Feb 14, 2011 (Congressional Documents and Publications/ContentWorks via COMTEX) — Chairman Thornberry, Ranking Member Langevin, and Members of the Subcommittee: Thank you for the opportunity to testify today on behalf of the Center for Democracy & Technology. n1 We applaud the Subcommittee for examining the role of the Department of Defense in cybersecurity. Today, I will briefly outline the cybersecurity threat and discuss how to avoid cybersecurity measures that would infringe on privacy or innovation or unintentionally undermine security itself. I will emphasize that private network operators, not the government, should monitor and secure private sector systems, while the Department of Defense secures military systems and the Department of Homeland Security secures civilian government systems. To the extent that DOD entities have information and expertise that would help private sector operators and DHS with their cybersecurity activities, mechanisms must be developed to permit DOD to share that information and expertise. I also will discuss some incremental changes in the law that may enhance information sharing without eroding privacy. Finally, I will discuss the role that identity and authentication measures, if properly designed and deployed, can play in enhancing security while also protecting privacy.