each card will generate income for the bank.
    The other big change has been increasing computerization and the 
related growth of the internet. As you all know computers are now 
ubiquitous. And many of our governmental, commercial, and personal 
activities are greatly dependent upon access to the Web. Unfortunately, 
the same processes that give us access also are available to the 
unscrupulous. Scams that would have been difficult to accomplish, or 
been limited in scope if they were attempted on a face-to-face, 
individual-by-individual basis, such as eliciting banking account 
information from individuals, can be much more efficiently accomplished 
on-line by ``phishing,'' for example, among those who engage in banking 
from their home computers.
    In a brick-and-mortar environment, retailers accept a variety of 
forms of payment: Cash, checks, credit cards, gift certificates, and 
other script. Retailers accepted credit cards for payment, in part, 
because they had been assured by the card companies that if the 
merchant followed a limited number of steps (e.g., confirming the 
card's presence; checking the signature; obtaining an approval; and 
keeping a copy of the completed charge media) they would be given a 
guarantee of payment. Whether it be by cash, check, or otherwise, the 
payment mechanism is really just a means of accomplishing business. 
Most retailers are not in the payment acceptance business any more than 
their customers are in the payment delivery business. The form of 
payment simply facilitates the underlying business to be done. (The 
consumer is searching for something to wear; the merchant is seeking to 
find and display attractive merchandise that customers desire wearing.)
    A few years back, outside of the brick-and-mortar environment, in 
the then newly developing world of internet shopping, it soon became 
apparent to the credit card companies that they should take additional 
steps to minimize losses from the use of their card products for on-
line purchases. Through a combination of rules and new security 
requirements the card companies were largely able to achieve that goal. 
They adopted special security requirements for on-line merchants 
(Visa's program was called CISP: Customer Information Security 
Program). They also declared that the then-growing number of internet 
merchants who accepted a credit card for payment on-line would be 100% 
liable for any losses if charges were challenged, either by the 
cardholder or by the bank. As a practical matter, for on-line 
merchants, there was little or no payment guarantee.
    Over time, however, the card companies realized that the number of 
fraudulent purchases was continuing to rise. And this was true not just 
on-line. Thieves and others learned that if they could obtain the data 
on the credit card companies' cards, they could accomplish a few fake 
transactions (on-line) or even create fake cards and accomplish many 
fraudulent transactions in a wide variety of brick-and-mortar 
locations.
    The growth of computerization facilitated these breaches. Globally, 
there have been numerous instances of hackers accessing computer 
systems, stealing credit card information, and using this data to 
commit fraud. It has been reported that many of these hackers are 
operating out of Eastern Europe and some of the former Soviet states. 
In several cases they have targeted retailers' computer systems that 
process or store credit card data. But the thieves are really looking 
for the data anywhere they can find it.
    As with the growth of on-line shopping fraud, these developments 
presented the card industry with a challenge. In response, they 
introduced what they call the Payment Card Industry Data Security 
Standards, commonly called PCI. Since its inception, PCI has been 
plagued by poor execution by Visa, MasterCard and the other credit card 
overseers of the program. The PCI guidelines are onerous, confusing, 
and are constantly changing. Many retailers say that basic compliance 
is like trying to hit a rapidly moving target.
    As I mentioned, retailers take data security very seriously. 
Indeed, merchants, banks, the major card brands and the vendor 
community that supplies our industry with hardware and software all 
want to reduce the incidence of credit card fraud. PCI is an attempt to 
prevent large stockpiles of credit card data from getting into the 
wrong hands. But the premise of PCI, that hundreds of thousands or even 
millions of merchants will systematically keep pace with the ever-
evolving sophistication of professional hackers, is unrealistic.
    PCI is little more than an elaborate patch. While PCI can reduce 
some fraud, at extraordinary cost, it is not nearly as effective as a 
redesign of the card processes themselves. Since its inception, our 
industry has spent billions on compliance programs and related data 
security systems. PCI protocols have required many merchants to scrap 
good, existing data security programs and replace them with different 
security programs that meet PCI rules but aren't necessarily any 
better. Retailers have been required to take extraordinary steps to 
ensure that somewhere, somehow, data is not inadvertently being 
retained by software. However, what is ironic in this scenario is that 
the credit card companies' rules require merchants to store, for 
extended periods, credit card data that many retailers do not want to 
keep.
    To many NRF members, it appears that the credit card companies are 
less interested in substantially improving their product and procedures 
than they are with reallocating their fraud costs. In our view, if you 
peel off all the layers around PCI Data Security Standards, you will 
see it for what it is--in significant part, a tool to shift risk off 
the banks' and credit card companies' balance sheets and place it on 
others. It is their payment card system and retailers--like consumers--
are just users of their system.
    As I mentioned, all of us--merchants, banks, credit card companies, 
and our customers--want to eliminate credit card fraud. But if the goal 
is to make credit card data less vulnerable, the ultimate solution is 
to stop requiring merchants to store card data in the first place.
    For example, rather than requiring that merchants keep reams of 
data--currently required under card company rules in order to satisfy 
card company retrieval requests--credit card companies and their banks 
should provide merchants with the option of keeping nothing more than 
the authorization code provided at the time of sale and a truncated 
receipt. The authorization code would provide proof that a valid 
transaction had taken place and been approved by the credit card 
company, and the signed sales receipt would provide validation for 
returns or poof of purchase. Neither would contain the full account 
number, and would therefore be of no value to a potential thief. Any 
inquiries about a credit transaction would be between the cardholder 
and the card-issuing bank.
    If all merchants took advantage of this option, credit card 
companies and their member banks would be the only ones with large 
caches of data on hand, and could keep and protect their card numbers 
in whatever manner they wished. The bottom line is that it makes more 
sense for credit card companies to protect their data from thieves by 
keeping it in a relatively few secure locations than to expect millions 
of merchants scattered across the Nation to lock up their data for 
them.
    In fact, we proposed such changes to the PCI Security Standards 
Council in 2007. The card industry dismissed our proposal without 
addressing its merits but have yet to offer a viable alternative.
    Once the payment system itself becomes a burden, commerce 
inevitably suffers. The NRF, with direction from our CIO Council, has 
engaged the PCI Security Standards Council directly and highlighted 
flaws with the existing ``standard'' and ``governance'' of the PCI 
Security Standards Council. There have been numerous suggestions made 
over the years that would significantly reduce the chances of major 
data breaches, but none have been adopted.
    In conclusion, we believe any of our suggestions would be more 
effective and efficient approaches to protecting credit card data and 
preventing a continuation of the data breaches that have been seen in 
recent years.
    Thank you for the opportunity to appear before the committee today, 
I would be happy to answer any questions.

    Ms. Clarke. I thank the witnesses for their testimony.
    I will remind each Member that he or she will have 5 
minutes to question the panel. I will now recognize myself for 
questions.
    My first question goes to both Mr. Russo and Mr. Majka. 
Since the PCI standards have become mandatory, there has been 
no shortage of massive data breaches. Is there any hard 
evidence to suggest that the standards have reduced the number 
of data breaches or the amount of credit card fraud? What 
metrics are in place to judge the effectiveness of these 
standards?
    Mr. Russo. Chairwoman Clarke, let me answer first.
    The council's purview does not include keeping statistics 
on breaches, on who is compliant, as we do not have that 
relationship with the merchants. I can tell you, as I stated 
earlier, that based on what we have seen in forensics and what 
we have seen our information has given us by reaching out to 
these breached entities, that they were, in fact, not compliant 
at the time of the breach. Very similar to Ms. Glavin, who 
mentioned locking your doors, you don't lock your doors on 
Monday, Wednesday, and Friday and not on Tuesday, Thursday, 
Saturday, and Sunday. So it is constant vigilance that must be 
there when it comes to protecting this data. It is everyone's 
responsibility, including the merchant, including the consumer, 
to be looking after their own data.
    Mr. Majka. Madam Chairwoman, I would like to say that entry 
into these data systems, while the criminal is very complex, we 
found that the entry methods have been very simple, and they 
would have been addressed by the PCI data security standard in 
all cases. Even those entities where they have had validated 
compliance, our review of those incidents found that either 
they hadn't maintained compliance, and there were significant 
gaps that allowed the breach to occur.
    I would also like to say that the standard itself has been 
improved over the years. One of the success stories of the 
standard is the removal of prohibitive data from merchants' 
servers. This has led to incidents where we no longer have a 
breached entity who has been storing data for 3, 4, or 5 years 
that the criminals can access 5 years' worth of data. So those 
are things that the standard itself has addressed and has 
helped.
    I would also like to say that I think that we don't know 
how many breaches have been prevented by those entities that 
have, in fact, gone as far as implementing and maintaining the 
standard properly.
    Ms. Clarke. I think that is really at the core of the issue 
here is that we can't get some tangible evidence of how 
effective this is in actually eliminating the breaches. It is 
clear that if people aren't following the protocols, that opens 
them up in terms of more vulnerability. But it would seem to me 
that as a part of the build-out of the floor of the PCI 
standards, that we would develop some sort of metric that gives 
us an ability to objectively judge the effectiveness of these 
standards. Are you saying that those don't exist right now?
    Mr. Russo. No, Madam Chairwoman. They do exist in various 
entities, those entities being the acquiring banks, as an 
example, which own the relationships with the merchants. They 
require PCI compliance, they track PCI compliance, they have 
those numbers. Again, the council does not have any input into 
that or any view into that because we do not have the 
relationships with the merchants. The banks, the acquirers have 
the relationship with the merchants. But there are tens of 
thousands, hundreds of thousands that are going through 
programs every day and validating their compliance on a regular 
basis.
    Ms. Clarke. Mr. Russo, do you have a relationship with the 
banks?
    Mr. Russo. The council does not have a relationship with 
the banks other than to put its standard out there and make 
sure that they are creating awareness among their constituents 
that they need to be compliant with the standard.
    Ms. Clarke. Thank you.
    The next question then is both to you, Mr. Russo, and Mr. 
Majka. The PCI standards include requirements for encrypting 
data at rest and data that travels over the internet. But the 
Heartland breach, for instance, involved data in transit 
between terminals and hosts on nonpublic networks.
    As Mr. Jones notes in his testimony, there are no PCI 
standards for this. Is this a fundamental weakness in the 
standards? Why doesn't PCI require end-to-end encryption, 
including internal encryption? How are you going to address 
this?
    Mr. Russo. There are provisions within the standard now 
that address this data and address the inside network that 
should, in fact, either stop this from happening, or at least 
give you a warning that something is happening so that you can 
immediately stop it and cut the breach off. We do go out to, as 
I mentioned, all of our participating organizations--one of 
whom is sitting at the table with me today, the NRF--and we do 
ask them for their feedback on the standard and what needs to 
be done.
    One of the things that we are in the process of doing right 
now is that we have issued a proposal to a number of technology 
companies to give us an independent study on what we are 
calling emerging technologies, one of which is end-to-end 
encryption, another of which is tokenization, another of which 
is chip and PIN. So we are looking at these technologies and 
how they make the standard more robust. But it is important to 
the say that there really is no silver bullet here.
    Ms. Clarke. I am a bit over my time, but I would like to 
get Mr. Jones' and Mr. Hogan's response to this end-to-end 
encryption dilemma.
    Mr. Jones. First, I think on encrypted, I am not sure I 
would call it an emerging technology; it has been around for 
some time. Obviously, since it is a requirement for anything 
traveling outside the private network, I think that not having 
it as part of something that travels on your internal network 
was something originally to reduce some of the costs involved 
with implementing the standards, because it costs money to 
implement encryption end-to-end, and that would have involved a 
lot of cost to merchant banks all across the country, as well 
as retailers. Every retailer would have had to implement 
encryption on their side. But we have already had to do it 
from--and most retailers do transact across the internet in one 
way or another, so we have had to do that.
    So I would separate that out from a chip and PIN discussion 
as far as what we should be looking at going forward. As far as 
whether it should be in the standard or not, I feel that it 
should have been in the standard long ago as part of something 
simply because there are things that may have caught the 
Heartland Payment thing. But when we talk about very 
sophisticated thieves, the Heartland Payment software that was 
used was so sophisticated that it was virtually impossible for 
highly technical, highly sophisticated people to pick up. Most 
of the existing scanning technologies would not have even 
picked it up, but had it been encrypted, it wouldn't have 
mattered. I think that is the way of looking. So why not lock 
your front door? Why leave it open?
    Ms. Clarke. Mr. Hogan, do you concur?
    Mr. Hogan. Yes, I do concur. I think it is very interesting 
that the merchants, universities, doctors' offices, anybody who 
accepts credit cards and processes credit card data has to go 
through extraordinary hoops to adhere to a PCI standard; 
however, when it is convenient, the information is sent open in 
the free and clear, when it is transmitted to the banks, so on 
and so forth.
    So I think you have a double standard going on here where 
in one case you have to adhere to a standard, and spend a lot 
of time, effort, and money to do it, and then all of a sudden 
you send it back out wide open that anybody could potentially 
read unencrypted downstream.
    Ms. Clarke. Thank you. My time is expired.
    Let me now acknowledge the gentleman from New Mexico, Mr. 
Lujan.
    Mr. Lujan. Thank you, Madam Chairwoman. I know we have some 
votes we have to get to, if I am not mistaken, so I will try to 
keep this brief.
    Mr. Russo, what recommendations of standards have been made 
that have not been implemented by those that follow your 
standards?
    Mr. Russo. Congressman, we have a feedback process in 
place, which Chairwoman Clarke mentioned a little earlier--
actually, I am a little perplexed because Mr. Hogan earlier 
said that this is constantly changing, yet Chairwoman Clarke 
indicated it was a 2-year process that we go through. We go 
through two feedback periods where we get feedback from all of 
those participating organizations, again, one of which is the 
NRF, and we then discuss all of this information at two 
community meetings that we have on a yearly basis, one in North 
America and one in Europe. That information is then taken back 
from what we are getting again at that community meeting and 
gone through another feedback period before a new standard is 
released.
    I might also mention that the difference between the 
initial standard that we came out with in 2006 and the 1.2 
version, which we came out with in October, was not that 
different. There were clarifications, there were documentation 
changes, more guidance information was put in to make it easier 
to understand the intent and, in fact, comply with it. These 
were all recommendations from these participating 
organizations, from our board of advisors. There are things 
that we put out on a regular basis based on their input. We do 
not create this standard in a vacuum. This is something that 
the entire group of participating organizations and the 
assessment community and our board of advisors advise us on.
    Mr. Lujan. Let me narrow the question a little bit.
    Mr. Russo, there was some discussion about end-to-end 
encryption for its databases. Isn't that a recommendation that 
was made by the Heartland Payment Systems CEO?
    Mr. Russo. After the breach it absolutely was, after the 
breach. We agree that encryption is a good thing--again, not a 
silver bullet. Encryption is a good thing. As the gentleman 
from Michaels mentioned, encryption is an expensive 
proposition. If we make this mandatory in the standard, there 
will be a number of merchants who will not be able to afford 
this immediately. There are provisions within the standard that 
actually affect what happens there. So the need for end-to-end 
encryption within the internal network is really not there. If 
you are following the standard religiously, the need is not 
there. Why put these people through the expense?
    That being said, we are now investigating it from an 
independent third party, and we will present that information 
in the form of feedback to our entire community and get their 
feeling on whether or not they actually want this to be part of 
the standard.
    Mr. Lujan. Mr. Russo, you said something earlier that I 
found interesting, that you have never found PCI not to be in 
compliance at a time of breach, meaning that at a time of 
breach, there may have been some break in compliance. But with 
the system that we have today, who is responsible for 
monitoring compliance?
    Mr. Russo. The merchant himself. Basically what we do is we 
take a snapshot--let me give you a brief example, if I have a 
minute or so. If you need fire insurance on your house, and you 
come to me and ask me as the insurance company to give you fire 
insurance, I send an inspector out, and you have everything in 
place--smoke detectors that work, fire extinguishers, 
sprinklers, and such. Three months later, your house burns 
down. I send an inspector out again, only to find out that 
there was no pressure on the sprinklers at that time, all of 
the batteries weren't working in your smoke detectors, and so 
on. This is the responsibility not only of the council to make 
sure that you are compliant, but it is your responsibility as a 
merchant, your responsibility to the consumers to make sure 
that you are doing this on a regular basis.
    Mr. Lujan. Mr. Russo, if I could interrupt, I think that 
that example is a perfect illustration, because I would ask 
that the regulator that was responsible for monitoring the fire 
suppressant system, if you come back after there was a fire, 
and you found out that my fire suppressant system wasn't 
adequate to be able to protect my home or my place of business, 
then the regulator wasn't doing their job. But in this case, 
there is no one overseeing this. It is, here is a set of rules; 
if you want to be able to utilize our product, please follow 
them. In the case if there is a breach, we depend on the 
Department of Justice to step in, often times informing a group 
of people that maybe there was a breach.
    Madam Chairwoman, I know that my time is expired, but this 
is really interesting to see, when we talk about a set of 
standards, to truly see how we can work together to look to see 
where the weak points are. But also from a compliance 
perspective, I know that there aren't compliance efforts moving 
forward to truly work with the retailers if it is their 
responsibility to be held in compliance. But it seems to me 
that the system that we have today, I think we all agree, from 
different sides, that it is not working.
    Ms. Clarke. Thank you very much for your observations, Mr. 
Lujan. Thank you for your responses.
    We are in the process of votes right now, but I would like 
to get in one final question for this panel, and this question 
is for the entire panel actually.
    A large part of the data theft problem is the amount of 
valuable data stored in the system. Mr. Hogan and Mr. Jones 
testified that the credit card companies are actually requiring 
merchants to keep more data than they would otherwise prefer. 
Can the panel please explain what requirements exist for 
merchants to store credit card data in their systems, and why 
did the credit card companies dismiss the suggestion from NRF 
that these requirements be changed?
    Mr. Majka. Madam Chairwoman, if I may start by answering 
that question. Visa does not require merchants to retain card 
holder data. We embarked on a campaign about 3 years ago to 
educate merchants on what data they absolutely need to 
maintain, and the campaign was called Drop the Data. In those 
cases, they are not required to retain the account number.
    We have found that some merchants do, in fact, retain the 
account number, customer name, maybe the expiration date, and 
in those cases, should a merchant choose to maintain that data, 
they do have to secure it properly. But all merchants have the 
ability to work with their acquiring merchant bank to not store 
that data, and use whether it is an authorization code or 
transaction ID as a reference number to then research a 
transaction that may be in question. So from a Visa 
perspective, we do not require storage of that data.
    Ms. Clarke. Mr. Hogan.
    Mr. Hogan. That statement is quite interesting, because we 
hear from numerous, numerous merchants, restaurants, hotels 
that if they don't keep some credit card data for a period of 
time to handle the retrieval or chargeback request process, 
they will be fined and penalized. So I would love to have 
somebody go on record here from Visa or so on and so forth that 
would basically make a statement that, again, retailers and 
merchants do not need to store any credit card data at all, 
just keep an authorization code, and they will not be penalized 
at all in context of the chargeback or retrieval request 
process. Maybe that could be a question you could pose back.
    Ms. Clarke. I find this discrepancy to be very troubling, 
very troubling.
    Mr. Jones.
    Mr. Jones. I think we have to look at two entities, too. As 
the question was being answered, there was Visa does not 
require. Then the second part was, we recommend they work with 
their acquiring merchant bank to understand what data they need 
to keep or don't need to keep.
    Visa is not the person that we work with on a day-to-day 
basis. We work with our merchant bank. If your merchant bank 
cannot provide you back the information for you to look up 
among your thousands, tens of thousands, hundreds of thousands, 
or millions of transactions which we deal with on a basis to 
pull that transaction--and we have to physically pull a receipt 
again; we go from the point of we get a piece of paper with a 
card number on it, and we have to get to a point where we pull 
a receipt within a certain time period, otherwise we lose that 
transaction. So it is not a requirement. We could not do that. 
We could say that is a cost of doing business. By doing that, 
then, we would just automatically lose those dollars.
    My brethren in places like Best Buy or Big Ticket, it would 
cost them a fortune. Places like Marriott, or a hotel or a car 
reservation where you hold a reservation with a credit card 
number, or they put a $400 charge on your credit card where it 
is being held but not charged yet, they do have to keep that; 
otherwise they have no way to charge you after.
    So I think we are dealing with which organization is 
requiring versus PCI doesn't require you, they are not a credit 
card organization. Visa just transports it; the merchant bank 
is something else. The retailer is left holding the bag and has 
no input or say, but yet is paying the transaction fee, is the 
one who pays for the transaction when the customer says that 
they are not responsible for it and has no say in it.
    There is a solution out there, but there has been no 
interaction, there has been no partnership to really develop 
that solution, I think.
    Ms. Clarke. Well, let me just close by saying that this is 
something that we have to fix. Mr. Majka, I look forward to 
speaking with you further about this.
    To all of you, thank you very much for your testimony 
today. This has been very interesting, very enlightening. I 
think we have got a lot of work to do, as I said in my opening 
statement. Certainly I think some things have come to light 
here today that should concern all of us and that we should be 
working together as a team to make sure that we address.
    I thank the witnesses for their valuable testimony and the 
Members for their questions. The Members of the subcommittee 
may have additional questions for the witnesses, and we will 
ask you to respond expeditiously in writing to those questions.
    Hearing no further business, the subcommittee stands 
adjourned.
    [Whereupon, at 3:15 p.m., the subcommittee was adjourned.]


                            A P P E N D I X

                              ----------                              

  Questions From Chairwoman Yvette D. Clarke of New York for Rita M. 
     Glavin, Acting Assistant Attorney General, Criminal Division, 
                         Department of Justice
    Question 1. How do you prosecute criminals in cyberspace when it is 
virtually impossible to identify and attribute attacks to specific 
individuals?
    Answer. Response was not received at the time of publication.
    Question 2. What attraction does card fraud have for criminals and 
terrorists?
    Answer. Response was not received at the time of publication.
    Question 3. Would you say that card fraud is the financing method 
of choice for terrorists?
    Answer. Response was not received at the time of publication.
    Question 4. How many people and man-hours are devoted to 
investigations and prosecutions related to card fraud, including both 
data breaches and the criminal activity card fraud underwrites?
    Answer. Response was not received at the time of publication.
    Question 5. You testified that by disabling Shadow Crew's Web site, 
the Department of Justice believed they ``prevented hundreds of 
millions of dollars in additional losses to the credit card industry.'' 
Is it the Department's understanding that the fraudulent charges that 
are the result of a data breach are a financial liability to the card 
brands, issuing banks, or acquiring banks?
    Answer. Response was not received at the time of publication.
   Questions From Chairwoman Yvette D. Clarke of New York for Robert 
 Russo, Director, Payment Card Industry Data Security Standards Council
    Question 1. Why aren't penetration tests required on a quarterly 
basis? Why don't they conform to NIST standards?
    Answer. The PCI DSS requirement for penetration testing is not 
based exclusively on time intervals. Tests are also required after any 
significant changes to a data system environment that has been 
validated as compliant with the PCI DSS--as frequently as that may 
occur, which may be more frequently than quarterly. The Council's 
information supplement regarding penetration tests is attached as 
Exhibit A.* This is in addition to the annual validation of static 
controls. It is also important to note that penetration tests are only 
a small part of the comprehensive set of controls and layers of 
security identified in the PCI DSS.
---------------------------------------------------------------------------
    * Attachments referred to have been retained in committee files.
---------------------------------------------------------------------------
    Vulnerability assessments, which share many of the characteristics 
of penetration tests by identifying the same threats, are required, at 
a minimum, quarterly. Penetration tests are additive to, rather than 
substitutes for, the standards promulgated by the National Institute of 
Standards and Technology (NIST), which are also a critical part of the 
process that our Approved Scanning Vendors (ASVs) utilize to identify 
vulnerabilities in networks. Indeed, all ASVs rely on the NIST National 
Vulnerability Database (http://nvd.nist.gov/), a U.S. Government 
repository of standards-based vulnerability management data and each 
entity must receive a passing score quarterly to be considered 
compliant with the PCI DSS.
    Question 2. Given the prevalence of insider attacks (both physical 
and virtual), which have grown by 55% according to the intelligence 
community, why has two-factor authentication not been required of all 
users who access payment data within networks as well as all system 
administrators' who have privileged rights?
    Answer. The PCI DSS requires two-factor authentication (Requirement 
8.3) as a mechanism for external access (internet/remote) into 
cardholder data environments. The primary focus of PCI DSS Requirement 
8.3 is to prevent unauthorized access from the outside, focusing on 
protecting from external intrusion, not internal access.
    For internal threats with respect to unauthorized authentication 
attempts, the PCI DSS provides a layered security approach that 
requires numerous other controls to minimize risks within the internal 
network. Two-factor authentication is one method for meeting this 
layered approach. Other approaches that address the internal risk of 
user account takeover include prohibiting the use of risky protocols 
that expose user names and passwords (Telnet and FTP) and requiring 
passwords to be encrypted/hashed during transmission and storage within 
the internal network. There are also numerous user account management 
and password controls (Requirement 8), along with logging and 
monitoring requirements (Requirement 10) that address internal controls 
to help mitigate internal risks including two-factor authentication.
    Question 3. How are Qualified Security Assessors trained?
    Answer. Because the quality of PCI DSS validation assessments can 
have a tremendous impact on the consistent and proper application of 
security measures and controls, the Council's QSA qualification 
requirements are exacting and detailed, involving both the security 
companies themselves as well as the individual employees involved in 
assessments.
    In broad terms, prospective QSA companies must:
   Apply for qualification in the program;
   Provide documentation adhering to the Validation 
        Requirements for Qualified Security Assessors v. 1.1, a copy of 
        which is attached as Exhibit B;*
---------------------------------------------------------------------------
    * Attachments referred to have been retained in committee files.
---------------------------------------------------------------------------
   Qualify individual employees to perform the assessments, 
        which requires annual training and testing of those employees, 
        and;
   Execute an agreement with the Council governing performance 
        of validation assessments.
    In turn, each individual QSA employee who will be performing and/or 
managing on-site PCI DSS assessments:
   Must attend annual PCI DSS training provided by the Council, 
        which includes training in Scoping a PCI DSS Assessment, PCI 
        DSS v1.2 Requirements, and Compensating Controls;
   Must pass all examinations conducted as part of training;
   Has access to face-to-face feedback sessions with the 
        Council every 6 months;
   Has access to the numerous fact sheets, information 
        supplements, frequently asked questions, and webinars that the 
        Council makes publicly available at its Web site at 
        www.pcisecuritystandards.org/education.
    Our management of QSAs does not end with training. In 2008, the 
Council launched a Quality Assurance program to promote consistency of 
both services and results provided by the security assessment 
community. This program specifies eight guiding principles QSAs must 
commit to and outlines a number of criteria QSAs must adhere to in 
order to provide a more uniform experience for merchants and other 
customers. The criteria include evaluating QSAs based on consistency of 
the opinions rendered, competency of the professionals, credibility of 
the organizations, and business ethics. To staff this program, the 
Council has also invested in a dedicated team responsible for assessor 
performance monitoring.
    Each assessor is required to use the template report associated 
with the PCI DSS (attached as Exhibit C*) as the framework for 
reporting validation to the standard. Each requirement contains one or 
more testing procedures that must be evaluated by the assessor and 
appropriately documented to demonstrate that the control has been 
tested by the QSA and is operating correctly. The quality assurance 
team reviews these reports to confirm that all testing procedures in 
the framework are completed and documented, indicating consistency of 
practice in the assessor community.
    The Council's quality assurance team evaluates trends among Report 
of Compliance documents in an effort to identify common inconsistencies 
and reports findings to the Council in order to consider and implement 
appropriate curative actions. Any such actions are communicated to the 
assessors via training, newsletters, and webinars. This information is 
also shared with the Council's Technical Working Group for future 
consideration and possible adjustment of the PCI DSS.
    Question 4. Mr. Jones of Michaels Stores stated that ``Many of the 
PCI requirements are covered by the Sarbanes-Oxley audits.'' Could you 
report to the committee on the redundancies between the Sarbanes-Oxley 
audits and the PCI Council's own requirements?
    Answer. The Sarbanes-Oxley Act of 2002 (``Sarbanes-Oxley'') applies 
exclusively to publicly traded companies in the United States, 
addresses a host of concerns and is not primarily concerned with data 
security. Sarbanes-Oxley instead focuses primarily on addressing 
accounting standards and practices. The provisions of Sarbanes-Oxley 
are not intended, nor would they be adequate, to enable the marketplace 
to achieve and maintain data security, particularly with respect to 
payment card data. The Council does not believe there is extensive 
overlap between Sarbanes-Oxley and PCI Standards.
    The PCI Standards are specifically designed to protect payment card 
data. They apply to both public and private companies of all sizes, 
both inside and outside the United States. Further, they are far more 
detailed and specific in the way they address data security issues: for 
example, the PCI DSS has over 225 requirements and 525 testing criteria 
specific to data security.
    Given the specific nature of the PCI DSS and the absence of similar 
specific controls in Sarbanes-Oxley, we are unclear about precisely 
what redundancies Mr. Jones is referring to.
    Question 5. You testified that the PCI council does not develop or 
use metrics to evaluate the effectiveness of the council's standards. 
How then does the council weigh proposals to the PCI standards if they 
cannot measure the costs and benefits of past and future additions to 
the standards?
    Answer. There are a number of readily available industry metrics 
that the Council uses to track the effectiveness of the standard. For 
example, the Nilson Report is a widely used industry publication with 
extensive metrics on payment card fraud and a wide range of other data 
security issues.
    Moreover, the payment card brands regularly receive and assess 
forensic information regarding the cause of payment card data breach 
incidents. This type of data provides critical information regarding 
where the PCI Standards may need to be strengthened or modified. This 
guidance is provided by the payment card brands as members of the 
Council's technical working group.
    Proposed changes to the PCI Standards are shared with our 
Participating Organizations, which represent over 500 companies, all of 
which have first-hand experience in implementing standards and 
protecting payment card data on a daily basis. A formal feedback 
process enables the Council to receive robust feedback from this group. 
This feedback ensures additions and changes to the PCI Standards are 
weighed by those with a front-line perspective on what measures are 
most beneficial to protect payment card data.
    One example of how this broad industry feedback has directly 
resulted in changes to the PCI Standard is in the case of wireless 
security. In 2007, forensic investigators indicated that insecure 
wireless implementations were at the core of a number of breaches. As a 
result of that, the Council started investigating wireless security 
with its stakeholder community--making it a key agenda item for 
discussion at our first Community Meeting. Feedback from that 
discussion led to changes in version 1.2 of the PCI DSS. Finally, in 
order to help organizations meet the new requirements, our stakeholders 
suggested creating a Wireless Special Interest Group--comprised of 
representatives from dozens of our Participating Organizations--to 
examine implementation issues. That group is expected to release an 
implementation guide on meeting the new wireless requirements in the 
coming weeks.
    It is broad participation such as this--coupled with the knowledge 
that the payment brands bring to the table--that gives us confidence in 
our ability to measure the cost and benefits of future additions to the 
standard.
    Question 6. You stated in your testimony that ``no standard is 
perfect. But the PCI security standards have proven to be the most 
effective means of preventing data breaches and protecting consumers.'' 
Given that the Council has not developed or applied any metrics to 
measure the effectiveness of the PCI standards or to compare their 
resulting security to other payment technologies, how have the PCI 
security standards proven to be effective at all?
    Answer. Necessarily, evidence demonstrating that a particular 
standard is effective in preventing a particular outcome must be 
inferential. However, it is noteworthy that with more than 10,000 
payment card transactions per second worldwide (Source: American 
Bankers Association, March 2009) and the usage of payment cards 
steadily increasing, payment card fraud rates are at historic lows. The 
Council believes that the PCI Standards have been an integral driver of 
this trend, and industry data supports that conclusion.
    Question 7. You stated that the council does not have a 
relationship with banks ``other than to put the standard out there and 
make sure that they are creating awareness among their constituents.'' 
Since it is the banks which, according to you, monitor compliance and 
the effectiveness of the standards, should not they be central to the 
drafting process?
    Answer. My statement pertained to lack of a direct contractual 
business relationship between the Council and the banks. It was not 
intended to suggest that banks are not intimately involved in data 
security standards. Any suggestion to the contrary was inadvertent.
    Banks are a pivotal part of our organization. Over 40 financial 
institutions worldwide--including such leading U.S. banks as Bank of 
America, Capitol One, and Wells Fargo--have joined the Council as 
Participating Organizations. These organizations receive draft copies 
of the PCI Standards for comment prior to publication and have the 
opportunity to contribute feedback during the drafting process. 
Financial institutions also comprise nearly one-quarter of the 
Council's elected Board of Advisors.
    Question 8. Merchants who have experienced data breaches also face 
significant class action lawsuits. What liability exists for the 
payment card industry and the assessors if a PCI-compliant company is 
breached?
    Answer. The PCI Standards do not assign liability to any party in 
the event there is a data breach. Any liability from a data breach 
would arise from agreements between participants in a network and/or 
applicable law.
    Consistent with its role as a standards development organization, 
as discussed above, the Council does not impose any liability 
allocation requirements between assessors and merchants, nor does it 
have knowledge of the contractual terms entered into between individual 
payment card brands (who are competitors of each other) and their 
industry partners. Consequently, the Council does not have special 
insight into how any liability for payment card breaches is allocated.
    Question 9. In response to the committee, JCB said that they expect 
the PCI standards will continue to ``become even more stringent in 
future iterations.'' Is this also your expectation? What changes will 
the next iteration likely have?
    Answer. At this point in our standards lifecycle process, we are 
not in a position to predict what specific changes will be included in 
the next major iteration of the PCI Standards--our open comment period 
for the most recent release starts in July. This comment period is a 
pivotal part of a rigorous, end-to-end review undertaken within a 2-
year lifecycle process that includes input and feedback periods for our 
Participating Organizations. Any changes introduced to meet new and 
evolving threats will be debated with all of our stakeholders before 
release.
    In order to address interim threats, as previously noted in my 
written testimony, the Council maintains on-going two-way 
communications with its assessors, merchants, and other stakeholders, 
and has the ability to issue errata to the PCI DSS, flash bulletins on 
emerging threats, monthly newsletters to the Assessor community, 
regular updates to the ASV test scanning environment, monthly webinars 
with both assessors and merchants, and updates to the Council's on-line 
searchable FAQ and training materials.
    Question 10. Currently, requirements of notification of breaches 
vary from State to State. Given that the Department of Justice stressed 
the importance of notification, both of law enforcement and consumers, 
has or will the Council consider mandating notification as part of its 
standards? How would or could that be enforced?
    Answer. As a standards body, the Council has no direct contractual 
power that would enable it to mandate or enforce such notification by 
retailers or processors when they suffer a breach. Although we do not 
have the power to require notification, each of our members feels 
strongly that notification of law enforcement and affected consumers is 
an important component in a security breach response plan.
    In fact, PCI DSS Requirement 12.9.1(b), which addresses Incident 
Response, requires entities to have a communication and contact 
strategy in the event of data compromise as well as an analysis of 
legal requirements for reporting compromises.
    Question 11. You stated in your testimony that ``in fact, we have 
never found a breached entity to have been in full compliance with the 
PCI standards at the time of a breach.'' Can you please explain the 
discrepancy between that statement and the statement of Ellen Richey, 
Chief Enterprise Risk Officer at Visa, Inc., that Heartland had 
validated PCI compliance ``but it was a lack of ongoing compliance and 
ongoing vigilance in maintaining security that left them vulnerable to 
attack''. Can you please explain exactly how Heartland was not in full 
compliance with the PCI standards?
    Answer. These two statements are consistent. As noted in my written 
testimony, validation of compliance with the PCI DSS only represents a 
snapshot in time that coincides with information shared with and 
interpreted by a QSA during the assessment period. No entity that has 
custody of customer data can afford to gear up for an assessment, and 
then relax its vigilance thereafter. While assessment is a useful tool 
to uncover vulnerabilities, stakeholders across the payment chain must 
realize that data security, and not passing assessments, is the goal of 
an effective compliance program. The 2009 Data Breach Investigations 
Report from Verizon Business (attached as Exhibit D*) found that 
effective tracking and monitoring of network access was not in place at 
95% of breached entities at the time of compromise. This provides a 
good example, because the tracking and monitoring requirement is a 
security practice that requires on-going compliance to be effective. 
Its value is severely limited if it is in place only during validation 
of compliance to the PCI DSS.
---------------------------------------------------------------------------
    * Attachments referred to have been retained in committee files.
---------------------------------------------------------------------------
    Unfortunately, the dynamic nature of any organization's complex 
information technology systems and network environments, as well as 
turnover of human resources, can require the taking of a wide variety 
of actions that, absent appropriate steps to restore system integrity 
can render a validated system noncompliant quickly after a satisfactory 
compliance report has been issued. To use an analogy, effective 
compliance should be viewed as equivalent to a full-length feature film 
where an organization must be ``compliant'' at each and every frame of 
that film. In contrast, validation of compliance is determined by a QSA 
only in a single, specific frame of that film.
    Question 12. Mr. Majka of Visa stated in his testimony that 
``security must be a shared responsibility among all relative parties--
law enforcement, payment companies, regulatory agencies, retailers and 
others.'' How is the financial risk and liability shared between these 
parties?
    Answer. The Council is not involved in the allocation of risk 
within a particular network. This question is better directed to 
participants in the respective networks, including the networks 
themselves.
    Question 13. Mr. Majka of Visa stated that ``we must collectively 
apply multiple layers of security to protect the system. That includes 
measures applied at the card level such as card verification values.'' 
It is the committee's understanding that not all issuing banks are 
required to support CVVs and not all transactions are required to 
include CVVs. Can you explain how the Council develops and enforces 
standards for the card brands and issuing and acquiring banks?
    Answer. It is important to recall, as noted above, that the Council 
manages and develops--but does not enforce--the PCI Standards, nor does 
it enforce operational regulations imposed by the payment brands. 
Instead, it makes standards available to the market as tools to be used 
in order to protect the payment card data of any entity that stores, 
transmits, or processes payment card data. Members of the payment chain 
then individually decide which industry partners must comply with the 
PCI Standards, define required compliance validation mechanisms, and 
manage any enforcement programs that may exist.
    Requirements that exist between individual card brands and their 
issuing and acquiring banks are not within the Council's purview.
    Question 14. According to Mr. Jones' testimony, PCI states that all 
credit card data must be encrypted, with the exception that it need not 
if the data travels over a private network. Nonetheless, Mr. Jones says 
in spite of that his company does not send this information over their 
own private network unencrypted. Surprisingly, he notes, ``The credit 
card companies' financial institutions, the very organizations that 
have created and are mandating this rigorous and highly complex 
standard, do not accept encrypted transactions. We must decrypt the 
credit card number at our corporate headquarters prior to sending to 
the merchant bank for approval!'' And Mr. Jones' company has to re-
encrypt this data when it is sent back to its stores. As a result of 
his company's strong objection to this policy, it has asked for the 
past 3 years for the ability to send encrypted information to the banks 
but nothing has happened. One reason given is that it is too expensive 
to implement. Mr. Jones has been told if the retailers ``are willing to 
pay the costs (i.e., the credit card banks' cost) to implement it, we 
will consider it.''
    How important is the cost to the credit card banks in your 
analysis?
    Answer. Cost to all stakeholders, including merchants is one of 
many factors that are taken into account in considering changes to the 
PCI Standards. Effective data security must be affordable to the 
millions of participants in the payment chain that must invest in it or 
they cannot be expected to act quickly and effectively enough to meet 
on-going threats. Any effective security stance must therefore 
realistically take cost into account. For example, our Participating 
Organizations, and particularly our merchant Participating 
Organizations, have told us that internal encryption would be 
extremely--even prohibitively--expensive, and have urged us to pursue 
more affordable, alternative ways to make further security advances in 
this area.
    Question 15. Can you explain your process for evaluating Mr. Jones' 
3-year effort to be able to encrypt information to the banks? Also, who 
has opposed this suggestion?
    Answer. Until our introduction at the hearing, Michaels Stores, 
Inc. (``Michaels'') had not presented its opinions regarding this issue 
to the Council. Moreover, Michaels is not a Participating Organization 
and so to date has not attended any of our community meetings or 
feedback sessions in the almost 3 years since the Council's inception. 
The Council had therefore not had any prior opportunity to evaluate the 
Michaels suggestion, nor is it aware of who may or may not be 
supportive of this suggestion. The Council would welcome Michaels as a 
Participating Organization so that its views could be heard and debated 
among our stakeholder community.
    Question 16. A large part of the data theft problem is the amount 
of valuable data stored in the system. What requirements exist for 
merchants to store credit card data in their systems? Please explain 
how the chargeback/retrieval process affects what kinds of data can or 
should be stored on a merchant's system.
    Answer. The Council is not involved in the assessment of the 
chargeback and retrieval process. Those processes are dictated by 
participants in the payment network and those participants are 
therefore in a better position to respond to the question, and speak to 
the necessity of various kinds of data in connection with the 
chargeback/retrieval process.
    To more broadly answer the question of what data merchants are 
required or permitted to retain, the fundamental premise of PCI DSS is 
``if you don't need it, don't store it.'' That is why requirement 3.1 
of the PCI Data Security Standard stipulates that organizations should 
only retain data that is required for business, legal and/or regulatory 
purposes. In other words, the PCI DSS does not itself mandate that 
merchants retain any specific kind of data. To the extent card data 
must be stored for legitimate purpose, it must be stored in a secure 
manner.
    Question 17. Why do card brands require merchants to retain 
cardholder data for the purpose of chargebacks? Since this is such 
vulnerability for merchants and cardholders, why not mandate that no 
cardholder data be retained and provide transaction IDs for the purpose 
of chargebacks?
    Answer. As noted above, the Council is not involved in the 
chargeback process.
    Question 18. Why does the PCI Council not mandate PINs for credit 
card transactions?
    Answer. What data is presented in a transaction is part of the 
authorization format used by the payment systems. Since the Council is 
a security standards body, we are focused on providing standards to 
secure payment data within the current payment system. The Council has 
nothing to do with authorization format requirements or the 
authentication of a transaction at the point of sale. The Council does 
not run a payment network, nor do we have influence over vendors' 
product platforms.
    If the system evolves to mandate PINs for all transactions, the 
Council will then address the issue of how to best provide the market 
with any necessary standards to secure this process. For example, the 
Council already maintains a comprehensive standard for PIN Entry 
Devices. This standard lists requirements that address physical and 
logical requirements for devices that process PIN transactions and 
would likely be an integral part of securing PINs if they were to be 
used more broadly in authentication.
    Question 19. The basic design and security model of credit cards 
has not changed since the 1950s. What major investments would be 
required for a large scale migration to a different payment technology? 
Who would make those investments? For example, if we were move to a 
chip and PIN system?
    Answer. The design and security model of payment cards has changed 
extensively since the 1950s. Advances have included advanced hologram 
technologies, on-line authorizations, Card Verification Codes, 3-D 
Secure, address verification, real-time heuristic fraud detection 
solutions, on-line PIN and off-line chip & PIN. This is just a sample.
    However, any migration decisions are driven by the underlying value 
proposition, which may differ from market to market and vary by payment 
brand. The Council in its role as a standards body does not have 
insight into these elements.
    Question 20. Your responses to the committee concerning adopting 
technological changes to the PCI standards, such as the end-to-end 
encryption embraced by other witnesses, seems to be: (1) We have 
addressed this issue [``there are provisions within the standard now 
that address this data, address the inside network that should, in 
fact, . . . stop this from happening . . . '']; or (2) it's unnecessary 
to address this issue [``so the need for end-to-end encryption within 
the internal network is really not there.'']; or (3) we are considering 
addressing this issue [``we have issued a proposal to a number of 
technology companies to give us an independent study on what we are 
calling emerging technologies, one of which is end-to-end 
encryption.'']. Given the skepticism toward Visa and the PCI Security 
Standards Council expressed by the other members of the panel, can you 
point to specific actions you are taking that will reassure this 
committee that you are approaching the adoption of end-to-end 
encryption and other security-enhancing solutions with the degree of 
urgency and level of seriousness warranted by the current threat?
    Answer. The introduction of any new technology--whether it is end-
to-end encryption or other security enhancing solutions such as 
virtualization and tokenization--is a matter of utmost importance to 
the Council and is treated as a high priority. We are constantly 
evaluating the potential uses of new technologies to improve the 
security of payment card data. As noted in your question, we have 
issued a proposal to a number of technology companies to research and 
submit to us an independent study of emerging technologies, one of 
which is end-to-end encryption. As discussed further in the response to 
Question 21 below, we expect to commission that study in the coming 
weeks. The issuing of this technology study demonstrates the Council's 
commitment to examining the relevance on an on-going basis of 
technologies such as encryption to the PCI Standards.
    It is important to note, however, that the message from our 
stakeholders regarding end-to-end encryption has been mixed. During the 
last feedback period in 2007, we received input from more than 350 
organizations. It is noteworthy that not a single organization 
requested that end-to-end encryption be mandated or even examined. Our 
Board of Advisors has similarly not requested an examination of end-to-
end encryption.
    Question 21. What technology companies are providing these 
``independent'' studies of emerging technologies? Mr. Jones testified 
that end-to-end encryption is not an ``emerging'' technology. If that 
is correct, what do these companies need to study with regard to end-
to-end encryption?
    Answer. The Council conducted an RFP process for selecting a vendor 
to assist in the technology study. We are currently in the negotiation 
process with the finalist--one of the major public accounting firms. 
Our RFP asked vendors to examine the impact that emerging 
technologies--including end-to-end encryption as well as technologies 
such as virtualization and tokenization--might have on the PCI 
Standards, and how broad adoption of these technologies might serve to 
simplify the process of securing payment card data.
    To Mr. Jones' point, while encryption itself is not a new 
technology, no standard currently exists on how to apply end-to-end 
encryption in a comprehensive data security framework.
    Question 22. Visa asserts that consumers bear zero legal liability 
for fraudulent use of credit cards. How is this policy financed?
    Answer. Council members understandably avoid discussing any matters 
that might in any way relate to the pricing and financing models of the 
individual payment brands, and the Council accordingly does not address 
such areas. This question is best directed to Visa, but we do note, 
that U.S. Pub. Law 93-495 (commonly referred to as ``Reg E'') protects 
a consumer against fraud in excess of $50.
    Again, I appreciate the opportunity to assist the committee in this 
matter, and support its goal of reducing the number and impact of data 
security breaches. The Council remains available to provide the 
committee with information to more fully understand and address 
cybersecurity concerns as they relate to the PCI DSS and other payment 
chain-related standards for which the Council has responsibility.
 Questions From Chairwoman Yvette D. Clarke of New York for W. Joseph 
  Majka, Head of Fraud Control and Investigations, Global Enterprise 
                            Risk, Visa, Inc.
    Question 1. The PCI requirements are directed solely at merchants 
and retailers. Why shouldn't there be a prescriptive security mandate 
for Visa or other payment card brands to secure your own networks?
    Answer. The PCI Data Security Standard (PCI DSS) applies to all 
entities that store, process, or transmit payment cardholder data, 
including financial institutions, processors, third party service 
providers, and merchants. Visa, Inc. has validated and maintained on-
going PCI DSS compliance on an annual basis using an independent 
qualified security assessor (QSA) since the creation of the PCI DSS in 
2006. In addition, Visa, Inc. adheres to more rigorous security 
measures to protect the overall Visa payment system. Visa is subject to 
oversight by U.S. regulatory bodies under the auspices of the Federal 
Financial Institution Examination Council (FFIEC) and undergoes regular 
reviews by the FFIEC.
    Question 2. Given the central role the card brands play in the 
American economy, what responsibilities do you believe they have to 
consumers and to the Nation?
    Answer. Securing consumer data within the U.S. economy is a shared 
responsibility, and every industry should deploy focused resources to 
protect consumer information within its care. In this regard, the 
payment card industry has done more than any other to provide 
stakeholders with the tools and guidance needed to properly secure the 
data they are trusted to protect. Visa has led the industry in 
protecting cardholder data and stands ready to continue to support 
industry participants in our collective fight against the criminals 
that perpetrate card fraud. Thanks to massive investments and 
innovative solutions, compromise events rarely result in actual fraud 
and fraud rates in the payments industry remain near all-time lows.
    Question 3. Is a breached company (whether compliant with the PCI 
Standards or not) subject to increases in interchange rates?
    Answer. Visa does not increase or modify the interchange rate 
structure that applies to an entity that is breached. In fact, since 
October 1, 2007, to encourage and provide incentives for stronger 
protection against data breaches, acquiring financial institutions have 
been able to qualify transactions for lower interchange rates under the 
``tiered'' interchange rate system by, among other best practices and 
volume requirements, ensuring that their merchant customers comply with 
the PCI DSS. Acquirers of merchants that have been compromised and are 
found not to have been in compliance with the PCI DSS may therefore 
lose the benefit of these incentive-based ``tiered'' interchange rates, 
until they demonstrate that they have come into compliance.
    Question 4. In responses to the committee's investigation, you 
stated that ``while there have been a few instances where an entity 
with previously validated PCI DSS compliance was the victim of a 
compromise, in all compromise cases our review concluded that gaps in 
the compromised entity's PCI DSS controls were major contributors to 
the breach.'' What gaps are normally found in a victim's security 
controls after they have been certified PCI compliant, but later found 
to be out of compliance?
    Answer. In all compromised cases within Visa's purview, third-party 
investigations concluded that gaps in the compromised entity's PCI DSS 
controls were major contributors to the breach. Gaps commonly include 
failures to secure and monitor non-payment-related systems that are 
connected to the payment environment, which are then targeted to gain 
access to the network. Corporate Web sites are an example of non-
payment-related systems commonly targeted by criminals through 
Structured Query Language (SQL) injection attacks. Another common gap 
is insufficient monitoring of logs for firewalls, anti-virus, intrusion 
detection systems, as well as monitoring of privileged user accounts. 
The PCI DSS requires that not only should there be mechanisms in place 
to monitor for intrusions, but also that the organization regularly 
monitors the logs generated to identify and investigate anomalous 
activity.
    Visa works with its acquiring financial institutions, through its 
compliance programs to ensure merchants and their service providers 
achieve and maintain PCI DSS compliance. It is the responsibility of 
the acquiring financial institution, which deals directly with their 
merchants and their service providers, to ensure these entities 
continue to eliminate unnecessary risk to the overall payment system. 
To determine overall success of these measures, Visa actively requests 
frequent reporting from its acquiring financial institutions on the 
status of the PCI DSS compliance of their merchants and service 
providers. In support of these compliance programs, Visa has actively 
communicated, since 2006, common vulnerabilities and corresponding 
mitigation measures that merchants and service providers mistakenly 
leave susceptible to attack on their systems. In addition, Visa 
provides other data security alerts, bulletins and webinars to payment 
system participants, all publicly available at www.visa.com/cisp.
    Validating PCI DSS is a major milestone, but achieving and 
maintaining compliance requires companies to make an on-going 
commitment to keeping all consumers' data safe, including cardholder 
data--24 hours a day, 7 days a week, 365 days a year. For any standard 
to be effective, however, organizations must rigorously ensure that 
they comply with each of its requirements on an on-going basis. Verizon 
Business' 2009 Data Breach Investigations Report affirms similar 
findings, ``The majority of breaches still occur because basic controls 
were not in place or because those that were present were not 
consistently implemented across the organization.'' Further, the report 
specifically attributes non-compliance to PCI DSS requirements as major 
factors contributing to breaches. Verizon cites PCI DSS Requirements 3 
(protect stored cardholder data), 6 (develop and maintain secure 
systems and applications), and 10 (track and monitor access to network 
resources and cardholder data) as the least compliant across their 
caseload, saying, ``This trio of deficiencies factored heavily into 
many of the largest breaches investigated by our team over the past 
five years.''
    Question 5. Mr. Russo of the PCI Council stated in his testimony 
that ``in fact, we have never found a breached entity to have been in 
full compliance with the PCI standards at the time of a breach.'' Can 
you please explain the discrepancy between that statement and the 
statement of Ellen Richey, Chief Enterprise Risk Officer at Visa, that 
Heartland had validated PCI compliance ``but it was a lack of on-going 
compliance and on-going vigilance in maintaining security that left 
them vulnerable to attack''. Can you please explain exactly how 
Heartland was not in full compliance with the PCI standards?
    Answer. In all compromise cases within Visa's purview and as stated 
by Mr. Russo, despite any validation that may have been completed by a 
QSA, the breached entity was not found to have been in full compliance 
at the time of the breach. Based on compromise event findings, Visa 
removed Heartland from its list of PCI DSS compliant service providers. 
Information related to Heartland's PCI DSS compliance status was 
provided to Visa under the obligations of a confidentiality agreement. 
As such, Visa suggests contacting Heartland directly for specifics.
    Question 6. You stated in your testimony that Visa looks forward to 
``working with all participants to continue to develop tools to 
minimize the risk and the impact of data-compromise events.'' Does Visa 
understand the committee's concern about a fraud prevention strategy 
that minimizes fraudulent charges only to the extent that card brands 
and issuing banks remain solvent when fraudulent charges finance 
criminal activities?
    Answer. Visa's goal is to prevent both card data compromises and 
the subsequent potential for fraudulent transactions. Visa has been 
executing a multi-layered security strategy working with all payment 
system participants to prevent data compromises around the world as 
well as the fraud that may result there from. Visa invests substantial 
resources and leads innovation in the industry with measures to stay 
ahead of criminals and prevent them from obtaining financing through 
the payment system. This includes, for card-based solutions (e.g., EMV-
chip, contactless), data-based measures (e.g., PCI DSS), and network-
based technologies (e.g., Advanced Authorization, neural networks, 
Address Verification Service). In addition, participants in the Visa 
system should strictly adhere to the EFT Act and Reg. E, the Truth in 
Lending Act and Reg. Z, as well as numerous other Federal regulations 
that protect consumers from the consequences of data breaches and 
fraud. Additionally, Visa is currently working to empower cardholders 
to play a more active role in protecting their information through 
innovations such as transaction alerts. Armed with this kind of 
information, cardholders can help monitor usage on their accounts and 
identify potential fraud. All of these measures are designed to prevent 
criminals from obtaining card data, and to prevent them from using it 
to commit fraud.
    Question 7. Merchants who have experienced data breaches also face 
significant class action lawsuits. What liability exists for the 
payment card industry and the assessors if a PCI-compliant company is 
breached?
    Answer. Parties that experience data breaches may be subject to the 
liabilities determined through the court system. Visa is aware of a 
number of class action lawsuits related to major data breaches in the 
United States. However, Visa cannot speculate about facts and outcomes 
in potential or pending class action lawsuits. To our knowledge, no 
organization that has fully implemented and maintained compliance with 
the PCI DSS has been the victim of a data compromise event. These 
breaches damage consumer trust in the overall electronic payment 
system, including Visa and its brand.
    Question 8. In response to the committee, JCB said that they expect 
the PCI standards will continue to ``become even more stringent in 
future iterations of the PCI standards.'' Is this also your 
expectation? What changes will the next iteration likely have?
    Answer. The PCI SSC is charged with reviewing and updating the PCI 
DSS to ensure that it remains effective to protect card data, by 
incorporating input from stakeholders as well as technological 
developments in the evolution of the standard over time. Since its 
creation, the PCI DSS has been formally updated three times, with 
considerable input from over 500 participating organizations, including 
merchants, banks, and service providers from around the world, in order 
to meet the evolving threats to the system, changing technologies and 
the increased sophistication of hackers. The updates introduced in 
version 1.1 and 1.2 of the PCI DSS have been relatively minor changes, 
most of which served as clarifications to help entities better 
understand the intent of a requirement. We expect the standard will 
continue to evolve to address new threats as they materialize and add 
further specificity where participating organizations, including many 
global merchants, provide feedback.
    Question 9. Currently, requirements of notification of breaches 
vary from State to State. Given that the Department of Justice stressed 
the importance of notification, both of law enforcement and consumers, 
has or will the Council consider mandating notification as part of its 
standards? How would or could that be enforced?
    Answer. PCI DSS Requirement 12.9.1 addresses incident response and 
requires entities to have a communication and contact strategy in the 
event of data compromise. Additionally, in the event of a compromise 
Visa advises entities to follow all State and Federal disclosure 
requirements. Visa also works closely with the Federal Bureau of 
Investigation's Cyber Division, United States Secret Service, United 
States Postal Inspection Service, State attorneys general and the 
Department of Justice Cybercrime and Intellectual Properties Unit in 
criminal cases of data compromises.
    Question 10. You stated that ``security must be a shared 
responsibility among all relative parties--law enforcement, payment 
companies, regulatory agencies, retailers and others.'' How is the 
financial risk and liability shared between these parties?
    Answer. Financial institutions have the direct responsibility and 
relationship with cardholders, and because of Federal law and Visa's 
zero liability policy for cardholders, bear most of the financial loss 
if fraud occurs. Visa's Account Data Compromise Recovery program allows 
issuing financial institutions to receive reimbursement for counterfeit 
fraud losses and a portion of their operating expenses incurred as a 
result of data compromise events from the financial institution 
responsible for the compromised entity in the Visa system.
    Question 11. Mr. Jones of Michaels Stores stated in his testimony 
that ``credit card companies' financial institutions do not accept 
encrypted transaction.'' The committee is concerned that the PCI 
Council is not applying the same standards to its members that it 
applies to merchants and processors. Is Visa planning to move forward 
with securing the communications channel between merchants and 
financial institutions?
    Answer. Visa accepts encrypted data transmissions from its 
processing endpoints and many processors also accept encrypted data 
transmissions for merchant transaction submissions. Visa is also 
mandating use of stronger encryption for protection of PINs at every 
point of sale globally, specifying use of Triple Data Encryption 
Standard (TDES) for PIN accepting entities. While the PCI DSS requires 
encryption over public networks including the internet, it does not 
require the use of encryption over private networks, such as a 
merchant's internal network or a private connection between a merchant 
and processor. Encrypting cardholder data in-transit over private 
networks is encouraged. It should be noted, however, that while 
encryption can add an additional layer of security, the data is still 
at risk if transactions must be decrypted at any point within the 
private network--for example, for transaction processing--and must 
still be properly protected. As such, many organizations have 
determined that the costs and number of system and software 
modifications needed outweigh any incremental security benefit. The 
requirements outlined currently in the PCI DSS, when implemented 
properly, should effectively prevent a criminal from obtaining access 
to a business' private network and detect any unauthorized access.
    Question 12. The basic design and security model of credit cards 
has not changed since the 1950s. What major investments would be 
required for a large-scale migration to a different payment technology? 
Who would make those investments? For example, if we were move to a 
chip and PIN system?
    Answer. In the 50 years since the beginning of the card industry, 
Visa has evolved from credit card roots to become one of the world's 
leading global retail electronic payments networks. Today, the Visa 
network connects cardholders, merchants, and financial institutions 
around the world with products and services that are designed to make 
payments faster, more convenient, more reliable, and more secure. At 
the heart of Visa's business is VisaNet, our centralized processing 
platform and one of the world's largest transaction and information 
processing networks. Nearly 92 billion authorization, clearing, and 
settlement transactions were processed through VisaNet in calendar year 
2008. On this platform, Visa has been able to build capabilities that 
provide secure, reliable, and scalable processing, including 
innovations such as Advanced Authorization to risk-score transactions 
in real time. Other examples of technological improvements include the 
introduction of magnetic stripe technology, CVV2 (three-digit code on 
the back of a Visa card), address verification service and contactless 
cards with dynamic data technology. There have also been anti-
counterfeit measures such as holograms, ultra-violet marks, and micro 
text, to name a few. Fraud rates today are at historic lows, much lower 
than they were decades ago when we did not fully benefit from the power 
of the Visa network to be able to analyze and authorize transactions in 
real time.
    Visa supports chip technologies around the world, including in the 
United States where we are beginning to see adoption in mobile and 
contactless payments. Chip technology--both contact and contactless--
can add an important security layer, introducing dynamic data into 
transactions which can reduce the incidence of fraud. However, we 
recognize that there are different needs, threats, and infrastructures 
in different parts of the world, and there is no one-size-fits-all chip 
solution. In some other countries around the world, the market has 
driven the adoption of chip technology based on these factors. To the 
extent chip adoption can meet the needs of the payments industry in the 
United States, Visa is ready to support migration as it has in other 
markets. Where chip technology has been implemented broadly in a 
market, it should be noted that migration takes time. The costs have 
been shared by all parties--payment networks, financial institutions, 
and merchants. Generally, the card brands make investments in the 
network upgrades and consistent standards and financial institutions 
and merchants typically bear the increased cost of card technology and 
the upgraded payment terminals.
    Question 13. A large part of the data theft problem is the amount 
of valuable data stored in the system. What requirements exist for 
merchants to store credit card data in their systems? Please explain 
how the chargeback/retrieval process affects what kinds of data can or 
should be stored on a merchant's system.
    Answer. Visa does not require merchants to store complete card 
numbers. To the contrary, Visa encourages merchants to limit retention 
to truncated account numbers and has executed a ``drop the data'' 
educational campaign in partnership with the U.S. Chamber of Commerce 
over the past 3 years to encourage merchants to reduce data storage 
(www.dropthedata.com). A merchant may work with their acquiring 
financial institution to implement the necessary chargeback processes 
that do not rely upon the merchant's storage of the account number. For 
example, a signed point-of-sale terminal receipt with a truncated 
account number and the accompanying authorization log is valid 
fulfillment and will remedy a fraud chargeback. As such, a merchant may 
mitigate their risk by storing only truncated account numbers. In many 
cases, merchants decide to store cardholder data for marketing, loyalty 
programs, or customer service purposes. In those instances, Visa 
requires that stored data is protected in accordance with the PCI DSS.
    Question 14. In responses to the committee, Discover stated that it 
is currently making changes to processes to provide merchants with the 
option of receiving masked data for disputes (like retrievals and 
chargebacks) as well as settlement reports. Is Visa doing something 
similar? Would this cut back on the amount of data stored that could be 
subject to breach?
    Answer. Visa does not require merchants to store complete card 
numbers. Visa continues to work with those financial institution 
clients that may be requesting card numbers for dispute resolution to 
eliminate this practice and adopt the use of truncated account numbers. 
While Visa strives to eliminate any practices that may lead to the 
storage of cardholder data, there are likely many other reasons 
merchants have made a business decision to store this data, including 
processing returns and loyalty programs. In addition to our efforts to 
limit retention of complete account numbers, Visa has made considerable 
strides toward eliminating the storage by merchants and processors of 
authorization data, which criminals covet to perpetrate fraud. This 
``prohibited'' data includes full magnetic stripe data, the CVV2 or 
``Card Verification Value 2'' and PIN.
    Question 15. Visa asserts that consumers bear zero legal liability 
for fraudulent use of credit cards. How is this policy financed?
    Answer. Visa card-issuing financial institutions are responsible 
for complying with Federal law and honoring Visa's zero liability 
policy for cardholders and, as a result, bear most of the financial 
loss if fraud occurs.
    In closing, Visa is acutely focused on ensuring that payment 
products are not used to perpetrate criminal activity and has taken a 
leading role in promoting cardholder information security and 
innovation within the payments industry. I appreciate the opportunity 
to assist the committee in this matter.
  Questions From Chairwoman Yvette D. Clarke of New York for Michael 
 Jones, Senior Vice President and Chief Information Officer, Michaels 
                              Stores, Inc.
    Question 1. How much does it cost you to comply with the PCI 
standards, and are they effective in keeping out intruders?
    Answer. Response was not received at the time of publication.
    Question 2. Are retailers bearing a disproportionate burden of 
costs in data security?
    Answer. Response was not received at the time of publication.
    Question 3. Do you agree that the effectiveness of data security 
standards is inherently limited by the technology base of U.S. credit 
and signature debit card processing networks? How could this technology 
base be improved, and what obstacles exist that would prevent this from 
happening?
    Answer. Response was not received at the time of publication.
    Question 4. Have you ever notified the Council of assessors trying 
to sell their own products or services?
    Answer. Response was not received at the time of publication.
    Question 5. The basic design and security model of credit cards has 
not changed since the 1950s. What major investments would be required 
for a large-scale migration to a different payment technology? Who 
would make those investments? For example, if we were move to a chip 
and PIN system?
    Answer. Response was not received at the time of publication.
    Question 6. A large part of the data theft problem is the amount of 
valuable data stored in the system. What requirements exist for 
merchants to store credit card data in their systems? Please explain 
how the chargeback/retrieval process affects what kinds of data can or 
should be stored on a merchant's system.
    Answer. Response was not received at the time of publication.
    Question 7. Visa asserts that consumers bear zero legal liability 
for fraudulent use of credit cards. How is this policy financed?
    Answer. Response was not received at the time of publication.
Questions From Chairwoman Yvette D. Clarke of New York for David Hogan, 
    Senior Vice President, Retail Operations, and Chief Information 
                  Officer, National Retail Federation
    Question 1. Are retailers bearing a disproportionate burden of 
costs in data security?
    Answer. Response was not received at the time of publication.
    Question 2. Do you agree that the effectiveness of data security 
standards is inherently limited by the technology base of U.S. credit 
and signature debit card processing networks? How could this technology 
base be improved, and what obstacles exist that would prevent this from 
happening?
    Answer. Response was not received at the time of publication.
    Question 3. Have you ever notified the Council of assessors trying 
to sell their own products or services?
    Answer. Response was not received at the time of publication.
    Question 4. The basic design and security model of credit cards has 
not changed since the 1950s. What major investments would be required 
for a large-scale migration to a different payment technology? Who 
would make those investments? For example, if we were move to a chip 
and PIN system?
    Answer. Response was not received at the time of publication.
    Question 5. A large part of the data theft problem is the amount of 
valuable data stored in the system. What requirements exist for 
merchants to store credit card data in their systems? Please explain 
how the chargeback/retrieval process affects what kinds of data can or 
should be stored on a merchant's system.
    Answer. Response was not received at the time of publication.
    Question 6. Visa asserts that consumers bear zero legal liability 
for fraudulent use of credit cards. How is this policy financed?
    Answer. Response was not received at the time of publication.

                                 
