[Congressional Record: February 16, 2011 (Senate)]
[Page S796-S797]
STATEMENTS ON INTRODUCED BILLS AND JOINT RESOLUTIONS
By Mr. CARDIN (for himself and Mr. Whitehouse):
S. 372. A bill the ability of terrorists, spies, criminals, and other
malicious actors to compromise, disrupt, damage, and destroy computer
networks, critical infrastructure, and key resources, and for other
purposes; to the Committee on Commerce, Science, and Transportation.
Mr. CARDIN. Mr. President, the Internet has had a profound impact on
the daily lives of millions of Americans by enhancing communications,
commerce, education and socialization between and among persons
regardless of their location. Internationally, we have seen the
transformative power of the Internet in places like Egypt. A free and
open Internet gives strength and a voice to people worldwide and should
be protected from censorship and other forms of suppression. But the
Internet and those who engage in communications and commerce across
cyberspace must be safe--protected from predators like criminals,
terrorists and spies who wish to exploit or compromise information and
systems connected to the Internet. Our Nation is vulnerable to such
attacks, but working together, in partnership with the private sector,
we can find a balance that keeps information flowing freely while
keeping us all safe from harm.
I have been focusing on cybersecurity issues for quite some time.
More than a year ago, as the former chairman of the Terrorism and
Homeland Security Subcommittee of the Judiciary Committee, I chaired a
Subcommittee hearing titled ``Cybersecurity: Preventing Terrorist
Attacks and Protecting Privacy in Cyberspace.'' The hearing included
witnesses from key federal agencies responsible for cybersecurity, as
well as representatives of the private sector. We reviewed governmental
and private sector efforts to prevent a terrorist cyber attack that
could cripple large sectors of our government, economy, and essential
services.
The cybersecurity expertise that I have developed has convinced me
that the Government and the private sector can and should work together
to protect the American people in cyberspace. As a result, I am
reintroducing the Cybersecurity and Internet Safety Standards Act,
CISSA. This bill, which is cosponsored by Senator Whitehouse, will
require the Secretary of Homeland Security, in consultation with the
Attorney General, the Secretary of Commerce, and the Director of
National Intelligence, to conduct an analysis to determine the costs
and benefits of requiring internet service providers and others to
develop and enforce minimum voluntary or mandatory cybersecurity and
Internet safety standards. Under this bill, the Secretary of Homeland
Security will be required to report to Congress within one year with
specific recommendations. Cybersecurity must be a top priority. This
bill will help secure our nation's digital future by keeping the
American people and our cyber infrastructure safe without hampering the
freedoms inherently found in an open and accessible Internet.
Mr. President, I ask unanimous consent that the text of the bill be
printed in the Record.
There being no objection, the text of the bill was ordered to be
printed in the Record, as follows:
S. 372
Be it enacted by the Senate and House of Representatives of
the United States of America in Congress assembled,
SECTION 1. SHORT TITLE.
This Act may be cited as the ``Cybersecurity and Internet
Safety Standards Act''.
SEC. 2. DEFINITIONS.
In this Act:
(1) Computers.--Except as otherwise specifically provided,
the term ``computers'' means computers and other devices that
connect to the Internet.
(2) Providers.--The term ``providers'' means Internet
service providers, communications service providers,
electronic messaging providers, electronic mail providers,
and other persons who provide a service or capability to
enable computers to connect to the Internet.
(3) Secretary.--Except as otherwise specifically provided,
the term ``Secretary'' means the Secretary of Homeland
Security.
SEC. 3. FINDINGS.
Congress finds the following:
(1) While the Internet has had a profound impact on the
daily lives of the people of the United States by enhancing
communications, commerce, education, and socialization
between and among persons regardless of their location,
computers may be used, exploited, and compromised by
terrorists, criminals, spies, and other malicious actors,
and, therefore, computers pose a risk to computer networks,
critical infrastructure, and
[[Page S797]]
key resources in the United States. Indeed, users of
computers are generally unaware that their computers may be
used, exploited, and compromised by others with spam,
viruses, and other malicious software and agents.
(2) Since computer networks, critical infrastructure, and
key resources of the United States are at risk of being
compromised, disrupted, damaged, or destroyed by terrorists,
criminals, spies, and other malicious actors who use
computers, cybersecurity and Internet safety is an urgent
homeland security issue that needs to be addressed by
providers, technology companies, and persons who use
computers.
(3) The Government and the private sector need to work
together to develop and enforce minimum voluntary or
mandatory cybersecurity and Internet safety standards for
users of computers to prevent terrorists, criminals, spies,
and other malicious actors from compromising, disrupting,
damaging, or destroying the computer networks, critical
infrastructure, and key resources of the United States.
SEC. 4. COST-BENEFIT ANALYSIS.
(a) Requirement for Analysis.--The Secretary, in
consultation with the Attorney General, the Secretary of
Commerce, and the Director of National Intelligence, shall
conduct an analysis to determine the costs and benefits of
requiring providers to develop and enforce voluntary or
mandatory minimum cybersecurity and Internet safety standards
for users of computers to prevent terrorists, criminals,
spies, and other malicious actors from compromising,
disrupting, damaging, or destroying computer networks,
critical infrastructure, and key resources.
(b) Factors.--In conducting the analysis required by
subsection (a), the Secretary shall consider--
(1) all relevant factors, including the effect that the
development and enforcement of minimum voluntary or mandatory
cybersecurity and Internet safety standards may have on
homeland security, the global economy, innovation, individual
liberty, and privacy; and
(2) any legal impediments that may exist to the
implementation of such standards.
SEC. 5. CONSULTATION.
In conducting the analysis required by section 4, the
Secretary shall consult with the Attorney General, the
Secretary of Commerce, the Director of National Intelligence,
the Federal Communications Commission, and relevant
stakeholders in the Government and the private sector,
including the academic community, groups, or other
institutions, that have scientific and technical expertise
related to standards for computer networks, critical
infrastructure, or key resources.
SEC. 6. REPORT.
(a) In General.--Not later than 1 year after the date of
the enactment of this Act, the Secretary shall submit to the
appropriate committees of Congress a final report on the
results of the analysis required by section 4. Such report
shall include the consensus recommendations, if any, for
minimum voluntary or mandatory cybersecurity and Internet
safety standards that should be developed and enforced for
users of computers to prevent terrorists, criminals, spies,
and other malicious actors from compromising, disrupting,
damaging, or destroying computer networks, critical
infrastructure, and key resources.
(b) Appropriate Committees of Congress.--In this section,
the term ``appropriate committees of Congress'' means--
(1) the Committee on Commerce, Science, and Transportation,
the Committee on Homeland Security and Governmental Affairs,
and the Committee on the Judiciary of the Senate; and
(2) the Committee on Energy and Commerce, the Committee on
Homeland Security, the Committee on the Judiciary, and the
Committee on Oversight and Government Reform of the House of
Representatives.
______