[Congressional Record: February 17, 2011 (Senate)]
[Page S909-S912]
STATEMENTS ON INTRODUCED BILLS AND JOINT RESOLUTIONS
By Mr. LIEBERMAN (for himself, Ms. Collins, and Mr. Carper):
S. 413. A bill to amend the Homeland Security Act of 2002 and other
laws to enhance the security and resiliency of the cyber and
communications infrastructure of the United States; to the Committee on
Homeland Security and Governmental Affairs.
Ms. COLLINS. Mr. President, I rise today to join Senator Lieberman
and Senator Carper in introducing the Cyber Security and Internet
Freedom Act of 2011. This vital legislation would
[[Page S910]]
fortify the government's efforts to safeguard America's cyber networks
from attack and ensure that access to the Internet is protected and its
availability preserved for every American.
The Internet is vital to almost every facet of Americans' daily
lives--from the water we drink to the power we use to the ways we
communicate. It is essential to the free flow of ideas and information.
The Internet is a manifestation of the ideals that underlie the First
Amendment of our Constitution and the core freedoms that all Americans
hold dear. It is essential that the Internet and our access to it be
protected to ensure both reliability of the critical services that rely
upon it and the availability of the information that travels over it.
While the United States must ensure the security of our nation and its
critical infrastructure, it must do so in a manner that does not
deprive Americans of the ability to lawfully read or express their
views. Neither the President nor any other Federal official should have
the authority to ``shut down'' the Internet.
In June 2010, Senator Lieberman, Senator Carper, and I introduced
legislation to strengthen the government's efforts to safeguard
America's cyber networks from attack; build a public/private
partnership to promote national cyber security priorities; and bolster
the government's ability to set, monitor compliance with, and enforce
standards and policies for securing Federal civilian systems and the
sensitive information they contain. In late June, that bill was
unanimously approved by the Senate Homeland Security and Governmental
Affairs Committee.
Today we are introducing for the 112th Congress the bill unanimously
approved by our committee, but with explicit provisions preventing the
President from shutting down the Internet and providing an opportunity
for judicial review of designations of our most sensitive systems and
assets as ``covered critical infrastructure.''
President Mubarak's actions in January to shut down Internet
communications in Egypt were, and are, totally inappropriate. Freedom
of speech is a fundamental right that must be protected, and his ban
was clearly designed to limit criticisms of his government. Our cyber
security legislation is intended to protect the United States from
external cyber attacks. Yet, some have suggested that the legislation
the Committee reported during the last Congress would empower the
President to deny U.S. citizens access to the Internet. Nothing could
be further from the truth.
I would never sign on to legislation that authorized the President,
or anyone else, to shut down the Internet. Emergency or no, the
exercise of such broad authority would be an affront to our
Constitution.
But our outmoded current laws do give us reason to be concerned. Most
important, under current law, in the event of a cyber attack, the
President's authorities are broad and ambiguous--a recipe for
encroachments on privacy and civil liberties.
For example, in the event of a war or threat of war, the
Communications Act of 1934 authorizes the President to take over or
shut down wire and radio communications providers. This law is a crude
sledgehammer built for another time and technology. Our bill contains a
number of protections to make sure that broad authority cannot be used
to shut down the Internet.
First, section 2 of the bill states explicitly:
Notwithstanding any other provision of this Act, an
amendment made by this Act, or section 706 of the
Communications Act of 1934, neither the President, the
Director of the National Center for Cybersecurity and
Communications, or any officer or employee of the United
States Government shall have the authority to shut down the
Internet.
Second, the emergency measures in our bill apply in a precise and
targeted way only to our most critical infrastructure--vital components
of the electric power grid, telecommunications networks, financial
systems or other critical infrastructure systems that could cause a
national or regional catastrophe if disrupted. This definition would
not cover the entire Internet, the Internet backbone, or even entire
companies.
In defining covered critical infrastructure, our bill directs the
Secretary to consider the consequences of a disruption of a particular
system or asset. To constitute a ``national or regional catastrophe,''
the disruption would need to cause a mass casualty event which includes
an extraordinary number of fatalities; severe economic consequences;
mass evacuations with a prolonged absence; or severe degradation of
national security capabilities, including intelligence and defense
functions.
When the Committee reported this bill last year, the report clarified
what these four factors mean, specifically referencing the current DHS
interpretation of ``national or severe economic consequences; mass
evacuations with a prolonged absence; or regional catastrophe.'' Under
DHS's interpretation, a ``national or regional catastrophe'' includes a
combination of the following factors: more than 2,500 prompt
fatalities; greater than $25 billion in first-year economic
consequences; mass evacuations with a prolonged absence of greater than
one month; or severe degradation of the nation's security capabilities.
As our Committee's report noted, we expect the Department to apply
this standard in determining which particular systems or assets
constitute covered critical infrastructure.
Third, our legislation restricts the President's ability to declare a
national cyber emergency to those circumstances in which an ``actual or
imminent'' cyber attack would disrupt covered critical infrastructure
that would cause these catastrophic consequences.
Fourth, any measures ordered by the President must be ``the least
disruptive means feasible.''
Fifth, the authority our bill would grant is time limited. The
President could only declare a cyber emergency for 30-day period and
only for up to 120 days. After that, Congress would be required to
specifically authorize further measures. Any declaration would be
subject to congressional oversight, as our bill requires the President
to notify Congress regarding the specific threat to our nation's
infrastructure, why existing protections are not sufficient, and what
specific emergency measures are required to respond to the specific
threat.
Sixth, the legislation expressly forbids the designation of any
system or asset as covered critical infrastructure ``based solely on
activities protected by the first amendment to the United States
Constitution.''
Seventh, the bill provides for a robust administrative process for an
owner or operator to challenge the designation of a system or asset as
covered critical infrastructure and expressly permits challenges of a
final agency determination in federal court.
Our bill contains protections to prevent the President from denying
Americans access to the Internet--even as it provides clear and
unambiguous direction to ensure that those most critical systems and
assets that rely on the Internet are protected. And, even though
experts question whether anyone can technically ``shut down'' the
Internet in the United States, we included explicit language
prohibiting the President from doing what President Mubarak did.
I would like to stress that the need for Congress to pass a
comprehensive cyber security bill is more urgent than ever.
Cyber-based threats to U.S. information infrastructure are
increasing, constantly evolving, and growing more dangerous.
In March 2010 the Senate's Sergeant at Arms reported that the
computer systems of Congress and the Executive Branch agencies are now
under cyber attack an average of 1.8 billion times per month. The
annual cost of cyber crime worldwide has climbed to more than $1
trillion.
Coordinated cyber attacks have crippled Estonia, Georgia, and
Kyrgyzstan and compromised critical infrastructure in countries around
the world.
Devastating cyber attacks could disrupt, damage, or even destroy some
of our nation's critical infrastructure, such as the electric power
grid, oil and gas pipelines, dams, or communications networks. These
cyber threats could cause catastrophic damage in the physical world.
Based on media reports, China and Russia already have penetrated the
computer systems of America's electric power grid, leaving behind
malicious
[[Page S911]]
hidden software that could be activated later to disrupt the grid
during a war or other national crisis.
In June 2010, cyber security experts discovered Stuxnet, one of the
most sophisticated viruses ever found. Stuxnet was programmed
specifically to infiltrate certain industrial control systems, allowing
the virus to potentially overwrite commands and to sabotage infected
systems. It had the potential to change instructions, commands, or
alarm thresholds, which, in turn, could damage, disable, or disrupt
equipment supporting the most critical infrastructure.
The private sector is also under attack. In January 2010, Google
announced that attacks originating in China had targeted its systems as
well as the networks of more than 30 other companies. The attacks on
Google sought to access the email accounts of Chinese human
rights activists. For other companies, lucrative information such as
critical corporate data and software source codes were targeted.
According to a report released last week, coordinated and covert
attacks hit more than five major oil, energy, and petrochemical
companies. The focus of the intrusions was oil and gas field production
systems, as well as financial documents related to field exploration
and bidding for new oil and gas leases. The companies also lost
information related to their industrial control systems.
In the cyber domain, the advantage lies with our adversaries, for
whom success could be achieved by exploiting a single vulnerability
that could produce disruptive effects at network speed. Effectively
preventing or containing major cyber attacks requires that response
plans be in place and roles and authorities of Federal government
agencies and entities be clearly delineated in advance.
For too long, our approach to cyber security has been disjointed and
uncoordinated. This cannot continue. The United States requires a
comprehensive cyber security strategy backed by effective
implementation of innovative security measures. There must be strong
coordination among law enforcement, intelligence agencies, the
military, and the private sector owners and operators of critical
infrastructure.
This bill would establish the essential point of coordination across
the Executive branch. The Office of Cyberspace Policy in the Executive
Office of the President would be run by a Senate-confirmed Director who
would advise the President on all cyber security matters. The Director
would lead and harmonize Federal efforts to secure cyberspace and would
develop a strategy that incorporates all elements of cyber security
policy. The Director would oversee all Federal activities related to
the strategy to ensure efficiency and coordination. The Director would
report regularly to Congress to ensure transparency and oversight.
To be clear, the White House official would not be another
unaccountable czar. The Cyber Director would be a Senate-confirmed
position and thus would testify before Congress. The important
responsibilities given to the Director of the Office of Cyberspace
Policy related to cyber security are similar to the responsibilities of
the current Director of the Office of Science and Technology Policy.
The Cyber Director would advise the President and coordinate efforts
across the Executive branch to protect and improve our cyber security
posture and communications networks. And, by working with a strong
operational and tactical partner at the Department of Homeland
Security, the Director would help improve the security of Federal and
private sector networks.
This strong DHS partner would be the National Center for
Cybersecurity and Communications, or Cyber Center. It would be located
within the Department of Homeland Security to elevate and strengthen
the Department's cyber security capabilities and authorities. This
Center also would be led by a Senate-confirmed Director.
The Cyber Center, anchored at DHS, will close the coordination gaps
that currently exist in our disjointed federal cyber security efforts.
For day-to-day operations, the Center would use the resources of DHS,
and the Center Director would report directly to the Secretary of
Homeland Security. On interagency matters related to the security of
Federal networks, the Director would regularly advise the President--a
relationship similar to the Director of the NCTC on counterterrorism
matters or the Chairman of the Joint Chiefs of Staff on military
issues. These dual relationships would give the Center Director
sufficient rank and stature to interact effectively with the heads of
other departments and agencies, and with the private sector.
Congress has dealt with complex challenges involving the need for
interagency coordination in the past with a similar construct. We have
established strong leaders with supporting organizational structures to
coordinate and implement action across agencies, while recognizing and
respecting disparate agency missions.
The establishment of the National Counterterrorism Center within the
Office of the Director of National Intelligence is a prime example of a
successful reorganization that fused the missions of multiple agencies.
The Director of NCTC is responsible for the strategic planning of joint
counterterrorism operations, and in this role reports to the President.
When implementing the information analysis, integration, and sharing
mission of the Center, the Director reports to the Director of National
Intelligence. These dual roles provide access to the President on
strategic, interagency matters, yet provide NCTC with the structural
support and resources of the office of the DNI to complete the day-to-
day work of the NCTC. The DHS Cyber Center would replicate this
successful model for cyber security.
This bill would establish a public/private partnership to improve
cyber security. Working collaboratively with the private sector, the
Center would produce and share useful warning, analysis, and threat
information with the private sector, other Federal agencies,
international partners, and state and local governments. By developing
and promoting best practices and providing voluntary technical
assistance to the private sector, the Center would improve cyber
security across the nation. Best practices developed by the Center
would be based on collaboration and information sharing with the
private sector. Information shared with the Center by the private
sector would be protected.
With respect to the owners and operators of our most critical systems
and assets, the bill would mandate compliance with certain risk-based
performance metrics to close security gaps. These metrics would apply
to vital components of the electric grid, telecommunications networks,
financial systems, or other critical infrastructure systems that could
cause a national or regional catastrophe if disrupted.
This approach would be similar to the current model that DHS employs
with the chemical industry. Rather than setting specific standards, DHS
would employ a risk-based approach to evaluating cyber risk, and the
owners and operators of covered critical infrastructure would develop a
plan for protecting against those risks and mitigating the consequences
of an attack.
These owners and operators would be able to choose which security
measures to implement to meet applicable risk-based performance
metrics. The bill does not authorize any new surveillance authorities
or permit the government to ``take over'' private networks. This model
would allow for continued innovation and dynamism that are fundamental
to the success of the IT sector.
The bill would protect the owners and operators of covered critical
infrastructure from punitive damages when they comply with the new
risk-based performance measures. Covered critical infrastructure also
would be required to report certain significant breaches affecting
vital system functions to the Center. Collaboration with the private
sector would help develop mitigations for these cyber risks.
The Center also would share information, including threat analysis,
with owners and operators of critical infrastructure regarding risks
affecting the security of their sectors. The Center would work with
sector-specific agencies and other Federal agencies with existing
regulatory authority to avoid duplication of requirements, to use
existing expertise, and to ensure government resources are employed in
the most efficient and effective manner.
[[Page S912]]
With regard to Federal networks, the Federal Information Security
Management Act--known as FISMA--gives the Office of Management and
Budget broad authority to oversee agency information security measures.
In practice, however, FISMA is frequently criticized as a ``paperwork
exercise'' that offers little real security and leads to a disjointed
cyber security regime in which each Federal agency haphazardly
implements its own security measures.
The bill we introduce today would transform FISMA from paper based to
real-time responses. It would codify and strengthen DHS authorities to
establish complete situational awareness for Federal networks and
develop tools to improve resilience of Federal Government systems and
networks.
The legislation also would ensure that Federal civilian agencies
consider cyber risks in IT procurements instead of relying on the ad
hoc approach that dominates civilian government cyber efforts. The bill
would charge the Secretary of Homeland Security, working with the
private sector and the heads of other affected departments and
agencies, with developing a supply chain risk management strategy
applicable to Federal procurements. This strategy would emphasize the
security of information systems from development to acquisition and
throughout their operational life cycle. The strategy would be based,
to the maximum extent practicable, on standards developed by the
private sector and would direct agencies to use commercial-off-the-
shelf solutions to the maximum extent consistent with agency needs.
While the Cyber Center should not be responsible for micromanaging
individual procurements or directing investments, we have seen far too
often that security is not a primary concern when agencies procure
their IT systems. Recommending security investments to OMB and
providing strategic guidance on security enhancements early in the
development and acquisition process will help ``bake in'' security.
Cyber security can no longer be an afterthought in our government
agencies.
These improvements in Federal acquisition policy should have
beneficial ripple effects in the larger commercial market. As a large
customer, the Federal Government can contract with companies to
innovate and improve the security of their IT services and products.
These innovations can establish new security baselines for services and
products offered to the private sector and the general public without
mandating specific market outcomes.
Finally, the legislation would direct the Office of Personnel
Management to reform the way cyber security personnel are recruited,
hired, and trained to ensure that the Federal Government and the
private sector have the talent necessary to lead this national effort
and protect its own networks. The bill would also provide DHS with
temporary hiring and pay flexibilities to assist in the establishment
of the Center.
We cannot afford to wait for a ``cyber 9/11'' before our government
finally realizes the importance of protecting our digital resources,
limiting our vulnerabilities, and mitigating the consequences of
penetrations to our networks.
We must be ready. It is vitally important that we build a strong
public-private partnership to protect cyberspace. It is a vital engine
of our economy, our government, our country and our future.
I urge Congress to support this vitally important legislation.
____________________